Black Box LPB2910A User Manual
Black Box LPB2910A User Manual

Black Box LPB2910A User Manual

Lpb2900 series gigabit managed poe+ switches
Hide thumbs Also See for LPB2910A:
Table of Contents

Advertisement

Gigabit Managed PoE+ Switches
User Manual
Order toll-free in the U.S. or for FREE 24/7 technical support: Call 877-877-BBOX
Contact
(outside U.S. call 724-746-5500)
Information
www.blackbox.com • info@blackbox.com
LPB2910A
LPB2926A
LPB2952A

Advertisement

Table of Contents
loading

Summary of Contents for Black Box LPB2910A

  • Page 1 LPB2910A LPB2926A LPB2952A Gigabit Managed PoE+ Switches User Manual Order toll-free in the U.S. or for FREE 24/7 technical support: Call 877-877-BBOX Contact (outside U.S. call 724-746-5500) Information www.blackbox.com • info@blackbox.com...
  • Page 2 Trademarks Used in this Manual Trademarks Used in this Manual Black Box and the Double Diamond logo are registered trademarks of BB Technologies, Inc. Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark owners.
  • Page 3 Disclaimer: Black Box Network Services shall not be liable for damages of any kind, including, but not limited to, punitive, consequential or cost of cover damages, resulting from any errors in the product information or specifications set forth in this document and Black Box Network Services may revise this document at any time without notice.
  • Page 4: Instrucciones De Seguridad

    NOM Statement Instrucciones de Seguridad (Normas Oficiales Mexicanas Electrical Safety Statement) 1. Todas las instrucciones de seguridad y operación deberán ser leídas antes de que el aparato eléctrico sea operado. 2. Las instrucciones de seguridad y operación deberán ser guardadas para referencia futura. 3.
  • Page 5   LPB2910A:   G igabit   M anaged   P oE+   S witch   -­‐   1 0-­‐Port   LPB2926A:   G igabit   M anaged   P oE+   S witch   -­‐   2 6-­‐Port  ...
  • Page 6 The   f ollowing   c onventions   a re   u sed   t hroughout   t his   m anual   t o   s how   i nformation.   Disclaimer     Black Box Network Services shall not be liable for damages of any kind, including, but not limited to, punitive, consequential or cost of cover damages, resulting from any errors in the product information...
  • Page 7   Publication date: Sept, 2015 Revision A1...
  • Page 8 Table   o f   C ontents       Revision   H istory   ..............................   i x INTRODUCTION   ....................  1   OPERATION   O F   W EB-­‐BASED   M ANAGEMENT   ............ 2   SYSTEM  ...
  • Page 9   2-­‐8.1   B ridge   S etting   ............................   100   2-­‐8.2   M STI   M apping  ............................   103   2-­‐8.3   M STI   P riorities   ............................   105   2-­‐8.4   C IST   P orts   ..............................   106  ...
  • Page 10   2-­‐19.11   S torm   C ontrol   ...........................   189   2-­‐20   M irror  ..............................   190   2-­‐21   U PnP   ..............................   192   2-­‐22.   G VRP   ..............................   193  ...
  • Page 11   3-­‐6.1   S ystem   S tatus   ............................   262   3-­‐6.2   P ort   S tatus   ............................   263   3-­‐6.3   P ort   S tatistics   ............................   265   3-­‐7   L oop   P rotection   ............................   267  ...
  • Page 12 MAINTENANCE ..............................320 5- 1 Restart Device ............................... 320 5- 2 Factory Defaults ............................. 321 5- 3 Firmware ............................... 322 5- 3.1 Firmware upgrade ..........................322 5- 3.2 Firmware Selection ..........................323 5- 4 Configuration ..............................325 5- 4.1 Save startup- config ..........................325 5- 4.2 Upload ..............................
  • Page 13 Revision   H istory     Release   Date   Revision   V6.33   09/16/2015   A1                     Publication date: Sept, 2015 Revision A1...
  • Page 14: Introduction

      LPB2910A  provides  10  ports  in  a  single  device,  LPB2926A  provides  26  ports,  and  LPB2952A  provides   52   p orts.   F eatures   c ommon   t o   a ll   t hree   s witches   a re   l isted   b elow:  ...
  • Page 15                     Operation   o f   W eb-­‐based   Chapter   1     Management           Initial   This  chapter  explains  how  to  configure  and  manage  the  LPB2900  Series switch  through  the  ...
  • Page 16 :       To  enable  dhcp,  so  If  you  do  not  have  DHCP  server  to  provide  ip  addresses  to  the       switch,   t he   s witch’s   d efault   i p   i s   1 92.168.1.1  ...
  • Page 17: System   C Onfiguration

      System   C onfiguration   Chapter   2                               This   c hapter   d escribes   t he   b asic   c onfiguration   t asks,   i ncluding   s ystem   I nformation   a nd   s witch   m anagement   ( e.g.,   Time,  ...
  • Page 18: S Ystem

    System   L ocation:      This   i s   t he   p hysical   l ocation   o f   t his   n ode   ( e.g.,   t elephone   c loset,   3 rd   f loor).   T he   a llowed   s tring   length  ...
  • Page 19: I Nformation

    2-­‐1.2   I P   The   I Pv4   a ddress   f or   t he   s witch   c an   b e   o btained   v ia   D HCP   S erver   f or   V LAN   1 .   T o   m anually   c onfigure   a n   address,  ...
  • Page 20 Parameter   d escription:     IP   C onfiguration   Mode:    Configure  whether  the  IP  stack  should  act  as  a  Host  or  a  Router.  In  Host  mode,  IP  traffic  between   interfaces   w ill   n ot   b e   r outed.   I n   R outer   m ode,   t raffic   i s   r outed   b etween   a ll   i nterfaces.     DNS  ...
  • Page 21 fe80::215:c5ff:fe03:4dc7.   T he   s ymbol   : :   i s   a   s pecial   s yntax   t hat   c an   b e   u sed   a s   a   s horthand   w ay   o f   representing  ...
  • Page 22: N Tp

      2-­‐1.3   N TP     NTP   is   Network   Time   Protocol   and   is   used   to   sync   the   network   time   based   Greenwich   Mean   Time   (GMT).  ...
  • Page 23 Buttons    These   b uttons   a re   d isplayed   o n   t he   N TP   p age:   Apply   –   C lick   t o   s ave   c hanges.   Reset  ...
  • Page 24: T Ime

    2-­‐1.4   T ime   The   s witch   p rovides   m anual   a nd   a utomatic   w ays   t o   s et   t he   s ystem   t ime   v ia   N TP.   M anual   s etting   i s   simple:  ...
  • Page 25   Parameter   d escription:   Time   C onfiguration   Clock   S ource:    There  are  two  modes  for  configuring  the  Clock  Source.  Select  "Use  Local  Settings"  to  set  the  Clock   Source   f rom   L ocal   T ime.     Select   " Use   N TP   S erver"   t o   s et   t he   C lock   S ource   f rom   t he   N TP   S erver.   System  ...
  • Page 26 Week   -­‐   S elect   t he   s tarting   w eek   n umber.     Day   -­‐   S elect   t he   s tarting   d ay.     Month  ...
  • Page 27: L Og

    2-­‐1.5   L og   The   log   is   a   standard   for   logging   program   messages.   It   allows   separation   of   the   software   that   generates   messages   from   the   system   that   stores   them   and   the   software   that   reports   and   analyzes   them.  ...
  • Page 28: G Reen   E Thernet   1

    2-­‐2   G reen   E thernet     EEE   i s   a   p ower   s aving   o ption   t hat   r educes   t he   p ower   u sage   w hen   t here   i s   l ow   o r   n o   t raffic   u se.   EEE  ...
  • Page 29   Parameter   d escription:   Optimize   E EE   f or   The   s witch   c an   b e   s et   t o   o ptimize   E EE   f or   e ither   b est   p ower   s aving   o r   l east   t raffic   l atency.   ...
  • Page 30: P Orts   C Onfiguration   1

    2-­‐3   P orts   C onfiguration     The  section  describes  how  to  configure  the  Port  parameters  of  the  switch.  You  can  also  use  the  Port   configuration   function   to   enable   or   disable   a   Port   of   the   switch   or   monitor   the   port’s   content   or   status.  ...
  • Page 31 Configured   L ink   S peed:    Selects   any   available   link   speed   for   the   given   switch   port.   Only   speeds   supported   by   the   specific   port  ...
  • Page 32: P Orts   D Escription

    2-­‐3.2   P orts   D escription   The  section  describes  how  to  configure  the  Port’s  alias  or  any  descriptions  for  the  Port  Identity.  The   user  can  enter  an  alphanumeric  string  that  describes  the  full  name  and  version  identification  for  the   system’s  ...
  • Page 33: S Erver

      2-­‐4DHCP   The   s ection   d escribes   h ow   t o   c onfigure   t he   D HCP   S nooping   p arameters   o f   t he   s witch.   D HCP   S nooping   can  ...
  • Page 34 Mode:    Configure   t he   o peration   m ode   p er   s ystem.   P ossible   m odes   a re:     Enabled:   E nable   D HCP   s erver   p er   s ystem.      ...
  • Page 35: E Xcluded   I P

        2-­‐4.1.2   E xcluded   I P     This   p age   c onfigures   e xcluded   I P   a ddresses.   D HCP   s erver   w ill   n ot   a llocate   t hese   e xcluded   I P   a ddresses   t o   a   D HCP   client.  ...
  • Page 36: P Ool

      2-­‐4.1.3   P ool     This   p age   m anages   D HCP   p ools.   A ccording   t o   t he   D HCP   p ool,   t he   D HCP   s erver   w ill   a llocate   a n   I P   address  ...
  • Page 37 If   " -­‐"   i s   d isplayed,   i t   m eans   n ot   d efined.   IP:    Display   t he   n etwork   n umber   o f   t he   D HCP   a ddress   p ool.     If  ...
  • Page 38: Dhcp   2

      2-­‐4.2   S nooping     DHCP   S nooping   i s   u sed   t o   b lock   i ntruders   o n   t he   u ntrusted   p orts   o f   t he   s witch   d evice   w hen   t hey   t ry   t o   intervene  ...
  • Page 39 Trusted:   C onfigures   t he   p ort   a s   a   t rusted   s ource   o f   t he   D HCP   m essages.     Untrusted:   C onfigures   t he   p ort   a s   a n   u ntrusted   s ource   o f   t he   D HCP   m essages.   Buttons  ...
  • Page 40: R Elay

      2-­‐4.3   R elay     A   D HCP   r elay   a gent   i s   u sed   t o   f orward   a nd   t o   t ransfer   D HCP   m essages   b etween   t he   c lients   a nd   t he   server  ...
  • Page 41 client.   I t   o nly   w orks   w hen   D HCP   r elay   o peration   m ode   i s   e nabled.     Disabled:   D isable   D HCP   r elay   i nformation   m ode   o peration.   Relay  ...
  • Page 42: S Ecurity   3

        2-­‐5   S ecurity   This   s ection   s hows   y ou   h ow   t o   c onfigure   t he   P ort   S ecurity   s ettings   o f   t he   S witch.   Y ou   c an   u se   t he   P ort   Security  ...
  • Page 43 Type  in  the  password.  The  allowed  string  length  is  0  to  255,  and  the  allowed  content  is  the  ASCII   characters   f rom   3 2   t o   1 26.   Password   ( again)     ...
  • Page 44: P Rivilege   L Evel

