6 ports 10/100/1000base-t managed ethernet switch; 5 ports 10/100/1000base-t and 1 port 1000base-x or
100/1000base-x uplink managed ethernet switch; 5 ports 10/100/1000base-t and 1 port 1000base-x or
100/1000base-x uplink management ethernet switch with (13 pages)
9 ports 10/100/1000base-t ethernet managed switch 8 ports 10/100/1000base-t ethernet managed switch with 1 port 1000base-x uplink or 1 port 100/1000base-x uplink 8 ports 10/100/1000base-t ethernet managed switch with 1 port 1000base-x uplink or 1 port 100 (92 pages)
Trademarks CTS is a registered trademark of Connection Technology Systems Inc.. Contents subject to revision without prior notice. All other trademarks remain the property of their owners. Copyright Statement Copyright Connection Technology Systems Inc.. This publication may not be reproduced as a whole or in part, in any way whatsoever unless prior consent has been obtained from Connection Technology Systems Inc..
1. INTRODUCTION Thank you for using the 24 dual-speed combo ports plus 2 Gigabit combo ports Managed Switch that is specifically designed for SMB (small and medium businesses), SME and for FTTx applications. The Managed Switch provides a built-in management module that enables users to configure and monitor the operational status both locally and remotely.
Figure 2-4: Model 4 Rear Panel 1.2 Management Options Switch management options available are listed below: Local Console Management Telnet Management SNMP Management WEB Management SSH Management Local Console Management Local Console Management is done through the RS-232 DB-9 Console port located on the rear panel of the Managed Switch.
1.3 Management Software The following is a list of management software options provided by this Managed Switch: Managed Switch CLI interface SNMP-based Management Software Web Browser Application Console Program The Managed Switch has a built-in Command Line Interface called the CLI which you can use to: ...
1.4 Management Preparations After you have decided how to manage your Managed Switch, you are required to connect cables properly, determine the Managed switch IP address and, in some cases, install MIB shipped with your Managed Switch. Connecting the Managed Switch It is very important that the proper cables with the correct pin arrangement are used when connecting the Managed switch to other switches, hubs, workstations, etc..
Page 12
IP Addresses IP addresses have the format n.n.n.n, (The default factory setting is 192.168.0.1). IP addresses are made up of two parts: The first part (for example 192.168.n.n) refers to network address that identifies the network where the device resides. Network addresses are assigned by three allocation organizations. Depending on your location, each allocation organization assigns a globally unique network number to each network which intends to connect to the Internet.
2. Command Line Interface (CLI) This chapter introduces you how to use Command Line Interface CLI, specifically in: Local Console Telnet Configuring the system Resetting the system The interface and options in Local Console and Telnet are the same. The major difference is the type of connection and the port that is used to manage the Managed Switch.
2.2 Remote Console Management - Telnet You can manage the Managed Switch via Telnet session. However, you must first assign a unique IP address to the Switch before doing so. Use the Local Console to login the Managed Switch and assign the IP address for the first time. Follow these steps to manage the Managed Switch through Telnet session: Step 1.
2.3.1 General Commands This section introduces you some general commands that you can use in User, Enable, and Configuration mode, including “help”, “exit”, “history” and “logout”. Entering the command… To do this… Available Modes User Mode Obtain a list of available help Privileged Mode commands in the current mode.
2.3.3 Command Format While in CLI, you will see several symbols very often. As mentioned above, you might already know what “>”, “#” and (config)# represent. However, to perform what you intend the device to do, you have to enter a string of complete command correctly. For example, if you want to assign IP address for the Managed Switch, you need to enter the following command with the required parameter and IP, subnet mask and default gateway: Switch(config)#ip address [A.B.C.D] [255.X.X.X] [A.B.C.D]...
Example 2: specifying three values (separated by commas) Switch(config)#qos 802.1p-map 1,3 0 Switch(config)#qos dscp-map 10,13,15 3 Example 3: specifying a range of values (separated by a hyphen) Switch(config)#qos 802.1p-map 1-3 0 Switch(config)#qos dscp-map 10-15 3 2.3.4 Login Username & Password Default Login When you enter Console session, a login prompt for username and password will appear to request a valid and authorized username and password combination.
2.4 User Mode In User mode, only a limited set of commands are provided. Please note that in User mode, you have no authority to configure advanced settings. You need to enter Enable mode and Configuration mode to set up advanced functions of the Switch. For a list of commands available in User mode, enter the question mark (?) or “help”...
2.5.1 Copy-cfg Command Use “copy-cfg” command to backup a configuration file via FTP or TFTP server and restore the Managed Switch back to the defaults or to the defaults but keep IP configurations. 1. Restore a configuration file via FTP or TFTP server. Command Parameter Description...
2.5.2 Firmware Command To upgrade Firmware via TFTP or FTP server. Command Parameter Description Switch# firmware [A.B.C.D] Enter the IP address of your FTP server. upgrade ftp [file name] Enter the firmware file name that you want to [A.B.C.D] upgrade. [file_name] [user_name] Enter the username for FTP server login.
2.5.6 Configure Command The only place where you can enter Global Configuration mode is in Privileged mode. You can type in “configure” or “config” for short to enter Global Configuration mode. The display prompt will change from “Switch#” to “Switch(config)#” once you successfully enter Global Configuration mode.
2.6.1 Entering Interface Numbers In the Global Configuration mode, you can configure a command that only applies to interfaces specified. For example, you can set up each interface‟s VLAN assignment, speeds, or duplex modes. To configure, you must first enter the interface number. There are four ways to enter your interface numbers to signify the combination of different interfaces that apply a command or commands.
Page 23
Company Name: Display a company name for this Managed Switch. Use “switch-info company- name [company-name]” command to edit this field. System Object ID: Display the predefined System OID. System Contact: Display contact information for this Managed Switch. Use “switch-info sys- contact [sys-contact]”...
Refer to “show default-setting copmmand”, “show running-config command” and “show start-up- config command” sections. 2.6.4 Interface Command Use “interface” command to set up configurations of several discontinuous ports or a range of ports. Command Parameter Description Switch(config)# interface [port_list] Enter several port numbers separated by [port_list] commas or a range of port numbers.
Show command Switch(config)# show interface Show each interface‟s port configuration including media type, forwarding state, speed, duplex mode, flow control and link up/down status. Switch(config)# show interface [port_list] Show the selected interface‟s port [port_list] configuration. Switch(config)# show interface Show each interface‟s port status status including media type, forwarding state, speed, duplex mode, flow control and link...
Page 26
Switch(config-acl-RULE)# [dest_mac] Define the destination MAC filtering frame-type any [dest_mac] type. “any”: Specify “any” to filter any kind of traffic. “uc”: Specify “uc” to filter unicast traffic. “mc”: Specify “mc” to filter to filter multicast traffic. “bc”: Specify “bc” to filter broadcast traffic.
Page 27
Specify “any” to apply ACL rule to both [opcode] reply and request frames; “reply” to denote reply frames; “request” to denote request frames. [source_ip] This is sender IP filtering function. Specify “any” to filter frames from any sender IP addresses. Or, specify either a host IP address (x.x.x.x).
Page 28
“any”: Specify “Any” to indicate a [length_check] match and not a match. “0”: Specify “0” to indicate that HLN (Hardware Address Length) field in the ARP/RARP frame is not equal to Ethernet (0x6) and the Protocol Address Length field is not equal to IPv4 (0x4).
Page 29
“any”: Specify “any” to apply ACL rule to any destination MAC addresses. “uc”: Specify “uc” to apply ACL rule to unicast traffic. “mc”: Specify “mc” to apply ACL rule to multicast traffic. “bc”: Specify “bc” to apply ACL rule to broadcast traffic.
Page 30
[icmp_code] This parameter is to show and filter the ICMP code defined in the code field of the ICMP header. “any”: Specify “any” to filter any codes. “0-255”: Specify “0-255” to filter different defined codes. [source_ip] This is sender IP filtering function. Specify “any”...
