Page 2
LEGAL The information in this publication has been carefully checked and is believed to be entirely accurate at the time of publication. CTC Union Technologies assumes no responsibility, however, for possible errors or omissions, or for any consequences resulting from the use of the information contained herein. CTC Union Technologies reserves the right to make changes in its products or product specifications with the intent to improve function or design at any time and without notice and is not required to update this documentation to reflect such changes.
Page 3
Version 1.1 December 2014 This manual supports the following models: GSW-1005MS Managed Gigabit Ethernet 5TP+1FX CPE Switch This document is the current official release manual. Please check CTC Union's website for any updated manual or contact us by E-mail at sales@ctcu.com. Please address any comments for improving this manual or to point out omissions or errors to marketing@ctcu.com.
Page 7
Table of Contents 5.17 Q S ..............................110 5.17.1 Port Classification ............................111 5.17.2 Port Policing ..............................111 5.17.3 Port Scheduler .............................. 112 5.17.4 Port Shaping ..............................113 5.17.5 Port Tag Remarking ............................114 5.17.6 Port DSCP ..............................115 5.17.7 DSCP-Based QoS ............................116 5.17.8 DSCP Translation ............................
LED display. When GSW-1005MS is deployed as a stand-alone solution, it incorporates an easy to use Web user interface for operation, administration and maintenance both local and remotely. All of the enabled Layer 2 features and functions of GSW-1005MS can be configured and monitored via web interface and SNMP management.
Chapter 2. Panels & LED Indicators This section describes the front panel, rear panel and top panel of GSW-1005MS. The front panel of GSW-1005MS only has LAN ports; while, the rear panel provides one SFP cage, reset push-button and AC power port. LED indicators are located on the top panel to provide real-time indications of link status.
2.2.2 Reset Push-Button There is a recessed pushbutton switch used to reset GSW-1005MS or to return it to factory defaults. Pressing the reset momentarily once will "warm boot" the switch. Pressing and holding the pushbutton switch for more than 3 seconds and then releasing will set the running configuration to the original factory default settings, including the original factory default IP address followed by a "warm boot".
3.1 Introduction GSW-1005MS is designed for placing on a desktop or can be mounted on the wall optionally. We also offer a fiber cable tray that can meet varying needs of cable management. GSW-1005MS comes without wall-mounting kit and fiber tray from the factory.
Page 13
Chapter 3 Installation Step 3. Organize the fiber cable into the cable tray base. There are two fiber cable input holes that you can use to organize your cable (Figure 10 & 11). Use the cable tray fixations to fix your fiber cable securely on the cable tray while organizing.
Page 14
Chapter 3 Installation Step 5. Slide GSW-1005MS downward to attach two items securely together. Figure 16: Slide the device down Step 6. Connect the fiber cable connector to the SFP transceiver and power cable to the power port. Figure 17: Connect to the SFP transceiver and power port Step 7.
Figure 20: Remove RJ-45 hole baffles Figure 21: Install LAN cable protection cover 3.1.2 Wall-Mounting Installation (GSW-1005MS Only) Wall-mounting kit is an optional accessory. It does not come with the standard package of the device. Before starting installing your device on the wall, please make sure you have a bracket and screws at hand. Then, follow the steps below to correctly install the device on a wall.
Figure 24: Mounting the device on the wall 3.1.3 Wall-Mounting Installation (GSW-1005MS with Cable Tray) GSW-1005MS with cable tray management can also be mounted on the wall. Before starting wall-mounting installation, make sure you have organized fiber cable into the cable tray base.
3.1.4 Wall-Mounting Installation (GSW-1005MS with Cable Tray & LAN Protection) GSW-1005MS with cable tray management & LAN cable protection can also be mounted on the wall. Before starting wall- mounting installation, make sure you have organized fiber cable into the cable tray base.
Page 18
Chapter 3 Installation Step 3: Mount the device on the wall using four hanging screws with front panel facing downwards and slide it downward until it locks securely. Figure 29: Mount the device on the wall Step 4. Connect RJ-45 LAN cable and install the “LAN cable protection cover”. Figure 30: Install the LAN cable protection cover...
Simple Network Management Protocol (SNMP). The operator will use SNMP management software to manage and monitor the GSW-1005MS switches on a network. This requires some configuration of the device to allow SNMP management. In addition, the network management platform will need to import and compile the proprietary MIB (management information base) file so that the management software knows "how"...
Chapter 4 Introduction to CLI 4.2.1 CLI Online Help While using the CLI, online help is always available by using 'help' command or typing '?' (question mark). Commands can be recalled by using the 'up/down arrow keys'. Note: When making corrections while typing, please be aware that unless the terminal emulation program specifically issues a [CTRL-H] for [Backspace] that the backspace action must use the key combination of [CTRL-H] as the [Backspace] character is not recognized by the CLI.
Chapter 4 Introduction to CLI 4.2.2.2 DHCP syntax: IP DHCP [enable|disable] >ip dhcp disable > Note: The DHCP client is disabled by default. To set static IP on network with DHCP server, do not enable DHCP client. 4.2.2.3 DNS Server syntax: IP DNS <dns_source>...
Chapter 4 Introduction to CLI 4.2.4 Reboot Device syntax: System Reboot >system reboot > 4.2.5 Admin Password syntax: Security Switch Users Add <username> <password> <privilege_level> >security switch add admin secret 15 > Note: Sets the password "secret" for the admin user. (Admin user has the highest privilege level of 15.) To clear admin password, use a pair of double quotes to enter a null password.