        2-­‐5.1.2   P rivilege   L evel     This   page   provides   an   overview   of   the   privilege   levels.   The   switch’s   privilege   levels   can   be   set   for   Account,  ...
  • Page 45 IP:   E verything   e xcept   “ ping.”     Port:   E verything   e xcept   “ VeriPHY.”     Diagnostics:   “ ping”   a nd   “ VeriPHY.”     Maintenance:   For   CLI:   System   Reboot,   System   Restore   Default,   System   Password,   Configuration   Save,  Configuration  Load,  and  Firmware  Load.  For  Web:  Users,  Privilege  Levels,  and  everything  in  ...
  • Page 46: A Uthentication   M Ethod

    2-­‐5.1.3   A uthentication   M ethod     This   p age   s hows   h ow   t o   c onfigure   a   u ser   a s   a uthenticated   w hen   h e   l ogs   i nto   t he   s witch   v ia   o ne   o f   t he   management  ...
  • Page 47: S Sh

      2-­‐5.1.4   S SH   This  section  shows  you  how  to  use  SSH  (Secure  SHell)  to  securely  access  the  Switch.  SSH  is  a  secure   communication   protocol   that   combines   authentication   and   data   encryption   to   provide   secure   encrypted  ...
  • Page 48: H Ttps

      2-­‐5.1.5   H TTPs   This   section   explains   how   to   use   HTTPS   to   securely   access   the   Switch.   HTTPS   is   a   secure   communication   protocol   that   combines   authentication   and   data   encryption   to   provide   secure   encrypted  ...
  • Page 49: A Ccess   M Anagement

    2-­‐5.1.6   A ccess   M anagement     This   section   explains   how   to   configure   an   access   management   table   of   the   Switch,   including   HTTP/HTTPS,  SNMP,  and  TELNET/SSH.  You  can  manage  the  Switch  over  an  Ethernet  LAN,  or  over  the   Internet.  ...
  • Page 50 Indicates  that  the  host  can  access  the  switch  from  SNMP  interface  if  the  host  IP  address  matches   the   I P   a ddress   r ange   p rovided   i n   t he   e ntry.     TELNET/SSH:  ...
  • Page 51: S Nmp

      2-­‐5.1.7   S NMP     Any   N etwork   M anagement   S ystem   ( NMS)   r unning   t he   S imple   N etwork   M anagement   P rotocol   ( SNMP)   can  ...
  • Page 52 Indicates   t he   S NMP   s upported   v ersion.   P ossible   v ersions   a re:   SNMP   v 1:   S et   S NMP   s upported   v ersion   1 .   SNMP  ...
  • Page 53   2-­‐5.1.7.2   T rap   Configure   S NMP   t rap   o n   t his   p age.   Global   S ettings   Configure   S NMP   t rap   o n   t his   p age.    ...
  • Page 54 Disabled:   D isable   S NMP   t rap   m ode   o peration.     Trap   D estination   C onfigurations    Configure   t rap   d estinations   o n   t his   p age.   Name  ...
  • Page 55 in   t his   f ield   i s   u sed.   T he   s tring   m ust   c ontain   a n   e ven   n umber(in   h exadecimal   f ormat)   w ith   n umber   o f   digits  ...
  • Page 56 2-­‐5.1.7.3   C ommunities     The   f unction   i s   u sed   t o   c onfigure   S NMPv3   c ommunities.   T he   C ommunity   a nd   U serName   i s   u nique.   T o   create  ...
  • Page 57 2-­‐5.1.7.4   U sers   The  function  is  used  to  configure  SNMPv3  user.  The  Entry  index  key  is  UserName.  To  create  a  new   UserName   a ccount,   p lease   c heck   < Add   n ew   u ser>   b utton,   a nd   e nter   t he   u ser   i nformation   t hen   c heck   <Save>.  ...
  • Page 58 Indicates   t he   s ecurity   m odel   t hat   t his   e ntry   s hould   b elong   t o.   P ossible   s ecurity   m odels   a re:     NoAuth,  ...
  • Page 59 2-­‐5.1.7.5   G roup   The   f unction   i s   u sed   t o   c onfigure   S NMPv3   g roup.   T he   E ntry   i ndex   k ey   a re   S ecurity   M odel   a nd   S ecurity   Name.  ...
  • Page 60 v1:   R eserved   f or   S NMPv1.     v2c:   R eserved   f or   S NMPv2c.   usm:   U ser-­‐based   S ecurity   M odel   ( USM).     Security  ...
  • Page 61 2-­‐5.1.7.6   V iews   The   f unction   i s   u sed   t o   c onfigure   S NMPv3   v iew.   T he   E ntry   i ndex   k eys   a re   O ID   S ubtree   a nd   V iew   N ame.   To  ...
  • Page 62 The   O ID   d efining   t he   r oot   o f   t he   s ubtree   t o   a dd   t o   t he   n amed   v iew.   T he   a llowed   O ID   l ength   i s   1   t o   128.  ...
  • Page 63 v1:   R eserved   f or   S NMPv1.     v2c:   R eserved   f or   S NMPv2c.   usm:   U ser-­‐based   S ecurity   M odel   ( USM).     Security  ...
  • Page 64   2-­‐5.1.7.8   T rap   E vent   S everity   This   p age   d isplays   c urrent   t rap   e vent   s everity   c onfigurations.   T rap   e vent   s everity   c an   a lso   b e   configured  ...
  • Page 65 SMTP:      Enable   -­‐   S elect   t his   G roup   N ame   i n   S MTP. Publication date: Sept, 2015 Revision A1...
  • Page 66: R Mon

      2-­‐5.1.8   R MON     An   RMON   implementation   typically   operates   in   a   client/server   model.   Monitoring   devices   contain   RMON   s oftware   a gents   t hat   c ollect   i nformation   a nd   a nalyze   p ackets.   T hese   p robes   a ct   a s   s ervers   a nd   the  ...
  • Page 67 Indicates   t he   m aximum   d ata   e ntries   a ssociated   t his   H istory   c ontrol   e ntry   s tored   i n   R MON.   T he   r ange   is  ...
  • Page 68   2-­‐5.1.8.2   H istory   Configure   R MON   H istory   t able   o n   t his   p age.   T he   e ntry   i ndex   k ey   i s   I D.    ...
  • Page 69 The   n umber   o f   d ata   t o   b e   s aved   i n   t he   R MON.   Publication date: Sept, 2015 Revision A1...
  • Page 70 2-­‐5.1.8.3   R MON   Configure   R MON   A larm   t able   o n   t his   p age.   T he   e ntry   i ndex   k ey   i s   I D.    ...
  • Page 71 The   n umber   o f   i nbound   p ackets   t hat   c ontained   e rrors   p reventing   t hem   f rom   b eing   d eliverable   t o   a   higher-­‐layer  ...
  • Page 72 2-­‐5.1.8.4   E vent   Configure   R MON   E vent   t able   o n   t his   p age.   T he   e ntry   i ndex   k ey   i s   I D.    ...
  • Page 73: N Etwork

    2-­‐5.2   N etwork     2-­‐5.2.1   L imit   C ontrol     This  section  explains  how  to  configure  the  Port  Security  settings  of  the  Switch.  You  can  use  the  Port   Security   f eature   t o   r estrict   i nput   t o   a n   i nterface   b y   l imiting   a nd   i dentifying   M AC   a ddresses.    ...
  • Page 74     Publication date: Sept, 2015 Revision A1...
  • Page 75 Parameter   d escription:   System   C onfiguration   Mode:    Indicates   if   Limit   Control   is   globally   enabled   or   disabled   on   the   switch.   If   globally   disabled,   other   modules  may  still  use  the  underlying  functionality,  but  limit  checks  and  corresponding  actions  are  ...
  • Page 76 1) Boot   t he   s witch,   2) Disable   a nd   r e-­‐enable   L imit   C ontrol   o n   t he   p ort   o r   t he   s witch,   3) Click  ...
  • Page 77: N As

      2-­‐5.2.2   N AS     The   s ection   d escribes   h ow   t o   c onfigure   t he   N AS   p arameters   o f   t he   s witch.   T he   N AS   s erver   c an   b e   u sed   to  ...
  • Page 78     Parameter   d escription:   Mode:    Indicates   if   NAS   is   globally   enabled   or   disabled   on   the   switch.   If   globally   disabled,   all   ports   can   forward  ...
  • Page 79 secure   M AC   a ddresses:   •   S ingle   8 02.1X   •   M ulti   8 02.1X   •   M AC-­‐Based   A uth.   If  a  client  is  denied  access—  either  because  the  RADIUS  server  denies  the  client  access  or  because   the  ...
  • Page 80 Once   the   switch   considers   whether   to   enter   the   Guest   VLAN,   it   will   first   check   if   this   option   is   enabled  or  disabled.  If  disabled  (unchecked,  default),  the  switch  will  only  enter  the  Guest  VLAN  if   an  ...
  • Page 81 Single   8 02.1X:    In   p ort-­‐based   8 02.1X   a uthentication,   o nce   a   s upplicant   i s   s uccessfully   a uthenticated   o n   a   p ort,   t he   whole  ...
  • Page 82 RADIUS-­‐Assigned   Q oS   E nabled   :    When  RADIUS-­‐Assigned  QoS  is  both  globally  enabled  and  enabled  (checked)  on  a  given  port,  the   switch  reacts  to  QoS  Class  information  carried  in  the  RADIUS  Access-­‐Accept  packet  transmitted  by   the  ...
  • Page 83 Guest   V LAN   E nabled:    When   Guest   VLAN   is   both   globally   enabled   and   enabled   (checked)   for   a   given   port,   the   switch   considers  ...
  • Page 84 Buttons:    Apply   –   C lick   t o   s ave   c hanges.   Reset-­‐   C lick   t o   u ndo   a ny   c hanges   m ade   l ocally   a nd   r evert   t o   p reviously   s aved   v alues.   Upper  ...
  • Page 85: A Cl

      2-­‐5.2.3   A CL   The   GEPoEL2P-­‐ESW26G   Series   switch   access   control   list   (ACL)   is   probably   the   most   commonly   used   object  in  the  IOS.  It  is  used  for  packet  filtering,  but  also  for  selecting  types  of  traffic  to  be  analyzed,   forwarded,  ...
  • Page 86 Rate   L imiter   I D:    Select   which   rate   limiter   to   apply   on   this   port.   The   allowed   values   are   Disabled   or   the   values   1   through  ...
  • Page 87 2-­‐5.2.3.2   R ate   L imiters   The   section   describes   how   to   configure   the   switch’s   ACL   Rate   Limiter   parameters.   The   Rate   Limiter   Level   r anges   f rom   1   t o   1 6   p ps   o r   k bps.    ...
  • Page 88 2-­‐5.2.3.3   A ccess   C ontrol   L ist   The   section   describes   how   to   configure   Access   Control   List   rule.   An   Access   Control   List   (ACL)   is   a   sequential  ...
  • Page 89     Parameter   d escription:   Ingress   P ort:    Indicates   t he   i ngress   p ort   o f   t he   A CE.   P ossible   v alues   a re:     Any:  ...
  • Page 90 Port   C opy:    Indicates   the   port   copy   operation   of   the   ACE.   Frames   matching   the   ACE   are   copied   to   the   port   number.  The  allowed  values  are  Disabled  for  a  specific  port  number.  When  Disabled  is  displayed,  ...
  • Page 91 Any:   N o   D MAC   f ilter   i s   s pecified.   ( DMAC   f ilter   s tatus   i s   " don't-­‐care".)   MC:   F rame   m ust   b e   m ulticast.     BC:  ...
  • Page 92: I P   S Ource   G Uard

      2-­‐5.2.4   I P   S ource   G uard     The   s ection   d escribes   h ow   t o   c onfigure   t he   I P   S ource   G uard   d etail   p arameters   o f   t he   s witch.   U se   t he   IP  ...
  • Page 93 2-­‐5.2.4.2   S tatic   T able   The   section   describes   how   to   configure   the   Static   IP   Source   Guard   Table   parameters   of   the   switch.   You  ...
  • Page 94: A Rp   I Nspection

