Specifications are subject to change without notice. Linksys, the Cisco Systems logo, the Linksys Logo, and the Linksys One logo are registered trademarks of Cisco Systems, Inc. All other trademarks mentioned in this document are the property of their respective owners.
Page 4
Modifying GVRP Settings Defining VLAN Protocol Group Modifying Protocol Groups Defining VLAN Protocol Port Chapter 8: Configuring IP Information ... . . 60 Domain Name System Defining DNS Server Mapping DNS Hosts...
Page 6
Chapter 16: Configuring System Time ... . 125 Defining System Time Defining SNTP Settings Defining SNTP Authentication Chapter 17: Viewing Statistics ....128 Viewing Ethernet Statistics Defining Ethernet Interface Resetting Interface Statistics Counters...
Page 7
Overview Configuring the HyperTerminal Application Connecting to the SFE1000P through a Telnet Session Appendix B: Contacts ....148 US/Canada Contacts EU Contacts Appendix C: Warranty Information ... . . 149...
Page 8
Contents SFE1000P Gigabit Ethernet Switch Administration Guide Appendix F: Safety Information ....162 Meaning of the Warning Symbol General Safety Information Appendix G: Software License Agreement ..164...
This publication is designed for people who have some experience installing networking equipment such as routers, hubs, servers, and switches. We assume the person installing and troubleshooting the SFE1000P is familiar with electronic circuitry and wiring practices and has experience as an electronic or electromechanical technician.
Page 10
Chapter 18, "Managing Device Diagnostics," contains information for configuring port mirroring, running cable tests, and viewing device operational information. • Appendix B, "Contacts," is a listing of support resources and contact information for such. • Appendix C, "Warranty Information," is the Linksys warranty.
The IP address can be changed. To open the User Interface: 1. Open a web browser. 2. Enter the device’s IP address in the address bar and press Enter. An "Enter Network Password Page" opens: Chapter 2: Getting Started...
Page 12
SFE1000P Gigabit Ethernet Switch Administration Guide Enter Network Password Page 3. Enter a user name and password. The default user name is "admin" The device is not configured with a default password, and can be configured without entering a password.
3 Table Area The Table area enables navigating through the different device features. Click the tabs to view all the components under a specific feature. 4 EWS Information The EWS information tabs provide access to the online help, contains information about the EWS.
Linksys User Interface Components This section provides the following additional information: • Device Representation — Provides an explanation of the Linksys user interface buttons, including both management buttons and task icons. • Using the Linksys Management Buttons — Provides instructions for adding, modifying, and deleting device parameters.
• Deleting Device Information Adding Device Information User defined information can be added to specific EWS pages, by opening a new Add page. To add information to tables or EWS pages: Chapter 2: Getting Started Using the Linksys Management Buttons...
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide 1. Open an EWS page. 2. Click the Add button. An add page opens, for example, the Add SNTP Server Page: Add SNTP Server 3. Define the fields. 4. Click Apply. The configuration information is saved, and the device is updated.
3. Enter a user name and password to reconnect to the Web Interface, if the device is not part of a full Linksys One system. If the device is part of a Linksys One system, login is automatically done from the Service Router.
• Resetting the Device Understanding the Device Zoom View The Zoom Page is the main window used for viewing the device. To open the Zoom Page: Click the System > System Management > Zoom. The Zoom Page opens: Zoom Page The Zoom Page contains the following port indicators: •...
2. Enter information into the appropriate fields and press Apply. Resetting the Device The Reset page enables the device to be reset from a remote location. Save all changes to the Startup Configuration file before resetting the device. This prevents the current device configuration from being lost.
Page 20
Reset Page 2. Click the Reset button. 3. Enter a user name and password to reconnect to the Web Interface. If the device is part of a Linksys One system, login is automatically done from the Service Router. Chapter 3: Managing Device Information...
For example, if 400W is maximum power level, and the Guard Band is 20W, if the total system power consumption exceeds 380W no additional PoE components can be added. The accumulated PoE components power consumption is rounded down for display purposes, therefore remove value after decimal point.
