SMC Networks SMC8024L2 Management Manual

SMC Networks SMC8024L2 Management Manual

Tigerswitch 10/100/1000 managed ethernet switch
Hide thumbs Also See for SMC8024L2:

Advertisement

TigerSwitch 10/100/1000
Managed Ethernet Switch
◆ 24 auto-MDI/MDI-X 10/100/1000BASE-T ports
◆ 4 ports shared with 4 SFP transceiver slots
◆ Non-blocking switching architecture
◆ Spanning Tree Protocol
◆ Up to eight LACP or static 8-port trunks
◆ Layer 2/3/4 CoS support through four priority queues
◆ Full support for VLANs
◆ IGMP multicast filtering and snooping
◆ Support for jumbo frames up to 9 KB
◆ Manageable via console, Web, SNMP/RMON

Management Guide

SMC8024L2

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks SMC8024L2

  • Page 1: Management Guide

    ◆ Up to eight LACP or static 8-port trunks ◆ Layer 2/3/4 CoS support through four priority queues ◆ Full support for VLANs ◆ IGMP multicast filtering and snooping ◆ Support for jumbo frames up to 9 KB ◆ Manageable via console, Web, SNMP/RMON Management Guide SMC8024L2...
  • Page 3 TigerSwitch 10/100/1000 Installation Guide From SMC’s Tiger line of feature-rich workgroup LAN solutions 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 April 2006 Pub. # 150000022900H...
  • Page 4 Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC.
  • Page 5 All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term.
  • Page 6 RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS. * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase.
  • Page 7: Table Of Contents

    Displaying System Name ....... . 16 Setting the Switch’s IP Address ......17 Configuring the Logon Password .
  • Page 8 Troubleshooting .......57 Diagnosing Switch Indicators ........57 Changing a PC’s IP Address .
  • Page 9: Introduction

    EATURES AND ENEFITS NTRODUCTION The Tiger Switch SMC8024L2 is a high performance managed switch that delivers performance and control to your network. It provides 24 full-duplex 1000BASE-T ports that significantly improve network performance and boost throughput using features configured through the web interface.
  • Page 10: Initial Configuration

    The following procedure is recommended: 1. Place your Tiger Switch close to the PC that you will use to configure it. It will help if you can see the front panel of the switch while working on your PC.
  • Page 11 6. From the menu, click on SYSTEM, then click on LAN Settings. On the LAN Settings page, enter the new IP address, Subnet Mask and Gateway IP Address for the switch, then click on the APPLY button. No other configuration changes are required at this stage, but it is recommended that you change the administrator’s password before...
  • Page 12: Configuring The Switch

    (Internet Explorer 5.5 or above, or Mozilla Firefox 1.0 or above). Prior to accessing the switch from a web browser, be sure you have first performed the following tasks: 1. Configure the switch with a valid IP address, subnet mask, and default gateway.
  • Page 13: Navigating The Web Browser Interface

    To access the web-browser interface you must first enter a password. The user has Read/Write access to all configuration parameters and statistics. The default password for the switch is “smcadmin.” If user input is not detected within five minutes, the current session will be terminated.
  • Page 14: Configuration Options

    “Every visit to the page.” Panel Display The web agent displays an image of the switch’s ports. The port will turn green when the corresponding front-panel port is in connection with another device. To show the port number, place mouse pointer onto the intended port.
  • Page 15: Main Menu

    Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program. Menu STATUS Overview Statistics...
  • Page 16 Trunk configured on the Switch. Sets link aggregation. Shows the LACP groups status. Sets VLAN group. Configures the VLANs on the switch for both Ports and Trunks. Sets the priority of packets within the switch. Sets up RSTP configuration. Shows RSTP bridge and port status.
  • Page 17: Web Configuration

