Interlogix NS3702-24P-4S User Manual

Interlogix NS3702-24P-4S User Manual

Gigabit network switch
Hide thumbs Also See for NS3702-24P-4S:
Table of Contents

Advertisement

NS3702-24P-4S

User Manual

P/N 1072832 • REV 00.01 • ISS 14JUL14

Advertisement

Table of Contents
loading

Summary of Contents for Interlogix NS3702-24P-4S

  • Page 1: User Manual

    NS3702-24P-4S User Manual P/N 1072832 • REV 00.01 • ISS 14JUL14...
  • Page 2 © 2014 United Technologies Corporation Copyright Interlogix is part of UTC Building & Industrial Systems,Inc. a unit of United Technologies Corporation. All rights reserved. The NS3702-24P-4S name and logo are trademarks of United Technologies. Trademarks and patents Other trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS 1. INTRODUCTION........................10     1.1 Packet Contents ............................10   1.2 Product Description ...........................11   1.3 How to Use This Manual ..........................14   1.4 Product Features............................15   1.5 Product Specifications ..........................18 2. INSTALLATION ........................22     2.1 Hardware Description ..........................22 2.1.1 Switch Front Panel ..............................22  ...
  • Page 4 4.2.2 IP Configuration ..............................44   4.2.3 IP Status ................................46   4.2.4 Users Configuration .............................47   4.2.5 Privilege Levels ..............................51   4.2.6 NTP Configuration ...............................53   4.2.7 Time Configuration ..............................54   4.2.8 UPnP ...................................55   4.2.9 DHCP Relay ................................57   4.2.10 DHCP Relay Statistics ............................59  ...
  • Page 5 4.4.1 Port Configuration..............................88   4.4.2 Port Statistics Overview ............................90   4.4.3 Port Statistics Detail.............................91   4.4.4 SFP Module Information ............................93   4.4.5 Port Mirror................................94     4.5 Link Aggregation ............................97 4.5.1 Static Aggregation..............................99   4.5.2 LACP Configuration ............................101   4.5.3 LACP System Status ............................104  ...
  • Page 6 4.7.9 Port Statistics..............................161     4.8 Multicast ..............................163 4.8.1 IGMP Snooping ..............................163   4.8.2 Profile Table...............................168   4.8.3 Address Entry ..............................169   4.8.4 IGMP Snooping Configuration ...........................170   4.8.5 IGMP Snooping VLAN Configuration.........................173   4.8.6 IGMP Snooping Port Group Filtering .........................175  ...
  • Page 7 4.9.12 QCL Status ..............................216   4.9.13 Storm Control Configuration ..........................218   4.9.14 WRED................................220   4.9.15 QoS Statistics ..............................222   4.9.16 Voice VLAN Configuration ..........................223   4.9.17 Voice VLAN OUI Table.............................226     4.10 Access Control Lists..........................228 4.10.1 Access Control List Status ..........................228  ...
  • Page 8 4.12.12 ARP Inspection ..............................312   4.12.13 ARP Inspection Static Table ...........................314     4.13 Address Table ............................315 4.13.1 MAC Table Configuration..........................315   4.13.2 MAC Address Table Status ..........................317   4.13.3 Dynamic ARP Inspection Table........................318   4.13.4 Dynamic IP Source Guard Table........................319  ...
  • Page 9 4.18.1 RMON Alarm Configuration ..........................367   4.18.2 RMON Alarm Status............................369   4.18.3 RMON Event Configuration ..........................370   4.18.4 RMON Event Status............................372   4.18.5 RMON History Configuration ...........................373   4.18.6 RMON History Status............................374   4.18.7 RMON Statistics Configuration ........................375   4.18.8 RMON Statistics Status............................376  ...
  • Page 10: Introduction

    NS3702-24P-4S - 24-Port 10/100/1000Mbps 802.3at PoE+ ports, 4-Port Shared Gigabit RJ45 and SFP ports, Managed Switch with Hardware Layer 3 IPv4/IPv6 Static Routing, NS3702-24P-4S, comes with the multi-port Gigabit Ethernet Switch and SFP fiber optic connectibility and robust layer 2+ features. The description of this model is shown below: NS3702-24P-4S 24-Port 10/100/1000Mbps 802.3at PoE + 4-Port Gigabit TP / SFP Combo Managed Switch (440W)
  • Page 11: Product Description

    Particularly designed for the growing popular IP Surveillance applications, IFS Gigabit 802.3at PoE Managed Switch NS3702-24P-4S is positioned as a Surveillance Switch with central management of remote Power control and IP camera monitoring. The NS3702 provides built-in L2/L4 Switching engine and intelligent PoE functions along with 24 10/100/1000Base-T ports featuring 30Watts 802.3at PoE in RJ-45 copper interfaces and 4 Gigabit TP/SFP combo interfaces supporting high speed transmission of...
  • Page 12 PoE Schedule for Energy Saving Besides applied in IP Surveillance, the NS3702-24P-4S is certainly applicable to construct any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributes to environment protection on the earth, the NS3702 can effectively control the power supply besides its capability of giving high watts power.
  • Page 13 NS3702 supports both IPv4 and IPv6 management functions, it can works with original IPv4 network structure and also supports the new IPv6 network structure. With easy and friendly management interfaces and plenty of management functions included, the NS3702-24P-4S is the best choice for IP Surveillance and Wireless service providers to connect with IPv6 network. Efficient Management For efficient management, the NS3702 Managed Switch is equipped with console, WEB and SNMP management interfaces.
  • Page 14: How To Use This Manual

    1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Managed Switch and how to physically install the Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Managed Switch by Web interface.
  • Page 15: Product Features

    1.4 Product Features  Physical Port  24-Port 10/100/1000Base-T RJ-45 copper with IEEE 802.3at / 802.3af Power over Ethernet Injector function  4 100/1000Base-X mini-GBIC/SFP slot, shared with Port-21 to Port-24 compatible with 100Base-FX SFP  RJ45 to RS-232 DB9 console interface for basic management and setup ...
  • Page 16  STP, IEEE 802.1D Spanning Tree Protocol  RSTP, IEEE 802.1w Rapid Spanning Tree Protocol  MSTP, IEEE 802.1s Multiple Spanning Tree Protocol, spanning tree by VLAN  BPDU Guard  Supports Link Aggregation  802.3ad Link Aggregation Control Protocol (LACP) ...
  • Page 17  IEEE 802.1X Authentication with Guest VLAN  Built-in RADIUS client to cooperate with the RADIUS servers  RADIUS / TACACS+ users access authentication  IP-based Access Control List (ACL)  MAC-based Access Control List (ACL)  Source MAC / IP address binding ...
  • Page 18: Product Specifications

    1.5 Product Specifications Product NS3702-24P-4S Hardware Specifications 4 100/1000Base-X SFP interfaces, shared with Port-21 to Port-24 SFP/mini-GBIC Slots Compatible with 100Base-FX SFP transceiver 1 x RS-232 DB9 serial port (115200, 8, N, 1) Console Store-and-Forward Switch Architecture 48Gbps / non-blocking Switch Fabric 35.7Mpps@64Bytes...
  • Page 19 24 units PD @ 15.4 watts 14 units PD @ 30.8 watts Layer 2 Functions Port disable / enable Auto-Negotiation 10/100/1000Mbps full and half duplex mode selection Port Configuration Flow Control disable / enable Display each port’s speed duplex mode, link status, flow control status, Auto Port Status negotiation status, trunk status TX / RX / Both...
  • Page 20 IPv4 software Static Routing Routing Protocols IPv6 software Static Routing Management Functions Console, Telnet, Web Browser, SNMP v1, v2c Basic Management Interfaces SSH, SSL, SNMP v3 Secure Management Interfaces RFC-1213 MIB-II RFC-1493 Bridge MIB RFC-1643 Ethernet MIB RFC-2863 Interface MIB RFC-2665 Ether-Like MIB RFC-2819 RMON MIB (Group 1, 2, 3 and 9) RFC-2737 Entity MIB...
  • Page 21 RFC 3376 IGMP version 3 RFC 2710 MLD version 1 RFC 3810 MLD version 2 Environment Temperature: 0 ~ 50 degrees C Operating Relative Humidity: 20 ~ 95% (non-condensing) Temperature: -20 ~ 70 degrees C Storage Relative Humidity: 20 ~ 95% (non-condensing)
  • Page 22: Installation

    Figure 2-1-1 shows the front panel of the Managed Switch. NS3702-24P-4S Front Panel Figure 2-1-1: Front Panels of NS3702-24P-4S ■ Gigabit TP interface 10/100/1000Base-T Copper, RJ-45 Twist-Pair: Up to 100 meters. ■ SFP slot 100/1000Base-X mini-GBIC slot, SFP (Small Factor Pluggable) transceiver module: From 550 meters to 2km (multi-mode fiber),...
  • Page 23: Led Indications

    The front panel LEDs indicate instant status of power and system status, fan status, port links / PoE in-use and data activity; they help monitor and troubleshoot when needed. Figure 2-1-2 shows the LED indications of the Managed Switch. NS3702-24P-4S LED Indication Figure 2-1-2: NS3702-24P-4S LED at Front Panel...
  • Page 24 NS3702-24P-4S LED Indication Table  LED definition  System Color Function Lights to indicate this switch has powered. Green  Alert Color Function Lights to indicate FAN1 failure. FAN1 Green Lights to indicate FAN2 failure. FAN2 Green Lights to indicate FAN3 failure.
  • Page 25: Switch Rear Panel

    Figure 2-1-3 shows the rear panel of the Managed Switch. NS3702-24P-4S Rear Panel Figure 2-1-3: Rear Panel of NS3702-24P-4S ■ AC Power Receptacle For compatibility with electric service in most areas of the world, the Managed Switch’s power supply automatically adjusts line power in the range of 100-240V AC and 50/60 Hz.
  • Page 26: Installing The Switch

    2.2 Installing the Switch This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the following topics and perform the procedures in the order being presented. To install your Managed Switch on a desktop or shelf, simply complete the following steps.
  • Page 27: Rack Mounting

    Connection to the Managed Switch requires UTP Category 5e network cabling with RJ-45 tips. For more information, please see the Cabling Specification in Appendix A. Supply power to the Managed Switch. Step 5: Connect one end of the power cable to the Managed Switch. Connect the power plug of the power cable to a standard wall outlet.
  • Page 28: Installing The Sfp Transceiver

    After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the rack, as Step 5: shown in Figure 2-2-3. Figure 2-2-3: Mounting Managed Switch in a Rack Proceed with Steps 4 and 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply power to the Step 6: Managed Switch.
  • Page 29  Approved IFS SFP Transceivers NS3702 Managed Switch supports both single mode and multi-mode SFP transceiver. The following list of approved Fast Ethernet Transceiver (100Base-X SFP) Gigabit Ethernet Transceiver (1000Base-X SFP)
  • Page 30 1. It is recommended to use IFS SFPs on the Managed Switch. If you insert an SFP transceiver that is not supported, the Managed Switch will not recognize it. 2. Port 21 to Port 24 are a shared SFP slot that supports the Gigabit and Fast Ethernet SFP transceiver.
  • Page 31 Figure 2-2-5: How to Pull Out the SFP/SFP+ Transceiver Never pull out the module without lifting up the lever of the module and turning it to a horizontal position. Directly pulling out the module could damage the module and the SFP module slot of the Managed Switch.
  • Page 32: Switch Management

    3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options. This chapter covers the following topics: ...
  • Page 33: Management Access Overview

    3.2 Management Access Overview The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods:  An administration console Web browser interface  An external SNMP-based network management application  The administration console and Web browser interface support are embedded in the Managed Switch software and are available for immediate use.
  • Page 34: Administration Console

    3.3 Administration Console The administration console is an internal, character-oriented, and command line user interface for performing system administration such as displaying statistics or changing option settings. Using this method, you can view the administration console from a terminal, personal computer, Apple Macintosh, or workstation connected to the Managed Switch's console (serial) port. Figure 3-1-1: Console Management Direct Access Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation...
  • Page 35: Web Management

    connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port. A workstation attachment under UNIX can use an emulator such as TIP. 3.4 Web Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer.
  • Page 36: Snmp-Based Network Management