Web Configuration & Operation Chapter 5. Web Configuration & Operation 5.1 Home Page Using your favorite web browser, enter the IP address of the GSW-1005MS in the browser's location bar. The factory default address is 192.168.0.1. 5.1.1 Login A standard login prompt will appear depending on the type of browser used. The example below is with Firefox browser.
Chapter 5 Web Configuration & Operation Unless connected directly on a local LAN, we recommend not using the auto-refresh function as it does generate a bit of traffic. 5.1.4 Help System The device has an online "help" system to aid the engineer when setting the parameters of the device. Each functional setting page is accompanied by a specific "help"...
Chapter 5 Web Configuration & Operation 5.2.1 System Configuration The configuration information entered here will be reported in the standard SNMP MIB2 for 'sysContact' (OID 1.3.6.1.2.1.1.4), 'sysName' (OID 1.3.6.1.2.1.1.5) and 'sysLocation' (OID 1.3.6.1.2.1.1.6). Remember to click the 'Save' button after entering the configuration information. 5.2.2 System Information The system information screen will display the configuration information, the hardware MAC address and version, the system time, the system "uptime"...
Chapter 5 Web Configuration & Operation the configured IP settings will be used. The DHCP client will announce the configured System Name as hostname to provide DNS lookup. DHCP Option 60: Configure the DHCP option 60 vendor class ID. The allowed string length is 0 to 60, and the allowed content is the ASCII characters from 0x20 to 0x7E.
Chapter 5 Web Configuration & Operation 5.2.5 System Auto Provision Configuration Configure auto provision on this page. Auto Provision Mode: Indicates the auto provision operation mode. Possible modes are: Enabled: Enable auto provision mode operation. When auto provision mode operation is enabled, the device can download software and configuration automatically.
Chapter 5 Web Configuration & Operation 5.2.7 System Time Setup the device time. The setting example above is for Eastern Standard Time in the United States. Daylight savings time starts on the second Sunday in March at 2:00AM. Daylight savings ends on the first Sunday in November at 2:00AM. The daylight savings time offset is 60 minutes (1 hour).
Chapter 5 Web Configuration & Operation 5.2.8 System Log Configuration Configure System Log on this page. Server Mode: This sets the server mode operation. When the mode of operation is enabled, the syslog message will send out to syslog server (at the server address). The syslog protocol is based on UDP communication and received on UDP port 514.
Chapter 5 Web Configuration & Operation 5.2.10 System Detailed Log Displays individual log records. View each log, by ID number. 5.2.11 System CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well.
Chapter 5 Web Configuration & Operation 5.3.1 Green Ethernet LED Configure the LED light intensity to reduce power consumption. The LED light intensity may be adjusted in a percentage of intensity during programmable time periods. In the above setting example, the LED intensity has been adjusted to 50% during daylight hours and reduced to only 10% intensity during night hours.
Chapter 5 Web Configuration & Operation Port: The port number. “All” rules apply to all ports. Enabled: Select the checkbox to enable EEE function on a port. By default, all ports (except Fiber port) are enabled with EEE function. EEE Urgent Queues: It is possible to minimize the latency for specific frames, by mapping the frames to a specific queue (done with QOS), and then mark the queue as an urgent queue.
Chapter 5 Web Configuration & Operation 5.4.2 Status Local Port: The port number. Temperature: Display the current temperature on a certain port. Port status: Display the current port status. 5.5 Ports Configurations related to the fiber and electrical ports are performed under the Ports menu. 5.5.1 Ports Configuration This page displays current port configurations and allows some configuration here.
Chapter 5 Web Configuration & Operation Possible copper port settings are: Disabled - Disables the switch port operation. Auto - Port auto negotiating speed with the link partner, selecting the highest speed that is compatible with the link partner and negotiating the duplex mode. 10Mbps HDX - Forces the port to 10Mbps half duplex mode.
Chapter 5 Web Configuration & Operation 5.5.3 Ports State Display an overview graphic of the switch. This is the same graphic overview shown when first logging into the switch for management. "Green" colored ports indicate a 100M linked state, while "Amber" colored ports indicate a 1G linked state. "Grey" ports have no link. The link status display can be updated by clicking the "Refresh"...
Chapter 5 Web Configuration & Operation 5.5.5 Ports Traffic Overview Displays a comprehensive overview of traffic on all ports. Port: The logical port (1~5 & Fiber) for the data contained in the same row. Packets: The number of received and transmitted packets per port. Bytes: The number of received and transmitted bytes per port.
Chapter 5 Web Configuration & Operation QCE#: Indicates the index of QCE. Frame Type: Indicates the type of frame to look for incoming frames. Possible frame types are: Any: The QCE will match all frame type. Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. LLC: Only (LLC) frames are allowed.
Page 38
Chapter 5 Web Configuration & Operation Receive Total and Transmit Total Rx and Tx Packets: The number of received and transmitted (good and bad) packets. Rx and Tx Octets: The number of received and transmitted (good and bad) bytes. Includes FCS, but excludes framing bits. Rx and Tx Unicast: The number of received and transmitted (good and bad) unicast packets.
Chapter 5 Web Configuration & Operation 5.6 Security Under the security heading are three major icons, switch, network and AAA (Authentication and Accounting). 5.6.1 Switch 5.6.1.1 Users This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser.
