IFS NS3550-24T/4S User Manual P/N 1072569 • REV 00.05 • ISS 11OCT12...
Page 2
Any similarity to names and addresses of actual businesses or persons is entirely coincidental. Trademarks and The Interlogix name and logo are trademarks of UTC Fire & Security. patents The IFS name and logo are trademarks of UTC Fire & Security.
Page 5
User’s Manual of NS3550-24T/4S 4.4.5 Port Mirroring Configuration ..........................95 4.5 Link Aggregation............................98 4.5.1 Static Aggregation Configuration ........................100 4.5.2 LACP Configuration............................102 4.5.3 LACP System Status ............................103 4.5.4 LACP Port Status...............................105 4.5.5 LACP Port Statistics ............................106 4.6 VLAN................................108 4.6.1 VLAN Overview ..............................108 4.6.2 IEEE 802.1Q VLAN ............................108 4.6.3 VLAN Basic Information ............................
Page 6
4.8.7 MVR Configuration ............................161 4.8.8 MVR Status ...............................163 4.9 Quality of Service .............................165 4.9.1 Understand QOS ...............................165 4.9.2 QCL Configuration Wizard..........................166 4.9.2.1 Set up Policy Rules ..........................167 4.9.2.2 Set up Typical Network Application Rules ....................168 4.9.2.3 Set up ToS Precedence Mapping ......................171 4.9.2.4 Set up VLAN Tag Priority Mapping ......................172 4.9.3 QoS Control List Configuration..........................173 4.9.3.1 QoS Control Entry Configuration ......................174...
Page 7
User’s Manual of NS3550-24T/4S 4.12.3 Access Management Statistics ........................237 4.12.4 HTTPs ................................238 4.12.5 SSH .................................238 4.12.6 Port Security Status ............................239 4.12.7 Port Security Detail............................241 4.12.8 DHCP Snooping ..............................242 4.12.9 DHCP Snooping Statistics ..........................244 4.12.10 IP Source Guard Configuration........................245 4.12.11 IP Source Guard Static Table .........................247 4.12.12 ARP Inspection ..............................248 4.12.13 ARP Inspection Static Table...........................249 4.13 Address Table ............................251...
Page 8
6.1 System Command ............................283 System Configuration ............................283 System Name..............................284 System Contact ..............................285 System Location..............................285 System Timezone..............................286 System Prompt..............................286 System Reboot..............................287 System Restore Default ............................287 System Load ...............................287 System Log .................................288 6.2 IP Command .............................289 IP Configuration..............................289 IP DHCP................................289 IP Setup ................................290 IP Ping.................................290 IP DNS ................................291 IP DNS Proxy ..............................291...
Page 9
User’s Manual of NS3550-24T/4S MAC Configuration ..............................304 MAC Add ................................304 MAC Delete.................................305 MAC Look up ..............................305 MAC Age Time ..............................306 MAC Learning ..............................306 MAC Dump................................307 MAC Statistics ..............................308 MAC Flush ................................309 6.5 VLAN Configuration Command ......................309 VLAN Configuration.............................309 VLAV PVID ................................310 VLAN Frame Type...............................
Page 13
User’s Manual of NS3550-24T/4S STP MSTI Map..............................395 STP MSTI Add..............................396 STP Port Configuration ............................396 STP Port Mode..............................396 STP Port Edge ..............................397 STP Port AutoEdge .............................398 STP Port P2P ..............................398 STP Port RestrictedRole .............................399 STP Port RestrictedTcn ............................399 STP Port bpduGuard............................400 STP Port Statistic ..............................400 STP Port Mcheck ..............................401 STP MSTI Port Configuration ..........................401...
1. INTRODUCTION The IFS NS3550-24T/4S is a 24 ports Gigabit Ethernet Switch with SFP fiber ports and robust layer 2 features. The term “Managed Switch” refers to the NS3550-24T/4S Industrial Switch. 1.1 Packet Contents Open the box of the Managed Switch and carefully unpack it. The box should contain the following items: Check the contents of your package for following parts: ...
Page 19
DC Redundant Power to ensure continuous operation IFS NS3550-24T/4S is equipped with an additional DC 36 ~ 72V power supply unit for redundant power supply installation. Redundant Power Systems are specifically designed to handle the demands of high tech facilities requiring the highest power integrity.
1.3 How to Use This Manual This User Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Switch and how to physically install the Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Managed Switch by Web interface.
User’s Manual of NS3550-24T/4S 1.4 Product Features Physical Port NS3550-24T/4S 24-Port 10/100/1000Base-T Gigabit Ethernet RJ-45 4 100/1000Base-X SFP slots, shared with Port-21 to Port-24 RS-232 DB9 console interface for Switch basic management and setup Industrial Conformance ...
Page 22
■ Port Mirroring to monitor the incoming or outgoing traffic on a particular port Quality of Service ■ Ingress Shaper and Egress Rate Limit per port bandwidth control ■ 4 priority queues on all switch ports ■ Traffic classification: IEEE 802.1p CoS TOS / DSCP / IP Precedence of IPv4/IPv6 packets IP TCP/UDP port number...
Page 23
User’s Manual of NS3550-24T/4S SNMP v1, v2c, and v3 switch management SSH / SSL secure access ■ Four RMON groups (history, statistics, alarms, and events) ■ IPv6 IP Address / NTP / DNS management ■ Built-in Trivial File Transfer Protocol (TFTP) client ■...
1.5 Product Specification Product NS3550-24T/4S Hardware Specification 24 10/ 100/1000Base-T RJ-45 Auto-MDI/MDI-X ports Copper Ports 4 1000Base-SX/LX/BX SFP interfaces, shared with Port 21 to Port 24 SFP/mini-GBIC Slots Compatible with 100Base-FX SFP 1 x RS-232 DB9 serial port (115200, 8, N, 1) Console Port Store-and-Forward Switch Processing Scheme...
2. INSTALLATION This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount. For easier management and control of the Managed Switch, familiarize yourself with its display indicators, and ports. Front panel illustrations in this chapter display the unit LED indicators. Before connecting any network device to the Managed Switch, please read this chapter completely.
User’s Manual of NS3550-24T/4S Reset Button Pressed and Released Function < 5 sec: System reboot Reboot the Managed Switch Reset the Managed Switch to Factory Default configuration. The Managed Switch will then reboot and load the default settings as below: Default Username: admin 。...
■ 10/100/1000Base-T interfaces Color Function Iluminates: To indicate the link through that port is successfully established with speed 1000Mbps. 1000 Blink: To indicate that the switch is actively sending or receiving data over that port. Green LNK/ACT Off: If L10/100 NK/ACT LED light-> indicates that the port is operating at 10Mbps or 100Mbps.
User’s Manual of NS3550-24T/4S 2.2 Install the Switch This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the following topics and perform the procedures in the order being presented. To install your Managed Switch on a desktop or shelf, simply complete the following steps.
Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. For more information, please see the Cabling Specification in Appendix A. Supply power to the Managed Switch. Step5: Connect one end of the power cable to the Managed Switch. Connect the power plug of the power cable to a standard wall outlet.
User’s Manual of NS3550-24T/4S Figure 2-6 Mounting the Managed Switch on a Rack Step6: Proceeds with the steps 4 and steps 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply power to the Managed Switch. 2.2.3 Installing the SFP transceiver The sections describe how to plug-in an SFP transceiver into an SFP slot.
Page 32
Approved IFS SFP Transceivers IFS Managed Switch supports both Single mode and Multi-mode SFP transceiver. Please refer to below chart, as well as the IFS website for the latest compatible SFP modules: We recommend using IFS SFPs on the Managed Switch. If you insert a SFP transceiver that is not supported, the Managed Switch will not recognize it.
Page 33
User’s Manual of NS3550-24T/4S Connect the fiber cable Attach the duplex LC connector on the network cable into the SFP transceiver. Connect the other end of the cable to a device – switches with SFP installed, fiber NIC on a workstation or a Media Converter.
2.2.4 Wiring the Power Input The 6-contact terminal block connector on the rear panel of NS3550-24T/4S is used for two DC redundant powers inputs. Please follow the steps below to insert the power wire. Insert positive / negative DC power wires into the contacts 1 and 2 for DC POWER 1, or 5 and 6 for DC POWER 2. Figure 2-9 Wiring the Redundant Power Inputs Tighten the wire-clamp screws to prevent the wires from loosening.
User’s Manual of NS3550-24T/4S 2.2.5 Wiring the Digital Input / Output The 6-contact terminal block connector on the rear panel of the NS3550-24T/4S is used for Digital Input and Digital Output. Please follow the steps below to insert wire. The NS3550-24T/4S offers two DI and DO groups. 1 and 2 are DI groups, 3 and 4 are DO groups and 5 is GND (ground).The 6 pin is unassigned.
Page 36
Figure 2-13 Wires DI0 and DI1 to Open Detector There are two Digital Output groups for you to be notified of if the NS3550-24T/4S port fails or power fails and issues a high or low signal to external device. The following topology shows how to wire DO0 and DO1. Figure 2-14 Wiring DO0 and DO1 to Open Detector...
3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options.
User’s Manual of NS3550-24T/4S 3.2 Management Access Overview The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods: An administration console Web browser interface An external SNMP-based network management application The administration console and Web browser interface support are embedded in the Managed Switch software and are available for immediate use.
Figure 3-1 Console Management Diagram Direct Access Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation program (such as HyperTerminal) to the Managed Switch console (serial) port. When using this management method, a straight DB9 RS-232 cable is required to connect the switch to the PC. After making this connection, configure the terminal-emulation program to use the following parameters: The default parameters are: 115200 bps...
User’s Manual of NS3550-24T/4S the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program for connecting to the terminal serial port. A workstation attachment under UNIX can use an emulator such as TIP. 3.4 Web Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer.
3.5 SNMP-Based Network Management You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMPc Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses two community strings: the get community string and the set community string.
User’s Manual of NS3550-24T/4S 4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-Based management. About Web-based Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-Based Management supports Internet Explorer 7.0.
Page 44
Logging on the switch Use Internet Explorer 7.0 or above Web browser. Enter the factory-default IP address to access the Web interface. The factory-default IP Address as following: http://192.168.0.100 When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Managed Switch.
Page 45
User’s Manual of NS3550-24T/4S Figure 4-1-3 Default Main Page Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web interface. The Switch Menu on the left of the web page let you access all the commands and statistics the Managed Switch provides.
4.1 Main Web Page The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s Web browser interface to configure and manage it.
Page 47
User’s Manual of NS3550-24T/4S Main Menu Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can setup the Managed Switch by select the functions those listed in the Main Function.
4.2 System Use the System menu items to display and configure basic administrative details of the Managed Switch. Under System the following topics are provided to configure and view the system information: This section has the following items: The switch system information is provided here. ■...
User’s Manual of NS3550-24T/4S 4.2.1 System Information The System Info page provides information for the current device information. System Info page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen is shown in Figure 4-2-1.
System Uptime The period of time the device has been operational. Software Version The software version of the switch. Software Date The software version date of the switch. Buttons Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. : Click to refresh the page;...
User’s Manual of NS3550-24T/4S Provide the IP address of the router in dotted decimal notation. IP Router VLAN ID Provide the managed VLAN ID. The allowed range is 1 through 4095. DNS Server Provide the IP address of the DNS Server in dotted decimal notation. ...
IPv4 address. For example, '::192.1.2.34'. Prefix Provide the IPv6 Prefix of this switch. The allowed range is 1 through 128. Router Provide the IPv6 gateway address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:).
Page 53
User’s Manual of NS3550-24T/4S Figure 4-2-4: User Configuration Interface Screenshot The page includes the following fields: Object Description Display Username of the Managed Switch. Username: Display the access level of the Managed Switch. Access Level: Provide edit current specific user setting. Edit: Provide add new user setting of the Managed Switch, the web screen is shown in Add New User:...
Page 54
Add / Edit User This page configures a user – add, edit or delete user. Figure 4-2-5: Add New User Configuration Interface Screenshot The page includes the following fields: Object Description Assign Username for the Managed Switch. User Name: Assign the access level of the Managed Switch; the available options are: ...
Page 55
User’s Manual of NS3550-24T/4S Figure 4-2-6 User Configuration page screenshot After change the default password, if you forget the password. Please press the “Reset” button in the front panel of the Managed Switch over 10 seconds and then release, the current setting includes VLAN, will be lost and the Managed Switch will restore to the default mode.
4.2.5 Users Privilege Levels This page provides an overview of the privilege levels. After setup completed, please press “Save” button to take effect. Please login web interface with new user name and password, The screen is shown in Figure 4-2-7. Figure 4-2-7 Privilege Levels Configuration Page Screenshot t The page includes the following fields: Object...
Page 57
User’s Manual of NS3550-24T/4S details: System: Contact, Name, Location, Timezone, Log. Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection and IP source guard. IP: Everything except 'ping'. Port: Everything except 'VeriPHY'.
4.2.6 NTP Configuration Configure NTP on this page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers and set GMT Time zone. The NTP Configuration screen is shown in Figure 4-2-8.
Page 59
User’s Manual of NS3550-24T/4S UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components.
Buttons : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. Figure 4-2-10 UPnP devices shows on Windows My Network Places 4.2.8 DHCP Relay Configure DHCP Relay on this page. DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
Page 61
User’s Manual of NS3550-24T/4S The definition of Circuit ID in the switch is 4 bytes in length and the format is "vlan_id" "module_id" "port_no". The parameter of "vlan_id" is the first two bytes represent the VLAN ID. The parameter of "module_id" is the third byte for the module ID. The parameter of "port_no"...
4.2.9 DHCP Relay Statistics This page provides statistics for DHCP relay. The DHCP Relay Statistics screen is shown in Figure 4-2-12. Figure 4-2-12 DHCP Relay Statistics Page Screenshot The page includes the following fields: Server Statistics Object Description Transmit to Server The packets number that relayed from client to server.
Page 63
User’s Manual of NS3550-24T/4S Drop Agent Option The number packets that dropped received packets with relay agent information option. Buttons Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. : Click to refresh the page; any changes made locally will be undone. : Clear all statistics.
4.2.10 CPU Load This page displays the CPU load, using a SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samles are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
User’s Manual of NS3550-24T/4S 4.2.11 System Log The switch system log information is provided here. The System Log screen is shown in Figure 4-2-14. Figure 4-2-14 System Log Page Screenshot The page includes the following fields: Object Description ID The ID (>= 1) of the system logging entry.
: Updates the system log entries, ending at the last available entry ID. 4.2.12 Detailed Log The switch system detailed log information is provided here. The Detailed Log screen is shown in Figure 4-2-15. Figure 4-2-15 Detailed Log Page Screenshot The page includes the following fields: Object Description...
User’s Manual of NS3550-24T/4S 4.2.13 Remote Syslog Configure remote syslog on this page. The Remote Syslog screen is shown in Figure 4-2-16. Figure 4-2-16 Remote Syslog Page Screenshot The page includes the following fields: Object Description Mode Indicates the remote syslog mode operation. Possible modes are: Enabled: Enable remote syslog mode operation.
Page 68
Figure 4-2-17 Web Firmware Upgrade Page Screenshot The page includes the following fields: Object Description SMTP Mode Controls whether SMTP is enabled on this switch. SMTP Server Type the SMTP server name or the IP address of the SMTP server. ...