Page 31
[ip_option] Specify IP option bit. “any”: Specify “any” to denote the value which is either 0 or not 0. “0”: Specify “0” to indicate that the IPv4 is 5 bytes. “1”: Specify “1” to indicate that the IPv4 header is bigger than 5 bytes. Switch(config-acl-RULE)# [dest_mac] Define destination MAC address type.
Page 32
“any”: Specify “any” to denote the value which is either zero or not zero. “0”: Specify “0” to indicate that the TTL filed in IPv4 header is 0. “1”: If the value in TTL field is not 0, use “1” to indicate that. [ip_fragment] Specify IP fragment bit.
Page 33
“any”: Specify “any” to filter frames [dest_port] from any destination ports. “0-65535”: Specify a destination port between 0 and 65535. “0-65535/0-65535”: Specify a range of destination ports. For example, “1000/2000” means that port numbers from 1000 to 2000 are specified. The starting destination port number is1000;...
Page 34
[ip_fragment] Specify IP fragment bit. “any”: Specify “any” to denote the value which is either 0 or not 0. “0”: Specify “0” to indicate that the fragment filed in IPv4 header is 0. “1”: If the value in TTL field is not 0, use “1”...
Page 35
Switch(config-acl-RULE)# [dest_mac] Define destination MAC address type. frame-type udp [dest_mac] “any”: Specify “any” to apply ACL rule [source_port] [dest_port] [source_ip] [ip_mask] to any destination MAC addresses. [dest_ip] [ip_mask] [ip_ttl] “uc”: Specify “uc” to apply ACL rule to [ip_fragment] [ip_option] unicast traffic. “mc”: Specify “mc”...
Page 36
[dest_ip] This is destination IP filtering function. “any”: Specify “any” to filter frames to any target IP addresses. “x.x.x.x”: Specify either a host IP address. [ip_mask] Define destination IP mask. “any”: Specify “any” to mean any IP mask. “255.255.0.0”: Specify a specific IP mask.
Page 37
Switch(config-acl-RULE)# [any | policy1-8 | Specify one option for ingress port ingress-port [any | policy1- port 1~26] command. 8 | port] “any”: Specify “any” to mean any ports are ingress ports. “policy1-8”: Specify a policy that applies to ingress port command. To make this command work properly, you must configure “Switch(config-if-xx- xx)# acl policy [1-8]”...
Page 38
Switch(config-acl-RULE)# Reset the frame type back to the no frame-type default value. Switch(config-acl-RULE)# Reset the ingress port to the default no ingress-port setting. Switch(config-acl-RULE)# Reset tag priority value back to the no tag-priority default value. Switch(config-acl-RULE)# Reset VID filter setting back to the no vid factory default.
No command Switch(config-if-PORT-PORT)# no Permit the action on the specified acl action interfaces. Switch(config-if-PORT-PORT)# no Disable the Managed Switch to send a acl action port-copy copy of traffic from the specified interfaces to the defined port. Switch(config-if-PORT-PORT)# no Remove rate limiter rule from the acl action rate-limiter-id specified interfaces.
No command Switch(config)# no archive auto-backup Disable auto-backup function. Switch(config)# no archive auto-backup path Reset the backup protocol back to the default setting. Switch(config)# no archive auto-backup time Reset the backup time back to the default setting. Show command Switch(config)# show archive auto-backup Show or verify auto-backup settings.
Page 41
Show command Switch(config)# show channel-group Show or verify link aggregation trunking settings. Switch(config)# show channel-group [group_name] Show or verify a specific link trunking [group_name] aggregation group‟s settings including aggregated port numbers and load-balancing status. Channel-group command example Switch(config)# channel-group trunking corenetwork Create a link aggregation group called “corenetwork”.
Switch(config)# show channel- Clear all LACP statistics. group lacp statistics clear Channel-group & interface command example Enter port 1 to port 3‟s interface mode. Switch(config)# interface 1-3 Switch(config-if-1-3)# channel-group lacp Enable LACP on the selected interfaces. Set a key value “10” to the selected Switch(config-if-1-3)# channel-group lacp key 10 interfaces.
Use “Interface” command to configure a group of ports’ Loop Detection settings. Dot1x & Interface command Parameter Description Switch(config)# interface [port_list] [port_list] Enter several discontinuous port numbers separated by commas or a range of ports with a hyphen. For example:1,3 or 2-4 Switch(config-if-PORT-PORT)# Enable Loop Detection function on the loop-detection...
Page 44
No command Switch(config)# no dot1x Disable IEEE 802.1x function. Switch(config)# no dot1x reauth- Reset the re-authentication period period value back to the default setting (60 seconds). Switch(config)# no dot1x Disable re-authentication function. reauthentication Switch(config)# no dot1x secret Remove the original shared secret. Switch(config)# no dot1x server Remove the specified server IP address.
Page 45
Use “Interface” command to configure a group of ports’ IEEE 802.1x settings. Dot1x & Interface command Parameter Description Switch(config)# interface [port_list] [port_list] Enter several discontinuous port numbers separated by commas or a range of ports with a hyphen. For example:1,3 or 2-4 Specify the selected ports to “auto”...
Dot1x & interface command example Switch(config)# interface 1-3 Enter several discontinuous port numbers separated by commas or a range of ports with a hyphen. For example:1,3 or 2-4 Switch(config-if-1-3)# dot1x port-control auto Set the selected ports to “auto” state. Switch(config-if-1-3)# dot1x reauthenticate Re-authenticate the selected interfaces immediately.
Page 47
Switch(config)# no ip dhcp Remove DHCP server ports. snooping dhcp-server Switch(config)# no ip dhcp Reset the initiated value back to the default snooping initiated setting. Switch(config)# no ip dhcp Reset the leased value back to the default snooping leased setting. Switch(config)# no ip dhcp Disable DHCP Option 82 Relay Agent.
Page 48
Switch(config)# show ip dhcp snooping Show the specified ports‟ DHCP Snooping interface [port_list] trust port settings. DHCP & Interface Example Switch(config)# interface 1-3 Enter several discontinuous port numbers separated by commas or a range of ports with a hyphen. For example:1,3 or 2-4 Switch(config-if-1-3)# ip dhcp snooping Set the selected interfaces to DHCP Option option...
Page 49
Switch(config)# ip igmp [1-6000] Specify Query time interval. This is used to snooping query-interval [1-6000] set the time interval between transmitting secs IGMP queries. Switch(config)# ip igmp [1-4094] Specify a VLAN ID. This enables IGMP snooping vlan [1-4094] Snooping on a specified VLAN. Switch(config)# ip igmp [1-4094] Enable a querier on the specified VLAN.
Page 50
Switch(config)# no ip igmp [profile_name] Delete the specified profile. profile [profile_name] Show command Switch(config)# show ip igmp Show IGMP Filtering setting. filter Switch(config)# show ip igmp [port_list] Show the specified ports‟ IGMP filter interface [port_list] Filtering status. Switch(config)#show ip igmp Show IP multicast profile information.
Page 51
Switch(config-if-PORT-PORT)# ip [dhcp | fixed-ip] Specify authorized access sourceguard [dhcp | fixed-ip] information for the selected ports. dhcp: DHCP server assigns IP address. fixed IP: Only Static IP (Create Static IP table first). unlimited: Non-Limited (Allows both static IP and DHCP-assigned IP). This is the default setting.
Switch(config)# show ip igmp [profile_name] Show the specified profile‟s setting. profile [profile_name] Switch(config)# show ip igmp Show IP multicast segment segment information. Switch(config)# show ip igmp [1-400] Show the specified segment‟s segment [1-400] setting. Switch(config)# show ip igmp Show static multicast IP table. static-multicast-ip Switch(config-segment-ID)# show Show the selected segment‟s setting.
