TABLE OF CONTENTS 1. INTRODUCTION........................10 1.1 Packet Contents ............................10 1.2 Product Description ...........................11 1.3 How to Use This Manual ..........................14 1.4 Product Features............................15 1.5 Product Specifications ..........................18 2. INSTALLATION ........................22 2.1 Hardware Description ..........................22 2.1.1 Switch Front Panel ..............................22 ...
Page 4
4.2.2 IP Configuration ..............................44 4.2.3 IP Status ................................46 4.2.4 Users Configuration .............................47 4.2.5 Privilege Levels ..............................51 4.2.6 NTP Configuration ...............................53 4.2.7 Time Configuration ..............................54 4.2.8 UPnP ...................................55 4.2.9 DHCP Relay ................................57 4.2.10 DHCP Relay Statistics ............................59 ...
Page 5
4.4.1 Port Configuration..............................88 4.4.2 Port Statistics Overview ............................90 4.4.3 Port Statistics Detail.............................91 4.4.4 SFP Module Information ............................93 4.4.5 Port Mirror................................94 4.5 Link Aggregation ............................97 4.5.1 Static Aggregation..............................99 4.5.2 LACP Configuration ............................101 4.5.3 LACP System Status ............................104 ...
Particularly designed for the growing popular IP Surveillance applications, IFS Gigabit 802.3at PoE Managed Switch NS3702-24P-4S is positioned as a Surveillance Switch with central management of remote Power control and IP camera monitoring. The NS3702 provides built-in L2/L4 Switching engine and intelligent PoE functions along with 24 10/100/1000Base-T ports featuring 30Watts 802.3at PoE in RJ-45 copper interfaces and 4 Gigabit TP/SFP combo interfaces supporting high speed transmission of...
Page 12
PoE Schedule for Energy Saving Besides applied in IP Surveillance, the NS3702-24P-4S is certainly applicable to construct any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributes to environment protection on the earth, the NS3702 can effectively control the power supply besides its capability of giving high watts power.
Page 13
NS3702 supports both IPv4 and IPv6 management functions, it can works with original IPv4 network structure and also supports the new IPv6 network structure. With easy and friendly management interfaces and plenty of management functions included, the NS3702-24P-4S is the best choice for IP Surveillance and Wireless service providers to connect with IPv6 network. Efficient Management For efficient management, the NS3702 Managed Switch is equipped with console, WEB and SNMP management interfaces.
1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Managed Switch and how to physically install the Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Managed Switch by Web interface.
1.4 Product Features Physical Port 24-Port 10/100/1000Base-T RJ-45 copper with IEEE 802.3at / 802.3af Power over Ethernet Injector function 4 100/1000Base-X mini-GBIC/SFP slot, shared with Port-21 to Port-24 compatible with 100Base-FX SFP RJ45 to RS-232 DB9 console interface for basic management and setup ...
Page 16
STP, IEEE 802.1D Spanning Tree Protocol RSTP, IEEE 802.1w Rapid Spanning Tree Protocol MSTP, IEEE 802.1s Multiple Spanning Tree Protocol, spanning tree by VLAN BPDU Guard Supports Link Aggregation 802.3ad Link Aggregation Control Protocol (LACP) ...
Page 17
IEEE 802.1X Authentication with Guest VLAN Built-in RADIUS client to cooperate with the RADIUS servers RADIUS / TACACS+ users access authentication IP-based Access Control List (ACL) MAC-based Access Control List (ACL) Source MAC / IP address binding ...
1.5 Product Specifications Product NS3702-24P-4S Hardware Specifications 4 100/1000Base-X SFP interfaces, shared with Port-21 to Port-24 SFP/mini-GBIC Slots Compatible with 100Base-FX SFP transceiver 1 x RS-232 DB9 serial port (115200, 8, N, 1) Console Store-and-Forward Switch Architecture 48Gbps / non-blocking Switch Fabric 35.7Mpps@64Bytes...
Page 19
24 units PD @ 15.4 watts 14 units PD @ 30.8 watts Layer 2 Functions Port disable / enable Auto-Negotiation 10/100/1000Mbps full and half duplex mode selection Port Configuration Flow Control disable / enable Display each port’s speed duplex mode, link status, flow control status, Auto Port Status negotiation status, trunk status TX / RX / Both...
Figure 2-1-1 shows the front panel of the Managed Switch. NS3702-24P-4S Front Panel Figure 2-1-1: Front Panels of NS3702-24P-4S ■ Gigabit TP interface 10/100/1000Base-T Copper, RJ-45 Twist-Pair: Up to 100 meters. ■ SFP slot 100/1000Base-X mini-GBIC slot, SFP (Small Factor Pluggable) transceiver module: From 550 meters to 2km (multi-mode fiber),...
The front panel LEDs indicate instant status of power and system status, fan status, port links / PoE in-use and data activity; they help monitor and troubleshoot when needed. Figure 2-1-2 shows the LED indications of the Managed Switch. NS3702-24P-4S LED Indication Figure 2-1-2: NS3702-24P-4S LED at Front Panel...
Page 24
NS3702-24P-4S LED Indication Table LED definition System Color Function Lights to indicate this switch has powered. Green Alert Color Function Lights to indicate FAN1 failure. FAN1 Green Lights to indicate FAN2 failure. FAN2 Green Lights to indicate FAN3 failure.
Figure 2-1-3 shows the rear panel of the Managed Switch. NS3702-24P-4S Rear Panel Figure 2-1-3: Rear Panel of NS3702-24P-4S ■ AC Power Receptacle For compatibility with electric service in most areas of the world, the Managed Switch’s power supply automatically adjusts line power in the range of 100-240V AC and 50/60 Hz.
2.2 Installing the Switch This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the following topics and perform the procedures in the order being presented. To install your Managed Switch on a desktop or shelf, simply complete the following steps.
Connection to the Managed Switch requires UTP Category 5e network cabling with RJ-45 tips. For more information, please see the Cabling Specification in Appendix A. Supply power to the Managed Switch. Step 5: Connect one end of the power cable to the Managed Switch. Connect the power plug of the power cable to a standard wall outlet.
After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the rack, as Step 5: shown in Figure 2-2-3. Figure 2-2-3: Mounting Managed Switch in a Rack Proceed with Steps 4 and 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply power to the Step 6: Managed Switch.
Page 29
Approved IFS SFP Transceivers NS3702 Managed Switch supports both single mode and multi-mode SFP transceiver. The following list of approved Fast Ethernet Transceiver (100Base-X SFP) Gigabit Ethernet Transceiver (1000Base-X SFP)
Page 30
1. It is recommended to use IFS SFPs on the Managed Switch. If you insert an SFP transceiver that is not supported, the Managed Switch will not recognize it. 2. Port 21 to Port 24 are a shared SFP slot that supports the Gigabit and Fast Ethernet SFP transceiver.
Page 31
Figure 2-2-5: How to Pull Out the SFP/SFP+ Transceiver Never pull out the module without lifting up the lever of the module and turning it to a horizontal position. Directly pulling out the module could damage the module and the SFP module slot of the Managed Switch.
3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options. This chapter covers the following topics: ...
3.2 Management Access Overview The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods: An administration console Web browser interface An external SNMP-based network management application The administration console and Web browser interface support are embedded in the Managed Switch software and are available for immediate use.
3.3 Administration Console The administration console is an internal, character-oriented, and command line user interface for performing system administration such as displaying statistics or changing option settings. Using this method, you can view the administration console from a terminal, personal computer, Apple Macintosh, or workstation connected to the Managed Switch's console (serial) port. Figure 3-1-1: Console Management Direct Access Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation...
connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port. A workstation attachment under UNIX can use an emulator such as TIP. 3.4 Web Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer.
3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the switch and the SNMP Network Management Station to use the same community string.
4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management from Managed Switch. About Web-based Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 7.0.
Page 38
When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Managed Switch. The login screen in Figure 4-1-2 appears. Figure 4-1-2: Login Screen Default User name: admin Default Password: admin After entering the username and password, the main screen appears as shown in...
Page 39
Figure 4-1-3: Web Main Page Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web interface. The Switch Menu on the left of the web Page lets you access all the commands and statistics the Managed Switch provides.
4.1 Main Web Page The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s Web browser interface to configure and manage it.
Page 41
those listed in the Main Function. The screen in Figure 4-1-5 appears. Figure 4-1-5: Managed Switch Main Functions Menu...
4.2 System Use the System menu items to display and configure basic administrative details of the Managed Switch. Under the System, the following topics are provided to configure and view the system information. This section has the following items: The Managed Switch system information is provided here. ■...
4.2.1 System Information The System Infomation Page provides information for the current device information. System Information Page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears. Figure 4-2-1: System Information Page Screenshot The Page includes the following fields: Object Description...
Software Version The software version of the Managed Switch. Software Date The date when the Managed Switch software was produced. Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page; any changes made locally will be undone. 4.2.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes.
Page 45
mode traffic is routed between all interfaces. This setting controls the DNS name resolution done by the switch. The DNS Server following modes are supported: From any DHCP interfaces The first DNS server offered from a DHCP lease to a DHCP-enabled interface will be used.
The destination IP network or host mask, in number of bits (prefix length). Mask Length The IP address of the IP gateway. Valid format is dotted decimal notation Gateway or a valid IPv6 notation. Gateway and Network must be of the same type. The VLAN ID (VID) of the specific IPv6 interface associated with the Next Hop VLAN gateway.
Figure 4-2-3: IP Status Page Screenshot The Page includes the following fields: Object Description IP Interfaces The name of the interface. Interface The address type of the entry. This may be LINK or IPv4. Type The current address of the interface (of the given type). Address The status flags of the interface (and/or address).
Page 48
refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group. By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access. And the system maintenance (software upload, factory defaults and etc.) need user privilege level 15.
Page 49
groups, i.e. that is granted the fully control of the device. But others value need to refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group. By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access.
Page 50
If you forget the new password after changing the default password, please press the “Reset” button on the front panel of the Managed Switch for over 10 seconds and then release it. The current setting including VLAN will be lost and the Managed Switch will restore to the default mode.
4.2.5 Privilege Levels This Page provides an overview of the privilege levels. After setup is completed, please press “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-7 appears. Figure 4-2-7: Privilege Levels Configuration Page Screenshot...
Page 52
The Page includes the following fields: Object Description Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contain more than one.
