CTC Communications GSW-1005MS User Manual

Managed gigabit ethernet cpe switch
Table of Contents

Advertisement

Quick Links

GSW-1005MS
Managed Gigabit Ethernet CPE Switch
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GSW-1005MS and is the answer not in the manual?

Questions and answers

Summary of Contents for CTC Communications GSW-1005MS

  • Page 1 GSW-1005MS Managed Gigabit Ethernet CPE Switch...
  • Page 2 LEGAL The information in this publication has been carefully checked and is believed to be entirely accurate at the time of publication. CTC Union Technologies assumes no responsibility, however, for possible errors or omissions, or for any consequences resulting from the use of the information contained herein. CTC Union Technologies reserves the right to make changes in its products or product specifications with the intent to improve function or design at any time and without notice and is not required to update this documentation to reflect such changes.
  • Page 3 Version 1.1 December 2014 This manual supports the following models: GSW-1005MS Managed Gigabit Ethernet 5TP+1FX CPE Switch This document is the current official release manual. Please check CTC Union's website for any updated manual or contact us by E-mail at sales@ctcu.com. Please address any comments for improving this manual or to point out omissions or errors to marketing@ctcu.com.
  • Page 4: Table Of Contents

    3.1.1 Cable Tray Installation ............................12 3.1.2 Wall-Mounting Installation (GSW-1005MS Only) .................... 15 3.1.3 Wall-Mounting Installation (GSW-1005MS with Cable Tray) ................16 3.1.4 Wall-Mounting Installation (GSW-1005MS with Cable Tray & LAN Protection) ..........17 CHAPTER 4. INTRODUCTION TO CLI ..................19 4.1 I ............................
  • Page 5 Table of Contents 5.4.2 Status ................................33 5.5 P ............................... 33 ORTS 5.5.1 Ports Configuration ............................33 5.5.2 Ports Auto Laser Shutdown ..........................34 5.5.3 Ports State ................................ 35 5.5.4 Ports SFP ................................35 5.5.5 Ports Traffic Overview ............................36 5.5.6 Ports QoS Statistics ............................
  • Page 6 Table of Contents 5.6.2.6.2 Static Table ................................73 5.6.2.6.3 Dynamic Table ..............................73 5.6.2.7 AAA....................................74 5.6.2.7.1 Configuration ................................ 74 5.6.2.7.2 RADIUS Overview ..............................75 5.6.2.7.3 RADIUS Details ..............................75 5.7 L ............................78 ROTECTION 5.7.1 Configuration ..............................78 5.7.2 Status ................................79 5.8 MVR .................................
  • Page 7 Table of Contents 5.17 Q S ..............................110 5.17.1 Port Classification ............................111 5.17.2 Port Policing ..............................111 5.17.3 Port Scheduler .............................. 112 5.17.4 Port Shaping ..............................113 5.17.5 Port Tag Remarking ............................114 5.17.6 Port DSCP ..............................115 5.17.7 DSCP-Based QoS ............................116 5.17.8 DSCP Translation ............................
  • Page 8: Chapter 1. Introduction

    LED display. When GSW-1005MS is deployed as a stand-alone solution, it incorporates an easy to use Web user interface for operation, administration and maintenance both local and remotely. All of the enabled Layer 2 features and functions of GSW-1005MS can be configured and monitored via web interface and SNMP management.
  • Page 9: Product Specifications

    Chapter 1 Introduction 1.4 Product Specifications IEEE 802.3 10Base-T 10Mbit/s Ethernet IEEE 802.3u 100Base-TX, 100Base-FX, Fast Ethernet IEEE 802.3ab 1000Base-T Gbit/s Ethernet over twisted pair IEEE 802.3z 1000Base-X Gbit/s Ethernet over Fiber-Optic IEEE 802.1Q Virtual LANs (VLAN) Standards IEEE 802.1X Port based Network Access Control, Authentication IEEE 802.3x Flow control for Full Duplex...
  • Page 10: Chapter 2. Panels & Led Indicators

    Chapter 2. Panels & LED Indicators This section describes the front panel, rear panel and top panel of GSW-1005MS. The front panel of GSW-1005MS only has LAN ports; while, the rear panel provides one SFP cage, reset push-button and AC power port. LED indicators are located on the top panel to provide real-time indications of link status.
  • Page 11: Reset Push-Button

    2.2.2 Reset Push-Button There is a recessed pushbutton switch used to reset GSW-1005MS or to return it to factory defaults. Pressing the reset momentarily once will "warm boot" the switch. Pressing and holding the pushbutton switch for more than 3 seconds and then releasing will set the running configuration to the original factory default settings, including the original factory default IP address followed by a "warm boot".
  • Page 12: Chapter 3. Installation

    3.1 Introduction GSW-1005MS is designed for placing on a desktop or can be mounted on the wall optionally. We also offer a fiber cable tray that can meet varying needs of cable management. GSW-1005MS comes without wall-mounting kit and fiber tray from the factory.
  • Page 13 Chapter 3 Installation Step 3. Organize the fiber cable into the cable tray base. There are two fiber cable input holes that you can use to organize your cable (Figure 10 & 11). Use the cable tray fixations to fix your fiber cable securely on the cable tray while organizing.
  • Page 14 Chapter 3 Installation Step 5. Slide GSW-1005MS downward to attach two items securely together. Figure 16: Slide the device down Step 6. Connect the fiber cable connector to the SFP transceiver and power cable to the power port. Figure 17: Connect to the SFP transceiver and power port Step 7.
  • Page 15: Wall-Mounting Installation (Gsw-1005Ms Only)

    Figure 20: Remove RJ-45 hole baffles Figure 21: Install LAN cable protection cover 3.1.2 Wall-Mounting Installation (GSW-1005MS Only) Wall-mounting kit is an optional accessory. It does not come with the standard package of the device. Before starting installing your device on the wall, please make sure you have a bracket and screws at hand. Then, follow the steps below to correctly install the device on a wall.
  • Page 16: Wall-Mounting Installation (Gsw-1005Ms With Cable Tray)

    Figure 24: Mounting the device on the wall 3.1.3 Wall-Mounting Installation (GSW-1005MS with Cable Tray) GSW-1005MS with cable tray management can also be mounted on the wall. Before starting wall-mounting installation, make sure you have organized fiber cable into the cable tray base.
  • Page 17: Wall-Mounting Installation (Gsw-1005Ms With Cable Tray & Lan Protection)

