LevelOne GEP-2651 User Manual

LevelOne GEP-2651 User Manual

26-port web smart gigabit poe switch
Hide thumbs Also See for GEP-2651:
Table of Contents

Advertisement

LevelOne
User Manual
GEP-2651
26-Port Web Smart Gigabit PoE Switch, 24
PoE Outputs, 2 x SFP/RJ45 Combo, 185W

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GEP-2651 and is the answer not in the manual?

Questions and answers

Summary of Contents for LevelOne GEP-2651

  • Page 1 LevelOne User Manual GEP-2651 26-Port Web Smart Gigabit PoE Switch, 24 PoE Outputs, 2 x SFP/RJ45 Combo, 185W...
  • Page 2 GEP-2651 User's Manual 26-Port Web Smart Gigabit PoE Switch Release 6.23  2015, Manufacture Corporation. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies Publication date: June, 2015 Revision A1...
  • Page 3: About This Manual

    Manufacture Technology. Purpose This manual gives specific information on how to operate and use the management functions of the GEP-2651 Audience The Manual is intended for use by network administrators who are responsible for operating and maintaining network equipment; consequently, it assumes a basic working knowledge of general switch functions, the Internet Protocol (IP), and Simple Network Management Protocol (SNMP).
  • Page 4 cause harmful this device must accept any interference received, including interference that may interference, cause undesired operation. CE mark This is a Class B device, In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. Warning Emphasizes important information or calls your attention to related features or instructions.
  • Page 5: Table Of Contents

    Table of Contents Revision History .............................. ix INTRODUCTION ........................1 CHAPTER 1 OPERATION OF WEB-BASED MANAGEMENT ..... 2 CHAPTER 2 SYSTEM CONFIGURATION ........... 6 2-1 System ..............................6 2-1.1 Information ............................. 6 2-1.2 IP ................................7 2-1.3 NTP ................................ 10 2-1.4 Time ...............................
  • Page 6 2-8.1 Bridge Setting ............................95 2-8.2 MSTI Mapping ............................98 2-8.3 MSTI Priorities ............................ 100 2-8.4 CIST Ports............................101 2-8.5 MSTI Ports ............................104 2-9 IPMC ..............................106 2-9.1 IGMP Snooping ..........................106 2-9.1.1 Basic Configuration........................106 2-9.1.2 VLAN Configuration ........................109 2-10 LLDP ..............................
  • Page 7 2-20 Switch2go ............................184 2-20.1 Switch2go setting ..........................184 2-20.2 User Link Management ........................186 2-20.3 Port Name Service ........................... 187 2-21 SMTP Configuration ........................188 CHAPTER 3. MONITOR ................190 3-1 System ..............................190 3-1.1 Information ............................190 3-1.2 IP Status .............................. 193 3-1.3 Log ...............................
  • Page 8 3-8.1 Bridge Status ............................253 3-8.2 Port Status ............................255 3-8.3 Port Statistics ............................257 3-10 IPMC ..............................259 3-10.1 IGMP Snooping ..........................259 3-10.1.1 Status ............................259 3-10.1.2 Group Information ........................261 3-11 LLDP ..............................263 3-11.1 Neighbour ............................263 3-11.2 LLDP-MED Neighbour ........................
  • Page 9 5-4.4 Activate ............................... 302 5-4.5 Delete ..............................303 CHAPTER 6 DMS-MANAGEMENT................304 6-1 Information ............................304 6-2 Device List ............................306 CHAPTER 7 DMS-GRAPHIC MONITORING ............307 7-1 Topology View ........................... 307 7-2 Floor View ............................308 7-3 Map View ............................309 CHAPTER 8 DMS-MAUNTENANCE ................
  • Page 10: Revision History

    Revision History Release Date Revision V6.23 06/11/2015 Publication date: June, 2015 Revision A1...
  • Page 11: Introduction

    In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the GEP-2651 through the web by (RJ-45) serial interface and Ethernet ports step-by-step. Many explanations in detail of hardware and software functions are shown as well as the examples of the operation for web-based interface.
  • Page 12 This looks inconvenient, In the GEP-2651, allowed two or more users using administrator’s identity to manage this switch, which administrator to do the last setting, it will be an available configuration to effect the system.
  • Page 13 AS GEP-2651 the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the Switch default ip 192.168.1.1 Figure 1 The login page Publication date: June, 2015 Revision A1...
  • Page 14: Chapter 2 System Configuration

    System Configuration Chapter 2 This chapter describes the entire basic configuration tasks which includes the System Information and any manage of the Switch (e.g. Time, Account, IP, Syslog and NTP.) System You can identify the system by configuring the contact information, name, and location of the switch.
  • Page 15: System

    System Location:  The physical location of this node(e.g., telephone closet, 3rd floor). The allowed string length is 0 to 128, and the allowed content is the ASCII characters from 32 to 126. Publication date: June, 2015 Revision A1...
  • Page 16: 2-1.2 Ip

    2-1.2 IP The IPv4 address for the switch could be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to change the switch's default settings to values that are compatible with your network. You may also need to establish a default gateway between the switch and management stations that exist on another network segment.
  • Page 17 Parameter description: IP Configuration Mode:  Configure whether the IP stack should act as a Host or a Router. In Host mode, IP traffic between interfaces will not be routed. In Router mode traffic is routed between all interfaces. DNS Server ...
  • Page 18 The IPv4 network mask, in number of bits (prefix length). Valid values are between 0 and 30 bits for a IPv4 address. If DHCP is enabled, this field is not used. The field may also be left blank if IPv4 operation on the interface is not desired.
  • Page 19: 2-1.3 Ntp