4.2.6 NTP Configuration Configure NTP on this Page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-8 appears.
4.2.7 Time Configuration Configure Time Zone on this Page. A Time Zone is a region that has a uniform standard time for legal, commercial, and social purposes. It is convenient for areas in close commercial or other communication to keep the same time, so time zones tend to follow the boundaries of countries and their subdivisions.
to identify the time zone. ( Range : Up to 16 characters ) Daylight Saving Time This is used to set the clock forward or backward according to the configurations set below for a defined Daylight Saving Time duration. Select 'Disable' to disable the Daylight Saving Time configuration.
Page 56
Figure 4-2-10: UPnP Configuration Page Screenshot The Page includes the following fields: Object Description Mode Indicates the UPnP operation mode. Possible modes are: Enabled: Enable UPnP mode operation. Disabled: Disable UPnP mode operation. When the mode is enabled, two ACEs are added automatically to trap UPnP related packets to CPU.
Figure 4-2-11: UPnP devices show on Windows My Network Place 4.2.9 DHCP Relay Configure DHCP Relay on this Page. DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain. The DHCP option 82 enables a DHCP relay agent to insert specific information into a DHCP request packets when forwarding client DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server DHCP packets to a DHCP client.
Page 58
screen in Figure 4-2-12 appears. Figure 4-2-12 DHCP Relay Configuration Page Screenshot The Page includes the following fields: Object Description Relay Mode Indicates the DHCP relay mode operation. Possible modes are: Enabled: Enable DHCP relay mode operation. When enabling DHCP relay mode operation, the agent forwards and transfers DHCP messages between the clients and the server when they are not on the same subnet domain.
Drop: Drop the package when receiving a DHCP message that already contains relay information. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.2.10 DHCP Relay Statistics This Page provides statistics for DHCP relay. The DHCP Relay Statistics screen in Figure 4-2-13 appears.
Page 60
Receive Bad Circuit ID The packets number that the Circuit ID option did not match known circuit ID. The packets number that the Remote ID option did not match known Remote ID. Receive Bad Remote ID Client Statistics Object Description ...
4.2.11 CPU Load This Page displays the CPU load, using a SVG graph. The load is measured as average over the last 100ms, 1sec and 10 seconds intervals. The last 120 samles are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
4.2.12 System Log The Managed Switch system log information is provided here. The System Log screen in Figure 4-2-15 appears. Figure 4-2-15: System Log Page Screenshot The Page includes the following fields: Object Description ID The ID (>= 1) of the system log entry. ...
: Hides the selected log entries. : Downloads the selected log entries. : Updates the system log entries, starting from the first available entry ID. : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID.
: Updates the system log entry to the previous available entry ID. : Updates the system log entry to the next available entry ID. : Updates the system log entry to the last available entry ID. : Print the system log entry to the current entry ID. 4.2.14 Remote Syslog Configure remote syslog on this Page.
Page 65
Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
4.2.15 SMTP Configuration This Page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-18 appears. Figure 4-2-18: SMTP Configuration Page Screenshot The Page includes the following fields: Object Description SMTP Mode Controls whether SMTP is enabled on this switch. ...
Buttons : Send a test mail to mail server to check this account is available or not. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.2.16 Web Firmware Upgrade This Page facilitates an update of the firmware controlling the switch.
the Managed Switch until the update progress is complete. DO NOT Power OFF Do not quit the Firmware Upgrade Page without pressing the “OK” button after the image is loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade processes.
Do not quit the Firmware Upgrade Page without pressing the “OK” button after the image is loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade processes. 4.2.18 Save Startup Config This function allows save the current configuration, thereby ensuring that the current active configuration can be used at the next reboot screen in Figure 4-2-22 appears.
Figure 4-2-24: Configuration Download Page Screenshot 4.2.20 Configuration Upload Configuration Upload page allows the upload the running-config and startup-config on the switch. Please refer to the Figure 4-2-25 shown below. Figure 4-2-25: Configuration Upload Page Screenshot If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: ...
4.2.21 Configuration Activate Configuration Activate page allows to activate the startup-config and default-config files present on the switch. Please refer to the Figure 4-2-26 shown below. Figure 4-2-26: Configuration Activate Page Screenshot It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration.
4.2.23 Image Select This Page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web Page displays two tables with information about the active and alternate firmware images. The Image Select screen in Figure 4-2-28 appears.
Object Description Image The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk. Version The version of the firmware image. Date The date where the firmware was produced. Buttons : Click to use the alternate image.
Figure 4-2-30: System Reboot Page Screenshot Buttons : Click to reboot the system. : Click to return to the Port State Page without rebooting the system. You can also check the SYS LED at the front panel to identify whether the System is loaded completely or not.
Page 75
SNMP Operations SNMP itself is a simple request/response protocol. NMSs can send multiple requests without receiving a response. Get -- Allows the NMS to retrieve an object instance from the agent. ■ Set -- Allows the NMS to set values for object instances within an agent. ■...
4.3.2 SNMP System Configuration Configure SNMP on this Page. The SNMP System Configuration screen in Figure 4-3-1 appears. Figure 4-3-1: SNMP System Configuration Page Screenshot The Page includes the following fields: Object Description Indicates the SNMP mode operation. Possible modes are: Mode ...
Page 77
SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table. It provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string. In addition to community string, a particular range of source addresses can be used to restrict source subnet. ...
4.3.3 SNMP Trap Configuration Configure SNMP trap on this Page. The SNMP Trap Configuration screen in Figure 4-3-2 appears. Figure 4-3-2: SNMP Trap Configuration Page Screenshot The Page includes the following fields: Object Description Indicates which trap Configuration's name for configuring. The allowed string Trap Config length is 0 to 255, and the allowed content is ASCII characters from 33 to 126.
Page 79
Indicates the community access string when send SNMP trap packet. The Trap Community allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. Indicates the SNMP trap destination address. It allow a valid IP address in dotted Trap Destination decimal notation ('x.y.z.w').
System Enable/disable that the Interface group's traps. Possible traps are: Warm Start: Enable/disable Warm Start trap. Cold Start: Enable/disable Cold Start trap. Interface Indicates that the Interface group's traps. Possible traps are: Link Up: Enable/disable Link up trap. ...
An administratively assigned name for this managed node. By convention, this is System Name the node's fully-qualified domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name.
SNMPv1 or SNMPv2c community string. Indicates the SNMP access source address. A particular range of source Source IP addresses can be used to restrict source subnet when combined with source mask. Indicates the SNMP access source address mask. Source Mask Buttons : Click to add a new community entry.
Page 83
engine with which this user can communicate. In other words, if user engine ID equal system engine ID then it is local user; otherwise it's remote user. A string identifying the user name that this entry should belong to. The allowed User Name string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126.
: Click to add a new user entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.5.3 SNMPv3 Groups Configure SNMPv3 groups table on this Page. The entry index keys are Security Model and Security Name. The SNMPv3 Groups screen in Figure 4-3-6 appears.
: Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.5.4 SNMPv3 Views Configure SNMPv3 views table on this Page. The entry index keys are View Name and OID Subtree. The SNMPv3 Views screen in Figure 4-3-7 appears.
: Click to undo any changes made locally and revert to previously saved values. 4.3.5.5 SNMPv3 Access Configure SNMPv3 accesses table on this Page. The entry index keys are Group Name, Security Model and Security Level. The SNMPv3 Access screen in Figure 4-3-8 appears.
Page 87
Write View Name The name of the MIB view defining the MIB objects for which this request may potentially SET new values. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. Buttons : Click to add a new access entry.
4.4 Port Management Use the Port Menu to display or configure the Managed Switch's ports. This section has the following items: Configures port connection settings Port Configuration Lists Ethernet and RMON port statistics Port Statistics Overview Lists Ethernet and RMON port statistics ...
Page 89
red that it is down. Provides the current link speed of the port. Current Link Speed Select any available link speed for the given switch port. Draw the menu bar to Configured Link Speed select the mode. Auto - Setup Auto negotiation for copper interface.
4.4.2 Port Statistics Overview This Page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-4-2 appears. Figure 4-4-2: Port Statistics Overview Page Screenshot The displayed counters are: Object Description The logical port for the settings contained in the same row.
4.4.3 Port Statistics Detail This Page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The selected port belong to the currently selected stack unit, as reflected by the Page header. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
Page 92
The number of received and transmitted (good and bad) broadcast packets. Rx and Tx Broadcast Rx and Tx Pause A count of the MAC Control frames received or transmitted on this port that has an opcode indicating a PAUSE operation. Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes.
4.4.4 SFP Module Information The NS3702-24P-4S has supported the SFP module with digital diagnostics monitoring (DDM) function, this feature is also known as digital optical monitoring (DOM). You can check the physical or operational status of an SFP module via the SFP Module Information Page.
Distance(m) Display the supports distance of current SFP module, the distance value is get from the SFP module. Temperature(C) Display the temperature of current SFP DDM module, the temperature value is get from the SFP DDM module. – SFP DDM Module Only ...
Page 95
Figure 4-4-7: Port Mirror Application The traffic to be copied to the mirror port is selected as follows: All frames received on a given port (also known as ingress or source mirroring). All frames transmitted on a given port (also known as egress or destination mirroring). Mirror Port Configuration The Port Mirror screen in Figure 4-4-8...
Page 96
Figure 4-4-8: Mirror Configuration Page Screenshot The Page includes the following fields: Object Description Port to mirror on Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this port. Disabled disables mirroring. ...
Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.5 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy.
Page 98
Figure 4-5-1: Link Aggregation The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
Enable the link aggregation prior to connecting any cable between the switches to avoid creating a data loop. Disconnect all link aggregation port cables or disable the link aggregation ports before removing a port link aggregation to avoid creating a data loop. It allows a maximum of 10 ports to be aggregated at the same time.
Page 100
The Page includes the following fields: Object Description The Source MAC address can be used to calculate the destination port for the Source MAC Address frame. Check to enable the use of the Source MAC address, or uncheck to disable.
The Page includes the following fields: .Object Description Indicates the group ID for the settings contained in the same row. Group ID Group ID "Normal" indicates there is no aggregation. Only one group ID is valid per port. Each switch port is listed for each group ID.
Page 102
Figure 4-5-4 : LACP Port Configuration Page Screenshot...
Page 103
The Page includes the following fields: Object Description The switch port number. Port Controls whether LACP is enabled on this switch port. LACP will form an LACP Enabled aggregation when 2 or more ports are connected to the same partner. LACP can form max 12 LAGs per switch and 2G LAGs per stack.