User’s Manual of NS3550-24T/4S 4.2.15 Web Firmware Upgrade This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen is shown in Figure 4-2-18. Figure 4-2-18 Web Firmware Upgrade Page Screenshot To open Firmware Upgrade screen perform the folling: Click System ->...
4.2.16 TFTP Firmware Upgrade The Firmware Upgrade page provides the functions to allow a user to update the Managed Switch firmware from the TFTP server in the network. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server.
User’s Manual of NS3550-24T/4S 4.2.17 Configuration Backup This function allows backup and reload the current configuration of the Managed Switch to the local management station. The Configuration Backup screen is shown in Figure 4-2-21. Figure 4-2-21 Configuration Backup Page Screenshot You can save/view or load the switch configuration.
Page 72
Figure 4-2-22 File Download Screen Chose the file save path in management workstation. Figure 4-2-23 File Save Screen...
User’s Manual of NS3550-24T/4S 4.2.18 Configuration Upload This function allows backup and reload the current configuration of the Managed Switch to the local management station. The Configuration Upload screen is shown in Figure 4-2-24. Figure 4-2-24 Configuration Upload Page Screenshot ...
4.2.19 Digital input/output Digital Input allows the user to manage external devices with customized messages for specific events, and create logs in to system log, syslog, issue SNMP trap or issue an alarm e-mail. Digital Output allows user to monitor the switch port and power , and let system issues a high or low signal to an external device (such as alarm) when the monitor port or power has been failed.
User’s Manual of NS3550-24T/4S or Low signal to an external device (such as an alarm). Allows user setting a customize message for Digital Input function alarming. Event Description As Digital Input: Action Allows user to record alarm message to System log, syslog or issues out via SNMP Trap or SMTP.
Page 76
Figure 4-2-27 Windows File Selection Menu Popup The page includes the following fields: Object Description Allows user to enable Fault Alarm function. Enable Allows user to record alarm message to System log, syslog or issues out via Record SNMP Trap or SMTP.
User’s Manual of NS3550-24T/4S 4.2.21 Factory Default You can reset the configuration of the switch on this page. Only the IP configuration is retained. The new configuration is available immediately, which means that no restart is necessary. The Factory Default screen is shown in Figure 4-2-28.
4.2.22 System Reboot The Reboot page enables the device to be rebooted from a remote location. Once the Reboot button is pressed, the user will have to re-login the WEB interface about 60 seconds later. The System Reboot screen is shown in Figure 4-2-29.
User’s Manual of NS3550-24T/4S 4.3 Simple Network Management Protocol 4.3.1 SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
Configure SNMPv3 users table on this page. SNMPv3 Users Configure SNMPv3 groups table on this page. SNMPv3 Groups Configure SNMPv3 views table on this page. SNMPv3 Views Configure SNMPv3 accesses table on this page. SNMPv3 Accesses 4.3.2 SNMP System Configuration Configure SNMP on this page.
User’s Manual of NS3550-24T/4S 4.3.3 SNMP System Information Configuration The switch system information is provided here. The System Information Configuration screen is shown in Figure 4-3-2. Figure 4-3-2 System Information Configuration Page Screenshot The page includes the following fields: Object Description ...
Page 82
Figure 4-3-3 SNMP Trap Configuration Page Screenshot The page includes the following fields: Object Description Indicates the SNMP trap mode operation. Possible modes are: Trap Mode Enabled: Enable SNMP trap mode operation. Disabled: Disable SNMP trap mode operation. Indicates the SNMP trap supported version.
Page 83
User’s Manual of NS3550-24T/4S : Click to save changes. : Click to undo any changes made locally and revert to previously saved values.
4.3.5 SNMPv3 Configuration 4.3.5.1 SNMPv3 Communities Configuration Configure SNMPv3 community’s table on this page. The entry index key is Community. The SNMPv3 Communities Configuration screen is shown in Figure 4-3-4. Figure 4-3-4 SNMPv3 Communities Configuration Page Screenshot The page includes the following fields: Object Description ...
Page 85
User’s Manual of NS3550-24T/4S Figure 4-3-5 SNMPv3 Users Configuration Page Screenshot The page includes the following fields: Object Description Check to delete the entry. It will be deleted during the next save. Delete An octet string identifying the engine ID that this entry should belong to. The string Engine ID must contain an even number between 10 and 64 hexadecimal digits, but all-zeros and all-'F's are not allowed.
4.3.5.3 SNMPv3 Groups Configuration Configure SNMPv3 groups table on this page. The entry index keys are Security Model and Security Name. The SNMPv3 Groups Configuration screen is shown in Figure 4-3-6. Figure 4-3-6 SNMPv3 Groups Configuration Page Screenshot The page includes the following fields: Object Description ...
User’s Manual of NS3550-24T/4S Figure 4-3-7 SNMPv3 Views Configuration Page Screenshot The page includes the following fields: Object Description Check to delete the entry. It will be deleted during the next save. Delete A string identifying the view name that this entry should belong to. The allowed View Name string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
Page 88
Figure 4-3-8 SNMPv3 Accesses Configuration Page Screenshot The page includes the following fields: Object Description Check to delete the entry. It will be deleted during the next save. Delete A string identifying the group name that this entry should belong to. The allowed Group Name string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
User’s Manual of NS3550-24T/4S 4.4 Port Management Use the Port Menu to display or configure the Managed Switch's ports. This section has the following items: Configures port connection settings Port Configuration Port Statistics Overview Lists Ethernet and RMON port statistics ...
Page 90
The page includes the following fields: Object Description This is the logical port number for this row. Port Description Indicates the per port description. The current link state is displayed graphically. Green indicates the link is up and Link red indicates that it is down.
User’s Manual of NS3550-24T/4S 4.4.2 Port Statistics Overview This page provides an overview of general traffic statistics for all switch ports. The ports belong to the currently selected unit, as reflected by the page header. The Port Statistics Overview screen is shown in Figure 4-4-2.
Filtered The number of received frames filtered by the forwarding process. Buttons : Click to refresh the page immediately. : Clears the counters for all ports. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. 4.4.3 Port Statistics Detail This page provides detailed traffic statistics for a specific switch port.
Page 93
User’s Manual of NS3550-24T/4S The number of received and transmitted (good and bad) multicast packets. Rx and Tx Multicast The number of received and transmitted (good and bad) broadcast packets. Rx and Tx Broadcast Rx and Tx Pause A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation.
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. 4.4.4 SFP Module Information You can check the physical or operational status of an SFP module via the SFP Module Information page. This page shows the operational status, such as the transceiver type, speed, and wavelength and supports distance of SFP module on a specific interface.
User’s Manual of NS3550-24T/4S : Click to refresh the page immediately. 4.4.5 Port Mirroring Configuration Configure port Mirroring on this page. This function provide to monitoring network traffic that forwards a copy of each incoming or outgoing packet from one port of a network Switch to another port where the packet can be studied. It enables the manager to keep close track of switch performance and alter it if necessary.
Page 96
Figure 4-4-6 Port Mirror Configuration Page Screenshot...
Page 97
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description Port to mirror to Frames from ports that have either source or destination mirroring enabled are mirrored to this port. Disabled option disables mirroring. Switch to mirror to Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this switch.
4.5 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
Page 99
User’s Manual of NS3550-24T/4S The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
4.5.1 Static Aggregation Configuration This page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are global, whereas the aggregation group relate to the currently selected unit, as reflected by the page header. Hash Code Contributors The Aggeration Mode COnfiguration screen is shown in Figure...
Page 101
User’s Manual of NS3550-24T/4S Figure 4-5-3 Aggregation Group Configuration Page Screenshot The page includes the following fields: .Object Description Indicates the group ID for the settings contained in the same row. Group ID Group ID "Normal" indicates there is no aggregation. Only one group ID is valid per port. ...
4.5.2 LACP Configuration Link Aggregation Control Protocol (LACP) - LACP LAG negotiate Aggregated Port links with other LACP ports located on a different device. LACP allows switches connected to each other to discover automatically whether any ports are member of the same LAG.
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description The switch port number. Port Controls whether LACP is enabled on this switch port. LACP will form an LACP Enabled aggregation when 2 or more ports are connected to the same partner. LACP can form max 12 LLAGs per switch.
Page 104
The page includes the following fields: Object Description The Aggregation ID associated with this aggregation instance. Aggr ID For LLAG the id is shown as 'isid:aggr-id' and for GLAGs as 'aggr-id' The system ID (MAC address) of the aggregation partner. Partner System ID ...
User’s Manual of NS3550-24T/4S 4.5.4 LACP Port Status This page provides a status overview for LACP status for all ports. The LACP Port Status screen is shown in Figure 4-5-6. Figure 4-5-6 LACP Port Status Page Screenshot The page includes the following fields: Object Description ...
Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. 4.5.5 LACP Port Statistics This page provides an overview for LACP statistics for all ports. The LACP statistics screen is shown in Figure 4-5-7.
Page 107
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description The switch port number. Port Shows how many LACP frames have been sent from each port. LACP Transmitted Shows how many LACP frames have been received at each port. LACP Received ...
4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN.
Page 109
User’s Manual of NS3550-24T/4S (such as e-mail), or multicast groups (used for multimedia applications such as videoconferencing). VLANs provide greater network efficiency by reducing broadcast traffic, and allow you to make network changes without having to update IP addresses or IP subnets. VLANs inherently provide a high level of network security since traffic must pass through a configured Layer 3 link to reach a different VLAN.
Page 110
The tag is inserted into the packet header making the entire packet longer by 4 octets. All of the information originally contained in the packet is retained. 802.1Q Tag User Priority VLAN ID (VID) 3 bits 1 bits 12 bits TPID (Tag Protocol Identifier) TCI (Tag Control Information) 2 bytes...
Page 111
User’s Manual of NS3550-24T/4S A switch port can have only one PVID, but can have as many VID as the switch has memory in its VLAN table to store them. Because some devices on a network may be tag-unaware, a decision must be made at each port on a tag-aware device before packets are transmitted –...
4.6.3 VLAN Basic Information The VLAN Basic Information page displays basic information on the VLAN type supported by the Managed Switch. The VLAN Basic Information screen is shown in Figure 4-6-1. Figure 4-6-1 VLAN Basic Information Page Screenshot The page includes the following fields: Object Description ...
User’s Manual of NS3550-24T/4S 4.6.4 VLAN Port Configuration This page is used for configuring the Managed Switch port VLAN. The VLAN per Port Configuration page contains fields for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Configuration page. All untagged packets arriving to the device are tagged by the ports PVID.
Page 114
The Managed Switch supports multiple VLAN tags and can therefore be used in MAN applications as a provider bridge, aggregating traffic from numerous independent customer LANs into the MAN (Metro Access Network) space. One of the purposes of the provider bridge is to recognize and use VLAN tags so that the VLANs in the MAN space can be used independent of the customers’...
Page 115
User’s Manual of NS3550-24T/4S Figure 4-6-2 VLAN Port Configuration Page Screenshot The page includes the following fields: Object Description This is the logical port number for this row. Port PVID Allow assign PVID for selected port. The range for the PVID is 1-4094. The PVID will be inserted into all untagged frames entering the ingress port.
Page 116
Allow 802.1Q Untagged or Tagged VLAN for selected port. Link Type When adding a VLAN to selected port, it tells the switch whether to keep or remove the tag from a frame on egress. - Untag: outgoing frames without VLAN-Tagged. - Tagged: outgoing frames with VLAN-Tagged.
User’s Manual of NS3550-24T/4S 4.6.5 VLAN Membership Configuration Adding Static Members to VLANs (VLAN Index) Use the VLAN Static Table to configure port members for the selected VLAN index. The VLAN membership configuration for the selected the switch can be monitored and modified here. Up to 255 VLANs are supported. This page allows for adding and deleting VLANs as well as adding and deleting port members of each VLAN.
Buttons : Click to add new VLAN. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. : Refreshes the displayed table starting from the "VLAN ID" input fields. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed.
User’s Manual of NS3550-24T/4S Buttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. : Click to refresh the page immediately. 4.6.7 VLAN Port Status for User Static This page provides VLAN Port Staus.
PVID Shows the VLAN identifier for that port. The allowed values are 1 through 4095. The default value is 1. VLAN Aware Show the VLAN Awareness for the port. If VLAN awareness is enabled, the tag is removed from tagged frames received on the port.
Page 121
User’s Manual of NS3550-24T/4S database servers on the inside segment, but are not allowed to communicate with each other For private VLANs to be applied, the switch must first be configured for standard VLAN operation when this is in place. One or more of the configured VLANs can be configured as private VLANs.
shown in Figure 4-6-6. Figure 4-6-6 Port Isolation Configuration Page Screenshot The page includes the following fields: Object Description Port The switch interface. PVLAN Port Type Displays private VLAN port types. - Isolated: A single stand-alone VLAN that contains one promiscuous port and one or more isolated (or host) ports.
Page 123
User’s Manual of NS3550-24T/4S Private VLANs are based on the source port mask, and there are no connections to VLANs. This means that VLAN IDs and Private VLAN IDs can be identical. A port must be a member of both a VLAN and a Private VLAN to be able to forward packets. By default, all ports are VLAN unaware and members of VLAN 1 and Private VLAN 1.
Buttons : Click to add new VLAN. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.6.10 VLAN setting example: - Separate VLAN - 802.1Q VLAN Trunk - Port Isolate 4.6.10.1 Two separate 802.1Q VLAN The diagram shows how the Managed Switch handles Tagged and Untagged traffic flow for two VLANs.
Page 125
User’s Manual of NS3550-24T/4S VLAN Group 1 Port-7~Port-24 VLAN Group 2 Port-1, Port-2 Port-3 VLAN Group 3 Port-4, Port-5 Port-6 Table 4-6-2 VLAN and Port Configuration The scenario described as follow: Untagged packet entering VLAN 2 While [PC-1] transmit an untagged packet enters Port-1, the Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will be received the packet through Port-2 and Port-3.
Page 126
VLAN 2: Port-1, Port-2 and Port-3 VLAN 3: Port-4, Port-5 and Port-6 VLAN 1: All other ports – Port-7~Port-24 Remove VLAN Member for VLAN 1: Remember to remove the Port 1 – Port 6 from VLAN 1 membership, since the Port 1 – Port 6 had been assigned to VLAN 2 and VLAN 3.
Page 127
User’s Manual of NS3550-24T/4S Figure 4-6-10 Port 1-Port 6 VLAN Configuration...
4.6.10.2 VLAN Trunking between two 802.1Q aware switch The most cases are used for “Uplink” to other switches. VLANs are separated at different switches, but they need to access with other switches within the same VLAN group. The screen is shown in Figure 4-6-11.
User’s Manual of NS3550-24T/4S VLAN 3: Port-4, Port-5 and Port-6 VLAN 1: All other ports – Port-7~Port-24 About the VLAN ports connect to the hosts, please refer to 4.6.10.1 examples. The following steps will focus on the VLAN Trunk port configuration. Specify Port-8 to be the 802.1Q VLAN Trunk port.