    2-­‐5.2.5   A RP   I nspection   The   s ection   d escribes   h ow   t o   c onfigure   t he   A RP   I nspection   p arameters   o f   t he   s witch.   Y ou   c an   configure  ...
  • Page 95 log   t ype   o f   A RP   I nspection   w ill   r efer   t o   t he   V LAN   s etting.   P ossible   " Check   V LAN"   s ettings   a re:     Enabled:  ...
  • Page 96 2-­‐5.2.5.2   V LAN   M ode   C onfiguration     Each   p age   s hows   u p   t o   9 999   e ntries   f rom   t he   V LAN   t able,   d efault   i s   2 0,   s elected   t hrough   t he   " entries   per  ...
  • Page 97 setting.     Possible   t ypes   a re:     None:   L og   n othing.     Deny:   L og   d enied   e ntries.     Permit:   L og   p ermitted   e ntries.     ALL:  ...
  • Page 98 2-­‐5.2.5.3   S tatic   T able     The   s ection   d escribes   h ow   t o   c onfigure   t he   S tatic   A RP   I nspection   T able   p arameters   o f   t he   s witch.   Y ou   can  ...
  • Page 99 2-­‐5.2.5.4   D ynamic   T able     Entries   i n   t he   D ynamic   A RP   I nspection   T able   a re   s hown   o n   t his   p age.   T he   D ynamic   A RP   I nspection   Table  ...
  • Page 100 Select   t he   c heckbox   t o   t ranslate   t he   e ntry   t o   s tatic   e ntry.     Buttons:    Apply   –   C lick   t o   s ave   c hanges.   Reset-­‐  ...
  • Page 101: A Aa

    2-­‐5.3   A AA   This   section   shows   you   how   to   use   an   AAA   (Authentication,   Authorization,   Accounting)   server   to   provide   a ccess   c ontrol   t o   y our   n etwork.   T he   A AA   s erver   c an   b e   a   T ACACS+   o r   R ADIUS   s erver   t o   c reate   and  ...
  • Page 102 before   r etransmitting   t he   r equest.     Retransmit    Retransmit  is  the  number  of  times,  in  the  range  1  to  1000,  a  RADIUS  request  is  retransmitted  to  a   server   that   is   not   responding.   If   the   server   has   not   responded   after   the   last   retransmit,   it   is   considered  ...
  • Page 103 Buttons   Apply:      Click   t o   s ave   c hanges.   Reset:    Click   t o   u ndo   a ny   c hanges   m ade   l ocally   a nd   r evert   t o   p reviously   s aved   v alues.    ...
  • Page 104: T Acacs

    2-­‐5.3.2   T ACACS+   Web   I nterface     To   c onfigure   a   C ommon   C onfiguration   o f   A AA,   T ACACS+   i n   t he   w eb   i nterface:    ...
  • Page 105 The   s ecret   k ey   -­‐   u p   t o   6 3   c haracters   l ong   -­‐   s hared   b etween   t he   T ACACS+   s erver   a nd   t he   s witch.     Server  ...
  • Page 106: A Ggregation   9

        2-­‐6 A ggregation   Aggregation   i s   u sed   t o   c onfigure   t he   s ettings   o f   L ink   A ggregation.   Y ou   c an   b undle   m ore   t han   o ne   p ort   with  ...
  • Page 107     Parameter   d escription:   Hash   C ode   C ontributors   Source   M AC   A ddress:    The   Source   MAC   address   can   be   used   to   calculate   the   destination   port   for   the   frame.   Check   to   enable  ...
  • Page 108: L Acp

    2-­‐6.2   L ACP   This  page  allows  the  user  to  inspect  the  current  LACP  port  configurations,  and  possibly  change  them   as  well.  An  LACP  trunk  group  with  more  than  one  ready  member-­‐ports  is  a  “real  trunked”  group.  An   LACP  ...
  • Page 109 The   Timeout   controls   the   period   between   BPDU   transmissions.   Fast   will   transmit   LACP   packets   each   s econd,   w hile   S low   w ill   w ait   f or   3 0   s econds   b efore   s ending   a   L ACP   p acket.     Prio  ...
  • Page 110: L Oop   P Rotection   9

      2-­‐7   L oop   P rotection       Loop   P rotection   i s   u sed   t o   d etect   t he   p resence   o f   t raffic.   W hen   t he   s witch   r eceives   a   p acket’s   ( looping   detection  frame)  MAC  address  the  same  as  itself  from  a  port,  show  Loop  Protection  occurs.  The  port  ...
  • Page 111   Parameter   d escription:   Enable   L oop   P rotection:    Controls   w hether   l oop   p rotections   i s   e nabled   ( as   a   w hole).     Transmission  ...
  • Page 112: S Panning   T Ree

    2-­‐8   S panning   T ree     Spanning   T ree   P rotocol   ( STP)   c an   b e   u sed   t o   d etect   a nd   d isable   n etwork   l oops,   a nd   t o   p rovide   b ackup   links  ...
  • Page 113 Figure   2 -­‐8.1:     The   S TP   B ridge   C onfiguration         Parameter   d escription:   Basic   S ettings      Protocol   V ersion:   The   S TP   p rotocol   v ersion   s etting.   V alid   v alues   a re   S TP,   R STP,   a nd   M STP.     Bridge  ...
  • Page 114 The   n umber   o f   B PDUs   a   b ridge   p ort   c an   s end   p er   s econd.   W hen   e xceeded,   t ransmission   o f   t he   n ext   BPDU  ...
  • Page 115: M Sti   M Apping

    2-­‐8.2   M STI   M apping   When   y ou   i mplement   a   S panning   T ree   p rotocol   o n   t he   s witch   f or   a   b ridge,   t he   C IST   i s   n ot   a vailable   f or   explicit  mapping,  because  it  will  receive  the  VLANs  not  explicitly  mapped.  You  need  to  set  the  list  of  ...
  • Page 116 Configuration   I dentification     Configuration   N ame:    The   name   that   identifies   the   VLAN   to   MSTI   mapping.   Bridges   must   share   the   name   and   revision   (see  ...
  • Page 117: M Sti   P Riorities

    2-­‐8.3   M STI   P riorities     When  you  implement  a  Spanning  Tree  protocol  on  the  switch  in  the  bridge  instance,  the  CIST  is  the   default   a nd   i s   a lways   a ctive.   T o   c ontrol   t he   b ridge   p riority,   l ower   n umeric   v alues   h ave   b etter   p riority.   The  ...
  • Page 118: C Ist   P Orts

    2-­‐8.4   C IST   P orts   When   y ou   i mplement   a   S panning   T ree   p rotocol   o n   t he   s witch,   y ou   n eed   t o   c onfigure   t he   C IST   P orts.   The  ...
  • Page 119 Priority:    Controls   the   port   priority.   This   can   be   used   to   control   priority   of   ports   having   identical   port   cost   (see   a bove).   operEdge  ...
  • Page 120: M Sti   P Orts

    2-­‐8.5   M STI   P orts     The  section  describes  how  to  inspect  the  current  STP  MSTI  port  configurations,  and  possibly  change   them.   An  MSTI  port  is  a  virtual  port,  which  is  instantiated  separately  for  each  active  CIST  (physical)  port  for   each  ...
  • Page 121     Parameter   d escription:   Port:    The   s witch   p ort   n umber   o f   t he   c orresponding   S TP   C IST   ( and   M STI)   p ort.     Path  ...
  • Page 122: I Pmc   P Rofile

    2-­‐9   I PMC   P rofile     This   p age   p rovides   I PMC   P rofile   r elated   c onfigurations.   2-­‐9.1   P rofile   T able   The  IPMC  profile  is  used  to  deploy  the  access  control  on  IP  multicast  streams.  It  is  allowed  to  create,   at  ...
  • Page 123: I Pmc   P Rofile   R Ule   S Ettings   T Able

          Parameter   d escription:    Port:   The   s witch   p ort   n umber   o f   t he   c orresponding   S TP   C IST   ( and   M STI)   p ort.     Global  ...
  • Page 124 Entry   N ame    The   n ame   u sed   i n   s pecifying   t he   a ddress   r ange   u sed   f or   t his   r ule.   Only  ...
  • Page 125: A Ddress   E Ntry

    2-­‐9.2   A ddress   E ntry   This   p age   p rovides   a ddress   r ange   s ettings   u sed   i n   I PMC   p rofile.   The  address  entry  is  used  to  specify  the  address  range  that  will  be  associated  with  IPMC  Profile.  It  is   allowed  ...
  • Page 126 >>   –   U pdates   t he   t able,   s tarting   w ith   t he   e ntry   a fter   t he   l ast   e ntry   c urrently   d isplayed.    ...
  • Page 127 2-­‐10MVR     The   M VR   f eature   e nables   m ulticast   t raffic   f orwarding   o n   t he   M ulticast   V LAN.   I n   a   m ulticast   t elevision   application,  a  PC  or  a  television  with  a  set-­‐top  box  can  receive  the  ...
  • Page 128 Parameter   d escription:   MVR   M ode    Enable/Disable   t he   G lobal   M VR.   The   U nregistered   F looding   c ontrol   d epends   o n   t he   c urrent   c onfiguration   i n   I GMP/MLD   S nooping.   I t   is  ...
  • Page 129 Inactive:   T he   d esignated   p ort   d oes   n ot   p articipate   M VR   o perations.   Source:   C onfigure   u plink   p orts   t hat   r eceive   a nd   s end   m ulticast   d ata   a s   s ource   p orts.   S ubscribers   cannot  ...
  • Page 130: I Pmc

    2-­‐11   I PMC   ICMP   is   an   acronym  for   Internet  Control   Message   Protocol.  It   is   a   protocol   that   generates  the   error   response,   diagnostic,   or   routing   purposes.   ICMP   messages   generally   contain   information   about   routing  ...
  • Page 131       Parameter   d escription:   Snooping   E nabled:      Enable   t he   G lobal   I GMP   S nooping.     Unregistered   I PMCv4   F looding   e nabled:   ...
  • Page 132: V Lan   C Onfiguration

      2-­‐11.1.2   V LAN   C onfiguration   The   s ection   d escribes   t he   V LAN   c onfiguration   s etting   p rocess   i ntegrated   w ith   I GMP   S nooping   f unction.   Each  ...
  • Page 133 Define   t he   I Pv4   a ddress   a s   s ource   a ddress   u sed   i n   I P   h eader   f or   I GMP   Q uerier   e lection.    ...
  • Page 134: P Ort   F Iltering   P Rofile

    2-­‐11.1.3   P ort   F iltering   P rofile   The  section  describes  how  to  set  IGMP  Port  Group  Filtering.  With  the  IGMP  filtering  feature,  a  user   can   exert   this   type   of   control.   In   some   network   Application   environments,   for   example,   in   metropolitan  ...
  • Page 135   Profile   M anagement   B utton:    You   c an   i nspect   t he   r ules   o f   t he   d esignated   p rofile   b y   u sing   t he   f ollowing   b utton:     :  ...
  • Page 136: M Ld   S Nooping

    2-­‐11.2   M LD   S nooping   Curiously   enough,   a   network   node   that   acts   as   a   source   of   IPv6   multicast   traffic   is   only   an   indirect   participant  ...
  • Page 137 Figure   2 -­‐11.2.1:     The   M LD   S nooping   B asic   C onfiguration.           Parameter   d escription:   Snooping   E nabled:    Enable   t he   G lobal   M LD   S nooping.     Unregistered  ...
  • Page 138 Enable   MLD   Proxy.   This   feature   can   be   used   to   avoid   forwarding   unnecessary   join   and   leave   messages   t o   t he   r outer   s ide.   Fast  ...
  • Page 139: V Lan   C Onfiguration