    Field Attributes System Information • System Name – Name assigned to the switch system. • Number of Ports – Number of built-in ports. • Hardware Version – Hardware version of the main board. • Code Version – Version number of the code.
  • Page 18 • Trunk – The trunk label. "T1" through "T8" are used as trunk labels. • Type – All trunks and ports on this switch are 10/100/1000M • Trunk Status – An indication of the speed and duplex setting of the trunk.
  • Page 19 ONFIGURATION VLAN Inoformation • VLAN ID – A number in the range 1 - 4094 which identifies the VLAN. • VLAN Member – A list of the ports that are members of the VLAN. By default, all ports are members of VLAN 1.
  • Page 20 ONFIGURING THE WITCH Web – Click STATUS, Overview. Figure 3 Switch Information...
  • Page 21: Showing Port Statistics

    Showing Port Statistics You can display statistics on network traffic from the ports. These statistics can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed have been accumulated since the last system reboot, but can be reset to zero by clicking the CLEAR button.
  • Page 22 ONFIGURING THE WITCH Parameter Received Broadcast Packets Transmitted Octets Transmitted Unicast Packets Transmitted Errors Received Normal Priority Packets Transmitted Normal Priority Packets RMON Statistics Drop Events Received Frames Multicast Frames Undersize Frames Fragments Collisions Table 3 Port Statistics (Continued) Description The number of packets, delivered by this sub-layer to a higher (sub-)layer, which were addressed to a broadcast address at this sub-layer.
  • Page 23 Table 3 Port Statistics (Continued) Parameter Received Bytes Broadcast Frames CRC/Alignment Errors Oversize Frames Jabbers 64 Bytes Frames 65-127 Byte Frames 128-255 Byte Frames 256-511 Byte Frames 512-1023 Byte Frames 1024-1518 Byte Frames Description Total number of bytes of data received on the network.
  • Page 24: Displaying System Name

    ONFIGURING THE WITCH Web – Click STATUS, Statistics. Displaying System Name You can easily identify the system by displaying the device name. Field Attributes • Switch Name – Name assigned to the switch system. Figure 4 Port Statistics...
  • Page 25: Setting The Switch's Ip Address

    Setting the Switch’s IP Address This section describes how to configure an IP interface for management access over the network. The IP address for this switch is 192.168.2.10 by default. To manually configure an address, you need to change the switch’s default settings (IP address 192.168.2.10 and netmask 255.255.255.0) to...
  • Page 26: Configuring The Logon Password

    ONFIGURING THE WITCH Manual Configuration Web – Click System, LAN Settings. Enter the IP address, subnet mask and gateway, then click APPLY. Configuring the Logon Password The administrator has write access for all parameters governing the onboard agent. You should therefore assign a new administrator password as soon as possible, and store it in a safe place.
  • Page 27: Tools

    APPLY. Figure 7 Password Settings Tools On Tools page, you can restore the switch to default settings, upgrade the firmware of the switch, or restart the switch. Restore to Factory Defaults Force the Switch to restore the original factory settings. To reset the switch, select "Reset to Factory Defaults"...
  • Page 28 Web – Click System, Tools, Reset to Factory Defaults. Upgrade Firmware Upgrades the Switch system firmware using a file provided by SMC. Select "Upgrade Firmware" from the Tools drop-down list then click on the "Browse" button to select the firmware file. Finally, press the APPLY button to upgrade the selected Switch firmware file.
  • Page 29 Figure 10 Upload/Download Configuration Restart Switch Web – Click SYSTEM, Tools, Restart Switch. To restart the switch, select from the Tools drop-down list, and then click APPLY. The reset will be complete when the user interface displays the login page.
  • Page 30: Register Product

    Register Product Register your product if you have not already done so. Web – Click System, Register Product. By clicking the Register Now button you will be taken to the SMC website, where you can enter the products details. Static MAC A static MAC address is an entry in MAC table which can not be aged out.
  • Page 31: Counter Config

    ONFIGURATION Web – Click System, Static MAC. Figure 13 Static MAC Address Configuration Counter Config This page allows the customer to select the statistics to count and display. It is possible to monitor 5 Transmit counters,5 receive counters as well as 1 transmit byte counter and receive byte counter at the same time.
  • Page 32: Port Configuration

