Page 2
(4) any serial number on the Product has been removed or defaced, (5) this warranty will be of no effect if the repair is via anyone other than LevelOne or the approved agents, or (6) In the event of any failures...
Page 3
(4) any serial number on the Product has been removed or defaced, or (5) this warranty will be of no effect if the repair is via anyone other than LevelOne or the authorized agents. The maximum liability of LevelOne under this warranty is confined to the purchase price of the Product covered by this warranty.
Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the FGP-1072 through the built-in CLI and web by RS-232 serial interface and Ethernet ports step-by-step. Many explanation in detail of hardware and software functions are shown as well as the examples of the operation for web-based interface and command-line interface (CLI).
Introduction 1-1. Overview FGP-1072, a 8FE PoE + 2GE Combo SFP L2 Managed Switch, 8 10/100Mbps TP + 2 Gigabit dual media ports with TP/(100/1000M) SFP, is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet and Ethernet specifications.
Page 9
Key Features in the Device • • • • Support Quality of Service by the IEEE 802.1P standard. There are two priority queue and packet transmission schedule using Weighted Round Robin (WRR). User-defined weight classification of packet priority can be based on either VLAN tag on packets or user-defined port priority.
1-2. Checklist Before you start installing the switch, verify that the package contains the following: FGP-1072 Power Cord RS-232 Cable CD User Manual Mounting Bracket Please notify your sales representative immediately if any of the aforementioned items is missing or damaged.
Page 11
Management • • • • • Supports concisely the status of port and easily port configuration • Supports per port traffic monitoring counters • Supports a snapshot of the system Information when you login • Supports port mirror function • Supports the static trunk function •...
CPURUN, Power LED and 10 ports working status of the switch. RS-232 DB-9 Connector LED SET Mode: ACT/FDX/SPD Fast Ethernet Power Indication Gigabit Dual Media Port: RESET Button: RESET button is used to reset the management system. Fig. 1-2 Front View of FGP-1072 with SFP Module...
SFP(LINK/ACT) Green good Blinks when any traffic is present Table1-1 1-4-2. Rear Panel There is one AC power input socket for having the switch powered on or off. AC Line 100-240V 50/60 Hz Fig. 1-3 Rear View of the FGP-1072...
1-5. Optional Modules In the switch, Port 25, 26 includes two types of media --- TP and SFP Fiber this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed connection expansion;...
At the beginning, please do first: ⇒ Wear a grounding device to avoid the damage from electrostatic discharge • • • • Installing Optional SFP Fiber Transceivers to the FGP-1072 Switch Note: If you have no modules, please skip this section.
Page 16
TP Port and Cable Installation • ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used.
2-1-2. Installing Chassis to a 9-Inch Wiring Closet Rail Fig. 2-2 Caution: Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis. ⇒ Wear a grounding device for electrostatic discharge. ⇒ Screw the mounting accessory to the front side of the switch (See Fig. 2-2). ⇒...
Page 18
2-1-3-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters.
Page 19
2-1-3-3. Switch Cascading in Topology • • • • Takes the Delay Time into Account Theoretically, the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly. In practice, the network extension (cascading levels & overall diameter) must follow the constraint of the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications, in which the limitations are the timing requirement from physical signals defined by 802.3 series specification of Media Access Control (MAC) and PHY, and timer from some...
Page 20
If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area. Here VLAN area is defined by what VLAN you are using. The switch supports both port-based VLAN and tag-based VLAN. They are different in practical deployment, especially in physical location.
Page 21
1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. 3. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members could not access VLAN1 and VLAN3 members, but they could access VLAN2 members.
Page 22
RS-232 console, CLI, and Web. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures. Section 2-1-4-1: Configuring the Management Agent of FGP-1072 through the Serial RS-232 Port...
2-1-4-1. Configuring the Management Agent of FGP-1072 through the Serial RS-232 Port To perform the configuration through RS-232 console port, the switch’s serial port must be directly connected to a DCE device, for example, a PC, through RS-232 cable with DB-9 connector. Next, run a terminal emulator with the default setting of the switch’s serial port.
Page 24
After completing these settings in the switch, it will reboot to have the configuration taken effect. After this step, you can operate the management through the network, no matter it is from a web browser or Network Management System (NMS). Managed Switch – FGP-1072 Login: admin Password: FGP-1072#...
Page 25
2-1-4-2. Configuring the Management Agent of FGP-1072 through the Ethernet Port There are three ways to configure and monitor the switch through the switch’s Ethernet port. They are CLI, Web browser and SNMP manager. The user interface for the last one is NMS dependent and does not cover here. We just introduce the first two types of management interface.
Fig. 2-10 the Login Screen for Web 2-1-5. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication.
Page 27
With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24.
Page 28
Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network.
Page 29
In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched.
Page 30
For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as default router.
2-2. Typical Applications The FGP-1072 implements 8 Fast Ethernet TP PoE ports with auto MDIX and 2 Gigabit dual media ports with SFP for removable module supported comprehensive fiber types of connection, including LC, BiDi LC for SFP. For more details on the specification of the switch, please refer to Appendix A.
Operation of Web-based Management This chapter instructs you how to configure and manage the FGP-1072 through the web user interface it supports, to access and manage the 8 10/100Mbps TP + 2 Gigabit dual media ports with TP/SFP Fiber management Ethernet switch.
Page 34
In the switch, it supports a simple user management function allowing only one administrator to configure the system at the same time. If there are two or more users using administrator’s identity, the switch will allow the only one who logins first to configure the system.
3-1. Overview After you login, the switch shows you the system information as Fig. 3-2. This page is default and tells you the basic information of the system, including “Model Name”, “System Description”, “Location”, “Contact”, “Device Name”, “System Up Time”, “Current Time”, “BIOS Version”, “Firmware Version”, “Hardware-Mechanical Version”, “Serial Number”, “Host IP Address”, “Host MAC Address”, “Device Port”, “RAM Size”...
Page 36
Fig. 3-3 port detail information In Fig. 3-3, it shows the basic information of the clicked port. With this, you’ll see the information about the port status, traffic status and bandwidth rating for egress and ingress respectively. On the left-top corner, there is a pull-down list for Auto Logout. For the sake of security, we provide auto-logout function to protect you from illegal user as you are leaving.
Page 37
Root System DHCP Snooping DHCP Relay IP-MAC Binding Port Loop Detection SNMP DHCP Boot Multicast LLDP VLAN MAC Table GVRP MSTP Trunk 802.1X Alarm Configuration Security Bandwidth Diagnostics TFTP Server Syslog Firmware Upgrade Reboot Logout...
You can configure this parameter through the device’s user interface or SNMP. Device name: The name of the switch. User-defined. Default is FGP-1072. System up time: The time accumulated since this switch is powered up. Its format is day,...
Page 39
hour, minute, second. Current time: Show the system time of the switch. Its format: day of week, month, day, hours : minutes : seconds, year. For instance, Wed Dec 07 23:25:58 2011 BIOS version: The version of the BIOS in this switch. Firmware version: The firmware version in this switch.
3-1-2. IP Configuration IP configuration is one of the most important configurations in the switch. Without the proper setting, network manager will not be able to manage or view the device. The switch supports both manual IP address setting and automatic IP address setting via DHCP server. When IP address is changed, you must reboot the switch to have the setting taken effect and use the new IP to browse for web management and CLI management.
Page 41
IP address: Users can configure the IP settings and fill in new values if users set the DHCP function “Disable”. Then, click <Apply> button to update. When DHCP is disabled, Default: 192.168.1.1 If DHCP is enabled, this field is filled by DHCP server and will not allow user manually set it any more.
Page 42
DNS: It is Domain Name Server used to serve the translation between IP address and name address. The switch supports DNS client function to re-route the mnemonic name address to DNS server to get its associated IP address for accessing Internet.
3-1-3. Time Configuration The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour”, “Minute” and “Second” within the valid value range indicated in each item. If you input an invalid value, for example, 61 in minute, the switch will clamp the figure to NTP is a well-known protocol used to synchronize the clock of the switch system time over a network.
Page 44
Default Time zone: +8 Hrs. Daylight Saving: Daylight saving is adopted in some countries. If set, it will adjust the time lag or in advance in unit of hours, according to the starting date and the ending date. For example, if you set the day light saving to be 1 hour. When the time passes over the starting time, the system time will be increased one hour after one minute at the time since it passed over.
3-1-4. Account Configuration In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password.
3-1-5. Management Security Through the management security configuration, the manager can do the strict setup to control the switch and limit the user to access this switch. The following rules are offered for the manager to manage the switch: Rule 1) : When no lists exists, then it will accept all connections. Accept ----------------------------------------------------------------------- Rule 2) : When only “accept lists”...
Page 48
Function name: Management Security Configuration Function description: The switch offers Management Security Configuration function. With this function, the manager can easily control the mode that the user connects to the switch. According to the mode, users can be classified into two types: Those who are able to connect to the switch (Accept) and those who are unable to connect to the switch (Deny).
Page 49
that you would like them to be worked and restricted in the management security configuration if ”Custom” had been chosen. Access Type: The switch supports two kinds of options for managed valid Access Type, including “Any” and “Custom”. Default is “Any”. “Http”, “Telnet” and “SNMP”...
3-1-6. Virtual Stack Function name: Virtual Stack Function description: Virtual Stack Management(VSM) is the group management function. Through the proper configuration of this function, switches in the same LAN will be grouped automatically. And among these switch, one switch will be a master machine, and the others in this group will become the slave devices.
Page 51
Parameter description: State: It is used for the activation or de-activation of VSM. Default is Enable. Role: The role that the switch would like to play in virtual stack. Two types of roles, including master and slave are offered for option. Default is Master. Group ID: It is the group identifier (GID) which signs for VSM.