Chapter 5 Web Configuration & Operation Privilege Level: Select the appropriate privilege level for this user account. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully control of the device. But other values need to refer to each group privilege level.
Chapter 5 Web Configuration & Operation Debug: Only present in CLI. Privilege Levels: Every group has an authorization Privilege level for the following sub groups: configuration read-only configuration/execute read-write status/statistics read-only status/statistics read-write (e.g. for clearing of statistics) User Privilege should be the same or greater than the authorization Privilege level to have access to that group. 5.6.1.3 Auth Method This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces.
Chapter 5 Web Configuration & Operation 5.6.1.4 SSH Configure SSH on this page. Mode: Indicates the SSH mode operation. Possible modes are: Enabled: Enable SSH mode operation. By default, it is enabled. Disabled: Disable SSH mode operation. Note: SSH is preferred to Telnet, unless the management network is trusted. Telnet passes authentication credentials in plain text, making those credentials susceptible to packet capture and analysis.
Chapter 5 Web Configuration & Operation Private Key File: Indicates a private key file for uploading. Private Password: Configure private key pass phrase. The allowed string length is 0 to 60. 5.6.1.6 Access Management 5.6.1.6.1 Configuration Configure the access management table on this page. The maximum number of entries is 16. If the application's type matches any one of the access management entries, it will be allowed access to the switch.
Chapter 5 Web Configuration & Operation Disabled: Disable access management ports mode operation. Port: The switch port number of the logical port. Allowed: Indicates that the host can access the switch from this port. Click the “Save” button to save settings or changes. Click the “Reset”...
Page 45
Chapter 5 Web Configuration & Operation Version: Indicates the SNMP supported version. Possible versions are: SNMP v1: Set SNMP supported version 1. SNMP v2c: Set SNMP supported version 2c. SNMP v3: Set SNMP supported version 3. Read Community: Indicates the community read access string to permit access to the SNMP agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 0x21 to 0x7E.
Page 46
Chapter 5 Web Configuration & Operation Trap Destination IPv6 Address: Indicates the SNMP trap destination IPv6 address. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'.
Chapter 5 Web Configuration & Operation 5.6.1.7.2 SNMPv3 Community Configuration Configure SNMPv3 community table on this page. The entry index key is Community. Community: Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
Chapter 5 Web Configuration & Operation The value of security level cannot be modified if entry already exists. That means it must first be ensured that the value is set correctly. Authentication Password: A string identifying the authentication password phrase. For MD5 authentication protocol, the allowed string length is 8 to 32 characters.
Chapter 5 Web Configuration & Operation Click the “Reset” button to restore changed settings to the default settings. 5.6.1.7.5 SNMPv3 View Configuration Configure SNMPv3 view table on this page. The entry index keys are View Name and OID Subtree. View Name: A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
Chapter 5 Web Configuration & Operation Security Level: Indicates the security model that this entry should belong to. Possible security models are: NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy. Auth, Priv: Authentication and privacy. Read View Name: The name of the MIB view defining the MIB objects for which this request may request the current values.
Chapter 5 Web Configuration & Operation Buckets: The number of buckets requested for this entry. By default, 50 is specified. The allowed range is 1 - 3600. Buckets Granted: The number of buckets granted. Click the “Add New Entry” button to insert a new entry to the list. Click the “Delete”...
Chapter 5 Web Configuration & Operation threshold, then an alarm will be generated. After a falling event has been generated, another such event will not be generated until the sampled value has risen above the falling threshold, reaches the rising threshold, and again moves back down to the failing threshold.
Chapter 5 Web Configuration & Operation 5.6.1.8.5 RMON Statistics Overview This RMON statistics overview page shows interface statistics. All values displayed have been accumulated since the last system reboot and are shown as counts per second. The system will automatically refresh every 60 seconds by default. ID: Displays an ID index.
Chapter 5 Web Configuration & Operation Octets: The total number of octets of data received. Pkts: The total number of packets (including bad packets, broadcast packets) received. Broadcast: The total number of good packets received that were directed to the broadcast address. Multicast: The total number of good packets received that were directed to a multicast address.
Chapter 5 Web Configuration & Operation 5.6.1.8.8 RMON Event Overview Event Index: Display the event entry index. Log Index: Display the log entry index. Log Time: Display Event log time. Log Description: Display Event description. 5.6.2 Network 5.6.2.1 Port Security Port Security Limit Control can restrict the number of users that can access the switch based on users’...
Page 56
Chapter 5 Web Configuration & Operation Port Configuration Port: Display the port number. “Port *” rules apply to all ports. Mode: Enable or disable port security limit control on a per port basis. To make limit control function work, port security limit control needs to be enabled globally and on a port.
Chapter 5 Web Configuration & Operation 5.6.2.1.2 Switch Status User Module Legend User Module Name: The full name of a module that may request Port Security services. Abbr: This column is the abbreviation for the user module used in the “Users” column in the “Port Status”. Port Status Port: Port number.
Chapter 5 Web Configuration & Operation MAC Address: When “Port Security Limit Control” is enabled globally and on a port, MAC addresses learned on a port shows in here. VLAN ID: Display VLAN ID that is seen on this port. State: Display whether the corresponding MAC address is forwarding or blocked.
Page 59
Chapter 5 Web Configuration & Operation Reauthentication Period: Specify the time interval for a connected device to be re-authenticated. By default, the re- authenticated period is set to 3600 seconds. The allowed range is 1 - 3600 seconds. EAPOL Timeout: Specify the time that the switch waits for a supplicant response during an authentication session before transmitting a Request Identify EAPOL packet.