    3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the switch and the SNMP Network Management Station to use the same community string.
  • Page 37: Web Configuration

    4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management from Managed Switch. About Web-based Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 7.0.
  • Page 38 When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Managed Switch. The login screen in Figure 4-1-2 appears. Figure 4-1-2: Login Screen Default User name: admin Default Password: admin After entering the username and password, the main screen appears as shown in...
  • Page 39 Figure 4-1-3: Web Main Page Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web interface. The Switch Menu on the left of the web Page lets you access all the commands and statistics the Managed Switch provides.
  • Page 40: Main Web Page

    4.1 Main Web Page The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s Web browser interface to configure and manage it.
  • Page 41 those listed in the Main Function. The screen in Figure 4-1-5 appears. Figure 4-1-5: Managed Switch Main Functions Menu...
  • Page 42: System

    4.2 System Use the System menu items to display and configure basic administrative details of the Managed Switch. Under the System, the following topics are provided to configure and view the system information. This section has the following items: The Managed Switch system information is provided here. ■...
  • Page 43: System Information

    4.2.1 System Information The System Infomation Page provides information for the current device information. System Information Page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears. Figure 4-2-1: System Information Page Screenshot The Page includes the following fields: Object Description...
  • Page 44: Ip Configuration

     Software Version The software version of the Managed Switch.  Software Date The date when the Managed Switch software was produced. Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page; any changes made locally will be undone. 4.2.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes.
  • Page 45 mode traffic is routed between all interfaces. This setting controls the DNS name resolution done by the switch. The DNS Server following modes are supported:  From any DHCP interfaces The first DNS server offered from a DHCP lease to a DHCP-enabled interface will be used.
  • Page 46: Ip Status

    The destination IP network or host mask, in number of bits (prefix length). Mask Length The IP address of the IP gateway. Valid format is dotted decimal notation Gateway or a valid IPv6 notation. Gateway and Network must be of the same type. The VLAN ID (VID) of the specific IPv6 interface associated with the Next Hop VLAN gateway.
  • Page 47: Users Configuration

    Figure 4-2-3: IP Status Page Screenshot The Page includes the following fields: Object Description  IP Interfaces The name of the interface. Interface The address type of the entry. This may be LINK or IPv4. Type The current address of the interface (of the given type). Address The status flags of the interface (and/or address).
  • Page 48 refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group. By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access. And the system maintenance (software upload, factory defaults and etc.) need user privilege level 15.
  • Page 49 groups, i.e. that is granted the fully control of the device. But others value need to refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group. By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access.
  • Page 50 If you forget the new password after changing the default password, please press the “Reset” button on the front panel of the Managed Switch for over 10 seconds and then release it. The current setting including VLAN will be lost and the Managed Switch will restore to the default mode.
  • Page 51: Privilege Levels

    4.2.5 Privilege Levels This Page provides an overview of the privilege levels. After setup is completed, please press “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-7 appears. Figure 4-2-7: Privilege Levels Configuration Page Screenshot...
  • Page 52 The Page includes the following fields: Object Description  Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contain more than one.
  • Page 53: Ntp Configuration

    4.2.6 NTP Configuration Configure NTP on this Page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-8 appears.
  • Page 54: Time Configuration

    4.2.7 Time Configuration Configure Time Zone on this Page. A Time Zone is a region that has a uniform standard time for legal, commercial, and social purposes. It is convenient for areas in close commercial or other communication to keep the same time, so time zones tend to follow the boundaries of countries and their subdivisions.
  • Page 55: Upnp

    to identify the time zone. ( Range : Up to 16 characters )  Daylight Saving Time This is used to set the clock forward or backward according to the configurations set below for a defined Daylight Saving Time duration. Select 'Disable' to disable the Daylight Saving Time configuration.
  • Page 56 Figure 4-2-10: UPnP Configuration Page Screenshot The Page includes the following fields: Object Description  Mode Indicates the UPnP operation mode. Possible modes are:  Enabled: Enable UPnP mode operation.  Disabled: Disable UPnP mode operation. When the mode is enabled, two ACEs are added automatically to trap UPnP related packets to CPU.
  • Page 57: Dhcp Relay

    Figure 4-2-11: UPnP devices show on Windows My Network Place 4.2.9 DHCP Relay Configure DHCP Relay on this Page. DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain. The DHCP option 82 enables a DHCP relay agent to insert specific information into a DHCP request packets when forwarding client DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server DHCP packets to a DHCP client.
  • Page 58 screen in Figure 4-2-12 appears. Figure 4-2-12 DHCP Relay Configuration Page Screenshot The Page includes the following fields: Object Description  Relay Mode Indicates the DHCP relay mode operation. Possible modes are:  Enabled: Enable DHCP relay mode operation. When enabling DHCP relay mode operation, the agent forwards and transfers DHCP messages between the clients and the server when they are not on the same subnet domain.
  • Page 59: Dhcp Relay Statistics

     Drop: Drop the package when receiving a DHCP message that already contains relay information. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.2.10 DHCP Relay Statistics This Page provides statistics for DHCP relay. The DHCP Relay Statistics screen in Figure 4-2-13 appears.
  • Page 60  Receive Bad Circuit ID The packets number that the Circuit ID option did not match known circuit ID. The packets number that the Remote ID option did not match known Remote ID. Receive Bad Remote ID Client Statistics Object Description ...
  • Page 61: Cpu Load

    4.2.11 CPU Load This Page displays the CPU load, using a SVG graph. The load is measured as average over the last 100ms, 1sec and 10 seconds intervals. The last 120 samles are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
  • Page 62: System Log

    4.2.12 System Log The Managed Switch system log information is provided here. The System Log screen in Figure 4-2-15 appears. Figure 4-2-15: System Log Page Screenshot The Page includes the following fields: Object Description  ID The ID (>= 1) of the system log entry. ...
  • Page 63: Detailed Log

    : Hides the selected log entries. : Downloads the selected log entries. : Updates the system log entries, starting from the first available entry ID. : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID.
  • Page 64: Remote Syslog

    : Updates the system log entry to the previous available entry ID. : Updates the system log entry to the next available entry ID. : Updates the system log entry to the last available entry ID. : Print the system log entry to the current entry ID. 4.2.14 Remote Syslog Configure remote syslog on this Page.
  • Page 65 Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 66: Smtp Configuration

    4.2.15 SMTP Configuration This Page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-18 appears. Figure 4-2-18: SMTP Configuration Page Screenshot The Page includes the following fields: Object Description  SMTP Mode Controls whether SMTP is enabled on this switch. ...
  • Page 67: Web Firmware Upgrade

    Buttons : Send a test mail to mail server to check this account is available or not. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.2.16 Web Firmware Upgrade This Page facilitates an update of the firmware controlling the switch.
  • Page 68: Tftp Firmware Upgrade

    the Managed Switch until the update progress is complete. DO NOT Power OFF Do not quit the Firmware Upgrade Page without pressing the “OK” button after the image is loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade processes.
  • Page 69: Save Startup Config

    Do not quit the Firmware Upgrade Page without pressing the “OK” button after the image is loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade processes. 4.2.18 Save Startup Config This function allows save the current configuration, thereby ensuring that the current active configuration can be used at the next reboot screen in Figure 4-2-22 appears.
  • Page 70: Configuration Upload

    Figure 4-2-24: Configuration Download Page Screenshot 4.2.20 Configuration Upload Configuration Upload page allows the upload the running-config and startup-config on the switch. Please refer to the Figure 4-2-25 shown below. Figure 4-2-25: Configuration Upload Page Screenshot If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: ...
  • Page 71: Configuration Activate

    4.2.21 Configuration Activate Configuration Activate page allows to activate the startup-config and default-config files present on the switch. Please refer to the Figure 4-2-26 shown below. Figure 4-2-26: Configuration Activate Page Screenshot It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration.
  • Page 72: Image Select

    4.2.23 Image Select This Page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web Page displays two tables with information about the active and alternate firmware images. The Image Select screen in Figure 4-2-28 appears.
  • Page 73: Factory Default

    Object Description  Image The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk.  Version The version of the firmware image.  Date The date where the firmware was produced. Buttons : Click to use the alternate image.
  • Page 74: Simple Network Management Protocol

    Figure 4-2-30: System Reboot Page Screenshot Buttons : Click to reboot the system. : Click to return to the Port State Page without rebooting the system. You can also check the SYS LED at the front panel to identify whether the System is loaded completely or not.
  • Page 75 SNMP Operations SNMP itself is a simple request/response protocol. NMSs can send multiple requests without receiving a response. Get -- Allows the NMS to retrieve an object instance from the agent. ■ Set -- Allows the NMS to set values for object instances within an agent. ■...
  • Page 76: Snmp System Configuration

    4.3.2 SNMP System Configuration Configure SNMP on this Page. The SNMP System Configuration screen in Figure 4-3-1 appears. Figure 4-3-1: SNMP System Configuration Page Screenshot The Page includes the following fields: Object Description  Indicates the SNMP mode operation. Possible modes are: Mode ...
  • Page 77 SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table. It provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string. In addition to community string, a particular range of source addresses can be used to restrict source subnet. ...
  • Page 78: Snmp Trap Configuration

    4.3.3 SNMP Trap Configuration Configure SNMP trap on this Page. The SNMP Trap Configuration screen in Figure 4-3-2 appears. Figure 4-3-2: SNMP Trap Configuration Page Screenshot The Page includes the following fields: Object Description  Indicates which trap Configuration's name for configuring. The allowed string Trap Config length is 0 to 255, and the allowed content is ASCII characters from 33 to 126.
  • Page 79  Indicates the community access string when send SNMP trap packet. The Trap Community allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126.  Indicates the SNMP trap destination address. It allow a valid IP address in dotted Trap Destination decimal notation ('x.y.z.w').
  • Page 80: Snmp System Information

     System Enable/disable that the Interface group's traps. Possible traps are:  Warm Start: Enable/disable Warm Start trap.  Cold Start: Enable/disable Cold Start trap.  Interface Indicates that the Interface group's traps. Possible traps are:  Link Up: Enable/disable Link up trap. ...
  • Page 81: Snmpv3 Configuration

     An administratively assigned name for this managed node. By convention, this is System Name the node's fully-qualified domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name.
  • Page 82: Snmpv3 Users

    SNMPv1 or SNMPv2c community string.  Indicates the SNMP access source address. A particular range of source Source IP addresses can be used to restrict source subnet when combined with source mask.  Indicates the SNMP access source address mask. Source Mask Buttons : Click to add a new community entry.
  • Page 83 engine with which this user can communicate. In other words, if user engine ID equal system engine ID then it is local user; otherwise it's remote user.  A string identifying the user name that this entry should belong to. The allowed User Name string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126.
  • Page 84: Snmpv3 Groups

    : Click to add a new user entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.5.3 SNMPv3 Groups Configure SNMPv3 groups table on this Page. The entry index keys are Security Model and Security Name. The SNMPv3 Groups screen in Figure 4-3-6 appears.
  • Page 85: Snmpv3 Views

    : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.5.4 SNMPv3 Views Configure SNMPv3 views table on this Page. The entry index keys are View Name and OID Subtree. The SNMPv3 Views screen in Figure 4-3-7 appears.
  • Page 86: Snmpv3 Access

    : Click to undo any changes made locally and revert to previously saved values. 4.3.5.5 SNMPv3 Access Configure SNMPv3 accesses table on this Page. The entry index keys are Group Name, Security Model and Security Level. The SNMPv3 Access screen in Figure 4-3-8 appears.
  • Page 87  Write View Name The name of the MIB view defining the MIB objects for which this request may potentially SET new values. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. Buttons : Click to add a new access entry.
  • Page 88: Port Management

    4.4 Port Management Use the Port Menu to display or configure the Managed Switch's ports. This section has the following items:  Configures port connection settings Port Configuration Lists Ethernet and RMON port statistics  Port Statistics Overview Lists Ethernet and RMON port statistics ...
  • Page 89 red that it is down.  Provides the current link speed of the port. Current Link Speed  Select any available link speed for the given switch port. Draw the menu bar to Configured Link Speed select the mode.  Auto - Setup Auto negotiation for copper interface.
  • Page 90: Port Statistics Overview