3-2. DHCP Snooping DHCP Snooping Config Trust Group Lease List Counter Function name: Config Function description: The addresses assigned to DHCP clients on unsecure ports can be carefully controlled using the dynamic bindings registered with DHCP Snooping. DHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which send port-related information to a DHCP server.
Page 53
Fig. 3-9 Parameter description: State: It is used for the activation or de-activation of DHCP snooping. Default is disable. Per Port Client Count Setup: It is used for per port client count setup. Default is 128...
Page 54
Function name: DHCP Snooping Trust Group config Function description: DHCP Snooping Trust Group function to configure the Trust group of DHCP Snooping. Parameter description: Trust Port 1:If DHCP snooping is enabled globally, and also enabled on the VLAN where the DHCP packet is received, all DHCP packets are forwarded for a trusted por.
Page 55
* If the DHCP packet is a reply packet from a DHCP server, the packet is dropped. * If the DHCP packet is from a client, such as a DISCOVER, REQUEST INFORM, DECLINE or RELEASE message, the packet is forwarded if MAC address verification is disabled.
Page 56
Function name: DHCP Snooping Lease List Function description: DHCP Snooping Lease List function to display the Lease List information. Fig. 3-10 Parameter description: MAC: To show the DHCP snooping client’s MAC address. IP:To show the DHCP snooping client’s IP address. Port:To show the DHCP snooping client’s port.
3-3. DHCP Relay The Dynamic Host Configuration Protocol (DHCP) is a service that runs at the application layer of the TCP/IP protocol stack to dynamically assign IP addresses to DHCP clients. DHCP clients request IP addresses, and obtain leases for IP addresses from the DHCP server.
Page 58
Parameters description: DHCP Relay State: To enable or disable the DHCP Relay function on the Switch, Default is “Disable”. DHCP Relay Lifetime: Use to set the default lifetime for which a prefix delegated by this DHCP local server is valid. This default is overridden by an interface-specific lifetime.
3-4. IP-MAC Binding The IP network layer uses a four-byte address. The Ethernet link layer uses a six-byte MAC address. Binding these two address types together allows the transmission of data between the layers. The primary purpose of IP-MAC binding is to restrict the access to a switch to a number of authorized users.
Page 60
Fig. 3-14 Fig. 3-15 Parameters description: Current User List: The maximum number of IP-MAC binding client table is 512 entries. The maximum number of IP-MAC Binding server table is 64 entries. The entry number and delete icon when you need to delete the entry then you need to click the icon to delete it..
Page 61
Add: Click on <Add> to create a new entry into the IP MAC Binding table and Input name, MAC, IP, Port and Binding Method, Edit: The existed entry also can be modified after pressing <Edit> button. Delete: Select one of entry from the table, then click on <Delete> to delete this entry.
3-5.Port Configuration Four functions, including Port Status, Port Configuration, Simple Counter and Detail Counter are contained in this function folder for port monitor and management. Each of them will be described in detail orderly in the following sections. Port Configuration Status Configuration Description...
Page 63
Parameter Description: Port No: Display the port number. The number is 1 – 8. Both port 9 and 10 are optional modules. Media: Show the media type adopted in all ports. The Port 9 and Port 10 are optional modules, which support either fiber or UTP media with either Gigabit Ethernet (1000Mbps) or 10/100Mbps Fast Ethernet port.
Page 64
In port 9 and port 10, if the media is 1000Mbps with TP media, it will show the combinations of 10/100M and Full/Half duplex, 1000Mbps and Full duplex only. If the media is 1000Mbps with fiber media, it will show only 1000M/Full duplex.
Page 65
Tx Central Wavelength: Display the fiber optical transmitting central wavelength, for instance, 850nm, 1310nm, 1550nm and so on. Baud Rate: Display the maximum baud rate of the fiber module supported, for instance, 10M, 100M, 1G and so on. Vendor OUI: Display the Manufacturer's OUI code which is assigned by IEEE.
3-5-2. Port Configuration Port Configuration is applied to change the setting of each port. In this configuration function, you can set/reset the following functions. All of them are described in detail below. Fig. 3-18 Function name: Port Configuration Function description: It is used to set each port’s operation mode.
Page 67
Speed/Duplex: Set the speed and duplex of the port. In speed, 10/100Mbps baud rate is available for Fast Ethernet, Gigabit module in port 9, 10. If the media is 1Gbps fiber, it is always 1000Mbps and the duplex is full only. If the media is TP, the Speed/Duplex is comprised of the combination of speed mode, 10/100/1000Mbps, and duplex mode, full duplex and half duplex.
3-5-3. Description The function of Description provides the port description about the alias of the port. It will help manager to identify the Port. Function name: Description Function description: To type the port alias for port description. Identify the port property and what is the port purpose.
3-2-3. Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-20, the window can show all ports’ counter information at the same time.
3-2-4. Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-21, the window can show only one port counter information at the same time.
Page 71
Parameter description: Receive Total Rx Packets: The counting number of the packet received. Rx Octets: Total received bytes. Rx Errors: Number of bad packets received. Rx Unicast Packets: Show the counting number of the received unicast packet. Rx Broadcast Packets: Show the counting number of the received broadcast packet.
Page 72
Receive Size Counters Packets 64 Octets: Number of 64-byte frames in good and bad packets received. Packets 65-127 Octets: Number of 65 ~ 127-byte frames in good and bad packets received. Packets 128-255 Octets: Number of 128 ~ 255-byte frames in good and bad packets received. Packets 256-511 Octets: Number of 256 ~ 511-byte frames in good and bad packets received.
Page 73
3-6. Loop Detection The loop detection is used to detect the presence of traffic. When switch receives packet’s(looping detection frame) MAC address the same as oneself from port, show Loop detection happens. The port will be locked when it received the looping detection frames.
Page 74
3-7. SNMP Configuration Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
Page 75
Community name is used as password for authenticating if the requesting network management unit belongs to the same community group. If they both don’t have the same community name, they don’t belong to the same group. Hence, the requesting network management unit cannot access the device with different community name via SNMP protocol;...
Page 76
3-8. DHCP Boot The DHCP Boot function is used to spread the request broadcast packet into a bigger time frame to prevent the traffic congestion due to broadcast packets from many network devices which may seek its NMS, boot server, DHCP server and many connections predefined when the whole building or block lose the power and then reboot and recover.
3-9. Multicast The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping cannot tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
3-9-2. Proxy Function name: Proxy Function description: Proxy is used to IGMP Proxy setting the status of IP multicast groups and display its associated information in both tagged VLAN and non-tagged VLAN networks. Enabling IGMP with either passive or active mode, you can monitor the IGMP Proxy information, which contains the multicast member list with the multicast groups, VID and member port.
Page 79
The Maximum Response Time field is only used in general or group- specific query messages. The Maximum Response Time is configured as the value for the Query response interval setting Available value: 1-10 sec General Query Timeout : The General Query Timeout field is the amount of time in seconds. Available value: 1-30 sec Specific Query Count : To set Specific Query Count on Switch .
3-9-3. Snooping Function name: Snooping Function description: Snooping is used to IGMP Snooping the status of IP multicast groups and display its associated information in both tagged VLAN and non-tagged VLAN networks. Enabling IGMP with either passive or active mode, you can monitor the IGMP snooping information, which contains the multicast member list with the multicast groups, VID and member port.
3-9-4. IGMP VLAN Function name: IGMP VLAN Function description: Specify the a static connection to a multicast router for the VLAN. Fig. 3-9-4 Parameter description: VID: To Set specify the IGMP snooping VLAN ID for each multicast group.
3-9-5. Group Allow Function name: Group Allow Function description: The Allowed Group function allows the IGMP Snooping to set up the IP multicast table based on user’s specific conditions. IGMP report packets that meet the items you set up will be joined or formed the multicast group. Fig.
3-9-6. Multicast Status Function name: Multicast Status Function description: The Multicast Status function allows to display the switch received multicast traffic status. If the switch doesn’t receive any multicast traffic then it will display the “No multicast entry !” Fig. 3-9-6 Parameter description: Index No: To display current built-up multicast group entry index.
3-9-7. MVR Setting Function name: MVR Setting Function description: Multicast VLAN Registration (MVR) routes packets received in a multicast source VLAN to one or more receive VLANs. Clients are in the receive VLANs and the multicast server is in the source VLAN. Multicast routing has to be disabled when MVR is enabled.
3-9-8. MVR Group Allow Function name: MVR Group Allow Function description: The MVR Group Allow function allows the MVR to set up the MVR Group table based on user’s specific conditions. MVR packets that meet the items you set up will be joined or formed the MVR group. Fig.
3-9-9. MVR Multicast Status Function name: MVR Multicast Status Function description: The MVR Multicast Status function allows to display the switch received MVR multicast traffic status. If the switch doesn’t receive any MVR multicast traffic then it will display the “No MVR multicast entry !” Fig.
3-9-10. RADIUS IGMP Function name: RADIUS IGMP Function description: The RADIUS IGMP function allows to some multicast applications, such as IPTV and Internet Radio, may be of minimal interest to law enforcement agencies, other multicast traffic may contain information important to an investigation.
Page 88
The port number to communicate with RADIUS server for the authentication service. The valid value ranges 1-65535. Default port number is 1812. Secret Key: The secret key between authentication server and authenticator. It is a string with the length 1 – 31 characters. The character string may contain upper case, lower case and 0-9.
3-10. LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. 3-10-1 .
Page 90
Discovery Protocol (LLDP) packet before discarding it. (Default: 4 times) Tx Delay: The specifies the delay between successive LLDP frame transmissions initiated by value/status changes in the LLDP local systems MIB. (Default: 2 secs) Tx Reinit: The specifies the minimum time an LLDP port waits before reinitializing LLDPtransmission.