Page 53
Switch(config)# lldp [1-180] Specify the time interval for updated LLDP packets interval [1-180] to be sent. The allowable interval value is between 1 and 180 seconds. Switch(config)# lldp [1-16] Specify the amount of packets that are sent in packets [1-16] each discovery.
Switch(config)# lldp tlv-select port- Enable Port Description attribute to be sent. description Switch(config)# lldp tlv-select system- Enable System Description to be sent. description Switch(config)# lldp tlv-select system- Enable System Name to be sent. name Use “Interface” command to configure a group of ports’ LLDP settings. LLDP &...
Use “Interface” command to configure a group of ports’ MAC Table settings. MAC & Interface command Parameter Description Switch(config)# interface [port_list] Enter several discontinuous port [port_list] numbers separated by commas or a range of ports with a hyphen. For example:1,3 or 2-4 Switch(config-if-PORT- [xx:xx:xx:xx:xx:xx] Create a MAC address to VLAN entry.
Switch(config)# management [1025- When telnet is enabled, you can set up the telnet port [1025-65535] 65535] port number that allows telnet access. The default port number is set to 23. However, you can also identify a port number between 1025 and 65535. Switch(config)# management To manage the Managed Switch via Web management.
2.6.15 MVR Command Command Parameter Description Switch(config)# mvr Enable MVR function. Switch(config)# mvr vlan [1-4094] [1-4094] Specify a VID (1~4094) to create a MVR VLAN. Switch(config)# mvr group [1-4094] [1-4094] Specify a registered MVR VID (1~4094) [E.F.G.H] [E.F.G.H] and add specify the multicasting channel that would belong to MVR VLAN.
2.6.16 NTP Command Command Parameter Description Switch(config)# ntp Enable the Managed Switch to synchronize the clock with a time server. Switch(config)# ntp daylight- Enable the daylight saving function. saving Switch(config)# ntp offset [1-2] [1-2] Offset 1 hour or 2 hours for daylight saving function.
2.6.17 QoS Command 1. Set up QoS Control List (QCL). QCL command Description Parameter Switch(config)# qos qcl [1-26] [1-26] Create a QoS control list for traffic classification. Switch(config-qcl-LIST)# dscp [0- [0-63] Specify a DSCP value between 63] [low | normal | medium | high] 0 and 63.
Page 60
Switch(config)# show qos qcl Show or verify each QCL rule. Switch(config)# show qos qcl [1-26] [1-26] Show or verify the selected QCL rule. Switch(config-qcl-LIST)# show Show configurations of the selected QCL rule. QCL example Switch(config)# qos qcl 1 Create a QoS control list for traffic classification.
Page 61
Switch(config-if-PORT-PORT)# [weight] Specify egress mode as weight qos queuing-mode [weight] queuing mode. The default queuing- mode is strict. “weight”: Weighted Round-Robin shares bandwidth at the egress ports by using scheduling weights 1, 2, 4, 8 for queues 1 through 4 respectively.
2.6.18 Security Command When a device on the network is malfunctioning or application programs are not well designed or properly configured, broadcast storms may occur, network performance may be degraded or, in the worst situation, a complete halt may happen. The Managed Switch allows users to set a threshold rate for broadcast traffic on a per switch basis so as to protect network from broadcast/ multicast/ unknown unicast storms.
Page 63
Enable or disable broadcast/multicast/unknown unicast storm control. Security command Parameter Description Switch(config)# security [1-1024k] Specify the maximum broadcast packets storm-protection broadcast per second (pps). Any broadcast packets [1-1024k] exceeding the specified threshold will then be dropped. The packet rates that can be specified are listed below: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1k, 2k, 4k, 8k, 16k, 32k, 64k, 128k, 256k, 512k,...
Page 64
Switch(config)# no security Disable multicast storm control. storm-protection multicast Switch(config)# no security Disable unicast storm control. storm-protection unicast Show command Switch(config)# show Show current storm control settings. security storm-protection Switch(config)# show Show each interface‟s storm protection security storm-protection settings. interface Switch(config)# show [port_list] Show the selected interfaces‟...
2.6.19 Spanning-tree Command The Spanning Tree Protocol (STP), defined in the IEEE Standard 802.1D, creates a spanning tree within a mesh network of connected layer-2 bridges (typically Ethernet switches) and disables the links which are not part of that tree, leaving a single active path between any two network nodes. Multiple active paths between network nodes cause a bridge loop.
Page 66
Switch(config)# spanning- [6-200] Specify the Maximum Age value in tree max-age [6-200] seconds. The allowable value is between 6 and 200. Switch(config)# spanning- [0-61440] Specify a priority value on a per switch tree priority [0-61440] basis. The allowable value is between 0 and 61440.
Page 67
Switch(config)# show [port_list | llag] Show the selected interfaces or link spanning-tree statistics aggregation groups‟ statistics information [port_list | llag] including the total RSTP packets received, RSTP packets transmitted, STP packets received, STP packets transmitted, TCN (Topology Change Notification) packets received, TCN packets transmited, illegal packets received, and unknown packets received.
Page 68
Switch(config-if-PORT-PORT)# [forced_fasle Set the aggregated ports to non- spanning-tree p2p [forced_fasle | | auto] point to point ports (forced_false) or auto] allow the Managed Switch to detect point to point status automatically (auto). By default, aggregated ports are set to point to point ports (forced_true).
Switch(config)# show spanning- [port_list | Show the selected interfaces or link tree status [port_list | llag] llag] aggregation groups‟ statistics information Switch(config)# show spanning- Show the current STP state. tree overview Spanning-tree & interface command example Description Switch(config)# interface 1-3 Enter several discontinuous port numbers separated by commas or a range of ports with a hyphen.
No command Switch(config)# no switch sfp temperature Set the SFP temperature back to the default setting. Switch(config)# no switch sfp tx-bias Set the SFP TX bias power back to the default setting. Switch(config)# no switch sfp tx-power Set the SFP TX power value back to the default setting.
Page 71
Switch(config-community- [Description] Enter the description for this SNMP NAME)# description community of up to 35 alphanumerical [Description] characters. Switch(config-community- [admin | rw | Specify the access privilege for this SNMP NAME)# level [admin | rw | account. admin: Full access right, including maintaining user account, system information, loading factory settings, etc..
Page 72
2. Set up a SNMP trap destination. Trap-destination command Parameter Description Switch(config)# snmp-server [1-10] Create a trap destination account. trap-destination [1-10] Switch(config-trap- Enable this SNMP trap destination ACCOUNT)# active account. Switch(config-trap- [community] Enter the community name of network ACCOUNT)# community management system.
Page 73
3. Set up SNMP trap types that will be sent. Trap-type command Parameter Description Switch(config)# snmp- [all |anti- Specify a trap type that will be sent when a server trap-type [all |anti- bcast |auth- certain situation occurs. bcast |auth-fail | case-fan | fail | case-fan cold-start | port-link | | cold-start |...
No command Switch(config)# no snmp- [all |anti- Specify a trap type that will not be sent server trap-type [all |anti- bcast |auth- when a certain situation occurs. bcast |auth-fail | case-fan | fail | case-fan cold-start | port-link | | cold-start | power-down | sfp | storm | port-link | upper-limit [0-148810] pps...
No command Switch(config)# no switch-info company-name Delete the entered company name information. Switch(config)# no switch-info system-contact Delete the entered system contact information. Switch(config)# no switch-info system-location Delete the entered system location information. Switch(config)# no switch-info system-name Delete the entered system name information.
Page 76
Switch(config-user- [admin | rw | Specify this user‟s access level. NAME)# level [admin | rw | admin (administrator): Full access right, including maintaining user account & system information, loading factory settings, etc.. rw (read & write): Partial access right, unable to modify user account & system information and load factory settings.