4.5.3 LACP System Status This Page provides a status overview for all LACP instances. The LACP Status Page display the current LACP aggregation Groups and LACP Port status. The LACP System Status screen in Figure 4-5-5 appears. Figure 4-5-5: LACP System Status Page Screenshot The Page includes the following fields: Object Description...
4.5.4 LACP Port Status This Page provides a status overview for LACP status for all ports. The LACP Port Status screen in Figure 4-5-6 appears. Figure 4-5-6: LACP Status Page Screenshot The Page includes the following fields: Object Description The switch port number.
Auto-refresh : Automatic refresh occurs every 3 seconds. 4.5.5 LACP Port Statistics This Page provides an overview for LACP statistics for all ports. The LACP Port Statistics screen in Figure 4-5-7 appears. Figure 4-5-7: LACP Statistics Page Screenshot The Page includes the following fields: Object Description ...
4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
4.6.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks.
allows Spanning Tree to be enabled on all ports and work normally. Some relevant terms: Tagging - The act of putting 802.1Q VLAN information into the header of a packet. Untagging - The act of stripping 802.1Q VLAN information out of the packet header. ■...
■ Port VLAN ID Packets that are tagged (are carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network device to another with the VLAN information intact. This allows 802.1Q VLAN to span network devices (and indeed, the entire network – if all network devices are 802.1Q compliant).
nor the host at the other end of the connection supports VLANs, then you should add this port to the VLAN as an untagged port. VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should be stripped off before passing it on to any end-node host that does not support VLAN tagging.
Page 112
Tagged: Ports with tagging enabled will put the VID number, priority and other VLAN information into the header of all packets that flow into those ports. If a packet has previously been tagged, the port will not alter the packet, thus keeping the VLAN information intact. The VLAN information in the tag can then be used by other 802.1Q compliant devices on the network to make packet-forwarding decisions.
Page 113
The Managed Switch supports multiple VLAN tags and can therefore be used in MAN applications as a provider bridge, aggregating traffic from numerous independent customer LANs into the MAN (Metro Access Network) space. One of the purposes of the provider bridge is to recognize and use VLAN tags so that the VLANs in the MAN space can be used independent of the customers’ VLANs.
Page 114
Object Description This field shows the allowed Access VLANs, it only affects ports configured as Allowed Access Access ports. Ports in other modes are members of all VLANs specified in the VLANs Allowed VLANs field. By default, only VLAN 1 is enabled. More VLANs may be created by using a list syntax where the individual elements are separated by commas.
Page 115
Port VLAN Configuration The VLAN Port Configuration screen in Figure 4-6-2 appears. Figure 4-6-2 : Port VLAN Configuration Screenshot The Page includes the following fields: Object Description This is the logical port number for this row. Port Mode Access ports are normally used to connect to end stations.
Page 116
The VLANs that a trunk port is member of may be limited by the use of Allowed VLANs Frames classified to a VLAN that the port is not a member of are discarded By default, all frames but frames classified to the Port VLAN (a.k.a. Native VLAN) get tagged on egress.
Page 117
tagged on egress, they will be tagged with a C-tag. ■ S-Port: On ingress, frames with a VLAN tag with TPID = 0x8100 or 0x88A8 get classified to the VLAN ID embedded in the tag. If a frame is untagged or priority tagged, the frame gets classified to the Port VLAN.
■ Untag All All frames, whether classified to the Port VLAN or not, are transmitted without a tag. Ports in Trunk and Hybrid mode may control which VLANs they are allowed to Allowed VLANs become members of. The field's syntax is identical to the syntax used in the Enabled VLANs field.
Page 119
Figure 4-6-4: VLAN Membership Status for Static User Page Screenshot...
Page 120
The Page includes the following fields: Object Description A VLAN User is a module that uses services of the VLAN management VLAN User functionality to configure VLAN memberships and VLAN port configuration such as PVID, UVID. Currently we support following VLAN : - Admin : This is reffered as static.
Page 121
uttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed.
4.6.5 VLAN Port Status This Page provides VLAN Port Staus. The VLAN Port Status screen in Figure 4-6-5 appears. Figure 4-6-5: VLAN Port Status for Static User Page Screenshot The Page includes the following fields: Object Description Port The logical port for the settings contained in the same row. ...
Untagged VLAN ID Shows UVID (untagged VLAN ID). Port's UVID determines the packet's behavior at the egress side. Conflicts Shows status of Conflicts whether exists or Not. When a Volatile VLAN User requests to set VLAN membership or VLAN port configuration, the following conflicts can occur: ...
The page includes the following fields: Object Description Delete To delete a private VLAN entry, check this box. The entry will be deleted during the next save. Private VLAN ID Indicates the ID of this particular private VLAN. ...
Page 126
database servers on the inside segment, but are not allowed to communicate with each other For private VLANs to be applied, the switch must first be configured for standard VLAN operation When this is in place, one or more of the configured VLANs can be configured as private VLANs. Ports in a private VLAN fall into one of these two groups: ...
Page 127
This Page is used for enabling or disabling port isolation on ports in a Private VLAN. A port member of a VLAN can be isolated to other isolated ports on the same VLAN and Private VLAN. The Port Isolation screen in Figure 4-6-7 appears.
4.6.8 VLAN setting example: Separate VLAN 802.1Q VLAN Trunk Port Isolate 4.6.8.1 Two Separate 802.1Q VLANs The diagram shows how the Managed Switch handle Tagged and Untagged traffic flow for two VLANs. VLAN Group 2 and VLAN Group 3 are separated VLAN.
Page 129
Untagged packet entering VLAN 2 While [PC-1] transmit an untagged packet enters Port-1, the Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3. [PC-4],[PC-5] and [PC-6] received no packet. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet.
VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-28 Figure 4-6-10: Change Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 Enable VLAN Tag for specific ports Link Type: Port-3 (VLAN-2) and Port-6 (VLAN-3) Change Port 3 Mode as Trunk, Selects Egress Tagging as Tag All and Types 2 in the Allowed VLANs column.
Page 131
other switches within the same VLAN group. The screen in Figure 4-6-12 appears. Figure 4-6-12: VLAN Trunking Diagram Setup steps Add VLAN Group Add two VLANs – VLAN 2 and VLAN 3 Type 1-3 in Allowed Access VLANs column, the 1-3 is including VLAN1 and 2 and 3. Figure 4-6-13: Add VLAN 2 and VLAN 3 Assign VLAN Member and PVID for each port : VLAN 2 : Port-1,Port-2 and Port-3...
Page 132
VLAN 3 : Port-4, Port-5 and Port-6 VLAN 1 : All other ports – Port-7~Port-48 Figure 4-6-14: Changes Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 For the VLAN ports connecting to the hosts, please refer to 4.6.10.1 examples. The following steps will focus on the VLAN Trunk port configuration.
Figure 4-6-15: VLAN Overlap Port Setting & VLAN 1 – The Public Area Member Assign That is, although the VLAN 2 members: Port-1 to Port-3 and VLAN 3 members: Port-4 to Port-6 also belongs to VLAN 1. But with different PVID settings, packets form VLAN 2 or VLAN 3 is not able to access to the other VLAN. Repeat Steps 1 to 6, set up the VLAN Trunk port at the partner switch and add more VLANs to join the VLAN trunk, repeat Steps 1 to 3 to assign the Trunk port to the VLANs.
Page 134
Setup steps Assign Port Mode Set Port-1~Port-4 in Isolate port. Set Port5 and Port-6 in Promiscuous port. The screen in Figure 4-6-16 appears. Figure 4-6-17: The Configuration of Isolated and Promiscuous Port Assign VLAN Member : VLAN 1 : Port-5 and Port-6 VLAN 2 : Port-1,Port-2 ,Port-5 and Port-6...
Page 135
VLAN 3: Port-3~Port-6. The screen in Figure 4-6-18 appears. Figure 4-6-17: Private VLAN Port Setting...
4.6.9 MAC-based VLAN The MAC-based VLAN enties can be configured here. This Page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This Page shows only static entries. The MAC-based VLAN screen in Figure 4-6-18 appears.
: Click to add a new MAC-based VLAN entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately.
4.6.11 Protocol-based VLAN This Page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the switch. The Protocol-based VLAN screen in Figure 4-6-20 appears.
For SNAP: Valid value in this case also is comprised of two different sub-values. a. OUI: OUI (Organizationally Unique Identifier) is value in format of xx-xx-xx where each pair (xx) in string is a hexadecimal value ranges from 0x00-0xff. b. PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP;...
Page 140
Figure 4-6-21: Group Name to VLAN Mapping Table Page Screenshot...
Page 141
The Page includes the following fields: Object Description Delete To delete a Group Name to VLAN map entry, check this box. The entry will be deleted on the switch during the next Save Group Name A valid Group Name is a string of atmost 16 characters which consists of a combination of alphabets (a-z or A-Z) and integers(0-9), no special character is allowed.
4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
Page 143
STP communicates between switches on the network using Bridge Protocol Data Units (BPDUs). Each BPDU contains the following information: The unique identifier of the switch that the transmitting switch currently believes is the root switch The path cost to the root from the transmitting port ...
Page 144
Disabled – the port only responds to network management messages and must return to the blocking state first A port transitions from one state to another as follows: From initialization (switch boot) to blocking From blocking to listening or to disabled ...
Page 145
STP Operation Levels The Switch allows for two levels of operation: the switch level and the port level. The switch level forms a spanning tree consisting of links between one or more switches. The port level constructs a spanning tree consisting of groups of one or more ports. The STP operates in much the same way for both levels.
Page 146
The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value A combination of the User-set priority and 32768 + MAC Bridge Identifier(Not user the switch’s MAC address. configurable The Bridge Identifier consists of two parts: except by setting priority a 16-bit priority and a 48-bit Ethernet MAC below)
Page 147
Port priority Port cost Bridge Priority 32,768 User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority –...
Page 148
STP calculation of the most current Bridge and Port settings. Now, if switch A broadcasts a packet to switch C, then switch C will drop the packet at port 2 and the broadcast will end there. Setting-up STP using values other than the defaults, can be complex. Therefore, you are advised to keep the default factory settings and STP will automatically assign root bridges/ports and block loop connections.
Figure 4-7-3: After Applying the STA Rules The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C.