3-10-2 . Neighbor Information Function name: Neighbor Information Function description: The Neighbor Information function allows a switch to display per port which build the LLDP available entry. This information can be useful in tracking LLDP packets back to a physical port and enable or disable the LLDP. Fig.
Page 92
Management Address: To display include a specific IP address in the outbound LLDP advertisements for specific ports. Auto - refresh: Refresh the authenticator counters in the web UI automatically Refresh: Click on the <Refresh> to update the authenticator counters in the web...
3-10-3 . Statistics Function name: Statistics Function description: Display the detailed counting number of each port’s LLDP traffic Fig. 3-18-3 LLDP statistics Parameter description: Neighbor Entries List Last Updated : The time period which neighbor entries List were be updated. Total Neighbors Entries Added: The total neighbors entries added be received.
Page 94
Local port: Show the local port on the switch. Tx Frames: The counting number of the frames transmitted. Rx Frames: The counting number of the frames transmitted. Frames Discarded: Show the number of frame discarded. TLVs Discarded: Show the number of TLVs discarded. TLVs Unrecognized: Show the number of TLVs unrecognized.
3-11. VLAN The switch supports Tag-based VLAN (802.1q) and Port-based VLAN Support 256 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management.
Page 96
Port-based: Port-based VLAN is defined by port. Any packet coming in or outgoing from any one port of a port-based VLAN will be accepted. No filtering criterion applies in port-based VLAN. The only criterion is the physical port you connect to. For example, for a port-based VLAN named PVLAN-1 contains port members Port 1&2&3&4.
Page 97
Except Port 10, each port of the switch cannot transmit packets with each other. Each port groups a VLAN with Port 10, thus, total 8 groups consisting of 2 members are formed. 9&10: Except Port 9 and Port 10, each port of the switch cannot transmit packets with each other.
3-11-2. Tag-based Group Function name: Tag-based Group Configuration Function description: It shows the information of existed Tag-based VLAN Groups. You can also easily create, edit and delete a Tag-based VLAN group by pressing <Add>, <Edit> and <Delete> function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID after pressing <Add>...
Page 99
Add Group: Input the VLAN name, VID and then choose the member by ticking the check box beside the port No. to create a new Tag-based VLAN. As to the parameter of Untag, it stands for an egress rule of the port. If you tick the check box beside the port No., packets with this VID outgoing from this port will be untagged.
3-11-3. PVID Function name: PVID Function description: In PVID Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User also can choose ingress filtering rule (Rule 2) to each port. The Ingress Filtering Rule 2 is “drop untagged frame”. While Rule 2 is enabled, the port will discard all Untagged-frames.
Page 101
Drop Untag: Drop untagged frame. You can configure a given port to accept all frames (Tagged and Untagged) or just receive tagged frame. If the former is the case, then the packets with tagged or untagged will be processed. If the later is the case, only the packets carrying VLAN tag will be processed, the rest packets will be discarded.
3-11-4. Port-based Group Function name: Port-based Group Configuration Function description: It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a Port-based VLAN group by pressing <Add>, <Edit> and <Delete> function buttons. User can add a new VLAN group by inputting a new VLAN name.
Page 103
Fig. 3-35 Delete Group: Just press the <Delete> button to remove the selected group entry from the Port-based group table. Fig. 3-36 Edit a group: Just select a group entry and press the <Edit> button, then you can modify a group‘s description and member set.
3-11-5. Management VLAN Function name: Management VLAN Function Description: Fig. 3-37 Parameter description: State: It works when the tag-based mode is chosen. When this function is enabled, only the tagged packets with this VID can manage the switch. VID: Valid range 1~4094.
3-12. MAC Table MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table Maintenance, Static and MAC Alias, which cannot be categorized to some function type. They are described below. Function name: MAC Table Information Function Description: Display the static or dynamic learning MAC entry and the state for the selected port.
Page 106
Next Page: Move to the next page. Alias: The Alias of the searched entry. MAC Address: The MAC address of the searched entry. Port: The port that exists in the searched MAC Entry. VID: VLAN Group that MAC Entry exists. State: Display the method that this MAC Entry is built.
Page 107
Parameter description: Aging Time: Delete a MAC address idling for a period of time from the MAC Table, which will not affect static MAC address. Range of MAC Address Aging Time is 10-1000000 seconds. The default Aging Time is 300 seconds. Learning Limit: To set up the maximum amount of MAC that each port can learn.
Page 108
Parameter description: MAC: It is a six-byte long Ethernet hardware address and usually expressed by hex and separated by hyphens. For example, 00 – 11 – 6B - D6 – 00 - 01 VID: VLAN identifier. This will be filled only when tagged VLAN is applied. Valid range is 1 ~ 4094.
Page 109
Fig. 3-41 Function name: MAC Alias Create/Edit or Delete Function description: In the MAC Alias function, MAC Alias Add/Edit function is used to let you add or modify an association between MAC address and a plain English name. User can click <Create/Edit> button to add a new record with name. As to MAC Alias Delete function is used to let you remove an alias name to a MAC address.
Page 110
Function name: Port Security Function description: In its most basic form, the Port Security feature remembers the Ethernet MAC address connected to the switch port and allows only that MAC address to communicate on that port. If any other MAC address tries to communicate through the port, port security will disable the port.
Page 111
Parameter description: You can select which port you want to set static MAC table. Press the Add to create a new Static MAC address entry. Fig. 3-44 MAC Address: It is a six-byte long Ethernet hardware address and usually expressed by hex and separated by hyphens.
3-13. GVRP Configuration GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations.
Page 113
Used to declare the Join Time in unit of centisecond. Valid time range: 20 –100 centisecond, Default: 20 centisecond. Leave Time: Used to declare the Leave Time in unit of centisecond. Valid time range: 60 –300 centisecond, Default: 60 centisecond. Leave All Time: A time period for announcement that all registered device is going to be de-registered.
Page 114
Disabled: In this mode, the switch dynamic VLAN will be created when this port received GVRP PDU. The default setting is Normal. Enabled: In this mode, the switch does not create dynamic VLAN when this port received GVRP PDU. Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch, this port will be added into the static VLAN members dynamically.
Page 115
JoinEmpty Message Packets: Number of GARP BPDU with Join Empty message is received by the GARP application. JoinIn Message Packets: Number of GARP BPDU with Join In message is received by the GARP application. LeaveEmpty Message Packets: Number of GARP BPDU with Leave Empty message is received by the GARP application.
Page 116
Function name: GVRP Group Information Function description: To show the dynamic group member and their information. Fig. 3-47 Parameter description: Current Dynamic Group Number: The number of GVRP group that are created currently. VID: VLAN identifier. When GVRP group creates, each dynamic VLAN group owns its VID.
3-14. STP Configuration The Spanning Tree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loops in switched networks. When STP is enabled, ensure that only one path is active between any two nodes on the network at a time. User can enable Spanning Tree Protocol on switch’s web management and then set up other advanced items.
Page 118
Designated Priority: Show the current root bridge priority. Root Port: Show port number connected to root bridge with the lowest path cost. Root Path Cost: Show the path cost between the root port and the designated port of the root bridge. Current Max.
If you want to have the FGP-1072 as root bridge, you can set this value lower than that of bridge in the LAN. The valid value is 0 ~ 61440. The default is 32768.
Page 120
Max. Age: When the FGP-1072 is the root bridge, the whole LAN will apply this figure set by this switch as their maximum age time. When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max.
3-14-3. STP Port Configuration Function name: STP Port Setting Function description: In the STP Port Setting, one item selection and five parameters settings are offered for user’s setup. User can disable and enable each port by selecting each Port Status item. User also can set “Path Cost” and “Priority” of each port by filling in the desired value and set “Admin Edge Port”...
Page 122
Configured Path Cost: The range is 0 – 200,000,000. In the switch, if path cost is set to be zero, the STP will get the recommended value resulted from auto-negotiation of the link accordingly and display this value in the field of Path Cost Status.
Page 123
Default: Auto M Check: Migration Check. It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission. The only benefit of this operation is to make the port quickly get back to act as an RSTP port. Click <M Check>...
3-15. MSTP Configuration The implementation of MSTP is according to IEEE 802.1Q 2005 Clause 13 – Multiple Spanning Tree Protocol. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MST Bridges.
3-15-2 Region Config Function name: MSTP Region Config Function description: To configure the basic identification of a MSTP bridge. Bridges participating in a common MST region must have the same Region Name and Revision Level. Fig. 3-52 Parameter description: Region Name: 0-32 characters.(A variable length text string encoded within a fixed field of 32 octets , conforming to RFC 2271’s definition of SnmpAdminString.) Revision Level:...
3-15-3 Instance View Function name: MSTP Instance Config Function description: Providing an MST instance table which include information(vlan membership of a MSTI ) of all spanning instances provisioned in the particular MST region which the bridge belongs to. Through this table, additional MSTP configuration data can be applied and MSTP status can be retrieved.
Page 127
Deleting all provisioned MSTIs at a time. Instance Configuration: Fig. 3-55 To provision spanning tree performance parameters per instance. Port Config: Fig. 3-56 To provision spanning tree performance parameters per instance per port. Instance Status: Fig. 3-57 To show the status report of a particular spanning tree instance. Port Status: Fig.
Page 128
Parameter description: Priority: The priority parameter used in the CIST(Common and Internal Spanning Tree) connection. 0 / 4096 / 8192 / 12288 / 16384 / 20480 / 24576 / 28672 / 32768 / 36864 / 40960 / 45056 / 49152 / 53248 / 57344 / 61440 MAX.
Page 129
Priority: 0 / 16 / 32 / 48 / 64 / 80 / 96 / 112 / 128 / 144 / 160 / 176 / 192 / 208 / 224 / 240 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI.