    3.1.4 Wall-Mounting Installation (GSW-1005MS with Cable Tray & LAN Protection) GSW-1005MS with cable tray management & LAN cable protection can also be mounted on the wall. Before starting wall- mounting installation, make sure you have organized fiber cable into the cable tray base.
  • Page 18 Chapter 3 Installation Step 3: Mount the device on the wall using four hanging screws with front panel facing downwards and slide it downward until it locks securely. Figure 29: Mount the device on the wall Step 4. Connect RJ-45 LAN cable and install the “LAN cable protection cover”. Figure 30: Install the LAN cable protection cover...
  • Page 19: Chapter 4. Introduction To Cli

    Simple Network Management Protocol (SNMP). The operator will use SNMP management software to manage and monitor the GSW-1005MS switches on a network. This requires some configuration of the device to allow SNMP management. In addition, the network management platform will need to import and compile the proprietary MIB (management information base) file so that the management software knows "how"...
  • Page 20: Cli Online Help

    Chapter 4 Introduction to CLI 4.2.1 CLI Online Help While using the CLI, online help is always available by using 'help' command or typing '?' (question mark). Commands can be recalled by using the 'up/down arrow keys'. Note: When making corrections while typing, please be aware that unless the terminal emulation program specifically issues a [CTRL-H] for [Backspace] that the backspace action must use the key combination of [CTRL-H] as the [Backspace] character is not recognized by the CLI.
  • Page 21: Dhcp

    Chapter 4 Introduction to CLI 4.2.2.2 DHCP syntax: IP DHCP [enable|disable] >ip dhcp disable > Note: The DHCP client is disabled by default. To set static IP on network with DHCP server, do not enable DHCP client. 4.2.2.3 DNS Server syntax: IP DNS <dns_source>...
  • Page 22: Reboot Device

    Chapter 4 Introduction to CLI 4.2.4 Reboot Device syntax: System Reboot >system reboot > 4.2.5 Admin Password syntax: Security Switch Users Add <username> <password> <privilege_level> >security switch add admin secret 15 > Note: Sets the password "secret" for the admin user. (Admin user has the highest privilege level of 15.) To clear admin password, use a pair of double quotes to enter a null password.
  • Page 23: Chapter 5. Web Configuration & Operation

    Web Configuration & Operation Chapter 5. Web Configuration & Operation 5.1 Home Page Using your favorite web browser, enter the IP address of the GSW-1005MS in the browser's location bar. The factory default address is 192.168.0.1. 5.1.1 Login A standard login prompt will appear depending on the type of browser used. The example below is with Firefox browser.
  • Page 24: Help System

    Chapter 5 Web Configuration & Operation Unless connected directly on a local LAN, we recommend not using the auto-refresh function as it does generate a bit of traffic. 5.1.4 Help System The device has an online "help" system to aid the engineer when setting the parameters of the device. Each functional setting page is accompanied by a specific "help"...
  • Page 25: System Configuration

    Chapter 5 Web Configuration & Operation 5.2.1 System Configuration The configuration information entered here will be reported in the standard SNMP MIB2 for 'sysContact' (OID 1.3.6.1.2.1.1.4), 'sysName' (OID 1.3.6.1.2.1.1.5) and 'sysLocation' (OID 1.3.6.1.2.1.1.6). Remember to click the 'Save' button after entering the configuration information. 5.2.2 System Information The system information screen will display the configuration information, the hardware MAC address and version, the system time, the system "uptime"...
  • Page 26: System Ipv6

    Chapter 5 Web Configuration & Operation the configured IP settings will be used. The DHCP client will announce the configured System Name as hostname to provide DNS lookup. DHCP Option 60: Configure the DHCP option 60 vendor class ID. The allowed string length is 0 to 60, and the allowed content is the ASCII characters from 0x20 to 0x7E.
  • Page 27: System Auto Provision Configuration

    Chapter 5 Web Configuration & Operation 5.2.5 System Auto Provision Configuration Configure auto provision on this page. Auto Provision Mode: Indicates the auto provision operation mode. Possible modes are: Enabled: Enable auto provision mode operation. When auto provision mode operation is enabled, the device can download software and configuration automatically.
  • Page 28: System Time

    Chapter 5 Web Configuration & Operation 5.2.7 System Time Setup the device time. The setting example above is for Eastern Standard Time in the United States. Daylight savings time starts on the second Sunday in March at 2:00AM. Daylight savings ends on the first Sunday in November at 2:00AM. The daylight savings time offset is 60 minutes (1 hour).
  • Page 29: System Log Configuration

    Chapter 5 Web Configuration & Operation 5.2.8 System Log Configuration Configure System Log on this page. Server Mode: This sets the server mode operation. When the mode of operation is enabled, the syslog message will send out to syslog server (at the server address). The syslog protocol is based on UDP communication and received on UDP port 514.
  • Page 30: System Detailed Log

    Chapter 5 Web Configuration & Operation 5.2.10 System Detailed Log Displays individual log records. View each log, by ID number. 5.2.11 System CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well.
  • Page 31: Green Ethernet Led

    Chapter 5 Web Configuration & Operation 5.3.1 Green Ethernet LED Configure the LED light intensity to reduce power consumption. The LED light intensity may be adjusted in a percentage of intensity during programmable time periods. In the above setting example, the LED intensity has been adjusted to 50% during daylight hours and reduced to only 10% intensity during night hours.
  • Page 32: Thermal Protection

    Chapter 5 Web Configuration & Operation Port: The port number. “All” rules apply to all ports. Enabled: Select the checkbox to enable EEE function on a port. By default, all ports (except Fiber port) are enabled with EEE function. EEE Urgent Queues: It is possible to minimize the latency for specific frames, by mapping the frames to a specific queue (done with QOS), and then mark the queue as an urgent queue.
  • Page 33: Status

    Chapter 5 Web Configuration & Operation 5.4.2 Status Local Port: The port number. Temperature: Display the current temperature on a certain port. Port status: Display the current port status. 5.5 Ports Configurations related to the fiber and electrical ports are performed under the Ports menu. 5.5.1 Ports Configuration This page displays current port configurations and allows some configuration here.
  • Page 34: Ports Auto Laser Shutdown