    2-1.3 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manually specify an user-defined NTP server as well as Time Zone, the switch will sync the time in a short after pressing <Apply>...
  • Page 20 '::192.1.2.34'. Buttons  These buttons are displayed on the NTP page: Apply – Click to save changes. Reset - Click to undo any changes made locally and revert to previously saved values. Publication date: June, 2015 Revision A1...
  • Page 21: 2-1.4 Time

    2-1.4 Time The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour” and “Minute” within the valid value range indicated in each item. Web Interface To configure Time in the web interface: 1.
  • Page 22 Parameter description: Time Configuration Clock Source:  There are two modes for configuring how the Clock Source from. Select "Use Local Settings" : Clock Source from Local Time. Select "Use NTP Server" : Clock Source from NTP Server. System Date: ...
  • Page 23 Recurring Configuration Start time settings:  Week - Select the starting week number. Day - Select the starting day. Month - Select the starting month. Hours - Select the starting hour. Minutes - Select the starting minute. End time settings: ...
  • Page 24: 2-1.5 Log

    2-1.5 Log The log is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages.
  • Page 25: Green Ethernet

    2-2 Green Ethernet EEE is a power saving option that reduces the power usage when there is low or no traffic utilization. EEE works by powering down circuits when there is no traffic. When a port gets data to be transmitted all circuits are powered up.
  • Page 26 Parameter description: Optimize EEE for The switch can be set to optimize EEE for either best power saving or least traffic latency. Port:  The switch port number of the logical port. ActiPHY :  Link down power savings enabled. ActiPHY works by lowering the power for a port when there is no link.
  • Page 27: Ports Configuration

    2-3 Ports Configuration The section describes to configure the Port detail parameters of the switch. Others you could using the Port configure to enable or disable the Port of the switch. Monitor the ports content or status in the function. 2-3.1 Ports This page displays current port configurations.
  • Page 28 Link :  The current link state is displayed graphically. Green indicates the link is up and red that it is down. Current Link Speed :  Provides the current link speed of the port. Configured Link Speed :  Selects any available link speed for the given switch port.
  • Page 29 Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Upper right icon (Refresh)  You can click them for refresh the Port link Status by manual Publication date: June, 2015 Revision A1...
  • Page 30: 2-3.2 Ports Description

    2-3.2 Ports Description The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides user to write down an alphanumeric string describing the full name and version identification for the system’s hardware type, software version, and networking application Web Interface To configure an Port Description in the web interface: 1.
  • Page 31: 2-4Dhcp

    2-4DHCP The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from adding their own DHCP servers to the network. 2-4.1 Server 2-4.1.1 Mode This page configures global mode and VLAN mode to enable/disable DHCP server per system and per VLAN.
  • Page 32 Parameter description: Mode :  Configure the operation mode per system. Possible modes are: Enabled: Enable DHCP server per system. Disabled: Disable DHCP server pre system. VLAN Range :  Indicate the VLAN range in which DHCP server is enabled or disabled. The first VLAN ID must be smaller than or equal to the second VLAN ID.
  • Page 33: 2-4.1.2 Excluded Ip

    2-4.1.2 Excluded IP This page configures excluded IP addresses. DHCP server will not allocate these excluded IP addresses to DHCP client. Web Interface To configure DHCP server excluded IP in the web interface: 1. Click Configuration, DHCP, Server, Excluded IP 2.
  • Page 34: 2-4.1.3 Pool

    2-4.1.3 Pool This page manages DHCP pools. According to the DHCP pool, DHCP server will allocate IP address and deliver configuration parameters to DHCP client. Web Interface To configure DHCP server pool in the web interface: 1. Click Configuration, DHCP, Server, Pool 2.
  • Page 35 Network: the pool defines a pool of IP addresses to service more than one DHCP client. Host: the pool services for a specific DHCP client identified by client identifier or hardware address. If "-" is displayed, it means not defined. IP : ...
  • Page 36: 2-4.2 Snooping

    2-4.2 Snooping DHCP Snooping is used to block intruder on the untrusted ports of the switch device when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. The section describes to configure the DHCP Snooping parameters of the switch.
  • Page 37 Port Mode Configuration  Indicates the DHCP snooping port mode. Possible port modes are: Trusted: Configures the port as trusted source of the DHCP messages. Untrusted: Configures the port as untrusted source of the DHCP messages. Buttons  Apply – Click to save changes. Reset - Click to undo any changes made locally and revert to previously saved values.
  • Page 38: Security

    2-5 Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. 2-5.1 Switch 2-5.1.1 Users This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser Web Interface To configure User in the web interface:...
  • Page 39 Password  To type the password. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126. Password (again)  To type the password again. You must type the same password again in the field. Privilege Level : ...
  • Page 40: 2-5.1.2 Privilege Level

    2-5.1.2 Privilege Level This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation, Diagnostics, EEE, GARP, GVRP,IP, IPMC Snooping LACP LLDP LLDP MED MAC Table MRP MVR MVRP Maintenance Mirroring POE Ports Private VLANs QoS SMTP SNMP Security Spanning Tree System Trap Event VCL VLANs Voice VLAN Privilege Levels from 1 to 15 .
  • Page 41 based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection, IP source guard. IP: Everything except 'ping'. Port: Everything except 'VeriPHY'. Diagnostics: 'ping' and 'VeriPHY'. Maintenance: CLI- System Reboot, System Restore Default, System Password, Configuration Save, Configuration Load and Firmware Load. Web- Users, Privilege Levels and everything in Maintenance.
  • Page 42: 2-5.1.3 Authentication Method