Page 77
2. Configure RADIUS server settings. User command Parameter Description Switch(config)# user radius Enable RADIUS authentication. Switch(config)# user radius [1025- Specify RADIUS server port number. radius-port [1025-65535] 65535] Switch(config)# user radius [0-2] Specify the retry value. This is the number of retry-time [0-2] times that the Managed Switch will try to reconnect if the RADIUS server is not...
2.6.24 Syslog Command Syslog command Parameter Description Switch(config)# syslog Enable system log function. Switch(config)# syslog [A.B.C.D] Specify the primary system log server IP server1 [A.B.C.D] address. Switch(config)# syslog [A.B.C.D] Specify the secondary system log server IP server2 [A.B.C.D] address. Switch(config)# syslog [A.B.C.D] Specify the third system log server IP server3 [A.B.C.D]...
Page 79
[trunk | Specify whether the management access] port is in trunk or access mode. “trunk” mode: Set the selected ports to tagged. “access” mode: Set the selected ports to untagged. Switch(config)# vlan port-based [name] Specify a name for this port-based [name] VLAN.
Page 80
Switch(config-if-PORT-PORT)# Set the selected ports that belong to vlan dot1q-vlan mode access the specified VLAN to access mode (untagged). Switch(config-if-PORT-PORT)# Enable Q-in-Q function in the selected vlan dot1q-vlan mode dot1q- interfaces. tunnel Switch(config-if-PORT-PORT)# Set the selected ports to trunk mode vlan dot1q-vlan mode trunk (tagged).
2.6.26 Show interface statistics Command The command “show interface statistics” that can display port traffic statistics, port packet error statistics and port analysis history can be used either in Privileged mode # and Global Configuration mode (config)#. “show interface statistics” is useful for network administrators to diagnose and analyze port traffic real-time conditions.
2.6.28 Show default-setting, running-config & start-up-config Command Command Description Show the original configurations Switch(config)# show default-setting assigned to the Manged Switch by the factory. Switch(config)# show running-config Show configurations currently used in the Manged Switch. Please note that you must save running configurations into your switch flash before rebooting or restarting the device.
3. SNMP NETWORK MANAGEMENT The Simple Network Management Protocol (SNMP) is an application-layer protocol that facilitates the exchange of management information between network devices. It is part of the TCP/IP protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
4. WEB MANAGEMENT You can manage the Managed Switch via a Web browser. However, you must first assign a unique IP address to the Managed Switch before doing so. Use the RS-232 DB-9 console port or use a RJ45 LAN cable and any of the 10/100/1000Base-T RJ-45 ports of the Managed Switch (as the temporary RJ-45 Management console port) to login to the Managed Switch and set up the IP address for the first time.
Page 85
1. System Information: Name the Managed Switch, specify the location and check the current version of information. 2. User Authentication: View the registered user list. Add a new user or remove an existing user. 3. Network Management: Set up or view the IP address and related information of the Managed Switch required for network management applications.
4.1 System Information Select System Information from the Main Menu and then the following screen shows up. Company Name: Enter a company name up to 55 alphanumeric characters for this Managed Switch. System Object ID: View-only field that shows the predefined System OID. System Contact: Enter contact information up to 55 alphanumeric characters for this Managed switch.
4.2 User Authentication To prevent any unauthorized operations, only registered users are allowed to operate the Managed Switch. Users who want to operate the Managed Switch need to register into the user list first. To view or change current registered users, select User Authentication from the Main Menu and then the following screen page shows up.
Password: Enter the desired user password, up to 20 alphanumeric characters. Retype Password: Enter the password again for double-checking. Description: Enter a unique description up to 35 alphanumeric characters for the user. This is mainly for reference only. IP Security: Enable or disable the IP security function. If enabled, the user can access the Managed Switch only through the management station which has exact IP address specified in IP address field below.
Secret Key: The word to encrypt data of being sent to RADIUS server. RADIUS Port: The RADIUS service port on RADIUS server. Retry Time: Times of trying to reconnect if the RADISU server is not reachable. RADIUS Server Address: IP address of the first RADIUS server. 2nd RADIUS Server Address: IP address of the second RADIUS server.
4.3.1 Network Configuration Click the option Network Configuration from the Network Management menu and then the following screen page appears. MAC Address: This view-only field shows the unique and permanent MAC address assigned to the Managed switch. You cannot change the Managed Switch‟s MAC address. Configuration Type: There are two configuration types that users can select from the pull-down menu, "DHCP"...
4.3.2 System Service Configuration Click the option System Service Configuration from the Network Management menu and then the following screen page appears. Telnet Service: To enable or disable the Telnet Management service. SSH Service: To enable or disable the SSH Management service. To enable SSH Service, Telnet Service must be disabled.
Telnet Port: Specify the desired TCP port number for the Telnet console. The default TCP port number of the Telnet is 23. System Time Out: Specify the desired time that the Managed Switch will wait before disconnecting an inactive console/telnet. Specifying “0” means an inactive connection will never be disconnected.
4.3.5 Device Community Click the option Device Community from the Network Management menu and then the following screen page appears. Up to 10 Device Communities can be set up. Click New to add a new community and then the following screen page appears. Click Edit to view the current community settings.
IP Security: Click the pull-down menu to enable or disable the IP security function. If enabled, Community may access the Managed Switch only through the management station, which has the exact IP address specified in IP address field below. If disabled, Community can access the Managed Switch through any management stations.
4.3.7 Trap Configuration Click the option Trap Configuration from the Network Management menu and then the following screen page appears. Cold Start Trap: Enable or disable the Managed Switch to send a trap when the Managed Switch is turned on. Warm Start Trap: Enable or disable the Managed Switch to send a trap when the Managed Switch restarts.
4.3.8 Mal-attempt Log Configuration Click the option Trap Configuration from the Network Management menu and then the following screen page appears. When DHCP snooping filters unauthorized DHCP packets on the network, the Mal-attempt log will allow the Managed Switch to send event notification message to Log server. Log Server: Enable or disable Mal-attempt log function.
Page 97
2. Port Configuration: Enable or disable port speed, flow control, etc. 3. Link Aggregation: Set up port trunk and LACP port configuration. 4. Rapid Spanning Tree: Set up RSTP switch settings, aggregated port settings, physical port settings, etc. 5. 802.1X Configuration: Set up the 802.1X system, port Admin state, port reauthenticate. 6.
4.4.1 Switch Configuration Click the option Switch Configuration from the Switch Management menu and then the following screen page appears. Maximum Frame Size: Specify the maximum frame size between 1518 and 9600 bytes. The default maximum frame size is 9600bytes. MAC Address Aging Time: Specify MAC Address aging time between 0 and 4080 seconds.
Duplex: When you select Manual port type, you can further specify the current operation Duplex mode (full or half duplex) of the port(s). Flow Control: Enable or disable the flow control. Description: Enter the brief descrition for this specific port. 4.4.3 Link Aggregation Link aggregation is an inexpensive way to set up a high-speed backbone network that transfers much more data than any one single port or device can deliver without replacing everything and...
4.4.3.1 Trunk Mode Configuration Click the option Trunk Mode Configuration from the Link Aggregation menu, the following screen page appears. There are two fields for you to set up packets according to operations. Source MAC Address: Enable or disable packets according to source MAC address. Destination MAC Address: Enable or disable packets according to Destination MAC address.
- Must have 2 to 16 ports in each trunking group. - Each port can only be grouped in one group. - If the port is already set On in LACP Port Configuration, it can‟t be grouped anymore. Click OK and return back to Link Aggregation menu. NOTE: All trunking ports in the group must be members of the same VLAN and their Spanning Tree Protocol (STP) status and QoS default priority configurations must be identical.
Page 103
Configure Key Value: Select “Key Value” from the pull-down menu of Select Setting. Ports in an aggregated link group must have the same LACP port Key. In order to allow a port to join an aggregated group, the port Key must be set to the same value. The range of key value is between 0 and 255.