Page 22
PoE Settings Page 2. Click the Edit button. The Edit PoE opens: Edit PoE 3. Define the relevant fields. 4. Click Apply. The PoE Settings are defined, and the device is updated. Chapter 4: Managing Power-over-Ethernet Devices Defining PoE Settings...
Defining Access Control • Defining DoS Prevention Passwords Management This section contains information for defining passwords. Passwords are used to authenticate users accessing the device. NOTE: By default, a single user name is defined, "admin", with no password. An additional user name/ password is configured for use in the system.
Page 24
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide User Authentication Page. 2. Click the Add button. The Add Local User Page opens: Add Local User Page 3. Define the relevant fields. 4. Click Apply. The local user settings are modified. Chapter 5: Configuring Device Security...
2. Click the Edit Button. The Edit Local User Page opens: Edit Local User Page 3. Define the relevant fields. 4. Click Apply. The local user settings are modified, and the device is updated. Defining Authentication The Authentication section contains the following pages: •...
User authentication can be performed locally or on an external server. User authentication occurs in the order the methods are selected. If the first authentication method is not available, the next selected method is used. For example, if the selected authentication methods are RADIUS and Local, and the RADIUS server is not available, then the user is authenticated locally.
Telnet users are authenticated by another authentication profile. Authentication methods are selected using arrows. The order in which the methods are selected is the order by which the authentication methods are used.
The TACACS+ default parameters are user-assigned defaults. The default settings are applied to newly defined TACACS+ servers. If default values are not defined, the system defaults are applied to the new TACACS+ new servers. The TACACS+ Page contains fields for assigning the Default Parameters for the TACACS+ servers.
Page 29
2. Click The Add button. The Add TACACS+ Server Page opens: Add TACACS+ Server Page 3. Add a TACACS+ server. 4. Click Apply. The TACACS+ server is added, and the device is updated. Chapter 5: Configuring Device Security Defining Authentication...
RADIUS servers provide a centralized authentication method for web access. The default parameters are user-defined, and are applied to newly defined RADIUS servers. If new default parameters are not defined, the system default values are applied to newly defined RADIUS servers. To define RADIUS: 1.
Page 31
2. Click the Add button. The Add Radius Server Page opens: Add Radius Server Page 3. Define the relevant fields. 4. Click Apply. The Radius Server is added, and the device is updated. Chapter 5: Configuring Device Security Defining Authentication...
Access profiles are profiles and rules for accessing the device. Access to management functions can be limited to user groups. User groups are defined for interfaces according to IP addresses or IP subnets. Access profiles contain management methods for accessing and managing the device. The device management methods include: •...
Page 33
Management access to different management methods may differ between user groups. For example, User Group 1 can access the switch module only via an HTTPS session, while User Group 2 can access the switch module via both HTTPS and Telnet sessions. The Access Profile Page contains the currently configured access profiles and their activity status.
4. Click Apply. The access profile is added, and the device is updated. Defining Profile Rules Access profiles can contain up to 128 rules that determine which users can manage the switch module, and by which methods. Users can also be blocked from accessing the device. Rules are composed of filters including: •...
Page 35
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide To define profile rules: 1. Click Security Suite > Access Method > Profile Rules. The Profile Rules Page opens: Profile Rules Page 2. Click the Add button. The Add Profile Rule Page opens: Add Profile Rule Page 3.
Storm Control is enabled per all ports by defining the packet type and the rate the packets are transmitted. The system measures the incoming Broadcast and Multicast frame rates separately on each port and discards the frames when the rate exceeds a user-defined rate.
MAC addresses. These addresses are either manually defined on the port, or learned on that port up to the point when it is locked. When a packet is received on a locked port, and the packet source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protection mechanism is invoked, and can provide various options.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Perform the following to define port security: 1. Click Security Suite > Traffic Control > Port Security. The Port Security Page opens: Port Security Page 2. Define the relevant fields. 3. Click Apply. Port security is defined, and the device is updated.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining 802.1x Port based authentication enables authenticating system users on a per-port basis via a external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port Authentication includes: •...