    4.4.2 Port Statistics Overview This Page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-4-2 appears. Figure 4-4-2: Port Statistics Overview Page Screenshot The displayed counters are: Object Description  The logical port for the settings contained in the same row.
  • Page 91: Port Statistics Detail

    4.4.3 Port Statistics Detail This Page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The selected port belong to the currently selected stack unit, as reflected by the Page header. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
  • Page 92  The number of received and transmitted (good and bad) broadcast packets. Rx and Tx Broadcast  Rx and Tx Pause A count of the MAC Control frames received or transmitted on this port that has an opcode indicating a PAUSE operation. Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes.
  • Page 93: Sfp Module Information

    4.4.4 SFP Module Information The NS3702-24P-4S has supported the SFP module with digital diagnostics monitoring (DDM) function, this feature is also known as digital optical monitoring (DOM). You can check the physical or operational status of an SFP module via the SFP Module Information Page.
  • Page 94: Port Mirror

     Distance(m) Display the supports distance of current SFP module, the distance value is get from the SFP module.  Temperature(C) Display the temperature of current SFP DDM module, the temperature value is get from the SFP DDM module. – SFP DDM Module Only ...
  • Page 95 Figure 4-4-7: Port Mirror Application The traffic to be copied to the mirror port is selected as follows:  All frames received on a given port (also known as ingress or source mirroring).  All frames transmitted on a given port (also known as egress or destination mirroring). Mirror Port Configuration The Port Mirror screen in Figure 4-4-8...
  • Page 96 Figure 4-4-8: Mirror Configuration Page Screenshot The Page includes the following fields: Object Description  Port to mirror on Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this port. Disabled disables mirroring. ...
  • Page 97: Link Aggregation

    Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy.
  • Page 98 Figure 4-5-1: Link Aggregation The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
  • Page 99: Static Aggregation

     Enable the link aggregation prior to connecting any cable between the switches to avoid creating a data loop.  Disconnect all link aggregation port cables or disable the link aggregation ports before removing a port link aggregation to avoid creating a data loop. It allows a maximum of 10 ports to be aggregated at the same time.
  • Page 100 The Page includes the following fields: Object Description  The Source MAC address can be used to calculate the destination port for the Source MAC Address frame. Check to enable the use of the Source MAC address, or uncheck to disable.
  • Page 101: Lacp Configuration

    The Page includes the following fields: .Object Description  Indicates the group ID for the settings contained in the same row. Group ID Group ID "Normal" indicates there is no aggregation. Only one group ID is valid per port.  Each switch port is listed for each group ID.
  • Page 102 Figure 4-5-4 : LACP Port Configuration Page Screenshot...
  • Page 103 The Page includes the following fields: Object Description  The switch port number. Port  Controls whether LACP is enabled on this switch port. LACP will form an LACP Enabled aggregation when 2 or more ports are connected to the same partner. LACP can form max 12 LAGs per switch and 2G LAGs per stack.
  • Page 104: Lacp System Status

    4.5.3 LACP System Status This Page provides a status overview for all LACP instances. The LACP Status Page display the current LACP aggregation Groups and LACP Port status. The LACP System Status screen in Figure 4-5-5 appears. Figure 4-5-5: LACP System Status Page Screenshot The Page includes the following fields: Object Description...
  • Page 105: Lacp Port Status

    4.5.4 LACP Port Status This Page provides a status overview for LACP status for all ports. The LACP Port Status screen in Figure 4-5-6 appears. Figure 4-5-6: LACP Status Page Screenshot The Page includes the following fields: Object Description  The switch port number.
  • Page 106: Lacp Port Statistics

    Auto-refresh : Automatic refresh occurs every 3 seconds. 4.5.5 LACP Port Statistics This Page provides an overview for LACP statistics for all ports. The LACP Port Statistics screen in Figure 4-5-7 appears. Figure 4-5-7: LACP Statistics Page Screenshot The Page includes the following fields: Object Description ...
  • Page 107: Vlan

    4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
  • Page 108: Ieee 802.1Q Vlan

    4.6.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks.
  • Page 109: Q Vlan Tags

    allows Spanning Tree to be enabled on all ports and work normally. Some relevant terms: Tagging - The act of putting 802.1Q VLAN information into the header of a packet. Untagging - The act of stripping 802.1Q VLAN information out of the packet header. ■...
  • Page 110: Port Vlan Id

    ■ Port VLAN ID Packets that are tagged (are carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network device to another with the VLAN information intact. This allows 802.1Q VLAN to span network devices (and indeed, the entire network – if all network devices are 802.1Q compliant).
  • Page 111: Vlan Port Configuration

    nor the host at the other end of the connection supports VLANs, then you should add this port to the VLAN as an untagged port. VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should be stripped off before passing it on to any end-node host that does not support VLAN tagging.
  • Page 112  Tagged: Ports with tagging enabled will put the VID number, priority and other VLAN information into the header of all packets that flow into those ports. If a packet has previously been tagged, the port will not alter the packet, thus keeping the VLAN information intact. The VLAN information in the tag can then be used by other 802.1Q compliant devices on the network to make packet-forwarding decisions.
  • Page 113 The Managed Switch supports multiple VLAN tags and can therefore be used in MAN applications as a provider bridge, aggregating traffic from numerous independent customer LANs into the MAN (Metro Access Network) space. One of the purposes of the provider bridge is to recognize and use VLAN tags so that the VLANs in the MAN space can be used independent of the customers’ VLANs.
  • Page 114 Object Description  This field shows the allowed Access VLANs, it only affects ports configured as Allowed Access Access ports. Ports in other modes are members of all VLANs specified in the VLANs Allowed VLANs field. By default, only VLAN 1 is enabled. More VLANs may be created by using a list syntax where the individual elements are separated by commas.
  • Page 115 Port VLAN Configuration The VLAN Port Configuration screen in Figure 4-6-2 appears. Figure 4-6-2 : Port VLAN Configuration Screenshot The Page includes the following fields: Object Description  This is the logical port number for this row. Port  Mode Access ports are normally used to connect to end stations.
  • Page 116  The VLANs that a trunk port is member of may be limited by the use of Allowed VLANs  Frames classified to a VLAN that the port is not a member of are discarded  By default, all frames but frames classified to the Port VLAN (a.k.a. Native VLAN) get tagged on egress.
  • Page 117 tagged on egress, they will be tagged with a C-tag. ■ S-Port: On ingress, frames with a VLAN tag with TPID = 0x8100 or 0x88A8 get classified to the VLAN ID embedded in the tag. If a frame is untagged or priority tagged, the frame gets classified to the Port VLAN.
  • Page 118: Vlan Membership Status

    ■ Untag All All frames, whether classified to the Port VLAN or not, are transmitted without a tag.  Ports in Trunk and Hybrid mode may control which VLANs they are allowed to Allowed VLANs become members of. The field's syntax is identical to the syntax used in the Enabled VLANs field.
  • Page 119 Figure 4-6-4: VLAN Membership Status for Static User Page Screenshot...
  • Page 120 The Page includes the following fields: Object Description  A VLAN User is a module that uses services of the VLAN management VLAN User functionality to configure VLAN memberships and VLAN port configuration such as PVID, UVID. Currently we support following VLAN : - Admin : This is reffered as static.
  • Page 121 uttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed.
  • Page 122: Vlan Port Status

    4.6.5 VLAN Port Status This Page provides VLAN Port Staus. The VLAN Port Status screen in Figure 4-6-5 appears. Figure 4-6-5: VLAN Port Status for Static User Page Screenshot The Page includes the following fields: Object Description  Port The logical port for the settings contained in the same row. ...
  • Page 123: Private Vlan

     Untagged VLAN ID Shows UVID (untagged VLAN ID). Port's UVID determines the packet's behavior at the egress side.  Conflicts Shows status of Conflicts whether exists or Not. When a Volatile VLAN User requests to set VLAN membership or VLAN port configuration, the following conflicts can occur: ...
  • Page 124 Figure 4-6-6 Private VLAN Membership Configuration page screenshot...
  • Page 125: Port Isolation

    The page includes the following fields: Object Description  Delete To delete a private VLAN entry, check this box. The entry will be deleted during the next save.  Private VLAN ID Indicates the ID of this particular private VLAN. ...
  • Page 126 database servers on the inside segment, but are not allowed to communicate with each other For private VLANs to be applied, the switch must first be configured for standard VLAN operation When this is in place, one or more of the configured VLANs can be configured as private VLANs. Ports in a private VLAN fall into one of these two groups: ...
  • Page 127 This Page is used for enabling or disabling port isolation on ports in a Private VLAN. A port member of a VLAN can be isolated to other isolated ports on the same VLAN and Private VLAN. The Port Isolation screen in Figure 4-6-7 appears.
  • Page 128: Vlan Setting Example

    4.6.8 VLAN setting example:  Separate VLAN  802.1Q VLAN Trunk  Port Isolate 4.6.8.1 Two Separate 802.1Q VLANs The diagram shows how the Managed Switch handle Tagged and Untagged traffic flow for two VLANs. VLAN Group 2 and VLAN Group 3 are separated VLAN.
  • Page 129  Untagged packet entering VLAN 2 While [PC-1] transmit an untagged packet enters Port-1, the Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3. [PC-4],[PC-5] and [PC-6] received no packet. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet.
  • Page 130: Vlan Trunking Between Two 802.1Q Aware Switches

    VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-28 Figure 4-6-10: Change Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 Enable VLAN Tag for specific ports Link Type: Port-3 (VLAN-2) and Port-6 (VLAN-3) Change Port 3 Mode as Trunk, Selects Egress Tagging as Tag All and Types 2 in the Allowed VLANs column.
  • Page 131 other switches within the same VLAN group. The screen in Figure 4-6-12 appears. Figure 4-6-12: VLAN Trunking Diagram Setup steps Add VLAN Group Add two VLANs – VLAN 2 and VLAN 3 Type 1-3 in Allowed Access VLANs column, the 1-3 is including VLAN1 and 2 and 3. Figure 4-6-13: Add VLAN 2 and VLAN 3 Assign VLAN Member and PVID for each port : VLAN 2 : Port-1,Port-2 and Port-3...
  • Page 132 VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-48 Figure 4-6-14: Changes Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 For the VLAN ports connecting to the hosts, please refer to 4.6.10.1 examples. The following steps will focus on the VLAN Trunk port configuration.
  • Page 133: Port Isolate

    Figure 4-6-15: VLAN Overlap Port Setting & VLAN 1 – The Public Area Member Assign That is, although the VLAN 2 members: Port-1 to Port-3 and VLAN 3 members: Port-4 to Port-6 also belongs to VLAN 1. But with different PVID settings, packets form VLAN 2 or VLAN 3 is not able to access to the other VLAN. Repeat Steps 1 to 6, set up the VLAN Trunk port at the partner switch and add more VLANs to join the VLAN trunk, repeat Steps 1 to 3 to assign the Trunk port to the VLANs.
  • Page 134 Setup steps Assign Port Mode Set Port-1~Port-4 in Isolate port. Set Port5 and Port-6 in Promiscuous port. The screen in Figure 4-6-16 appears. Figure 4-6-17: The Configuration of Isolated and Promiscuous Port Assign VLAN Member : VLAN 1 : Port-5 and Port-6 VLAN 2 : Port-1,Port-2 ,Port-5 and Port-6...
  • Page 135 VLAN 3: Port-3~Port-6. The screen in Figure 4-6-18 appears. Figure 4-6-17: Private VLAN Port Setting...
  • Page 136: Mac-Based Vlan

    4.6.9 MAC-based VLAN The MAC-based VLAN enties can be configured here. This Page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This Page shows only static entries. The MAC-based VLAN screen in Figure 4-6-18 appears.
  • Page 137: Mac-Based Vlan Status

    : Click to add a new MAC-based VLAN entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately.
  • Page 138: Protocol-Based Vlan

    4.6.11 Protocol-based VLAN This Page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the switch. The Protocol-based VLAN screen in Figure 4-6-20 appears.
  • Page 139: Protocol-Based Vlan Membership