4.4.4 Rapid Spanning Tree The Spanning Tree Protocol (STP), defined in the IEEE Standard 802.1D, creates a spanning tree within a mesh network of connected layer-2 bridges (typically Ethernet switches) and disables the links which are not part of that tree, leaving a single active path between any two network nodes. Multiple active paths between network nodes cause a bridge loop.
4.4.4.1 RSTP Switch Settings Click the option RSTP Switch Settings from the Rapid Spanning Tree menu and then the following screen page appears. System Priority: Each interface is associated with a port (number) in the STP code. And, each switch has a relative priority and cost that is used to decide what the shortest path is to forward a packet.
4.4.4.2 RSTP Aggregated Port Settings Click the option RSTP Aggregated Port Settings from the Rapid Spanning Tree menu and then the following screen page appears. State: Enable or disable configured trunking groups in RSTP mode. Cost: This parameter is used by the RSTP to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
4.4.4.3 RSTP Physical Port Settings Click the option RSTP Physical Port Settings from the Rapid Spanning Tree menu and then the following screen page appears. Configure Port State: Select “State” from the pull-down menu of Select Setting. This allows ports to be enabled or disabled. When it is On, RSTP is enabled. Configure Port Path Cost: Select “Path Cost”...
Page 108
Configure Port Priority: Select “Priority” from the pull-down menu of Select Setting. You can choose Port Priority value between 0 and 240. The default value is “0”. Configure Port Edge: Select “Edge” from the pull-down menu of Select Setting. Set the port to “enabled” or “disabled”. When it is On, Port Edge is enabled.
Configure Port Point2point: Select “Point2point” from the pull-down menu of Select Setting. Set up the Point to Point setting. The default setting is “Forced True”. 4.4.5 802.1X Configuration The IEEE 802.1X standard provides a port-based network access control and authentication protocol that prevents unauthorized devices from connecting to a LAN through accessible switch ports.
4.4.5.1 Configure System Click the option Configure System from the 802.1X Configuration folder and then the following screen page appears. Mode: Enable or disable 802.1X on the Managed Switch. When enabled, the Managed Switch acts as a proxy between the 802.1X-enabled client and the authentication server. In other words, the Managed Switch requests identifying information from the client, verifies that information with the authentication server, and relays the response to the client.
Unauthorized: This forces the Managed Switch to deny access to all clients, either 802.1X-aware or 802.1X-unaware. Auto: This requires 802.1X-aware clients to be authorized by the authentication server. Accesses from clients that are not dot1x‑ aware will be denied. 4.4.5.3 Configure Port Reauthenticate Click the option Configure Port Reauthenticate from the 802.1X Configuration menu and then the following screen page appears.
4.4.6.1 MAC Table Learning Click the option MAC Table Learning from the MAC Address Table menu and then the following screen page appears. Auto: Enable port MAC address learning. Disabled: Disable port MAC address learning. 4.4.6.2 Static MAC Table Configuration Click the option Static MAC Table Configuration from the MAC Address Table menu and then the following screen page appears.
Current/Total/Max: The number of current, total and maximum MAC address entry or entries. MAC Address: Specify a destination MAC address in the packet with the 00:00:00:00:00:00 format. VID: Specify the VLAN where the packets with the Destination MAC address can be forwarded. Forwarding Port: If the incoming packet has the same destination MAC address as the one specified in VID, it will be forwarded to the selected port directly.
Since source addresses of the packets are listed in MAC address table of specific VLAN (except broadcast/multicast packets), in every VLAN the traffic between two ports will be two-way without restrictions. Click New to add a new VLAN entity and then the following screen page appears. Use Edit to view and edit the current VLAN setting.
Page 115
Introduction to 802.1Q frame format: Preamble Type/LEN PAYLOAD Original frame 802.1q Preamble Type/LEN PAYLOAD FCS TCI/P/C/VID frame PRE Preamble 62 bits Used to synchronize traffic SFD Start Frame Delimiter 2 bits Marks the beginning of the header Destination Address 6 bytes The MAC address of the destination Source Address 6 bytes...
Page 116
Important VLAN Definitions: Ingress The point at which a frame is received on a switch and the switching decisions must be made. The switch examines the VID (if present) in the received frames header and decides whether or not and where to forward the frame. If the received frame is untagged, the switch will tag the frame with the PVID for the port on which it was received.
4.4.7.3 Introduction to Q-in-Q The IEEE 802.1Q double tagging VLAN is also referred to Q-in-Q or VLAN stacking (IEEE 802.1ad). Its purpose is to expand the 802.1q VLAN space by tagging the inner tagged packets. In this way, a “double-tagged” frame is created so as to separate customer traffic within a service provider network.
4.4.7.4 802.1Q VLAN The following screen page appears when you choose IEEE 802.1q Tag VLAN. 1. Configure VLAN: To create, edit or delete 802.1Q Tag VLAN settings. 2. VLAN Interface: To set up VLAN mode on the selected port. 3. Management VLAN: To set up management VLAN and management ports. 4.4.7.4.1 Configure VLAN The following screen page appears if you choose Configure VLAN.
VLAN ID: Specify a VLAN ID between 1 and 4094. VLAN Members: If you select “V” from the pull-down menu, it denotes that the ports selected belong to the specified VLAN. 4.4.7.4.2 VLAN Interface The following screen page appears if you choose VLAN Interface. Mode: Select the appropriate mode for each port.
4.4.7.4.3 Management VLAN The following screen page appears if you choose Management VLAN. CPU VLAN ID: Specify an existing VLAN ID. Mode: Select the VLAN mode for this Management VLAN. Management Port: Tick the checkbox on the ports that you would like them to become Management ports.
4.4.8.1 QoS Port Configuration Select the option QoS Port configuration from the QoS Configuration menu and then the following screen page appears. Configure Default Class: Click the pull-down menu to choose the class level “Low”, “Normal”, “Medium” or “High”. The default class level of each port is “Low”.
Page 122
Configure User Priority: There are eight priority levels that you can choose to classify data packets. Choose one of the listed options from the pull-down menu for CoS (Class of Service) priority tag values. The default value is “0”. The default 802.1p settings are shown in the following table: Priority Level normal normal...
Configure Queuing Weighted: Click the pull-down menu to select values of Queue weighted for each port. 4.4.8.2 QoS Control List The following screen page appears if you choose QoS Priority Configuration and then select QoS Control List. QCL: Select a QCL number (1~26). QCE Type: View-only filed that shows QCL‟s current QCE type.
Page 124
Current/Total/Max List: View-only field. Current: This shows the number of current registered QCL setting(s). Total: This shows the number of total registered QCL setting(s). Max List: The shows the number of maximum QCL settings that are available for registration. The default number is 12. QCE Type: Click the pull-down menu to select the desired privilege for the QCE type operation.
4.4.8.3 QoS Rate Limiter Select the option QoS Rate Limiter from the QoS Priority Configuration menu and then the following screen page appears. Configure Policer Rate: This allows users to specify each port‟s inbound bandwidth. The excess traffic will be dropped. Specifying “0”...
4.4.9 DSCP Remark To set up DSCP Remark, select the option DSCP Remark from the Switch Management menu and then the following screen page appears. Configure DSCP Remark: Select “DSCP Remark” from the pull-down menu of Select Setting. This allows you to enable or disable DSCP remarking for each port. The default setting is disabled. Configure 802.1p Remark: Select 802.1p Remark from the pull-down menu of Select Setting.
DSCP mapping to Queue: Assign a value (0~63) to four different levels. 802.1p mapping to Queue: Assign a value (0~7) to four different levels. 4.4.10 Port Mirroring In order to allow Target Port to mirror Source Port and enable traffic monitoring, select the option Port Mirroring from the Switch Management menu and then the following screen page appears.
4.4.11 IGMP Snooping The Internet Group Management Protocol (IGMP) is a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships. It can be used more efficiently when supporting activities, such as online streaming video and gaming.