    Chapter 5 Web Configuration & Operation Possible copper port settings are: Disabled - Disables the switch port operation. Auto - Port auto negotiating speed with the link partner, selecting the highest speed that is compatible with the link partner and negotiating the duplex mode. 10Mbps HDX - Forces the port to 10Mbps half duplex mode.
  • Page 35: Ports State

    Chapter 5 Web Configuration & Operation 5.5.3 Ports State Display an overview graphic of the switch. This is the same graphic overview shown when first logging into the switch for management. "Green" colored ports indicate a 100M linked state, while "Amber" colored ports indicate a 1G linked state. "Grey" ports have no link. The link status display can be updated by clicking the "Refresh"...
  • Page 36: Ports Traffic Overview

    Chapter 5 Web Configuration & Operation 5.5.5 Ports Traffic Overview Displays a comprehensive overview of traffic on all ports. Port: The logical port (1~5 & Fiber) for the data contained in the same row. Packets: The number of received and transmitted packets per port. Bytes: The number of received and transmitted bytes per port.
  • Page 37: Ports Detailed Statistics

    Chapter 5 Web Configuration & Operation QCE#: Indicates the index of QCE. Frame Type: Indicates the type of frame to look for incoming frames. Possible frame types are: Any: The QCE will match all frame type. Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. LLC: Only (LLC) frames are allowed.
  • Page 38 Chapter 5 Web Configuration & Operation Receive Total and Transmit Total Rx and Tx Packets: The number of received and transmitted (good and bad) packets. Rx and Tx Octets: The number of received and transmitted (good and bad) bytes. Includes FCS, but excludes framing bits. Rx and Tx Unicast: The number of received and transmitted (good and bad) unicast packets.
  • Page 39: Security

    Chapter 5 Web Configuration & Operation 5.6 Security Under the security heading are three major icons, switch, network and AAA (Authentication and Accounting). 5.6.1 Switch 5.6.1.1 Users This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser.
  • Page 40: Privilege Levels

    Chapter 5 Web Configuration & Operation Privilege Level: Select the appropriate privilege level for this user account. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully control of the device. But other values need to refer to each group privilege level.
  • Page 41: Auth Method

    Chapter 5 Web Configuration & Operation Debug: Only present in CLI. Privilege Levels: Every group has an authorization Privilege level for the following sub groups: configuration read-only configuration/execute read-write status/statistics read-only status/statistics read-write (e.g. for clearing of statistics) User Privilege should be the same or greater than the authorization Privilege level to have access to that group. 5.6.1.3 Auth Method This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces.
  • Page 42: Ssh

    Chapter 5 Web Configuration & Operation 5.6.1.4 SSH Configure SSH on this page. Mode: Indicates the SSH mode operation. Possible modes are: Enabled: Enable SSH mode operation. By default, it is enabled. Disabled: Disable SSH mode operation. Note: SSH is preferred to Telnet, unless the management network is trusted. Telnet passes authentication credentials in plain text, making those credentials susceptible to packet capture and analysis.
  • Page 43: Access Management

    Chapter 5 Web Configuration & Operation Private Key File: Indicates a private key file for uploading. Private Password: Configure private key pass phrase. The allowed string length is 0 to 60. 5.6.1.6 Access Management 5.6.1.6.1 Configuration Configure the access management table on this page. The maximum number of entries is 16. If the application's type matches any one of the access management entries, it will be allowed access to the switch.
  • Page 44: Access Management Statistics

    Chapter 5 Web Configuration & Operation Disabled: Disable access management ports mode operation. Port: The switch port number of the logical port. Allowed: Indicates that the host can access the switch from this port. Click the “Save” button to save settings or changes. Click the “Reset”...
  • Page 45 Chapter 5 Web Configuration & Operation Version: Indicates the SNMP supported version. Possible versions are: SNMP v1: Set SNMP supported version 1. SNMP v2c: Set SNMP supported version 2c. SNMP v3: Set SNMP supported version 3. Read Community: Indicates the community read access string to permit access to the SNMP agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 0x21 to 0x7E.
  • Page 46 Chapter 5 Web Configuration & Operation Trap Destination IPv6 Address: Indicates the SNMP trap destination IPv6 address. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'.
  • Page 47: Snmpv3 Community Configuration

    Chapter 5 Web Configuration & Operation 5.6.1.7.2 SNMPv3 Community Configuration Configure SNMPv3 community table on this page. The entry index key is Community. Community: Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
  • Page 48: Snmpv3 Group Configuration

    Chapter 5 Web Configuration & Operation The value of security level cannot be modified if entry already exists. That means it must first be ensured that the value is set correctly. Authentication Password: A string identifying the authentication password phrase. For MD5 authentication protocol, the allowed string length is 8 to 32 characters.
  • Page 49: Snmpv3 View Configuration

    Chapter 5 Web Configuration & Operation Click the “Reset” button to restore changed settings to the default settings. 5.6.1.7.5 SNMPv3 View Configuration Configure SNMPv3 view table on this page. The entry index keys are View Name and OID Subtree. View Name: A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
  • Page 50: Rmon

    Chapter 5 Web Configuration & Operation Security Level: Indicates the security model that this entry should belong to. Possible security models are: NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy. Auth, Priv: Authentication and privacy. Read View Name: The name of the MIB view defining the MIB objects for which this request may request the current values.
  • Page 51: Rmon Alarm Configuration

    Chapter 5 Web Configuration & Operation Buckets: The number of buckets requested for this entry. By default, 50 is specified. The allowed range is 1 - 3600. Buckets Granted: The number of buckets granted. Click the “Add New Entry” button to insert a new entry to the list. Click the “Delete”...
  • Page 52: Rmon Event Configuration

    Chapter 5 Web Configuration & Operation threshold, then an alarm will be generated. After a falling event has been generated, another such event will not be generated until the sampled value has risen above the falling threshold, reaches the rising threshold, and again moves back down to the failing threshold.
  • Page 53: Rmon Statistics Overview

    Chapter 5 Web Configuration & Operation 5.6.1.8.5 RMON Statistics Overview This RMON statistics overview page shows interface statistics. All values displayed have been accumulated since the last system reboot and are shown as counts per second. The system will automatically refresh every 60 seconds by default. ID: Displays an ID index.
  • Page 54: Rmon Alarm Overview