Page 150
‧ Extension – Multiple Spanning Tree Protocol (MSTP) : Defines an extension to RSTP to further develop the usefulness of virtual LANs (VLANs). This "Per-VLAN" Multiple Spanning Tree Protocol configures a separate Spanning Tree for each VLAN group and blocks all but one of the possible alternate paths within each Spanning Tree. The STP System Configuration screen in Figure 4-7-4 appears.
Page 151
Forwarding (used in STP compatible mode). Valid values are in the range 4 to 30 seconds -Default: -Minimum: The higher of 4 or [(Max. Message Age / 2) + 1] -Maximum: The maximum age of the information transmitted by the Bridge when it is the Max Age Root Bridge.
: Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.7.3 Bridge Status This Page provides a status overview for all STP bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: The Bridge Status screen in Figure 4-7-5 appears.
4.7.4 CIST Port Configuration This Page allows the user to inspect the current STP CIST port configurations, and possibly change them as well. The CIST Port Configuration screen in Figure 4-7-6 appears. Figure 4-7-6 : STP CIST Port Configuration Page Screenshot The Page includes the following fields: Object Description...
Page 154
Valid values are in the range 1 to 200000000. Controls the port priority. This can be used to control priority of ports having Priority identical port cost. (See above). Default: 128 Range: 0-240, in steps of 16 AdminEdge Controls whether the operEdge flag should start as beeing set or cleared.
Page 155
: Click to undo any changes made locally and revert to previously saved values. By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost according to the values shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set to 65,535.
4.7.5 MSTI Priorities This Page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-7-7 appears. Figure 4-7-7: MSTI Priority Page Screenshot The Page includes the following fields: Object Description ...
4.7.6 MSTI Configuration This Page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-7-8 appears. Figure 4-7-8: MSTI Configuration Page Screenshot The Page includes the following fields: Configuration Identification Object Description...
MSTI Mapping Object Description MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. VLANs Mapped The list of VLAN's mapped to the MSTI. The VLANs must be separated with comma and/or space.
Page 159
Figure 4-7-10 : MST1 MSTI Port Configuration Page Screenshot The Page includes the following fields: MSTx MSTI Port Configuration Object Description Port The switch port number of the corresponding STP CIST (and MSTI) port. Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values.
values are in the range 1 to 200000000. Priority Controls the port priority. This can be used to control priority of ports having identical port cost. Buttons : Click to set MSTx configuration : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.7.8 Port Status This Page displays the STP CIST port status for port physical ports in the currently selected switch.
■ AlternatePort ■ BackupPort ■ RootPort ■ DesignatedPort ■ Disable The current STP port state of the CIST port . The port state can be one of the CIST State following values: ■ Disabled ■ Learning ■ Forwarding Uptime The time since the bridge port was last initialized.
Page 162
The number of legacy STP Configuration BPDU's received/transmitted on the port. The number of (legacy) Topology Change Notification BPDU's received/transmitted on the port. The number of unknown Spanning Tree BPDU's received (and discarded) on the Discarded Unknown port.
4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing.
Page 165
Figure 4-8-3: IGMP Snooping Multicast Stream Control IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
Page 166
Specific Group Membership Query (if Group Address is 0x11 Present) 0x16 Membership Report (version 2) 0x17 Leave a Group (version 2) 0x12 Membership Report (version 1) IGMP packets enable multicast routers to keep track of the membership of multicast groups, on their respective sub networks. The following outlines what is communicated between a multicast router and a multicast group member using IGMP.
Page 167
Figure 4-8-4: IGMP State Transitions IGMP Querier – A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
4.8.2 Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each. The Profile Table screen in Figure 4-8-5 appears.
profile by using the following buttons: : List the rules associated with the designated profile. : Adjust the rules associated with the designated profile. Buttons : Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save”. : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
End Address The ending IPv4/IPv6 Multicast Group Address that will be used as an address range. Buttons Click to add new address range. Specify the name and configure the addresses. Click "Save ”. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. Refreshes the displayed table starting from the input fields.
Page 171
Figure 4-8-7: IGMP Snooping Configuration Page Screenshot The Page includes the following fields: Object Description Enable the Global IGMP Snooping. Snooping Enabled Enable unregistered IPMCv4 traffic flooding. Unregistered IPMCv4 The flooding control takes effect only when IGMP Snooping is enabled. Flooding Enabled When IGMP Snooping is disabled, unregistered IPMCv4 traffic flooding is always active in spite of this setting.
Page 172
unnecessary leave messages to the router side. Proxy Enable Enable IGMP Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the router side. Router Port Specify which ports act as IGMP router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier.
4.8.5 IGMP Snooping VLAN Configuration Each Page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table.
Page 174
IGMPv2, Forced IGMPv3. Default compatibility value is IGMP-Auto. PRI (PRI) Priority of Interface. It indicates the IGMP control frame priority level generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0 ...
Click "Save". The specific IGMP VLAN starts working after the corresponding static VLAN is also created. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.6 IGMP Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users.
Object Description The logical port for the settings. Port Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
The Page includes the following fields: Object Description The VLAN ID of the entry. VLAN ID Working Querier Version currently. Querier Version Working Host Version currently. Host Version Show the Querier status is "ACTIVE" or "IDLE". Querier Status ...
Figure 4-8-9: IGMP Snooping Groups Information Page Screenshot The Page includes the following fields: Object Description VLAN ID of the group. VLAN ID Groups Group address of the group displayed. Port Members Ports under this group. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds.
Page 179
The IGMPv3 Information screen in Figure 4-8-12 appears. Figure 4-8-12: IGMP SSM Information Page Screenshot The Page includes the following fields: Object Description VLAN ID VLAN ID of the group. Group Group address of the group displayed. Port Switch port number.
4.8.10 MLD Snooping Configuration This Page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-8-13 appears. Figure 4-8-13: MLD Snooping Configuration Page Screenshot The Page includes the following fields: Object Description Enable the Global MLD Snooping. Snooping Enabled ...
MLD SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Leave Proxy Enable Enable MLD Leave Proxy. This feature can be used to avoid forwarding unnecessary leave messages to the router side.
Page 182
The Page includes the following fields: Description Object Delete Check to delete the entry. The designated entry will be deleted during the next save. VLAN ID The VLAN ID of the entry. MLD Snooping Enable Enable the per-VLAN MLD Snooping. Up to 32 VLANs can be selected for MLD Snooping.
Buttons : Refreshes the displayed table starting from the "VLAN" input fields. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed. :Click to add new MLD VLAN.
Page 184
Figure 4-8-15: MLD Snooping Port Group Filtering Configuration Page Screenshot...
The Page includes the following fields: Object Description Port The logical port for the settings. Filtering Group Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
The Page includes the following fields: Object Description The VLAN ID of the entry. VLAN ID Working Querier Version currently. Querier Version Working Host Version currently. Host Version Shows the Querier status is "ACTIVE" or "IDLE". Querier Status "DISABLE"...
The "Start from VLAN", and "group" input fields allow the user to select the starting point in the MLD Group Table. The MLD Groups Informatino screen in Figure 4-8-17 appears. Figure 4-8-17: MLD Snooping Groups Information Page Screenshot The Page includes the following fields: Object Description ...
Page 188
Figure 4-8-18: MLD SSM Information Page Screenshot The Page includes the following fields: Object Description VLAN ID VLAN ID of the group. Group Group address of the group displayed. Port Switch port number. Indicates the filtering mode maintained per (VLAN ID, port number, Group Mode Address) basis.
4.8.16 MVR (Multicaset VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver ■...
Page 190
Figure 4-8-19: MVR Configuration Page Screenshot The Page includes the following fields: Object Description MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full.
Page 191
Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports. MVR Name MVR Name is an optional attribute to indicate the name of the specific MVR VLAN. Maximum length of the MVR VLAN Name string is 16. MVR VLAN Name can only contain alphabets or numbers.
source ports. Subscribers cannot be directly connected to source ports. Receiver: Configure a port as a receiver port if it is a subscriber port and should only receive multicast data. It does not receive data unless it becomes a member of the multicast group by issuing IGMP/MLD messages. Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports.
IGMPv1 Joins The number of Received IGMPv1 Joins. Received IGMPv2/MLDv1 The number of Received IGMPv2 Joins and MLDv1 Reports, respectively. Reports Received IGMPv3/MLDv2 The number of Received IGMPv1 Joins and MLDv2 Reports, respectively. Reports Received IGMPv2/MLDv1 Leaves The number of Received IGMPv2 Leaves and MLDv1 Dones, respectively.
Object Description VLAN VLAN ID of the group. Groups Group ID of the group displayed. Port Members Ports under this group. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds. : Refreshes the displayed table starting from the input fields. : Updates the table starting from the first entry in the MVR Channels (Groups) Information Table.
Page 195
The Page includes the following fields: Object Description VLAN ID VLAN ID of the group. Group Group address of the group displayed. Port Switch port number. Mode Indicates the filtering mode maintained per (VLAN ID, port number, Group Address) basis.
4.9 Quality of Service 4.9.1 Understanding QoS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic.
Create a QoS profile which associates a service level and a classifier. Apply a QoS profile to a port(s). 4.9.2 Port Policing This Page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-9-1 appears.
4.9.3 Port Classification This Page allows you to configure the basic QoS Ingress Classification settings for all switch ports. The Port Classification screen in Figure 4-9-2 appears. Figure 4-9-2 : QoS Ingress Port Classification Page Screenshot The Page includes the following fields: Object Description ...
Page 199
CoS is shown in parentheses after the configured default CoS. DPL Controls the default drop precedence level. All frames are classified to a drop precedence level. If the port is VLAN aware and the frame is tagged, then the frame is classified to a DPL that is equal to the DEI value in the tag.
4.9.4 Port Scheduler This Page provides an overview of QoS Egress Port Schedulers for all switch ports. The Port Scheduler screen in Figure 4-9-3 appears. Figure 4-9-3: QoS Egress Port Schedule Page Screenshot The Page includes the following fields: Object Description ...
4.9.5 Port Shaping This Page provides an overview of QoS Egress Port Shapers for all switch ports. The Port Shapping screen in Figure 4-9-4 appears. Figure 4-9-4: QoS Egress Port Shapers Page Screenshot The Page includes the following fields: Object Description ...
4.9.5.1 QoS Egress Port Schedule and Shapers The Port Scheduler and Shapers for a specific port are configured on this Page. The QoS Egress Port Schedule and Shaper sscreen in Figure 4-9-5 appears. Figure 4-9-5: QoS Egress Port Schedule and Shapers Page Screenshot The Page includes the following fields: Object Description...
Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth. Queue Scheduler Controls the weight for this queue. This value is restricted to 1-100. This parameter is only shown if "Scheduler Weight Mode" is set to "Weighted". The default value is "17".
Page 204
Figure 4-9-6: QoS Egress Port Tag Remarking Page Screenshot...
The Page includes the following fields: Object Description Port The logical port for the settings contained in the same row. Click on the port number in order to configure tag remarking. For more detail, please refer to chapter 4.9.6.1. ...
: Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.9.7 Port DSCP This Page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-9-8 appears.
Page 207
Classify Classification for a port have 4 different values. Disable: No Ingress DSCP Classification. DSCP=0: Classify if incoming (or translated if enabled) DSCP is 0. Selected: Classify only selected DSCP for which classification is enabled as specified in DSCP Translation window for the specific DSCP. ...
4.9.8 DSCP-based QoS This Page allows you to configure the basic QoS DSCP-based QoS Ingress Classification settings for all switches. The DSCP-based QoS screen in Figure 4-9-9 appears. Figure 4-9-9: DSCP-based QoS Ingress Classification Page Screenshot The Page includes the following fields: Object Description ...
Page 209
QoS Class QoS Class value can be any of (0-7) Drop Precedence Level (0-1)
4.9.9 DSCP Translation This Page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. The DSCP Translation screen in Figure 4-9-10 appears. Figure 4-9-10: DSCP Translation Page Screenshot The Page includes the following fields: Object Description...
for QoS class and DPL map. There are two configuration parameters for DSCP Translation – ■ Translate ■ Classify Translate DSCP at Ingress side can be translated to any of (0-63) DSCP values. Classify Click to enable Classification at Ingress side. ...
Object Description QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters. DPL Actual Drop Precedence Level. Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS DSCP Class and DPL value Buttons...
Page 213
Broadcast: Only Broadcast MAC addresses are allowedd. ■ The default value is 'Any'. SMAC Displays the OUI field of Source MAC address, i.e. first three octet (byte) of MAC address. Tag Type Indicates tag type. Possible values are: Any: Match tagged and untagged frames.
4.9.11.1 QoS Control Entry Configuration The QCE Configuration screen in Figure 4-9-13 appears. Figure 4-9-13: QCE Configuration Page Screenshot The Page includes the following fields: Object Description Check the checkbox button in case you what to make any port member of the Port Members QCL entry.
Page 215
or range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any' DEI Drop Eligible Indicator: Valid value of DEI can be any of values ■ between 0, 1 or 'Any' Frame Type Frame Type can have any of the following values ■ Ethernet SNAP IPv4...
Source IP IPv6 source address: (a.b.c.d) or 'Any', 32 LS bits DSCP Diffserv Code Point value(DSCP): It can be specific value, range of value or 'Any'. DSCP values are in the range 0-63 including BE, CS1-CS7, EF or AF11-AF43 Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP Dport Destination TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP...
Page 217
The Page includes the following fields: Object Description User Indicates the QCL user. Indicates the index of QCE. QCE# Port Indicates the list of ports configured with the QCE. Indicates the type of frame to look for incomming frames. Possible frame types Frame Type are: Any: The QCE will match all frame type.
'yes'. : Click to refresh the Page. 4.9.13 Storm Control Configuration Storm control for the switch is configured on this Page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
Page 219
Controls whether the storm control is enabled on this switch port. Enable Rate Controls the rate for the storm control. The default value is 500. This value is restricted to 100-1000000 when the "Unit" is "kbps" or "fps", and it is restricted to 1-13200 when the "Unit"...
4.9.14 WRED This page allows you to configure the Random Early Detection (RED) settings for queue 0 to 5. RED cannot be applied to queue 6 and 7. Through different RED configuration for the queues (QoS classes) it is possible to obtain Weighted Random Early Detection (WRED) operation between queues.
Page 221
This value is restricted to 0-100. RED Drop Probability Function The following illustration shows the drop probability function with associated parameters. Max. DP 1-3 is the drop probability when the average queue filling level is 100%. Frames marked with Drop Precedence Level 0 are never dropped.
4.9.15 QoS Statistics This Page provides statistics for the different queues for all switch ports. The QoS Statistics screen in Figure 4-9-17 appears. Figure 4-9-17: Queuing Counters Page Screenshot The Page includes the following fields: Object Description The logical port for the settings contained in the same row. Port ...
4.9.16 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic. It is recommended that there be two VLANs on a port - one for voice, one for data. Before connecting the IP device to the switch, the IP phone should configure the voice VLAN ID correctly.
Page 224
The Page includes the following fields: Object Description Mode Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Possible modes are: Enabled: Enable Voice VLAN mode operation. ■...
Page 225
Port Discovery Indicates the Voice VLAN port discovery protocol. It will only work when auto detect mode is enabled. We should enable LLDP feature before configuring Protocol discovery protocol to "LLDP" or "Both". Changing the discovery protocol to "OUI" or "LLDP"...
4.9.17 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this Page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-9-19 appears. Figure 4-9-19: Voice VLAN OUI Table Page Screenshot The Page includes the following fields: Object...
Page 227
Buttons Click to add a new access management entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
4.10 Access Control Lists ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL.
Page 229
EType: The ACE will match Ethernet Type frames. Note that an ■ Ethernet Type based ACE will not get matched by IP and ARP frames. ARP: The ACE will match ARP/RARP frames. ■ IPv4: The ACE will match all IPv4 frames. ■...
4.10.2 Access Control List Configuration This Page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list.
Page 231
Permit: Frames matching the ACE may be forwarded and learned. ■ Deny: Frames matching the ACE are dropped. ■ Rate Limiter Indicates the rate limiter number of the ACE. The allowed range is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled. ...
4.10.3 ACE Configuration Configure an ACE (Access Control Entry) on this Page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected.
Page 233
The allowed range is 0x0 to 0xff. Select the frame type for this ACE. These frame types are mutually exclusive. Frame Type Any: Any frame can match this ACE. ■ Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE ■...
Page 234
MAC Parameters Object Description (Only displayed when the frame type is Ethernet Type or ARP.) SMAC Filter Specify the source MAC filter for this ACE. Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ■ Specific: If you want to filter a specific source MAC address with this ACE, ■...
Page 235
specified (tag priority is "don't-care".) ARP Parameters The ARP parameters can be configured when Frame Type "ARP" is selected. Object Description Specify the available ARP/RARP opcode (OP) flag for this ACE. ARP/RARP Any: No ARP/RARP OP flag is specified. (OP is "don't-care".) ■...
Page 236
Target IP Mask When "Network" is selected for the target IP filter, you can enter a specific target IP mask in dotted decimal notation. ARP Sender MAC Specify whether frames can hit the action according to their sender hardware address field (SHA) settings.
Page 237
choose this value. A field for entering an IP protocol filter appears. ICMP: Select ICMP to filter IPv4 ICMP protocol frames. Extra fields for ■ defining ICMP parameters will appear. These fields are explained later in this help file. UDP: Select UDP to filter IPv4 UDP protocol frames. Extra fields for ■...
Page 238
Network: Source IP filter is set to Network. Specify the source IP address ■ and source IP mask in the SIP Address and SIP Mask fields that appear. SIP Address When "Host" or "Network" is selected for the source IP filter, you can enter a specific SIP address in dotted decimal notation.
Page 239
specific value. The allowed range is 0 to 255. A frame that hits this ACE matches this IPv6 protocol value. Specify the source IPv6 filter for this ACE. SIP Filter Any: No source IPv6 filter is specified. (Source IPv6 filter is "don't-care".) ■...
Page 240
"don't-care"). Specific: If you want to filter a specific ICMP code filter with this ACE, you ■ can enter a specific ICMP code value. A field for entering an ICMP code value appears. When "Specific" is selected for the ICMP code filter, you can enter a specific ICMP Code Value ICMP code value.
Page 241
When "Specific" is selected for the TCP/UDP destination filter, you can enter a TCP/UDP Destination specific TCP/UDP destination value. The allowed range is 0 to 65535. A frame Number that hits this ACE matches this TCP/UDP destination value. TCP/UDP Destination When "Range"...
Page 242
Ethernet Type Parameters The Ethernet Type parameters can be configured when Frame Type "Ethernet Type" is selected. Object Description Specify the Ethernet type filter for this ACE. EtherType Filter Any: No EtherType filter is specified (EtherType filter status is ■...
4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The ACL Ports Configuration screen in Figure 4-10-4 appears. Figure 4-10-4: ACL Ports Configuration Page Screenshot The Page includes the following fields: Object Description...
Page 244
value is "Disabled". Logging Specify the logging operation of this port. The allowed values are: Enabled: Frames received on the port are stored in the System Log. ■ Disabled: Frames received on the port are not logged. ■ The default value is "Disabled". Please note that the System Log memory size and logging rate are limited.
4.10.5 ACL Rate Limiter Configuration Configure the rate limiter for the ACL of the switch. The ACL Rate Limiter Configuration screen in Figure 4-10-5 appears. Figure 4-10-5: ACL Rate Limiter Configuration Page Screenshot The Page includes the following fields: Object Description ...
4.11 Authentication This section is to control the access of the Managed Switch, includes the user access and management control. The Authentication section contains links to the following main topics: IEEE 802.1X Port-Based Network Access Control MAC-Based Authentication ...
3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.
Page 248
Figure 4-11-1 Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) Authentication server—performs the actual authentication of the client.
Page 249
header is removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the client. Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to flow normally.
The Page includes the following fields: Object Description Client The management client for which the configuration below applies. Authentication Method Authentication Method can be set to one of the following values: None: authentication is disabled and login is not possible. ■...
Page 253
ure 4-11-4: Network Access Server Configuration Page Screenshot The Page includes the following fields: System Configuration Object Description Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. ...
Page 254
after the interval specified by the Reauthentication Period. Reauthentication for Enabled 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached. For MAC-based ports, reauthentication is only useful if the RADIUS server configuration has changed.
Page 255
■ Single 802.1X ■ Multi 802.1X ■ MAC-Based Auth. If a client is denied access - either because the RADIUS server denies the client access or because the RADIUS server request times out (according to the timeout specified on the "Configuration→Security→AAA" Page) - the client is put on hold in the Unauthorized state.
Page 256
The "Guest VLAN Enabled" checkbox provides a quick way to globally enable/disable Guest VLAN functionality. When checked, the individual ports' ditto setting determines whether the port can be moved into Guest VLAN. When unchecked, the ability to move to the Guest VLAN is disabled for all ports. ...