    2-5.1.3 Authentication Method This page shows how to configure a user with authenticated when he logs into the switch via one of the management client interfaces. Web Interface To configure a Authentication Method Configuration in the web interface: 1. Specify the Client (console, telent, ssh, web) which you want to monitor. 2.
  • Page 43: 2-5.1.4 Https

    2-5.1.4 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication via the browser. Web Interface To configure a HTTPS Configuration in the web interface: 1.
  • Page 44: 2-5.1.5 Snmp

    2-5.1.5 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
  • Page 45 Parameter description: Mode :  Indicates the SNMP mode operation. Possible modes are: Enabled: Enable SNMP mode operation. Disabled: Disable SNMP mode operation. Version  Indicates the SNMP supported version. Possible versions are: SNMP v1: Set SNMP supported version 1. SNMP v2c: Set SNMP supported version 2c.
  • Page 46: Global Settings

    2-5.1.5.2 Trap Configure SNMP trap on this page. Global Settings Configure SNMP trap on this page. Web Interface To display the configure SNMP Trap Configuration in the web interface: 1. Click Configuration, Switch, SNMP, Trap. 2. Click Add New Entry then you can create new SNMP Trap on the switch. 3.
  • Page 47 Trap Mode  Indicates the trap mode operation. Possible modes are: Enabled: Enable SNMP trap mode operation. Disabled: Disable SNMP trap mode operation. Trap Destination Configurations  Configure trap destinations on this page. Name  Indicates the trap Configuration's name. Indicates the trap destination's name. Enable ...
  • Page 48 Disabled: Disable SNMP trap inform mode operation. Trap Inform Timeout (seconds)  Indicates the SNMP trap inform timeout. The allowed range is 0 to 2147. Trap Inform Retry Times  Indicates the SNMP trap inform retry times. The allowed range is 0 to 255. Trap Probe Security Engine ID ...
  • Page 49 2-5.1.5.3 Communities The function is used to configure SNMPv3 communities. The Community and UserName is unique. To create a new community account, please check <Add new community> button, and enter the account information then check <Save>. Max Group Number: 4. Web Interface To display the configure SNMP Communities in the web interface: 1.
  • Page 50 2-5.1.5.4 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check <Add new user> button, and enter the user information then check <Save>. Max Group Number : 10. Web Interface To display the configure SNMP Users in the web interface: 1.
  • Page 51 length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. Security Level  Indicates the security model that this entry should belong to. Possible security models are: NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy.
  • Page 52 2-5.1.5.5 Group The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group account, please check <Add new group> button, and enter the group information then check <Save>. Max Group Number: v1: 2, v2: 2, v3:10. Web Interface To display the configure SNMP Groups in the web interface: 1.
  • Page 53 v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM). Security Name  A string identifying the security name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. Group Name ...
  • Page 54 2-5.1.5.6 Views The function is used to configure SNMPv3 view. The Entry index keys are OID Subtree and View Name. To create a new view account, please check <Add new view> button, and enter the view information then check <Save>. Max Group Number: 28. Configure SNMPv3 view table on this page.
  • Page 55 In general, if a view entry's view type is 'excluded', there should be another view entry existing with view type as 'included' and it's OID subtree should overstep the 'excluded' view entry. OID Subtree  The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128.
  • Page 56 Group Name  A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126. Security Model  Indicates the security model that this entry should belong to. Possible security models are: any: Any security model accepted(v1|v2c|usm).
  • Page 57 2-5.1.5.8 Trap Event Severity This page displays current trap event severity configurations. Trap event severity can also be configured here. Web Interface To display the configure Trap Event Serverity in the web interface: 1. Click SNMP, Trap Event Severity. 2. Scroll to select the Group name and Severity Level 3.
  • Page 58: 2-5.1.6 Rmon

    2-5.1.6 RMON An RMON implementation typically operates in a client/server model. Monitoring devices contain RMON software agents that collect information and analyze packets. These probes act as servers and the Network Management applications that communicate with them act as clients. 2-5.1.6.1 Statistics Configure RMON Statistics table on this page.
  • Page 59 Indicates the interval in seconds for sampling the history statistics data. The range is from 1 to 3600, default value is 1800 seconds. Buckets  Indicates the maximum data entries associated this History control entry stored in RMON. The range is from 1 to 3600, default value is 50. Buckets Granted ...
  • Page 60 2-5.1.6.2 History Configure RMON History table on this page. The entry index key is ID. Web Interface To display the configure RMON History in the web interface: 1. Click RMON, History. 2. Click Add New Entry. 3. Specify the ID parameters. 4.
  • Page 61 Buckets Granted  The number of data shall be saved in the RMON. Publication date: June, 2015 Revision A1...
  • Page 62 2-5.1.8.3 Alarm Configure RMON Alarm table on this page. The entry index key is ID. Web Interface To display the configure RMON Alarm in the web interface: 1. Click RMON, Alarm. 2. Click Add New Entry. 3. Specify the ID parameters. 4.
  • Page 63 The number of inbound packets that are discarded even the packets are normal. InErrors: The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. InUnknownProtos: the number of the inbound packets that were discarded because of the unknown or un-support protocol.
  • Page 64 2-5.1.6.4 Event Configure RMON Event table on this page. The entry index key is ID. Web Interface To display the configure RMON Event in the web interface: 1. Click RMON, Event. 2. Click Add New Entry. 3. Specify the ID parameters. 4.
  • Page 65: 2-5.2 Network

    2-5.2 Network 2-5.2.1 Limit Control This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. Web Interface To configure a Configuration of Limit Control in the web interface: 1.
  • Page 66: Port Configuration