Page 130
4-6-14. This section will show you how to configure the port for the server – that could be accessed by each isolate port. Setup steps Assign Port Mode Set Port-1~Port-4 in Isolate port. Set Port5 and Port-6 to Promiscuous port. The screen is shown in Figure 4-6-15.
Page 131
User’s Manual of NS3550-24T/4S Figure 4-6-15 The Configuration of Isolate and Promiscuous Port Assign VLAN Member: VLAN 1: Port-1, Port-2, Port-5 and Port-3 VLAN 2: Port-3~Port-6. The screen is shown in Figure 4-6-16. Figure 4-6-16 Private VLAN Port Setting...
4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
Page 133
User’s Manual of NS3550-24T/4S The port identifier of the transmitting port The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on which the packet is transmitted will receive the BPDU. BPDU does’nt directly forward by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
Page 134
Figure 4-7-1 STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
Page 135
User’s Manual of NS3550-24T/4S The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value A combination of the User-set priority and the 32768 + MAC Bridge Identifier(Not user switch’s MAC address. configurable The Bridge Identifier consists of two parts: except by setting priority a 16-bit priority and a 48-bit Ethernet MAC below)
Page 136
out that your Switch has the lowest Bridge Identifier, it will become the Root Bridge. Forward Delay Timer – The Forward Delay can be from 4 to 30 seconds. This is the time any port on the Switch spends in the listening state while moving from the blocking state to the forwarding state. Observe the following formulas when setting the above parameters: Max.
Page 137
User’s Manual of NS3550-24T/4S Figure 4-7-2 Before Applying the STA Rules In this example, only the default STP values are used. Figure 4-7-3 After Applying the STA Rules...
The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C.
Page 139
User’s Manual of NS3550-24T/4S The page includes the following fields: Basic Settings Object Description The STP protocol version setting. Valid values are STP, RSTP and MSTP. Protocol Version The delay used by STP Bridges to transition Root and Designated Ports to Forward Delay Forwarding (used in STP compatible mode).
4.7.3 Bridge Status This page provides a status overview for all STP bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: The STP Bridge Status screen is shown in Figure 4-7-5.
Page 141
User’s Manual of NS3550-24T/4S Figure 4-7-6 STP CIST Port Configuration Page Screenshot The page includes the following fields: Object Description The switch port number of the logical STP port. Port Controls whether RSTP is enabled on this switch port. STP Enabled...
Page 142
Controls the path cost incurred by the port. The Auto setting will set the path cost Path Cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered. The path cost is used when establishing the active topology of the network.
User’s Manual of NS3550-24T/4S Half Duplex 2,000,000 Ethernet Full Duplex 1,999,999 Trunk 1,000,000 Half Duplex 200,000 Fast Ethernet Full Duplex 100,000 Trunk 50,000 Full Duplex 10,000 Gigabit Ethernet Trunk 5,000 Table 4-7-2 Recommended STP Path Costs Port Type Link Type IEEE 802.1w-2001 Half Duplex 2,000,000...
Priority Controls the bridge priority. Lower numerical values have better priority. The bridge priority plus the MSTI instance number concatenated with the 6-byte MAC address of the switch forms a Bridge Identifier. Buttons : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.7.6 MSTI Configuration This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well.
User’s Manual of NS3550-24T/4S Object Description Configuration Name The name identifiying the VLAN to MSTI mapping. Bridges must share the name and revision (see below), as well as the VLAN-to-MSTI mapping configuration in order to share spanning trees for MSTI's. (Intra-region). The name is at most 32 characters.
Page 146
Select MSTI Select the bridge instance and set more detail configuration. Figure 4-7-10 MST1 MSTI Port Configuration Page Screenshot...
User’s Manual of NS3550-24T/4S The page includes the following fields: MSTx MSTI Port Configuration Object Description Port The switch port number of the corresponding STP CIST (and MSTI) port. Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values.
The page includes the following fields: Object Description The switch port number of the logical STP port. Port The current STP port role of the ICST port. The port role can be one of the CIST Role following values: AlternatePort BackupPort RootPort...
Page 149
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description The switch port number of the logical RSTP port. Port The number of RSTP Configuration BPDU's received/transmitted on the port. RSTP The number of legacy STP Configuration BPDU's received/transmitted on the port.
4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing.
Page 151
User’s Manual of NS3550-24T/4S Figure 4-8-1 Multicast Service Figure 4-8-2 Multicast Flooding...
Page 152
Figure 4-8-3 IGMP Snooping Multicast Stream Control IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112.
Page 153
User’s Manual of NS3550-24T/4S 0x16 Membership Report (version 2) 0x17 Leave a Group (version 2) 0x12 Membership Report (version 1) IGMP packets enable multicast routers to keep track of the membership of multicast groups, on their respective sub networks. The following outlines what is communicated between a multicast router and a multicast group member using IGMP. A host sends an IGMP “report”...
Page 154
role of querying the LAN for group members. It propagates the service requests on to any doing upstream multicast switch/router to ensure that it will continue to receive the multicast service. Multicast routers use this information, along with a multicast routing protocol such as DVMRP or PIM, to support IP multicasting across the Internet.
User’s Manual of NS3550-24T/4S 4.8.2 IGMP Snooping Configuration This page provides IGMP Snooping related configuration. Most of the settings are global, whereas the Router Port configuration is related to the currently selected unit, as reflected by the page header. The IGMP Snooping Configuration screen is shown in Figure 4-8-5.
Page 156
Most of the settings are global, whereas the Router Port configuration is related to the currently selected unit, as reflected by the page header. The IGMP Port Related Configuration screen is shown in Figure 4-8-6. Figure 4-8-6 IGMP Port Related Configuration Page Screenshot The page includes the following fields: Object Description...
User’s Manual of NS3550-24T/4S Router port. Use this mode when you connect an IGMP multicast server or IP camera which applied with multicast protocol to the port. None: The Managed Switch will not use the specified port as an IGMP Router port.
other devices. Buttons : Refreshes the displayed table starting from the "VLAN" input fields. : Updates the table starting from the first entry in the VLAN Table, i.e. the entry with the lowest VLAN ID. : Updates the table, starting with the entry after the last entry currently displayed. : Click to save changes.
User’s Manual of NS3550-24T/4S Object Description Check to delete the entry. It will be deleted during the next save. Delete Port The logical port for the settings. Filtering Group The IP Multicast Group that will be filtered. Buttons : Check to delete the entry.
Page 160
Figure 4-8-9 IGMP Snooping Status Page Screenshot The page includes the following fields: Object Description The VLAN ID of the entry. VLAN ID The present IGMP groups. Max. are 128 groups for each VLAN. Groups The ports that are members of the entry. Port Members ...
User’s Manual of NS3550-24T/4S Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. 4.8.7 MVR Configuration In multicast VLAN networks, subscribers to a multicast group can exist in more than one VLAN. If the VLAN boundary restrictions in a network consist of Layer 2 switches Multicast VLAN Registration (MVR) is a protocol for Layer 2 (IP)-networks that enables multicast-traffic from a source VLAN to be shared with subscriber-VLANs.
Page 162
Figure 4-8-10 MVR Configuration Page Screenshot The page includes the following fields: Object Description MVR Mode Enable/Disable the Global MVR.
User’s Manual of NS3550-24T/4S VLAN ID Specify the Multicast VLAN ID. Mode Enable MVR on the port. Type Specify the MVR port type on the port. Immediate Leave Enable the fast leave on the port. Buttons : Click to save changes.
Page 164
Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
User’s Manual of NS3550-24T/4S 4.9 Quality of Service 4.9.1 Understand QOS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic.
Apply a QoS profile to a port(s). 4.9.2 QCL Configuration Wizard This handy wizard helps you set up a QCL quickly. The QCL Configuration Wizard screen is shown in Figure 4-9-1. Figure 4-9-1 Welcome to the QCL Configuration Wizard Page Screenshot The page includes the following fields: Object Description...
User’s Manual of NS3550-24T/4S 4.9.2.1 Set up Policy Rules Group ports into several types which according to different QCL policies. The settings relate to the currently selected unit, as reflected by the page header. The screen is shown in Figure 4-9-2.
: Click to start the wizard again. : Click to get more information. : Click to continue the wizard. Once the QCL configuration wizard is finished, the below screen. Buttons : Click to start the wizard again. : Click to get more information. 4.9.2.2 Set up Typical Network Application Rules Set up the specific QCL for different typical network application quality control.
Page 169
User’s Manual of NS3550-24T/4S Figure 4-9-3 Set up Typical Network Application Rules Page Screenshot The page includes the following fields: Object Description Indicates the common servers that apply to the specific QCE . Audio and Video The common servers are: QuickTime 4 Server MSN Messenger Phone Yahoo Messenger Phone...
Page 170
the frame type that you selected. Figure 4-9-4 Set up Typical Network Application Rules Page 2 Screenshot The page includes the following fields: Object Description Select the QCL ID to which these QCEs apply. QCL ID Select a traffic class of Low, Normal, Medium, or High to apply to the QCE. Traffic Class Buttons : Click to cancel the wizard.
User’s Manual of NS3550-24T/4S 4.9.2.3 Set up ToS Precedence Mapping Set up the traffic class mapping to the precedence part of ToS (3 bits) when receiving IPv4/IPv6 packets. The Set up ToS Precedence Mapping screen is shown in Figure 4-9-5. Figure 4-9-5 Set up ToS Precedence Mapping Page Screenshot The page includes the following fields: Object...
4.9.2.4 Set up VLAN Tag Priority Mapping Set up the traffic class mapping to the User Priority value (3 bits) when receiving VLAN tagged packets. The Set up VLAN Tag Priority Mapping screen is shown in Figure 4-9-6. Figure 4-9-6 Set up VLAN Tag Priority Mapping Page Screenshot The page includes the following fields: Object Description...
User’s Manual of NS3550-24T/4S : Click to continue the wizard. The QCL configuration wizard is finished, and the new configuration is ready for use. 4.9.3 QoS Control List Configuration This page lists the QCEs for a given QCL. 4 different QoS classes classified Frameswhich are Low, Normal, Medium, and High. ...
Type that follows the tag header. VLAN ID: VLAN ID. Only applicable if the frame is VLAN tagged. TCP/UDP Port: IPv4 TCP/UDP source/destination port. DSCP: IPv4 and IPv6 DSCP. ToS: The 3 precedence bit in the ToS byte of the IPv4/IPv6 header (also known as DS field).
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description Select the available type for the specific QCE. QCE Type Ethernet Type: Matches the received frame's EtherType against the QCE Key. VLAN ID: Matches the frame's VID against the QCE Key. TCP/UDP Port: Matches the destination port and the source port against the QCE Key.
Page 176
Figure 4-9-9 Port QoS Configuration Page Screenshot The page includes the following fields: Object Description Number of Classes Configure the number of traffic classes as "1", "2", or "4". The default value is "4". The logical port for the settings contained in the same row. Port ...
User’s Manual of NS3550-24T/4S Select which QCL to use for the port. QCL # Select the default tag priority for this port when adding a Tag to the untagged Tag Priority frames. Select which Queuing mode for this port. Queuing Mode ...
Page 178
Figure 4-9-10 Rate Limit Configuration Page Screenshot The page includes the following fields: Object Description The logical port for the settings contained in the same row. Port Enable or disable the port policer. The default value is "Disabled". Policer Enabled ...
User’s Manual of NS3550-24T/4S Shaper Rate Configure the rate for the port shaper. The default value is "500". This value is restricted to 500-1000000 when the "Policer Unit" is "kbps", and it is restricted to 1-1000 when the "Policer Unit" is "Mbps" ...
4.9.7 QoS Statistics This page provides statistics for the different queues for all switch ports. The ports belong to the currently selected unit, as reflected by the page header. The QoS Statistics screen is shown in Figure 4-9-12. Figure 4-9-12 QoS Statistics Page Screenshot The page includes the following fields: Object Description...
User’s Manual of NS3550-24T/4S This is the highest priority queue of the 4 QoS queues. High Queue Receive/Transmit The number of received and transmitted packets per port. Buttons : Click to refresh the page immediately. : Clears the counters for all ports. Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
Page 182
Figure 4-9-13 DSCP Remarking Configuration Page Screenshot The page includes the following fields: Object Description The logical port for the settings contained in the same row. Port If the QoS remarking mode is set to enabled, it should be with this DSCP DSCP Remarking remarking/correction function according to RFC2474 on this port.
User’s Manual of NS3550-24T/4S CS5 = DSCP (40) CS6 = DSCP (48) CS7 = DSCP (56) Expedite Forward = DSCP (46) Buttons : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.9.9 Voice VLAN Configuration The Voice VLAN feature enables the voice traffic forwarding on the Voice VLAN, then the switch can classifying and scheduling to network traffic.
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description Mode Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Possible modes are: Enabled: Enable Voice VLAN mode operation.
Figure 4-9-15 Voice VLAN OUI Table Page Screenshot The page includes the following fields: Object Description Delete Check to delete the entry. It will be deleted during the next save. Telephony OUI An telephony OUI address is a globally unique identifier assigned to a vendor by IEEE.
User’s Manual of NS3550-24T/4S access rights. ACL implementations can be quite complex, for example, when the ACEs are prioritized for the various situations. In networking, the ACL refers to a list of service ports or network services that are available on a host or server; each with a list of hosts or servers permitted or denied to use the service.
CPU Once Forward first packet that matched the specific ACE to CPU. Counter The counter indicates the number of times the ACE was hit by a frame. Conflict Indicates the hardware status of the specific ACE. The specific ACE is not applied to the hardware due to hardware limitations.
User’s Manual of NS3550-24T/4S IPv4/Other: The ACE will match IPv4 frames, which are not ICMP/UDP/TCP. Action Indicates the forwarding action of the ACE. Permit: Frames matching the ACE may be forwarded and learned. Deny: Frames matching the ACE are dropped. ...
Page 190
Figure 4-10-3 ACE Configuration Page Screenshot The page includes the following fields: Object Description Select the ingress port for which this ACE applies. Ingress Port Any: The ACE applies to any port. Port n: The ACE applies to this port number, where n is the number of the switch port. Policy n: The ACE applies to this policy number, where n can range from 1 through 8.
Page 191
User’s Manual of NS3550-24T/4S Object Description (Only displayed when the frame type is Ethernet Type or ARP.) SMAC Filter Specify the source MAC filter for this ACE. Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) Specific: If you want to filter a specific source MAC address with this ACE, choose this value.
Page 192
Network: Target IP filter is set to Network. Specify the target IP address and target IP mask in the Target IP Address and Target IP Mask fields that appear. Target IP Address When "Host" or "Network" is selected for the target IP filter, you can enter a specific target IP address in dotted decimal notation.
Page 193
User’s Manual of NS3550-24T/4S zero must not be able to match this entry. Yes: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry. Any: Any value is allowed ("don't-care"). ...
Page 194
When "Range" is selected for the TCP/UDP source filter, you can enter a specific TCP/UDP Source TCP/UDP source range value. The allowed range is 0 to 65535. A frame that hits Range this ACE matches this TCP/UDP source value. ...
User’s Manual of NS3550-24T/4S 4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The settings relate to the currently selected unit, as reflected by the page header. The ACL Ports Configuration screen is shown in Figure 4-10-4.