    For SNAP: Valid value in this case also is comprised of two different sub-values. a. OUI: OUI (Organizationally Unique Identifier) is value in format of xx-xx-xx where each pair (xx) in string is a hexadecimal value ranges from 0x00-0xff. b. PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP;...
  • Page 140 Figure 4-6-21: Group Name to VLAN Mapping Table Page Screenshot...
  • Page 141 The Page includes the following fields: Object Description  Delete To delete a Group Name to VLAN map entry, check this box. The entry will be deleted on the switch during the next Save  Group Name A valid Group Name is a string of atmost 16 characters which consists of a combination of alphabets (a-z or A-Z) and integers(0-9), no special character is allowed.
  • Page 142: Spanning Tree Protocol

    4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 143 STP communicates between switches on the network using Bridge Protocol Data Units (BPDUs). Each BPDU contains the following information:  The unique identifier of the switch that the transmitting switch currently believes is the root switch  The path cost to the root from the transmitting port ...
  • Page 144  Disabled – the port only responds to network management messages and must return to the blocking state first A port transitions from one state to another as follows:  From initialization (switch boot) to blocking  From blocking to listening or to disabled ...
  • Page 145 STP Operation Levels The Switch allows for two levels of operation: the switch level and the port level. The switch level forms a spanning tree consisting of links between one or more switches. The port level constructs a spanning tree consisting of groups of one or more ports. The STP operates in much the same way for both levels.
  • Page 146 The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value A combination of the User-set priority and 32768 + MAC Bridge Identifier(Not user the switch’s MAC address. configurable The Bridge Identifier consists of two parts: except by setting priority a 16-bit priority and a 48-bit Ethernet MAC below)
  • Page 147 Port priority Port cost Bridge Priority 32,768 User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority –...
  • Page 148 STP calculation of the most current Bridge and Port settings. Now, if switch A broadcasts a packet to switch C, then switch C will drop the packet at port 2 and the broadcast will end there. Setting-up STP using values other than the defaults, can be complex. Therefore, you are advised to keep the default factory settings and STP will automatically assign root bridges/ports and block loop connections.
  • Page 149: Stp System Configuration

    Figure 4-7-3: After Applying the STA Rules The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C.
  • Page 150 ‧ Extension – Multiple Spanning Tree Protocol (MSTP) : Defines an extension to RSTP to further develop the usefulness of virtual LANs (VLANs). This "Per-VLAN" Multiple Spanning Tree Protocol configures a separate Spanning Tree for each VLAN group and blocks all but one of the possible alternate paths within each Spanning Tree. The STP System Configuration screen in Figure 4-7-4 appears.
  • Page 151 Forwarding (used in STP compatible mode). Valid values are in the range 4 to 30 seconds -Default: -Minimum: The higher of 4 or [(Max. Message Age / 2) + 1] -Maximum:  The maximum age of the information transmitted by the Bridge when it is the Max Age Root Bridge.
  • Page 152: Bridge Status

    : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.7.3 Bridge Status This Page provides a status overview for all STP bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: The Bridge Status screen in Figure 4-7-5 appears.
  • Page 153: Cist Port Configuration

    4.7.4 CIST Port Configuration This Page allows the user to inspect the current STP CIST port configurations, and possibly change them as well. The CIST Port Configuration screen in Figure 4-7-6 appears. Figure 4-7-6 : STP CIST Port Configuration Page Screenshot The Page includes the following fields: Object Description...
  • Page 154 Valid values are in the range 1 to 200000000.  Controls the port priority. This can be used to control priority of ports having Priority identical port cost. (See above). Default: 128 Range: 0-240, in steps of 16  AdminEdge Controls whether the operEdge flag should start as beeing set or cleared.
  • Page 155 : Click to undo any changes made locally and revert to previously saved values. By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost according to the values shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set to 65,535.
  • Page 156: Msti Priorities

    4.7.5 MSTI Priorities This Page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-7-7 appears. Figure 4-7-7: MSTI Priority Page Screenshot The Page includes the following fields: Object Description ...
  • Page 157: Msti Configuration

    4.7.6 MSTI Configuration This Page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-7-8 appears. Figure 4-7-8: MSTI Configuration Page Screenshot The Page includes the following fields: Configuration Identification Object Description...
  • Page 158: Msti Ports Configuration

    MSTI Mapping Object Description  MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped.  VLANs Mapped The list of VLAN's mapped to the MSTI. The VLANs must be separated with comma and/or space.
  • Page 159 Figure 4-7-10 : MST1 MSTI Port Configuration Page Screenshot The Page includes the following fields: MSTx MSTI Port Configuration Object Description  Port The switch port number of the corresponding STP CIST (and MSTI) port.  Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values.
  • Page 160: Port Status

    values are in the range 1 to 200000000.  Priority Controls the port priority. This can be used to control priority of ports having identical port cost. Buttons : Click to set MSTx configuration : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.7.8 Port Status This Page displays the STP CIST port status for port physical ports in the currently selected switch.
  • Page 161: Port Statistics

    ■ AlternatePort ■ BackupPort ■ RootPort ■ DesignatedPort ■ Disable  The current STP port state of the CIST port . The port state can be one of the CIST State following values: ■ Disabled ■ Learning ■ Forwarding  Uptime The time since the bridge port was last initialized.
  • Page 162  The number of legacy STP Configuration BPDU's received/transmitted on the port.  The number of (legacy) Topology Change Notification BPDU's received/transmitted on the port.  The number of unknown Spanning Tree BPDU's received (and discarded) on the Discarded Unknown port.
  • Page 163: Multicast

    4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing.
  • Page 164 Figure 4-8-2: Multicast Flooding...
  • Page 165 Figure 4-8-3: IGMP Snooping Multicast Stream Control IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
  • Page 166 Specific Group Membership Query (if Group Address is 0x11 Present) 0x16 Membership Report (version 2) 0x17 Leave a Group (version 2) 0x12 Membership Report (version 1) IGMP packets enable multicast routers to keep track of the membership of multicast groups, on their respective sub networks. The following outlines what is communicated between a multicast router and a multicast group member using IGMP.
  • Page 167 Figure 4-8-4: IGMP State Transitions  IGMP Querier – A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
  • Page 168: Profile Table

    4.8.2 Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each. The Profile Table screen in Figure 4-8-5 appears.
  • Page 169: Address Entry

    profile by using the following buttons: : List the rules associated with the designated profile. : Adjust the rules associated with the designated profile. Buttons : Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save”. : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
  • Page 170: Igmp Snooping Configuration

     End Address The ending IPv4/IPv6 Multicast Group Address that will be used as an address range. Buttons Click to add new address range. Specify the name and configure the addresses. Click "Save ”. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. Refreshes the displayed table starting from the input fields.
  • Page 171 Figure 4-8-7: IGMP Snooping Configuration Page Screenshot The Page includes the following fields: Object Description  Enable the Global IGMP Snooping. Snooping Enabled  Enable unregistered IPMCv4 traffic flooding. Unregistered IPMCv4 The flooding control takes effect only when IGMP Snooping is enabled. Flooding Enabled When IGMP Snooping is disabled, unregistered IPMCv4 traffic flooding is always active in spite of this setting.
  • Page 172 unnecessary leave messages to the router side.  Proxy Enable Enable IGMP Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the router side.  Router Port Specify which ports act as IGMP router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier.
  • Page 173: Igmp Snooping Vlan Configuration

    4.8.5 IGMP Snooping VLAN Configuration Each Page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table.
  • Page 174 IGMPv2, Forced IGMPv3. Default compatibility value is IGMP-Auto.  PRI (PRI) Priority of Interface. It indicates the IGMP control frame priority level generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0 ...
  • Page 175: Igmp Snooping Port Group Filtering

    Click "Save". The specific IGMP VLAN starts working after the corresponding static VLAN is also created. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.6 IGMP Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users.
  • Page 176: Igmp Snooping Status

    Object Description  The logical port for the settings. Port  Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 177: Igmp Group Information

    The Page includes the following fields: Object Description  The VLAN ID of the entry. VLAN ID  Working Querier Version currently. Querier Version  Working Host Version currently. Host Version  Show the Querier status is "ACTIVE" or "IDLE". Querier Status ...
  • Page 178: Igmpv3 Information

    Figure 4-8-9: IGMP Snooping Groups Information Page Screenshot The Page includes the following fields: Object Description  VLAN ID of the group. VLAN ID  Groups Group address of the group displayed.  Port Members Ports under this group. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds.
  • Page 179 The IGMPv3 Information screen in Figure 4-8-12 appears. Figure 4-8-12: IGMP SSM Information Page Screenshot The Page includes the following fields: Object Description  VLAN ID VLAN ID of the group.  Group Group address of the group displayed.  Port Switch port number.
  • Page 180: Mld Snooping Configuration

    4.8.10 MLD Snooping Configuration This Page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-8-13 appears. Figure 4-8-13: MLD Snooping Configuration Page Screenshot The Page includes the following fields: Object Description  Enable the Global MLD Snooping. Snooping Enabled ...
  • Page 181: Mld Snooping Vlan Configuration

     MLD SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range.  Leave Proxy Enable Enable MLD Leave Proxy. This feature can be used to avoid forwarding unnecessary leave messages to the router side.
  • Page 182 The Page includes the following fields: Description Object  Delete Check to delete the entry. The designated entry will be deleted during the next save.  VLAN ID The VLAN ID of the entry.  MLD Snooping Enable Enable the per-VLAN MLD Snooping. Up to 32 VLANs can be selected for MLD Snooping.
  • Page 183: Mld Snooping Port Group Filtering

    Buttons : Refreshes the displayed table starting from the "VLAN" input fields. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed. :Click to add new MLD VLAN.
  • Page 184 Figure 4-8-15: MLD Snooping Port Group Filtering Configuration Page Screenshot...
  • Page 185: Mld Snooping Status

    The Page includes the following fields: Object Description  Port The logical port for the settings.  Filtering Group Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 186: Mld Group Information

    The Page includes the following fields: Object Description  The VLAN ID of the entry. VLAN ID  Working Querier Version currently. Querier Version  Working Host Version currently. Host Version  Shows the Querier status is "ACTIVE" or "IDLE". Querier Status "DISABLE"...
  • Page 187: Mldv2 Information

    The "Start from VLAN", and "group" input fields allow the user to select the starting point in the MLD Group Table. The MLD Groups Informatino screen in Figure 4-8-17 appears. Figure 4-8-17: MLD Snooping Groups Information Page Screenshot The Page includes the following fields: Object Description ...
  • Page 188 Figure 4-8-18: MLD SSM Information Page Screenshot The Page includes the following fields: Object Description  VLAN ID VLAN ID of the group.  Group Group address of the group displayed.  Port Switch port number.  Indicates the filtering mode maintained per (VLAN ID, port number, Group Mode Address) basis.
  • Page 189: Mvr (Multicaset Vlan Registration)

    4.8.16 MVR (Multicaset VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver ■...
  • Page 190 Figure 4-8-19: MVR Configuration Page Screenshot The Page includes the following fields: Object Description  MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full.
  • Page 191 Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports.  MVR Name MVR Name is an optional attribute to indicate the name of the specific MVR VLAN. Maximum length of the MVR VLAN Name string is 16. MVR VLAN Name can only contain alphabets or numbers.
  • Page 192: Mvr Status

    source ports. Subscribers cannot be directly connected to source ports.  Receiver: Configure a port as a receiver port if it is a subscriber port and should only receive multicast data. It does not receive data unless it becomes a member of the multicast group by issuing IGMP/MLD messages. Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports.
  • Page 193: Mvr Groups Information

     IGMPv1 Joins The number of Received IGMPv1 Joins. Received  IGMPv2/MLDv1 The number of Received IGMPv2 Joins and MLDv1 Reports, respectively. Reports Received  IGMPv3/MLDv2 The number of Received IGMPv1 Joins and MLDv2 Reports, respectively. Reports Received  IGMPv2/MLDv1 Leaves The number of Received IGMPv2 Leaves and MLDv1 Dones, respectively.
  • Page 194: Mvr Sfm Information