Page 257
authentication. Force Unauthorized In this mode, the switch will send one EAPOL Failure frame when the port link comes up, and any client on the port will be disallowed network access. Port-based 802.1X In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the authentication server.
Page 258
EAPOL Start frame retransmission rate. Single 802.1X In port-based 802.1X authentication, once a supplicant is successfully authenticated on a port, the whole port is opened for network traffic. This allows other clients connected to the port (for instance through a hub) to piggy-back on the successfully authenticated client and get network access even though they really aren't authenticated.
Page 259
supplicants that might be on the port. The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality. MAC-based Auth. Unlike port-based 802.1X, MAC-based authentication is not a standard, but merely a best-practices method adopted by the industry.
Page 260
supplicant is successfully authenticated. If present and valid, traffic received on the supplicant's port will be classified to the given QoS Class. If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a QoS Class or it's invalid, or the supplicant is otherwise no longer present on the port, the port's QoS Class is immediately reverted to the original QoS Class (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned).
Page 261
For trouble-shooting VLAN assignments, use the "Monitor→VLANs→VLAN Membership and VLAN Port" Pages. These Pages show which modules have (temporarily) overridden the current Port VLAN configuration. RADIUS attributes used in identifying a VLAN ID: RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an Access-Accept packet.
Page 262
transmission of EAPOL Request Identity frames is configured with EAPOL Timeout. If Allow Guest VLAN if EAPOL Seen is enabled, the port will now be placed in the Guest VLAN. If disabled, the switch will first check its history to see if an EAPOL frame has previously been received on the port (this history is cleared if the port link goes down or the port's Admin State is changed), and if not, the port will be placed in the Guest VLAN.
Page 263
port and will not cause the clients to get temporarily unauthorized. Reinitialize: Forces a reinitialization of the clients on the port and thereby ■ a reauthentication immediately. The clients will transfer to the unauthorized state while the reauthentication is in progress. Buttons Click to refresh the Page.
4.11.4 Network Access Overview This Page provides an overview of the current NAS port states for the selected switch. The Network Access Overview screen in Figure 4-11-5 appears. Figure 4-11-5: Network Access Server Switch Status Page Screenshot The Page includes the following fields: Object Description ...
is not overridden by NAS. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID. Read more about RADIUS-assigned VLANs here. If the port is moved to the Guest VLAN, "(Guest)" is appended to the VLAN ID. Read more about Guest VLANs here.
Page 266
QoS Class The QoS class assigned by the RADIUS server. The field is blank if no QoS class is assigned. Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS.
Page 267
mesRx frames that have been received by the switch. dot1xAuthEapolLogoffFr The number of valid EAPOL Logoff amesRx Logoff frames that have been received by the switch. dot1xAuthInvalidEapolF The number of EAPOL Invalid Type ramesRx frames that have been received by the switch in which the frame type is not recognized.
Page 268
■ MAC-based Auth. Direction Name IEEE Name Description dot1xAuthBackendAcce Access 802.1X-based: ssChallenges Counts the number of times Challenges that the switch receives the first request from the backend server following the first response from the supplicant. Indicates that the backend server has communication with the switch.
Page 269
Fails Counts the number of times Failures that the switch receives a failure message. This indicates that the supplicant/client has not authenticated to the backend server. dot1xAuthBackendResp Responses 802.1X-based: onses Counts the number of times that the switch attempts to send a supplicant's first response packet to the backend server.
Page 270
rameSource Address The VLAN ID on which the last frame from the VLAN ID last supplicant/client was received. dot1xAuthLastEapolF Version 802.1X-based: rameVersion The protocol version number carried in the most recently received EAPOL frame. MAC-based: Not applicable. Identity 802.1X-based: The user name (supplicant identity) carried in the most recently received Response Identity EAPOL frame.
Page 271
Selected Counters Object Description Selected Counters The Selected Counters table is visible when the port is one of the following administrative states: ■ Multi 802.1X ■ MAC-based Auth. The table is identical to and is placed next to the Port Counters table, and will be empty if no MAC address is currently selected.
: This button is available in the following modes: • Force Authorized • Force Unauthorized • Port-based 802.1X • Single 802.1X Click to clear the counters for the selected port. : This button is available in the following modes: • Multi 802.1X •...
Page 273
Figure 4-11-7: RADIUS Server Configuration Page Screenshot The Page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request.
Page 274
Key The secret key - up to 63 characters long - shared between the RADIUS server and the switch. NAS-IP-Address The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used. ...
: Click to undo the addition of the new server. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.11.7 TACACS+ This Page allows you to configure the TACACS+ Servers. The TACACS+ Configuration screen in Figure 4-11-8 appears.
Page 276
trying to contact a server that it has already determined as dead. Setting the Deadtime to a value greater than 0 (zero) will enable this feature, but only if more than one server has been configured. Key The secret key - up to 63 characters long - shared between the TACACS+ server and the switch.
4.11.8 RADIUS Overview This Page provides an overview of the status of the RADIUS servers configurable on the Authentication configuration Page. The RADIUS Authentication/Accounting Server Overview screen in Figure 4-11-9 appears. Figure 4-11-9: RADIUS Authentication/Accounting Server Overview Page Screenshot The Page includes the following fields: RADIUS Authentication Server Status Overview Object Description...
Page 278
been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses. This state is only reachable when more than one server is enabled. RADIUS Accounting Server Status Overview Object Description ...
4.11.9 RADIUS Details This Page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen in Figure 4-11-10 appears. Figure 4-11-10: RADIUS Authentication/Accounting for Server Overview Page Screenshot The Page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
Page 280
counters. Direction Name RFC4668 Name Description radiusAuthClientExtA The number of RADIUS Access ccessAccepts Access-Accept packets (valid Accepts or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access Rejects ccessRejects Access-Reject packets (valid or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access...
Page 281
dropped for some other reason. radiusAuthClientExtP The number of RADIUS Packets acketsDropped packets that were received Dropped from the server on the authentication port and dropped for some other reason. radiusAuthClientExtA The number of RADIUS Access ccessRequests Access-Request packets sent Requests to the server.
Page 282
counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout. Other Info This section contains information about the state of the server and the latest round-trip time. Name RFC4668 Name Description...
Page 283
between the backend servers to show details for. Object Description Packet Counters RADIUS accounting server packet counter. There are five receive and four transmit counters. Direction Name RFC4670 Name Description radiusAccClientExt The number of RADIUS Responses Responses packets (valid or invalid) received from the server.
Page 284
radiusAccClientExt The number of RADIUS Retransmissions Retransmissions packets retransmitted to the RADIUS accounting server. radiusAccClientExt The number of RADIUS Pending PendingRequests packets destined for the server Requests that have not yet timed out or received a response. This variable is incremented when a Request is sent and decremented due to receipt of a Response, timeout, or...
accounting attempts. Dead (X seconds left): Accounting attempts were made to this server, but it did not reply within the configured timeout. The server has temporarily been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses.
Page 286
Figure 4-11-11: RADIUS Server Configuration Screenshot...
Page 287
Add New RADIUS Cleint on the Windows 2003 server Figure 4-11-12: Windows Server – Add New RADIUS Client Setting Assign the client IP address to the Managed Switch...
Page 288
Figure 4-11-13: Windows Server RADIUS Server Setting The shared secret key should be as same as the key configured on the Managed Switch. Figure 4-11-14: Windows Server RADIUS Server Setting...
Page 289
Configure ports attribute of 802.1X, the same as “802.1X Port Configuration”. Figure 4-11-15: 802.1x Port Configuration Create user data. The establishment of the user data needs to be created on the Radius Server PC. For example, the Radius Server founded on Win2003 Server, and then: Figure 4-11-16: Windows 2003 AD Server Setting Path Enter ”...
Page 290
Figure 4-11-17: Add User Properties Screen Figure 4-11-18: Add User Properties Screen...
Set the Port Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is an uplink port that is connected to another switch. Or once the 802.1X starts to work, the switch might not be able to access the RADIUS server. 4.11.11 802.1X Client Configuration Windows XP is originally 802.1X support.
Page 292
Select “Authentication” tab. Select “Enable network access control using IEEE 802.1X” to enable 802.1x authentication. Select “MD-5 Challenge” from the drop-down list box for EAP type. Figure 4-11-20 Click “OK”. When client has associated with the Managed Switch, a user authentication notice appears in system tray. Click on the notice to continue.
Page 293
Figure 4-11-21: Windows Client Popup Login Request Message Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process. Figure 4-11-22...
4.12 Security This section is to control the access of the Managed Switch, includes the user access and management control. The Security Page contains links to the following main topics: Port Limit Control Access Management HTTPs / SSH ...
Page 295
Figure 4-12-1: Port Limit Control Configuration Overview Page Screenshot The Page includes the following fields: System Configuration Object Description Mode Indicates if Limit Control is globally enabled or disabled on the switchstack. If globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled.
Page 296
Aging Period If Aging Enabled is checked, then the aging period is controlled with this input. If other modules are using the underlying port security for securing MAC addresses, they may have other requirements to the aging period. The underlying port security will use the shorter requested aging period of all modules that use the functionality.
Page 297
available MAC addresses. Action If Limit is reached, the switch can take one of the following actions: None: Do not allow more than Limit MAC addresses on the port, but take no further action. Trap: If Limit + 1 MAC addresses is seen on the port, send an SNMP trap. If Aging is disabled, only one SNMP trap will be sent, but with Aging enabled, new SNMP traps will be sent everytime the limit gets exceeded.
Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values. : Click to refresh the Page. Note that non-committed changes will be lost. 4.12.2 Access Management Configure access management table on this Page. The maximum entry number is 16. If the application's type match any one of the access management entries, it will allow access to the switch.
host IP address matched the entry. SNMP Indicates the host can access the switch from SNMP interface that the host IP address matched the entry. TELNET/SSH Indicates the host can access the switch from TELNET/SSH interface that the host IP address matched the entry.
Page 301
Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. : Clears all statistics.
4.12.4 HTTPs Configure HTTPS on this Page. The HTTPS Configuration screen in Figure 4-12-4 appears. Figure 4-12-4: HTTPS Configuration Screen Page Screenshot The Page includes the following fields: Object Description Mode Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection.
port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it. For a MAC address to be set in the forwarding state, all enabled user modules must unanimously agree on allowing the MAC address to forward.