2. Define the relevant fields. 3. Click Apply. The 802.1X properties are defined, and the device is updated. Defining Port Authentication 1. Click Security Suite > 802.1X > Port Authentication. The 802.1X Properties Page opens: 802.1X Port Authentication Page 2. Define the relevant fields.
2. Click the Edit button. The Port Authentication Settings Page opens: Port Authentication Settings Page 3. Modify the relevant fields. 4. Click Apply. The port authentication settings are defined, and the device is updated. Chapter 5: Configuring Device Security Defining 802.1x...
Your switch supports up to 256 ACLs. Packets entering an ingress port, with an active ACL, are either admitted or denied entry. If they are denied entry, the user can disable the port. ACLs are composed of access control entries (ACEs) that are made of the filters that determine traffic classifications.
Defining MAC Based ACL The MAC Based ACL Page page allows a MAC-based Access Control List (ACL) to be defined. The table lists Access Control Elements (ACE) rules, which can be added only if the ACL is not bound to an interface.
4. Click Apply. The ACL Rule is defined, and the device is updated. Defining IP Based ACL The IP Based ACL Page contains information for defining IP Based ACLs, including defining the ACEs defined for IP Based ACLs. Chapter 5: Configuring Device Security...
Page 47
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide 1. Click Security Suite >Access Control > IP Based ACL. The IP Based ACL Page opens: IP Based ACL Page 2. Click the Add Button. The Add IP Based ACL Page opens: Add IP Based ACL Page 3.
Defining ACL Binding When an ACL is bound to an interface, all the ACE rules that have been defined are applied to the selected interface. Whenever an ACL is assigned on a port or a LAG flows from that ingress interface that do not match the ACL are matched to the default rule, which is Drop unmatched packets.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide 1. Click Security Suite > Access Control > ACL Binding. The ACL Binding Page opens ACL Binding Page 2. Define the relevant fields. 3. Click Apply. The ACL binding settings are modified, and the device is updated.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Global Settings 1. Click Security Suite > Dos Prevention > Global Settings. The Global Settings Page opens: Global Settings Page 2. Define the relevant fields. 3. Click Apply. The Dos prevention global settings are defined, and the device is updated.
Page 51
2. Click the Add button. The Add Martian Addresses Page opens: Add Martian Addresses Page 3. Define the relevant fields. 4. Click Apply. The martian addresses are added, and the device is updated. Chapter 5: Configuring Device Security Defining DoS Prevention...
Defining Port Settings The Port Settings Page contains fields for defining port parameters. To define port settings: 1. Click Bridging > Port Management > Port Settings. The Port Settings Page opens: Port Settings Page 2. Define the relevant fields. 3. Click Apply. Port Settings are defined, and the device is updated.
4. Click Apply. The Port Settings are modified, and the device is updated. Defining LAG Management Link Aggregation optimizes port usage by linking a group of ports together to form a single LAG. Aggregating ports multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy.
Page 54
The device supports up to 8 LAGs, and eight ports in each LAG. • Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG. Ports added to a LAG lose their individual port configuration. When ports are removed from the LAG, the original port configuration is applied to the ports.
Edit LAG Membership Page 3. Define the relevant fields. 4. To assign ports to a LAG, click the port numbers in the Port List and then click the Right Arrow button. The port number then appears in the LAG Members list.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining LAG Settings Link Aggregated Groups optimize port usage by linking a group of ports together to form a single aggregated group. Link aggregated groups multiply the bandwidth between the devices, increase port flexibility, and provide link redundancy.
SFE1000P Gigabit Ethernet Switch Administration Guide LAG Configuration Settings 3. Define the relevant fields. 4. Click Apply. The LAG configuration settings are modified, and the device is updated. Configuring LACP Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of ports with the same speed, set to full-duplex operations.
VLANs have no minimum number of ports, and can be created per unit, per device, or through any other logical connection combination, since they are software-based and not defined by physical attributes.
4. Click Apply. The VLAN Settings are defined, and the device is updated. Defining VLAN Membership The VLAN Membership Page contains a table that maps VLAN parameters to ports. Ports are assigned VLAN membership by toggling through the Port Control settings.