    ONFIGURING THE WITCH Web – Click PORTS, Settings. Port Configuration You can use the Port Configuration page to manually fix the speed, duplex mode, and flow control. Field Attributes • Speed/Duplex – Allows you to manually set the port speed and duplex mode.
  • Page 33: Configuring Rate Limits

    Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the switch. Traffic that falls within the rate limit is transmitted, while packets that exceed the acceptable amount of traffic are dropped.
  • Page 34 Web – Click PORTS, Rate Limiting. This page enables you to set the rate limiting parameters for each port on the Switch. Figure 16 Rate Limiting...
  • Page 35: Storm Control

    • Rate(number of frame per second) – The Rate field is set by a single drop-down list. The same threshold is applied to every port on the switch. When the threshold is exceeded, packets are dropped, irrespective of the flow-control settings.
  • Page 36: Port Mirroring

    WITCH Web – Click PORTS, Storm Control. This page enables you to set the broadcast storm control parameters for every port on the Switch. Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis.
  • Page 37: Cable Diagnostic

    Input rate-limiting in conjunction with port flow-control could be used to ensure that the total ingress bandwidth never exceeds the egress bandwidth. Web – Click PORTS, Port Mirroring.
  • Page 38: Trunks Membership

    This is the default state. • Trunk T1-T8 – These columns correspond to the eight trunks that are supported by the Switch. Clicking on the radio button in any one of these columns causes the port to become a member of the corresponding trunk.
  • Page 39: Trunk Configuration

    Web – Click TRUNKS, Membership. Click to select which Trunk member to which each port belongs. Trunk Configuration Field Attributes • Trunk – Indicates trunk identification. • Speed/Duplex – Allows you to manually set the port speed and duplex mode for all ports in the trunk. •...
  • Page 40: Trunk Rate Limit

    Web – Click TRUNKS, Settings. Trunk Rate Limit This page allows you to change the maximum data-rate into and out of each trunk on the switch. Field Attributes • Trunk – Indicates trunk identification. • Trunk Speed – Indicates the trunk speed.
  • Page 41: Lacp Setup

    ONFIGURATION Web – Click TRUNKS, Settings. Figure 22 Trunk Rate Limiting LACP Setup This page enables you to setup the configuration of LACP on all or some ports. LACP (IEEE 802.3ad Link Aggregation Protocol) provides a way to set up aggregation automatically between switc Field Attributes •...
  • Page 42: Lacp Status

    ONFIGURING THE WITCH LACP Status This page displays the LACP status of the switch. LACP Aggregation Shows the status of each port. The LACP Aggregation table has one row for each LACP group. Normal means no LACP group is active. For active LACP groups, a new row is created from which the status of its port members are displayed.
  • Page 43: Vlan Settings

    ONFIGURATION Web – Click TRUNKS, LACP Status. Figure 24 LACP Status Overview VLAN Settings You can configure VLAN behavior for specific interfaces, including the default VLAN identifier (PVID) and accepted frame types. This page allows you to create and delete VLANs (Virtual LANs) and to change the VLAN membership and behaviour of individual ports.
  • Page 44 VLAN settings in the default configuration. The default configuration is as follows: • All ports are members of VLAN 1 • The switch management interface is on VLAN 1 (this cannot be changed) • All ports have a Port VLAN ID (PVID) of 1 •...
  • Page 45 are connected to normal VLAN aware switches at the customer network and the network ports are those which are connected to the service provider network. To tunnel the packets through MAN, QinQ needs to be enabled on network ports • Packet Type – Sets the interface to accept all frame types, including tagged or untagged frames, or only tagged frames.
  • Page 46: Qos Settings