    Chapter 5 Web Configuration & Operation Octets: The total number of octets of data received. Pkts: The total number of packets (including bad packets, broadcast packets) received. Broadcast: The total number of good packets received that were directed to the broadcast address. Multicast: The total number of good packets received that were directed to a multicast address.
  • Page 55: Rmon Event Overview

    Chapter 5 Web Configuration & Operation 5.6.1.8.8 RMON Event Overview Event Index: Display the event entry index. Log Index: Display the log entry index. Log Time: Display Event log time. Log Description: Display Event description. 5.6.2 Network 5.6.2.1 Port Security Port Security Limit Control can restrict the number of users that can access the switch based on users’...
  • Page 56 Chapter 5 Web Configuration & Operation Port Configuration Port: Display the port number. “Port *” rules apply to all ports. Mode: Enable or disable port security limit control on a per port basis. To make limit control function work, port security limit control needs to be enabled globally and on a port.
  • Page 57: Switch Status

    Chapter 5 Web Configuration & Operation 5.6.2.1.2 Switch Status User Module Legend User Module Name: The full name of a module that may request Port Security services. Abbr: This column is the abbreviation for the user module used in the “Users” column in the “Port Status”. Port Status Port: Port number.
  • Page 58: Nas

    Chapter 5 Web Configuration & Operation MAC Address: When “Port Security Limit Control” is enabled globally and on a port, MAC addresses learned on a port shows in here. VLAN ID: Display VLAN ID that is seen on this port. State: Display whether the corresponding MAC address is forwarding or blocked.
  • Page 59 Chapter 5 Web Configuration & Operation Reauthentication Period: Specify the time interval for a connected device to be re-authenticated. By default, the re- authenticated period is set to 3600 seconds. The allowed range is 1 - 3600 seconds. EAPOL Timeout: Specify the time that the switch waits for a supplicant response during an authentication session before transmitting a Request Identify EAPOL packet.
  • Page 60 Chapter 5 Web Configuration & Operation connected to a port, the one that comes first when the port's link comes up will be the first one considered. If that supplicant doesn't provide valid credentials within a certain amount of time, another supplicant will get a chance. Once a supplicant is successfully authenticated, only that supplicant will be allowed access.
  • Page 61: Switch Status

    Chapter 5 Web Configuration & Operation 5.6.2.2.2 Switch Status Port: Port number. Click a port to view the detailed NAS statistics. Admin State: Display the port’s current administrative state. Port Status: Display the port state. Last Source: The source MAC address carried in the most recently received EAPOL frame for EAPOL-based authentication. Last ID: The user name (supplicant identity) carried in the most recently received Response Identity EAPOL frame for EAPOL-based authentication.
  • Page 62: Acl

    Chapter 5 Web Configuration & Operation Logoff: The number of valid EAPOL Logoff frames that have been received by the switch. Invalid Type: The number of EAPOL frames that have been received by the switch in which the frame type is not recognized.
  • Page 63: Rate Limiters

    Chapter 5 Web Configuration & Operation parameter on the ACL Ports Configuration page. Then open the Mirror Configuration page, set the “Port to mirror on” field to the required destination port, and leave the “Mode” field Disabled. Logging: Enable logging of matched frames to the system log. To view log entries, go to System menu and then click the “System Log Information”...
  • Page 64 Chapter 5 Web Configuration & Operation Frame Type: The type of frame that matches to this rule. Action: Display the action type, either to permit or deny. Rate Limiter: Display rate limiter is enabled or disabled when matched frames are found. Port Redirect: Display port redirect is enabled or disabled.
  • Page 65 Chapter 5 Web Configuration & Operation Counter: Display the number of frames that have matched any of the rules defined for this ACL. VLAN Parameters 802.1Q Tagged: Select whether or not the frames should be tagged. VLAN ID Filter: Select the VLAN ID filter for this ACE. Any: No VLAN ID filter is specified.
  • Page 66 Chapter 5 Web Configuration & Operation Any: No sender IP filter is specified. Host: Specify the sender IP address. Network: Specify the sender IP address and sender IP mask. Target IP Filter: Specify the destination IP address. Any: No target IP filter is specified. Host: Specify the target IP address.
  • Page 67: Acl Status

    Chapter 5 Web Configuration & Operation DIP Address: Specify a destination IP address. DIP Mask: Specify a destination subnet mask. 5.6.2.3.4 ACL Status This page shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations.
  • Page 68: Dhcp

    Chapter 5 Web Configuration & Operation CPU: Forward packet that matched the specific ACE to CPU. CPU Once: Forward first packet that matched the specific ACE to CPU. Counter: The counter indicates the number of times the ACE was hit by a frame. Conflict: Indicate the hardware status of the specific ACE.
  • Page 69: Dhcp Snooping Statistics

    Chapter 5 Web Configuration & Operation Relay Mode: Enable or disable the DHCP relay function. Relay Server: Enter DHCP server IP address that is used by the switch’s DHCP relay agent. Relay Information Mode: Enable or disable DHCP Relay option 82 function. Please note that “Relay Mode” must be enabled before this function is able to take effect.
  • Page 70: Dhcp Relay Statistics

    Chapter 5 Web Configuration & Operation 5.6.2.4.4 DHCP Relay Statistics DHCP Relay Statistics Transmit to Server: The number of packets that are relayed from client to server. Transmit Error: The number of packets that resulted in errors while being sent to clients. Receive from Client: The number of packets received from server.
  • Page 71: Ip Source Guard

    Chapter 5 Web Configuration & Operation 5.6.2.5 IP Source Guard 5.6.2.5.1 Configuration IP Source Guard Configuration Mode: Enable or disable IP source guard globally. Translate dynamic to static: Click this button to translate dynamic entries to static ones. Port Mode Configuration Port: The port number.
  • Page 72: Dynamic Table

    Chapter 5 Web Configuration & Operation Click the “Delete” button to remove a newly-inserted entry or select the checkbox to remove a saved entry during the next save. Click the “Save” button to save settings or changes. Click the “Reset” button to restore changed settings to the default settings. 5.6.2.5.3 Dynamic Table The Dynamic IP Source Guard table shows entries sorted by port, VLAN ID, IP address and MAC address.
  • Page 73: Static Table