Select which rate limiter to apply to this port. The allowed values are Disabled or Rate Limiter ID the values 1 through 15. The default value is "Disabled". Select which port frames are copied to. The allowed values are Disabled or a Port Copy specific port number.
Page 197
User’s Manual of NS3550-24T/4S Figure 4-10-5 ACL Rate Limiter Configuration Page Screenshot The page includes the following fields: Object Description The rate limiter ID for the settings contained in the same row. Rate Limiter ID The rate unit is packet per second (pps), configure the rate as 1, 2, 4, 8, 16, 32, Rate 64, 128, 256, 512, 1K, 2K, 4K, 8K, 16K, 32K, 64K, 128K, 256K, 512K, or 1024K.
4.11 Authentication This section is to control the access of the Managed Switch and includes the user access and management control. The Authentication section contains links to the following main topics: IEEE 802.1X Port-Based Network Access Control MAC-Based Authentication ...
User’s Manual of NS3550-24T/4S to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users; equipment whose MAC address is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported. The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide. Overview of User Authentication It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local or remote authentication methods, such as telnet and Web browser.
Page 200
Figure 4-11-1 Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) Authentication server—performs the actual authentication of the client.
Page 201
User’s Manual of NS3550-24T/4S Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
If a client that does not support 802.1X is connected to an unauthorized 802.1X port, the switch requests the client's identity. In this situation, the client does not respond to the request, the port remains in the unauthorized state, and the client is not granted access to the network.
User’s Manual of NS3550-24T/4S Authentication Method Authentication Method can be set to one of the following values: None: authentication is disabled and login is not possible. local: use the local user database on the switch for authentication. radius: use a remote RADIUS server for authentication. tacacs+: use a remote TACACS+ server for authentication.
Page 204
Figure 4-11-4 Network Access Server Configuration Page Screenshot...
Page 205
User’s Manual of NS3550-24T/4S The page includes the following fields: System Configuration Object Description Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. Reauthentication If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Reauthentication Period.
Page 206
The "RADIUS-Assigned QoS Enabled" checkbox provides a quick way to globally enable/disable RADIUS-server assigned QoS Class functionality. When checked, the individual ports' ditto setting determines whether RADIUS-assigned QoS Class is enabled for that port. When unchecked, RADIUS-server assigned QoS Class is disabled for all ports. ...
Page 207
User’s Manual of NS3550-24T/4S In this mode, the switch will send one EAPOL Failure frame when the port link comes up, and any client on the port will be disallowed network access. Port-based 802.1X In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the authentication server.
Page 208
In Multi 802.1X it is not possible to use the multicast BPDU MAC address as destination MAC address for EAPOL frames sent from the switch towards the supplicant, since that would cause all supplicants attached to the port to reply to requests sent from the switch.
Page 209
User’s Manual of NS3550-24T/4S present and valid, the port's Port VLAN ID will be changed to this VLAN ID, the port will be set to be a member of that VLAN ID, and the port will be forced into VLAN unaware mode. Once assigned, all traffic arriving on the port will be classified and switched on the RADIUS-assigned VLAN If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VLAN ID or it's invalid, or the supplicant is otherwise no...
Page 210
VLAN if the "Allow Guest VLAN if EAPOL Seen" is disabled. Port State The current state of the port. It can undertake one of the following values: Globally Disabled: NAS is globally disabled. Link Down: NAS is globally enabled, but there is no link on the port. Authorized: The port is in Force Authorized or a single-supplicant mode and the supplicant is authorized.
User’s Manual of NS3550-24T/4S 4.11.4 Network Access Overview This page provides an overview of the current NAS port states for the selected switch. The Network Access Overview screen is shown in Figure 4-11-5. Figure 4-11-5 Network Access Overview Page Screenshot The page includes the following fields: Object Description...
Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID.
Page 213
User’s Manual of NS3550-24T/4S Port Counters Object Description EAPOL Counters These supplicant frame counters are available for the following administrative states: Force Authorized Force Unauthorized Port-based 802.1X Single 802.1X Multi 802.1X Direction Name IEEE Name Description dot1xAuthEapolFrames The number of valid EAPOL Total frames of any type that have been received by the switch.
Page 214
Direction Name IEEE Name Description dot1xAuthBackendAcce Access 802.1X-based: ssChallenges Counts the number of times Challenges that the switch receives the first request from the backend server following the first response from the supplicant. Indicates that the backend server has communication with the switch.
Page 215
User’s Manual of NS3550-24T/4S Last Supplicant/Client Information about the last supplicant/client that attempted to authenticate. This Info information is available for the following administrative states: Port-based 802.1X Single 802.1X Multi 802.1X MAC-based Auth. Name IEEE Name Description dot1xAuthLastEapolF The MAC address of the last supplicant/client. rameSource Address The VLAN ID on which the last frame from the...
Last Authentication Shows the date and time of the last authentication of the client (successful as well as unsuccessful). Buttons Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. Click to refresh the page immediately. : This button is available in the following modes: •...
Page 217
User’s Manual of NS3550-24T/4S Figure 4-11-7 Authentication Server Configuration Page Screenshot The page includes the following fields: Port State These setting are common for all of the Authentication Servers. Object Description Timeout The Timeout, which can be set to a number between 3 and 3600 seconds, is the maximum time to wait for a reply from a server.
Page 218
continue with the next enabled server (if any). RADIUS servers are using the UDP protocol, which is unreliable by design. In order to cope with lost frames, the timeout interval is divided into 3 subintervals of equal length. If a reply is not received within the subinterval, the request is transmitted again.
User’s Manual of NS3550-24T/4S Object Description # The TACACS+ Authentication Server number for which the configuration below applies. Enabled Enable the TACACS+ Authentication Server by checking this box. IP Address/Hostname The IP address or hostname of the TACACS+ Authentication Server. IP address is expressed in dotted decimal notation.
Page 220
The page includes the following fields: RADIUS Authentication Servers Object Description # The RADIUS server number. Click to navigate to detailed statistics for this server. IP Address The IP address and UDP port number (in <IP Address>:<UDP Port> notation) of this server.
User’s Manual of NS3550-24T/4S 4.11.8 RADIUS Details This page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen is shown in Figure 4-11-9. Figure 4-11-9 RADIUS Authentication/Accounting for Server Overview Page Screenshot The page includes the following fields: RADIUS Authentication Servers The statistics map follows closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
Page 222
server. radiusAuthClientExtA The number of RADIUS Access Rejects ccessRejects Access-Reject packets (valid or invalid) received from the server. radiusAuthClientExtA The number of RADIUS Access ccessChallenges Access-Challenge packets Challenges (valid or invalid) received from the server. radiusAuthClientExt The number of malformed Malformed MalformedAccessRe RADIUS Access-Response...
Page 223
User’s Manual of NS3550-24T/4S the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout.
Page 224
on the accounting port. radiusAccClientExt The number of RADIUS Packets Dropped PacketsDropped packets that were received from the server on the accounting port and dropped for some other reason. radiusAccClientExt The number of RADIUS Requests Requests packets sent to the server. This does not include retransmissions.
User’s Manual of NS3550-24T/4S 4.11.9 Windows Platform RADIUS Server Configuration Setup the RADIUS server and assign the client IP address to the Managed switch. In this case, field in the default IP Address of the Managed Switch with 192.168.0.100. And also make sure the shared secret key is as same as the one you had set at the Managed Switch’s 802.1x system configuration –...
Page 226
Figure 4-11-11 Windows Server – add new RADIUS Client Setting Assign the client IP address to the Managed switch Figure 4-11-12 Windows Server RADIUS Server setting...
Page 227
User’s Manual of NS3550-24T/4S The shared secret key should be as same as the key configured on the Managed Switch. Figure 4-11-13 Windows Server RADIUS Server Setting...
Page 228
Configure ports attribute of 802.1X, the same as “802.1X Port Configuration”. Figure 4-11-14 802.1x Port Configuration Create user data. The establishment of the user data needs to be created on the Radius Server PC. For example, the Radius Server founded on Win2003 Server, and then: Figure 4-11-15 Windows 2003 AD server Setting Path...
Page 229
User’s Manual of NS3550-24T/4S Enter ” Active Directory Users and Computers”, create legal user data, the next, right-click a user what you created to enter properties, and what to be noticed: Figure 4-11-16 Add User Properties Screen Figure 4-11-17 Add User Properties Screen...
Set the Ports Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is an uplink port that is connected to another switch. Or once the 802.1X stat to work, the switch might not be able to access the RADIUS server. 4.11.10 802.1X Client Configuration Windows XP supports 802.1X.
Page 231
User’s Manual of NS3550-24T/4S Select “Authentication” tab. Select “Enable network access control using IEEE 802.1X” to enable 802.1x authentication. Select “MD-5 Challenge” from the drop-down list box for EAP type. Figure 4-11-19 Click “OK”. When client has associated with the Managed Switch, a user authentication notice appears in system tray. Click on the notice to continue.
Page 232
Figure 4-11-20 Windows Client Popup Login Request Message Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process. Figure 4-11-21...
User’s Manual of NS3550-24T/4S 4.12 Security This section is to control the access of the Managed Switch and includes the user access and management control. The Security page contains links to the following main topics: Port Limit Control Access Management ...
Page 234
Figure 4-12-1 Port Limit Control Configuration Overview Page Screenshot...
Page 235
User’s Manual of NS3550-24T/4S The page includes the following fields: System Configuration Object Description Mode Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled.
1) Boot from a new masterthe switch, 2) Disable and re-enable Limit Control on the port or the switch, 3) Click the Reopen button. Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port, both the "Trap" and the "Shutdown"...
User’s Manual of NS3550-24T/4S Disabled: Disable access management mode operation. Delete Check to delete the entry. It will be deleted during the next save. Start IP address Indicates the start IP address for the access management entry. End IP address Indicates the end IP address for the access management entry.
Discard Packets The discarded packets number from the interface under access management mode is enabled. Buttons Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. : Click to refresh the page immediately. : Clear all statistics.
User’s Manual of NS3550-24T/4S one chooses to block it, it will be blocked until that user module decides otherwise. The status page is divided into two sections - one with a legend of user modules and one with the actual port status. The SSH Configuration screen is shown in Figure 4-12-5.
Page 240
Figure 4-12-6 Port Security Status Screen Page Screenshot The page includes the following fields: User Module Legend The legend shows all user modules that may request Port Security services. Object Description User Module Name The full name of a module that may request Port Security services.
User’s Manual of NS3550-24T/4S Abbr A one-letter abbreviation of the user module. This is used in the Users column in the port status table. Port Status The table has one row for each port on the selected switch in the switch and a number of columns, which are: Object Description ...
Figure 4-12-7 Port Security Detail Screen Page Screenshot The page includes the following fields: Object Description MAC Address & VLAN The MAC address and VLAN ID that is seen on this port. If no MAC addresses are learned, a single row stating "No MAC addresses attached" is displayed. ...
Page 243
User’s Manual of NS3550-24T/4S Figure 4-12-8 DHCP Snooping Configuration Screen Page Screenshot The page includes the following fields: Object Description Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode operation. When enabled DHCP snooping, the requested DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports.
Buttons : Click to save changes. Click to undo any changes made locally and revert to previously saved values. 4.12.9 DHCP Snooping Statistics This page provides statistics for DHCP snooping. The statistics only counter packet under DHCP snooping mode is enabled and relay mode is disabled.
User’s Manual of NS3550-24T/4S The page includes the following fields: Object Description Rx and Tx Discover The number of discover (option 53 with value 1) packets received and transmitted. Rx and Tx Offer The number of offer (option 53 with value 2) packets received and transmitted. ...
Page 246
Figure 4-12-10 IP Source Guard Configuration Screen Page Screenshot The page includes the following fields: Object Description Mode of IP Source Enable the Global IP Source Guard or disable the Global IP Source Guard. All configured ACEs will be lost when the mode is enabled. Guard Configuration ...
User’s Manual of NS3550-24T/4S Max Dynamic Clients Specify the maximum number of dynamic clients can be learned on given ports. This value can be 0, 1, 2 and unlimited. If the port mode is enabled and the value of max dynamic client is equal 0, it means only allow the IP packets forwarding that are matched in static entries on the specific port.
4.12.12 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT.
User’s Manual of NS3550-24T/4S Object Description Mode of ARP Enable the Global ARP Inspection or disable the Global ARP Inspection. Inspection Configuration Port Mode Defines the ports on which ARP Inspection is enabled, ARP Inspection is only enabled on this given port when both Global Mode and Port Mode on a given port Configuration are enabled.
Page 250
Click to undo any changes made locally and revert to previously saved values.
User’s Manual of NS3550-24T/4S 4.13 Address Table Switching of frames is based upon the DMAC address contained in the frame. The Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame). This table contains both static and dynamic entries.
4.13.2 Static MAC Table Configuration The static entries in the MAC table are shown in this table. The static MAC table can contains up to 64 entries. The MAC table is sorted first by VLAN ID and then by MAC address. The Static MAC Table Configuration screen is shown in Figure 4-13-2.
Page 253
User’s Manual of NS3550-24T/4S Figure 4-13-3 MAC Address Table Status Navigating the MAC Table Each page shows up to 999 entries from the MAC table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the MAC Table. The first displayed will be the one with the lowest VLAN ID and the lowest MAC address found in the MAC Table.
The ports that are members of the entry. Port Members Buttons Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. : Refreshes the displayed table starting from the "Start from MAC address" and "VLAN" input fields. : Flushes all dynamic entries.
User’s Manual of NS3550-24T/4S Figure 4-13-4 MAC Table Learning Page Screenshot The page includes the following fields: Object Description Learning is done automatically as soon as a frame with unknown SMAC is Auto received. No learning is done. Disable ...
Page 256
Figure 4-13-5 Dynamic ARP Inspection Table Page Screenshot Navigating the ARP Inspection Table Each page shows up to 999 entries from the Dynamic ARP Inspection table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table.
User’s Manual of NS3550-24T/4S 4.13.6 Dynamic IP Source Guard Table Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by IP mask. The Dynamic IP Source Guard Table screen is shown in Figure 4-13-6.
Page 258
Updates the table starting from the first entry in the MAC Table, i.e. the entry with the lowest VLAN ID and MAC address. : Updates the table, starting with the entry after the last entry currently displayed.
User’s Manual of NS3550-24T/4S 4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
Page 260
Figure 4-14-1 LLDP Configuration Page Screenshot The page includes the following fields: LLDP Parameters Object Description The switch is periodically transmitting LLDP frames to its neighbors for having the Tx Interval network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value.
Page 261
User’s Manual of NS3550-24T/4S times. TTL in seconds is based on the following rule: (Transmission Interval * Holdtime Multiplier) ≤ 65536. Therefore, the default TTL is 4*30 = 120 seconds. If some configuration is changed (e.g. the IP address) a new LLDP frame is Tx Delay transmitted, but the time between the LLDP frames will always be at least the value of Tx Delay seconds.
Sys Capa Optional TLV: When checked the "system capability" is included in LLDP information transmitted. The system capabilities identifies the primary function(s) of the system and whether or not these primary functions are enabled. The information advertised by this TLV is described in IEEE 802.1AB. ...