    Object Description  VLAN VLAN ID of the group.  Groups Group ID of the group displayed.  Port Members Ports under this group. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds. : Refreshes the displayed table starting from the input fields. : Updates the table starting from the first entry in the MVR Channels (Groups) Information Table.
  • Page 195 The Page includes the following fields: Object Description  VLAN ID VLAN ID of the group.  Group Group address of the group displayed.  Port Switch port number.  Mode Indicates the filtering mode maintained per (VLAN ID, port number, Group Address) basis.
  • Page 196: Quality Of Service

    4.9 Quality of Service 4.9.1 Understanding QoS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic.
  • Page 197: Port Policing

    Create a QoS profile which associates a service level and a classifier. Apply a QoS profile to a port(s). 4.9.2 Port Policing This Page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-9-1 appears.
  • Page 198: Port Classification

    4.9.3 Port Classification This Page allows you to configure the basic QoS Ingress Classification settings for all switch ports. The Port Classification screen in Figure 4-9-2 appears. Figure 4-9-2 : QoS Ingress Port Classification Page Screenshot The Page includes the following fields: Object Description ...
  • Page 199 CoS is shown in parentheses after the configured default CoS.  DPL Controls the default drop precedence level. All frames are classified to a drop precedence level. If the port is VLAN aware and the frame is tagged, then the frame is classified to a DPL that is equal to the DEI value in the tag.
  • Page 200: Port Scheduler

    4.9.4 Port Scheduler This Page provides an overview of QoS Egress Port Schedulers for all switch ports. The Port Scheduler screen in Figure 4-9-3 appears. Figure 4-9-3: QoS Egress Port Schedule Page Screenshot The Page includes the following fields: Object Description ...
  • Page 201: Port Shaping

    4.9.5 Port Shaping This Page provides an overview of QoS Egress Port Shapers for all switch ports. The Port Shapping screen in Figure 4-9-4 appears. Figure 4-9-4: QoS Egress Port Shapers Page Screenshot The Page includes the following fields: Object Description ...
  • Page 202: Qos Egress Port Schedule And Shapers

    4.9.5.1 QoS Egress Port Schedule and Shapers The Port Scheduler and Shapers for a specific port are configured on this Page. The QoS Egress Port Schedule and Shaper sscreen in Figure 4-9-5 appears. Figure 4-9-5: QoS Egress Port Schedule and Shapers Page Screenshot The Page includes the following fields: Object Description...
  • Page 203: Port Tag Remarking

     Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth.  Queue Scheduler Controls the weight for this queue. This value is restricted to 1-100. This parameter is only shown if "Scheduler Weight Mode" is set to "Weighted". The default value is "17".
  • Page 204 Figure 4-9-6: QoS Egress Port Tag Remarking Page Screenshot...
  • Page 205: Qos Egress Port Tag Remarking

    The Page includes the following fields: Object Description  Port The logical port for the settings contained in the same row. Click on the port number in order to configure tag remarking. For more detail, please refer to chapter 4.9.6.1. ...
  • Page 206: Port Dscp

    : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.9.7 Port DSCP This Page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-9-8 appears.
  • Page 207  Classify Classification for a port have 4 different values.  Disable: No Ingress DSCP Classification.  DSCP=0: Classify if incoming (or translated if enabled) DSCP is 0.  Selected: Classify only selected DSCP for which classification is enabled as specified in DSCP Translation window for the specific DSCP. ...
  • Page 208: Dscp-Based Qos

    4.9.8 DSCP-based QoS This Page allows you to configure the basic QoS DSCP-based QoS Ingress Classification settings for all switches. The DSCP-based QoS screen in Figure 4-9-9 appears. Figure 4-9-9: DSCP-based QoS Ingress Classification Page Screenshot The Page includes the following fields: Object Description ...
  • Page 209  QoS Class QoS Class value can be any of (0-7)  Drop Precedence Level (0-1)
  • Page 210: Dscp Translation

    4.9.9 DSCP Translation This Page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. The DSCP Translation screen in Figure 4-9-10 appears. Figure 4-9-10: DSCP Translation Page Screenshot The Page includes the following fields: Object Description...
  • Page 211: Dscp Classification

    for QoS class and DPL map. There are two configuration parameters for DSCP Translation – ■ Translate ■ Classify  Translate DSCP at Ingress side can be translated to any of (0-63) DSCP values.  Classify Click to enable Classification at Ingress side. ...
  • Page 212: Qos Control List

    Object Description  QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters.  DPL Actual Drop Precedence Level.  Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS DSCP Class and DPL value Buttons...
  • Page 213 Broadcast: Only Broadcast MAC addresses are allowedd. ■ The default value is 'Any'.  SMAC Displays the OUI field of Source MAC address, i.e. first three octet (byte) of MAC address.  Tag Type Indicates tag type. Possible values are: Any: Match tagged and untagged frames.
  • Page 214: Qos Control Entry Configuration

    4.9.11.1 QoS Control Entry Configuration The QCE Configuration screen in Figure 4-9-13 appears. Figure 4-9-13: QCE Configuration Page Screenshot The Page includes the following fields: Object Description  Check the checkbox button in case you what to make any port member of the Port Members QCL entry.
  • Page 215 or range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any' DEI Drop Eligible Indicator: Valid value of DEI can be any of values ■ between 0, 1 or 'Any' Frame Type Frame Type can have any of the following values ■ Ethernet SNAP IPv4...
  • Page 216: Qcl Status

    Source IP IPv6 source address: (a.b.c.d) or 'Any', 32 LS bits DSCP Diffserv Code Point value(DSCP): It can be specific value, range of value or 'Any'. DSCP values are in the range 0-63 including BE, CS1-CS7, EF or AF11-AF43 Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP Dport Destination TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP...
  • Page 217 The Page includes the following fields: Object Description  User Indicates the QCL user.  Indicates the index of QCE. QCE#  Port Indicates the list of ports configured with the QCE.  Indicates the type of frame to look for incomming frames. Possible frame types Frame Type are: Any: The QCE will match all frame type.
  • Page 218: Storm Control Configuration

    'yes'. : Click to refresh the Page. 4.9.13 Storm Control Configuration Storm control for the switch is configured on this Page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
  • Page 219  Controls whether the storm control is enabled on this switch port. Enable  Rate Controls the rate for the storm control. The default value is 500. This value is restricted to 100-1000000 when the "Unit" is "kbps" or "fps", and it is restricted to 1-13200 when the "Unit"...
  • Page 220: Wred

    4.9.14 WRED This page allows you to configure the Random Early Detection (RED) settings for queue 0 to 5. RED cannot be applied to queue 6 and 7. Through different RED configuration for the queues (QoS classes) it is possible to obtain Weighted Random Early Detection (WRED) operation between queues.
  • Page 221 This value is restricted to 0-100. RED Drop Probability Function The following illustration shows the drop probability function with associated parameters. Max. DP 1-3 is the drop probability when the average queue filling level is 100%. Frames marked with Drop Precedence Level 0 are never dropped.
  • Page 222: Qos Statistics

    4.9.15 QoS Statistics This Page provides statistics for the different queues for all switch ports. The QoS Statistics screen in Figure 4-9-17 appears. Figure 4-9-17: Queuing Counters Page Screenshot The Page includes the following fields: Object Description  The logical port for the settings contained in the same row. Port ...
  • Page 223: Voice Vlan Configuration

    4.9.16 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic. It is recommended that there be two VLANs on a port - one for voice, one for data. Before connecting the IP device to the switch, the IP phone should configure the voice VLAN ID correctly.
  • Page 224 The Page includes the following fields: Object Description  Mode Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Possible modes are: Enabled: Enable Voice VLAN mode operation. ■...
  • Page 225  Port Discovery Indicates the Voice VLAN port discovery protocol. It will only work when auto detect mode is enabled. We should enable LLDP feature before configuring Protocol discovery protocol to "LLDP" or "Both". Changing the discovery protocol to "OUI" or "LLDP"...
  • Page 226: Voice Vlan Oui Table

    4.9.17 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this Page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-9-19 appears. Figure 4-9-19: Voice VLAN OUI Table Page Screenshot The Page includes the following fields: Object...
  • Page 227 Buttons Click to add a new access management entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 228: Access Control Lists

    4.10 Access Control Lists ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL.
  • Page 229 EType: The ACE will match Ethernet Type frames. Note that an ■ Ethernet Type based ACE will not get matched by IP and ARP frames. ARP: The ACE will match ARP/RARP frames. ■ IPv4: The ACE will match all IPv4 frames. ■...
  • Page 230: Access Control List Configuration

    4.10.2 Access Control List Configuration This Page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list.
  • Page 231 Permit: Frames matching the ACE may be forwarded and learned. ■ Deny: Frames matching the ACE are dropped. ■  Rate Limiter Indicates the rate limiter number of the ACE. The allowed range is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled. ...
  • Page 232: Ace Configuration

    4.10.3 ACE Configuration Configure an ACE (Access Control Entry) on this Page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected.
  • Page 233 The allowed range is 0x0 to 0xff.  Select the frame type for this ACE. These frame types are mutually exclusive. Frame Type Any: Any frame can match this ACE. ■ Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE ■...
  • Page 234  MAC Parameters Object Description  (Only displayed when the frame type is Ethernet Type or ARP.) SMAC Filter Specify the source MAC filter for this ACE. Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ■ Specific: If you want to filter a specific source MAC address with this ACE, ■...
  • Page 235 specified (tag priority is "don't-care".)  ARP Parameters The ARP parameters can be configured when Frame Type "ARP" is selected. Object Description  Specify the available ARP/RARP opcode (OP) flag for this ACE. ARP/RARP Any: No ARP/RARP OP flag is specified. (OP is "don't-care".) ■...
  • Page 236  Target IP Mask When "Network" is selected for the target IP filter, you can enter a specific target IP mask in dotted decimal notation.  ARP Sender MAC Specify whether frames can hit the action according to their sender hardware address field (SHA) settings.
  • Page 237 choose this value. A field for entering an IP protocol filter appears. ICMP: Select ICMP to filter IPv4 ICMP protocol frames. Extra fields for ■ defining ICMP parameters will appear. These fields are explained later in this help file. UDP: Select UDP to filter IPv4 UDP protocol frames. Extra fields for ■...
  • Page 238 Network: Source IP filter is set to Network. Specify the source IP address ■ and source IP mask in the SIP Address and SIP Mask fields that appear.  SIP Address When "Host" or "Network" is selected for the source IP filter, you can enter a specific SIP address in dotted decimal notation.
  • Page 239 specific value. The allowed range is 0 to 255. A frame that hits this ACE matches this IPv6 protocol value.  Specify the source IPv6 filter for this ACE. SIP Filter Any: No source IPv6 filter is specified. (Source IPv6 filter is "don't-care".) ■...
  • Page 240 "don't-care"). Specific: If you want to filter a specific ICMP code filter with this ACE, you ■ can enter a specific ICMP code value. A field for entering an ICMP code value appears.  When "Specific" is selected for the ICMP code filter, you can enter a specific ICMP Code Value ICMP code value.
  • Page 241  When "Specific" is selected for the TCP/UDP destination filter, you can enter a TCP/UDP Destination specific TCP/UDP destination value. The allowed range is 0 to 65535. A frame Number that hits this ACE matches this TCP/UDP destination value.  TCP/UDP Destination When "Range"...
  • Page 242  Ethernet Type Parameters The Ethernet Type parameters can be configured when Frame Type "Ethernet Type" is selected. Object Description  Specify the Ethernet type filter for this ACE. EtherType Filter Any: No EtherType filter is specified (EtherType filter status is ■...
  • Page 243: Acl Ports Configuration

    4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The ACL Ports Configuration screen in Figure 4-10-4 appears. Figure 4-10-4: ACL Ports Configuration Page Screenshot The Page includes the following fields: Object Description...
  • Page 244 value is "Disabled".  Logging Specify the logging operation of this port. The allowed values are: Enabled: Frames received on the port are stored in the System Log. ■ Disabled: Frames received on the port are not logged. ■ The default value is "Disabled". Please note that the System Log memory size and logging rate are limited.
  • Page 245: Acl Rate Limiter Configuration

    4.10.5 ACL Rate Limiter Configuration Configure the rate limiter for the ACL of the switch. The ACL Rate Limiter Configuration screen in Figure 4-10-5 appears. Figure 4-10-5: ACL Rate Limiter Configuration Page Screenshot The Page includes the following fields: Object Description ...
  • Page 246: Authentication