Page 60
Chapter 5 Web Configuration & Operation connected to a port, the one that comes first when the port's link comes up will be the first one considered. If that supplicant doesn't provide valid credentials within a certain amount of time, another supplicant will get a chance. Once a supplicant is successfully authenticated, only that supplicant will be allowed access.
Chapter 5 Web Configuration & Operation 5.6.2.2.2 Switch Status Port: Port number. Click a port to view the detailed NAS statistics. Admin State: Display the port’s current administrative state. Port Status: Display the port state. Last Source: The source MAC address carried in the most recently received EAPOL frame for EAPOL-based authentication. Last ID: The user name (supplicant identity) carried in the most recently received Response Identity EAPOL frame for EAPOL-based authentication.
Chapter 5 Web Configuration & Operation Logoff: The number of valid EAPOL Logoff frames that have been received by the switch. Invalid Type: The number of EAPOL frames that have been received by the switch in which the frame type is not recognized.
Chapter 5 Web Configuration & Operation parameter on the ACL Ports Configuration page. Then open the Mirror Configuration page, set the “Port to mirror on” field to the required destination port, and leave the “Mode” field Disabled. Logging: Enable logging of matched frames to the system log. To view log entries, go to System menu and then click the “System Log Information”...
Page 64
Chapter 5 Web Configuration & Operation Frame Type: The type of frame that matches to this rule. Action: Display the action type, either to permit or deny. Rate Limiter: Display rate limiter is enabled or disabled when matched frames are found. Port Redirect: Display port redirect is enabled or disabled.
Page 65
Chapter 5 Web Configuration & Operation Counter: Display the number of frames that have matched any of the rules defined for this ACL. VLAN Parameters 802.1Q Tagged: Select whether or not the frames should be tagged. VLAN ID Filter: Select the VLAN ID filter for this ACE. Any: No VLAN ID filter is specified.
Page 66
Chapter 5 Web Configuration & Operation Any: No sender IP filter is specified. Host: Specify the sender IP address. Network: Specify the sender IP address and sender IP mask. Target IP Filter: Specify the destination IP address. Any: No target IP filter is specified. Host: Specify the target IP address.
Chapter 5 Web Configuration & Operation DIP Address: Specify a destination IP address. DIP Mask: Specify a destination subnet mask. 5.6.2.3.4 ACL Status This page shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations.
Chapter 5 Web Configuration & Operation CPU: Forward packet that matched the specific ACE to CPU. CPU Once: Forward first packet that matched the specific ACE to CPU. Counter: The counter indicates the number of times the ACE was hit by a frame. Conflict: Indicate the hardware status of the specific ACE.
Chapter 5 Web Configuration & Operation Relay Mode: Enable or disable the DHCP relay function. Relay Server: Enter DHCP server IP address that is used by the switch’s DHCP relay agent. Relay Information Mode: Enable or disable DHCP Relay option 82 function. Please note that “Relay Mode” must be enabled before this function is able to take effect.
Chapter 5 Web Configuration & Operation 5.6.2.4.4 DHCP Relay Statistics DHCP Relay Statistics Transmit to Server: The number of packets that are relayed from client to server. Transmit Error: The number of packets that resulted in errors while being sent to clients. Receive from Client: The number of packets received from server.
Chapter 5 Web Configuration & Operation 5.6.2.5 IP Source Guard 5.6.2.5.1 Configuration IP Source Guard Configuration Mode: Enable or disable IP source guard globally. Translate dynamic to static: Click this button to translate dynamic entries to static ones. Port Mode Configuration Port: The port number.
Chapter 5 Web Configuration & Operation Click the “Delete” button to remove a newly-inserted entry or select the checkbox to remove a saved entry during the next save. Click the “Save” button to save settings or changes. Click the “Reset” button to restore changed settings to the default settings. 5.6.2.5.3 Dynamic Table The Dynamic IP Source Guard table shows entries sorted by port, VLAN ID, IP address and MAC address.
Chapter 5 Web Configuration & Operation 5.6.2.6.2 Static Table Port: Select a port to which a static entry is bound. VLAN ID: Specify a configured VLAN ID. MAC Address: Specify an allowed source MAC address in ARP request packets. IP Address: Specify an allowed source IP address in ARP request packets. Click the “Add New Entry”...
Chapter 5 Web Configuration & Operation 5.6.2.7 AAA 5.6.2.7.1 Configuration Common Server Configuration Timeout: The time the switch waits for a reply from an authentication server before it retransmits the request. Deadtime: Deadtime is the period during which the switch will not send new requests to a server that has failed to respond to a previous request.
Chapter 5 Web Configuration & Operation Hostname: The hostname or IP address for the TACACS+ authentication server. Port: The UDP port to be used on the TACACS+ server for authentication. Key: Specify the secret key up to 63 characters. This is shared between the TACACS+ sever and the switch 5.6.2.7.2 RADIUS Overview RADIUS Authentication/Accounting Server Status Overview IP Address: The configured IP address and UPD port number.
Page 76
Chapter 5 Web Configuration & Operation RADIUS Authentication Statistics for Server Access Accepts: The number of RADIUS Access-Accept packets (valid or invalid) received from the server. Access Rejects: The number of RADIUS Access-Reject packets (valid or invalid) received from the server. Access Challenges: The number of RADIUS Access-Challenge packets (valid or invalid) received from the server.