Page 263
User’s Manual of NS3550-24T/4S The page includes the following fields: Fast start repeat count Object Description Rapid startup and Emergency Call Service Location Identification Discovery of Fast start repeat count endpoints is a critically important aspect of VoIP systems in general.In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the limited LLDPU...
Page 264
(MLLW). This datum pair is to be used when referencing locations on water/sea/ocean. Civic Address Location IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI). Object Description Country code The two-letter ISO 3166 country code in capital ASCII letters - Example: DK, DE or US.
Page 265
User’s Manual of NS3550-24T/4S Emergency Call Service Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Object Description Emergency Call Emergency Call Service ELIN identifier data format is defined to carry the ELIN identifier as used during emergency call setup to a traditional CAMA or ISDN Service trunk-based PSAP.
Page 266
Application Type Intended use of the application types: Voice - for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services. These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications.
User’s Manual of NS3550-24T/4S Buttons : click to add new policy. : Click to save changes. Click to undo any changes made locally and revert to previously saved values. 4.14.4 LLDP-MED Neighbor This page provides a status overview for all LLDP-MED neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected.
Page 268
Device (Class III) will also support all aspects of TIA-1057 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I). LLDP-MED Generic Endpoint (Class I) The LLDP-MED Generic Endpoint (Class I) definition is applicable to all endpoint products that require the base LLDP discovery services defined in TIA-1057, however do not support IP media or act as an end-user communication appliance.
User’s Manual of NS3550-24T/4S Defined: The network policy is defined. TAG TAG is indicating whether the specified application type is using a tagged or an untagged VLAN. Can be Tagged ot Untagged Untagged: The device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802.1Q-2003.
System Capabilities System Capabilities describes the neighbor unit's capabilities. The possible capabilities are: 1. Other 2. Repeater 3. Bridge 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-).
Page 271
User’s Manual of NS3550-24T/4S Figure 4-14-5 LLDP Statistics Page Screenshot The page includes the following fields: Global Counters Object Description Shows the time for when the last entry was last deleted or added. It is also shows Neighbor entries were the time elapsed since last change was detected.
Page 272
Object Description The port on which LLDP frames are received or transmitted. Local Port The number of LLDP frames transmitted on the port. Tx Frames The number of LLDP frames received on the port. Rx Frames The number of received LLDP frames containing some kind of error.
User’s Manual of NS3550-24T/4S 4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagnostics tools for troubleshooting. The diagnostic tools are designed for network manager to help them quickly diagnose problems between point to point and better service customers. Use the Diagnastics menu items to display and configure basic administrative details of the Managed Switch.
ICMP Ping screen is shown in Figure 4-15-1. Figure 4-15-1 ICMP Ping Page Screenshot The page includes the following fields: Object Description The destination IP Address. IP Address The payload size of the ICMP packet. Values range from 8 bytes to 1400 bytes. Ping Size Be sure the target IP Address is within the same network subnet of the switch, or you had setup the correct gateway IP address.
User’s Manual of NS3550-24T/4S Figure 4-15-2 ICMPv6 Ping Page Screenshot The page includes the following fields: Object Description The destination IPv6 Address. IPv6 Address The payload size of the ICMP packet. Values range from 8 bytes to 1400 bytes. Ping Size Buttons : Click to transmit ICMP packets.
Page 276
Figure 4-15-3 Remote IP Ping Test Page Screenshot The page includes the following fields: Object Description Port The logical port for the settings. The destination IP Address. Remote IP Address...
User’s Manual of NS3550-24T/4S The payload size of the ICMP packet. Values range from 8 bytes to 1400 bytes. Ping Size Display the ping result. Result 4.15.4 Cable Diagnostics This page is used for running the Cable Diagnostics. Press to run the diagnostics.
Page 278
Figure 4-15-4 VeriPHY Cable Diagnostics Page Screenshot The page includes the following fields: Object Description The port where you are requesting Cable Diagnostics. Port Port: Port number. Cable Status Pair: The status of the cable pair. Length: The length (in meters) of the cable pair. Buttons : Click to run the diagnostics.
User’s Manual of NS3550-24T/4S 5. COMMAND LINE INTERFACE 5.1 Accessing the CLI When accessing the management interface for the switch over a direct connection to the server’s console port, or via a Telnet connection, the switch can be managed by entering command keywords and parameters at the prompt. Using the switch's command-line interface (CLI) is very similar to entering commands on a UNIX system.
For security reason, please change and memorize the new password after this first setup. Only accept command in lowercase letter under console interface. Configure IP address The Managed Switch is shipped with default IP address as following. IP Address: 192.168.0.100 Subnet Mask: 255.255.255.0 To check the current IP address or modify a new IP address for the Switch, please use the procedures as follow: ...
Page 281
User’s Manual of NS3550-24T/4S Subnet Mask: 255.255.255.0 Gateway: 192.168.0.253 VLAN ID: 1 Figure 5-3 Set IP Address Screen Repeat Step 1 to check if the IP address is changed. If the IP address is successfully configured, the Managed Switch will apply the new IP address setting immediately. You can access the Web interface of The Managed Switch through the new IP address.
5.2 Telnet Login The Managed Switch also supports telnet for remote management. The switch asks for user name and password for remote login when using telnet, please use “admin” for username & password.
User’s Manual of NS3550-24T/4S 6. Command Line Mode The CLI groups all the commands in appropriate modes according to the nature of the command. A sample of the CLI command modes are described below. Each of the command modes supports specific software commands. Command Groups: System System settings and reset options...
Syntax: System Configuration [all] [<port_list>] Parameters: : Show all switch configuration, default: Show system configuration <port_list>: Port list or 'all', default: All ports Example: To display system information: SWITCH/>System configuration System Contact : System Name :IGSW-24040T System Location : Timezone Offset : 0 CLI Prompt : SWITCH MAC Address...
User’s Manual of NS3550-24T/4S System Contact Description: Set or show the system contact. Syntax: System Contact [<contact>] Parameters: <contact>: System contact string. Use 'clear' or "" to clear the string. No blank or space characters are permitted as part of a contact. (only in CLI) Default Setting: empty Example:...
System Timezone Description: Set or show the system timezone offset. Syntax: System Timezone [<offset>] Parameters: <offset>: Time zone offset in minutes (-720 to 720) relative to UTC Default Setting: Example: To set timezone: Switch/>system timezone 0 System Prompt Description: Set the CLI prompt string. Syntax: System Prompt <prompt>...
User’s Manual of NS3550-24T/4S System Reboot Description: Reboot the system. Syntax: System Reboot Example: To reboot device without changing any of the settings: Switch/>system reboot System Restore Default Description: Restore factory default configuration. Syntax: System Restore Default [keep_ip] Parameters: keep_ip: Keep IP configuration, default: Restore full configuration Example: To restore default value but not reset IP address: Switch/>system restore default keep_ip...
System Log Description: Show or clear the system log. Syntax: System Log [<log_id>] [all|info|warning|error] [clear] Parameters: <log_id>: System log ID or range (default: All entries) : Show all levels (default) : Show informations info warning : Show warnings error : Show errors clear : Clear log Example: To show system log:...
User’s Manual of NS3550-24T/4S 6.2 IP Command IP Configuration Description: Show IP configuration. Syntax: IP Configuration Example: Show IP configuration: Switch/>ip configuration IP Configuration: ================= DHCP Client : Disabled IP Address : 192.168.0.100 IP Mask : 255.255.255.0 IP Router : 192.168.0.1 DNS Server : 0.0.0.0 VLAN ID...
Disable DHCP sever: SWITCH/>ip dhcp disable IP Setup Description: Set or show the IP setup. Syntax: IP Setup [<ip_addr>] [<ip_mask>] [<ip_router>] [<vid>] Parameters: <ip_addr> : IP address (a.b.c.d), default: Show IP address <ip_mask> : IP subnet mask (a.b.c.d), default: Show IP mask <ip_router>: IP router (a.b.c.d), default: Show IP router : VLAN ID (1-4095), default: Show VLAN ID <vid>...
User’s Manual of NS3550-24T/4S <ip_addr_string>: IP host address (a.b.c.d) or a host name string <ping_length> : Ping data length (8-1400), excluding MAC, IP and ICMP headers Example: SWITCH/>ip ping 192.168.0.21 PING server 192.168.0.21 60 bytes from 192.168.0.21: icmp_seq=0, time=0ms 60 bytes from 192.168.0.21: icmp_seq=1, time=0ms 60 bytes from 192.168.0.21: icmp_seq=2, time=0ms 60 bytes from 192.168.0.21: icmp_seq=3, time=10ms 60 bytes from 192.168.0.21: icmp_seq=4, time=0ms...
User’s Manual of NS3550-24T/4S Parameters: <ipv6_addr> : IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separates each field (:). For example, four hexadecimal digits with a colon separates each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'.
following legally IPv4 address. For example,'::192.1.2.34'. <ping_length>: Ping data length (8-1400), excluding MAC, IP and ICMP headers Example: SWITCH/>ip ipv6 ping 2001::0002 PING6 server 2001::2 68 bytes from 2001::2: icmp_seq=0, time=0ms 68 bytes from 2001::2: icmp_seq=1, time=0ms 68 bytes from 2001::2: icmp_seq=2, time=0ms 68 bytes from 2001::2: icmp_seq=3, time=0ms 68 bytes from 2001::2: icmp_seq=4, time=0ms Sent 5 packets, received 5 OK, 0 bad...
Parameters: <server_index>: The server index (1-5) <server_ipv6> : IPv6 server address. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros;...
6.3 Port Management Command Port Configuration Description: Show port configuration. Syntax: Port Configuration [<port_list>] [up|down] Parameters: <port_list>: Port list or 'all', default: All ports : Show ports, which are up : Show ports, which are down down (default: Show all ports) Example: Display port1~4 status SWITCH/>port configuration 1-4...
User’s Manual of NS3550-24T/4S : 100 Mbps, full duplex 100fdx : 1 Gbps, full duplex 1000fdx : Auto negotiation of speed and duplex auto (default: Show configured and current mode) Default Setting: Auto Example: Set 10Mbps (half duplex) speed for port1 SWITCH/>port mode 1 10hdx Port Flow Control Description:...
Syntax: Port State [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable port enable : Disable port disable (default: Show administrative mode) Default Setting: Enable Example: Disable port1 SWITCH/>port state 1 disable Port Maximum Frame Description: Set or show the port maximum frame size.
User’s Manual of NS3550-24T/4S Syntax: Port Power [<port_list>] [enable|disable|actiphy|dynamic] Parameters: <port_list>: Port list or 'all', default: All ports enable : Enable all power control disable: Disable all power control actiphy: Enable ActiPHY power control dynamic: Enable Dynamic power control Default Setting: Enable Example: Disable port power function for port1-4...
Port Excessive Description: Set or show the port excessive collision mode. Syntax: Port Excessive [<port_list>] [discard|restart] Parameters: <port_list>: Port list or 'all', default: All ports : Discard frame after 16 collisions discard : Restart backoff algorithm after 16 collisions restart (default: Show mode) Default Setting: Discard...
User’s Manual of NS3550-24T/4S : Show medium priority statistics medium : Show high priority statistics high (default: Show all port statistics) : Show ports, which are up : Show ports, which are down down (default: Show all ports) Port VeriPHY Description: Run cable diagnostics.
6.4 MAC Address Table Command MAC Configuration Description: Show MAC address table configuration. Syntax: MAC Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show Mac address state SWITCH/>mac configuration MAC Configuration: ================== MAC Address : 9c-f6-1a-XX-XX-XX MAC Age Time: 300 Port Learning ---- --------...
User’s Manual of NS3550-24T/4S Add MAC address table entry. Syntax: MAC Add <mac_addr> <port_list> [<vid>] Parameters: <mac_addr> : MAC address (xx-xx-xx-xx-xx-xx) <port_list>: Port list or 'all' or 'none' : VLAN ID (1-4095), default: 1 <vid> Example: Add Mac address 9c-f6-1a-XX-XX-XX in port1 and vid1 SWITCH/>mac add 9c-f6-1a-XX-XX-XX 1 1 MAC Delete Description:...
Parameters: <mac_addr>: MAC address (xx-xx-xx-xx-xx-xx) : VLAN ID (1-4095), default: 1 <vid> Example: Look up state of Mac address 9c-f6-1a-XX-XX-XX SWITCH/>mac lookup 9c-f6-1a-XX-XX-XX MAC Age Time Description: Set or show the MAC address age timer. Syntax: MAC Agetime [<age_time>] Parameters: <age_time>: MAC address age time (0,10-1000000) 0=disable, (default: Show age time) Default Setting:...
User’s Manual of NS3550-24T/4S auto : Automatic learning disable: Disable learning secure : Secure learning (default: Show learn mode) Default Setting: Auto Example: Set secure learning mode in port1 SWITCH/>mac learning 1 secure MAC Dump Description: Show sorted list of MAC address entries. Syntax: MAC Dump [<mac_max>] [<mac_addr>] [<vid>] Parameters:...
Example: Show all of MAC table SWITCH/>mac dump Type VID MAC Address Ports ------ ----------------- ----- Static 9c-f6-1a-XX-XX-XX Static 09c-f6-1a-XX-XX-XX None,CPU Static 33-33-ff-24-04-d1 None,CPU Static 33-33-ff-a8-00-64 None,CPU Dynamic 1 40-61-86-04-18-69 Static ff-ff-ff-ff-ff-ff 1-24,CPU MAC Statistics Description: Show MAC address table statistics. Syntax: MAC Statistics [<port_list>] Parameters:...
User’s Manual of NS3550-24T/4S Total Dynamic Addresses: 1 Total Static Addresses : 5 MAC Flush Description: Flush all learned entries. Syntax: MAC Flush 6.5 VLAN Configuration Command VLAN Configuration Description: Show VLAN configuration. Syntax: VLAN Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', (default: All ports) Example: Show VLAN status of port1...
Mode : IEEE 802.1Q Port PVID IngrFilter FrameType LinkType Q-in-Q Mode Eth type ---- ---- ---------- ---------- -------- ----------- -------- Disabled UnTag Disable VID Ports ---- ----- 1-24 VLAV PVID Description: Set or show the port VLAN ID. Syntax: VLAN PVID [<port_list>] [<vid>|none]...
User’s Manual of NS3550-24T/4S Parameters: <port_list>: Port list or 'all', default: All ports <vid>|none : Port VLAN ID (1-4095) or 'none', (default: Show port VLAN ID) Default Setting: Example: Set PVID2 for port20 SWITCH/>vlan pvid 20 2 VLAN Frame Type Description: Set or show the port VLAN frame type.
User’s Manual of NS3550-24T/4S VLAN Link Type Description: Set or show the port VLAN link type. Syntax: VLAN LinkType [<port_list>] [untagged|tagged] Parameters: <port_list>: Port list or 'all', default: All ports untagged : VLAN Link Type Tagged : VLAN Link Type Untagged tagged (default: Show VLAN link type) Default Setting:...