Page 130
Fig. 3-57 Parameter description: MSTP State: MSTP protocol is Enable or Disable. Force Version: It shows the current spanning tree protocol version configured. Bridge Max Age: It shows the Max Age setting of the bridge itself. Bridge Forward Delay: It shows the Forward Delay setting of the bridge itself. Bridge Max Hops: It shows the Max Hops setting of the bridge itself.
Page 131
CIST ROOT MAC: Mac Address of the CIST root bridge CIST EXTERNAL ROOT PATH COST: Root path cost value from the point of view of the bridge’s MST region. CIST ROOT PORT ID: The port ID of the bridge’s root port. In MSTP, peer port of a root port may reside in defferent MST region or in the same MST region.The first case indicates that the root port’s owner is the CIST regional root bridge.
Page 132
Fig. 3-58 Parameter description: Port No: 1-10 Status: The forwarding status. Same definition as of the RSTP specification Possible values are “FORWARDING” , “LEARNING” , “DISCARDING” Status: The role that a port plays in the spanning tree topology. Possible values are “dsbl”(disable port) , ”alt”(alternate port) , “bkup”(backup port) , “ROOT”(root port) , “DSGN”(designated port) , “MSTR”(master port).
Page 133
Same as mentioned in “Port Config” Restricted Tcn: Same as mentioned in “Port Config”...
3-16. Trunk Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports.
Page 135
Function name: Port Setting/Status Function description: Port setting/status is used to configure the trunk property of each and every port in the switch system. Fig. 3-59 Parameter description: Method: This determines the method a port uses to aggregate with other ports. None: A port does not want to aggregate with any other port should choose this default setting.
Page 136
This field is only referenced when a port’s trunking method is LACP. Active: An Active LACP port begins to send LACPDU to its link partner right after the LACP protocol entity started to take control of this port. Passive: A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner.
Page 137
Parameter description: Aggregator: It shows the aggregator ID (from 1 to 26) of every port. In fact, every port is also an aggregator, and its own aggregator ID is the same as its own Port No.. Method: Show the method a port uses to aggregate with other ports. Member Ports: Show all member ports of an aggregator (port).
Page 138
Trunk Status: Show the trunk status of a single member port.”---“ means “not ready” Function name: LACP System Configuration Function description: It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system.
3-17. 802.1x Configuration 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1x-enabled port.
Page 140
The overview of operation flow for the Fig. 3-63 is quite simple. When Supplicant PAE issues a request to Authenticator PAE, Authenticator and Supplicant exchanges authentication message. Then, Authenticator passes the request to RADIUS server to verify. Finally, RADIUS server replies if the request is granted or denied.
Page 141
Authentication server Fig. 3-64 Authenticator Supplicant A The Fig. 3-64 shows the procedure of 802.1x authentication. There are steps for the login based on 802.1x port access control management. The protocol used in the right side is EAPOL and the left side is EAP. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state.
Page 142
When the authenticator PAE receives a Radius-Access-Accept, it will send an EAP-Success to the supplicant. At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x control is in the authorized state. The supplicant and other devices connected to this port can access the network.
Page 143
Port Mode Port Control Authentication Port Status Disable Don’t Care Don’t Care Port Uncontrolled Multihost Auto Successful Port Authorized Multihost Auto Failure Port Unauthorized Multihost ForceUnauthorized Don’t Care Port Unauthorized Multihost ForceAuthorized Don’t Care Port Authorized Table 3-3 Function name: 802.1x State Setting Function description: This function is used to configure the global parameters for RADIUS...
Page 144
Secret Key: The secret key between authentication server and authenticator. It is a string with the length 1 – 31 characters. The character string may contain upper case, lower case and 0-9. It is character sense. It is not allowed for putting a blank between any two characters.
Page 145
Function name: 802.1x Mode Setting Function description: Set the operation mode of 802.1X for each port. In this device, it supports only Multi-host operation mode. Fig. 3-67 Parameter description: Port Number: Indicate which port is selected to configure the 802.1x operation mode. 802.1x Mode: 802.1x operation mode.
Page 146
Function name: Port Security Management Function description: Shows each port status. In Multihost mode, it shows the port number and its status, authorized or unauthorized. Fig. 3-68 Parameter description: Disable Mode: When selecting Disable mode for a port in the function 802.1X Port Mode Configuration, the port is in the uncontrolled port state and does not apply 802.1X authenticator on it.
Page 147
Function name: Param. Setting Function description: This function is used to configure the parameters for each port in 802.1x port security application. Refer to the following parameters description for details. Fig. 3-69 Parameter description: Port: It is the port number to be selected for configuring its associated 802.1x parameters which are Port control, reAuthMax, txPeriod, Quiet Period, reAuthEnabled, reAuthPeriod, max.
Page 148
reAuthMax(1-10): The number of authentication attempt that is permitted before the port becomes unauthorized. Default: 2 txPeriod(1-65535 s): A time period to transmitted EAPOL PDU between the authenticator and the supplicant. Default: 30 Quiet Period(0-65535 s): A period of time during which we will not attempt to access the supplicant. Deafult: 60 seconds reAuthEnabled: Choose whether regular authentication will take place in this port.
3-18. Alarm Configuration Alarm Configuration Events Configuration Email Configuration Function name: Events Configuration Function description: The Trap Events Configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 21 different trap events to users for switch management. The trap information can be sent out in two ways, including email and trap.
Page 150
Parameter description: Trap: Cold Start, Warm Start, Link Down, Link Up, Authentication Failure, User login, User logout STP: STP Topology Changed, STP Disabled, STP Enabled LACP: LACP Disabled, LACP Enabled, LACP Member Added, LACP Port Failure GVRP: GVRP Disabled, GVRP Enabled VLAN: Port-based VLAN Enabled, Tag-based VLAN Enabled Module Swap: Module Inserted, Module Removed, Dual Media Swapped Function name:...
Page 151
Parameter description: Email: Mail Server: the IP address of the server transferring your email. Username: your username on the mail server. Password: your password on the mail server. Email Address 1 – 6: email address that would like to receive the alarm message.
3-19. Configuration The switch supports three copies of configuration, including the default configuration, working configuration and user configuration for your configuration management. All of them are listed and described below respectively. Default Configuration: This is default setting and cannot be altered. In Web UI, two restore default functions are offered for the user to restore to the default setting of the switch.
3-19-1. Save/Restore Function name: Save As Start Configuration Function description: Save the current configuration as a start configuration file in flash memory. Fig. 3-73 Function name: Save As User Configuration Function description: Save the current configuration as a user configuration file in flash memory. Fig.
Page 154
Function name: Restore Default Configuration (includes default IP address) Function description: Restore Default Configuration function can retrieve default setting to replace the start configuration. And the IP address of the switch will also be restored to 192.168.1.1. Fig. 3-75 Function name: Restore Default Configuration (excludes current IP address) Function description: Restore Default Configuration function can retrieve default setting to replace...
Page 155
Function name: Restore User Configuration Function description: Restore User Configuration function can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration. When completing to restore the configuration, the system’s start configuration is updated and will be changed its system settings after rebooting the system. Fig.
3-19-2. Config File Function name: Config File Function description: With this function, user can back up or reload the config files of Save As Start or Save As User via TFTP. Warning: • Before importing / exporting configuration please make sure the firmware version is always the same.
3-20. Security Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring.
Page 158
Function name: Isolated Group Function description: Isolated Group function can let the port be independent of other ports in the Isolated group, and the communication is also forbidden between these ports. But, the ports of the Isolated group are still able to communicate with the ports of the non-Isolated group.
3-21. Bandwidth Management Function name: Ingress Bandwidth Setting Function description: Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port. Fig. 3-81 Parameter description: Port No.: Choose the port that you would like this function to work on it. Valid range of the port is 1~10.
Page 160
Function name: Egress Bandwidth Setting Function description: Egress Bandwidth Setting function is used to set up the limit of Egress bandwidth for each port. Fig. 3-82 Parameter description: Port No.: Choose the port that you would like this function to work on it. Valid range of the port is 1~10.
Page 161
Function name: Storm Function description: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port. Fig. 3-83 Parameter description: Storm Type: Disable: Disable the function of the bandwidth storm control. BC (Broadcast Storm Control): Enable the function of bandwidth storm control for broadcast packets.
Page 162
MC (Multicast Storm Control): Enable the function of bandwidth storm control for multicast packets. BC, MC (Broadcast, Multicast Storm Control): Enable the function of bandwidth storm control for broadcast and multicast Storm packets in transmission. UC, MC (Unknown Unicast, Multicast Storm Control): Enable the function of bandwidth storm control for Unknown Unicast and multicast Storm packets in transmission.
3-22. QoS(Quality of Service) Configuration The switch supports QoS, are as follows, 802.1p Priority and DiffServ DSCP Priority. VLAN tagged Priority field is effected by 802.1p Priority setting. DiffServ DSCP Priority act on DSCP field of IP Header. In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS).
Page 164
You can Enable QoS Mode and let QoS function become effective. Default is Disable. Priority Control: ) of Just tick the check box ( 802.1P, TOS, or DSCP Qos and click Apply button to be in operation. Scheduling Method: There are two Scheduling Method, WRR and Strict Priority. Default is WRR.
Page 165
Parameter description: 802.1p Priority Mapping: Each Priority can select any of Queue 0 ~ Queue 3. In Default, Priority 0 is mapping to Queue 0, Priority 1 is mapping to Queue 0, Priority 2 is mapping to Queue 1, Priority 3 is mapping to Queue 1, Priority 4 is mapping to Queue 2, Priority 5 is mapping to Queue 2, Priority 6 is mapping to Queue 3, and Priority 0 is mapping to Queue 3.
3-23. ACL The access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way. The ACLs are divided into EtherTypes. IPv4, ARP protocol, MAC and VLAN parameters etc.
Page 167
Parameter description: To add new access control rule on switch. You must configure the parameters what described later when you add the new access control rule. Edit/ Show: To modify or monitor the access control configuration rule on switch. Delete: To delete existed access control rule on switch.