    Parameter description: System Configuration Mode :  Indicates if Limit Control is globally enabled or disabled on the switch. If globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled. Aging Enabled : ...
  • Page 67 Limit :  The maximum number of MAC addresses that can be secured on this port. This number cannot exceed 1024. If the limit is exceeded, the corresponding action is taken. The switch is "born" with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security-enabled port.
  • Page 68: 2-5.2.2 Nas

    Reset- Click to undo any changes made locally and revert to previously saved values. 2-5.2.2 NAS The section describes to configure the NAS parameters of the switch. The NAS server can be employed to connect users to a variety of resources including Internet access, conference calls, printing documents on shared printers, or by simply logging on to the Internet.
  • Page 69 Parameter description: Mode :  Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. Reauthentication Enabled :  If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Reauthentication Period. Reauthentication for 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached.
  • Page 70 since supplicants that are no longer attached to the port will get removed upon the next reauthentication, which will fail. But if reauthentication is not enabled, the only way to free resources is by aging the entries. For ports in MAC-based Auth. mode, reauthentication doesn't cause direct communication between the switch and the client, so this will not detect whether the client is still attached or not, and the only way to free any resources is to age the entry.
  • Page 71 Guest VLAN ID :  This is the value that a port's Port VLAN ID is set to if a port is moved into the Guest VLAN. It is only changeable if the Guest VLAN option is globally enabled. Valid values are in the range [1; 4095]. Max.
  • Page 72 success or failure indication. Besides forwarding this decision to the supplicant, the switch uses it to open up or block traffic on the switch port connected to the supplicant Suppose two backend servers are enabled and that the server timeout is configured to X seconds (using the AAA configuration page), and suppose that the first server in the list is currently down (but not considered dead).
  • Page 73 that might be on the port. The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality. MAC-based Auth.:  Unlike port-based 802.1X, MAC-based authentication is not a standard, but merely a best-practices method adopted by the industry.
  • Page 74 RADIUS-Assigned VLAN Enabled :  When RADIUS-Assigned VLAN is both globally enabled and enabled (checked) for a given port, the switch reacts to VLAN ID information carried in the RADIUS Access-Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated. If present and valid, the port's Port VLAN ID will be changed to this VLAN ID, the port will be set to be a member of that VLAN ID, and the port will be forced into VLAN unaware mode.
  • Page 75 entering the Guest VLAN. The interval between transmission of EAPOL Request Identity frames is configured with EAPOL Timeout. If Allow Guest VLAN if EAPOL Seen is enabled, the port will now be placed in the Guest VLAN. If disabled, the switch will first check its history to see if an EAPOL frame has previously been received on the port (this history is cleared if the port link goes down or the port's Admin State is changed), and if not, the port will be placed in the Guest VLAN.
  • Page 76: 2-5.2.3 Acl

    2-5.2.3 ACL The Series switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way. The ACLs are divided into Ether Types. IPv4, ARP protocol, MAC and VLAN parameters etc.
  • Page 77 Action :  Select whether forwarding is permitted ("Permit") or denied ("Deny"). The default value is "Permit". Rate Limiter ID :  Select which rate limiter to apply on this port. The allowed values are Disabled or the values 1 through 16. The default value is "Disabled". Port Redirect : ...
  • Page 78 2-5.2.3.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that allow user to set rate limiter value and units with pps or kbps. Web Interface To configure ACL Rate Limiter in the web interface: 1.
  • Page 79 Apply – Click to save changes. Reset - Click to undo any changes made locally and revert to previously saved values. 2-5.2.3.3 Access Control List The section describes how to configure Access Control List rule. An Access Control List (ACL) is a sequential list of permit or deny conditions that apply to IP addresses, MAC addresses, or other more specific criteria.
  • Page 80 Parameter description: Ingress Port :  Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Policy: The ACE will match ingress ports with a specific policy. Port: The ACE will match a specific ingress port. Policy / Bitmask : ...
  • Page 81 Rate Limiter :  Indicates the rate limiter number of the ACE. The allowed range is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled. Port Copy :  Indicates the port copy operation of the ACE. Frames matching the ACE are copied to the port number.
  • Page 82 SMAC Value  When "Specific" is selected for the SMAC filter, you can enter a specific source MAC address. The legal format is "xx-xx-xx-xx-xx-xx" or "xx.xx.xx.xx.xx.xx" or "xxxxxxxxxxxx" (x is a hexadecimal digit). A frame that hits this ACE matches this SMAC value. DMAC Filter ...
  • Page 83: 2-5.2.4 Ip Source Guard

    2-5.2.4 IP Source Guard The section describes to configure the IP Source Guard detail parameters of the switch. You could use the IP Source Guard configure to enable or disable with the Port of the switch. 2-5.2.4.1 Configuration This section describes how to configure IP Source Guard setting including: Mode (Enabled and Disabled) Maximum Dynamic Clients (0, 1, 2, Unlimited) Web Interface...
  • Page 84 Port Mode Configuration :  Specify IP Source Guard is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, IP Source Guard is enabled on this given port. Max Dynamic Clients : ...
  • Page 85 2-5.2.4.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Source Guard Table configure to manage the entries. Web Interface To configure a Static IP Source Guard Table Configuration in the web interface: 1.
  • Page 86 Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Publication date: June, 2015 Revision A1...
  • Page 87: 2-5.2.5 Arp Inspection