    QoS (Quality of Service) is a mechanism which is used to prioritize certain traffic as it is moves through the switch. Traffic can be classified as High or Normal priority and, when the switch is heavily loaded, it is the Normal priority packets that are dropped first.
  • Page 47 Note: Because end-stations, like PCs, are not usually VLAN aware, they do not create VLAN-tagged frames. As a result, this method of prioritization is not ideal when there are a lot of PCs connected to the Switch. DSCP Packets are prioritized using the DSCP (Differentiated Services Code Point) value.
  • Page 48: Rstp

    The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STA-compliant switch, bridge or router) in your network to ensure...
  • Page 49 Field Attributes • System Priority – This parameter configures the spanning tree priority globally for this switch. The device with the highest priority becomes the STA root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device.
  • Page 50 The RSTP Bridge Overview table has one row to display settings for the whole switch. Hello Time, Maximum Age and Forward Delay are displayed. Topology shows the switch current state. Root ID indicates the root port ID for the switch.
  • Page 51: 802.1X

    Field Attributes • Port/Trunk - Port/Trunk ID number. • VLAN ID - VLAN IDs of the port. • Path Cost - Show the path cost on this port. • Edge Port - Yes if the port is an edge port which connects to an end station.
  • Page 52 • Reauthentication Enabled - Sets the client to be re-authenticated after the interval specified by the Re-authentication Period. Re-authentication can be used to detect if a new device is plugged into a switch port. • Reauthentication Period - Sets the time period after which a connected client must be re-authenticated.
  • Page 53 The reason for a "quiet-period" follows: If a re-authentication fails, the IEEE802.1X standard enforces a so-called "quiet-period" in which the authenticator (switch) shall be quiet and not re-try another authentication - also packets from supplicant are discarded in this quiet period - this way 'brute-force' attacks are prevented.
  • Page 54 ONFIGURING THE WITCH Web – Click 802.1X, Settings. 802.1X Field Attributes • Port Statistics - Statistics can be viewed on a per-port basis. Select the port that you want to view here. • Authenticator counters - General statistics for authenticator. •...
  • Page 55: Security

    ONFIGURATION Web – Click 802.1X, Statistics. Figure 30 802.1X Statistics Security IP Filter On this page, you can setup the source IP Filter on all or some ports. It is used to block unwanted access and provide access to the network for either a specific source IP address or a specific subnet.
  • Page 56 ONFIGURING THE WITCH • Static - Enable source IP filter with configured values in IP Address and IP Mask fields. • DHCP - The IP address for the device connected to this port will be automatically assigned by DHCP server and only frames with the assigned IP address are allowed to access the network.
  • Page 57 The Port Security table has one row for each port and five columns. When port security is enabled on a port, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number.
  • Page 58 • Send Trap and Deny New Stations - Besides denying the new station, trap message is sent by the switch to report an intrusion action. • Trunk - Display the trunk ID if the port is member of a trunk group.
  • Page 59 Web – Click Security, Port Cecurity. This page enables you to setup management access filter on the switch. With the Management Access Filter Configuration table, you can create a list of up to 8 IP addresses or IP address groups that are allowed management access to the switch through the web interface or SNMP.
  • Page 60: Igmp Snoop

    Settings Field Attributes IGMP Snooping Configuration • IGMP Enabled - When enabled, the switch will monitor network traffic to determine which hosts want to receive multicast traffic. • Router Ports - Set if ports are conneting to the IGMP administrative...
  • Page 61 • Unregistered IPMC Flooding enabled - Set forwarding mode for unregistered (not-joined) IP multicast traffic. The traffic will flood when enabled, and forward to router-ports only when disabled. IGMP Snooping VLAN Configuration • VLAN ID - The VLAN ID. It can not be changed. •...
  • Page 62 ONFIGURING THE WITCH IGMP Status Show the IGMPSNOOP statistics for the whole switch. Field Attributes • VLAN ID - VLAN ID number. • Querier - Show whether Querying is enabled. • Queries transmitted - Show the number of transmitted Query packets.
  • Page 63: Snmp