    2-­‐11.2.2   V LAN   C onfiguration     When   M LD   s nooping   i s   e nabled   o n   a   V LAN,   t he   s witch   a cts   t o   m inimize   u nnecessary   m ulticast   t raffic.   If  the  switch  receives  multicast  traffic  destined  for  a  given  multicast  address,  it  forwards  that  traffic  ...
  • Page 140 Compatibility   is   maintained   by   hosts   and   routers   taking   appropriate   actions   depending   on   the   versions   of   IGMP   operating   on   hosts   and   routers   within   a   network.   The   allowed   selection   is   IGMP-­‐Auto,  ...
  • Page 141: P Ort   G Roup   F Iltering

    2-­‐11.2.3   P ort   G roup   F iltering     The  section  describes  how  to  set  the  Port  Group  Filtering  in  the  MLD  Snooping  function.  On  the  UI,   you   c an   a dd   a   n ew   f iltering   g roup   a nd   s afety   p olicy.      ...
  • Page 142: L Ldp

      2-­‐12   L LDP   The   s witch   s upports   t he   L LDP.   F or   c urrent   i nformation   o n   y our   s witch   m odel,   t he   L ink   L ayer   D iscovery   Protocol  (LLDP)  provides  a  standards-­‐based  method  for  enabling  switches  to  advertise  themselves  to  ...
  • Page 143     Parameter   d escription:   LLDP   P arameters   Tx   I nterval:    The   switch   periodically   transmits   LLDP   frames   to   its   neighbors   to   have   the   network   discovery   information  ...
  • Page 144 The   C DP   o peration   i s   r estricted   t o   d ecoding   i ncoming   C DP   f rames   ( the   s witch   d oesn't   t ransmit   C DP   frames).  ...
  • Page 145: L Ldp-­‐Med   C Onfiguration

    2-­‐12.2   L LDP-­‐MED   C onfiguration     Media   Endpoint   Discovery   is   an   enhancement   of   LLDP,   known   as   LLDP-­‐MED   that   provides   the   following   f acilities:   Auto-­‐discovery  ...
  • Page 146         Parameter   d escription:   Fast   s tart   r epeat   c ount     Rapid  startup  and  Emergency  Call  Service  Location  Identification  Discovery  of  endpoints  is  a  critically   important  aspect  of  VoIP  systems  in  general.  In  addition,  it  is  best  to  advertise  only  those  pieces  of   information  ...
  • Page 147 Coordinates   L ocation   Latitude:    Latitude   S HOULD   b e   n ormalized   t o   w ithin   0 –90   d egrees,   w ith   a   m aximum   o f   4   d igits.   You  ...
  • Page 148 Leading   s treet   d irection   -­‐   E xample:   N .   Trailing   s treet   s uffix:    Trailing   s treet   s uffix   -­‐   E xample:   S W.   Street  ...
  • Page 149 VLAN  configuration,  along  with  the  associated  Layer  2  and  Layer  3  attributes,  that  apply  for  a  set  of   specific   protocol   applications   on   that   port.   Improper   network   policy   configurations   are   a   very   significant  ...
  • Page 150 or   laptops.   This   class   of   endpoints   frequently   does   not   support   multiple   VLANs,   if   at   all,   and   are   typically   configured   to   use   an   “untagged”   VLAN   or   a   single   “tagged”   data   specific   VLAN.   When   a   network  ...
  • Page 151: C Onfiguration

      2-­‐   1 3   P oE   PoE   i s   a n   a cronym   f or   P ower   O ver   E thernet.       Power  Over  Ethernet  is  used  to  transmit  electrical  power  to  remote  devices  over  standard  Ethernet   cable.  ...
  • Page 152 2. Specify  the  Reserved  Power  determined  and  Power  Management  mode.  Specify  the  PoE  or  PoE++   and   P riority.   3. Click   A pply.       Figure   2 -­‐13.1:     The   P oE   C onfiguration  ...
  • Page 153 for   a ll   p orts   e xceeds   t he   a mount   o f   p ower   t hat   t he   p ower   s upply   c an   d eliver   o r   i f   t he   a ctual   p ower   consumption  for  a  given  port  exceeds  the  reserved  power  for  that  port.  The  ports  are  shut  down  ...
  • Page 154: P Ower   D Elay

      2-­‐   1 3.2   P ower   D elay   This   p age   a llows   t he   u ser   t o   s et   t he   d elay   t ime   b efore   p ower   i s   p rovided   a fter   t he   d evice   i s   r ebooted.    ...
  • Page 155: S Cheduling

      2-­‐   1 3.3   S cheduling   This  page  allows  the  user  to  make  schedule  PoE  power  supply  management.  PoE  Scheduling  not  only   makes   P oE   m anagement   e asier,   b ut   a lso   s aves   m ore   e nergy.    ...
  • Page 156 PoE   S cheduling   S tatus.     Enabled:   E nable   P OE   S cheduling.     Disabled:   D isable   P OE   S cheduling.   Hour:    The   t ime   t he   P oE   p ort   i s   p owered   d uring   t he   d ay.   Publication date: Sept, 2015 Revision A1...
  • Page 157: A Uto   C Hecking

      3-­‐   1 3.4   A uto   C hecking   This   page   shows   how   to   specify   the   auto   detection   parameters   to   check   the   linking   status   between   PoE  ...
  • Page 158 When   t he   P oE   p ort   c an't   p ing   t he   P D,   i t   w ill   t ry   t o   d etect   i t   a gain.   A fter   t he   t hird   t ime,   i t   w ill   t rigger   a  ...
  • Page 159: M Ac   T Able

      2-­‐14   M AC   T able       Switching  frames  is  based  upon  the  DMAC  address  contained  in  the  frame.  The  switch  builds  a  table   that   m aps   M AC   a ddresses   t o   s witch   p orts   t o   i dentify   w hich   p orts   t he   f rames   s hould   g o   t o   ( based   u pon   the  ...
  • Page 160     Parameter   d escription:   Aging   C onfiguration:    By  default,  dynamic  entries  are  removed  from  the  MAC  table  after  300  seconds.  This  is  also  called   aging.   Configure   a ging   t ime   b y   e ntering   a   v alue   h ere   i n   s econds;   f or   e xample,   A ge   t ime   i n   s econds.     The  ...
  • Page 161   2-­‐15   V LANs   You   c an   a ssign   a   s pecific   V LAN   t o   u se   f or   m anagement.   T he   m anagement   V LAN   e stablishes   a n   I P   connection  ...
  • Page 162   Port:    This   i s   t he   l ogical   p ort   n umber   o f   t his   r ow.     Mode:    The  port  mode  (default  is  Access)  determines  the  fundamental  behavior  of  the  port  in  question.  A  port  can   operate  ...
  • Page 163 On  ingress,  frames  with  a  VLAN  tag  with  a  TPID  =  0x8100  or  equal  to  the  Ethertype  configured  for  Custom-­‐S   ports  get  classified  to  the  VLAN  ID  embedded  in  the  tag.  If  a  frame  is  untagged  or  priority  tagged,  the  frame   gets  ...
  • Page 164: P Rivate   V Lans

    2-­‐16   P rivate   V LANs   In   a   p rivate   V LAN,   c ommunication   b etween   p orts   i n   t hat   p rivate   V LAN   i s   n ot   p ermitted.   A   V LAN   c an   be  ...
  • Page 165 Apply   –   C lick   t o   s ave   c hanges.   Reset-­‐   C lick   t o   u ndo   a ny   c hanges   m ade   l ocally   a nd   r evert   t o   p reviously   s aved   v alues.   Publication date: Sept, 2015 Revision A1...
  • Page 166: P Ort   I Solation

    2-­‐16.2   P ort   I solation     Port   I solation   p rovides   f or   a n   a pparatus   a nd   m ethod   t o   i solate   p orts   o n   l ayer   2   s witches   o n   t he   s ame   VLAN  ...
  • Page 167: V Cl

    2-­‐17   V CL     2-­‐17.1   M AC-­‐based   V LAN   MAC  address-­‐based  VLAN  decides  the  VLAN  for  forwarding  an  untagged  frame  based  on  the  source   MAC   a ddress   o f   t he   f rame.   A  common  way  of  grouping  VLAN  members  is  by  port;  this  is  called  port-­‐based  VLAN.  Typically,  the  ...
  • Page 168 Indicates   t he   V LAN   I D.     Port   M embers:    A   r ow   o f   c heck   b oxes   f or   e ach   p ort   i s   d isplayed   f or   e ach   M AC-­‐based   V LAN   e ntry.   T o   i nclude   a   p ort   in  a  MAC-­‐based  VLAN,  check  the  box.  To  remove  or  exclude  the  port  from  the  MAC-­‐based  VLAN,  ...
  • Page 169: P Rotocol   -­‐ Based   V Lan

      2-­‐17.2   P rotocol   -­‐ based   V LAN     This   s ection   d escribes   P rotocol   -­‐ based   V LAN.   P rotocols   s upported   b y   t he   s witch   i nclude   E thernet   L LC   and  ...
  • Page 170 Frame   T ype   c an   h ave   o ne   o f   t he   f ollowing   v alues:     Ethernet     LLC     SNAP      ...
  • Page 171: G Roup   T O   V Lan

        2-­‐17.2.2   G roup   t o   V LAN   This  section  allows  you  to  map  an  already  configured  Group  Name  to  a  VLAN  for  the  selected  stack   switch   u nit   s witch.    ...
  • Page 172: I P   S Ubnet-­‐Based   V Lan

    Click   R efresh   t o   r efresh   t he   P rotocol   G roup   M apping   i nformation   m anually.   2-­‐17.3   I P   S ubnet-­‐based   V LAN   The  IP  subnet-­‐based  VLAN  entries  can  be  configured  here.  This  page  allows  you  to  add,  update,  and  ...
  • Page 173 “Save.”   P ress   t he   “ Delete”   b utton   t o   u ndo   t he   a ddition   o f   n ew   I P   s ubnet-­‐based   V LANs.   T he   maximum  ...
  • Page 174: V Oice   V Lan

    2-­‐18   V OICE   V LAN     Voice   V LAN   i s   V LAN   c onfigured   s pecially   f or   v oice   t raffic.   B y   a dding   t he   p orts   w ith   v oice   d evices   attached  ...
  • Page 175 Parameter   d escription:   Mode:    Indicates  the  Voice  VLAN  mode  operation.  Disable  MSTP  before  you  enable  Voice  VLAN  to  avoid   an   i ngress   f iltering   c onflict.   P ossible   m odes   a re:     Enabled:  ...
  • Page 176: O Ui

      2-­‐18.2   O UI     The   s ection   d escribes   h ow   t o   C onfigure   t he   V oice   V LAN   O UI   t able.   T he   m aximum   e ntry   n umber   i s   1 6.   Modifying  ...
  • Page 177: Q Os

      2-­‐19   Q oS     The   switch   supports   four   QoS   queues   per   port   with   strict   or   weighted   fair   queuing   scheduling.   It   supports   Q oS   C ontrol   L ists   ( QCL)   f or   a dvanced   p rogrammable   Q oS   c lassification,   b ased   o n   I EEE   8 02.1p,   Ethertype,  ...
  • Page 178 The   p ort   n umber   f or   w hich   t he   c onfiguration   b elow   a pplies.     CoS:    Controls   t he   d efault   c lass   o f   s ervice.     All  ...
  • Page 179: P Ort   P Olicing

    Buttons:    Apply   –   C lick   t o   s ave   c hanges.   Reset-­‐   C lick   t o   u ndo   a ny   c hanges   m ade   l ocally   a nd   r evert   t o   p reviously   s aved   v alues.   2-­‐19.2  ...
  • Page 180: P Ort   S Chedulers