The VLAN Interface Setting Page provides parameters for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Settings page. All untagged packets arriving to the device are tagged by the ports PVID.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining VLAN Protocol Group The Protocol Group Page contains information defining protocol names and the VLAN Ethernet type. Interfaces can be classified as a specific protocol based interface. 1. Click Bridging > VLAN Management > Protocol Group. The Protocol Group Page opens: Protocol Group Page 2.
The Protocol Group Settings Page provides information for configuring existing VLAN protocol groups. 1. Click Bridging > VLAN Management > Protocol Group. The Protocol Group Page opens: 2. Click the Edit Button. The Protocol Group Settings Page opens: Protocol Group Settings Page 3.
Page 67
SFE1000P Gigabit Ethernet Switch Administration Guide Add Protocol Port to VLAN Page 3. Define the relevant fields. 4. Click Apply. The protocol ports are mapped to VLANs, and the device is updated. Chapter 7: Configuring VLANs Defining VLAN Protocol Port...
Domain Name System (DNS) converts user-defined domain names into IP addresses. Each time a domain name is assigned, the DNS service translates the name into a numeric IP address. For example, www.ipexample.com is translated into 192.87.56.2. DNS servers maintain databases of domain names and their corresponding IP addresses.
Page 69
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide To enable a DNS client: 1. Click System > System Management > Domain Name System > DNS Servers. The DNS Servers Page opens: DNS Servers Page 2. Click the Add button. The Add DNS Server Page opens: Add DNS Server Page 3.
SFE1000P Gigabit Ethernet Switch Administration Guide Mapping DNS Hosts The Host Mapping Page provides information for defining DNS Host Mapping. 1. Click System > System Management > Domain Name System > Host Mapping. The Host Mapping Page opens: Host Mapping Page 2.
The IP Interface Page contains fields for assigning IP addresses. Packets are forwarded to the default IP when frames are sent to a remote network. The configured IP address must belong to the same IP address subnet of one of the IP interfaces.
The ARP table is used to maintain a correlation between each MAC address and its corresponding IP address. The ARP table can be filled in statically by the user. When a static ARP entry is defined, a permanent entry is put in the table, which the system uses to translate IP addresses to MAC addresses.
Frames addressed to a destination MAC address that is not associated with any port, are flooded to all ports of the relevant VLAN. Static addresses are manually configured. In order to prevent the bridging table from overflowing, dynamic MAC addresses, from which no traffic is seen for a certain period, are erased.
The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for traffic entering the switch. When the destination address for inbound traffic is found in the database, the packets intended for that address are forwarded directly to the associated port.
Page 76
1. Click Bridging > Address Tables > Dynamic. The Dynamic Page opens: Dynamic Page 2. Define the relevant fields. 3. Click Query. The Dynamic MAC Address Table is queried, and the results are displayed. 4. Click Apply. Dynamic addressing is defined, and the device is updated. Chapter 9: Defining Address Tables...
Defining Multicast Bridging Groups • Defining Multicast Forwarding IGMP Snooping When IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. The CPU analyzes the incoming packets and determines: • Which ports want to join which Multicast groups.
The Multicast Group page displays the ports and LAGs that are members of Multicast service groups. The Port and LAG tables also reflect the manner in which the port or LAGs joined the Multicast group. Ports can be added either to existing groups or to new Multicast service groups.
Page 79
2. Click the Add button. The Add Multicast Group Page opens: Add Multicast Group Page 3. Define the relevant fields. 4. Click Apply. The Multicast Group settings are modified, and the device is updated. Chapter 10: Configuring Multicast Forwarding Defining Multicast Bridging Groups...
4. Click Apply. The Multicast group parameters are saved, and the device is updated. Defining Multicast Forwarding The Multicast Forward Page contains fields for attaching ports or LAGs to a device that is attached to a neighboring Multicast router/switch. Once IGMP Snooping is enabled, Multicast packets are forwarded to the appropriate port or VLAN.