Page 304
Figure 4-12-6: Port Security Status Screen Page Screenshot The Page includes the following fields: User Module Legend The legend shows all user modules that may request Port Security services. Object Description User Module Name The full name of a module that may request Port Security services. ...
Page 305
Object Description Port The port number for which the status applies. Click the port number to see the status for this particular port. Users Each of the user modules has a column that shows whether that module has enabled Port Security or not.
4.12.7 Port Security Detail This Page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
4.12.8 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. Configure DHCP Snooping on this Page. The DHCP Snooping Configuration screen in Figure 4-12-8 appears.
Page 308
Figure 4-12-8: DHCP Snooping Configuration Screen Page Screenshot The Page includes the following fields: Object Description Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode operation. When enable DHCP snooping mode operation, the request DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports.
: Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.12.9 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses.
Page 310
Figure 4-12-10: IP Source Guard Configuration Screen Page Screenshot The Page includes the following fields: Object Description Mode of IP Source Enable the Global IP Source Guard or disable the Global IP Source Guard. All configured ACEs will be lost when the mode is enabled. Guard Configuration ...
that are matched in static entries on the specific port. Buttons : Click to translate all dynamic entries to static entries. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.12.11 IP Source Guard Static Table This Page provides Static IP Source Guard Table.
4.12.12 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT.
Page 313
The Page includes the following fields: Object Description Mode of ARP Inspection Enable the Global ARP Inspection or disable the Global ARP Inspection. Configuration Port Mode Configuration Specify ARP Inspection is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, ARP Inspection is enabled on this given port.
4.13 Address Table Switching of frames is based upon the DMAC address contained in the frame. The Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ). This table contains both static and dynamic entries.
Page 316
Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description Disable Automatic Enables/disables the the automatic aging of dynamic entries Aging Aging Time The time after which a learned entry is discarded. By default, dynamic entries are removed from the MAC after 300 seconds.
Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.13.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this Page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address.
The Page includes the following fields: Object Description Indicates whether the entry is a static or dynamic entry. Type The VLAN ID of the entry. VLAN The MAC address of the entry. MAC Address The ports that are members of the entry. Port Members Buttons Auto-refresh...
Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table. The "Start from port address", "VLAN", "MAC address" and "IP address" input fields allow the user to select the starting point in the Dynamic ARP Inspection Table.
Page 320
Figure 4-13-4: Dynamic IP Source Guard Table Screenshot Navigating the ARP Inspection Table Each Page shows up to 99 entries from the Dynamic IP Source Guard table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Dynamic IP Source Guard Table.
Page 321
Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Refreshes the displayed table starting from the "Start from MAC address" and "VLAN" input fields. : Flushes all dynamic entries. Updates the table starting from the first entry in the MAC Table, i.e. the entry with the lowest VLAN ID and MAC address.
4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
Page 323
Figure 4-14-1: LLDP Configuration Page Screenshot The Page includes the following fields: LLDP Parameters Object Description The switch is periodically transmitting LLDP frames to its neighbors for having the Tx Interval network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value.
Page 324
The switch port number of the logical LLDP port. Port Select LLDP mode. Mode Rx only The switch will not send out LLDP information, but LLDP information from neighbor units is analyzed. Tx only The switch will drop LLDP information received from neighbors, but will send out LLDP information.
Optional TLV: When checked the "system description" is included in LLDP System Description information transmitted. System Capabilites Optional TLV: When checked the "system capability" is included in LLDP information transmitted. Management Address Optional TLV: When checked the "management address" is included in LLDP information transmitted.
Page 326
The Page includes the following fields: Fast start repeat count Object Description Rapid startup and Emergency Call Service Location Identification Discovery of Fast start repeat count endpoints is a critically important aspect of VoIP systems in general. In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the...
Page 327
Object Description Latitude Latitude SHOULD be normalized to within 0-90 degrees with a maximum of 4 digits. It is possible to specify the direction to either North of the equator or South of the equator. Longitude Longitude SHOULD be normalized to within 0-180 degrees with a maximum of 4 digits.
Page 328
or US. State National subdivisions (state, canton, region, province, prefecture). County County, parish, gun (Japan), district. City City, township, shi (Japan) - Example: Copenhagen City district City division, borough, city district, ward, chou (Japan) Block (Neighborhood) Neighborhood, block ...
Page 329
Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Object Description Emergency Call Emergency Call Service ELIN identifier data format is defined to carry the ELIN identifier as used during emergency call setup to a traditional CAMA or ISDN Service trunk-based PSAP.
Page 330
LAN. Object Description Delete Check to delete the policy. It will be deleted during the next save. Policy ID ID for the policy. This is auto generated and shall be used when selecting the polices that shall be mapped to the specific ports. ...
Page 331
applications relying on TCP with buffering would not be an intended use of this application type. Video Signaling (conditional) - for use in network topologies that require a separate policy for the video signaling than for the video media. This application type should not be advertised if all the same network policies apply as those advertised in the Video Conferencing application policy.
Object Description Port The port number for which the configuration applies. Policy ID The set of policies that shall apply for a given port. The set of policies is selected by checkmarking the checkboxes that corresponds to the policies Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
Page 333
Devices. An LLDP-MED Network Connectivity Device is a LAN access device based on any of the following technologies: 1. LAN Switch/Router 2. IEEE 802.1 Bridge 3. IEEE 802.3 Repeater (included for historical reasons) 4. IEEE 802.11 Wireless Access Point 5. Any device that supports the IEEE 802.1AB and MED extensions defined by TIA-1057 and can relay IEEE 802 frames via any method.
Page 334
LLDP-MED Communication Endpoint (Class III) The LLDP-MED Communication Endpoint (Class III) definition is applicable to all endpoint products that act as end user communication appliances supporting IP media. Capabilities include all of the capabilities defined for the previous Generic Endpoint (Class I) and Media Endpoint (Class II) classes, and are extended to include aspects related to end user devices.
Page 335
Video Conferencing - for use by dedicated Video Conferencing equipment and other similar appliances supporting real-time interactive video/audio services. Streaming Video - for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment.
Auto-negotiation Auto-negotiation Capabilities shows the link partners MAC/PHY capabilities. Capabilities Buttons : Click to refresh the Page immediately. Auto-refresh Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. 4.14.5 Neighbor This Page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected.
4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). Management Address Management Address is the neighbor unit's address that is used for higher layer entities to assist the discovery by the network management.
Page 338
Figure 4-14-5: LLDP Statistics Page Screenshot The Page includes the following fields: Global Counters Object Description It also shows the time when the last entry was last deleted or added. It also Neighbor entries were shows the time elapsed since the last change was detected. last changed ...
Page 339
The displayed table contains a row for each port. The columns hold the following information: Object Description The port on which LLDP frames are received or transmitted. Local Port The number of LLDP frames transmitted on the port. Tx Frames ...
4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagnostics tools for troubleshoot. The diagnostic tools are designed for network manager to help them quickly diagnose problems between point to point and better service customers. Use the Diagnastics menu items to display and configure basic administrative details of the Managed Switch. Under System the following topics are provided to configure and view the system information: This section has the following items: ...
4.15.1 Ping This Page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-1 appears.
4.15.2 IPv6 Ping This Page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. After you press “Start”, 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMPv6 Ping screen in Figure 4-15-2 appears.
4.15.3 Remote IP Ping Test This Page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues on special port. After you press “Test”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply.
Click to undo any changes made locally and revert to previously saved values. : Clears the IP Address and the result of ping value. 4.15.4 Cable Diagnostics This Page is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds.
Page 345
The Page includes the following fields: Object Description The port where you are requesting Cable Diagnostics. Port Description Display per port description. Cable Status Port: Port number. Pair: The status of the cable pair. OK - Correctly terminated pair Open - Open pair Short - Shorted pair Short A - Cross-pair short to pair A...
4.16 Power over Ethernet Providing up to 24 PoE, in-line power interfaces, the NS3702-24P-4S PoE Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 24 camera / AP can be easily installed around the corner in the company for surveillance demands or build a wireless roaming environment in the office.
PoE Splitter PoE Splitter split the PoE 52V DC over the Ethernet cable into 5/12V DC power output. It frees the device deployment from restrictions due to power 3~12 Watts outlet locations, which eliminate the costs for additional AC wiring and reduces the installation time.
Classification mode In this mode each port automatic determines how much power to reserve according to the class the connected PD belongs to, and reserves the power accordingly. Four different port classes exist and one for 4, 7, 15.4 and 30.8 Watts. Class Usage Range of maximum power used by the PD...
Page 350
LLDP configuration. Power Supply Budget Set limit value of the total PoE port provided power to the PDs. NS3702-24P-4S available maximum value is 440. Temperature Allows setting over temperature protection threshold value. It system temperature was over it then system lower total PoE power budget automatically.
A PD will return to Class 0 to 4 in accordance with the maximum power draw as specified by Table 4-16-1. Class Usage Range of maximum power used by the PD Class Description 12.95 watts (or to 15.4 watts for AF mode) Mid power or High power Default 25.5 watts (or to 30.8 watts for AT mode)
Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.16.5 Port Configuration This section allows the user to inspect and configure the current PoE port settings Figure 4-16-4 shows. Figure 4-16-4: Power over Ethernet Configuration Screenshot The page includes the following fields: Object...
Page 353
Disable: disable PoE function. Schedule: enable PoE function in schedule mode. Schedule Indicates the schedule profile mode. Possible profiles are: Profile1 Profile2 Profile3 Profile4 AF/AT Mode Allows user to select 802.3at or 802.3af compatibility mode. The default vaule is 802.3at mode.
4.16.6 PoE Status This page allows the user to inspect the total power consumption, total power reserved and current status for all PoE ports. The screen in Figure 4-16-5 appears. (Make sure you leave room for heat derating under full load.)
Page 356
The page includes the following fields: Object Description Sequential Power On Displays the current sequential power on mode. System Power Budget Displays the maximum PoE power budget. Operation mode Displays the current PoE operation mode. Current Budget Displays the current maximum PoE budget.
4.16.7 PoE Schedule This page allows the user to define PoE schedule and schedule power recycle. PoE Schedule Besides being used as an IP Surveillance, the Managed PoE switch is certainly applicable to construct any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributing to the environmental protection on the Earth, the Managed PoE switch can effectively control the power supply besides its capability of giving high watts power.