    Buttons:    Apply   –   C lick   t o   s ave   c hanges.   Reset-­‐   C lick   t o   u ndo   a ny   c hanges   m ade   l ocally   a nd   r evert   t o   p reviously   s aved   v alues.   2-­‐19.3  ...
  • Page 181     If   y ou   s elect   t he   s cheduler   mode   w ith   w ighted   t hen   the   s creen   w ill   c hange   a s   the  ...
  • Page 182 Controls   t he   r ate   f or   t he   q ueue   s haper.   T he   d efault   v alue   i s   1 .   T his   v alue   i s   r estricted   t o   1 -­‐1000000   when  ...
  • Page 183: P Ort   S Haping

      2-­‐19.4   P ort   S haping   This   s ection   p rovides   a n   o verview   o f   Q oS   E gress   P ort   S hapers   f or   a ll   s witch   p orts.   O therwise,   t he   u ser   can  get  all  detail  information  for  the  ports  belong  to  the  currently  selected  stack  unit,  as  reflected  by  ...
  • Page 184     If   y ou   s elect   t he   s cheduler   mode   w ith   w ighted   t hen   the   s creen   w ill   c hange   a s   the  ...
  • Page 185 Queue   S haper   R ate:    Controls   t he   r ate   f or   t he   q ueue   s haper.   T he   d efault   v alue   i s   1 .   T his   v alue   i s   r estricted   t o   1 -­‐1000000   when  ...
  • Page 186: P Ort   T Ag   R Emarking

      2-­‐19.5   P ort   T ag   R emarking     This   s ection   d escribes   h ow   o verview   o f   Q oS   E gress   P ort   T ag   R emarking   f or   a ll   s witch   p orts.   O therwise,   the  ...
  • Page 187         Parameter   d escription:   Mode:    Controls   t he   t ag   r emarking   m ode   f or   t his   p ort.     Classified:   U se   c lassified   P CP/DEI   v alues.     Default:  ...
  • Page 188 Controls  the  mapping  of  the  classified  (QoS  class,  DP  level)  to  (PCP,  DEI)  values  when  the  mode  is   set   t o   M apped.   Buttons:    Apply   –   C lick   t o   s ave   c hanges.   Reset-­‐  ...
  • Page 189: P Ort   D Scp

      2-­‐19.6   P ort   D SCP   The   s ection   w ill   e xplain   h ow   t o   s et   t he   Q oS   P ort   D SCP   c onfiguration   t hat   a llowed   y ou   t o   c onfigure   t he   basic  QoS  Port  DSCP  Configuration  settings  for  all  switch  ports.  Otherwise,  the  settings  relate  to  the  ...
  • Page 190 • All:   C lassify   a ll   D SCP.     Egress   :    Port   E gress   R ewriting   c an   b e   o ne   o f   b elow   p arameters   •...
  • Page 191: D Scp-­‐Based   Q Os

      2-­‐19.7   D SCP-­‐Based   Q oS   The   section   will   explain   how   to   configure   the   DSCP-­‐Based   QoS   mode.   This   page   allows   you   to   configure  ...
  • Page 192 Parameter   d escription:   DSCP:    The   m aximum   n umber   o f   s upported   D SCP   v alues   a re   6 4.     Trust:    Click   t o   c heck   i f   t he   D SCP   v alue   i s   t rusted.     QoS  ...
  • Page 193: D Scp   T Ranslation

      2-­‐19.8   D SCP   T ranslation     This  section  explains  how  to  configure  the  basic  QoS  DSCP  Translation  settings  for  all  switches.  DSCP   translation   c an   b e   d one   i n   I ngress   o r   E gress.    ...
  • Page 194 Parameter   d escription:   DSCP:    The   m aximum   n umber   o f   s upported   D SCP   v alues   i s   6 4   a nd   v alid   D SCP   v alue   r anges   f rom   0   t o   6 3.     Ingress:  ...
  • Page 195: D Scp   C Lassification

      2-­‐19.9   D SCP   C lassification     This   s ection   d escribess   h ow   t o   c onfigure   a nd   m ap   a   D SCP   v alue   t o   a   Q oS   C lass   a nd   D PL   v alue.   Otherwise,  ...
  • Page 196 QoS   C lass:    Available   Q oS   C lass   v alues   r ange   f rom   0   t o   7 .   Q oS   C lass   ( 0-­‐7)   c an   b e   m apped   t o   f ollow   p arameters.     DPL:  ...
  • Page 197: Q Os   C Ontrol   L Ist   C Onfiguration

      2-­‐19.10   Q oS   C ontrol   L ist   C onfiguration   The   section   shows   how   to   use   the   QoS   Control   List   (QCL),   which   is   made   up   of   the   QCEs.   Each   row   describes  ...
  • Page 198 DMAC:    Indicates   t he   d estination   M AC   a ddress.   P ossible   v alues   a re:     Any:   M atch   a ny   D MAC.     Unicast:  ...
  • Page 199 :   I nserts   a   n ew   Q CE   b efore   t he   c urrent   r ow.     :   E dits   t he   Q CE.   :   M oves   t he   Q CE   u p   t he   l ist.     :  ...
  • Page 200 values   o r   “ Any.”   D SCP   v alues   a re   i n   t he   r ange   0 –63,   i ncluding   B E,   C S1–CS7,   EF   o r   A F11–AF43.     IP  ...
  • Page 201: S Torm   C Ontrol

    2-­‐19.11   S torm   C ontrol     The  section  explains  how  to  configure  the  Storm  control  for  the  switch.  There  is  a  unicast  storm  rate   control,   multicast   storm   rate   control,   and   a   broadcast   storm   rate   control.   These   only   affect   flooded   frames,  ...
  • Page 202: M Irror

      2-­‐20   M irror   You   c an   m irror   t raffic   f rom   a ny   s ource   p ort   t o   a   t arget   p ort   f or   r eal-­‐time   a nalysis.   Y ou   c an   t hen   a ttach   a  ...
  • Page 203 Parameter   d escription:   Port   t o   m irror   o n:    Port   to   mirror   also   known   as   the   mirror   port.   Frames   from   ports   that   have   either   source   (rx)   or   destination  ...
  • Page 204: U Pnp

    2-­‐21   U PnP             UPnP   is   an   acronym   for   Universal   Plug   and   Play.   The   goals   of   UPnP   are   to   allow   devices   to   connect   seamlessly  ...
  • Page 205: G Vrp

      2-­‐22.   G VRP         The   G eneric   A ttribute   R egistration   P rotocol   ( GARP)   p rovides   a   g eneric   f ramework   w hereby   d evices   i n   a  ...
  • Page 206     Enable   G VRP   g lobally     The   G VRP   f eature   i s   e nabled   b y   s etting   t he   c heck   m ark   i n   t he   c heckbox   n amed   E nable   G VRP.   GVRP  ...
  • Page 207: P Ort   C Onfig

      2-­‐22.2   P ort   C onfig   This   page   allows   you   to   configure   the   basic   GVRP   Configuration   settings   for   all   switch   ports.   The   settings  ...
  • Page 208: S Flow

    2-­‐23.   s Flow           The   s Flow   C ollector   c onfiguration   f or   t he   c an   b e   m onitored   a nd   m odified   h ere.   T he   s witch  ...
  • Page 209   Parameter   d escription:   Agent   C onfiguration   IP   A ddress    The   IP   address   used   as   Agent   IP   address   in   sFlow   datagrams.   It   serves   as   a   unique   key   that   will   identify  ...
  • Page 210 Max.   D atagram   S ize    The  maximum  number  of  data  bytes  that  can  be  sent  in  a  single  sample  datagram.  This  should  be   set  to  a  value  that  avoids  fragmentation  of  the  sFlow  datagrams.  Valid  range  is  200  to  1468  bytes   with  ...
  • Page 211: S Witch2Go

    2-­‐24   S witch2go     2-­‐24.1   S witch2go   s etting   Configure   S witch2go   m anagement   a nd   l ink   s etting.       Web   I nterface     To  ...
  • Page 212 Server   S tate:    Report   t he   n etwork   i nformation   b etween   a   S witch   a nd   S erver.     Link   O ption:    Indicates  ...
  • Page 213: U Ser   L Ink   M Anagement

      2-­‐24.2   U ser   L ink   M anagement   Configure   U ser   L ink   M anagement   o n   t his   p age.       Web   I nterface     To  ...
  • Page 214: P Ort   N Ame   S Ervice

      2-­‐24.3   P ort   N ame   S ervice   This   p age   d isplays   c urrent   p ort   n ame   a nd   r ole.       Web   I nterface     To  ...
  • Page 215 5.   T o   c ancel   t he   s etting,   c lick   t he   R eset   b utton.   I t   w ill   r evert   t o   p reviously   s aved   v alues.    ...
  • Page 216: Monitor   2

        Monitor   Chapter   3 .                           This   c hapter   d escribes   a ll   o f   t he   b asic   n etwork   s tatistics,   i ncluding   t he   P orts,   L ayer   2   n etwork   protocol  ...
  • Page 217       Parameter   d escription:   Model   N ame    Displays   t he   f actory   d efined   m odel   n ame   f or   i dentification   p urpose.   System  ...
  • Page 218 MAC   A ddress    The   M AC   A ddress   o f   t his   s witch.   Memory    Displays   t he   m emory   s ize   o f   t he   s ystem.   FLASH  ...
  • Page 219: I P   S Tatus

      3-­‐1.2   I P   S tatus   This   p age   d isplays   t he   s tatus   o f   t he   I P   p rotocol   l ayer.   T he   s tatus   i s   d efined   b y   t he   I P   i nterfaces,   t he   I P   routes,  ...
  • Page 220 Show   t he   c urrent   a ddress   o f   t he   i nterface   ( of   t he   g iven   t ype).     Status    Show   t he   s tatus   f lags   o f   t he   i nterface   ( and/or   a ddress).     IP  ...
  • Page 221: L Og

    3-­‐1.3   L og   This   s ection   d escribes   h ow   t o   d isplay   t he   s ystem   l og   i nformation   o f   t he   s witch.    ...
  • Page 222   Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every     seconds.   Refresh:   U pdates   t he   s ystem   l og   e ntries,   s tarting   f rom   t he   c urrent   e ntry   I D.   Clear:  ...
  • Page 223: D Etailed   L Og

    3-­‐1.4   D etailed   L og   This   s ection   d escribes   h ow   t o   d isplay   t he   d etailed   l og   i nformation   o f   t he   s witch.    ...
  • Page 224: G Reen   E Thernet

        3-­‐2   G reen   E thernet   3-­‐2.1   P ort   P ower   S avings   This   p age   p rovides   t he   c urrent   s tatus   f or   E EE.   Web  ...
  • Page 225: P Orts

    3-­‐3   P orts   The   s ection   d escribes   h ow   t o   c onfigure   t he   P ort   d etail   p arameters   o f   t he   s witch.   Y ou   c an   u se   t he   P ort   configure  ...
  • Page 226 The   n umber   o f   r eceived   f rames   f iltered   b y   f orwarding.     Buttons      Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.  ...
  • Page 227: Q Os   S Tatistics

    3-­‐3.2   Q os   S tatistics   The  section  describes  how  the  switch  displays  the  QoS  detailed  Queuing  counters  for  a  specific  switch   port   o r   f or   t he   d ifferent   q ueues   f or   a ll   s witch   p orts.      ...
  • Page 228: Q Cl   S Tatus