Page 168
ACL Configuration: To add a new ACL rule on switch. ACL name: To add a new ACL rule name, A name is composed of any letter (A-Z, a-z) and digit (0-9) with maximal 8 characters. Ingress Port Map: To evoke the ingress ports to join the access control rule. port number is 1~10 or all.
Page 169
Ethernet Type: Fig. 3-91 To droll “Ethernet Type” bar and option “any”, “ IPv4”, “ ARP” and “ Specific” for ACL requirement. Any: It is including all frame type IPv4: It is including all IPv4 protocol frame type ARP: It is including all ARP protocol frame type Specific: It is specific frame type Fig.
Page 170
IPv4: To set the IPv4 packet filter function with ACLs, the parameters shown as below: Protocol : To droll the bar and you can elect “ Any”, “ICMP”, “ UDP”, “TCP” and “Other” Fig. 3-93 IPv4 TOS : To droll the bar and you can elect “ Any”, and “ Specific”. If you click “...
Page 171
Fig. 3-80 TTL Range : To droll the bar and you can elect “ TTL=0”, “TTL=1”, “TTL=2-254” and “ TTL=255” and set the Time to live value range. Fig. 3-81 IPv4 DA/ SA : To droll the bar and you can elect “ Any”, “HOST” and “Network”. Fig.
Page 172
Fig. 3-83 L4 Source port : To droll the bar and you can elect “ Any” and “Specific”. If you click “specific” then you need to set source port value. Fig. 3-84 Action: To set network packet filter includes “In-band” , “Out-band” and “Modify Packet for In/Out-Band”.
Page 174
Fig. 3-88 Fig. 3-89 Modify Packet for In/ Out-Band : Modify Packet -802.1P: To droll down the bar to elect “Any” and “Specific”. If you click the “ Specific” then you need to set 802.1p value in the field. default is 0 Fig.
Page 175
Fig. 3-91 Rate Meter: To set rate meter function with the bandwidth parameter. The range is 64 to 1024000kbps. Fig. 3-92...
3-24. PoE Function name: PoE Configuration Function description: In PoE Port Management function, user can configure the settings about PoE. The switch complies with IEEE 802.3af protocol and be capable of detecting automatically that whether the device linked to the port on the switch is PD (Powered Device) or not.
Page 177
To display per port which supply the PD Power Consumption and shows the power is consumed by the port.. Current (mA): The current is supplied to the PD by the port. PD Class: The Class of the PD linked to the port of the switch. Priority: Three options are offered for the user to choose, including Normal, Low and High.
Page 178
Function name: PoE Auto Checking: Function description: The function is using for PD auto checking. It can allow user to control the PoE function by using the ping command, in order to turn on or off any PD which connect with port assign. Parameter description: Ping Check: To scroll and select the Enable or Disable Ping Check function.
Page 179
of movement after starting. The error means switch to ping the PD is failure or total means total switch to do ping frequency. Failure Action: To set up when PD is failure and switch action command. The values are “Nothing” and “Reboot Remote PD”. Nothing: The switch detects that PD occurs failure and do nothing.
Page 180
Function name: PoE Scheduling Function description: The function provides user to appoint date and time, Enable or Disable PoE function, switch can with according to the time when is set up, carry on the designated movements. Web Smart Switch NTP only supports IP address for NTP server, no support domain name for NTP server.
Page 181
Parameter description: Schedule on: It provide user to set which port will action the PoE Scheduling function. Schedule mode: To set the schedule mode with Enable or Disable. The default is Disable. Select all: To select all date and time to enable the PoE function. Hour/ Day: To evoke what time to enable the PoE function.
3-25. Diagnostics Five functions, including Diagnostics, Loopback Test, Ping Test, Auto Ping and Cable are contained in this function folder for device self-diagnostics. Each of them will be described in detail orderly in the following sections. Diagnostics Diag Loopback Test Ping Test Auto Ping Cable...
Page 183
Function name: Loopback Test Function description: In the Loopback Test function, there are two different loopback tests. One is Internal Loopback Test and the other is External Loopback Test. The former test function will not send the test signal outside the switch box. The test signal only wraps around in the switch box.
Page 184
Parameter description: IP Address: An IP address with the version of v4, e.g. 192.168.1.1. Default Gateway: IP address of the default gateway. For more details, please see the section of IP address in Chapter 2. Fig. 3-95 Function name: Auto Ping Function description: Auto Ping function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages.
Page 185
Function name: Cable Function description: Cable function is a tool for detecting if the cable per port status is OK or not. report messages. The switch provides cable Test function to let you know that if the cable connect to a port is OK or not. Fig.
3-26. TFTP Server Function name: TFTP Server Function description: Set up IP address of TFTP server. Parameter description: Specify the IP address where the TFTP server locates. Fill in the IP address of your TFTP server, then press <Apply> button to have the setting taken effect. Fig.
3-27. Syslog The Syslog is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages.
3-28. Log This function shows the log data. The switch provides system log data for users. There are 16 private trap logs, 5 public trap logs. The switch supports total 120 log entries. For more details on log items, please refer to the section of Trap/Alarm Configuration and SNMP Configuration.
3-29. Firmware Upgrade Software upgrade tool is used to help upgrade the software function in order to fix or improve the function. The switch provides a TFTP client for software upgrade. This can be done through Ethernet. Function name: Firmware Upgrade Function description: The switch supports TFTP upgrade tool for upgrading software.
3-30. Reboot We offer you many ways to reboot the switch, including power up, hardware reset and software reset. You can press the RESET button in the front panel to reset the switch. After upgrading software, changing IP configuration or changing VLAN mode configuration, then you must reboot to have the new configuration taken effect.
3-31. Logout You can manually logout by performing Logout function. In the switch, it provides another way to logout. You can configure it to logout automatically. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission.
Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basic installation. The following description is the brief of the network connection. -- Locate the correct DB-9 null modem cable with female DB-9 connector. Null modem cable comes with the management switch. Refer to the Appendix B for null modem cable configuration.
4-2. Commands of CLI To see the commands of the mode, please input “?” after the prompt, then all commands will be listed in the screen. All commands can be divided into two categories, including global commands and local commands. Global commands can be used wherever the mode you are.
When you enter this command, your current position would move to the top mode. If you use this command in the top mode, you are still in the position of the top mode. Argument: None. Possible value: None. Example: FGP-1072 # alarm FGP-1072 (alarm)# events FGP-1072 (alarm-events)# end FGP-1072 # exit Syntax: exit Description: Back to the previous mode.
Page 196
Argument: None. Possible value: None. Example: FGP-1072# ip FGP-1072(ip)# help Commands available: ------------<< Local commands >>------------ disable dhcp Disable DHCP enable dhcp Enable DHCP, and set dns auto or manual...
Argument: None. Possible value: None. Example: FGP-1072# logout Managed Switch - FGP-1072 Login: restore default Syntax: restore default Description: When you use this function in CLI, the system will show you the information “Do you want to restore the default IP address?(y/n)”. If you choose Y or y, the IP address will restore to default “192.168.1.1”.
CLI would save your current configuration into the non-volatile FLASH. If you want the configuration still works after rebooting, save the configuration using the command ‘save stat’. Argument: None. Possible value: None. Example: FGP-1072 # save start Saving start... Save Successfully FGP-1072 #...
To save the current configuration as the user-defined configuration. When you enter this command, the CLI would save your current configuration into the non-volatile FLASH as user-defined configuration. Argument: None. Possible value: None. Example: FGP-1072 # save user Saving user... Save Successfully FGP-1072 #...
<sec> : timer, range 0-65535 Possible value: <port range> : 1 to 26 <sec> : 0-65535, default is 60 Example: FGP-1072 (802.1x)# set quiet-period 2 30 set reAuthEnabled Syntax: set reAuthEnabled <port-range> <ebl> Description: A constant that define whether regular reauthentication will take place on this port.
Page 202
FGP-1072 (802.1x)# set reAuthMax 2 2 set reAuthPeriod Syntax: set reAuthPeriod <port-range> <sec> Description: A constant that defines a nonzero number of seconds between periodic reauthentication of the supplicant. Argument: <port range> : syntax 1,5-7, available from 1 to 26 <sec>...
Page 203
<port-number> : 1~65535, default 1812 <Accounting Service> : 0 for disable, 1 for enable <Accounting Server> : xxx.xxx.xxx.xxx <Accounting Port> :1~65535 Example: FGP-1072(802.1X)# set state 192.168.1.252 1812 winradius 1 192.168.1.252 FGP-1072(802.1X)# show state Radius Server : 192.168.1.252 Port Number : 1812...
Page 204
<port range> : 1 to 26 <sec> : 1-65535, default is 30 Example: FGP-1072 (802.1x)# set txPeriod 2 30 show mode Syntax: show mode Description: To display the mode of each port. Argument: None. Possible value: None. Example: FGP-1072(802.1X)# show mode...
Page 205
: 30 show security Syntax: show security Description: To display the status of each port. authentication Argument: None. Possible value: None. Example: FGP-1072 (802.1x)# show security Port Mode Status ====== ============ ============== Disable Disable Disable Disable Disable Normal Unauthorized Disable...
Page 206
Syntax: show state Description: To display the Radius server configuration. Argument: None. Possible value: None. Example: FGP-1072 (802.1x)# show state Radius Server: 192.168.1.115 Port Number : 1812 Secret Key : WinRadius...
Page 207
To create a new guest user. When you create a new guest user, you must type in password and confirm password. Argument: <name> : new account name Possible value: <name> : A string must be at least 5 character. Example: FGP-1072(account)# add aaaaa Password: Confirm Password: FGP-1072(account)# Syntax: del <name> Description: To delete an existing account.