    Chapter 5 Web Configuration & Operation 5.6.2.6.2 Static Table Port: Select a port to which a static entry is bound. VLAN ID: Specify a configured VLAN ID. MAC Address: Specify an allowed source MAC address in ARP request packets. IP Address: Specify an allowed source IP address in ARP request packets. Click the “Add New Entry”...
  • Page 74: Aaa

    Chapter 5 Web Configuration & Operation 5.6.2.7 AAA 5.6.2.7.1 Configuration Common Server Configuration Timeout: The time the switch waits for a reply from an authentication server before it retransmits the request. Deadtime: Deadtime is the period during which the switch will not send new requests to a server that has failed to respond to a previous request.
  • Page 75: Radius Overview

    Chapter 5 Web Configuration & Operation Hostname: The hostname or IP address for the TACACS+ authentication server. Port: The UDP port to be used on the TACACS+ server for authentication. Key: Specify the secret key up to 63 characters. This is shared between the TACACS+ sever and the switch 5.6.2.7.2 RADIUS Overview RADIUS Authentication/Accounting Server Status Overview IP Address: The configured IP address and UPD port number.
  • Page 76 Chapter 5 Web Configuration & Operation RADIUS Authentication Statistics for Server Access Accepts: The number of RADIUS Access-Accept packets (valid or invalid) received from the server. Access Rejects: The number of RADIUS Access-Reject packets (valid or invalid) received from the server. Access Challenges: The number of RADIUS Access-Challenge packets (valid or invalid) received from the server.
  • Page 77 Chapter 5 Web Configuration & Operation RADIUS Accounting Statistics for Server Responses: The number of RADIUS packets (valid or invalid) received from the server. Malformed Responses: The number of malformed RADIUS packets received from the server. Malformed packets include packets with an invalid length. Bad authenticators or unknown types are not included as malformed access responses. Bad Authenticators: The number of RADIUS packets containing invalid authenticators received from the server.
  • Page 78: Loop Protection

    Chapter 5 Web Configuration & Operation 5.7 Loop Protection Loops sometimes occur in a network due to improper connecting, hardware problem or faulty protocol settings. When loops are seen in a switched network, they consume switch resources and thus downgrade switch performance. Loop Protection feature is provided in this switch and can be enabled globally or on a per port basis.
  • Page 79: Status

    Chapter 5 Web Configuration & Operation 5.7.2 Status Port: The port number. Action: Display the configured action that the switch will react when loops occur. Transmit: Display the configured transmit (Tx) mode. Loops: The number of loops detected on a port. Status: The current loop status detected on a port.
  • Page 80 Chapter 5 Web Configuration & Operation MVR Configurations MVR Mode: Enable or disable MVR feature globally on this device. Any multicast data from source ports will be sent to associated receiver ports registered in the table. By default, MVR feature is turned off. VLAN Interface Setting MVR ID: Specify multicast VLAN ID.
  • Page 81: Statistics

    Chapter 5 Web Configuration & Operation MVR Channel Configuration VLAN ID: Display the selected entry’s multicast VLAN ID. This field is not editable. VLAN Name: Display the selected entry’s multicast VLAN Name. This field is not editable. Start Address: Enter the starting IPv4 or IPv6 multicast streaming address that will be used as a streaming channel. End Address: Enter the ending IPv4 or IPv6 multicast streaming address that will be used as a streaming channel.
  • Page 82: Mvr Channel Groups

    Chapter 5 Web Configuration & Operation 5.8.3 MVR Channel Groups Start from VLAN ____ and Group Address _______ with 20 entries per page. This table displays MVR channels (groups) information and is sorted by VLAN ID. VLAN ID: VLAN ID of the group. Groups: Group ID Port Members: Ports that belong to this group.
  • Page 83: Ipmc

    Chapter 5 Web Configuration & Operation 5.9 IPMC The “IPMC” menu includes IGMP Snooping and MLD Snooping sub menu. Select the appropriate menu to set up detailed configurations. 5.9.1 IGMP Snooping The Internet Group Management Protocol (IGMP) is a communications protocol used to manage the membership of Internet Protocol multicast groups.
  • Page 84: Vlan Configuration

    Chapter 5 Web Configuration & Operation IGMP SSM Range: SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Leave Proxy Enabled: Suppresses leave messages unless received from the last member port in the group. IGMP leave proxy suppresses all unnecessary IGMP leave messages so that a non-querier switch forwards an IGMP leave packet only when the last dynamic member port leaves a multicast group.
  • Page 85: Port Group Filtering

    Chapter 5 Web Configuration & Operation RV: The robustness variable (RV) allows tuning for the expected packet loss on a subnet. If a subnet is susceptible to packet loss, this value can be increased. The RV value must not be zero and should not be one. The value should be 2 or greater.
  • Page 86: Status

    Chapter 5 Web Configuration & Operation 5.9.1.4 Status Statistics VLAN ID: The VLAN ID of this entry. Querier Version: The current working Querier version. Host Version: The current host version. Querier Status: Show the Querier status that is either "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled.
  • Page 87: Ipv4 Sfm Information

    Chapter 5 Web Configuration & Operation 5.9.1.6 IPv4 SFM Information VLAN ID: Display the VLAN ID of the group. Groups: Display the IP address of a multicast group. Port: The switch port number. Mode: The filtering mode maintained per VLAN ID, port number and group address. Source Address: The source IP address available for filtering.
  • Page 88: Vlan Configuration

    Chapter 5 Web Configuration & Operation snoop on MLD Listener Query and Report packets transferred between IP multicast routers and IP multicast service subscribers to identify the multicast group members. The switch simply monitors the IGMP packets passing through it, picks out the group registration information and configures the multicast filters accordingly.
  • Page 89: Port Group Filtering

    Chapter 5 Web Configuration & Operation MLD Querier: Enable to join querier election in the VLAN. When enabled, the switch can serve as the MLDv2 querier in the bidding process with other competing multicast routers or switches. Once it becomes querier, it will be responsible for asking hosts periodically if they want to receive multicast traffic.
  • Page 90: Status