    2-5.2.5 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configure to manage the ARP table. 2-5.2.5.1 Configuration This section describes how to configure ARP Inspection setting including: Mode (Enabled and Disabled) Port (Enabled and Disabled) Web Interface To configure an ARP Inspection Configuration in the web interface:...
  • Page 88 Enabled: Enable ARP Inspection operation. Disabled: Disable ARP Inspection operation. If you want to inspect the VLAN configuration, you have to enable the setting of "Check VLAN". The default setting of "Check VLAN" is disabled. When the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting.
  • Page 89 2-5.2.5.2 Navigating the VLAN Configuration Each page shows up to 9999 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table.
  • Page 90 Parameter description: VLAN Mode Configuration  Specify ARP Inspection is enabled on which VLANs. First, you have to enable the port setting on Port mode configuration web page. Only when both Global Mode and Port Mode on a given port are enabled, ARP Inspection is enabled on this given port. Second, you can specify which VLAN will be inspected on VLAN mode configuration web page.
  • Page 91 2-5.2.5.3 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch. You could use the Static ARP Inspection Table configure to manage the ARP entries. Web Interface To configure a Static ARP Inspection Table Configuration in the web interface: 1.
  • Page 92 Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Publication date: June, 2015 Revision A1...
  • Page 93 2-5.2.5.4 Dynamic Table Entries in the Dynamic ARP Inspection Table are shown on this page. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address. Navigating the ARP Inspection Table Each page shows up to 99 entries from the Dynamic ARP Inspection table, default being 20, selected through the "entries per page"...
  • Page 94 Translate to static  Select the checkbox to translate the entry to static entry. Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Refreshes the displayed table starting from the input fields.
  • Page 95: 2-5.3 Aaa

    2-5.3 AAA This section shows you to use an AAA (Authentication, Authorization, Accounting) server to provide access control to your network. The AAA server can be a TACACS+ or RADIUS server to create and manage objects that contain settings for using AAA servers. 2-5.3.1 RADIUS Web Interface To configure a Common Configuration of AAA, RADIUS in the web interface:...
  • Page 96 Timeout  Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request. Retransmit  Retransmit is the number of times, in the range 1 to 1000, a RADIUS request is retransmitted to a server that is not responding.
  • Page 97 Retransmit  This optional setting overrides the global retransmit value. Leaving it blank will use the global retransmit value.  This optional setting overrides the global key. Leaving it blank will use the global key. Adding a New Server Click to add a new RADIUS server. An empty row is added to the table, and the RADIUS server can be configured as needed.
  • Page 98: Aggregation

    2-6 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipment’s to build the bandwidth aggregation.
  • Page 99 Parameter description: Hash Code Contributors Source MAC Address :  The Source MAC address can be used to calculate the destination port for the frame. Check to enable the use of the Source MAC address, or uncheck to disable. By default, Source MAC Address is enabled.
  • Page 100: 2-6.2 Lacp

    2-6.2 LACP This page allows the user to inspect the current LACP port configurations, and possibly change them as well An LACP trunk group with more than one ready member-ports is a “real trunked” group. An LACP trunk group with only one or less than one ready member-ports is not a “real trunked”...
  • Page 101 Parameter description: Port :  The switch port number. LACP Enabled  Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are connected to the same partner.  The Key value incurred by the port, range 1-65535 . The Auto setting will set the key as appropriate by the physical link speed, 10Mb = 1, 100Mb = 2, 1Gb = 3.
  • Page 102: Loop Protection

    2-7 Loop Protection The loop Protection is used to detect the presence of traffic. When switch receives packet’s (looping detection frame) MAC address the same as oneself from port, show Loop Protection happens. The port will be locked when it received the looping Proection frames. If you want to resume the locked port, please find out the looping path and take off the looping path, then select the resume the locked port and click on “Resume”...
  • Page 103 Parameter description: Enable Loop Protection:  Controls whether loop protections is enabled (as a whole). Transmission Time:  The interval between each loop protection PDU sent on each port. valid values are 1 to 10 seconds. Shutdown Time:  The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action shuts down the port).
  • Page 104: Spanning Tree

    2-8 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 105: Basic Settings

    Figure 2-8.1: The STP Bridge Configuration Parameter description: Basic Settings Protocol Version :  The STP protocol version setting. Valid values are STP, RSTP and MSTP. Bridge Priority :  Controls the bridge priority. Lower numeric values have better priority. The bridge priority plus the MSTI instance number, concatenated with the 6-byte MAC address of the switch forms a Bridge Identifier.
  • Page 106: Advanced Settings

    Transmit Hold Count :  The number of BPDU's a bridge port can send per second. When exceeded, transmission of the next BPDU will be delayed. Valid values are in the range 1 to 10 BPDU's per second. Advanced Settings Edge Port BPDU Filtering : ...
  • Page 107: 2-8.2 Msti Mapping

    2-8.2 MSTI Mapping When you implement an Spanning Tree protocol on the switch that the bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. Due to the reason that you need to set the list of VLANs mapped to the MSTI. The VLANs must be separated with comma and/or space.
  • Page 108 Parameter description: Configuration Identification Configuration Name :  The name identifying the VLAN to MSTI mapping. Bridges must share the name and revision (see below), as well as the VLAN-to-MSTI mapping configuration in order to share spanning trees for MSTI's (Intra-region). The name is at most 32 characters. Configuration Revision : ...
  • Page 109: 2-8.3 Msti Priorities

    2-8.3 MSTI Priorities When you implement a Spanning Tree protocol on the switch that the bridge instance. The CIST is the default instance which is always active. For controls the bridge priority. Lower numeric values have better priority. The bridge priority plus the MSTI instance number, concatenated with the 6-byte MAC address of the switch forms a Bridge Identifier The section describes it allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well.
  • Page 110: 2-8.4 Cist Ports