    • SNMP Enabled -Activate or deactivate SNMP. • SNMP Trap Destination - IP address of the trap manager. Traps indicating status changes are issued by the switch to specified trap managers. You must specify trap managers so that key events are reported by this switch to your management station.
  • Page 64 ONFIGURING THE WITCH Web – Click IGMP Snoop, Status. Figure 36 SNMP Configuration...
  • Page 65: Troubleshooting

    • Switch port, network card or cable may be defective. Possible Solutions • Check that the switch and attached device are both powered on. • Be sure the network cable is connected to both devices. • Verify that Category 5 or better cable is used for 10/100 Mbps connections, Category 5 or 5e cable for 1000 Mbps connections, and that the length of any cable does not exceed 100 meters (328 feet).
  • Page 66 If you have forgotten the administration password you can return the Switch to its factory default state by dong the following: 1. Remove the power cord from the back of the Switch. 2. Remove all cables from the front-panel ports.
  • Page 67 HANGING A To change the IP address of a Windows 2000 PC: 1. Click Start, Settings, then Network and Dial-up Connections. 2. For the IP address you want to change, right-click the network connection icon, and then click Properties. 3. In the list of components used by this connection on General tab, select Internet Protocol (TCP/IP), and then click the Properties button.
  • Page 68: Changing Apc' Sip Address

    PC’ IP A HANGING A Note: For users of systems other than Windows 2000 or Windows XP, refer to your system documentation for information on changing the PC's IP address. DDRESS...
  • Page 69: Software Specifications

    OFTWARE EATURES OFTWARE PECIFICATIONS Software Features Authentication RADIUS, Port (802.1X), Port Security Access Control Lists IP, MAC (up to 88 lists) DHCP Client Port Configuration 100BASE-TX: 10/100 Mbps, half/full duplex 1000BASE-T: 10/100 Mbps at half/full duplex, 1000 Mbps at full duplex Flow Control Full Duplex: IEEE 802.3-2002 Half Duplex: Back pressure...
  • Page 70: Management Features

    OFTWARE PECIFICATIONS Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) VLAN Support Up to 255 groups; port-based or tagged (802.1Q), GVRP for automatic VLAN learning, private VLANs Class of Service Supports four levels of priority and Weighted Round Robin Queueing (which can be configured by VLAN tag or port), Layer 3/4 priority mapping: IP Port, IP Precedence, IP DSCP Multicast Filtering IGMP Snooping (Layer 2)
  • Page 71: Standards

    Standards IEEE 802.1D Spanning Tree Protocol and traffic priorities IEEE 802.1p Priority tags IEEE 802.1Q VLAN IEEE 802.1w Rapid Spanning Tree Protocol IEEE 802.1X Port Authentication IEEE 802.3-2002 Ethernet, Fast Ethernet, Gigabit Ethernet Full-duplex flow control Link Aggregation Control Protocol IEEE 802.3ac VLAN tagging DHCP Client (RFC 1541) HTTPS...
  • Page 72: Management Information Bases

    OFTWARE PECIFICATIONS Management Information Bases Bridge MIB (RFC 1493) Entity MIB (RFC 2737) Ether-like MIB (RFC 2665) Extended Bridge MIB (RFC 2674) Extensible SNMP Agents MIB (RFC 2742) Forwarding Table MIB (RFC 2096) IGMP MIB (RFC 2933) Interface Group MIB (RFC 2233) Interfaces Evolution MIB (RFC 2863) IP Multicasting related MIBs MAU MIB (RFC 2668)
  • Page 74 North West Africa: CIS: PRC: Taiwan: Asia Pacific: Korea: Japan: Australia: India: If you are looking for further contact information, please visit www.smc.com, www.smc-europe.com, or www.smc-asia.com. 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 (800) SMC-4-YOU; Fax (949) 679-1481 34-91-352-00-40; Fax 34-93-477-3774 44 (0) 1932 866553;...

This manual is also suitable for:

8024l2 - annexe 1

Table of Contents