Page 77
Chapter 5 Web Configuration & Operation RADIUS Accounting Statistics for Server Responses: The number of RADIUS packets (valid or invalid) received from the server. Malformed Responses: The number of malformed RADIUS packets received from the server. Malformed packets include packets with an invalid length. Bad authenticators or unknown types are not included as malformed access responses. Bad Authenticators: The number of RADIUS packets containing invalid authenticators received from the server.
Chapter 5 Web Configuration & Operation 5.7 Loop Protection Loops sometimes occur in a network due to improper connecting, hardware problem or faulty protocol settings. When loops are seen in a switched network, they consume switch resources and thus downgrade switch performance. Loop Protection feature is provided in this switch and can be enabled globally or on a per port basis.
Chapter 5 Web Configuration & Operation 5.7.2 Status Port: The port number. Action: Display the configured action that the switch will react when loops occur. Transmit: Display the configured transmit (Tx) mode. Loops: The number of loops detected on a port. Status: The current loop status detected on a port.
Page 80
Chapter 5 Web Configuration & Operation MVR Configurations MVR Mode: Enable or disable MVR feature globally on this device. Any multicast data from source ports will be sent to associated receiver ports registered in the table. By default, MVR feature is turned off. VLAN Interface Setting MVR ID: Specify multicast VLAN ID.
Chapter 5 Web Configuration & Operation MVR Channel Configuration VLAN ID: Display the selected entry’s multicast VLAN ID. This field is not editable. VLAN Name: Display the selected entry’s multicast VLAN Name. This field is not editable. Start Address: Enter the starting IPv4 or IPv6 multicast streaming address that will be used as a streaming channel. End Address: Enter the ending IPv4 or IPv6 multicast streaming address that will be used as a streaming channel.
Chapter 5 Web Configuration & Operation 5.8.3 MVR Channel Groups Start from VLAN ____ and Group Address _______ with 20 entries per page. This table displays MVR channels (groups) information and is sorted by VLAN ID. VLAN ID: VLAN ID of the group. Groups: Group ID Port Members: Ports that belong to this group.
Chapter 5 Web Configuration & Operation 5.9 IPMC The “IPMC” menu includes IGMP Snooping and MLD Snooping sub menu. Select the appropriate menu to set up detailed configurations. 5.9.1 IGMP Snooping The Internet Group Management Protocol (IGMP) is a communications protocol used to manage the membership of Internet Protocol multicast groups.
Chapter 5 Web Configuration & Operation IGMP SSM Range: SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Leave Proxy Enabled: Suppresses leave messages unless received from the last member port in the group. IGMP leave proxy suppresses all unnecessary IGMP leave messages so that a non-querier switch forwards an IGMP leave packet only when the last dynamic member port leaves a multicast group.
Chapter 5 Web Configuration & Operation RV: The robustness variable (RV) allows tuning for the expected packet loss on a subnet. If a subnet is susceptible to packet loss, this value can be increased. The RV value must not be zero and should not be one. The value should be 2 or greater.
Chapter 5 Web Configuration & Operation 5.9.1.4 Status Statistics VLAN ID: The VLAN ID of this entry. Querier Version: The current working Querier version. Host Version: The current host version. Querier Status: Show the Querier status that is either "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled.
Chapter 5 Web Configuration & Operation 5.9.1.6 IPv4 SFM Information VLAN ID: Display the VLAN ID of the group. Groups: Display the IP address of a multicast group. Port: The switch port number. Mode: The filtering mode maintained per VLAN ID, port number and group address. Source Address: The source IP address available for filtering.
Chapter 5 Web Configuration & Operation snoop on MLD Listener Query and Report packets transferred between IP multicast routers and IP multicast service subscribers to identify the multicast group members. The switch simply monitors the IGMP packets passing through it, picks out the group registration information and configures the multicast filters accordingly.
Chapter 5 Web Configuration & Operation MLD Querier: Enable to join querier election in the VLAN. When enabled, the switch can serve as the MLDv2 querier in the bidding process with other competing multicast routers or switches. Once it becomes querier, it will be responsible for asking hosts periodically if they want to receive multicast traffic.
Chapter 5 Web Configuration & Operation 5.9.2.4 Status Statistics VLAN ID: The VLAN ID of this entry. Querier Version: The current working Querier version. Host Version: The current host version. Querier Status: Show the Querier status that is either "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled.
Chapter 5 Web Configuration & Operation 5.9.2.6 IPv6 SFM Information VLAN ID: Display the VLAN ID of the group. Group: Display the IP address of a multicast group. Port: The switch port number. Mode: The filtering mode maintained per VLAN ID, port number and group address. Source Address: The source IP address available for filtering.
Chapter 5 Web Configuration & Operation 5.10.1 Configuration LLDP Parameters Tx Interval: Specify the interval between LLDP frames are sent to its neighbours for updated discovery information. The valid values are 5~32768 seconds. The default is 30 seconds. Tx Hold: This setting defines how long LLDP frames are considered valid and is used to compute the TTL. Valid range is 2~10 times.
Chapter 5 Web Configuration & Operation 5.10.2 LLDP-MED LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, inventory management and location information.
Page 94
Chapter 5 Web Configuration & Operation NAD83/NAVD88: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich; The associated vertical datum is the North American Vertical Datum of 1988 (NAVD88). This datum pair is to be used when referencing locations on land, not near tidal water (which would use Datum = NAD83/MLLW). NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich;...