Loops occur when alternate routes exist between hosts. Loops in an extended network can cause bridges to forward traffic indefinitely, resulting in increased traffic and reducing network efficiency.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining STP Properties The STP Properties Page contains parameters for enabling STP on the device. The STP Properties Page is divided into three areas, Global Settings, Bridge Settings. and Designated Root. 1. Click Bridging > Spanning Tree > Properties. The STP Properties Page opens: STP Properties Page 2.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Defining Interface Settings Network administrators can assign STP settings to specific interfaces using the STP Interface Settings Page. To assign STP settings to an interface: 1. Click Bridging > Spanning Tree > Interface Settings. The Interface Settings Page opens: Interface Settings Page 2.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining Rapid Spanning Tree While the classic spanning tree prevents Layer 2 forwarding loops in a general network topology, convergence can take between 30-60 seconds. This time may delay detecting possible loops, and propagating status topology changes. Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies that allow a faster STP convergence without creating forwarding loops.
4. Click Apply. The Rapid Spanning Tree Settings are modified, and the device is updated. Defining Multiple Spanning Tree MSTP provides differing load balancing scenarios. For example, while port A is blocked in one STP instance, the same port is placed in the Forwarding State in another STP instance. The MSTP Properties page contains information for defining global MSTP settings, including region names, MSTP revisions, and maximum hops.
The MSTP Properties Page contains information for defining global MSTP settings, including region names, MSTP revisions, and maximum hops. To define MSTP: 1. Click Bridging > Spanning Tree > MSTP > Properties. The MSTP Properties Page opens: MSTP Properties Page 2. Define the relevant fields.
The VLAN screen enables mapping VLANs to MSTP Instances. 1. Click Bridging > Spanning Tree > MSTP > Instance to VLAN. The Instance to VLAN Page opens: Instance to VLAN Page 2. .Define the relevant fields.
Multiple Spanning Tree Regions (MST Regions). Regions are one or more Multiple Spanning Tree bridges by which frames can be transmitted. In configuring MSTP, the MST region to which the device belongs is defined. A configuration consists of the name, revision, and region to which the device belongs.
SNMP versions: SNMP v1 and v2 SNMP agents maintain a list of variables that are used to manage the device. The variables are defined in the Management Information Base (MIB). The MIB presents the variables controlled by the agent.
Defining the SNMP Engine ID The Engine ID Page provides information for defining the device engine ID. 1. Click System > SNMP > Security > Engine IP. The Engine ID Page opens: Engine ID Page 2. Define the relevant fields.
SNMP Views provide access or block access to device features or feature aspects. For example, a view can be defined that states that SNMP Group A has Read Only (R/O) access to Multicast groups, while SNMP Group B has Read-Write (R/W) access to Multicast groups. Feature access is granted via the MIB name, or MIB Object ID.
2. Click the Add button. The Add SNMP Group Membership Page opens: Add SNMP Group Membership Page 3. Define the relevant fields. 4. Click Apply. The SNMP Group Membership settings are modified, and the device is updated. Chapter 12: Configuring SNMP Configuring SNMP Security...
The Edit SNMP User Page provides information for assigning SNMP access control privileges to SNMP groups. The Edit SNMP User Page contains the following fields. 1. Click System > SNMP > Security > Users to open the Edit SNMP User Page 2. Define the relevant fields.
4. Click Apply. The SNMP settings are modified, and the device is updated. Modifying SNMP Group Profile Settings 1. Click System > SNMP > Security > Groups. The SNMP Groups Profile Page opens: 2. Click the Edit Button. The Edit SNMP Group Profile Page opens: Edit SNMP Group Profile Page 3.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining SNMP Communities The Access rights are managed by defining communities in the SNMP Communities Page. When the community names are changed, access rights are also changed. SNMP communities are defined only for SNMP v1 and SNMP v2c.
Defining SNMP Filter Settings Defining Trap Settings The Trap Settings Page contains parameters for defining SNMP notification parameters. 1. Click System > SNMP > Security > Trap Management > Trap Settings. The Trap Settings Page opens: Trap Settings Page 2. Define the relevant fields.
Page 102
Traps indicating status changes are issued by the switch to specified trap managers. Specify the trap managers so that key events are reported by this switch to the management station. Specify up to five management stations that receive authentication failure messages and other trap messages from the switch.