    4.11 Authentication This section is to control the access of the Managed Switch, includes the user access and management control. The Authentication section contains links to the following main topics:  IEEE 802.1X Port-Based Network Access Control  MAC-Based Authentication ...
  • Page 247: Understanding Ieee 802.1X Port-Based Authentication

    3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.
  • Page 248 Figure 4-11-1  Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) Authentication server—performs the actual authentication of the client.
  • Page 249 header is removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the client.  Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
  • Page 250: Authentication Configuration

     Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to flow normally.
  • Page 251 Figure 4-11-3: Authentication Method Configuration Page Screenshot...
  • Page 252: Network Access Server Configuration

    The Page includes the following fields: Object Description  Client The management client for which the configuration below applies.  Authentication Method Authentication Method can be set to one of the following values: None: authentication is disabled and login is not possible. ■...
  • Page 253 ure 4-11-4: Network Access Server Configuration Page Screenshot The Page includes the following fields: System Configuration Object Description  Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. ...
  • Page 254 after the interval specified by the Reauthentication Period. Reauthentication for Enabled 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached. For MAC-based ports, reauthentication is only useful if the RADIUS server configuration has changed.
  • Page 255 ■ Single 802.1X ■ Multi 802.1X ■ MAC-Based Auth. If a client is denied access - either because the RADIUS server denies the client access or because the RADIUS server request times out (according to the timeout specified on the "Configuration→Security→AAA" Page) - the client is put on hold in the Unauthorized state.
  • Page 256 The "Guest VLAN Enabled" checkbox provides a quick way to globally enable/disable Guest VLAN functionality. When checked, the individual ports' ditto setting determines whether the port can be moved into Guest VLAN. When unchecked, the ability to move to the Guest VLAN is disabled for all ports. ...
  • Page 257 authentication. Force Unauthorized In this mode, the switch will send one EAPOL Failure frame when the port link comes up, and any client on the port will be disallowed network access. Port-based 802.1X In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the authentication server.
  • Page 258 EAPOL Start frame retransmission rate. Single 802.1X In port-based 802.1X authentication, once a supplicant is successfully authenticated on a port, the whole port is opened for network traffic. This allows other clients connected to the port (for instance through a hub) to piggy-back on the successfully authenticated client and get network access even though they really aren't authenticated.
  • Page 259 supplicants that might be on the port. The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality. MAC-based Auth. Unlike port-based 802.1X, MAC-based authentication is not a standard, but merely a best-practices method adopted by the industry.
  • Page 260 supplicant is successfully authenticated. If present and valid, traffic received on the supplicant's port will be classified to the given QoS Class. If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a QoS Class or it's invalid, or the supplicant is otherwise no longer present on the port, the port's QoS Class is immediately reverted to the original QoS Class (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned).
  • Page 261 For trouble-shooting VLAN assignments, use the "Monitor→VLANs→VLAN Membership and VLAN Port" Pages. These Pages show which modules have (temporarily) overridden the current Port VLAN configuration. RADIUS attributes used in identifying a VLAN ID: RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an Access-Accept packet.
  • Page 262 transmission of EAPOL Request Identity frames is configured with EAPOL Timeout. If Allow Guest VLAN if EAPOL Seen is enabled, the port will now be placed in the Guest VLAN. If disabled, the switch will first check its history to see if an EAPOL frame has previously been received on the port (this history is cleared if the port link goes down or the port's Admin State is changed), and if not, the port will be placed in the Guest VLAN.
  • Page 263 port and will not cause the clients to get temporarily unauthorized. Reinitialize: Forces a reinitialization of the clients on the port and thereby ■ a reauthentication immediately. The clients will transfer to the unauthorized state while the reauthentication is in progress. Buttons Click to refresh the Page.
  • Page 264: Network Access Overview

    4.11.4 Network Access Overview This Page provides an overview of the current NAS port states for the selected switch. The Network Access Overview screen in Figure 4-11-5 appears. Figure 4-11-5: Network Access Server Switch Status Page Screenshot The Page includes the following fields: Object Description ...
  • Page 265: Network Access Statistics

    is not overridden by NAS. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID. Read more about RADIUS-assigned VLANs here. If the port is moved to the Guest VLAN, "(Guest)" is appended to the VLAN ID. Read more about Guest VLANs here.
  • Page 266  QoS Class The QoS class assigned by the RADIUS server. The field is blank if no QoS class is assigned.  Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS.
  • Page 267 mesRx frames that have been received by the switch. dot1xAuthEapolLogoffFr The number of valid EAPOL Logoff amesRx Logoff frames that have been received by the switch. dot1xAuthInvalidEapolF The number of EAPOL Invalid Type ramesRx frames that have been received by the switch in which the frame type is not recognized.
  • Page 268 ■ MAC-based Auth. Direction Name IEEE Name Description dot1xAuthBackendAcce Access 802.1X-based: ssChallenges Counts the number of times Challenges that the switch receives the first request from the backend server following the first response from the supplicant. Indicates that the backend server has communication with the switch.
  • Page 269 Fails Counts the number of times Failures that the switch receives a failure message. This indicates that the supplicant/client has not authenticated to the backend server. dot1xAuthBackendResp Responses 802.1X-based: onses Counts the number of times that the switch attempts to send a supplicant's first response packet to the backend server.
  • Page 270 rameSource Address The VLAN ID on which the last frame from the VLAN ID last supplicant/client was received. dot1xAuthLastEapolF Version 802.1X-based: rameVersion The protocol version number carried in the most recently received EAPOL frame. MAC-based: Not applicable. Identity 802.1X-based: The user name (supplicant identity) carried in the most recently received Response Identity EAPOL frame.
  • Page 271 Selected Counters Object Description  Selected Counters The Selected Counters table is visible when the port is one of the following administrative states: ■ Multi 802.1X ■ MAC-based Auth. The table is identical to and is placed next to the Port Counters table, and will be empty if no MAC address is currently selected.
  • Page 272: Radius

    : This button is available in the following modes: • Force Authorized • Force Unauthorized • Port-based 802.1X • Single 802.1X Click to clear the counters for the selected port. : This button is available in the following modes: • Multi 802.1X •...
  • Page 273 Figure 4-11-7: RADIUS Server Configuration Page Screenshot The Page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description  Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request.
  • Page 274  Key The secret key - up to 63 characters long - shared between the RADIUS server and the switch.  NAS-IP-Address The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used. ...
  • Page 275: Tacacs

    : Click to undo the addition of the new server. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.11.7 TACACS+ This Page allows you to configure the TACACS+ Servers. The TACACS+ Configuration screen in Figure 4-11-8 appears.
  • Page 276 trying to contact a server that it has already determined as dead. Setting the Deadtime to a value greater than 0 (zero) will enable this feature, but only if more than one server has been configured.  Key The secret key - up to 63 characters long - shared between the TACACS+ server and the switch.
  • Page 277: Radius Overview

    4.11.8 RADIUS Overview This Page provides an overview of the status of the RADIUS servers configurable on the Authentication configuration Page. The RADIUS Authentication/Accounting Server Overview screen in Figure 4-11-9 appears. Figure 4-11-9: RADIUS Authentication/Accounting Server Overview Page Screenshot The Page includes the following fields: RADIUS Authentication Server Status Overview Object Description...
  • Page 278 been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses. This state is only reachable when more than one server is enabled. RADIUS Accounting Server Status Overview Object Description ...
  • Page 279: Radius Details

    4.11.9 RADIUS Details This Page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen in Figure 4-11-10 appears. Figure 4-11-10: RADIUS Authentication/Accounting for Server Overview Page Screenshot The Page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
  • Page 280 counters. Direction Name RFC4668 Name Description radiusAuthClientExtA The number of RADIUS Access ccessAccepts Access-Accept packets (valid Accepts or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access Rejects ccessRejects Access-Reject packets (valid or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access...
  • Page 281 dropped for some other reason. radiusAuthClientExtP The number of RADIUS Packets acketsDropped packets that were received Dropped from the server on the authentication port and dropped for some other reason. radiusAuthClientExtA The number of RADIUS Access ccessRequests Access-Request packets sent Requests to the server.
  • Page 282 counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout.  Other Info This section contains information about the state of the server and the latest round-trip time. Name RFC4668 Name Description...
  • Page 283 between the backend servers to show details for. Object Description  Packet Counters RADIUS accounting server packet counter. There are five receive and four transmit counters. Direction Name RFC4670 Name Description radiusAccClientExt The number of RADIUS Responses Responses packets (valid or invalid) received from the server.
  • Page 284 radiusAccClientExt The number of RADIUS Retransmissions Retransmissions packets retransmitted to the RADIUS accounting server. radiusAccClientExt The number of RADIUS Pending PendingRequests packets destined for the server Requests that have not yet timed out or received a response. This variable is incremented when a Request is sent and decremented due to receipt of a Response, timeout, or...
  • Page 285: Windows Platform Radius Server Configuration

    accounting attempts.  Dead (X seconds left): Accounting attempts were made to this server, but it did not reply within the configured timeout. The server has temporarily been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses.
  • Page 286 Figure 4-11-11: RADIUS Server Configuration Screenshot...
  • Page 287 Add New RADIUS Cleint on the Windows 2003 server Figure 4-11-12: Windows Server – Add New RADIUS Client Setting Assign the client IP address to the Managed Switch...
  • Page 288 Figure 4-11-13: Windows Server RADIUS Server Setting The shared secret key should be as same as the key configured on the Managed Switch. Figure 4-11-14: Windows Server RADIUS Server Setting...
  • Page 289 Configure ports attribute of 802.1X, the same as “802.1X Port Configuration”. Figure 4-11-15: 802.1x Port Configuration Create user data. The establishment of the user data needs to be created on the Radius Server PC. For example, the Radius Server founded on Win2003 Server, and then: Figure 4-11-16: Windows 2003 AD Server Setting Path Enter ”...
  • Page 290 Figure 4-11-17: Add User Properties Screen Figure 4-11-18: Add User Properties Screen...
  • Page 291: Client Configuration

    Set the Port Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is an uplink port that is connected to another switch. Or once the 802.1X starts to work, the switch might not be able to access the RADIUS server. 4.11.11 802.1X Client Configuration Windows XP is originally 802.1X support.
  • Page 292 Select “Authentication” tab. Select “Enable network access control using IEEE 802.1X” to enable 802.1x authentication. Select “MD-5 Challenge” from the drop-down list box for EAP type. Figure 4-11-20 Click “OK”. When client has associated with the Managed Switch, a user authentication notice appears in system tray. Click on the notice to continue.
  • Page 293 Figure 4-11-21: Windows Client Popup Login Request Message Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process. Figure 4-11-22...
  • Page 294: Security

    4.12 Security This section is to control the access of the Managed Switch, includes the user access and management control. The Security Page contains links to the following main topics:  Port Limit Control  Access Management  HTTPs / SSH ...
  • Page 295 Figure 4-12-1: Port Limit Control Configuration Overview Page Screenshot The Page includes the following fields: System Configuration Object Description  Mode Indicates if Limit Control is globally enabled or disabled on the switchstack. If globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled.
  • Page 296  Aging Period If Aging Enabled is checked, then the aging period is controlled with this input. If other modules are using the underlying port security for securing MAC addresses, they may have other requirements to the aging period. The underlying port security will use the shorter requested aging period of all modules that use the functionality.
  • Page 297 available MAC addresses.  Action If Limit is reached, the switch can take one of the following actions:  None: Do not allow more than Limit MAC addresses on the port, but take no further action.  Trap: If Limit + 1 MAC addresses is seen on the port, send an SNMP trap. If Aging is disabled, only one SNMP trap will be sent, but with Aging enabled, new SNMP traps will be sent everytime the limit gets exceeded.
  • Page 298 non-committed changes will be lost.
  • Page 299: Access Management

    Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values. : Click to refresh the Page. Note that non-committed changes will be lost. 4.12.2 Access Management Configure access management table on this Page. The maximum entry number is 16. If the application's type match any one of the access management entries, it will allow access to the switch.
  • Page 300: Access Management Statistics

    host IP address matched the entry.  SNMP Indicates the host can access the switch from SNMP interface that the host IP address matched the entry.  TELNET/SSH Indicates the host can access the switch from TELNET/SSH interface that the host IP address matched the entry.
  • Page 301 Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. : Clears all statistics.
  • Page 302: Https