    Chapter 5 Web Configuration & Operation 5.9.2.4 Status Statistics VLAN ID: The VLAN ID of this entry. Querier Version: The current working Querier version. Host Version: The current host version. Querier Status: Show the Querier status that is either "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled.
  • Page 91: Ipv6 Sfm Information

    Chapter 5 Web Configuration & Operation 5.9.2.6 IPv6 SFM Information VLAN ID: Display the VLAN ID of the group. Group: Display the IP address of a multicast group. Port: The switch port number. Mode: The filtering mode maintained per VLAN ID, port number and group address. Source Address: The source IP address available for filtering.
  • Page 92: Configuration

    Chapter 5 Web Configuration & Operation 5.10.1 Configuration LLDP Parameters Tx Interval: Specify the interval between LLDP frames are sent to its neighbours for updated discovery information. The valid values are 5~32768 seconds. The default is 30 seconds. Tx Hold: This setting defines how long LLDP frames are considered valid and is used to compute the TTL. Valid range is 2~10 times.
  • Page 93: Lldp-Med

    Chapter 5 Web Configuration & Operation 5.10.2 LLDP-MED LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, inventory management and location information.
  • Page 94 Chapter 5 Web Configuration & Operation NAD83/NAVD88: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich; The associated vertical datum is the North American Vertical Datum of 1988 (NAVD88). This datum pair is to be used when referencing locations on land, not near tidal water (which would use Datum = NAD83/MLLW). NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich;...
  • Page 95: Neighbours

    Chapter 5 Web Configuration & Operation Emergency Call Service Emergency Call Service: Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Policies Policy ID: Specify the ID for this policy. Application Type: The application types include “Voice”, “Voice Signalling”, “Guest Voice”, “Guest Voice Signalling”, “Softphone Voice”, “Video Conferencing”, “Streaming”, “Video Signalling”.
  • Page 96: Lldp-Med Neighbours

    Chapter 5 Web Configuration & Operation 5.10.4 LLDP-MED Neighbours This page displays information about LLDP-MED neighbours detected on the network. 5.10.5 Neighbours EEE Information Local Port: The port for this switch on which the LLDP frame was received. Tx Tw: The link partner's maximum time that transmit path can hold-off sending data after deassertion of LPI. Rx Tw: The link partner's time that receiver would like the transmitter to hold-off to allow time for the receiver to wake from sleep.
  • Page 97: Port Statistics

    Chapter 5 Web Configuration & Operation 5.10.6 Port Statistics Global Counters Total Neighbours Entries Added: Shows the number of new entries added since the switch was rebooted, and for which the remote TTL has not yet expired. Total Neighbors Entries Deleted: The number of LLDP neighbors which have been removed from the LLDP remote systems MIB for any reason.
  • Page 98: Mac Table

    Chapter 5 Web Configuration & Operation 5.11 MAC Table The “MAC Table” menu contains configuration and status sub menu. Select the configuration page to set up detailed configuration 5.11.1 Configuration Disable Automatic Aging: Learned MAC addresses will appear in the table permanently. Aging Time: Set up the aging time for a learned MAC to be appeared in MAC learning table.
  • Page 99: Mac Address Table

    Chapter 5 Web Configuration & Operation Click the “Save” button to save settings or changes. Click the “Reset” button to restore changed settings to the default settings. 5.11.2 MAC Address Table The MAC Address Table shows both static and dynamic MAC addresses learned from CPU or switch ports. You can enter the starting VLAN ID and MAC addresses to view the desired entries.
  • Page 100: Port To Group Mapping

    Chapter 5 Web Configuration & Operation 5.12.1 Port to Group Mapping Group ID: The total VLAN Translation group can be used is 11 which is automatically created in Group Mapping Table when entering “Port to Group Mapping” page. A port can be mapped to any of the groups. Multiple ports can be mapped to a single group with the same Group ID.
  • Page 101: Membership Configuration

    Chapter 5 Web Configuration & Operation VLANs help control traffic: Traditionally, when networks are not segmented into VLANs, congestion can be easily caused by broadcast traffic that is directed to all devices. To minimize the possibility of broadcast traffic damaging the entire network, VLANs can help group devices that communicate frequently with other in the same VLAN so as to divide the entire network into several broadcast domains.
  • Page 102: Ports Configuration

    Chapter 5 Web Configuration & Operation 5.13.2 Ports Configuration Ethertype for Custom S-ports: Specify ether type used for customer s-ports. VLAN Port Configuration Port: The port number. “All” settings apply to all ports. Port Type: There are four port types available. Each port type’s ingress and egress action is described in the following table.
  • Page 103: Membership Status

    Chapter 5 Web Configuration & Operation Frame Type: Select the accepted frame types. Available options include All (accept all frames), Tagged (accept only tagged frames), Untagged (accept only untagged frames). This parameter affects VLAN ingress processing. If the port only accepts tagged frames, untagged frames received on the port are discarded.
  • Page 104: Private Vlans

    Chapter 5 Web Configuration & Operation Conflicts: Display whether conflicts exist or not. When a software module requests to set VLAN membership or VLAN port configuration, the following conflicts can occur: *Functional conflicts between features. *Conflicts due to hardware limitations. *Direct conflicts between user modules.
  • Page 105: Port Isolation

    Chapter 5 Web Configuration & Operation 5.14.2 Port Isolation Private VLAN is used to group ports together so as to prevent communications within PVLAN. Port Isolation is used to prevent communications between customer ports in a same Private VLAN. The port that is isolated from others cannot forward any unicast, multicast or broadcast traffic to any other ports in the same PVLAN.
  • Page 106: Membership Status

    Chapter 5 Web Configuration & Operation Click the “Reset” button to restore changed settings to the default settings. 5.15.1.2 Membership Status This page shows the status of current VCL rules. MAC Address: Display the configured MAC addresses. VLAN ID: Display the VLAN ID of this membership entry. Port Members: Display ports that accept the configured MAC address.
  • Page 107: Group To Vlan

    Chapter 5 Web Configuration & Operation Ethernet: Ether Type (etype) value. By default, it is set to 0x0800. The range allowed is 0x0600 to 0xffff. SNAP: This includes OUI (Organizationally Unique Identifier) and PID (Protocol ID) values. OUI: A value in the format of xx-xx-xx where each pair (xx) in the string is a hexadecimal value in the ranges of 0x00-0xff.
  • Page 108: Ip Subnet-Based Vlan