Page 103
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Add SNMP Notification Recipient Page 3. Define the relevant fields. 4. Click Apply. The SNMP Notification Recipient settings are defined, and the device is updated. Chapter 12: Configuring SNMP Defining Trap Management...
4. Click Apply. The SNMP Notification Receivers are defined, and the device is configured. Defining SNMP Filter Settings The Filter Settings Page permits filtering traps based on OIDs. Each OID is linked to a device feature or a feature aspect. The Filter Settings Page also allows network managers to filter notifications.
Page 105
2. Click the Add button. The Add SNMP Notification Filter Page opens: Add SNMP Notification Filter Page 3. Define the relevant fields. 4. Click Apply. The SNMP Notification Filter is added to the list, and the device is updated. Chapter 12: Configuring SNMP Defining Trap Management...
Access Control Lists (ACLs) — Used to decide which traffic is allowed to enter the system, and which is to be dropped. Only traffic that meets this criteria are subject to CoS or QoS settings. ACLs are used in QoS and network security.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide The Quality of Service section contains the following section: • Defining General Settings • Defining Advanced Mode • Defining QoS Basic Mode The section also contains the following pages: • Configuring Policy Table •...
SFE1000P Gigabit Ethernet Switch Administration Guide Defining CoS The CoS Page contains fields for enabling or disabling CoS (Basic or Advanced mode). In addition, the default CoS for each port or LAG is definable. 1. Click Quality of Service > General > CoS. The CoS Page opens: CoS Page 2.
Mapping CoS to Queue The Cos to Queue Page contains fields for classifying CoS settings to traffic queues. 1. Click Quality of Service > General > CoS to Queue. The Cos to Queue Page opens: Chapter 13: Configuring Quality of Service...
The DSCP to Queue Page enables mapping DSCP values to specific queues. To map DCSP to Queues: 1. Click Quality of Service > General > DSCP to Queue. The DSCP to Queue Page opens: DSCP to Queue Page 2. Define the relevant fields.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Configuring Bandwidth The Bandwidth Page allows network managers to define the bandwidth settings for specified egress and ingress interfaces. Rate Limits and Shaping are defined per interface: • Rate Limit sets the maximum bandwidth allowed on ingress interfaces.
The rules are defined in classification control lists (CCL). CCLs are set according to the classification defined in the ACL, and they cannot be defined until a valid ACL is defined. When CCLs are defined, ACLs and CCLs can be grouped together in a more complex structure, called policies.
DSCP values in outgoing packets. This information is important when traffic exceeds user-defined limits. 1. Click Quality of Service > Advanced Mode > DSCP Mapping. The DSCP Mapping Page opens: DSCP Mapping Page 2. Define the relevant fields.
For example, Class Map A is assigned to packets based only on an IP-based ACL or a MAC-based ACL. Class Map B is assigned to packets based on both an IP- based and a MAC-based ACL.
SFE1000P Gigabit Ethernet Switch Administration Guide Defining Aggregate Policer A policy is a collection of classes, each of which is a combination of a class map and a QoS action to apply to matching traffic. Classes are applied in a first-fit manner within a policy.
4. Click Apply. The Aggregate policer is added, and the device is updated. Modifying QoS Aggregate Policer 1. Click Quality of Service > Advanced > Aggregate Policer. The Aggregate Policer Page opens: 2. Click the Edit Button. The Edit QoS Aggregate Policer Page opens: Edit QoS Aggregate Policer Page 3.
Configuring Policy Table In the Policy Table Page, QoS policies are set up and assigned to interfaces. 1. Click Quality of Service > Advanced > Policy Table. The Policy Table Page opens: Policy Table Page 2. Click the Add button. The Add QoS Policy Profile Page opens: Add QoS Policy Profile Page 3.
4. Click Apply. The QoS policy binding is defined, and the device is updated. Defining QoS Basic Mode The Basic Mode Page contains information for enabling Trust on the device. Packets entering a QoS domain are classified at the edge of the QoS domain.
Page 121
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide DSCP Mapping Page 3. Define the DSCP mappings. 4. Click Apply. The DSCP mappings are defined, and the device is updated. Chapter 13: Configuring Quality of Service Defining Advanced Mode...