Page 208
To change the username and password of an existing account. Argument: <name> : existing user account Possible value: None. Example: FGP-1072(account)# modify aaaaa username/password: the length is from 5 to 15. Current username (aaaaa):bbbbb New password: Confirm password: Username changed successfully.
Page 209
Syntax: set mail-address <#> <mail address> Description: To set up the email address. Argument: <#> : email address number, range: 1 to 6 <mail address> : email address Possible value: <#>: 1 to 6 Example: FGP-1072(alarm-email)# set mail-address 1 abc@mail.abc.com...
To set up the IP address of the email server. Argument: <ip>:email server ip address or domain name Possible value: None. Example: FGP-1072(alarm-email)# set server 192.168.1.6 set user Syntax: set user <username> Description: To set up the account of the email server.
Page 211
To disable email and trap of events. Argument: <range>:del the range of email and trap of events, syntax 1,5-7, available from 1 to Possible value: <range>: 1~25 Example: FGP-1072(alarm-events)# del all 1-3 del email Syntax: del email <range> Description: To disable the email of the events.
To enable email and trap of events. Argument: <range>:set the range of email and trap of events, syntax 1,5-7, available from 1 to Possible value: <range>: 1~25 Example: FGP-1072(alarm-events)# set all 1-3 set email Syntax: set email <range> Description: To enable the email of the events.
Page 213
Description: The Show for alarm here is used to display the configuration of Trap or E-mail. Argument: None. Possible value: None. Example: FGP-1072 (alarm)# show email Mail Server Username Password : **************** Email Address 1: Email Address 2: Email Address 3:...
Page 214
FGP-1072 (alarm)# show events 1 Cold Start 4 Link Up 5 Authentication Failure 6 User Login 7 User Logout 8 STP Topology Changed 9 STP Disabled 10 STP Enabled 11 LACP Disabled 12 LACP Enabled 13 LACP Member Added 14 LACP Port Failure...
< rate>: 64-1024000(Kb). port 1-24: 64-102400(Kb); port 25-26: 64-1024000(Kb) Possible value: <range>: 1 to 26 <rate>: 64-102400(Kb) for port 1-24; 64-1024000(Kb) for port 25-26 Example: FGP-1072(bandwidth)# set egress 8-12 3780 FGP-1072(bandwidth)# show Port Ingress Rate(Kb) Egress Rate(Kb) Storm Type Storm Rate(Kb)
Page 216
<rate>: 64-1024000(Kb). port 1-24: 64-102400(Kb); port 25-26: 64-1024000(Kb) Possible value: <range>: 1 to 26 <rate>: 64-102400(Kb) for port 1-24; 64-1024000(Kb) for port 25-26 Example: FGP-1072 (bandwidth)# set ingress 1-16 100 FGP-1072(bandwidth)# show Port Ingress Rate(Kb) Egress Rate(Kb) Storm Type Storm Rate(Kb)
Page 217
FE port: 64 - 102400 (Kbps) GE port: 64 - 1024000 (Kbps). Possible value: <range>: 1 to 26 <type> : 0 to 7 <rate>: 64- 1024000 (Kbps) Example: FGP-1072(bandwidth)# set storm 20 3 5000 FGP-1072(bandwidth)# show Port Ingress Rate(Kb) Egress Rate(Kb) Storm Type Storm Rate(Kb) ====== ================== ================= ============ ================ ….
Page 218
FGP-1072(bandwidth)# show Syntax: show Description: To display all current settings of the bandwidth. Argument: None Possible value: None Example: FGP-1072(bandwidth)# show FGP-1072(bandwidth)# show Port Ingress Rate(Kb) Egress Rate(Kb) Storm Type Storm Rate(Kb) ====== ================== ================= ============ ================ …. 102400 102400...
Page 220
Syntax: export start Description: To run the export start function. Argument: None. Possible value: None. Example: FGP-1072 (config-file)# export start Export successful. export user-conf Syntax: export user-conf Description: To run the export user-conf function. Argument: None. Possible value: None.
Page 221
To set up the file path and filename that user would like to export. Argument: <filepath>:filepath and filename Possible value: <filepath>:filepath and filename Example: FGP-1072 (config-file)# set export-path log/21511.txt set import-path Syntax: set import-path <filepath> Description: To set up the filepath and filename that user would like to import.
Page 222
To set up the delay time for DHCP Boot. Argument: <sec>:range syntax: 0, 1-30. The value “0” is to disable dhcp-boot delay Possible value: <sec>:0-30 Example: FGP-1072 (dhcp-boot)# set 30 show Syntax: show Description: To display the status of DHCP Boot.
Page 223
To set auto ping function on switch Argument: <IP address> : IPv4 format <interval>: 1~300 (sec) <times>: 3~100 Possible value: <IP address> : IPv4 format <interval>: 1~300 (sec) <times>: 3~100 Example: FGP-1072(diag-autoping)# set 192.168.2.22 100 3 FGP-1072(diag-autoping)# show Auto Ping state :Enabled...
Page 224
<port> : syntax: 1,5-7, available from 1 to 26 Possible value: <port> : 1 to 26. Example: FGP-1072(diag)# cable 1-5 port 1: cable Ok (2 pairs, length +/- 10 meters) pair A Ok, length 10 meters pair B Ok, length 10 meters...
Page 225
Diag is used to test whether EEPROM, UART, DRAM and Flash is normal or not. Argument: None. Possible value: None. Example: FGP-1072 (diag)# diag EEPROM Test : OK UART Test : OK DRAM Test : OK Flash Test : OK...
Page 226
To set upgrade file path and name on switch. Argument: <filepath>: upgrade file path and name Possible value: <filepath>: upgrade file path and name Example: FGP-1072 (firmware)# set upgrade-path ddc_fgp1072_v6.09.img show Syntax: show Description: To display the information of tftp server and upgrade-path and file name.
Page 227
<group number>: enter which gvrp group you had created, using value is vid. Available range: 1 to 4094 Possible value: <group number>: 1~4094 Example: FGP-1072 (gvrp)# show group GVRP group information Current Dynamic Group Number: 1 VID Member Port ---- --------------------------------------------------...
Page 228
FGP-1072 (gvrp)# group 2 FGP-1072 (gvrp-group-2)# set applicant 1-6 non-participant FGP-1072 (gvrp-group-2)# show GVRP group VID: 2 Port Applicant Registrar ---- --------------- --------- Non-Participant Normal Non-Participant Normal Non-Participant Normal Non-Participant Normal Non-Participant Normal Non-Participant Normal Normal Normal Normal Normal FGP-1072 (gvrp-group-2)# set registrar 1-5 fixed...
Page 229
<non-participant>: set applicant as non-participant mode Possible value: <range>: 1 to 26 <normal|non-participant>: normal or non-participant Example: FGP-1072 (gvrp)# set applicant 1-10 non-participant set registrar Syntax: set registrar <range> <normal | fixed | forbidden> Description: To set default registrar mode for each port.
Page 230
<leaveall>: leaveall timer, available from 1000 to 5000 Leave Time must equal double Join Time at least. Possible value: <range> : 1 to 26 <join>: 20 to 100 <leave>: 60 to 300 <leaveall>: 1000 to 5000 Example: FGP-1072 (gvrp)# set timer 2-8 25 80 2000...
To show counter of the port. Argument: <port>: port number, available from 1 to 10 Possible value: <port>: 1 to 10 Example: FGP-1072(gvrp)# show counter 2 GVRP Counter port: 2 Counter Name Received Transmitted -------------------- -------- ----------- Total GVRP Packets...
Page 232
<port> syntax: 1,5-7, from 1 to 26 value. Possible value: <vid>: from 1 to 4094 value. <start>: ip address format. <end>: ip address format. <port> syntax: 1,5-7, from 1 to 26 value. Example: FGP-1072(multicast)# add group-filter 2 224.1.1.1 230.255.255.255 10-15...
Page 233
<vid>: from 1 to 4094 value. <index>: from 1 to 16 value. Possible value: <vid>: from 1 to 4094 value. <index>: from 1 to 16 value. Example: FGP-1072(multicast)# delete group-filter 2 1 FGP-1072(multicast)# show group-filtering 2 None entry exist. FGP-1072(multicast)# delete igmp-vlan...
Page 234
FGP-1072(multicast)# show group-filtering 3 Index Start Address : 224.1.1.1 End Address : 225.255.255.255 Port Member : 10,11,12,13,14,15 FGP-1072(multicast)# edit group-filter 3 1 224.1.1.1 226.255.255.255 10-11 FGP-1072(multicast)# show group-filtering 3 Index Start Address : 224.1.1.1 End Address : 226.255.255.255 Port Member...
Page 235
Description: To set unregister multicast flooding state function on switch. Argument: <state>: 0(disable), 1(enable) Possible value: <state>: 0(disable), 1(enable) Example: FGP-1072(multicast)# set unregfld-enable 1 FGP-1072(multicast)# show igmp-setting IGMP Snooping : Enable Unregister Multicast Flooding : Enable General Query Interval : 125...
Page 236
<sec>: 1 to 2000 . Example: FGP-1072(multicast)# set gnlqry-interval 20 set gnlqry-response Syntax: set gnlqry-response <sec> Description: To set general query max response time Argument: <sec>: from 1 to 10 value. Possible value: <sec>: 1 to 10 . Example: FGP-1072(multicast)# set gnlqry-response 5...
Page 237
<port> syntax: 1,5-7, from 1 to 26 value. <limit>: from 0 to 256 value Possible value: <port>: 1 to 26. <limit>: 0 to 256. Example: FGP-1072(multicast)# set group-limit 10-12 55 FGP-1072(multicast)# show igmp-setting IGMP Snooping : Enable Unregister Multicast Flooding : Enable...