Chapter 5 Web Configuration & Operation Emergency Call Service Emergency Call Service: Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Policies Policy ID: Specify the ID for this policy. Application Type: The application types include “Voice”, “Voice Signalling”, “Guest Voice”, “Guest Voice Signalling”, “Softphone Voice”, “Video Conferencing”, “Streaming”, “Video Signalling”.
Chapter 5 Web Configuration & Operation 5.10.4 LLDP-MED Neighbours This page displays information about LLDP-MED neighbours detected on the network. 5.10.5 Neighbours EEE Information Local Port: The port for this switch on which the LLDP frame was received. Tx Tw: The link partner's maximum time that transmit path can hold-off sending data after deassertion of LPI. Rx Tw: The link partner's time that receiver would like the transmitter to hold-off to allow time for the receiver to wake from sleep.
Chapter 5 Web Configuration & Operation 5.10.6 Port Statistics Global Counters Total Neighbours Entries Added: Shows the number of new entries added since the switch was rebooted, and for which the remote TTL has not yet expired. Total Neighbors Entries Deleted: The number of LLDP neighbors which have been removed from the LLDP remote systems MIB for any reason.
Chapter 5 Web Configuration & Operation 5.11 MAC Table The “MAC Table” menu contains configuration and status sub menu. Select the configuration page to set up detailed configuration 5.11.1 Configuration Disable Automatic Aging: Learned MAC addresses will appear in the table permanently. Aging Time: Set up the aging time for a learned MAC to be appeared in MAC learning table.
Chapter 5 Web Configuration & Operation Click the “Save” button to save settings or changes. Click the “Reset” button to restore changed settings to the default settings. 5.11.2 MAC Address Table The MAC Address Table shows both static and dynamic MAC addresses learned from CPU or switch ports. You can enter the starting VLAN ID and MAC addresses to view the desired entries.
Chapter 5 Web Configuration & Operation 5.12.1 Port to Group Mapping Group ID: The total VLAN Translation group can be used is 11 which is automatically created in Group Mapping Table when entering “Port to Group Mapping” page. A port can be mapped to any of the groups. Multiple ports can be mapped to a single group with the same Group ID.
Chapter 5 Web Configuration & Operation VLANs help control traffic: Traditionally, when networks are not segmented into VLANs, congestion can be easily caused by broadcast traffic that is directed to all devices. To minimize the possibility of broadcast traffic damaging the entire network, VLANs can help group devices that communicate frequently with other in the same VLAN so as to divide the entire network into several broadcast domains.
Chapter 5 Web Configuration & Operation 5.13.2 Ports Configuration Ethertype for Custom S-ports: Specify ether type used for customer s-ports. VLAN Port Configuration Port: The port number. “All” settings apply to all ports. Port Type: There are four port types available. Each port type’s ingress and egress action is described in the following table.
Chapter 5 Web Configuration & Operation Frame Type: Select the accepted frame types. Available options include All (accept all frames), Tagged (accept only tagged frames), Untagged (accept only untagged frames). This parameter affects VLAN ingress processing. If the port only accepts tagged frames, untagged frames received on the port are discarded.
Chapter 5 Web Configuration & Operation Conflicts: Display whether conflicts exist or not. When a software module requests to set VLAN membership or VLAN port configuration, the following conflicts can occur: *Functional conflicts between features. *Conflicts due to hardware limitations. *Direct conflicts between user modules.
Chapter 5 Web Configuration & Operation 5.14.2 Port Isolation Private VLAN is used to group ports together so as to prevent communications within PVLAN. Port Isolation is used to prevent communications between customer ports in a same Private VLAN. The port that is isolated from others cannot forward any unicast, multicast or broadcast traffic to any other ports in the same PVLAN.
Chapter 5 Web Configuration & Operation Click the “Reset” button to restore changed settings to the default settings. 5.15.1.2 Membership Status This page shows the status of current VCL rules. MAC Address: Display the configured MAC addresses. VLAN ID: Display the VLAN ID of this membership entry. Port Members: Display ports that accept the configured MAC address.
Chapter 5 Web Configuration & Operation Ethernet: Ether Type (etype) value. By default, it is set to 0x0800. The range allowed is 0x0600 to 0xffff. SNAP: This includes OUI (Organizationally Unique Identifier) and PID (Protocol ID) values. OUI: A value in the format of xx-xx-xx where each pair (xx) in the string is a hexadecimal value in the ranges of 0x00-0xff.
Chapter 5 Web Configuration & Operation 5.15.3 IP Subnet-based VLAN IP Subnet-based VLAN configuration is to map untagged ingress frames to a specific VLAN if the source address is found in the IP subnet-to-VLAN mapping table. When IP subnet-based VLAN classification is enabled, the source address of untagged ingress frame is checked against the IP subnet-to-VLAN mapping table.
Chapter 5 Web Configuration & Operation 5.16.1 Configuration Voice VLAN Configuration Mode: Enable or disable Voice VLAN function on this switch. VLAN ID: Assign a VLAN ID to this Voice VLAN. Only one Voice VLAN is supported on the switch. By default, VLAN 1000 is set.
Chapter 5 Web Configuration & Operation Discovery Protocol: Select a method for detecting VoIP traffic. By default, OUI is used. OUI: Traffic from VoIP devices is detected by the Organizationally Unique Identifier (OUI) of the source MAC address. OUI numbers are assigned to manufacturers and form the first three octets of a device MAC address. MAC address OUI numbers must be configured in the Telephony OUI list so that the switch recognizes the traffic as being from a VoIP device.