Startup Configuration File — Contains the commands required to reconfigure the device to the same settings as when the device is powered down or rebooted. The Startup file is created by copying the configuration commands from the Running Configuration file or the Backup Configuration file.
File names cannot contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the TFTP server is 127 characters or 31 characters for files on the switch. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”).
File names cannot contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the TFTP server is 127 characters or 31 characters for files on the switch.
SFE1000P Gigabit Ethernet Switch Administration Guide Active Image The Active Image Page allows network managers to select the Image files. 1. Click Admin > File Management > Active Image. The Active Image Page opens: Active Image Page 2. Define the relevant fields.
Enabling System Logs In the Log Settings Page, define the levels of event severity that are recorded to the system event logs. The event severity levels are listed on this page in descending order from the highest severity to the lowest.
Page 128
1. Click Admin > Logs > Logs Settings. The Log Settings Page opens. Log Settings Page 2. Define the relevant fields. 3. Click Apply. The global log parameters are set, and the device is updated. Chapter 15: Managing System Logs...
SFE1000P Gigabit Ethernet Switch Administration Guide Viewing the Device Memory Logs The Memory Page contains all system log entries in chronological order that are saved in RAM (Cache). After restart, these log entries are deleted. To open the Memory Page: 1.
SFE1000P Gigabit Ethernet Switch Administration Guide Viewing the Flash Logs The Flash Page contains information about log entries saved to the Log File in FLASH, including the time the log was generated, the event severity, and a description of the log message. The Message Log is available after reboot.
The Add Syslog Server Page contains fields for defining new Remote Log Servers. 3. Define the relevant fields. 4. Click Apply. The Add Syslog Server Page closes, the syslog server is added, and the device is updated. Chapter 15: Managing System Logs...
The System Time Page contains fields for defining system time parameters for both the local hardware clock, and the external SNTP clock. If the system time is kept using an external SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock. Daylight Savings Time can be enabled on the device.
Defining SNTP Settings The SNTP Settings Page contains information for enabling SNTP servers, as well as adding new SNTP servers. In addition, the SNTP Settings Page enables the device to request and accept SNTP traffic from a server. To define SNTP global settings: 1.
Viewing EAP Statistics Defining Ethernet Interface The Interface Page contains statistics for both received and transmitted packets. The Interface Page is divided into three areas, General Information, Receive Statistics and Transmit Statistics. 1. Click Statistics > Ethernet > Interface. The Interface Page opens: Interface Page 2.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Viewing EAP Statistics The EAP Page contains information about EAP packets received on a specific port. To view the EAP Statistics: 1. Click Statistics > Ethernet > EAP Statistics. The EAP Page opens.
• Viewing the RMON Events Logs Viewing RMON Statistics The RMON Statistics Page contains fields for viewing information about device utilization and errors that occurred on the device. To view the RMON statistics: 1. Click Statistics > RMON > Statistics. The RMON Statistics Page opens: RMON Statistics Page 2.
• Viewing the RMON History Table Defining RMON History Control The RMON History Control Page contains information about samples of data taken from ports. For example, the samples may include interface definitions or polling periods. To view RMON history information: 1.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide 4. Click Apply. The entry is added to the RMON History Control Page, and the device is updated. Modify History Control Settings 1. Click Statistics > RMON > History. The RMON History Control Page opens.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide RMON History Table Page 3. To return to the RMON History Control Page, click the Interface Table button. Configuring RMON Events This section includes the following topics: • Defining RMON Events Control •...
2. Click the Add button. The Add RMON Events Page opens: Add RMON Events Page 3. Define the relevant fields. 4. Click Apply. The RMON event is added, and the device is updated. Modify Event Control Settings 1. Click Statistics > RMON > Events. The RMON Events Page opens: 2.
3. To return to the RMON Events Page, click the RMON Events Control button. Defining RMON Alarms The RMON Alarms Page contains fields for setting network alarms. Network alarms occur when a network problem, or event, is detected. Rising and falling thresholds generate events.