    Chapter 5 Web Configuration & Operation 5.15.3 IP Subnet-based VLAN IP Subnet-based VLAN configuration is to map untagged ingress frames to a specific VLAN if the source address is found in the IP subnet-to-VLAN mapping table. When IP subnet-based VLAN classification is enabled, the source address of untagged ingress frame is checked against the IP subnet-to-VLAN mapping table.
  • Page 109: Configuration

    Chapter 5 Web Configuration & Operation 5.16.1 Configuration Voice VLAN Configuration Mode: Enable or disable Voice VLAN function on this switch. VLAN ID: Assign a VLAN ID to this Voice VLAN. Only one Voice VLAN is supported on the switch. By default, VLAN 1000 is set.
  • Page 110: Oui

    Chapter 5 Web Configuration & Operation Discovery Protocol: Select a method for detecting VoIP traffic. By default, OUI is used. OUI: Traffic from VoIP devices is detected by the Organizationally Unique Identifier (OUI) of the source MAC address. OUI numbers are assigned to manufacturers and form the first three octets of a device MAC address. MAC address OUI numbers must be configured in the Telephony OUI list so that the switch recognizes the traffic as being from a VoIP device.
  • Page 111: Port Classification

    Chapter 5 Web Configuration & Operation 5.17.1 Port Classification Port: The port number. “All” rules will apply to all ports. QoS class: Indicate the default QoS class. A QoS class of 0 has the lowest priority. By Default, 0 is used. DP Level: Select the default Drop Precedence Level.
  • Page 112: Port Scheduler

    Chapter 5 Web Configuration & Operation This page allows users to set each port’s allowed bandwidth. Port: The port number. “All” settings apply to all ports. Enabled: Select the checkbox to enable port policing function on a port. Rate: Indicate the rate for the policer. By default, 500kbps is used. The allowed range for kbps and fps is 100 to 1000000. The allowed range for Mbps and kfps is 1 to 3300Mbps.
  • Page 113: Port Shaping

    Chapter 5 Web Configuration & Operation Weight mode: Deficit Weighted Round-Robin (DWRR) queuing which specifies a scheduling weight for each queue. (Options: Strict, Weighted; Default: Strict) DWRR services the queues in a manner similar to WRR, but the next queue is serviced only when the queue’s Deficit Counter becomes smaller than the packet size to be transmitted. Queue Shaper/Port Shaper/Queue Shaper Enable: Select the checkbox to enable queue shaper on a certain queue for this selected port.
  • Page 114: Port Tag Remarking

    Chapter 5 Web Configuration & Operation 5.17.5 Port Tag Remarking Click the port number that you want change settings. Tag Remarking Mode: Select the appropriate remarking mode used by this port. Classified: Use classified PCP/DEI values. Default: Use default PCP/DEI values (Default PCP:0; Default DEI:0). Mapped: Use the mapping of the classified QoS class values and DP levels to PCP/DEI values.
  • Page 115: Port Dscp

    Chapter 5 Web Configuration & Operation 5.17.6 Port DSCP Port: List the number of each. “All” settings apply to all ports. Ingress Translate: Select the checkbox to enable ingress translation of DSCP values based on the selected classification method. Ingress Classify: Select the appropriate classification method: Disable: No ingress DSCP classification is performed.
  • Page 116: Dscp-Based Qos

    Chapter 5 Web Configuration & Operation 5.17.7 DSCP-Based QoS DSCP: DSCP value in ingress packet. DSCP range is from 0 to 63. Trust: Select the checkbox to indicate that DSCP value is trusted. Only trusted DSCP values are mapped to a specific QoS class and drop precedence level (DPL).
  • Page 117: Dscp Translation

    Chapter 5 Web Configuration & Operation 5.17.8 DSCP Translation DSCP: DSCP value in ingress packet. DSCP range is from 0 to 63. Ingress Translate: Enable Ingress Translation of DSCP values based on the specified classification method. Ingress Classify: Enable classification at ingress side as defined in the QoS port DSCP Configuration Table. Egress Remap DP0: Remap DP0 value to the selected DSCP value.
  • Page 118: Qos Control List

    Chapter 5 Web Configuration & Operation QoS Class: List of actual QoS class values. DPL: List of actual DPL values DSCP: Select the DSCP value to map QoS class and DPL value. DSCP value selected for “*” will map to all QoS class and DPL value.
  • Page 119 Chapter 5 Web Configuration & Operation QCE Configuration Port Members: Select ports that use this rule. Key Parameters Tag: Select VLAN tag type (Tag or Untag). By default, any type is used. VID: Select VID preference. By default, any VID is used. Select “Specific”, if you would like to designate a VID to this QCL entry.
  • Page 120 Chapter 5 Web Configuration & Operation SNAP: SubNetwork Access Protocol can be distinguished by an OUI and a Protocol ID. (Options for PID: Any, Specific (0x00-0xffff); Default: Any) If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP.
  • Page 121: Storm Control

    Chapter 5 Web Configuration & Operation 5.17.11 Storm Control Storm Control is used to keep a network from downgraded performance or a complete halt by setting up a threshold for traffic like broadcast, unicast and multicast. When a device on the network is malfunctioning or application programs are not well designed or properly configured, storms may occur and will degrade network performance or even cause a complete halt.
  • Page 122: Upnp

    Chapter 5 Web Configuration & Operation 5.19 UPnP Mode: Enable or disable UPnP operation. TTL: TTL (Time to live) is used to configure how many steps an UPnP advertisement can travel before it disappears. Advertising Duration: This defines how often an UPnP advertisement is sent. The duration is carried in Simple Service Discover Protocol (SSDP) packets which informs a control point how often it should receive a SSDP advertisement message from the switch.
  • Page 123: Ping6

    Chapter 5 Web Configuration & Operation 5.20.2 Ping6 This Ping function is for ICMPv6 packets. IP Address: Enter the IP address that you wish to ping. Ping Length: The size or length of echo packets. Ping Count: The number of echo packets will be sent. Ping Interval: The time interval between each ping request.
  • Page 124: Maintenance