Page 238
<port> syntax: 1,5-7, from 1 to 26 value. <state>: 0(non-router), 1(router). Possible value: <port> : 1 to 26. <state>: 0(non-router), 1(router). Example: FGP-1072(multicast)# set igmp-router 5-7 1 FGP-1072(multicast)# show igmp-setting IGMP Snooping : Enable Unregister Multicast Flooding : Enable General Query Interval...
Page 239
When set mvr to enable mode, this option is necessary. Possible value: <state>: 0(disable), 1(enable). <mvid>: 1 to 4094. Example: FGP-1072(multicast)# set mvr-enable 1 3 set mvr-tagging Syntax: set mvr-tagging <port> <state> Description: To set mvr tagging function on switch Argument: <port>...
Page 240
None None None None ...(q to quit) set mvr-vid Syntax: set mvr-vid <vid> Description: To set mvr vid on switch Argument: <vid>: from 1 to 4094 value Possible value: <vid>: from 1 to 4094 value Example: FGP-1072(multicast)# set mvr-vid 3...
Page 241
<type>: 0(None), 1(Client), 2(Router). Possible value: <port> : 1 to 26. <type>: 0(None), 1(Client), 2(Router). Example: FGP-1072(multicast)# set mvrserv-type 6-8 1 FGP-1072(multicast)# set mvrserv-type 9-10 2 FGP-1072(multicast)# show mvr-setting Multicast VLAN Registration : Enable MMulticast VLAN ID Port Service Type Tagging...
Page 242
To set specific query count function on switch Argument: <cnt>: from 1 to 10 value. Possible value: <cnt>: from 1 to 10 value. Example: FGP-1072(multicast)# set specqry-count 5 set specqry-response Syntax: set specqry-response <time> Description: To set specific query max response time on switch.
Page 243
To show group filtering on switch. Argument: <vid>: from 1 to 4094 value. Possible value: <vid>: 1 to 4094. Example: FGP-1072(multicast)# show group-filtering 3 Index Start Address : 224.1.1.1 End Address : 226.255.255.255 Port Member : 10,11 FGP-1072(multicast)# show igmp-setting...
Page 244
---- --------------------- ----------- ...(q to quit) show igmp-vlan Syntax: show igmp-vlan Description: To show igmp-vlan on switch. Argument: none Possible value: none Example: FGP-1072(multicast)# show igmp-vlan Index ----- ------- FGP-1072(multicast)# show multicast-status Syntax: show multicast-status Description: To show multicast-status on switch. Argument:...
Page 245
Possible value: none Example: FGP-1072(multicast)# show multicast-status ? None entry exist. FGP-1072(multicast)# show mvr-setting Syntax: show mvr-setting Description: To show mvr-setting on switch. Argument: none Possible value: none Example: FGP-1072(multicast)# show mvr-setting Multicast VLAN Registration : Enable MMulticast VLAN ID...
<manual|auto> : manual or auto Example: FGP-1072(ip)# enable dhcp manual set dns Syntax: set dns <ip> Description: To set the IP address of DNS server. Argument: <ip> : dns ip address Possible value: <ip> : 168.95.1.1 Example: FGP-1072 (ip)# set dns 168.95.1.1...
Page 247
<gateway> : default gateway Possible value: <ip> : 192.168.1.1 or others <mask> : 255.255.255.0 or others <gateway> : 192.168.1.253 or others Example: FGP-1072 (ip)# set ip 192.168.1.2 255.255.255.0 192.168.1.253 FGP-1072(ip)# show DHCP : Disable IP Address : 192.168.1.2 Subnet mask : 255.255.255.0...
Page 248
FGP-1072 (log)# clear disable auto-upload Syntax: disable auto-upload Description: To disable the auto-upload function. Argument: None. Possible value: None. Example: FGP-1072 (log)# disable auto-upload enable auto-upload Syntax: enable auto-upload Description: To enable the auto-upload function. Argument: None. Possible value: None. Example:...
Page 250
<mac> : mac address, format: xx-xx-xx-xx-xx-xx <alias> : mac alias name, max. 15 characters Possible value: <mac> : mac address <alias> : max. 15 characters Example: FGP-1072(mac-table-alias)# set 00-d0-59-c5-92-c8 client1 show Syntax: show Description: To display the mac alias entry.
Page 251
<vid> : vlan id, from 1 to 4094; '?' as don't care, 0 as untagged Possible value: <port> : 1 to 26 <vid> : 0, 1 ~4094 Example: FGP-1072(mac-table-information)# search 7 00-d0-59-c5-92-c8 1 MAC Table List Alias MAC Address Port VID State...
Page 252
<port> syntax: 1,5-7, available from 1 to 26 <num> : MAC address numbers which can be dynamically learned num range: between 0 to 8191; 0 for learning disabled Possible value: <port> : 1 to 26 <num>: 0 to 8191 Example: FGP-1072 (mac-table-maintain)# set learning 5 100...
Page 253
Description: To display the settings of MAC table ageout time and the learning limit of each port. Argument: None. Possible value: None. Example: FGP-1072(mac-table-maintain)# show Mac table ageout time: 300 seconds Port Dynamically learn limit ------ ------------------------- 8191 8191 8191...
Page 254
<range> : syntax: 1,5-7, available from 1 to 26 Possible value: <range> : 1 to 26 Example: FGP-1072(mac-table-port-security)# port 10 FGP-1072(mac-table-port-security-port-10)# FGP-1072(mac-table-port-security-port-10)# add 00-d0-59-c5-92-c8 2 FGP-1072(mac-table-port-security-port-10)# show Port 10 static mac entry: ------------------------------------- MAC Address 00-D0-59-C5-92-C8 2 FGP-1072(mac-table-port-security-port-10)# del 00-d0-59-c5-92-c8...
Page 255
<port> : forwarded destination port, form 1 to 26 Possible value: <vid>: 1 to 4094 <rule>: 0 to 2 <port>: 1 to 26 Example: FGP-1072(mac-table-static-mac)# add 00-d0-59-c5-92-c8 1 1 8 FGP-1072(mac-table-static-mac)# show Forwarding Rule Port ------ ----------------- ------ ----------------------------- ------- 1) 00-D0-59-C5-92-C8...
Argument: <name> : management security entry name Possible value: <name> : management security entry name Example: FGP-1072(management-add)# set name Mary vid 20 ip 192.168.1.1-192.168.1.90 port 2-5,8 type h,s action a set access Syntax: set access <name> <range> Description:...
Page 257
<range> syntax: 1,1-3, available from 0 to 3 1 - Http 2 - Telnet 3 - Snmp 0 - Any Example: FGP-1072(management)# set access acc2 1-3 FGP-1072(management)# show Name : acc1 IP Range: 192.168.1.2-192.168.1.22 Port : 10 Access : Any...
Page 258
<ip2> : end ip address Possible value: <name> : management security entry name <ip1> : start ip address, 0 for any <ip2> : end ip address Example: FGP-1072(management)# set ip remote1 192.168.1.33 192.168.1.34 FGP-1072(management)# show Name : remote1 : Any IP Range: 192.168.1.33-192.168.1.34...
<range syntax> : 1,5-7, available from 0 to 26, 0 for any Possible value: <name> : management security entry name <range syntax> : 1,5-7, available from 0 to 26, 0 for any Example: FGP-1072(management)# set port remote1 9 FGP-1072(management)# show Name : remote1 : Any IP Range: 192.168.1.33-192.168.1.34...
Page 260
FGP-1072(management)# show Syntax: show Description: To show management security entry. Argument: None Possible value: None. Example: FGP-1072(management)# show Name : remote1 : 300 IP Range: 192.168.1.33-192.168.1.34 Port Access : Any Action : Deny FGP-1072(management)#...
To disable the communication capability of the port. Argument: <range>: port range, syntax 1,5-7, available from 1 to 10 Possible value: <range>: 1 ~ 10 Example: FGP-1072 (port)# disable state 7 enable state Syntax: enable state <range> Description: To enable the communication capability of the port.
<range>:port range, syntax 1,5-7, available from 1 to 10 <symmetric>: set its flow control as symmetric <asymmetric>: set its flow control as asymmetric Possible value: <range>: 1 to 10 <symmetric | asymmetric>:symmetric or asymmetric Example: FGP-1072 (port)# set flow-control 3-6 asymmetric set speed-duplex...
Page 263
: set to half duplex full : set to full duplex Possible value: <range>: 1 to 26 <port-speed> : auto, 10, 100, 1000 <port-duplex> : full, half Example: FGP-1072(port)# set speed-duplex 10-15 10 full FGP-1072(port)# show status asymmetric: set Enable Enable 100M/Full Down Enable...
To display the detailed counting number of each port’s traffic. Argument: <#> : port, available from 1 to 10 Possible value: <#>:1 ~ 10 Example: FGP-1072 (port)# show detail-counter 6 FGP-1072(port)# show detail-counter 1 Receive Total: ------------------------------------------------------- Rx Packets 61731...
To display the module 9 or 10 information. Argument: <port>: available 9, 10 Possible value: <port>: 9, 10 Example: FGP-1072(port)# show media 9 Port 9 Fiber Media Information --------------------------------------------------------------------- Connector Type : SFP - Unknown or unspecified Fiber Type : Reserved...
Page 266
Description: To display the summary counting of each port’s traffic. Argument: None. Possible value: None. Example: FGP-1072 (port)# show simple-counter Port 1 Tx Octets : 2346780 Rx Octets : 57965158 Tx Packets : 28884 Rx Packets : 65171...
Page 267
Description: To display the port’s current status. Argument: None. Possible value: None. Example: FGP-1072(port)# show status Port Media Link State Auto Nego. Speed/Duplex Rx Pause Tx Pause ---- ----- ---- ------- ---------- ------------ -------- -------- Down Enable Enable ----/---- ----...