    3-­‐3.3   Q CL   S tatus     The   s ection   w ill   l et   y ou   k now   h ow   t o   c onfigure   a nd   s hows   t he   Q CL   s tatus   b y   d ifferent   Q CL   u sers.   E ach   row  ...
  • Page 229 DPL:  Drop  Precedence  Level;  if  a  frame  matches  the  QCE,  then  DP  level  will  set  to  value  displayed   under   D PL   c olumn.     DSCP:   I f   a   f rame   m atches   t he   Q CE,   t hen   D SCP   w ill   b e   c lassified   w ith   t he   v alue   d isplayed   u nder   D SCP   column.  ...
  • Page 230: D Etailed   S Tatistics

    3-­‐3.4   D etailed   S tatistics         The   section   describes   how   to   provide   detailed   traffic   statistics   for   a   specific   switch   port.   Use   the   port   select  ...
  • Page 231       Parameter   d escription:   Auto-­‐refresh:    Click   a uto-­‐refresh   t o   r efresh   t he   P ort   S tatistics   i nformation   a utomatically.   Upper   l eft   s croll   b ar:   ...
  • Page 232 indicating   a   P AUSE   o peration.     Receive   a nd   T ransmit   S ize   C ounters   The   number   of   received   and   transmitted   (good   and   bad)   packets   split   into   categories   based   on   their   respective  ...
  • Page 233: S Fp   I Nformation

      3-­‐3.5   S FP   I nformation           The   section   describes   the   SFP   module   detailed   information   when   you   connect   it   to   the   switch.   The   information  ...
  • Page 234 Vendor   P /N:    Display   t he   p roduct   n ame   o f   t he   n aming   b y   m odule   m anufacturer.   Vendor   R evision:   ...
  • Page 235: D Hcp

      3-­‐4   D HCP     3-­‐4.1   S erver   DHCP   Server   is   used   to   allocate   network   addresses   and   deliver   configuration   parameters   to   dynamically   c onfigured   h osts   c alled   D HCP   c lient.    ...
  • Page 236: B Inding

    Automatic   B inding:    Number   o f   b indings   w ith   n etwork-­‐type   p ools.       Manual   B inding:    Number  of  bindings  that  an  administrator  assigns  for  an  IP  address  to  a  client.  This  is  the  pool  of   host  ...
  • Page 237: D Eclined   I P

    Type:    Type   o f   b inding.   P ossible   t ypes   a re   A utomatic,   M anual,   E xpired.       State:    State   o f   b inding.   P ossible   s tates   a re   C ommitted,   A llocated,   E xpired.       Pool  ...
  • Page 238: S Nooping   T Able

      3-­‐4.2   S nooping   T able   This   page   displays   the   dynamic   IP   assigned   information   after   DHCP   Snooping   mode   is   disabled.   All   DHCP   clients   that   obtained   the   dynamic   IP   address   from   the   DHCP   server   will   be   listed   in   this   table   except  for  local  VLAN  interface  IP  addresses.  Entries  in  the  Dynamic  DHCP  snooping  Table  are  shown  ...
  • Page 239: R Elay   S Tatistics

      3-­‐4.3   R elay   S tatistics   This   p age   p rovides   s tatistics   f or   D HCP   r elay.         Web   I nterface     To  ...
  • Page 240 Transmit   t o   C lient:        The   n umber   o f   r elayed   p ackets   f rom   s erver   t o   c lient. Transmit   E rror:     ...
  • Page 241: D Etailed   S Tatistics

      3-­‐4.4   D etailed   S tatistics   This   p age   p rovides   s tatistics   f or   D HCP   s nooping.   N otice   t hat   t he   n ormal   f orward   p er-­‐port   T X   s tatistics   isn't  ...
  • Page 242   The   n umber   o f   A CK   ( option   5 3   w ith   v alue   5 )   p ackets   r eceived   a nd   t ransmitted. Rx   a nd   T x   N AK:     ...
  • Page 243: S Ecurity

    3-­‐5   S ecurity     3-­‐5.1   A ccess   M anagement   S tatistics   This   section   shows   you   detailed   statistics   of   the   Access   Management   including   HTTP,   HTTPS,   SSH.   TELNET,  ...
  • Page 244: N Etwork

    3-­‐5.2   N etwork   3-­‐5.2.1   P ort   S ecurity   3-­‐5.2.1.1   S witch     This   section   shows   the   Port   Security   status.   Port   Security   is   a   module   with   no   direct   configuration.   Configuration  ...
  • Page 245 User   M odule   N ame:    The   f ull   n ame   o f   a   m odule   t hat   m ay   r equest   P ort   S ecurity   s ervices.     Abbr:  ...
  • Page 246 3-­‐5.2.1.2   P ort     This   s ection   s hows   t he   M AC   a ddresses   s ecured   b y   t he   P ort   S ecurity   m odule.   P ort   S ecurity   i s   a   m odule   with  no  direct  configuration.  Configuration  comes  indirectly  from  other  modules—the  user  modules.  ...
  • Page 247   Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.     Publication date: Sept, 2015 Revision A1...
  • Page 248: N As

    3-­‐5.2.2   N AS   3-­‐5.2.2.1   S witch   The   s ection   d escribes   h ow   t o   s how   t he   N AS   s tatus   i nformation   o f   t he   s witch   f or   e ach   p ort.   T he   s tatus   includes  ...
  • Page 249 Port   V LAN   I D:    The  VLAN  ID  that  NAS  has  put  the  port  in.  The  field  is  blank,  if  the  Port  VLAN  ID  is  not  overridden   by   N AS.   If  the  VLAN  ID  is  assigned  by  the  RADIUS  server,  "(RADIUS-­‐assigned)"  is  appended  to  the  VLAN  ID.   Read  ...
  • Page 250 3-­‐5.2.2.2   P ort   The   section   describes   how   to   provide   detailed   NAS   statistics   for   a   specific   switch   port   running   EAPOL-­‐based   IEEE   802.1X   authentication.   For  MAC-­‐based  ports,  it  shows  selected  backend  server  (RADIUS  ...
  • Page 251       •   M ulti   8 02.1X   Backend   S erver   C ounters:    These   b ackend   ( RADIUS)   f rame   c ounters   a re   a vailable   f or   t he   f ollowing   a dministrative   s tates:    ...
  • Page 252 unsuccessful).     Buttons      Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.   Clear:  ...
  • Page 253 3-­‐5.2.3   A CL   S tatus   The   s ection   d escribes   h ow   t o   s hos   t he   A CL   s tatus   f or   d ifferent   A CL   u sers.   E ach   r ow   d escribes   t he   A CE   that  ...
  • Page 254 Permit:   F rames   m atching   t he   A CE   m ay   b e   f orwarded   a nd   l earned.     Deny:   F rames   m atching   t he   A CE   a re   d ropped.     Filter:  ...
  • Page 255: A Rp   I Nspection

      3-­‐5.2.3   A RP   I nspection     The  section  describes  how  to  configure  the  Dynamic  ARP  Inspection  Table  parameters  of  the  switch.   The   Dynamic   ARP   Inspection   Table   contains   up   to   1024   entries,   and   is   sorted   first   by   port,   then   by   VLAN  ...
  • Page 256: I P   S Ource   G Uard

    Buttons      Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.     |<<:  ...
  • Page 257 Refresh:   C lick   t o   r efresh   t he   p age.     |<<:   U pdates   t he   s ystem   l og   e ntries t o   t he   f irst   a vailable   e ntry   I D.   >>:  ...
  • Page 258: A Aa

    3-­‐5.3   A AA     3-­‐5.3.1   R ADIUS   O verview   This   s ection   s hows   y ou   a n   o verview   o f   t he   R ADIUS   A uthentication   a nd   A ccounting   s ervers   s tatus   t o   ensure  ...
  • Page 259 Not   R eady:   T he   s erver   i s   e nabled,   b ut   I P   c ommunication   i s   n ot   y et   u p   a nd   r unning.   Ready:  ...
  • Page 260: R Adius   D Etails

      3-­‐5.3.2   R ADIUS   D etails   This   s ection   s hows   y ou   d etailed   s tatistics   f or   a   p articular   R ADIUS   s erver.    ...
  • Page 261   Parameter   d escription:   RADIUS   A uthentication   S tatistics   The   s tatistics   m ap   c losely   t o   t hose   s pecified   i n   R FC4668   -­‐   R ADIUS   A uthentication   C lient   M IB.   Use  ...
  • Page 262 Retransmissio ransmissions   retransmitted   t o   t he   R ADIUS   a uthentication   ns   server.   The   n umber   o f   R ADIUS   A ccess-­‐Request   p ackets   destined   f or   t he   s erver   t hat   h ave   n ot   y et   t imed   out  ...
  • Page 263 Malformed   p ackets   i nclude   p ackets   w ith   an   i nvalid   l ength.   B ad   a uthenticators   o r   unknown   t ypes   a re   n ot   i ncluded   a s   malformed  ...
  • Page 264 from   t he   R ADIUS   a ccounting   s erver.   T he   g ranularity   o f   t his   measurement   i s   1 00   m s.   A   v alue   o f   0   m s   i ndicates   t hat   there  ...
  • Page 265: S Witch

        3-­‐5.4   S witch   3-­‐5.4.1   R MON   3-­‐5.4.1.1   S tatistics   This  section  provides  an  overview  of  RMON  Statistics  entries.  Each  page  shows  up  to  99  entries  from   the   Statistics   table,   default   is   20,   selected   through   the   "entries   per   page"   input   field.   When   first   visited,  ...
  • Page 266 Broadcast    he   t otal   n umber   o f   g ood   p ackets   r eceived   t hat   w ere   d irected   t o   t he   b roadcast   a ddress.  ...
  • Page 267 >>   :   U pdates   t he   t able,   s tarting   w ith   t he   e ntry   a fter   t he   l ast   e ntry   c urrently   d isplayed.   Publication date: Sept, 2015 Revision A1...
  • Page 268 3-­‐5.4.1.2   H istory   This   s ection   p rovides   a n   o verview   o f   R MON   H istory   e ntries.   E ach   p age   s hows   u p   t o   9 9   e ntries   f rom   the  ...
  • Page 269 received.   Broadcast    The   t otal   n umber   o f   g ood   p ackets   r eceived   t hat   w ere   d irected   t o   t he   b roadcast   a ddress.   Multicast  ...
  • Page 270   3-­‐5.4.1.3   A larm   This   p age   p rovides   a n   o verview   o f   R MON   A larm   e ntries.   E ach   p age   s hows   u p   t o   9 9   e ntries   f rom   t he   Alarm  ...
  • Page 271 Rising   T hreshold    Rising   t hreshold   v alue.   Rising   I ndex    Rising   e vent   i ndex.   Falling   T hreshold    Falling   t hreshold   v alue.  ...
  • Page 272 3-­‐5.4.1.4   E vent   This   p age   p rovides   a n   o verview   o f   R MON   E vent   t able   e ntries.   E ach   p age   s hows   u p   t o   9 9   e ntries   f rom   the  ...
  • Page 273 >>:   U pdates   t he   t able,   s tarting   w ith   t he   e ntry   a fter   t he   l ast   e ntry   c urrently   d isplayed.   Publication date: Sept, 2015 Revision A1...
  • Page 274: L Acp

    3-­‐6   L ACP   3-­‐6.1   S ystem   S tatus   This   s ection   p rovides   a   s tatus   o verview   f or   a ll   L ACP   i nstances.    ...
  • Page 275: P Ort   S Tatus

    3-­‐6.2   P ort   S tatus   This   s ection   p rovides   a   P ort   S tatus   o verview   f or   a ll   L ACP   i nstances.    ...
  • Page 276 Buttons      Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.   Publication date: Sept, 2015 Revision A1...
  • Page 277: P Ort   S Tatistics

      3-­‐6.3   P ort   S tatistics   This   s ection   p rovides   a   P ort   S tatistics   o verview   f or   a ll   L ACP   i nstances.    ...
  • Page 278 Refresh:   C lick   t o   r efresh   t he   p age.   Publication date: Sept, 2015 Revision A1...
  • Page 279: L Oop   P Rotection