    Chapter 5 Web Configuration & Operation Cross C: Abnormal cross-pair coupling with pair C Cross D: Abnormal cross-pair coupling with pair D Length A/B/C/D: The length (in meters) of the cable pair. Note: 1. If a specific port is selected, the test will take approximately 5 seconds. If all ports are selected, it can run approximately 15 seconds.
  • Page 125: Software

    Chapter 5 Web Configuration & Operation 5.21.3 Software 5.21.3.1 Upload Update the latest Firmware file. Select a Firmware file from your local device and then click “Upload” to start updating. 5.21.3.2 Image Select Select the image file to be used in this device. 5.21.4 Configuration 5.21.4.1 Save Save the current running configurations in XML format in your local device.
  • Page 126: Appendix A: Vlan Configurations

    Appendix A VLAN Configurations Appendix A: VLAN Configurations This Appendix will cover the following VLAN related configurations: A. Management VLAN (Local management) B. Management VLAN (Remote management) C. 802.1Q VLAN D. Q IN Q VLAN By default, the IP address is 192.168.0.1. For the first-time user, you can use any one of the Fast Ethernet RJ-45 ports to change the IP address via CLI or Web user interface to the desired one.
  • Page 127 Appendix A VLAN Configurations VLANs > Port Configuration 5. Set Port 1’s port type to “Unaware”, Frame Type to “All”, Port VLAN ID to “1000”, Tx Tag to “Untag_all”. 6. Click “Save” button. System > IP > IP Configuration 7. Input management VLAN information. Set VLAN ID to “1000” and IP address to “192.168.0.250”. 8.
  • Page 128 Appendix A VLAN Configurations B. Remote Management VLAN VLANs > Membership Configuration 1. Connect your PC to a port instead of the Fiber port to access the device with VLAN 1. 2. Click “Add New VLAN” button to insert a new entry. 3.
  • Page 129 Appendix A VLAN Configurations System > IP > IP Configuration 7. Input management VLAN information. Set VLAN ID to “1000” and IP address to “140.138.1.20”. 8. Click “Save” button to change management VLAN from 1 to 1000. Once you click “Save” button, your local management PC is immediately disconnected from this device.
  • Page 130 Appendix A VLAN Configurations C. 802.1Q VLAN VLANs > Membership Configuration 1. Click “Add New VLAN” to insert new entries. 2. Enter VLAN 20 settings (20, DataVLAN, port 2 & Fiber port). 3. Enter VLAN 30 settings (30, MulticastVLAN, port 3 & Fiber port). 4.
  • Page 131 Appendix A VLAN Configurations VLANs > Port configuration 7. Set Port 2, 3, 4, 5’s Port Type to “Unaware”, Frame Type to “All” 8. Set Port 2, 3, 4, 5’s Port Port VLAN ID to “20”, “30”, “40”, “50”, respectively. 9.
  • Page 132 Appendix A VLAN Configurations VLANs > Membership Configuration 1. Click “Add New VLAN” to insert a new entry. 2. Enter VLAN ID 299 settings (299, DoubleTagVLAN, Port 4 & 9). 3. Click “Save” button. VLANs > VLAN Port configuration 4. Set Port 4’s Port Type to “Unaware”, Frame Type to “All”, Port VLAN ID to “299”, Tx Tag to “Untag_pvid”. 5.
  • Page 133: Appendix B: Acronyms

    Appendix B Acronyms Appendix B: Acronyms ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
  • Page 134 Appendix B Acronyms DHCP DHCP is an acronym for Dynamic Host Configuration Protocol. It is a protocol used for assigning dynamic IP addresses to devices on a network. DHCP Relay DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
  • Page 135 Appendix B Acronyms connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message. HTTPS HTTPS is an acronym for Hypertext Transfer Protocol over Secure Socket Layer. It is used to indicate a secure HTTP connection.
  • Page 136 Appendix B Acronyms IPMC Profile IPMC Profile is an acronym for IP MultiCast Profile. IPMC Profile is used to deploy the access control on IP multicast streams. IP Source Guard IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings.
  • Page 137 Appendix B Acronyms Mirroring For debugging network problems or monitoring network traffic, the switch system can be configured to mirror frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.) Both incoming (source) and outgoing (destination) frames can be mirrored to the mirror port.
  • Page 138 Appendix B Acronyms A LLDP frame contains multiple TLVs For some TLVs it is configurable if the switch shall include the TLV in the LLDP frame. These TLVs are known as optional TLVs. If an optional TLVs is disabled the corresponding information is not included in the LLDP frame.
  • Page 139 Appendix B Acronyms PPPoE PPPoE is an acronym for Point-to-Point Protocol over Ethernet. It is a network protocol for encapsulating Point-to- Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with ADSL services where individual users connect to the ADSL transceiver (modem) over Ethernet and in plain Metro Ethernet networks (Wikipedia). Private VLAN In a private VLAN, PVLANs provide layer 2 isolation between ports within the same broadcast domain.
  • Page 140 Appendix B Acronyms RDI is an acronym for Remote Defect Indication. It is a OAM functionality that is used by a MEP to indicate defect detected to the remote peer MEP. Router Port A router port is a port on the Ethernet switch that leads switch towards the Layer 3 multicast device. RSTP In 1998, the IEEE with document 802.1w introduced an evolution of STP: the Rapid Spanning Tree Protocol, which provides for faster spanning tree convergence after a topology change.
  • Page 141 Appendix B Acronyms SPROUT Stack Protocol using ROUting Technology. An advanced protocol for almost instantaneous discovery of topology changes within a stack as well as election of a master switch. SPROUT also calculates parameters for setting up each switch to perform shortest path forwarding within the stack. SSID Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach.
  • Page 142 Appendix B Acronyms TELNET TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password.
  • Page 143 Appendix B Acronyms VLAN Virtual LAN. A method to restrict communication between switch ports. VLANs can be used for the following applications: VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and members of VLAN 1.
  • Page 144 Appendix B Acronyms WPS is an acronym for Wi-Fi Protected Setup. It is a standard for easy and secure establishment of a wireless home network. The goal of the WPS protocol is to simplify the process of connecting any home device to the wireless network (Wikipedia).
  • Page 145 Revisions Version Description Date V1.0 Formal release July 2014 V1.1 Revise Chapter 3 cable tray & add LAN cable protection holder December 2014...

Table of Contents