You don't need to use all of queues, but must assign queues in order syntax: 1,2 or 2,5-7, available from 0 to 63. Possible value: <priority>: 0 to 63 Example: FGP-1072 (qos)# set dscp q0 2 q1 2 q2 2 q3 3 set pri-tag Syntax: set pri-tag [<q0><priority>] [<q1><priority>] [<q2><priority>] [<q3><priority>] Description: To set 802.1p qos weighting for 4 queues.
Page 271
3: weighted for every queue. weighted range : 1-55. Possible value: <method>: 0-3 <wrr_0 to 3>: 1-55. Example: FGP-1072(qos)# set sche 0 2 8 11 11 FGP-1072(qos)# show pr 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority...
Description: To show IP DSCP Qos configuration. Argument: None. Possible value: None. Example: FGP-1072 (qos)# show dscp ip diffserv classification ==================== Global QoS mode: Enable QoS Disable 802.1p Priority Disable ip tos classification Enable ip diffserv classification Scheduling: weighted round robin method.
Page 273
Syntax: show priority-tag Description: To show 802.1p Qos configuration. Argument: None. Possible value: None. Example: FGP-1072 (qos)# show priority-tag 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority Enable ip diffserv classification Scheduling: 4 WRR method. weight: wrr 0 = 2; wrr 1 = 8; wrr 2 = 11; wrr 3 = 11.
Page 274
Description: To reboot the system. Argument: None. Possible value: None. Example: FGP-1072 # reboot security <<isolated-group>> Syntax: set <port> Description: To set up the function of the isolated group. Argument: <port> : isolated port; range syntax: 1,5-7, available from 0 to 10...
Page 275
FGP-1072(security-isolated-group)# set 2,4-7 FGP-1072(security-isolated-group)# show Isolated group: 2 4 5 6 7 FGP-1072(security-isolated-group)# <<mirror>> disable Syntax: disable Description: To disable the function of mirror. Argument: None. Possible value: None. Example: FGP-1072 (security-mirror)# disable enable Syntax: enable Description: To enable the function of mirror.
Page 276
<egress>: 0 to 10 Example: FGP-1072(security-mirror)# set 9 1-10 1-10 FGP-1072(security-mirror)# show Mirror: Monitoring Port :9 Monitored Ingress : Monitored Egress : FGP-1072(security-mirror)# show Syntax: show Description: To display the current setting status of mirror. Argument: None. Possible value: None.
Page 277
Description: The Disable here is used for the de-activation of snmp or set-community. Argument: None. Possible value: None. Example: FGP-1072(snmp)# disable set-community FGP-1072(snmp)# disable snmp enable Syntax: enable set-community enable snmp Description: The Enable here is used for the activation snmp or set-community.
Page 278
FGP-1072 (snmp)# set get-community public FGP-1072 (snmp)# set set-community private FGP-1072 (snmp)# set trap 1 192.168.1.1 162 public show Syntax: show Description: The Show here is to display the configuration of SNMP. Argument: None. Possible value: None. Example: FGP-1072 (snmp)# show...
Page 279
Description: To force the port to transmit RST BPDUs. Argument: <range>: syntax 1,5-7, available from 1 to 10 Possible value: <range>: 1 to 10 Example: FGP-1072 (stp)# Mcheck 1-8 disable Syntax: disable Description: To disable the function of STP. Argument: None.
<path cost>: 0, 1-200000000. <priority> : 0 to 240 <edge_port> : yes / no <admin p2p>: auto / true / false Example: FGP-1072 (stp)# set port 1-8 0 128 yes auto set version Syntax: set version <stp|rstp> Description: To set up the version of STP.
Example: FGP-1072 (stp)# set version rstp show config Syntax: show config Description: To display the STP configuration data. Argument: None. Possible value: None. Example: FGP-1072 (stp)# show config STP State Configuration : Spanning Tree Protocol : Enabled Bridge Priority (0-61440) : 61440 Hello Time (1-10 sec) Max.
Page 282
Syntax: show status Description: To display of the status of STP. Argument: None. Possible value: None. Example: FGP-1072 (stp)# show status STP Status : STP State : Enabled Bridge ID : 00:11:6B:D8:09:1D Bridge Priority : 61440 Designated Root : 00:11:6B:D8:09:1D...
<ip > : syslog server ip <port> : trap port Possible value: <ip > : syslog server ip <port> : trap port Example: FGP-1072(syslog)# set server 192.168.22.0 8 FGP-1072(syslog)# FGP-1072(syslog)# show syslog : Enable Syslog Host IP: 192.168.22.0 Port: 8...
Argument: <device-name>: string length up to 40 characters. Possible value: <device-name>: A, b, c, d, ... ,z and 1, 2, 3, …. etc. Example: FGP-1072 (system)# set device-name LevelOne set location Syntax: set location <location> Description: To set the location description of the switch.
Page 285
To set up the IP address of tftp server. Argument: <ip>: the IP address of tftp server Possible value: <ip>: tftp server IP Example: FGP-1072 (tftp)# set server 192.168.1.111 show Syntax: show Description: To display the information of tftp server.
Page 286
<HH> : (00-23) <mm> : (01-12) <dd> : (01-31) <hh> : (00-23) Example: FGP-1072(time)# set daylightsaving -5 10/31/00 12/31/00 FGP-1072(time)# show Current Time : Tue Apr 08 10:28:54 2008 NTP Server : 209.81.9.7 Timezone Day light Saving : -5 Hours...
To set up the current time via NTP server. Argument: <ip>: ntp server ip address or domain name <timezone>: time zone (GMT), range: -12 to +13 Possible value: <timezone>: -12,-11…,0,1…,13 Example: FGP-1072(time)# set ntp 192.168.2.22 8 Synchronizing...(1) Synchronization success show Syntax: show Description: To show the time configuration, including “Current Time”, “NTP Server”,”...
Page 288
To remove the trunk port. Argument: <port-range> : syntax 1,5-7, available from 1 to 10 Possible value: <port-range> : 1 to 10 Example: FGP-1072 (trunk)# del trunk 1 set hash Syntax: set hash <method> Description: To set up trunk hash method.
: set the LACP to passive mode Possible value: <port-range> : 1 to 10 <method>: static or lacp <group>: 1-3. <active LACP>: active or passive Example: FGP-1072 (trunk)# set trunk 2-5 lacp 1 active show aggtr-view Syntax: show aggtr-view Description: To display the aggregator list. Argument: None.
Page 290
To display the detailed information of the LACP trunk group. Argument: <aggtr> : aggregator, available from 1 to 10 Possible value: <aggtr> : 1 to 10 Example: FGP-1072 (trunk)# show lacp-detail 2 Aggregator 2 Information: Actor Partner --------------------------------- --------------------------------- System Priority...
Page 291
Syntax: show status Description: To display the aggregator status and the settings of each port. Argument: None. Possible value: None. Example: FGP-1072 (trunk)# show status Trunk Port Setting Trunk Port Status ------------------------------------- ---------------------- port Method Group Active LACP Aggtregator Status...
Page 292
Description: To delete the port-based vlan group. Argument: <name>: port-vlan name Possible value: <name>: port-vlan name Example: FGP-1072 (vlan)# del port-group vlan-2 del tag-group Syntax: del tag-group <vid> Description: To delete the tag-based vlan group. Argument: <vid>: vlan ID, available from 1 to 4094 Possible value: <vid>: 1 to 4094...
Page 293
<port_range>: which port(s) you want not to drop untagged frames. Syntax: 1,5-7, available from 1 to 10 Possible value: <port_range>: 1 to 10 Example: FGP-1072 (vlan)# disable drop-untag 2,4,5-7 disable svl Syntax: disable svl Description: To enable Independent VLAN Learning.
Page 294
Argument: <port_range>: which port(s) you want to drop untagged frames. Syntax: 1,5-7, available from 1 to 10 Possible value: <port_range>: 1 to 10 Example: FGP-1072 (vlan)# enable drop-untag 2,4,5-7 enable svl Syntax: enable svl Description: To enable Shared VLAN Learning.
<vid> : vlan id, from 1 to 4094 Possible value: <state> : 0 for disable; 1 for enable <vid > : 1 to 4094 Example: FGP-1072(vlan)# set mgt-vlan 1 33 FGP-1072(vlan)# show mgt-vlan Management Vlan: State : Enable : 33...
<pvid>: which PVID you want to set, available from 1 to 4094 <default_priority>: which priority you want to set, available from 0 to 7 Possible value: <port_range>: 1 to 10 <pvid>: 1 to 4094 <default_priority>: 0 to 7 Example: FGP-1072 (vlan)# set pvid 3,5,6-8 5 6...
Page 297
Possible value: <vid>: 1 to 4094 <member_range>: 1 to 10 <untag_range>: 0 to 10 Example: FGP-1072 (vlan)# set tag-group 2 vlan-2 2-5,6,0 show config Syntax: show config Description: To display the current vlan mode, Symmetric vlan, SVL and Double tag states.
Page 298
Untag : show pvid Syntax: show pvid Description: To display pvid, priority and drop untag result. Argument: None Possible value: None Example: FGP-1072 (vlan)# show pvid Port PVID Priority Drop Untag ------ ------ ---------- ------------ Disable Disable Disable Disable Disable...
Page 299
To enable the virtual stack. Argument: None. Possible value: None. Example: FGP-1072 (vs)# enable set gid Syntax: set gid <gid> Description: To set the group id. Argument: <gid>: group ID Possible value: a-z,A-Z,0-9 <gid>: Example: FGP-1072 (vs)# set gid group1...
Page 300
Description: To set role. Argument: <master|slave>: master: act as master, slave : act as slave Possible value: <master|slave>: master or slave Example: FGP-1072 (vs)# set role master show Syntax: show Description: To display the configuration of the virtual stack. Argument: None.
5. Maintenance 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5-2.
Need help?
Do you have a question about the FGP-1072 and is the answer not in the manual?
Questions and answers