Page 146
2. Click the Add button. The Add RMON Alarm Page opens: Add RMON Alarm Page 3. Define the relevant fields. 4. Click Apply. The RMON alarm is added, and the device is updated. Chapter 17: Viewing Statistics Managing RMON Statistics...
2. Click the Edit Button. The Edit RMON Alarms Page opens: Edit RMON Alarms Page 3. Define the relevant fields. 4. Click Apply. The RMON alarms are modified, and the device is updated. Chapter 17: Viewing Statistics Managing RMON Statistics...
Cables up to 100 meters long can be tested. Cables are tested when the ports are in the down state, with the exception of the Approximated Cable Length test.
Performing Optical Tests The Optical Test Page allows network managers to perform tests on Fiber Optic cables. Optical transceiver diagnostics can be performed only when the link is present. During the port test, the port moves to a down state.
Port Mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port. Port mirroring can be used as diagnostic tool and/or a debugging feature. Port mirroring also enables switch performance monitoring.
Chapter SFE1000P Gigabit Ethernet Switch Administration Guide Modifying Port Mirroring 1. Click Admin > Diagnostics > Port Mirroring. The Port Mirroring Page opens: 2. Click the Edit Button. The Edit Port Mirroring Page opens: Edit Port Mirroring Page 3. Define the relevant fields.
The SFE1000P features a menu-driven console interface for basic configuration of the Switch and management of your network. The Switch can be configured using CLI through the console interface or through a telnet connection. This chapter describes console interface configuration. Configuration can also be performed through the web utility.
Page 153
2. On the Connection Description screen, enter a name for this connection. In the example, the name of connection is SFE1000P. Select an icon for the application. Then, click the OK button. Connection Description 3. On the Connect To screen, select a port to communicate with the Switch: COM1, COM3, or TCP/IP. Connect To Screen...
Page 154
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide 4. Set the serial port settings as follows: Bits per second: 38400 Data bits: 8 Parity: None Stop bits: 1 Flow control: None Serial Port Settings Then, click the OK button.
Enter. Enter admin in the User Name field. Leave the Password field blank. 3. Press the Esc button and you will return to the login screen. Use the right arrow button to navigate to Execute and press the Enter button to enter the CLI interface.
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Contacts For additional information or troubleshooting help, refer to the User Guide on the CD-ROM. Additional support is also available by phone or online. US/Canada Contacts • 24-Hour Technical Support: 800-326-7114 •...
”Industry Canada Statement,” on page 152 ”Règlement d’Industry Canada,” on page 153 ”EC Declaration of Conformity (Europe),” on page 153 ”User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE),” on page 153 Appendix D:...
Page 162
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Page 163
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Page 164
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Page 165
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Page 166
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Page 167
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Page 168
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Appendix D: User Information for Consumer Products Covered by EU...
Unit Weight 3.02 lbs. or 48.33 oz (1.37 kg) Power 48 VDC, 100-240V 3.5A Certification UL (UL 60950), CSA (CSA 22.2), CE mark, FCC Part 15 (CFR 47), Class A EN60950 (2001) Security ACL, 802.1x Operating Temp 0ºC to 40ºC (32ºF to 104ºF) Storage Temp -20ºC to 70ºC (-4ºF to 158ºF)
SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Safety Information The following statements are warnings or safety guidelines. A warning means danger. You are in a situation that could cause bodily injury. Before working on equipment, be aware of the hazards involved with electrical circuitry and standard safety practices to prevent accidents.
Page 171
Appendix SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide Power Safety Information Appendix F: General Safety Information...
2 and 3 below. Where such specific license terms entitle you to the source code of such software, that source code is upon request available at cost from Linksys for at least three years from the purchase date of this product and may also be available for download from www.linksys.com/gpl.
Page 173
Linksys product and/or the Software and/or your use of either in order (i) to enable Linksys to offer you Upgrades; (ii) to ensure that your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers;...
If You would like a copy of the GPL or other open source code in this Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request.
Page 175
Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
Page 176
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
Page 177
SFE1000P 8-port 10/100 Ethernet Switch with PoE Administration Guide 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the...
Page 178
License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
If this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.openssl.org/source/...
Page 180
If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Page 181
"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written...