4.4.11.1 IGMP Configuration Select the option IGMP Configuration from the IGMP Snooping menu and then the following screen page appears. Snooping: When enabled, the Managed Switch will monitor network traffic and determine which hosts to receive multicast traffic. Unregistered IPMC Flooding: Set forwarding mode for unregistered (not-joined) IP multicast traffic.
Snooping: When enabled, the port in VLAN will monitor network traffic and determine which hosts to receive the multicast traffic. Querying: When enabled, the port in VLAN can serve as the Querier which is responsible for asking hosts whether they want to receive multicast traffic. 4.4.11.3 IPMC Segment Select the option IPMC Segment from the IGMP Snooping menu and then the following screen page with the ability information of IPMC Segment ID, Name and IP Range appears.
Current/Total/Max Segment Nums: View-only field. Current: This shows the number of current registered IPMC Segment. Total: This shows the total number of registered IPMC Segment. Max: This shows the maximum number available for IPMC Segment. The maximum number is 400. Segment ID: Specify a number from 1~400 for a new ID.
Total: This shows the number of total IPMC Profiles that are registered. Max: This shows the maximum number available for IPMC Profile. The maximum number is 60. Profile Name: Enter an identification name. This field is limited to 20 characters. Segment ID: Specify the segment ID that is registered in IPMC Segment.
Channel Limit: Specify the maximum transport multicast stream. Enable: To enable each port‟s IGMP filtering function. The default setting is “Off” which is disabled. Port: View-only field that shows the port number that is currently configured. IPMC Profile: In IGMP filtering, it only allows information specified in IPMC Profile fields to pass through.
default maximum number is 128. IP Address: Specify the multicast stream source IP address. VLAN: Specify a VLAN ID for multicast stream. Forwarding port: Select a port number for multicast stream forwarding. 4.4.13 MVR MVR stands for Multicast VLAN Registration that enables a media server to transmit multicast stream in a single multicast VLAN when clients receiving multicast VLAN stream can reside in different VLANs.
Click the folder MVR Configuration from the Switch Management menu and then the following screen page appears. 1. MVR Port Settings: To enable or disable MRV global settings and create MVR VLAN to indicate the Source and Receive port. 2. MVR Group: Create MVR Groups whose multicasting stream would belong to MVR VLAN. 4.4.13.1 MVR Settings Select the option MVR Settings from the MVR Configuration menu and then the following screen page appears.
Current: This shows the number of current registered MVR VLAN configuration. Total: This shows the total number of registered MVR VLAN configuration. Max: This shows the maximum number available for MVR VLAN configuration. VLAN: Specify a VLAN ID for multicast VLAN. Receive port: Indicate the MVR receive port.
VLAN ID: Specify a VLAN ID number that is registered in MVR port settings. Group Range: Specify the multicasting channels that would belong to MVR VLAN. 4.4.14 Security Configuration In this section, several Layer 2 security mechanisms are provided to increase the security level of your Managed Switch.
4.4.14.1 DHCP Option 82 Settings The Managed Switch can add information about the source of client DHCP requests that relay to DHCP server by adding Relay Agent Information. This helps provide authentication about the source of the requests. The DHCP server can then provide an IP address based on this information.
Page 139
Configure Trust Port Setting: Trust Port: Select “V” if you would like ports to become trust ports. The trusted ports will not discard DHCP messages. For example: A DHCP request is from Port 1 that is marked as both Opt82 port and trust port. A.
4.4.14.2 DHCP Port Settings Select the option DHCP Port Settings from the Security Configuration menu and then the following screen page appears. Source Guard: To specify authorized access information for each port. There are three options available. Unlimited: Non-Limited (Static IP or DHCP-assigned IP). DHCP: DHCP-assigned IP address only.
IPv6 Filter: Enable or disable IPv6 filter. When enabled, IPv6 packets will be dropped. UPnP Filter: Enable or disable UPnP filter. When enabled, UPnP packets will be dropped. 4.4.14.4 Static IP Table Configuration Select the option Static IP Table Configuration from the Security Configuration menu and then the following screen page appears.
VLAN ID: Specify the VLAN ID. (0 means without VLAN ID) Port: Specify the communication port number. (Port 1~24) 4.4.14.5 Configure DHCP Snooping When you want to use DHCP Snooping function, follow the steps described below to enable a client to receive an IP from DHCP server. Step 1.
4.4.14.6 Storm Control Select the option Storm Control from the Security Configuration menu to set up storm control parameters for ports and then the following screen page appears. When a device on the network is malfunctioning or application programs are not well designed or properly configured, broadcast storms may occur, which eventually degrades network performance and even worse cause a complete halt.
Polling Interval: Specify a time interval for the frequency of the Managed Switch checking or refreshing broadcast traffic. Port Enable: Enable or disable anti-broadcast function in each port. Port Threshold (pps): Enter the threshold value for each port. When the port exceeds the threshold value in the time specified, the port will be temporarily blocked until the value is refreshed in the next polling interval.
Page 145
each Rate Limiter‟s rate. Port Copy: Send a copy of packets to the desired port. Shutdown: If enabled, the Managed Switch will shutdown the interface. Counter: View-only filed that shows how many packets conform to MAC and VLAN parameters. OK: Click OK to save the port configurations. Reflash: Click Reflash to show the number of packets that conform to the default ACL rule.
Page 146
ACL Configuration: Click New to add a new ACL configuration, then the screen page is shown below. Click Delete to remove an existing ACL configuration. Click Edit to view and edit an existing ACL configuration. Current/Max ACL: View-only field. Current: This shows the number of the current ACL rule. Max ACL: This shows the maximum number available for registering ACL rule.
Page 147
Rate Limiter: Disable or enable rate limiter. Port Copy: Send a copy of packets to the selected port. Shutdown: If enabled, the Managed Switch will shutdown the interface. Any Frame Type: MAC Parameters DMAC Filter: Select an option from the pull-down menu for destination MAC filtering. Select “Any”...
Page 148
Ethernet Frame Type: MAC Parameters SMAC Filter: Select “Any” or “Specific” for source MAC filtering. If “Specific” is selected, you need to further specify a source MAC address. SMAC Value: Specify a source MAC address. DMAC Filter: Select “Any”, “UC”, “MC”, “BC” or “Specific” for destination MAC filtering. If “Specific”...
Page 149
ARP Frame Type: MAC Parameters SMAC Filter: Select “Any” or “Specific” for source MAC filtering. If “Specific” is selected, you need to further specify a source MAC address. SMAC Value: Specify a source MAC address. DMAC Filter: Select “Any”, “UC”, “MC” or “BC” for destination MAC filtering. Select “Any” to filter any kind of traffic.
Page 150
Sender IP Filter: Select “Any”, “Host”, or “Network” for sender IP filter. If “Host” is selected, you need to indicate a specific host IP address. If “Network” is selected, you need to indicate both network address and subnet mask. Sender IP Address: Specify a sender IP address. Sender IP Mask: Specify a subnet mask.
Page 151
IPv4 Frame Type: MAC Parameters DMAC Filter: Select “Any”, “UC”, “MC” or “BC” for destination MAC filtering. Select “Any” to filter any kind of traffic. Select “UC” to filter unicast traffic. Select “MC” to filter multicast traffic. Select “BC” to filter broadcast traffic. VLAN Parameters VLAN ID Filter: Select “Any”...
Page 152
need to indicate a specific host IP address. If “Network” is selected, you need to indicate both network address and subnet mask. SIP Address: Specify a source IP address. SIP Mask: Specify a source subnet mask. DIP Filter: Select “Any”, “Host”, or “Network” for destination IP filtering. If “Host” is selected, you need to indicate a specific host IP address.
Page 153
Source Port NO.: Specify a source port number (0~65535). Source Port Range: Specify a source port range (The source port number is from 0 to 65535). Destination Port Filter: Select “Any” to filter frames to any destination port. If “Specific” is selected, you need to further specify a destination port number.