Chapter 5 Web Configuration & Operation 5.17.1 Port Classification Port: The port number. “All” rules will apply to all ports. QoS class: Indicate the default QoS class. A QoS class of 0 has the lowest priority. By Default, 0 is used. DP Level: Select the default Drop Precedence Level.
Chapter 5 Web Configuration & Operation This page allows users to set each port’s allowed bandwidth. Port: The port number. “All” settings apply to all ports. Enabled: Select the checkbox to enable port policing function on a port. Rate: Indicate the rate for the policer. By default, 500kbps is used. The allowed range for kbps and fps is 100 to 1000000. The allowed range for Mbps and kfps is 1 to 3300Mbps.
Chapter 5 Web Configuration & Operation Weight mode: Deficit Weighted Round-Robin (DWRR) queuing which specifies a scheduling weight for each queue. (Options: Strict, Weighted; Default: Strict) DWRR services the queues in a manner similar to WRR, but the next queue is serviced only when the queue’s Deficit Counter becomes smaller than the packet size to be transmitted. Queue Shaper/Port Shaper/Queue Shaper Enable: Select the checkbox to enable queue shaper on a certain queue for this selected port.
Chapter 5 Web Configuration & Operation 5.17.5 Port Tag Remarking Click the port number that you want change settings. Tag Remarking Mode: Select the appropriate remarking mode used by this port. Classified: Use classified PCP/DEI values. Default: Use default PCP/DEI values (Default PCP:0; Default DEI:0). Mapped: Use the mapping of the classified QoS class values and DP levels to PCP/DEI values.
Chapter 5 Web Configuration & Operation 5.17.6 Port DSCP Port: List the number of each. “All” settings apply to all ports. Ingress Translate: Select the checkbox to enable ingress translation of DSCP values based on the selected classification method. Ingress Classify: Select the appropriate classification method: Disable: No ingress DSCP classification is performed.
Chapter 5 Web Configuration & Operation 5.17.7 DSCP-Based QoS DSCP: DSCP value in ingress packet. DSCP range is from 0 to 63. Trust: Select the checkbox to indicate that DSCP value is trusted. Only trusted DSCP values are mapped to a specific QoS class and drop precedence level (DPL).
Chapter 5 Web Configuration & Operation 5.17.8 DSCP Translation DSCP: DSCP value in ingress packet. DSCP range is from 0 to 63. Ingress Translate: Enable Ingress Translation of DSCP values based on the specified classification method. Ingress Classify: Enable classification at ingress side as defined in the QoS port DSCP Configuration Table. Egress Remap DP0: Remap DP0 value to the selected DSCP value.
Chapter 5 Web Configuration & Operation QoS Class: List of actual QoS class values. DPL: List of actual DPL values DSCP: Select the DSCP value to map QoS class and DPL value. DSCP value selected for “*” will map to all QoS class and DPL value.
Page 119
Chapter 5 Web Configuration & Operation QCE Configuration Port Members: Select ports that use this rule. Key Parameters Tag: Select VLAN tag type (Tag or Untag). By default, any type is used. VID: Select VID preference. By default, any VID is used. Select “Specific”, if you would like to designate a VID to this QCL entry.
Page 120
Chapter 5 Web Configuration & Operation SNAP: SubNetwork Access Protocol can be distinguished by an OUI and a Protocol ID. (Options for PID: Any, Specific (0x00-0xffff); Default: Any) If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP.
Chapter 5 Web Configuration & Operation 5.17.11 Storm Control Storm Control is used to keep a network from downgraded performance or a complete halt by setting up a threshold for traffic like broadcast, unicast and multicast. When a device on the network is malfunctioning or application programs are not well designed or properly configured, storms may occur and will degrade network performance or even cause a complete halt.
Chapter 5 Web Configuration & Operation 5.19 UPnP Mode: Enable or disable UPnP operation. TTL: TTL (Time to live) is used to configure how many steps an UPnP advertisement can travel before it disappears. Advertising Duration: This defines how often an UPnP advertisement is sent. The duration is carried in Simple Service Discover Protocol (SSDP) packets which informs a control point how often it should receive a SSDP advertisement message from the switch.
Chapter 5 Web Configuration & Operation 5.20.2 Ping6 This Ping function is for ICMPv6 packets. IP Address: Enter the IP address that you wish to ping. Ping Length: The size or length of echo packets. Ping Count: The number of echo packets will be sent. Ping Interval: The time interval between each ping request.
Chapter 5 Web Configuration & Operation Cross C: Abnormal cross-pair coupling with pair C Cross D: Abnormal cross-pair coupling with pair D Length A/B/C/D: The length (in meters) of the cable pair. Note: 1. If a specific port is selected, the test will take approximately 5 seconds. If all ports are selected, it can run approximately 15 seconds.
Chapter 5 Web Configuration & Operation 5.21.3 Software 5.21.3.1 Upload Update the latest Firmware file. Select a Firmware file from your local device and then click “Upload” to start updating. 5.21.3.2 Image Select Select the image file to be used in this device. 5.21.4 Configuration 5.21.4.1 Save Save the current running configurations in XML format in your local device.