SWITCH/>vlan qinq 2 man VLAN Ethernet Type Description: Set or show out layer VLAN tag ether type in Q-in-Q VLAN mode. Syntax: VLAN Ethtype [<port_list>] [man|dot1q] Parameters: <port_list>: Port list or 'all', default: All ports : Set out layer VLAN tag ether type : MAN : Set out layer VLAN tag ether type : 802.1Q dot1q (default: Show VLAN out layer VLAN tag ether type)
Example: Show VLAN status SWITCH/>vlan lookup VID Ports ---- ----- 1-24 200 None VLAN Status Description: VLAN Port Configuration Status. Syntax: VLAN Status [<port_list>] [combined|static|nas|mvr|voice_vlan|mstp|all|conflicts] Parameters: <port_list>: Port list or 'all', default: All ports : combined VLAN Users configuration combined : static port configuration static : NAS port configuration...
Show users configuration. Syntax: Security Switch Users Configuration Default Setting: User Name Privilege admin guest Example: Enable isolate for port10 SWITCH/>security switch user configuration Users Configuration: ==================== User Name Privilege Level -------------------------------- ---------------- admin guest Security Switch User Add Description: Add or modify users entry.
User’s Manual of NS3550-24T/4S Delete users entry. Syntax: Security Switch Users Delete <user_name> Parameters: <user_name>: A string identifying the user name that this entry should belong to Example: Delete test account. SWITCH/>security switch users delete user Security Switch Privilege Level Configuration Description: Show privilege configuration.
User’s Manual of NS3550-24T/4S Example: Show access management configuration. SWITCH/>security switch access configuration Access Mgmt Configuration: ========================== System Access Mode : Disabled System Access number of entries: 0 Security Switch Access Mode Description: Set or show the access management mode. Syntax: Security Switch Access Mode [enable|disable] Parameters:...
: entry index (1-16) <access_id> <start_ip_addr>: Start IP address (a.b.c.d) <end_ip_addr> : End IP address (a.b.c.d) : WEB/HTTPS interface : SNMP interface snmp : TELNET/SSH interface telnet (default: Show configured and current mode) Example: Add access management list from 192.168.0.1 to 192.168.0.200 via web interface. SWITCH/>security switch access add 1 192.168.0.1 192.168.0.200 web Security Switch Access IPv6 Add Description:...
User’s Manual of NS3550-24T/4S SWITCH/>security switch snmp version 3 Security Switch SNMP Read Community Description: Set or show the community string for SNMP read access. Syntax: Security Switch SNMP Read Community [<community>]...
Parameters: <community>: Community string. Use 'clear' or "" to clear the string (default: Show SNMP read community) Default Setting: public Example: Set to SNMP read community private. SWITCH/>security switch snmp read community private Security Switch SNMP Write Community Description: Set or show the community string for SNMP write access. Syntax: Security Switch SNMP Write Community [<community>] Parameters:...
Syntax: Security Switch SNMP Trap Community [<community>] Parameters: <community>: Community string. Use 'clear' or "" to clear the string (default: Show SNMP trap community) Default Setting: public Example: Set private value for SNMP trap community. SWITCH/>security switch snmp trap community private Security Switch SNMP Trap Destination Description: Set or Show the SNMP trap destination address.
User’s Manual of NS3550-24T/4S Parameters: <ipv6_addr>: IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:). For example, four hexadecimal digits with a colon separate each field (:). For example, fe80::215:c5ff:fe03:4dc7'.
User’s Manual of NS3550-24T/4S Security Switch SNMP Trap Security Name Description: Set or show SNMP trap security name. Syntax: Security Switch SNMP Trap Security Name [<security_name>] Parameters: <security_name>: A string representing the security name for a principal (default: Show SNMP trap security name) Example: Set the SNMP trap security name SWITCH/>security switch snmp trap security name 12345678...
Add or modify SNMPv3 community entry. The entry index key is <community>. Syntax: Security Switch SNMP Community Add <community> [<ip_addr>] [<ip_mask>] Parameters: <community>: Community string <ip_addr> : IP address (a.b.c.d), default: Show IP address <ip_mask> : IP subnet mask (a.b.c.d), default: Show IP mask Example: Add SNMPv3 community entry.
User’s Manual of NS3550-24T/4S Parameters: <index>: entry index (1-64) Example: Look up SNMPv3 community entry SWITCH/>security switch snmp community lookup Idx Community Source IP Source Mask --- -------------------------------- --------------- --------------- 1 public 192.168.0.20 255.255.255.0 2 private 0.0.0.0 0.0.0.0 Number of entries: 2 Security Switch SNMP User Add Description: Add SNMPv3 user entry.
Syntax: Security Switch SNMP User Delete <index> Parameters: <index>: entry index (1-64) Example: Delete SNMPv3 user entry SWITCH/>security switch snmp user delete 1 Security Switch SNMP User Changekey Description: Change SNMPv3 user password. Syntax: Security Switch SNMP User Changekey <engineid> <user_name> <auth_password> [<priv_password>] Parameters: : Engine ID, the format may not be all zeros or all 'ff'H and is restricted to 5 - 32 octet string <engineid>...
User’s Manual of NS3550-24T/4S Example: Look up SNMPv3 user entry SWITCH/>security switch snmp user lookup Idx Engine ID User Name Level Auth Priv --- --------- -------------------------------- -------------- ---- ---- 1 Remote admin_snmpv3 Auth, Priv MD5 DES Number of entries: 1 Security Switch SNMP Group Add Description: Add or modify SNMPv3 group entry.
Example: Delete SNMPv3 group entry SWITCH/>security switch snmp group delete 1 Security Switch SNMP Group Look up Description: Look up SNMPv3 group entry. Syntax: Security Switch SNMP Group Look up [<index>] Parameters: <index>: entry index (1-64) Example: Look up SNMPv3 group entry SWITCH/>security switch snmp group lookup Idx Model Security Name Group Name...
Security Switch SNMP Access Add Description: Add or modify SNMPv3 access entry. The entry index key are <group_name>, <security_model> and <security_level>. Syntax: Security Switch SNMP Access Add <group_name> <security_model> <security_level> [<read_view_name>] [<write_view_name>] Parameters: : A string identifying the group name that this entry should belong to <group_name>...
Example: Show port security status. SWITCH/>security network psec switch Users: L = Limit Control 8 = 802.1X D = DHCP Snooping V = Voice VLAN Port Users State MAC Cnt ---- ----- ------------- ------- ---- No users ---- No users ---- No users ----...
User’s Manual of NS3550-24T/4S MAC Address VID State Added Age/Hold Time ----------------- ---- ---------- ------------------------- ------------- <none> Security Network Limit Configuration Description: Show Limit Control configuration. Syntax: Security Network Limit Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show Limit Control configuration.
Security Network Limit Mode Description: Set or show global enabledness. Syntax: Security Network Limit Mode [enable|disable] Parameters: enable : Globally enable port security disable : Globally disable port security (default: Show current global enabledness of port security limit control) Default Setting: disable Example: Enable the limit mode...
User’s Manual of NS3550-24T/4S Syntax: Security Network Limit Aging [enable|disable] Parameters: enable : Enable aging disable : Disable aging (default: Show current enabledness of aging) Default Setting: disable Example: Enable limit aging SWITCH/>security network limit aging enable Security Network Limit Agetime Description: Time in second between check for activity on learned MAC addresses.
Syntax: Security Network Limit Port [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports enable : Enable port security on this port disable : Disable port security on this port (default: Show current port enabledness of port security limit control) Default Setting: disable Example:...
User’s Manual of NS3550-24T/4S Security Network Limit Action Description: Set or show the action involved with exceeding the limit. Syntax: Security Network Limit Action [<port_list>] [none|trap|shut|trap_shut] Parameters: : Port list or 'all', default: All ports <port_list> none|trap|shut|trap_shut: Action to be taken in case the number of MAC addresses exceeds the limit : Don't do anything none : Send an SNMP trap...
Security Network NAS Configuration Description: Show 802.1X configuration. Syntax: Security Network NAS Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show 802.1X configuration of port 1 SWITCH/>security network nas configuration 1 802.1X Configuration: ===================== Mode : Disabled Reauth.
User’s Manual of NS3550-24T/4S Default Setting: disable Example: Enable IEEE802.1X function SWITCH/>security network nas mode enable Security Network NAS State Description: Set or show the port security state. Syntax: Security Network NAS State [<port_list>] [auto|authorized|unauthorized|single|multi|macbased] Parameters: <port_list>: Port list or 'all', default: All ports : Port-based 802.1X Authentication auto authorized : Port access is allowed...
Set or show Reauthentication enabledness. Syntax: Security Network NAS Reauthentication [enable|disable] Parameters: enable : Enable reauthentication disable: Disable reauthentication (default: Show current reauthentication mode) Default Setting: disable Example: Enable reauthentication function. SWITCH/>security network nas reauthentication enable Security Network NAS ReauthPeriod Description: Set or show the period between reauthentications.
User’s Manual of NS3550-24T/4S Security Network NAS EapolTimeout Description: Set or show the time between EAPOL retransmissions. Syntax: Security Network NAS EapolTimeout [<eapol_timeout>] Parameters: <eapol_timeout>: Time between EAPOL retransmissions (1-65535 seconds) (default: Show current EAPOL retransmission timeout) Default Setting: Example: Set the time between EAPOL retransmissions for 100sec.
Security Network NAS Holdtime Description: Time in seconds before a MAC-address that failed authentication gets a new authentication chance. Syntax: Security Network NAS Holdtime [<hold_time>] Parameters: <hold_time>: Hold time before MAC addresses that failed authentication expire (default: Show current hold time) Default Setting: Example: Set NAS hold time in 100sec...
User’s Manual of NS3550-24T/4S Example: Enable NAS RADIUS QoS SWITCH/>security network nas radius_qos enable Security Network NAS RADIUS_VLAN Description: Set or show either global enabledness (use the global keyword) or per-port enabledness of RADIUS-assigned VLAN. Syntax: Security Network NAS RADIUS_VLAN [global|<port_list>] [enable|disable] Parameters: : Select the global RADIUS-assigned VLAN setting global...
<port_list>: Select the per-port Guest VLAN setting (default: Show current per-port Guest VLAN enabledness) enable|disable: enable : Enable Guest VLAN either globally or on one or more ports disable: Disable Guest VLAN either globally or on one or more ports (default: Show current Guest VLAN enabledness) <vid>: Guest VLAN ID used when entering the Guest VLAN.
User’s Manual of NS3550-24T/4S Security Network NAS Statistics Description: Show or clear 802.1X statistics. Syntax: Security Network NAS Statistics [<port_list>] [clear|eapol|radius] Parameters: <port_list>: Port list or 'all', default: All ports clear : Clear statistics eapol : Show EAPOL statistics radius : Show Backend Server statistics (default: Show all statistics) Example: Show 802.1X statistics in port 1...
User’s Manual of NS3550-24T/4S Syntax: Security Network ACL Clear Example: Clear all ACL counters. SWITCH/>security network acl clear Security Network ACL Status Description: Show ACL status. Syntax: Security Network ACL Status [combined|static|dhcp|upnp|arp_inspection|ip_source_guard|conflicts] Parameters: : Shows the combined status combined : Shows the static user configured status static : Shows the status by DHCP dhcp...
User’s Manual of NS3550-24T/4S Parameters: <ip_addr>: IP address (a.b.c.d), default: Show IP address Default Setting: null Example: Set DHCP relay server in 192.168.0.20 SWITCH/>security network dhcp relay server 192.168.0.20 Security Network DHCP Relay Information Mode Description: Set or show DHCP relay agent information option mode. When enable DHCP relay information mode operation, the agent insert specific information (option 82) into a DHCP message when forwarding to DHCP server and remote it from a DHCP message when transferring to DHCP client.
Set or show the DHCP relay mode. When enable DHCP relay information mode operation, if agent received a DHCP message that already contains relay agent information. It will enforce the policy. Syntax: Security Network DHCP Relay Information Policy [replace|keep|drop] Parameters: replace : Replace the original relay information when receive a DHCP message that already contains it : Keep the original relay information when receive a DHCP message that already contains it keep...
User’s Manual of NS3550-24T/4S Show DHCP snooping configuration. Syntax: Security Network DHCP Snooping Configuration Example: Set NAS age time in 1000sec SWITCH/>security network dhcp snooping configuration DHCP Snooping Configuration: ============================ DHCP Snooping Mode : Disabled Port Port Mode ---- ----------- trusted trusted trusted...
User’s Manual of NS3550-24T/4S Security Network IP Source Guard Port Mode [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports enable : Enable IP Source Guard port disable : Disable IP Source Guard port (default: Show IP Source Guard port mode) Default Setting: disable Example:...
Add or delete IP source guard static entry. Syntax: Security Network IP Source Guard Entry [<port_list>] add|delete <vid> <allowed_ip> <ip_mask> Parameters: <port_list> : Port list or 'all', default: All ports : Add new port IP source guard static entry delete : Delete existing port IP source guard static entry : VLAN ID (1-4095) <vid>...
User’s Manual of NS3550-24T/4S Syntax: Security Network ARP Inspection Status [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show ARP inspection static and dynamic entries. SWITCH/>security network arp inspection status Security AAA Configuration Description: Show Auth configuration. Syntax: Security AAA Configuration Example:...
Server Mode IP Address Secret Port ------ -------- --------------- ------------------------------ ----- Disabled Disabled Disabled Disabled Disabled Security AAA Timeout Description: Set or show server timeout. Syntax: Security AAA Timeout [<timeout>] Parameters: <timeout>: Server response timeout (3-3600 seconds) (default: Show server timeout configuration) Default Setting: Example: Set 30sec for server timeout...
User’s Manual of NS3550-24T/4S Example: Set 1000sec for server dead time SWITCH/>security aaa deadtime 1000 Security AAA RADIUS Description: Set or show RADIUS authentication server setup. Syntax: Security AAA RADIUS [<server_index>] [enable|disable] [<ip_addr_string>] [<secret>] [<server_port>] Parameters: The server index (1-5) (default: Show RADIUS authentication server configuration) : Enable RADIUS authentication server enable...
Security AAA ACCT_RADIUS [<server_index>] [enable|disable] [<ip_addr_string>] [<secret>] [<server_port>] Parameters: The server index (1-5) (default: Show RADIUS accounting server configuration) : Enable RADIUS accounting server enable : Disable RADIUS accounting server disable (default: Show RADIUS server mode) <ip_addr_string>: IP host address (a.b.c.d) or a host name string : Secret shared with external accounting server.
User’s Manual of NS3550-24T/4S Example: Set TACACS+ authentication server configuration. SWITCH/>security aaa tacacs+ 1 enable 192.168.0.20 12345678 49 Security AAA Statistics Description: Show RADIUS statistics. Syntax: Security AAA Statistics [<server_index>] Parameters: The server index (1-5) (default: Show statistics for all servers)
Page 388
Example: Show RADIUS statistics. SWITCH/>security aaa statistics...
Example: Set the STP Bridge protocol version. SWITCH/> stp version rstp STP Tx Hold Description: Set or show the STP Bridge Transmit Hold Count parameter. Syntax: STP Txhold [<holdcount>] Parameters: <holdcount>: STP Transmit Hold Count (1-10) Default Setting: Example: Set STP Tx hold in 10 SWITCH/>stp txhold 10 STP MaxHops Description:...