4.4.16 LLDP Configuration LLDP stands for Link Layer Discovery Protocol and runs over data link layer which is used for network devices to send information about themselves to other directly connected devices on the network. By using LLDP, two devices running different network layer protocols can learn information about each other.
4.4.17 Loop Detection Configuration To set up Loop Detection function, select the option Loop Detection Configuration from the Switch Management menu and then the following screen page appears. Loop Detection: Enable or disable Loop Detection function. Detection Interval: Specify the time interval of performing Loop Detection. The maximum time interval is 180 seconds.
4.5 Switch Monitor Switch Monitor allows users to monitor the real-time operation status of the Managed Switch. Users may monitor the port link-up status or traffic counters for maintenance or diagnostic purposes. Select the folder Switch Monitor from the Main Menu and then the following screen page appears.
4.5.1 Switch Port State In order to view the real-time port status of the Managed Switch, select Switch Port State from the Switch Monitor menu and then the following screen page appears. Port Number: The number of the port. Media Type: The media type of the port, either TX or Fiber. Port State: This shows each port‟s state which can be D (Disabled), B/L (Blocking/Listening), L (Learning) or F (Forwarding).
4.5.2 Port Traffic Statistics In order to view the real-time port traffic statistics of the Managed Switch, select Port Traffic Statistics from the Switch Monitor menu and then the following screen page appears. Select: Choose the Traffic Statistics from the pull-down menu. Bytes Received: Total bytes received from each port.
4.5.3 Port Packet Error Port Packet Error Statistics mode counters allow users to view the port error of the Managed Switch. The event mode counter is calculated since the last time that counter was reset or cleared. Select Port Packet Error Statistics from the Switch Monitor menu and then the following screen page appears.
4.5.4 Port Packet Analysis Statistics Port Packet Analysis Statistics Mode Counters allow users to view the port analysis history of the Managed Switch. Event mode counters are calculated since the last time that counter was reset or cleared. Select Port Packet Analysis Statistics from the Switch Monitor menu and then the following screen page appears.
4.5.5 LACP Monitor Click the LACP Monitor folder and then the two options will appears. 4.5.5.1 LACP Port Status LACP Port Status allows users to view a list of all LACP ports‟ information. Select LACP Port Status from the LACP monitor menu and then the following screen page appears. In this page, you can find the following information about LACP port status: Port Number: The number of the port.
4.5.5.2 LACP Statistics In order to view the real-time LACP statistics status of the Managed Switch, select LACP Statistics from the LACP Monitor menu and then the following screen page appears. Port: LACP packets (LACPDU) transmitted or received from current port. LACP Transmitted: Packets transmitted from current port.
4.5.6.1 RSTP VLAN Bridge Overview RSTP VLAN Bridge Overview allows users to view a list of all RSTP VLANs‟ brief information, such as VLAN ID, Bridge ID, topology status and Root ID and to obtain detailed VLAN information after selecting. Select RSTP VLAN Bridge Overview from the RSTP Monitor menu and then the following screen page appears.
4.5.6.2 RSTP Port Status RSTP Port Status allows users to view a list of all RSTP ports‟ information. Select RSTP Port Status from the RSTP Monitor menu and then the following screen page appears. In this page, you can find the following information about RSTP status: Port Number: The number of the port.
4.5.6.3 RSTP Statistics In order to view the real-time RSTP statistics status of the Managed Switch, select RSTP Statistics from the RSTP Monitor menu and then the following screen page appears. RSTP Transmitted: The total transmitted RSTP packets from current port. STP Transmitted: The total transmitted STP packets from current port.
4.5.7 802.1X Monitor Click the 802.1X Monitor folder and then two options appear. 4.5.7.1 802.1X Port Status 802.1X Port Status allows users to view a list of all 802.1x ports‟ information. Select 802.1X port status from the 802.1x Monitor menu and then the following screen page appears. In this page, you can find the following information about 802.1X ports: Port: The number of the port.
4.5.7.2 802.1X Statistics In order to view the real-time 802.1X port statistics status of the Managed Switch, select 802.1x Statistics from the 802.1x Monitor menu and then the following screen page shows up. Select the port number from the pull-down menu to view statistics. 4.5.8 IGMP Monitor Click the IGMP Monitor folder and then the following screen page appears.
4.5.8.1 IGMP Snooping Status IGMP Snooping Status allows users to view a list of IGMP queries‟ information in VLAN(s) such as VLAN ID, Querier and Queries Transmitted/Received packets. Select IGMP Snooping Status from the IGMP Monitor menu and then the following screen page appears. Update: Click “Update”...
4.5.8.2 IGMP Group Table In order to view the real-time IGMP multicast group status of the Managed Switch, select IGMP Group Table from the IGMP monitor menu and then the following screen page appears. Update: Click “Update” to update the table. VLAN ID: VID of the specific VLAN Group: The multicast IP address of IGMP querier.
4.5.10 SFP Information Click the SFP Information folder and then the following screen page appears. 4.5.10.1 SFP Port Info SFP Port Info displays each port‟s slide-in SFP Transceiver information e.g. Speed, Length, Vendor Name, Vendor PN, Vendor SN, and detection Temperature, Voltage , TX Bias, etc.. Select SFP Port Info from the SFP Information menu and then the following screen page appears.
4.5.10.2 SFP Port State Select SFP Port Status from the SFP Information menu and then the following screen page appears. Port Number: The number of the SFP module slide-in port. Temperature (C): The Slide-in SFP module operation temperature. Voltage (V): The Slide-in SFP module operation voltage. TX Bias (mA): The Slide-in SFP module operation current.
4.5.11 DCHP Snooping DHCP Snooping displays the Managed Switch‟s DHCP Snooping table. Select DHCP Snooping from the Switch Monitor menu and then the following screen page appears. Update: Click “Update” to update the DHCP snooping table. Cli Port: View-only field that shows where the DHCP client binding port is. VID: View-only field that shows the VLAN ID of the client port.
Chassis ID: View-only field that shows the MAC address of the LLDP frames received (the MAC address of the neighboring device). Remote Port: View-only field that shows the port number of the neighboring device. System Name: View-only field that shows the system name advertised by the neighboring device. Port Description: View-only field that shows the port description of the remote port.
4.6 System Utility System Utility allows users to easily operate and maintain the system. Select the folder System Utility from the main menu and then the following screen page appears. 1. Event Log: Event log can keep a record of system‟s log events such as system warm start, cold start, link up/down, user login/logout, etc.
4.6.1 Event Log Event log keep a record of user login and logout timestamp information. Select Event Log from the System Utility menu and then the following screen page appears. Click Clear to clear all Event log records. 4.6.2 Update The Managed Switch has both built-in TFTP and FTP clients.
Click OK to start the download process and receive files from the server. A transmitting progress will be displayed during file transfer. Once completed, a process-completed message will pop up to remind the user. Click Put to start the upload process and transmit files to the server. A transmitting progress will be displayed during file transfer.
Select Load Factory Setting Except Network Configuration from the System Utility menu, the following screen page shows up. Click OK to start loading factory settings except network configuration. 4.6.5 Backup Configuration Select Backup Configuration from the System Utility menu and then the following screen page appears.
4.7 Save Configuration In order to save configuration setting permanently, users need to save configuration first before resetting the Managed Switch. Select Save Configuration from the Console main menu and then the following screen page appears. Click OK to save the configuration. 4.8 Reset System After any configuration change, Reset System can make it effective.
APPENDIX A: Free RADIUS readme The advanced RADIUS Server Set up for RADIUS Authentication is described as below. When free RADIUS client is enabled on the device, On the server side, it needs to put this file "dictionary.sample" under the directory /raddb, and modify these three files - "users", "clients.conf"...
APPENDIX B: Set Up DHCP Auto-Provisioning Networking devices, such as switches or gateways, with DHCP Auto-provisioning function allow you to automatically upgrade firmware and configuration at startup process. Before setting up DHCP Server for auto-upgrade of firmware and configuration, please make sure the Managed Switch that you purchased can support DHCP Auto-provisioning.