    Buttons  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. 2-8.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need to configure the CIST Ports.
  • Page 111 Parameter description: Port :  The switch port number of the logical STP port. STP Enabled :  Controls whether STP is enabled on this switch port. Path Cost :  Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values.
  • Page 112 Point to Point  Controls whether the port connects to a point-to-point LAN rather than to a shared medium. This can be automatically determined, or forced either true or false. Transition to the forwarding state is faster for point-to-point LANs than for shared media. Buttons ...
  • Page 113: 2-8.5 Msti Ports

    2-8.5 MSTI Ports The section describes it allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. An MSTI port is a virtual port, which is instantiated separately for each active CIST (physical) port for each MSTI instance configured on and applicable to the port.
  • Page 114 Parameter description: Port :  The switch port number of the corresponding STP CIST (and MSTI) port. Path Cost :  Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered.
  • Page 115: Ipmc

    2-9 IPMC ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, diagnostic or routing purposes. ICMP messages generally contain information about routing difficulties or simple exchanges such as time-stamp or echo transactions. 2-9.1 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are...
  • Page 116 Parameter description: Snooping Enabled:  Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled :  Enable unregistered IPMCv4 traffic flooding. IGMP SSM Range :  SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Format: (IP address/ sub mask) Leave Proxy Enable: ...
  • Page 117 If an aggregation member port is selected as a router port, the whole aggregation will act as a router port. Fast Leave :  Enable the fast leave on the port. Throttling :  Enable to limit the number of multicast groups to which a switch port can belong. Publication date: June, 2015 Revision A1...
  • Page 118: 2-9.1.2 Vlan Configuration

    2-9.1.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For Each setting page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table.
  • Page 119 Querier Election :  Enable to join IGMP Querier election in the VLAN. Disable to act as an IGMP Non-Querier. Querier Address :  Define the IPv4 address as source address used in IP header for IGMP Querier election. When the Querier address is not set, system uses IPv4 management address of the IP interface associated with this VLAN.
  • Page 120 click “|<<” to update the table starting from the first entry in the VLAN table, i.e. the entry with the lowest VLAN ID. Others click “>> “ to update the table, starting with the entry after the last entry currently displayed. Publication date: June, 2015 Revision A1...
  • Page 121: Lldp

    2-10 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally wired Ethernet.
  • Page 122 Parameter description: LLDP Parameters Tx Interval :  The switch periodically transmits LLDP frames to its neighbours for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds. Tx Hold : ...
  • Page 123 Enabled The switch will send out LLDP information, and will analyze LLDP information received from neighbors. CDP Aware :  Select CDP awareness. The CDP operation is restricted to decoding incoming CDP frames (The switch doesn't transmit CDP frames). CDP frames are only decoded if LLDP on the port is enabled. Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbors’...
  • Page 124 Publication date: June, 2015 Revision A1...
  • Page 125: 2-10.2 Lldp-Med Configuration

    2-10.2 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED that provides the following facilities: Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv) settings) enabling plug and play networking. Device location discovery to allow creation of location databases and, in the case of Voice over Internet Protocol (VoIP), Enhanced 911 services.
  • Page 126 Parameter description: Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general. In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the limited LLDPU space and to reduce security and system integrity issues that can come with inappropriate knowledge of the network policy.
  • Page 127 It should be noted that LLDP-MED and the LLDP-MED Fast Start mechanism is only intended to run on links between LLDP-MED Network Connectivity Devices and Endpoint Devices, and as such does not apply to links between LAN infrastructure elements, including Network Connectivity Devices, or other types of links.
  • Page 128 City district :  City division, borough, city district, ward, chou (Japan). Block (Neighbourhood) :  Neighbourhood, block. Street :  Street - Example: Poppelvej. Leading street direction :  Leading street direction - Example: N. Trailing street suffix : ...
  • Page 129 Additional code :  Additional code - Example: 1320300003. Emergency Call Service:  Emergency Call Service (e.g. E911 and others), such as defined by TIA or NENA. Emergency Call Service :  Emergency Call Service ELIN identifier data format is defined to carry the ELIN identifier as used during emergency call setup to a traditional CAMA or ISDN trunk-based PSAP.
  • Page 130 shall be mapped to the specific ports. Application Type :  Intended use of the application types: 1. Voice - for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services. These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications.
  • Page 131 0 represents use of the default priority as defined in IEEE 802.1D-2004. DSCP :  DSCP value to be used to provide Diffserv node behaviour for the specified application type as defined in IETF RFC 2474. DSCP may contain one of 64 code point values (0 through 63). A value of 0 represents use of the default DSCP value as defined in RFC 2475.
  • Page 132: Poe

    2- 11 PoE PoE is an acronym for Power Over Ethernet. Power Over Ethernet is used to transmit electrical power, to remote devices over standard Ethernet cable. It could for example be used for powering IP telephones, wireless LAN access points and other equipment, where it would be difficult or expensive to connect the equipment to main power supply.
  • Page 133: 2- 11.1 Configuration

    2- 11.1 Configuration This page allows the user to inspect and configure the current PoE port settings and show all PoE Supply. Web Interface To configure Power Over Ethernet in the web interface: 1. Click configuration, PoE, and configuration 2. Specify the Reserved Power determined and Power Management ode. Specify the PoE or PoE++ and Priority.
  • Page 134 Power Management Mode :  There are 2 modes for configuring when to shut down the ports: 1. Actual Consumption: In this mode the ports are shut down when the actual power consumption for all ports exceeds the amount of power that the power supply can deliver or if the actual power consumption for a given port exceeds the reserved power for that port.
  • Page 135: 2- 11.2 Power Delay