Appendix A VLAN Configurations Appendix A: VLAN Configurations This Appendix will cover the following VLAN related configurations: A. Management VLAN (Local management) B. Management VLAN (Remote management) C. 802.1Q VLAN D. Q IN Q VLAN By default, the IP address is 192.168.0.1. For the first-time user, you can use any one of the Fast Ethernet RJ-45 ports to change the IP address via CLI or Web user interface to the desired one.
Page 127
Appendix A VLAN Configurations VLANs > Port Configuration 5. Set Port 1’s port type to “Unaware”, Frame Type to “All”, Port VLAN ID to “1000”, Tx Tag to “Untag_all”. 6. Click “Save” button. System > IP > IP Configuration 7. Input management VLAN information. Set VLAN ID to “1000” and IP address to “192.168.0.250”. 8.
Page 128
Appendix A VLAN Configurations B. Remote Management VLAN VLANs > Membership Configuration 1. Connect your PC to a port instead of the Fiber port to access the device with VLAN 1. 2. Click “Add New VLAN” button to insert a new entry. 3.
Page 129
Appendix A VLAN Configurations System > IP > IP Configuration 7. Input management VLAN information. Set VLAN ID to “1000” and IP address to “140.138.1.20”. 8. Click “Save” button to change management VLAN from 1 to 1000. Once you click “Save” button, your local management PC is immediately disconnected from this device.
Page 130
Appendix A VLAN Configurations C. 802.1Q VLAN VLANs > Membership Configuration 1. Click “Add New VLAN” to insert new entries. 2. Enter VLAN 20 settings (20, DataVLAN, port 2 & Fiber port). 3. Enter VLAN 30 settings (30, MulticastVLAN, port 3 & Fiber port). 4.
Page 131
Appendix A VLAN Configurations VLANs > Port configuration 7. Set Port 2, 3, 4, 5’s Port Type to “Unaware”, Frame Type to “All” 8. Set Port 2, 3, 4, 5’s Port Port VLAN ID to “20”, “30”, “40”, “50”, respectively. 9.
Page 132
Appendix A VLAN Configurations VLANs > Membership Configuration 1. Click “Add New VLAN” to insert a new entry. 2. Enter VLAN ID 299 settings (299, DoubleTagVLAN, Port 4 & 9). 3. Click “Save” button. VLANs > VLAN Port configuration 4. Set Port 4’s Port Type to “Unaware”, Frame Type to “All”, Port VLAN ID to “299”, Tx Tag to “Untag_pvid”. 5.
Appendix B Acronyms Appendix B: Acronyms ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
Page 134
Appendix B Acronyms DHCP DHCP is an acronym for Dynamic Host Configuration Protocol. It is a protocol used for assigning dynamic IP addresses to devices on a network. DHCP Relay DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
Page 135
Appendix B Acronyms connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message. HTTPS HTTPS is an acronym for Hypertext Transfer Protocol over Secure Socket Layer. It is used to indicate a secure HTTP connection.
Page 136
Appendix B Acronyms IPMC Profile IPMC Profile is an acronym for IP MultiCast Profile. IPMC Profile is used to deploy the access control on IP multicast streams. IP Source Guard IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings.
Page 137
Appendix B Acronyms Mirroring For debugging network problems or monitoring network traffic, the switch system can be configured to mirror frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.) Both incoming (source) and outgoing (destination) frames can be mirrored to the mirror port.
Page 138
Appendix B Acronyms A LLDP frame contains multiple TLVs For some TLVs it is configurable if the switch shall include the TLV in the LLDP frame. These TLVs are known as optional TLVs. If an optional TLVs is disabled the corresponding information is not included in the LLDP frame.
Page 139
Appendix B Acronyms PPPoE PPPoE is an acronym for Point-to-Point Protocol over Ethernet. It is a network protocol for encapsulating Point-to- Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with ADSL services where individual users connect to the ADSL transceiver (modem) over Ethernet and in plain Metro Ethernet networks (Wikipedia). Private VLAN In a private VLAN, PVLANs provide layer 2 isolation between ports within the same broadcast domain.
Page 140
Appendix B Acronyms RDI is an acronym for Remote Defect Indication. It is a OAM functionality that is used by a MEP to indicate defect detected to the remote peer MEP. Router Port A router port is a port on the Ethernet switch that leads switch towards the Layer 3 multicast device. RSTP In 1998, the IEEE with document 802.1w introduced an evolution of STP: the Rapid Spanning Tree Protocol, which provides for faster spanning tree convergence after a topology change.
Page 141
Appendix B Acronyms SPROUT Stack Protocol using ROUting Technology. An advanced protocol for almost instantaneous discovery of topology changes within a stack as well as election of a master switch. SPROUT also calculates parameters for setting up each switch to perform shortest path forwarding within the stack. SSID Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach.
Page 142
Appendix B Acronyms TELNET TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password.
Page 143
Appendix B Acronyms VLAN Virtual LAN. A method to restrict communication between switch ports. VLANs can be used for the following applications: VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and members of VLAN 1.
Page 144
Appendix B Acronyms WPS is an acronym for Wi-Fi Protected Setup. It is a standard for easy and secure establishment of a wireless home network. The goal of the WPS protocol is to simplify the process of connecting any home device to the wireless network (Wikipedia).
Page 145
Revisions Version Description Date V1.0 Formal release July 2014 V1.1 Revise Chapter 3 cable tray & add LAN cable protection holder December 2014...
Need help?
Do you have a question about the GSW-1005MS and is the answer not in the manual?
Questions and answers