User’s Manual of NS3550-24T/4S Example: Set STP maximum hops in 25 SWITCH/>stp maxhops 25 STP MaxAge Description: Set or show the CIST/MSTI bridge maximum age. Syntax: STP MaxAge [<max_age>] Parameters: <max_age>: STP maximum age time (6-40, and max_age <= (forward_delay-1)*2) Default Setting: Example: Set STP maximum age time in 10...
Set STP forward delay value in 25 SWITCH/>stp fwddelay 25 STP CName Description: Set or show MSTP configuration name and revision. Syntax: STP CName [<config-name>] [<integer>] Parameters: <config-name>: MSTP Configuration name. A text string up to 32 characters length. Use quotes (") to embed spaces in name. : Integer value <integer>...
User’s Manual of NS3550-24T/4S Example: Set edge port BPDU filtering SWITCH/>stp bpdufilter enable STP BPDU Guard Description: Set or show edge port BPDU Guard. Syntax: STP bpduGuard [enable|disable] Parameters: enable|disable: enable or disable BPDU Guard for Edge ports Default Setting: Disable Example: Set edge port BPDU guard...
Example: Set STP recovery value in 30 sec. SWITCH/>stp recovery 30 STP Status Description: Show STP Bridge status. Syntax: STP Status [<msti>] [<port_list>] Parameters: : STP bridge instance no (0-7, CIST=0, MSTI1=1, ...) <msti> <port_list>: Port list or 'all', default: All ports Default Setting: Disable Example:...
STP MSTI Add Description: Add a VLAN to a MSTI. Syntax: STP Msti Add <msti> <vid> Parameters: <msti>: STP bridge instance no (0-7, CIST=0, MSTI1=1, ...) <vid> : VLAN ID (1-4095) Example: Add MST1 in vlan1. SWITCH/>stp msti add 1 1 STP Port Configuration Description: Show up STP Port configuration.
User’s Manual of NS3550-24T/4S Syntax: STP Port Mode [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all'. Port zero means aggregations. : Enable MSTP protocol Enable : Disable MSTP protocol Disable Default: Enable Example: Disable STP function on port1 SWITCH/>stp port mode 1 disable STP Port Edge Description: Set or show the STP adminEdge port parameter.
STP Port AutoEdge Description: Set or show the STP autoEdge port parameter. Syntax: STP Port AutoEdge [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable MSTP autoEdge Enable Disable : Disable MSTP autoEdge Default: enable Example: Disable STP edge function on port1 SWITCH/>stp port autoedge 1 disable STP Port P2P...
User’s Manual of NS3550-24T/4S Default: auto Example: Disable STP P2P function on port1 SWITCH/>stp port p2p 1 disable STP Port RestrictedRole Description: Set or show the MSTP restrictedRole port parameter. Syntax: STP Port RestrictedRole [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable MSTP restricted role enable : Disable MSTP restricted role...
: Enable MSTP restricted TCN enable : Disable MSTP restricted TCN disable Default: disable Example: Eisable STP restricted TCN on port1 SWITCH/>stp port restrictedtcn 1 enable STP Port bpduGuard Description: Set or show the bpduGuard port parameter. Syntax: STP Port bpduGuard [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable port BPDU Guard...
Example: Set MSTI2 in port1~2 SWITCH/>stp msti port configuration 2 1-2 MSTI Port Path Cost Priority ---- ---- ---------- -------- MST2 Aggr Auto MSTI Port Path Cost Priority ---- ---- ---------- -------- MST2 1 Auto MST2 2 Auto STP MSTI Port Cost Description: Set or show the STP CIST/MSTI port path cost.
User’s Manual of NS3550-24T/4S Syntax: STP Msti Port Priority [<msti>] [<port_list>] [<priority>] Parameters: : STP bridge instance no (0-7, CIST=0, MSTI1=1, ...) <msti> <port_list> : Port list or 'all'. Port zero means aggregations. <priority> : STP port priority (0/16/32/48/.../224/240) Default: 6.9 Multicast Configuration Command IGMP Configuration Description:...
Parameters: <port_list>: Port list or 'all', default: All ports Example: Show IGMP snooping configuration. SWITCH/>igmp configuration IGMP Mode Description: Set or show the IGMP snooping mode. Syntax: IGMP Mode [enable|disable] Parameters: enable : Enable IGMP snooping disable: Disable IGMP snooping (default: Show IGMP snooping mode) Default Setting: Disabled...
User’s Manual of NS3550-24T/4S enable : Enable IGMP Leave Proxy disable: Disable IGMP Leave Proxy (default: Show IGMP snooping mode) Default Setting: disable Example: Enable IGMP leave proxy SWITCH/>igmp leave proxy enable IGMP State Description: Set or show the IGMP snooping state for VLAN. Syntax: IGMP State [<vid>] [enable|disable] Parameters:...
User’s Manual of NS3550-24T/4S IGMP Throttling Description: Set or show the IGMP port throttling status. Syntax: IGMP Throttling [<port_list>] [limit-group-number] Parameters: <port_list>: Port list or 'all', default: All ports : No limit : Group learn limit 1~10 (default: Show IGMP Port Throttling) Default Setting: unlimited Example:...
Parameters: <port_list>: Port list or 'all', default: All ports add : Add new port group filtering entry del : Del existing port group filtering entry (default: Show IGMP port group filtering list) IP multicast group address (a.b.c.d) Default Setting: No filtering Example: Set the IGMP port group filtering list for port 1.
User’s Manual of NS3550-24T/4S Aggregation Mode Description: Set or show the link aggregation traffic distribution mode. Syntax: Aggr Mode [smac|dmac|ip|port] [enable|disable] Parameters: smac : Source MAC address dmac : Destination MAC address : Source and destination IP address port : Source and destination UDP/TCP port enable : Enable field in traffic distribution disable: Disable field in traffic distribution Default Setting:...
6.11 Link Aggregation Control Protocol Command LACP Configuration Description: Show LACP configuration. Syntax: LACP Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show LACP configuration SWITCH/>lacp configuration Port Mode Key Role ---- -------- ---- ------ Disabled Auto Active Disabled Auto Active Disabled Auto Active Disabled Auto Active...
User’s Manual of NS3550-24T/4S LACP Mode [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports enable : Enable LACP protocol disable: Disable LACP protocol (default: Show LACP mode) Default Setting: disable Example: Enable LACP for port1~4 SWITCH/>lacp mode 1-4 enable LACP Key Description: Set or show the LACP key.
Set or show the LACP role. Syntax: LACP Role [<port_list>] [active|passive] Parameters: <port_list>: Port list or 'all', default: All ports active : Initiate LACP negotiation passive: Listen for LACP packets (default: Show LACP role) Default Setting: active Example: Set passive for port1~4 SWITCH/>lacp role 1-4 passive LACP Status Description:...
6.12 LLDP Command LLDP Configuration Description: Show LLDP configuration. Syntax: LLDP Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show LLDP configuration of port1~4 SWITCH/>lldp configuration 1-4 LLDP Configuration: =================== Interval : 30 Hold Tx Delay Reinit Delay: 2 Port Mode Port Descr System Name System Descr System Capa Mgmt Addr CDP awareness...
User’s Manual of NS3550-24T/4S (default: Show LLDP mode) Default Setting: disable Example: Enable port1 LLDP function. SWITCH/>lldp mode 1 enable LLDP Optional TLV Description: Show or Set LLDP Optional TLVs. Syntax: LLDP Optional_TLV [<port_list>] [port_descr|sys_name|sys_descr|sys_capa|mgmt_addr] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Description of the port port_descr : System name...
SWITCH/>lldp optional_tlv 1 port_descr disable LLDP Interval Description: Set or show LLDP Tx interval. Syntax: LLDP Interval [<interval>] Parameters: <interval>: LLDP transmission interval (5-32768) Default Setting: Example: Set transmission interval in 10 SWITCH/>lldp interval 10 LLDP Hold Description: Set or show LLDP Tx hold value. Syntax: LLDP Hold [<hold>] Parameters:...
User’s Manual of NS3550-24T/4S LLDP Delay Description: Set or show LLDP Tx delay. Syntax: LLDP Delay [<delay>] Parameters: <delay>: LLDP transmission delay (1-8192) Default Setting: Example: Set LLDP delay value in 1 SWITCH/>lldp delay 1 LLDP Reinit Description: Set or show LLDP reinit delay. Syntax: LLDP Reinit [<reinit>] Parameters:...
Example: Set LLDP reinit delay value in 3 SWITCH/>lldp reinit 3 LLDP Statistics Description: Show LLDP Statistics. Syntax: LLDP Statistics [<port_list>] [clear] Parameters: <port_list>: Port list or 'all', default: All ports : Clear LLDP statistics clear Example: Show LLDP Statistics of port 1 SWITCH/>lldp statistics 1 LLDP global counters Neighbor entries was last changed at - (323592 sec.
User’s Manual of NS3550-24T/4S Parameters: <port_list>: Port list or 'all', default: All ports LLDP CDP Aware Description: Set or show if discovery information from received CDP ( Cisco Discovery Protocol ) frames is added to the LLDP neighbor table. Syntax: LLDP cdp_aware [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports...
LLDPMED Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show LLDP-MED configuration of port1~4 SWITCH/>lldpmed configuration 1-4 LLDP-MED Configuration: ======================= Fast Start Repeast Count : 4 Location Coordinates : Latitude - 0.0000 North Longitude - 0.0000 East Altitude - 0.0000 meter(s) Map datum...
User’s Manual of NS3550-24T/4S trailing_street_suffix : Trailing street suffix : Street Suffix str_suf : House Number house_no : House number suffix house_no_suffix : Landmark or vanity address landmark : Additional location information additional_info : Bame(residence and office occupant) name : Postal/zip code zip_code : Building (structure) building...
Parameters: <policy_list>: List of policies to delete Example: Delete the policy 1 SWITCH/>lldpmed policy delete 1 LLDPMED Policy Add Description: Adds a policy to the list of polices. Syntax: LLDPMED policy add [voice|voice_signaling|guest_voice|guest_voice_signaling|softphone_voice|video_conferencing|streaming_video|video_si gnaling] [tagged|untagged] [<vlan_id>] [<l2_priority>] [<dscp>] Parameters: : Voice for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice voice services.
User’s Manual of NS3550-24T/4S signaling than for the video media. : The device is using tagged frames tagged : The device is using untagged frames unragged : VLAN id <vlan_id> <l2_priority>: This field may specify one of eight priority levels (0 through 7), as defined by IEEE 802.1D-2004 [3]. : This field shall contain the DSCP value to be used to provide Diffserv node behavior for the specified <dscp>...
: North (Valid for latitude) North : South (Valid for latitude) South : West (Valid for longitude) West : East (Valid for longitude) East : Meters (Valid for altitude) Meters : Floor (Valid for altitude) Floor lldpmed Coordinate value : lldpmed Coordinate value coordinate_value LLDPMED Datum Description:...
User’s Manual of NS3550-24T/4S Show up LLDP-MED neighbor device information. Syntax: LLDPMED Info [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports LLDPMED Debuge_med_transmit_var Description: Set or show if the current value of the global medTansmitEnable variable (Section Section 11.2.1, TIA 1057). Syntax: LLDPMED debug_med_transmit_var [<port_list>] [enable|disable] Parameters:...
6.14 Quality of Service Command QoS Configuration Description: Show QoS Configuration. Syntax: QoS Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Example: Show QoS Configuration of port 1-4. SWITCH/>qos configuration 1-4 QoS Configuration: ================== Traffic Classes: 4 Storm Multicast: Disabled 1 pps Storm Broadcast: Disabled...
User’s Manual of NS3550-24T/4S Syntax: QoS Classes [<class>] Parameters: <class>: Number of traffic classes (1,2 or 4) Default Setting: Example: Set QoS classes 2 SWITCH/>qos classes 2 QoS Default Description: Set or show the default port priority. Syntax: QoS Default [<port_list>] [<class>] Parameters: <port_list>: Port list or 'all', default: All ports : Traffic class low/normal/medium/high or 1/2/3/4...
Syntax: QoS Tagprio [<port_list>] [<tag_prio>] Parameters: <port_list>: Port list or 'all', default: All ports <tag_prio> : VLAN tag priority (0-7) Default Setting: Example: Set priority7 for port 3 SWITCH/>qos tagprio 3 7 QoS QCL Port Description: Set or show the port QCL ID. Syntax: QoS QCL Port [<port_list>] [<qcl_id>] Parameters:...
User’s Manual of NS3550-24T/4S If the QCE ID parameter <qce_id> is specified and an entry with this QCE ID already exists, the QCE will be modified. Otherwise, a new QCE will be added. If the QCE ID is not specified, the next available QCE ID will be used. If the next QCE ID parameter <qce_id_next>...
QoS QCL Look up Description: Look up QCE. Syntax: QoS QCL Look up [<qcl_id>] [<qce_id>] Parameters: <qcl_id>: QCL ID <qce_id>: QCE ID (1-24) QoS Mode Description: Set or show the port egress scheduler mode. Syntax: QoS Mode [<port_list>] [strict|weighted] Parameters: <port_list>: Port list or 'all', default: All ports strict : Strict mode weighted: Weighted mode...
User’s Manual of NS3550-24T/4S Syntax: QoS Weight [<port_list>] [<class>] [<weight>] Parameters: <port_list> : Port list or 'all', default: All ports : Traffic class low/normal/medium/high or 1/2/3/4 <class> <weight> : Traffic class weight 1/2/4/8 QoS Rate Limiter Description: Set or show the port rate limiter. Syntax: QoS Rate Limiter [<port_list>] [enable|disable] [<bit_rate>] Parameters:...
Parameters: <port_list>: Port list or 'all', default: All ports : Enable shaper enable : Disable shaper disable (default: Show shaper mode) <bit_rate> : Rate in 1000 bits per second (500-1000000 kbps) Default Setting: Disabled, 500kbps Example: Set 1000kbps shaper for port 9~16 SWITCH/>qos shaper 9-16 enable 1000 QoS Storm Unicast Description:...
SWITCH/>qos storm broadcast enable 1k QoS DSCP Remarking Description: Set or show the status of QoS DSCP Remarking. Syntax: QoS DSCP Remarking [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable QoS Remarking enable : Disable QoS Remarking disable Default Setting: Disabled...
User’s Manual of NS3550-24T/4S 6.15 Mirror Command Mirror Configuration Description: Show mirror configuration. Syntax: Mirror Configuration [<port_list>] Parameters: <port_list>: Port list or 'all', default: All ports Default Setting: disable Example: Show mirror configuration. SWITCH/>mirror configuration Mirror Port Description: Set or show the mirror port. Syntax: Mirror Port [<port>|disable] Parameters:...
Mirror SID Description: Set or show the mirror switch ID. Syntax: Mirror SID [<sid>] Parameters: <sid>: Switch ID (1-16) Default Setting: Example: Set SID2 for mirror switch ID. SWITCH/>mirror sid 2 Mirror Mode Description: Set or show the mirror mode. Syntax: Mirror Mode [<port_list>] [enable|disable|rx|tx] Parameters:...
Page 441
User’s Manual of NS3550-24T/4S Example: Enable the mirror mode for port 1-4. SWITCH/>mirror mode 1-4 enable...