Page 358
The screen in Figure 4-16-6 appears. Figure 4-16-6: PoE Schedule Screenshot Please press Add New Rule button to start set PoE Schedule function. You have to set PoE schedule to profile then go back to PoE Port Configuration, and select “Schedule” mode from per port “PoE Mode” option then you can indicate which schedule profile could be apply to the PoE port.
Object Description Profile Set the schedule profile mode. Possible profiles are: Profile1 Profile2 Profile3 Profile4 Week Day Allows user to set week day for defining PoE function should be enabled on the day. Start Hour Allows user to set what hour does PoE function enables.
Figure 4-16-7: LLDP PoE Neighbour Screenshot Please be noticed that administrator has to enable LLDP port from LLDP configuration, please refer to following example (The screen in Figure 4-16-8 appears.) we enabled LLDP function from port1 ro port3, administrator has to plug a PD that supported PoE LLDP function, and then administrator is going to see the PoE information of the PD form LLDP.
Page 361
This page provides you with how to configure PD Alive Check.The screen in Figure 4-16-9 appears. Figure 4-16-9: PD Alive Check Configuration Screenshot The page includes the following fields: Object Description Mode Allows user to enable or disable per port PD Alive Check function. As default value all ports are disabled.
Page 362
Reboot & Alarm: It means system will reset the PoE port and issue an alarm message via Syslog, SMTP. Alarm: It means system will issue an alarm message via Syslog, SMTP. Reboot Time (30~180s) This column allows user to set the PoE device rebooting time, due to there are so many kind of PoE device on the market and theyhave different rebooting time.
4.16.10 Port Power Consumption This page allows user to see the usage of individual PoE Port. The screen in Figure 4-16-10 appears Figure 4-16-10: Port Power Consumption Screenshot Buttons : Click to refresh the page immediately.
4.17 Loop Protection This chapter describes enabling loop protection function that provides loop protection to prevent broadcast loops in Managed Switch. 4.17.1 Configuration This Page allows the user to inspect the current Loop Protection configurations, and possibly change them as well; screen in Figure 4-17-1 appears.
Page 365
The Page includes the following fields: General Settings Object Description Controls whether loop protections is enabled (as a whole). Enable Loop Protection Transmission Time The interval between each loop protection PDU sent on each port. valid values are 1 to 10 seconds. ...
4.17.2 Loop Protection Status This Page displays the loop protection port status of the switch; screen in Figure 4-17-2 appears. Figure 4-17-2: Loop Protection Status Screenshot The Page includes the following fields: Object Description Port The Managed Switch port number of the logical port. ...
4.18 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
Page 368
InUcastPkts: The number of uni-cast packets delivered to a higher-layer protocol. InNUcastPkts: The number of broad-cast and multi-cast packets delivered to a higher-layer protocol. InDiscards: The number of inbound packets that are discarded even the packets are normal. ...
: Click to add a new community entry. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.18.2 RMON Alarm Status This Page provides an overview of RMON Alarm entries. Each Page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per Page"...
: Click to refresh the Page immediately. Auto-refresh Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. Updates the table, starting from the first entry in the Alarm Table, i.e. the entry with the lowest ID. : Updates the table, starting with the entry after the last entry currently displayed.
Page 371
Buttons : Click to add a new community entry. : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
4.18.4 RMON Event Status This Page provides an overview of RMON Event table entries.Each Page shows up to 99 entries from the Event table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Event table.
4.18.5 RMON History Configuration Configure RMON History table on this Page. The entry index key is ID; screen in Figure 4-18-6 appears. Figure 4-18-6: RMON History Configuration Page Screenshot The Page includes the following fields: Object Description Delete Check to delete the entry. It will be deleted during the next save. ...
4.18.6 RMON History Status This Page provides an detail of RMON history entries; screen in Figure 4-18-7 appears. ure 4-18-7: RMON History Overview Page Screenshot The Page includes the following fields: Object Description History Index Indicates the index of History control entry. ...
Jabb. The number of frames which size is larger than 64 octets received with invalid CRC. Coll. The best estimate of the total number of collisions on this Ethernet segment. Utilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval, in hundredths of a percent.
Buttons : Click to add a new community entry. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.18.8 RMON Statistics Status This Page provides an overview of RMON Statistics entries. Each Page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per Page"...
Page 377
but including FCS octets) of between 64 and 1518 octets. Undersize The total number of packets received that were less than 64 octets. Oversize The total number of packets received that were longer than 1518 octets. Frag. The number of frames which size is less than 64 octets received with invalid CRC.
5. SWITCH OPERATION 5.1 Address Table The Managed Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from the learning process of Managed Switch.
The Managed Switch performs "Store and Fforward" therefore, no error packets occur. More reliably, it reduces the re-transmission rate. No packet loss will occur. 5.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset).
6. Power over Ethernet Overview What is PoE? The PoE is an abbreviation of Power over Ethernet; the PoE technology means a system to pass electrical power safely, along with data on Ethernet UTP cable. The IEEE standard for PoE technology requires Category 5 cable or higher for high power PoE levels, but can operate with category 3 cable for low power levels.
Page 381
specification allows two options for using these cables for power, shown in Figure 1 and Figure 2: The spare pairs are used. Figure 1 shows the pair on pins 4 and 5 connected together and forming the positive supply, and the pair on pins 7 and 8 connected and forming the negative supply.
User’s Manual of NS3702-24P-4S 7. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Managed Switch is not functioning properly, make sure the Managed Switch was set up according to instructions in this manual. ■ The Link LED is not lit...
User’s Manual of NS3702-24P-4S APPENDIX A: Networking Connection A.1 PoE RJ-45 Port Pin Assignments PIN NO RJ-45 POWER ASSIGNMENT Power + Power + Power - Power - A.2 Switch's Data RJ-45 Pin Assignments - 1000Mbps, 1000Base-T...
User’s Manual of NS3702-24P-4S A.3 10/100Mbps, 10/100Base-TX When connecting your Switch to another Fast Ethernet switch, a bridge or a hub, a straight or crossover cable is necessary. Each port of the Switch supports auto-MDI/MDI-X detection. That means you can directly connect the Switch to any Ethernet devices without making a crossover cable.
Page 385
User’s Manual of NS3702-24P-4S The standard cable, RJ-45 pin assignment The standard RJ-45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and color of straight cable and crossover cable connection:...
APPENDIX B : GLOSSARY ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
Page 387
See the Web Page help text for each specific port property. ACL|Rate Limiters: Under this Page you can configure the rate limiters. There can be 15 different rate limiters, each ranging from 1-1024K packets per seconds. Under "Ports" and "Access Control List" web-Pages you can assign a Rate Limiter ID to the ACE(s) or ingress port(s).
Page 388
Auto-Negotiation Auto-negotiation is the process where two different devices establish the mode of operation and the speed settings that can be shared by those devices for a link. CC is an acronym for Continuity Check. It is a MEP functionality that is able to detect loss of continuity in a network by transmitting CCM frames to a peer MEP.
Page 389
DHCP used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask, and IP addresses of DNS servers from a DHCP server. The DHCP server ensures that all IP addresses are unique, for example, no IP address is assigned to a second client while the first client's assignment is valid (its lease has not expired).
Page 390
DoS is an acronym for Denial of Service. In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting at network sites or network connection, an attacker may be able to prevent network users from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.
Page 391
HTTP HTTP is an acronym for Hypertext Transfer Protocol. It is a protocol that used to transfer or convey information on the World Wide Web (WWW). HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
Page 392
credentials for authentication from any point within the network. IGMP IGMP is an acronym for Internet Group Management Protocol. It is a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships.
Page 393
IPMC is an acronym for IP MultiCast. IP Source Guard IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
Page 394
administrator wants to do a fixed mapping between the DMAC address and switch ports. The frames also contain a MAC address ( SMAC address ), which shows the MAC address of the equipment sending the frame. The SMAC address is used by the switch to automatically update the MAC table with these dynamic MAC addresses.
Page 395
credentials are valid. Based on the answer, the NAS then allows or disallows access to the protected resource. An example of a NAS implementation is IEEE 802.1X. NetBIOS NetBIOS is an acronym for Network Basic Input/Output System. It is a program that allows applications on separate computers to communicate within a Local Area Network (LAN), and it is not supported on a Wide Area Network (WAN).
Page 396
OUI is the organizationally unique identifier. An OUI address is a globally unique identifier assigned to a vendor by IEEE. You can determine which vendor a device belongs to according to the OUI address which forms the first 24 bits of a MAC address.
Page 397
An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user with more capabilities for retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file server. POP and IMAP deal with the receiving of e-mail and are not to be confused with the Simple Mail Transfer Protocol (SMTP).
Page 398
QCE is an acronym for QoS Control Entry. It describes QoS class associated with a particular QCE ID. There are six QCE frame types: Ethernet Type, VLAN, UDP/TCP Port, DSCP, TOS, and Tag Priority. Frames can be classified by one of 4 different QoS classes: "Low", "Normal", "Medium", and "High" for individual application. QCL is an acronym for QoS Control List.
Page 399
RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, such as an Ethernet address. RARP is the complement of ARP. RADIUS RADIUS is an acronym for Remote Authentication Dial In User Service. It is a networking protocol that provides centralized access, authorization and accounting management for people or computers to connect and use a network service.
Page 400
(known as a message digest) of an input data sequence (the message) of any length. Shaper A shaper can limit the bandwidth of transmitted frames. It is located after the ingress queues. SMTP SMTP is an acronym for Simple Mail Transfer Protocol. It is a text-based protocol that uses the Transmission Control Protocol (TCP) and provides a mail service modeled on the FTP file transfer service.
Page 401
strong authentication or guarantee confidentiality (Wikipedia). SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication. Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The original STP protocol is now obsoleted by RSTP.
Page 402
TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password.
Page 403
UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests and, optionally, a checksum capability to verify that the data arrived intact. Common network applications that use UDP include the Domain Name System (DNS), streaming media applications such as IPTV, Voice over IP (VoIP), and Trivial File Transfer Protocol (TFTP).
Page 404
WEP is an acronym for Wired Equivalent Privacy. WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio, so are more susceptible to eavesdropping than wired networks. When introduced in 1999, WEP was intended to provide confidentiality comparable to that of a traditional wired network (Wikipedia).
Page 405
(Wikipedia). WRES WRED is an acronym for Weighted Random Early Detection. It is an active queue management mechanism that provides preferential treatment of higher priority frames when traffic builds up within a queue. A frame's DP level is used as input to WRED.