    4.12.4 HTTPs Configure HTTPS on this Page. The HTTPS Configuration screen in Figure 4-12-4 appears. Figure 4-12-4: HTTPS Configuration Screen Page Screenshot The Page includes the following fields: Object Description  Mode Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection.
  • Page 303: Port Security Status

    port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it. For a MAC address to be set in the forwarding state, all enabled user modules must unanimously agree on allowing the MAC address to forward.
  • Page 304 Figure 4-12-6: Port Security Status Screen Page Screenshot The Page includes the following fields: User Module Legend The legend shows all user modules that may request Port Security services. Object Description  User Module Name The full name of a module that may request Port Security services. ...
  • Page 305 Object Description  Port The port number for which the status applies. Click the port number to see the status for this particular port.  Users Each of the user modules has a column that shows whether that module has enabled Port Security or not.
  • Page 306: Port Security Detail

    4.12.7 Port Security Detail This Page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
  • Page 307: Dhcp Snooping

    4.12.8 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. Configure DHCP Snooping on this Page. The DHCP Snooping Configuration screen in Figure 4-12-8 appears.
  • Page 308 Figure 4-12-8: DHCP Snooping Configuration Screen Page Screenshot The Page includes the following fields: Object Description  Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are:  Enabled: Enable DHCP snooping mode operation. When enable DHCP snooping mode operation, the request DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports.
  • Page 309: Snooping Table

    : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.12.9 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses.
  • Page 310 Figure 4-12-10: IP Source Guard Configuration Screen Page Screenshot The Page includes the following fields: Object Description  Mode of IP Source Enable the Global IP Source Guard or disable the Global IP Source Guard. All configured ACEs will be lost when the mode is enabled. Guard Configuration ...
  • Page 311: Ip Source Guard Static Table

    that are matched in static entries on the specific port. Buttons : Click to translate all dynamic entries to static entries. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.12.11 IP Source Guard Static Table This Page provides Static IP Source Guard Table.
  • Page 312: Arp Inspection

    4.12.12 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT.
  • Page 313 The Page includes the following fields: Object Description  Mode of ARP Inspection Enable the Global ARP Inspection or disable the Global ARP Inspection. Configuration  Port Mode Configuration Specify ARP Inspection is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, ARP Inspection is enabled on this given port.
  • Page 314: Arp Inspection Static Table

    4.12.13 ARP Inspection Static Table This Page provides Static ARP Inspection Table. The Static ARP Inspection Table screen in Figure 4-12-13 appears. Figure 4-12-13: Static ARP Inspection Table Screen Page Screenshot The Page includes the following fields: Object Description  Delete Check to delete the entry.
  • Page 315: Address Table

    4.13 Address Table Switching of frames is based upon the DMAC address contained in the frame. The Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ). This table contains both static and dynamic entries.
  • Page 316 Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description  Disable Automatic Enables/disables the the automatic aging of dynamic entries Aging  Aging Time The time after which a learned entry is discarded. By default, dynamic entries are removed from the MAC after 300 seconds.
  • Page 317: Mac Address Table Status

    Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.13.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this Page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address.
  • Page 318: Dynamic Arp Inspection Table

    The Page includes the following fields: Object Description  Indicates whether the entry is a static or dynamic entry. Type  The VLAN ID of the entry. VLAN  The MAC address of the entry. MAC Address  The ports that are members of the entry. Port Members Buttons Auto-refresh...
  • Page 319: Dynamic Ip Source Guard Table

    Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table. The "Start from port address", "VLAN", "MAC address" and "IP address" input fields allow the user to select the starting point in the Dynamic ARP Inspection Table.
  • Page 320 Figure 4-13-4: Dynamic IP Source Guard Table Screenshot Navigating the ARP Inspection Table Each Page shows up to 99 entries from the Dynamic IP Source Guard table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Dynamic IP Source Guard Table.
  • Page 321 Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Refreshes the displayed table starting from the "Start from MAC address" and "VLAN" input fields. : Flushes all dynamic entries. Updates the table starting from the first entry in the MAC Table, i.e. the entry with the lowest VLAN ID and MAC address.
  • Page 322: Lldp

    4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
  • Page 323 Figure 4-14-1: LLDP Configuration Page Screenshot The Page includes the following fields: LLDP Parameters Object Description  The switch is periodically transmitting LLDP frames to its neighbors for having the Tx Interval network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value.
  • Page 324  The switch port number of the logical LLDP port. Port  Select LLDP mode. Mode  Rx only The switch will not send out LLDP information, but LLDP information from neighbor units is analyzed.  Tx only The switch will drop LLDP information received from neighbors, but will send out LLDP information.
  • Page 325: Lldp Med Configuration

     Optional TLV: When checked the "system description" is included in LLDP System Description information transmitted.  System Capabilites Optional TLV: When checked the "system capability" is included in LLDP information transmitted.  Management Address Optional TLV: When checked the "management address" is included in LLDP information transmitted.
  • Page 326 The Page includes the following fields: Fast start repeat count Object Description  Rapid startup and Emergency Call Service Location Identification Discovery of Fast start repeat count endpoints is a critically important aspect of VoIP systems in general. In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the...
  • Page 327 Object Description  Latitude Latitude SHOULD be normalized to within 0-90 degrees with a maximum of 4 digits. It is possible to specify the direction to either North of the equator or South of the equator.  Longitude Longitude SHOULD be normalized to within 0-180 degrees with a maximum of 4 digits.
  • Page 328 or US.  State National subdivisions (state, canton, region, province, prefecture).  County County, parish, gun (Japan), district.  City City, township, shi (Japan) - Example: Copenhagen  City district City division, borough, city district, ward, chou (Japan)  Block (Neighborhood) Neighborhood, block ...
  • Page 329 Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Object Description  Emergency Call Emergency Call Service ELIN identifier data format is defined to carry the ELIN identifier as used during emergency call setup to a traditional CAMA or ISDN Service trunk-based PSAP.
  • Page 330 LAN. Object Description  Delete Check to delete the policy. It will be deleted during the next save.  Policy ID ID for the policy. This is auto generated and shall be used when selecting the polices that shall be mapped to the specific ports. ...
  • Page 331 applications relying on TCP with buffering would not be an intended use of this application type.  Video Signaling (conditional) - for use in network topologies that require a separate policy for the video signaling than for the video media. This application type should not be advertised if all the same network policies apply as those advertised in the Video Conferencing application policy.
  • Page 332: Lldp-Med Neighbor

    Object Description  Port The port number for which the configuration applies.  Policy ID The set of policies that shall apply for a given port. The set of policies is selected by checkmarking the checkboxes that corresponds to the policies Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
  • Page 333 Devices. An LLDP-MED Network Connectivity Device is a LAN access device based on any of the following technologies: 1. LAN Switch/Router 2. IEEE 802.1 Bridge 3. IEEE 802.3 Repeater (included for historical reasons) 4. IEEE 802.11 Wireless Access Point 5. Any device that supports the IEEE 802.1AB and MED extensions defined by TIA-1057 and can relay IEEE 802 frames via any method.
  • Page 334 LLDP-MED Communication Endpoint (Class III) The LLDP-MED Communication Endpoint (Class III) definition is applicable to all endpoint products that act as end user communication appliances supporting IP media. Capabilities include all of the capabilities defined for the previous Generic Endpoint (Class I) and Media Endpoint (Class II) classes, and are extended to include aspects related to end user devices.
  • Page 335  Video Conferencing - for use by dedicated Video Conferencing equipment and other similar appliances supporting real-time interactive video/audio services.  Streaming Video - for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment.
  • Page 336: Neighbor

     Auto-negotiation Auto-negotiation Capabilities shows the link partners MAC/PHY capabilities. Capabilities Buttons : Click to refresh the Page immediately. Auto-refresh Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. 4.14.5 Neighbor This Page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected.
  • Page 337: Port Statistics

    4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-).  Management Address Management Address is the neighbor unit's address that is used for higher layer entities to assist the discovery by the network management.
  • Page 338 Figure 4-14-5: LLDP Statistics Page Screenshot The Page includes the following fields: Global Counters Object Description  It also shows the time when the last entry was last deleted or added. It also Neighbor entries were shows the time elapsed since the last change was detected. last changed ...
  • Page 339 The displayed table contains a row for each port. The columns hold the following information: Object Description  The port on which LLDP frames are received or transmitted. Local Port  The number of LLDP frames transmitted on the port. Tx Frames ...
  • Page 340: Network Diagnostics

    4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagnostics tools for troubleshoot. The diagnostic tools are designed for network manager to help them quickly diagnose problems between point to point and better service customers. Use the Diagnastics menu items to display and configure basic administrative details of the Managed Switch. Under System the following topics are provided to configure and view the system information: This section has the following items: ...
  • Page 341: Ping

    4.15.1 Ping This Page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-1 appears.
  • Page 342: Ipv6 Ping

    4.15.2 IPv6 Ping This Page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. After you press “Start”, 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMPv6 Ping screen in Figure 4-15-2 appears.
  • Page 343: Remote Ip Ping Test

    4.15.3 Remote IP Ping Test This Page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues on special port. After you press “Test”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply.
  • Page 344: Cable Diagnostics

    Click to undo any changes made locally and revert to previously saved values. : Clears the IP Address and the result of ping value. 4.15.4 Cable Diagnostics This Page is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds.
  • Page 345 The Page includes the following fields: Object Description  The port where you are requesting Cable Diagnostics. Port  Description Display per port description.  Cable Status Port: Port number. Pair: The status of the cable pair. OK - Correctly terminated pair Open - Open pair Short - Shorted pair Short A - Cross-pair short to pair A...
  • Page 346: Power Over Ethernet

    4.16 Power over Ethernet Providing up to 24 PoE, in-line power interfaces, the NS3702-24P-4S PoE Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 24 camera / AP can be easily installed around the corner in the company for surveillance demands or build a wireless roaming environment in the office.
  • Page 347: System Configuration

    PoE Splitter PoE Splitter split the PoE 52V DC over the Ethernet cable into 5/12V DC power output. It frees the device deployment from restrictions due to power 3~12 Watts outlet locations, which eliminate the costs for additional AC wiring and reduces the installation time.
  • Page 348: Power Over Ethernet Configuration

     Classification mode In this mode each port automatic determines how much power to reserve according to the class the connected PD belongs to, and reserves the power accordingly. Four different port classes exist and one for 4, 7, 15.4 and 30.8 Watts. Class Usage Range of maximum power used by the PD...
  • Page 349 Figure 4-16-2: PoE Configuration Screenshot...
  • Page 350 LLDP configuration.  Power Supply Budget Set limit value of the total PoE port provided power to the PDs. NS3702-24P-4S available maximum value is 440.  Temperature Allows setting over temperature protection threshold value. It system temperature was over it then system lower total PoE power budget automatically.
  • Page 351: Port Sequential

    A PD will return to Class 0 to 4 in accordance with the maximum power draw as specified by Table 4-16-1. Class Usage Range of maximum power used by the PD Class Description 12.95 watts (or to 15.4 watts for AF mode) Mid power or High power Default 25.5 watts (or to 30.8 watts for AT mode)
  • Page 352: Port Configuration

    Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.16.5 Port Configuration This section allows the user to inspect and configure the current PoE port settings Figure 4-16-4 shows. Figure 4-16-4: Power over Ethernet Configuration Screenshot The page includes the following fields: Object...
  • Page 353  Disable: disable PoE function.  Schedule: enable PoE function in schedule mode.  Schedule Indicates the schedule profile mode. Possible profiles are:  Profile1  Profile2  Profile3  Profile4  AF/AT Mode Allows user to select 802.3at or 802.3af compatibility mode. The default vaule is 802.3at mode.
  • Page 354: Poe Status

    4.16.6 PoE Status This page allows the user to inspect the total power consumption, total power reserved and current status for all PoE ports. The screen in Figure 4-16-5 appears. (Make sure you leave room for heat derating under full load.)
  • Page 355 Figure 4-16-5:PoE Status Screenshot...
  • Page 356 The page includes the following fields: Object Description  Sequential Power On Displays the current sequential power on mode.  System Power Budget Displays the maximum PoE power budget.  Operation mode Displays the current PoE operation mode.  Current Budget Displays the current maximum PoE budget.
  • Page 357: Poe Schedule