    2- 11.2 Power Delay This page allows the user to setting the delay time of power providing after device rebooted. Web Interface To Display Power Over Ethernet Status in the web interface: 1. Click Configuration, PoE, and Power delay. 2. Enable the port to the power device. 3.
  • Page 136: 2- 11.3 Scheduling

    2- 11.3 Scheduling This page allows the user to make a perfect schedule of PoE power supply. PoE Scheduling not only makes PoE management easier but also saves more energy Web Interface To Display Power Over Ethernet Scheduling in the web interface: Click Configuration, PoE, and Scheduling.
  • Page 137 Parameter description: Power Supply Configuration Port :  This is the logical port number for this row. Status :  PoE Scheduling Status. Enabled: Enable POE Scheduling. Disabled: Disable POE Scheduling. Hour :  The time of PoE port provide power of a day. Publication date: June, 2015 Revision A1...
  • Page 138: 3- 11.4 Auto Checking

    3- 11.4 Auto Checking This page allows the user to specify the auto detection parameters to check the linking status between PoE ports and PDs. When it detected the fail connect, will reboot remote PD automatically. Web Interface To Display Power Over Ethernet Auto Checking in the web interface: Click Configuration, PoE, and Auto checking.
  • Page 139 Ping IP Address :  The PD's IP Address the system should ping. Interval Time(sec) :  Device will send checking message to PD each interval time. default: 30, range: 10-120 sec. Retry Time :  When PoE port can't ping the PD, it will retry to send detection again. When the third time, it will trigger failure action.
  • Page 140: Mac Table

    2-12 MAC Table Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to ( based upon the DMAC address in the frame ). This table contains both static and dynamic entries.
  • Page 141 Parameter description: Aging Configuration :  By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Configure aging time by entering a value here in seconds; for example, Age time seconds. The allowed range is 10 to 1000000 seconds.
  • Page 142 Port Members :  Checkmarks indicate which ports are members of the entry. Check or uncheck as needed to modify the entry. Adding a New Static Entry :  Click to add a new entry to the static MAC table. Specify the VLAN ID, MAC address, and port members for the new entry.
  • Page 143: Vlans

    2-13 VLANs To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workstation connected to a port in the VLAN. This connection supports a VSM, SNMP, and Telnet session. By default, the active management VLAN is VLAN 1, but you can designate any VLAN as the management VLAN using the Management VLAN window.
  • Page 144 the lower and upper bound. The following example will create VLANs 1, 10, 11, 12, 13, 200, and 300: 1,10-13,200,300. Spaces are allowed in between the delimiters. Ethertype for Custom S-ports :  This field specifies the ethertype/TPID (specified in hexadecimal) used for Custom S-ports. The setting is in force for all ports whose Port Type is set to S-Custom-Port.
  • Page 145 Port Type :  Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on. Likewise, on egress, the Port Type determines the TPID of the tag, if a tag is required.
  • Page 146 Tag All All frames, whether classified to the Port VLAN or not, are transmitted with a tag. Untag All All frames, whether classified to the Port VLAN or not, are transmitted without a tag. This option is only available for ports in Hybrid mode. Allowed VLANs : ...
  • Page 147: Private Vlans

    2-14 Private VLANs In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private VLAN. 2-14.1 VLAN Membership The VLAN membership configuration for the selected stack switch unit switch can be monitored and modified here.
  • Page 148 thereafter present on the other stack switch units, but with no port members. The check box is greyed out when VLAN is displayed on other stacked switches, but user can add member ports to it. A VLAN without any port members on any stack unit will be deleted when you click "Save". The button can be used to undo the addition of new VLANs.
  • Page 149: 2-14.2 Port Isolation

    2-14.2 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair.
  • Page 150: Vcl

    2-15 VCL 2-15.1 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. A most common way of grouping VLAN members is by port, hence the name port-based VLAN.
  • Page 151 MAC Address :  Indicates the MAC address. VLAN ID :  Indicates the VLAN ID. Port Members :  A row of check boxes for each port is displayed for each MAC-based VLAN entry. To include a port in a MAC-based VLAN, check the box. To remove or exclude the port from the MAC-based VLAN, make sure the box is unchecked.
  • Page 152: 2-15.2 Protocol -Based Vlan

    2-15.2 Protocol -based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI reference model.
  • Page 153 Parameter description: Delete :  To delete a Protocol to Group Name map entry, check this box. The entry will be deleted on the switch during the next Save. Frame Type :  Frame Type can have one of the following values: Ethernet SNAP On changing the Frame type field, valid value of the following...
  • Page 154 Reset- Click to undo any changes made locally and revert to previously saved values. Upper right icon (Refresh):  You can click them for refresh the Protocol Group Mapping information by manual. Publication date: June, 2015 Revision A1...
  • Page 155: 2-15.2.2 Group To Vlan

    2-15.2.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected stack switch unit switch . Web Interface To Display Group Name to VLAN mapping table configured in the web interface: Click Group Name VLAN configuration and add new entry.
  • Page 156: 2-15.3 Ip Subnet-Based Vlan

    Auto-refresh :  To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the Protocol Group Mapping information by manual. 2-15.3 IP Subnet-based VLAN The IP subnet-based VLAN entries can be configured here. This page allows for adding, updating and deleting IP subnet-based VLAN entries and assigning the entries to different ports.
  • Page 157 from the IP subnet-based VLAN, make sure the box is unchecked. By default, no ports are members, and all boxes are unchecked. Adding a New IP subnet-based VLAN  Click “Add New Entry” to add a new IP subnet-based VLAN entry. An empty row is added to the table, and the IP subnet-based VLAN entry can be configured as needed.
  • Page 158: Voice Vlan