    3-­‐7   L oop   P rotection     This   s ection   d isplays   t he   l oop   p rotection   p ort   s tatus   f or   t he   p orts   o f   t he   c urrently   s elected   s witch.    ...
  • Page 280: S Panning   T Ree

    3-­‐8   S panning   T ree   3-­‐8.1   B ridge   S tatus   After   y ou   c omplete   t he   M STI   P ort   c onfiguration,   t he   s witch   c an   d isplay   t he   B ridge   S tatus.   T he   S ection   provides  ...
  • Page 281: P Ort   S Tatus

      3-­‐8.2   P ort   S tatus   After  you  complete  the  STP  configuration,  you  can  ask  the  switch  to  display  the  STP  Port  Status.  This   section   explains   how   to   display   the   STP   CIST   port   status   for   physical   ports   of   the   currently   selected   switch.  ...
  • Page 282: P Ort   S Tatistics

    3-­‐8.3   P ort   S tatistics   After   y ou   c omplete   t he   S TP   c onfiguration,   t he   s witch   c an   d isplay   t he   S TP   S tatistics.   T he   s ection   s hows   how  ...
  • Page 283: M Vr

    3-­‐9   M VR   3-­‐9.1   S tatistics   The   s ection   d escribes   h ow   t he   s witch   c an   d isplay   t he   M VR   d etail   S tatistics   a fter   y ou   c onfigure   M VR   o n   the  ...
  • Page 284: M Vr   C Hannels   G Roups

    3-­‐9.2   M VR   C hannels   G roups       The  section  describes  how  to  display  MVR  Groups  detailed  information  on  the  switch.  Entries  in  the   MVR  Group  Table  are  shown  on  this  page.  The  MVR  Group  Table  is  sorted  first  by  VLAN  ID,  and  then   by  ...
  • Page 285   Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.     |<<:   U pdates   t he   s ystem   l og   e ntries t o  ...
  • Page 286: M Vr   S Fm   I Nformation

      3-­‐9.3   M VR   S FM   I nformation     The   MVR   SFM   (Source-­‐Filtered   Multicast)   Information   Table   also   contains   the   SSM   (Source-­‐Specific   Multicast)   i nformation.   T his   t able   i s   s orted   f irst   b y   V LAN   I D,   t hen   b y   g roup,   a nd   t hen   b y   P ort.   D ifferent   source  ...
  • Page 287 Mode    Indicates   t he   f iltering   m ode   m aintained   p er   ( VLAN   I D,   p ort   n umber,   G roup   A ddress)   b asis.   I t   c an   b e   either  ...
  • Page 288: I Pmc

    3-­‐10   I PMC   3-­‐10.1   I GMP   S nooping     3-­‐10.1.1   S tatus   After   you   complete   the   IGMP   Snooping   configuration,   the   switch   can   display   the   IGMP   Snooping   Status.  ...
  • Page 289 "DISABLE"   d enotes   t he   s pecific   i nterface   i s   a dministratively   d isabled.   Queries   T ransmitted:    The   n umber   o f   T ransmitted   Q ueries.     Queries  ...
  • Page 290: G Roup   I Nformation

    3-­‐10.1.2   G roup   I nformation   After   you   set   the   IGMP   Snooping   function,   the   switch   can   display   the   IGMP   Snooping   Group   Information.   E ntries   i n   t he   I GMP   G roup   T able   a re   s hown   o n   t his   p age.   T he   I GMP   G roup   T able   i s   s orted   first  ...
  • Page 291   Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.     |<<:   U pdates   t he   s ystem   l og   e ntries t o  ...
  • Page 292: I Pv4   S Fm   I Nformation

      3-­‐10.1.3   I Pv4   S FM   I nformation   Entries  in  the  IGMP  SFM  Information  Table  are  shown  on  this  page.  The  IGMP  SFM  (Source-­‐Filtered   Multicast)   I nformation   T able   a lso   c ontains   t he   S SM   ( Source-­‐Specific   M ulticast)   i nformation.   T his   t able   is  sorted  first  by  VLAN  ID,  then  by  group,  and  then  by  Port.  Different  source  addresses  belong  to  the  ...
  • Page 293 Mode:    Indicates   t he   f iltering   m ode   m aintained   p er   ( VLAN   I D,   p ort   n umber,   G roup   A ddress)   b asis.   I t   c an   b e   either  ...
  • Page 294: M Ld   S Nooping

    3-­‐10.2   M LD   S nooping     3-­‐10.2.1   S tatus   The   section   describes   how   to   display   the   MLD   Snooping   Status   and   detailed   information   after   you   configure  ...
  • Page 295 Queries   T ransmitted:    The   n umber   o f   T ransmitted   Q ueries.     Queries   R eceived:    The   n umber   o f   R eceived   Q ueries.     V1  ...
  • Page 296: G Roup   I Nformation

    3-­‐10.2.2   G roup   I nformation   The  section  describes  how  to  set  the  MLD  Snooping  Groups  Information.  The  "Start  from  VLAN",  and   "group"   i nput   f ields   a llow   t he   u ser   t o   s elect   t he   s tarting   p oint   i n   t he   M LD   G roup   T able.    ...
  • Page 297 Buttons      Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.     |<<:  ...
  • Page 298: I Pv6   S Fm   I Nformation

      3-­‐10.2.3   I Pv6   S FM   I nformation   Entries   in   the   MLD   SFM   Information   Table   are   shown   on   this   page.   The   MLD   SFM   (Source-­‐Filtered   Multicast)  ...
  • Page 299 Indicates   t he   f iltering   m ode   m aintained   p er   ( VLAN   I D,   p ort   n umber,   G roup   A ddress)   b asis.   I t   c an   b e   either  ...
  • Page 300: L Ldp

    3-­‐11   L LDP   3-­‐11.1   N eighbor   This   page   provides   a   status   overview   for   all   LLDP   neighbors.   The   displayed   table   contains   a   row   for   each  ...
  • Page 301 6.   T elephone   7.   D OCSIS   c able   d evice   8.   S tation   o nly   9.   R eserved   When   a   capability   is   enabled,   the   capability   is   followed   by   (+).   If   the   capability   is   disabled,   the   capability  ...
  • Page 302: L Ldp-­‐Med   N Eighbor

    3-­‐11.2   L LDP-­‐MED   N eighbor   This  page  provides  a  status  overview  of  all  LLDP-­‐MED  neighbors.  The  displayed  table  contains  a  row   for   each   port   on   which   an   LLDP   neighbor   is   detected.   This   function   applies   to   VoIP   devices   that   support  ...
  • Page 303 Endpoints  (Class  I),  and  any  LLDP-­‐MED  Endpoint  Device  claiming  compliance  as  a  Communication   Device   ( Class   I II)   w ill   a lso   s upport   a ll   a spects   o f   T IA-­‐1057   a pplicable   t o   b oth   M edia   E ndpoints   ( Class   II)  ...
  • Page 304 with   their   own   IP   Telephony   handsets   and   other   similar   appliances   supporting   interactive   voice   services.   4.   G uest   V oice   S ignaling   -­‐   f or   u se   i n   n etwork   t opologies   t hat   r equire   a   d ifferent   p olicy   f or   t he   g uest   voice  ...
  • Page 305: P Oe

    Auto-­‐refresh:   Check  this  box  to  refresh  the  page  automatically.  Automatic  refresh  occurs  every  3   seconds.   Refresh:   C lick   t o   r efresh   t he   p age.   3-­‐11.3   P oE   This  page  allows  the  user  to  inspect  the  current  status  for  all  PoE  ports.  This  section  shows  all  port’s  ...
  • Page 306 sourcing   o ver   a   m aximum   l ength   c able   b ased   o n   i ts   c urrent   c onfiguration.   The  maximum  allowed  value  is  102.3  W.  If  the  device  indicates  a  value  higher  than  102.3  W,  it  is   represented  ...
  • Page 307 3-­‐11.4EEE   By  using  EEE  power  savings  can  be  achieved  at  the  expense  of  traffic  latency.  This  latency  occurs  due   to  that  the  circuits  EEE  turn  off  to  save  power,  need  time  to  boot  up  before  sending  traffic  over  the   link.  ...
  • Page 308 that   t he   r emote   l ink   p artner’s   r equest   w as   b ased   o n   s tale   i nformation.   Echo   R x   T w:   ...
  • Page 309: P Ort   S Tatistics

    3-­‐11.5   P ort   S tatistics   Two  types  of  counters  are  shown.  Global  counters  are  counters  that  refer  to  the  whole  switch,  while   local   c ounters   r efer   t o   p er   p ort   c ounters   f or   t he   c urrently   s elected   s witch.    ...
  • Page 310 Shows   t he   n umber   o f   L LDP   f rames   d ropped   d ue   t o   t he   e ntry   t able   b eing   f ull.     Total  ...
  • Page 311: P Oe   S Tatistics

      3-12 PoE Statistics   This   p age   a llows   t he   u ser   t o   i nspect   t he   c urrent   s tatus   f or   a ll   P oE   p orts.    ...
  • Page 312 Current   U sed    The   P ower   U sed   s hows   h ow   m uch   c urrent   t he   P D   c urrently   i s   u sing.     Priority  ...
  • Page 313: M Ac   T Able

      3-­‐13   M AC   T able     Entries  in  the  MAC  Table  are  shown  on  this  page.  The  MAC  Table  contains  up  to  8192  entries,  and  is   sorted   f irst   b y   V LAN   I D,   t hen   b y   M AC   a ddress.    ...
  • Page 314 VLAN:    The   V LAN   I D   o f   t he   e ntry.     MAC   a ddress:    The   M AC   a ddress   o f   t he   e ntry.     Port  ...
  • Page 315: V Lans

    3-­‐14   V LANs   3-­‐14.1   V LAN   M embership   This   p age   p rovides   a n   o verview   o f   m embership   s tatus   o f   V LAN   u sers.     The  ...
  • Page 316 VLAN   M embership    The   VLAN   Membership   Status   Page   will   show   the   current   VLAN   port   members   for   all   VLANs   configured  by  a  selected  VLAN  User  (selection  shall  be  allowed  by  a  Combo  Box).  When  ALL  VLAN   Users  ...
  • Page 317: V Lan   P Ort

    3-­‐14.2   V LAN   P ort   The   f unction   P ort   S tatus   g athers   t he   i nformation   f or   a ll   V LAN   s tatus   a nd   r eports   i t   b y   t he   o rder   o f   Static,  ...
  • Page 318 Port   T ype:    Shows   t he   P ort   T ype.   P ort   t ype   c an   b e   a ny   o f   U naware,   C -­‐port,   S -­‐port,   C ustom   S -­‐port.     If  ...
  • Page 319: V Cl

    3-­‐15   V CL     3-­‐15.1   M AC-­‐based   V LAN   This   s ection   s hows   M AC-­‐based   V LAN   e ntries   c onfigured   b y   v arious   M AC-­‐based   V LAN   u sers.   C urrently   we  ...
  • Page 320: P Rotocol-­‐Based   V Lan

      3-­‐15.2   P rotocol-­‐based   V LAN     3-­‐15.2.1   P rotocol   t o   G roup   This  page  shows  you  the  protocols  to  Group  Name  (unique  for  each  Group)  mapping  entries  for  the   switch.      ...
  • Page 321 value   f or   t he   p rotocol   r unning   o n   t op   o f   S NAP;   i f   t he   O UI   i s   a n   O UI   f or   a   p articular   o rganization,   t he   protocol  ...
  • Page 322: G Roup   T O   V Lan

      3-­‐15.2.2   G roup   t o   V LAN   This   p age   s hows   y ou   t he   c onfigured   G roup   N ame   t o   a   V LAN   f or   t he   s witch.      ...
  • Page 323: I P   S Ubnet-­‐Based   V Lan