    4.16.7 PoE Schedule This page allows the user to define PoE schedule and schedule power recycle. PoE Schedule Besides being used as an IP Surveillance, the Managed PoE switch is certainly applicable to construct any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributing to the environmental protection on the Earth, the Managed PoE switch can effectively control the power supply besides its capability of giving high watts power.
  • Page 358 The screen in Figure 4-16-6 appears. Figure 4-16-6: PoE Schedule Screenshot Please press Add New Rule button to start set PoE Schedule function. You have to set PoE schedule to profile then go back to PoE Port Configuration, and select “Schedule” mode from per port “PoE Mode” option then you can indicate which schedule profile could be apply to the PoE port.
  • Page 359: Lldp Poe Neighbours

    Object Description  Profile Set the schedule profile mode. Possible profiles are:  Profile1  Profile2  Profile3  Profile4  Week Day Allows user to set week day for defining PoE function should be enabled on the day.  Start Hour Allows user to set what hour does PoE function enables.
  • Page 360: Poe Alive Check Configuration

    Figure 4-16-7: LLDP PoE Neighbour Screenshot Please be noticed that administrator has to enable LLDP port from LLDP configuration, please refer to following example (The screen in Figure 4-16-8 appears.) we enabled LLDP function from port1 ro port3, administrator has to plug a PD that supported PoE LLDP function, and then administrator is going to see the PoE information of the PD form LLDP.
  • Page 361 This page provides you with how to configure PD Alive Check.The screen in Figure 4-16-9 appears. Figure 4-16-9: PD Alive Check Configuration Screenshot The page includes the following fields: Object Description  Mode Allows user to enable or disable per port PD Alive Check function. As default value all ports are disabled.
  • Page 362  Reboot & Alarm: It means system will reset the PoE port and issue an alarm message via Syslog, SMTP.  Alarm: It means system will issue an alarm message via Syslog, SMTP.  Reboot Time (30~180s) This column allows user to set the PoE device rebooting time, due to there are so many kind of PoE device on the market and theyhave different rebooting time.
  • Page 363: Port Power Consumption

    4.16.10 Port Power Consumption This page allows user to see the usage of individual PoE Port. The screen in Figure 4-16-10 appears Figure 4-16-10: Port Power Consumption Screenshot Buttons : Click to refresh the page immediately.
  • Page 364: Loop Protection

    4.17 Loop Protection This chapter describes enabling loop protection function that provides loop protection to prevent broadcast loops in Managed Switch. 4.17.1 Configuration This Page allows the user to inspect the current Loop Protection configurations, and possibly change them as well; screen in Figure 4-17-1 appears.
  • Page 365 The Page includes the following fields: General Settings Object Description  Controls whether loop protections is enabled (as a whole). Enable Loop Protection  Transmission Time The interval between each loop protection PDU sent on each port. valid values are 1 to 10 seconds. ...
  • Page 366: Loop Protection Status

    4.17.2 Loop Protection Status This Page displays the loop protection port status of the switch; screen in Figure 4-17-2 appears. Figure 4-17-2: Loop Protection Status Screenshot The Page includes the following fields: Object Description  Port The Managed Switch port number of the logical port. ...
  • Page 367: Rmon

    4.18 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
  • Page 368  InUcastPkts: The number of uni-cast packets delivered to a higher-layer protocol.  InNUcastPkts: The number of broad-cast and multi-cast packets delivered to a higher-layer protocol.  InDiscards: The number of inbound packets that are discarded even the packets are normal. ...
  • Page 369: Rmon Alarm Status

    : Click to add a new community entry. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.18.2 RMON Alarm Status This Page provides an overview of RMON Alarm entries. Each Page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per Page"...
  • Page 370: Rmon Event Configuration

    : Click to refresh the Page immediately. Auto-refresh Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. Updates the table, starting from the first entry in the Alarm Table, i.e. the entry with the lowest ID. : Updates the table, starting with the entry after the last entry currently displayed.
  • Page 371 Buttons : Click to add a new community entry. : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
  • Page 372: Rmon Event Status

    4.18.4 RMON Event Status This Page provides an overview of RMON Event table entries.Each Page shows up to 99 entries from the Event table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Event table.
  • Page 373: Rmon History Configuration

    4.18.5 RMON History Configuration Configure RMON History table on this Page. The entry index key is ID; screen in Figure 4-18-6 appears. Figure 4-18-6: RMON History Configuration Page Screenshot The Page includes the following fields: Object Description  Delete Check to delete the entry. It will be deleted during the next save. ...
  • Page 374: Rmon History Status

    4.18.6 RMON History Status This Page provides an detail of RMON history entries; screen in Figure 4-18-7 appears. ure 4-18-7: RMON History Overview Page Screenshot The Page includes the following fields: Object Description  History Index Indicates the index of History control entry. ...
  • Page 375: Rmon Statistics Configuration

     Jabb. The number of frames which size is larger than 64 octets received with invalid CRC.  Coll. The best estimate of the total number of collisions on this Ethernet segment.  Utilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval, in hundredths of a percent.
  • Page 376: Rmon Statistics Status

    Buttons : Click to add a new community entry. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.18.8 RMON Statistics Status This Page provides an overview of RMON Statistics entries. Each Page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per Page"...
  • Page 377 but including FCS octets) of between 64 and 1518 octets.  Undersize The total number of packets received that were less than 64 octets.  Oversize The total number of packets received that were longer than 1518 octets.  Frag. The number of frames which size is less than 64 octets received with invalid CRC.
  • Page 378: Switch Operation

    5. SWITCH OPERATION 5.1 Address Table The Managed Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from the learning process of Managed Switch.
  • Page 379: Auto-Negotiation

    The Managed Switch performs "Store and Fforward" therefore, no error packets occur. More reliably, it reduces the re-transmission rate. No packet loss will occur. 5.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset).
  • Page 380: Power Over Ethernet Overview

    6. Power over Ethernet Overview What is PoE? The PoE is an abbreviation of Power over Ethernet; the PoE technology means a system to pass electrical power safely, along with data on Ethernet UTP cable. The IEEE standard for PoE technology requires Category 5 cable or higher for high power PoE levels, but can operate with category 3 cable for low power levels.
  • Page 381 specification allows two options for using these cables for power, shown in Figure 1 and Figure 2: The spare pairs are used. Figure 1 shows the pair on pins 4 and 5 connected together and forming the positive supply, and the pair on pins 7 and 8 connected and forming the negative supply.
  • Page 382: Troubleshooting

    User’s Manual of NS3702-24P-4S 7. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Managed Switch is not functioning properly, make sure the Managed Switch was set up according to instructions in this manual. ■ The Link LED is not lit...
  • Page 383: Appendix A: Networking Connection

    User’s Manual of NS3702-24P-4S APPENDIX A: Networking Connection A.1 PoE RJ-45 Port Pin Assignments PIN NO RJ-45 POWER ASSIGNMENT  Power +  Power +  Power -  Power - A.2 Switch's Data RJ-45 Pin Assignments - 1000Mbps, 1000Base-T...
  • Page 384: 10/100Mbps, 10/100Base-Tx

    User’s Manual of NS3702-24P-4S A.3 10/100Mbps, 10/100Base-TX When connecting your Switch to another Fast Ethernet switch, a bridge or a hub, a straight or crossover cable is necessary. Each port of the Switch supports auto-MDI/MDI-X detection. That means you can directly connect the Switch to any Ethernet devices without making a crossover cable.
  • Page 385 User’s Manual of NS3702-24P-4S The standard cable, RJ-45 pin assignment The standard RJ-45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and color of straight cable and crossover cable connection:...
  • Page 386: Appendix B : Glossary

    APPENDIX B : GLOSSARY ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
  • Page 387 See the Web Page help text for each specific port property. ACL|Rate Limiters: Under this Page you can configure the rate limiters. There can be 15 different rate limiters, each ranging from 1-1024K packets per seconds. Under "Ports" and "Access Control List" web-Pages you can assign a Rate Limiter ID to the ACE(s) or ingress port(s).
  • Page 388 Auto-Negotiation Auto-negotiation is the process where two different devices establish the mode of operation and the speed settings that can be shared by those devices for a link. CC is an acronym for Continuity Check. It is a MEP functionality that is able to detect loss of continuity in a network by transmitting CCM frames to a peer MEP.
  • Page 389 DHCP used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask, and IP addresses of DNS servers from a DHCP server. The DHCP server ensures that all IP addresses are unique, for example, no IP address is assigned to a second client while the first client's assignment is valid (its lease has not expired).
  • Page 390 DoS is an acronym for Denial of Service. In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting at network sites or network connection, an attacker may be able to prevent network users from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.
  • Page 391 HTTP HTTP is an acronym for Hypertext Transfer Protocol. It is a protocol that used to transfer or convey information on the World Wide Web (WWW). HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
  • Page 392 credentials for authentication from any point within the network. IGMP IGMP is an acronym for Internet Group Management Protocol. It is a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships.
  • Page 393 IPMC is an acronym for IP MultiCast. IP Source Guard IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
  • Page 394 administrator wants to do a fixed mapping between the DMAC address and switch ports. The frames also contain a MAC address ( SMAC address ), which shows the MAC address of the equipment sending the frame. The SMAC address is used by the switch to automatically update the MAC table with these dynamic MAC addresses.
  • Page 395 credentials are valid. Based on the answer, the NAS then allows or disallows access to the protected resource. An example of a NAS implementation is IEEE 802.1X. NetBIOS NetBIOS is an acronym for Network Basic Input/Output System. It is a program that allows applications on separate computers to communicate within a Local Area Network (LAN), and it is not supported on a Wide Area Network (WAN).
  • Page 396 OUI is the organizationally unique identifier. An OUI address is a globally unique identifier assigned to a vendor by IEEE. You can determine which vendor a device belongs to according to the OUI address which forms the first 24 bits of a MAC address.
  • Page 397 An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user with more capabilities for retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file server. POP and IMAP deal with the receiving of e-mail and are not to be confused with the Simple Mail Transfer Protocol (SMTP).
  • Page 398 QCE is an acronym for QoS Control Entry. It describes QoS class associated with a particular QCE ID. There are six QCE frame types: Ethernet Type, VLAN, UDP/TCP Port, DSCP, TOS, and Tag Priority. Frames can be classified by one of 4 different QoS classes: "Low", "Normal", "Medium", and "High" for individual application. QCL is an acronym for QoS Control List.
  • Page 399 RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, such as an Ethernet address. RARP is the complement of ARP. RADIUS RADIUS is an acronym for Remote Authentication Dial In User Service. It is a networking protocol that provides centralized access, authorization and accounting management for people or computers to connect and use a network service.
  • Page 400 (known as a message digest) of an input data sequence (the message) of any length. Shaper A shaper can limit the bandwidth of transmitted frames. It is located after the ingress queues. SMTP SMTP is an acronym for Simple Mail Transfer Protocol. It is a text-based protocol that uses the Transmission Control Protocol (TCP) and provides a mail service modeled on the FTP file transfer service.
  • Page 401 strong authentication or guarantee confidentiality (Wikipedia). SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication. Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The original STP protocol is now obsoleted by RSTP.
  • Page 402 TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password.
  • Page 403 UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests and, optionally, a checksum capability to verify that the data arrived intact. Common network applications that use UDP include the Domain Name System (DNS), streaming media applications such as IPTV, Voice over IP (VoIP), and Trivial File Transfer Protocol (TFTP).
  • Page 404 WEP is an acronym for Wired Equivalent Privacy. WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio, so are more susceptible to eavesdropping than wired networks. When introduced in 1999, WEP was intended to provide confidentiality comparable to that of a traditional wired network (Wikipedia).
  • Page 405 (Wikipedia). WRES WRED is an acronym for Weighted Random Early Detection. It is an active queue management mechanism that provides preferential treatment of higher priority frames when traffic builds up within a queue. A frame's DP level is used as input to WRED.

Table of Contents