User’s Manual of NS3550-24T/4S 6.17 Firmware Command Firmware Load Description: Load new firmware from TFTP server. Syntax: Firmware Load <ip_addr_string> <file_name> Parameters: <ip_addr_string>: IP host address (a.b.c.d) or a host name string : Firmware file name <file_name> Firmware IPv6 Load Description: Load new firmware from IPv6 TFTP server.
User’s Manual of NS3550-24T/4S UPnP TTL Description: Set or show the TTL value of the IP header in SSDP messages. Syntax: UPnP TTL [<ttl>] Parameters: <ttl>: ttl range (1..255), default: Show UPnP TTL Default Setting: Example: Set the value 10 for TTL value of the IP header in SSDP messages. SWITCH/>upnp ttl 10 UPnP Advertising Duration Description:...
User’s Manual of NS3550-24T/4S MVR Group MVR Status Description: Show the MVR status. Syntax: MVR Status MVR Mode Description: Set or show the MVR mode. Syntax: MVR Mode [enable|disable] Parameters: : Enable MVR mode enable : Disable MVR mode disable (default: Show MVR mode)
Default Setting: disable Example: Enable MVR mode. SWITCH/>mvr mode enable MVR Port Mode Description: Set or show the MVR port mode. Syntax: MVR Port Mode [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable MVR mode enable : Disable MVR mode disable...
User’s Manual of NS3550-24T/4S Parameters: <vid>: VLAN ID (1-4095), default: Show current MVR multicast VLAN ID Default Setting: Example: Set VLAN 1000 for MVR multicast VLAN ID. SWITCH/>mvr multicast vlan 1000 MVR Port Type Description: Set or show MVR port type. Syntax: MVR Port Type [<port_list>] [source|receiver] Parameters:...
Page 450
MVR Immediate Leave [<port_list>] [enable|disable] Parameters: <port_list>: Port list or 'all', default: All ports : Enable Immediate-leave mode enable : Disable Immediate-leave mode disable (default: Show MVR Immediate-leave mode) Default Setting: disable Example: Enable MVR port state about immediate leave for port 1. SWITCH/>mvr immediate leave 1 enable...
Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Voice VLAN Mode Description: Set or show the Voice VLAN mode. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Syntax: Voice VLAN Mode [enable|disable] Parameters:...
User’s Manual of NS3550-24T/4S Default Setting: 1000 Example: Set ID 2 for Voice VLAN ID. SWITCH/>voice vlan id 2 Voice VLAN Agetime Description: Set or show Voice VLAN age time. Syntax: Voice VLAN Agetime [<age_time>]...
Parameters: <age_time>: MAC address age time (10-10000000) default: Show age time Default Setting: 86400sec Example: Set Voice VLAN age time in 100sec. SWITCH/>voice valn agetime 100 Voice VLAN Traffic Class Description: Set or show Voice VLAN ID. Syntax: Voice VLAN Traffic Class [<class>] Parameters: <class>: Traffic class low/normal/medium/high or 1/2/3/4 Default Setting:...
User’s Manual of NS3550-24T/4S Parameters: <oui_addr> : OUI address (xx-xx-xx) <description>: Entry description. Use 'clear' or "" to clear the string No blank or space characters are permitted as part of a contact.(only in CLI) Example: Add Voice VLAN OUI entry. SWITCH/>voice vlan oui add 00-11-22 test Voice VLAN OUI Delete Description:...
Voice VLAN OUI Look up Description: Look up Voice VLAN OUI entry. Syntax: Voice VLAN OUI Look up [<oui_addr>] Parameters: <oui_addr>: OUI address (xx-xx-xx), default: Show OUI address Example: Look up Voice VLAN OUI entry. SWITCH/>voice vlan oui lookup Voice VLAN Port Mode Description: Set or show the Voice VLAN port mode.
User’s Manual of NS3550-24T/4S Example: Set auto mode for port 1-4 of Voice VLAN port mode. SWITCH/>voice vlan port mode 1-4 auto Voice VLAN Security Description: Set or show the Voice VLAN port security mode. When the function is enabled, all non-telephone MAC address in Voice VLAN will be blocked 10 seconds.
User’s Manual of NS3550-24T/4S Default Setting: disable SMTP Mailto1 Description: Set or show SMTP e-mail 1 to configure. Syntax: SMTP Mailto1 [<mailto1_text>] Parameters: <mailto1_text>: SMTP e-mail 1 to address Default Setting: disable SMTP Mailto2 Description: Set or show SMTP e-mail 2 to configure. Syntax: SMTP Mailto2 [<mailto2_text>] Parameters:...
6.22 Show Command Show ACL Configuration Description: Show ACL Configuration. Syntax: Show acl Show Link Aggregation Configuration Description: Show link aggregation configuration. Syntax: Show aggr Show IGMP Configuration Description: Show IGMP snooping configuration. Syntax: Show igmp Show IP Configuration Description: Show IP configuration.
User’s Manual of NS3550-24T/4S Show LACP Configuration Description: Show LACP configuration. Syntax: Show lacp Show LLDP Configuration Description: Show LLDP configuration. Syntax: Show lldp Show MAC Configuration Description: Show MAC address table configuration. Syntax: Show MAC Show Mirror Configuration Description: Show mirror configuration.
Syntax: Show PoE Show Port Configuration Description: Show port configuration. Syntax: Show port Show Private VLAN Configuration Description: Show up Private VLAN configuration. Syntax: Show pvlan Show QoS Configuration Description: Show QoS Configuration. Syntax: Show QoS Show SNMP Configuration Description: Show SNMP configuration.
User’s Manual of NS3550-24T/4S Show System Configuration Description: Show system configuration. Syntax: Show system Show VLAN Configuration Description: Show VLAN configuration. Syntax: Show vlan Show STP Configuration Description: Show up STP Port configuration. Syntax: Show STP...
6.23 DIDO Command Di_act Description: Digital input fuction and action configuration. Syntax: di_act [first|second] [1|2|3|4] [enable|disable] Parameters: <first >: Digital input/output 1 <second>: Digital input/output 2 (default: Set or show digital input/output first(1)/second(2) select) <1>: System Log <2>: Syslog <3>: SNMP Trap <4>: SMTP (default: set or show digital input 1/2 action) <enable>: Enable digital input1/2 function...
User’s Manual of NS3550-24T/4S Syntax: Di_desc [first|second] [<description>] Parameters: <first >: Digital input/output 1 <second>: Digital input/output 2 (default: Set or show digital input/output first(1)/second(2) select) <description>: Digital input1/2 described string. Use 'clear' or "" to clear the string In CLI, no blank or space characters are permitted as part of a contact.
Do_act Description: Set or show the system digital output1/2 action. Syntax: do_act [first|second] [port|power] [enable|disable] Parameters: <first >: Digital input/output 1 <second>: Digital input/output 2 (default: Set or show digital input/output first(1)/second(2) select) <port>: port fail <power>: power fail (default: Set or show digital output/fault alarm 1/2 action) <enable>: Enable digital input1/2 function <disable>: Disable digital input1/2 function (default: Set or show digital input/output/fault alarm 1/2 status)
User’s Manual of NS3550-24T/4S <hightolow>: Trigger -> high to low <lowtohigh>: Trigger -> low to high (default: Set or show digital input/output 1/2 trigger) Example: Enable digital output function and set trigger condition. SWITCH/>dido do_en first enable hightolow Do_port_alr Description: Set or show the system digital output1/2 port alarm.
<dc1>: DC power 1 <dc2>: DC power 2 <ac>: AC power (default: Set or show digital output/fault alarm 1/2 power_fail) <enable>: Enable digital input1/2 function <disable> : Disable digital input1/2 function (default: Set or show digital input/output/fault alarm 1/2 status) Example: Enable power alarm configuration.
User’s Manual of NS3550-24T/4S fault_en Description: Set or show the system fault alarm. Syntax: dido fault_en [enable|disable] Parameters: <enable>: Enable digital input1/2 function <disable> : Disable digital input1/2 function (default: Set or show digital input/output/fault alarm 1/2 status) Example: Enable power alarm configuration. SWITCH/>dido fault_en enable fault_port_alr Description:...
Page 472
Parameters: <dc1>: DC power 1 <dc2>: DC power 2 <ac>: AC power (default: Set or show digital output/fault alarm 1/2 power_fail) <enable>: Enable digital input1/2 function <disable> : Disable digital input1/2 function (default: Set or show digital input/output/fault alarm 1/2 status) Example: Enable power alarm configuration.
User’s Manual of NS3550-24T/4S 7. SWITCH OPERATION 7.1 Address Table The Switch is implemented with an address table. This address table composed of many entries. Each entry is used to store the address information of some node in network, including MAC address, port no, etc. This in-formation comes from the learning process of Ethernet Switch.
7.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset). This is done by detect the modes and speeds at the second of both device is connected and capable of, both 10Base-T and 100Base-TX devices can connect with the port in either Half- or Full-Duplex mode.
User’s Manual of NS3550-24T/4S 8. TROUBLE SHOOTING This chapter contains information to help you solve problems. If the Ethernet Switch is not functioning properly, make sure the Ethernet Switch was set up according to instructions in this manual. ■ The Link LED is not lit Solution: Check the cable connection and remove duplex mode of the Ethernet Switch ■...
Page 476
If that device works, refer to the next step. If that device does not work, check the AC power If the IP Address has been changed or the admin password forgeotten – To reset the IP address to the default IP Address “192.168.0.100” or reset the password to default value, press the hardware reset button at the front panel about 10 seconds.
User’s Manual of NS3550-24T/4S APPENDEX A A.1 Switch's RJ-45 Pin Assignments 1000Mbps, 1000Base T Contact MDI-X BI_DA+ BI_DB+ BI_DA- BI_DB- BI_DB+ BI_DA+ BI_DC+ BI_DD+ BI_DC- BI_DD- BI_DB- BI_DA- BI_DD+ BI_DC+ BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard.
Page 478
The standard RJ-45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and color of straight cable and crossover cable connection: Straight Cable SIDE 1 SIDE2 SIDE 1 1 = White / Orange 1 = White / Orange 2 = Orange...
User’s Manual of NS3550-24T/4S APPENDIX B: Local User Access Level Table Model NS2503-24P/2C Group Name Master Security User Level Admin Viewer Admin Viewer Admin Viewer Main Function System Information Change Change Change View Only View Only Not Accessable Misc Config Change Change Change...
Page 480
Group Name Master Security User Level Admin Viewer Admin Viewer Admin Viewer Main Function Aggregator Setting Change Change Change View Only Change Not Accessable Aggregator Information Change Change Change View Only Change Not Accessable Trunking State Activity Change Change Change View Only Change Not Accessable...
User’s Manual of NS3550-24T/4S APPENDEX C: GLOSSARY ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
Page 482
AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits. APS is an acronym for Automatic Protection Switching.
Page 483
User’s Manual of NS3550-24T/4S CDP is an acronym for Cisco Discovery Protocol. DEI is an acronym for Drop Eligible Indicator. It is a 1-bit field in the VLAN tag. DES is an acronym for Data Encryption Standard. It provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information.
Page 484
The definition of Circuit ID in the switch is 4 bytes in length and the format is "vlan_id" "module_id" "port_no". The parameter of "vlan_id" is the first two bytes represent the VLAN ID. The parameter of "port_no" is the fourth byte and it means the port number.
Page 485
User’s Manual of NS3550-24T/4S FTP is an acronym for File Transfer Protocol. It is a transfer protocol that uses the Transmission Control Protocol (TCP) and provides file writing and reading. It also provides directory service and security features. Fast Leave IGMP snooping Fast Leave processing allows the switch to remove an interface from the forwarding-table entry without first sending out group specific queries to the interface.
Page 486
or routing purposes. ICMP messages generally contain information about routing difficulties or simple exchanges such as time-stamp or echo transactions. For example, the PING command uses ICMP to test an Internet connection. IEEE 802.1X IEEE 802.1X is an IEEE standard for port-based Network Access Control. It provides authentication to devices attached to a LAN port, establishing a point-to-point connection or preventing access from that port if authentication fails.
Page 487
User’s Manual of NS3550-24T/4S IPMC IPMC is an acronym for IP MultiCast. IP Source Guard IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
Page 488
LLDP-MED LLDP-MED is an extendsion of IEEE 802.1ab and is defined by the telecommunication industry association (TIA-1057). LOC is an acronym for Loss Of Connectivity and is detected by a MEP and is indicating lost connectivity in the network. Can be used as switch criteria by EPS MAC Table Switching of frames is based upon the DMAC address contained in the frame.
Page 489
User’s Manual of NS3550-24T/4S NAS is an acronym for Network Access Server. The NAS is meant to act as a gateway to guard access to a protected source. A client connects to the NAS, and the NAS connects to another resource asking whether the client's supplied credentials are valid.
Page 490
OUI is the organizationally unique identifier. An OUI address is a globally unique identifier assigned to a vendor by IEEE. You can determine which vendor a device belongs to according to the OUI address which forms the first 24 bits of a MAC address.
Page 491
User’s Manual of NS3550-24T/4S An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user with more capabilities for retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file server.
Page 492
A communications network transports a multitude of applications and data, including high-quality video and delay-sensitive data such as real-time voice. Networks must provide secure, predictable, measurable, and sometimes guaranteed services. Achieving the required QoS becomes the secret to a successful end-to-end business solution. Therefore, QoS is the set of techniques to manage network resources.
Page 493
User’s Manual of NS3550-24T/4S SAMBA Samba is a program running under UNIX-like operating systems that provides seamless integration between UNIX and Microsoft Windows machines. Samba acts as file and print servers for Microsoft Windows, IBM OS/2, and other SMB client machines. Samba uses the Server Message Block (SMB) protocol and Common Internet File System (CIFS), which is the underlying protocol used in Microsoft Windows networking.
Page 494
SSH is an acronym for Secure SHell. It is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The encryption used by SSH provides confidentiality and integrity of data over an insecure network. The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which did not provide strong authentication or guarantee confidentiality (Wikipedia).
Page 495
User’s Manual of NS3550-24T/4S TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password.
Page 496
UDP is an acronym for User Datagram Protocol. It is a communications protocol that uses the Internet Protocol (IP) to exchange the messages between computers. UDP is an alternative to the Transmission Control Protocol (TCP) that uses the Internet Protocol (IP). Unlike TCP, UDP does not provide the service of dividing a message into packet datagrams, and UDP doesn't provide reassembling and sequencing of the packets.
Page 497
User’s Manual of NS3550-24T/4S forwarded to the provider port with a single VLAN tag. Tagged frames received on a subscriber port are forwarded to the provider port with a double VLAN tag. VLAN ID VLAN ID is a 12-bit field specifying the VLAN to which the frame belongs. Voice VLAN Voice VLAN is VLAN configured specially for voice traffic.
Page 498
for use with an IEEE 802.1X authentication server, which distributes different keys to each user. Personal WPA utilizes less scalable 'pre-shared key' (PSK) mode, where every allowed computer is given the same passphrase. In PSK mode, security depends on the strength and secrecy of the passphrase. The design of WPA is based on a Draft 3 of the IEEE 802.11i standard (Wikipedia) WPS is an acronym for Wi-Fi Protected Setup.