Page 181
Step 2. Set up Auto Provision Server Update DHCP Client Linux Fedora 12 supports “yum” function by default. First of all, update DHCP client function by issuing “yum install dhclient” command. Install DHCP Server Issue “yum install dhcp” command to install DHCP server.
Page 182
Copy dhcpd.conf to /etc/dhcp/ directory Copy dhcpd.conf file provided by the vendor to /etc/dhcp/ directory. Please note that each vendor has their own way to define auto provisioning. Make sure to use the file provided by the vendor. Enable and run DHCP service 1.
Page 183
Step 3. Modify dhcpd.conf file Open dhcpd.conf file in /etc/dhcp/ directory Double-click dhcpd.conf placed in /etc/dhcp/ directory to open it.
Page 184
Modify dhcpd.conf file The following marked areas in dhcpd.conf file can be modified with values that work with your networking environment. 1. Define DHCP default and maximum lease time in seconds. Default lease time: If a client does not request a specific IP lease time, the server will assign a default lease time value.
Page 185
5. This value is configurable and can be defined by users. 6. Specify the protocol used (Protocol 1: FTP; Protocol 0: TFTP). 7. Specify the FTP or TFTP IP address. 8. Login TFTP server anonymously (TFTP does not require a login name and password). 9.
Page 187
Every time when you modify dhcpd.conf file, DHCP service must be restarted. Issue “killall dhcpd” command to disable DHCP service and then issue “dhcpd” command to enable DHCP service. Step 4. Backup a Configuration File Before preparing a configuration file in TFTP/FTP Server, make sure the device generating the configuration file is set to “Get IP address from DHCP”...
Page 188
B. Auto-Provisioning Process This switching device is setting-free (through auto-upgrade and configuration) and its upgrade procedures are as follows: 1. The ISC DHCP server will recognize the device whenever it sends an IP address request to it, and it will tell the device how to get a new firmware or configuration. 2.
APPENDIX C: VLAN Application Note Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme instead of the physical layout. It can be used to combine any collection of LAN segments into a group that appears as a single LAN so as to logically segment the network into different broadcast domains.
Page 190
I. Port-Based VLAN Port-Based VLAN is uncomplicated in implementation and is useful for network administrators who wish to quickly and easily set up VLANs to isolate the effect of broadcast packets on their network. In the network diagram provided below, the network administrator is required to set up VLANs to separate traffic based on the following design conditions: ...
CLI Configuration: Steps… Commands… SWH> enable 1. Enter Global Configuration Password: mode. SWH# config SWH(config)# SWH(config)# vlan port-based Marketing 2. Create port-based VLANs OK ! “Marketing” and “RD” SWH(config)# vlan port-based RD OK ! SWH(config)# interface 1,21,23,26 3. Select port 1, 21, 23 and 26 to SWH(config-if-1,21,23,26)# configure.
Page 192
3. Add Port 1, 21, 23 and 26 in a group and name it to “Marketing”. Switch Management>VLAN Configuration>Port Based VLAN>Configure VLAN Click “OK” to apply the settings. 4. Click “New” to add a new Port-Based VLAN Switch Management>VLAN Configuration>Port Based VLAN>Configure VLAN 5.
Page 193
6. Check Port-Based VLAN settings. Switch Management>VLAN Configuration>Port Based VLAN>Configure VLAN NOTE: By default, all ports are member ports of the Default_VLAN. Before removing the Deafult_VLAN from the VLAN table, make sure you have correct management VLAN and PVID configurations, otherwise, incorrect configurations may disconnect your management PC to the Managed Switch immediately when you enter the command.
Page 194
II. Data VLAN In networking environment, VLANs can carry various types of network traffic. The most common network traffic carried in a VLAN could be voice-based traffic, management traffic and data traffic. In practice, it is common to separate voice and management traffic from data traffic such as files, emails.
Page 195
NOTE: By default, all ports are member ports of the Default_VLAN. Before removing the Default_VLAN from the VLAN table, make sure you have correct management VLAN and PVID configurations, otherwise, incorrect configurations may disconnect your management PC to the Managed Switch immediately when you enter the command.
Page 196
2. Create a new Data VLAN 11 that includes Port 1 and Port 26 as members. Switch Management>VLAN Configuration>IEEE 802.1q Tag VLAN>Configure VLAN Click “New” to create a new VLAN. Data VLAN 11 that includes Port 1 and Port 26 as member ports.
Page 197
4. Change Port 1’s PVID to 11, and set Port 26 to trunk mode. Switch Management>VLAN Configuration>IEEE 802.1q Tag VLAN> VLAN Interface Change Port 1‟s PVID to 11 Select “TRUNK” Click “OK” to apply the settings. Treatments of Packets: 1. A untagged packet arrives at Port 1 When an untagged packet arrives at Port 1, port 1‟s Port VLAN ID (11) will be added to the original port.
Page 198
III. Management VLAN For security and performance reasons, it is best to separate user traffic and management traffic. When Management VLAN is set up, only a host or hosts that is/are in this Management VLAN can manage the device; thus, broadcasts that the device receives or traffic (e.g. multicast) directed to the management port will be minimized.
Page 199
Web Management Configuration: 1. Select “Configure VLAN” option in IEEE 802.1Q Tag VLAN menu. Switch Management>VLAN Configuration>IEEE 802.1q Tag VLAN>Configure VLAN Click “New” to create a new VLAN. 2. Create a new Management VLAN 10 that includes only Port 26 as a member port. Switch Management>VLAN Configuration>IEEE 802.1q Tag VLAN>Configure VLAN Management VLAN 10 that...
Page 200
NOTE: By default, all ports are member ports of the Default_VLAN. Before removing the Deafult_VLAN from the VLAN table, make sure you have correct management VLAN and PVID configurations, otherwise, incorrect configurations may disconnect your management PC to the Managed Switch immediately when you enter the command. 4.
Page 201
IV. Q-in-Q The IEEE 802.1Q double tagging VLAN is also referred to Q-in-Q or VLAN stacking (IEEE 802.1ad). Its purpose is to expand the 802.1q VLAN space by tagging the inner tagged packets. In this way, a “double-tagged” frame is created so as to separate customer traffic within a service provider network.
Page 202
SWH(config)# interface 1 6. Set Port 1 to tunnel mode. SWH(config-if-1)# vlan dot1q-vlan mode dot1q- tunnel OK ! SWH(config-if-1)# vlan dot1q-vlan access-vlan 15 7. Change Port 1‟s PVID to 15. OK ! SWH(config-if-1)# exit SWH(config)# interface 26 8. Set Port 26 to trunk mode. SWH(config-if-26)# vlan dot1q-vlan mode trunk OK ! SWH(config)# show vlan interface...
Page 203
2. Create a new Service VLAN 15 that includes Port 1 and Port 26 as member ports. Switch Management>VLAN Configuration>IEEE 802.1q Tag VLAN>Configure VLAN Click “New” to create a new VLAN. Create S-VLAN 15 that includes Port 1 and Port 26 as member ports.
Page 204
4. Change Port 1’s PVID to 15, and set Port 1 to DOT1Q-TUNNEL mode and Port 26 to TRUNK mode. Switch Management>VLAN Configuration>IEEE 802.1q Tag VLAN>VLAN Interface Set Port 1 to DOT1Q-TUNNEL mode and change Port 1‟s PVID to 15 Set Port 26 to TRUNK mode Click “OK”...
Page 205
This page is intentionally left blank. Revision History Manual Version Modification Firmware Version Date Add SSH function 1.08.90 2012/4 Remove CFM function Add “show default-setting” CLI command Modify Appendix C - VLAN Application 1.08.00 2011/9 Note with new CLI and Web GUI Revise VLAN descriptions...
Need help?
Do you have a question about the FOS-3126-PLUS SERIES and is the answer not in the manual?
Questions and answers