      3-­‐15.3   I P   S ubnet-­‐based   V LAN   The   p age   s hows   I P   s ubnet-­‐based   V LAN   e ntries.   T his   p age   s hows   o nly   s tatic   e ntries.        ...
  • Page 324: S Flow

    3-­‐16   s Flow   This   s ession   s hows   r eceiver   a nd   p er-­‐port   s Flow   s tatistics.     Web   I nterface     To   D isplay   M AC-­‐based   V LAN   c onfiguration   i n   t he   w eb   i nterface:   Click  ...
  • Page 325: Diagnostics   3

    IP   A ddress/Hostname    The   I P   a ddress   o r   h ostname   o f   t he   s Flow   r eceiver.   Timeout    The   n umber   o f   s econds   r emaining   b efore   s ampling   s tops   a nd   t he   c urrent   s Flow   o wner   i s   r eleased.   Tx  ...
  • Page 326: P Ing

        Diagnostics Chapter   4 .                               This   c hapter   p rovides   a   s et   o f   b asic   s ystem   d iagnostics.   I t   l et   u sers   k now   w hether   t he   s ystem   needs  ...
  • Page 327 Egress   I nterface   ( Only   f or   I Pv6):    The   V LAN   I D   ( VID)   o f   t he   s pecific   e gress   I Pv6   i nterface   w here   t he   I CMP   p acket   g oes.   The  ...
  • Page 328: P Ing6

      4-­‐2   P ing6   This   s ection   a llows   y ou   t o   i ssue   I CMPv6   P ING   p ackets   t o   t roubleshoot   I Pv6   c onnectivity   i ssues.    ...
  • Page 329 64   b ytes   f rom   1 0.10.132.20:   i cmp_seq=0,   t ime=0ms   64   b ytes   f rom   1 0.10.132.20:   i cmp_seq=1,   t ime=0ms   64   b ytes   f rom   1 0.10.132.20:   i cmp_seq=2,   t ime=0ms   64  ...
  • Page 330: V Eriphy

    4-­‐3   V eriPHY   This  section  is  used  for  running  the  VeriPHY  Cable  Diagnostics.  Press  to  run  the  diagnostics.  This  will   take   a pproximately   5   s econds.   I f   a ll   p orts   a re   s elected,   t his   c an   t ake   a pproximately   1 5   s econds.   W hen   completed,  ...
  • Page 331: T Raceroute

    4-­‐4   T raceroute   This   p age   a llows   y ou   t o   i ssue   I CMP,   T CP,   o r   U DP   p ackets   t o   d iagnose   n etwork   c onnectivity   i ssues.    ...
  • Page 332: Maintenance

        Maintenance   Chapter   5 .                                          ...
  • Page 333: Factory Defaults

      5-­‐2   F actory   D efaults     This  section  describes  how  to  reset  the  Switch  configuration  to  Factory  Defaults.  Any  configuration   files   o r   s cripts   w ill   r ecover   t o   f actory   d efault   v alues.      ...
  • Page 334: Firmware

    5-­‐3   F irmware     Brows e... This   s ection   d escribes   h ow   t o   u pgrade   F irmware.   T he   S witch   c an   b e   e nhanced   w ith   m ore   v alue-­‐added   functions  ...
  • Page 335: Firmware Selection

    5-­‐3.2   F irmware   S election   This   p age   p rovides   i nformation   a bout   t he   a ctive   a nd   a lternate   ( backup)   f irmware   i mages   i n   t he   d evice,   and  ...
  • Page 336 The   f lash   i ndex   n ame   o f   t he   f irmware   i mage.   T he   n ame   o f   p rimary   ( preferred)   i mage   i s   i mage,   t he   alternate  ...
  • Page 337: Configuration

    5-­‐4   C onfiguration   The  switch  stores  its  configuration  in  a  number  of  text  files  in  CLI  format.  The  files  are  either  virtual   (RAM-­‐based)   o r   s tored   i n   f lash   o n   t he   s witch.     There  ...
  • Page 338: Upload

    Browse... 5-­‐4.2   U pload     The   c onfiguration   u pload   f unction   w ill   b e   b acked   u p   a nd   s ave   t he   s witch’s   c onfiguration   i nto   t he   running  ...
  • Page 339: Download

    5-­‐4.3   D ownload   This  section  describes  how  to  export  the  Switch  Configuration  for  maintenance  needs.  Any  current   configuration   f iles   w ill   b e   e xported   a s   t ext   f ormat.     You  ...
  • Page 340: Activate

      5-­‐4.4   A ctivate     You   c an   a ctivate   a ny   o f   t he   c onfiguration   f iles   p resent   o n   t he   s witch,   e xcept   f or   r unning-­‐config   w hich   represents  ...
  • Page 341: Delete

    5-­‐4.5   D elete   You   c an   d elete   a ny   o f   t he   w ritable   f iles   s tored   i n   f lash,   i ncluding   s tartup-­‐config.   I f   t his   i s   d one   a nd   the  ...
  • Page 342: Dms- Management

          DMS-­‐Management   Chapter   6           Introduction   The   L PB2900   S eries   s witches   f eature   a   D evice   M anagement   S ystem   ( DMS).   C apabilities   i nclude:   i nventory   l ist,   topology  ...
  • Page 343     Parameter   d escription:   DMS   S oftware   V ersion:      Displays   t he   c urrent   D MS   f irmware   v ersion   n umber.   Total   D evice:     ...
  • Page 344: Device List

        6-­‐2   D evice   L ist You   c an   i dentify   t he   s ystem   b y   c onfiguring   t he   s witch   c ontact   i nformation,   n ame,   a nd   l ocation.   Web  ...
  • Page 345 IP   A ddress:      Device   I P   a ddress,   h yperlink   r e-­‐direct   t o   d evice   w ebsite.   Version:      Device   f irmware   v ersion.   Publication date: Sept, 2015 Revision A1...
  • Page 346: Dms- Graphic Monitoring

      DMS-­‐Graphic   M onitoring   Chapter   7             7-­‐1   T opology   V iew In   t his   p age,   y ou   c an   s ee   a   v isual   v iew   o f   t he   t opology   i n   a   c luster   o f   n etworks.    ...
  • Page 347     Parameter   d escription:   Login:    Login   t o   t his   d evice.     Troubleshooting:      Move   t o   t rouble   s hooting   p age.   ( See   c hapter   4 -­‐2).   Find  ...
  • Page 348   :   S elect   t he   d evice   c ategory.     :   S earch   f or   d evice   b y   t yping   I P/MAC   a ddress   o r   M odel/Device   n ame.   Publication date: Sept, 2015 Revision A1...
  • Page 349     7-­‐2   F loor   V iew In  this  page,  the  administrator  can  place  a  device  per  time  onto  the  custom  image,  which  you  have   already   u ploaded,   b y   d ragging-­‐and-­‐dropping   m arkers   i n   t he   d evice   l ist.   Web  ...
  • Page 350     7-­‐3   M ap   V iew In  this  page,  you  can  view  a  realistic  representation  of  device  in  the  network.  To  find  one  of  devices   within  the  network,  enter  the  device  name  in  the  search  bar.  Click  “Device  List”  to  hide  the  “Device   List”  ...
  • Page 351: Dms- Maintenance

      DMS-­‐Maintenance   Chapter   8             8-­‐1   F loor   I mage   In   t his   p age,   a n   a dministrator   c an   a dd   o r   d elete   a   c ustom   m ap   o r   f loor   i mage.    ...
  • Page 352: Troubleshooting

        8-­‐2   T rouble   s hooting In   t his   p age,   y ou   c an   t roubleshoot   a ny   i ssues   y ou   h ave   w ith   t he   d evice   c onnected   t o   t he   n etwork.   T his   feature  is  designed  primarily  for  administrators  to  verify  and  test  the  link  route  between  the  switch  ...
  • Page 353: Traffic Chart

      8-­‐3   T raffic   C hart   This   p age   d isplays   a   v isual   c hart   o f   n etwork   t raffic   o f   a ll   t he   d evices   m anaged   b y   t he   P oE   D MS   s witch.    ...
  • Page 354: Dms- Media Controller Option

    Black Box installs the key on the switch and sends you an email with the license key for your receiving records. Case 2: You order a MediaCento controller license for a fielded switch. 1. Contact Black Box to order the license. Tell the customer service representative the serial number of the switch that the key will be installed on.
  • Page 355 Figure 9-2. Switch’s serial number in the CLI. 3. E-mail the security code (serial number) to your Black Box contact so an authentication code can be created. 4. Black Box will send you an email certificate with the Authentication Code.
  • Page 356 Figure 9-3. Enable the Media Controller Function. 6. Exit out of the CLI. Figure 9-4. Log out of the CLI. 7. Log into the GUI and go to DMS to check if the Media Controller function is present. Page 344...
  • Page 357: Media Controller Options

    Figure 9-5. Media Controller function present on the GUI. 9-3 Media Controller Options The 4th option under the DMS tab on the System Information screen is the Media Controller menu, as shown below. Figure 9-6. Media Controller Menu option on the DMS menu. Page 345...
  • Page 358 When you click on the Media Controller option, the expanded Media Controller Menu pops up. Figure 9-7. Media Controller Menu Expanded. Click on the Hardware tab. Figure 9-8. Blank Hardware screen. Page 346...
  • Page 359 Once you open the Hardware tab, click on the Detect button and the switch will detect all Media Cento units on the Network. They will be grouped as Transmitters and Receivers. Figure 9-9. Populated hardware screen. You can highlight the different units and name them to make them easier to identify. Figure 9-10.
  • Page 360 The OSD display will show the IP address of the Media Cento on the attached screen for the Receivers to easily identify which screen is attached to which receiver. You can set the time that the IP will be displayed. Figure 9-11.
  • Page 361 Figure 9-13. Enter name for preset. Click on the Dashboard option in the Media Controller menu. Figure 9-14. Dashboard screen. Use the dropdown Preset box to choose presets to switch to. Once you choose a Preset, click the Publish button for it to take effect. Page 349...
  • Page 362 Figure 9-15. Drop-down Preset menu. Select Groups from the Media Controller menu to set up Groups for quicker switching. Groups will give you a list of Receivers that you will set up to be switched as a group between Transmitters. Once you have moved the Receivers you wanted from the left box to the Right box, fill in the Title to give the group a name, then press the save Group button.
  • Page 363 Figure 9-17. Custom Display menu. The Dashboard option will give you a representation of the current configuration, including which transmitters each receiver is connected to. Figure 9-18. Dashboard option. The Preset drop-down box on the Dashboard can be used to do switching. Select the preset and click on the Publish button. The Dashboard will show the changed configuration.
  • Page 364 Figure 9-19. Preset drop-down box. Save Configuration will create a config file from the current configuration of the Media Controller info. These files can be used to quickly configure another switch or recover a switch that has issues. Figure 9-20. Save Configuration option. Use the Restore Configuration option on the Media Controller menu to upload config files to switches.
  • Page 365 Figure 9-21. Restore Configuration option. Page 353...
  • Page 366: Introduction

      Application Programming Interface (API) Chapter 10 Command Syntax 10-1 Introduction There are three API commands for the LPB2900 series switches with LPB2900A-CTRL SW: Switch Receiver, Switch Group, and Switch Preset. Before using the API commands, users must configure receiver names, groups, and presets using the web interface.
  • Page 367 About Black Box Black Box provides an extensive range of networking and infrastructure products. You’ll find everything from cabinets and racks and power and surge protection products to media converters and Ethernet switches all supported by free, live 24/7 Tech support available in 60 seconds or less.

This manual is also suitable for:

Lpb2926aLpb2952a

Table of Contents