    2-16 VOICE VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can perform QoS-related configuration for voice data, ensuring the transmission priority of voice traffic and voice quality. 2-16.1 Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic.
  • Page 159 Parameter description: Mode :  Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filtering. Possible modes are: Enabled: Enable Voice VLAN mode operation. Disabled: Disable Voice VLAN mode operation. VLAN ID : ...
  • Page 160: 2-16.2 Oui

    Reset- Click to undo any changes made locally and revert to previously saved values. 2-16.2 OUI The section describes to Configure VOICE VLAN OUI table . The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. Web Interface To configure Voice VLAN OUI Table in the web interface: Select “Add new entry”...
  • Page 161: Qos

    2-17 QoS The switch support four QoS queues per port with strict or weighted fair queuing scheduling. It supports QoS Control Lists (QCL) for advance programmable QoS classification, based on IEEE 802.1p, Ethertype, VID, IPv4/IPv6 DSCP and UDP/TCP ports and ranges. High flexibility in the classification of incoming frames to a QoS class.
  • Page 162 Parameter description: Port :  The port number for which the configuration below applies. CoS :  Controls the default class of service. All frames are classified to a CoS. There is a one to one mapping between CoS, queue and priority.
  • Page 163 Address Mode :  The IP/MAC address mode specifying whether the QCL classification must be based on source (SMAC/SIP) or destination (DMAC/DIP) addresses on this port. The allowed values are: Source: Enable SMAC/SIP matching. Destination: Enable DMAC/DIP matching. Buttons:  Apply –...
  • Page 164: 2-17.2 Port Policing

    2-17.2 Port Policing This section provides an overview of f QoS Ingress Port Policers for all switch ports The Port Policing is useful in constraining traffic flows and marking frames above specific rates. Policing is primarily useful for data flows and voice or video flows because voice and video usually maintains a steady rate of traffic Web Interface To display the QoS Port Schedulers in the web interface:...
  • Page 165 instead of discarding frames. Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Publication date: June, 2015 Revision A1...
  • Page 166: 2-17.3 Port Schedulers

    2-17.3 Port Schedulers This section provides an overview of QoS Egress Port Schedulers for all switch ports. and the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To display the QoS Port Schedulers in the web interface: 1.
  • Page 167 If you select the scheduler mode with wighted then the screen will change as the figure. Parameter description: Port :  The logical port for the settings contained in the same row. Click on the port number in order to configure the schedulers. Mode : ...
  • Page 168 Queue Shaper Excess :  Controls whether the queue is allowed to use excess bandwidth. Queue Scheduler Weight :  Controls the weight for this queue. The default value is "17". This value is restricted to 1-100. This parameter is only shown if "Scheduler Mode" is set to "Weighted". Queue Scheduler Percent : ...
  • Page 169: 2-17.4 Port Shaping

    2-17.4 Port Shaping This section provides an overview of QoS Egress Port Shapers for all switch ports. Others the user could get all detail information ot the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To display the QoS Port Shapers in the web interface: 1.
  • Page 170 If you select the scheduler mode with wighted then the screen will change as the figure. Parameter description: Port :  The logical port for the settings contained in the same row. Click on the port number in order to configure the shapers. Mode : ...
  • Page 171 Queue Shaper Enable :  Controls whether the queue shaper is enabled for this queue on this switch port. Queue Shaper Rate :  Controls the rate for the queue shaper. The default value is ?. This value is restricted to ?-1000000 when the "Unit"...
  • Page 172: 2-17.5 Port Tag Remarking

    2-17.5 Port Tag Remarking The Section provides user to get an overview of QoS Egress Port Tag Remarking for all switch ports. Others the ports belong to the currently selected stack unit, as reflected by the page header. . Web Interface To display the QoS Port Tag Remarking in the web interface: 1.
  • Page 173 Parameter description: Mode :  Controls the tag remarking mode for this port. Classified: Use classified PCP/DEI values. Default: Use default PCP/DEI values. Mapped: Use mapped versions of QoS class and DP level. PCP/DEI Configuration :  Controls the default PCP and DEI values used when the mode is set to Default. Publication date: June, 2015 Revision A1...
  • Page 174 (QoS class, DP level) to (PCP, DEI) Mapping :  Controls the mapping of the classified (QoS class, DP level) to (PCP, DEI) values when the mode is set to Mapped. Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Cancel –...
  • Page 175: 2-17.6 Port Dscp

    2-17.6 Port DSCP The section will teach user to set the QoS Port DSCP configuration that was allowed you to configure the basic QoS Port DSCP Configuration settings for all switch ports. Others the settings relate to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port DSCP parameters in the web interface: 1.
  • Page 176 Selected: Classify only selected DSCP for which classification is enabled as specified in  DSCP Translation window for the specific DSCP. All: Classify all DSCP.  Egress :  Port Egress Rewriting can be one of below parameters Disable: No Egress rewrite. ...
  • Page 177: 2-17.7 Dscp-Based Qos

    2-17.7 DSCP-Based QoS The section will teach user to configure the DSCP-Based QoS mode that This page allows you to configure the basic QoS DSCP based QoS Ingress Classification settings for all switches. Web Interface To configure the DSCP –Based QoS Ingress Classification parameters in the web interface: 1.
  • Page 178 Parameter description: DSCP :  Maximum number of support ed DSCP values are 64. Trust :  Click to check if the DSCP value is trusted. QoS Class :  QoS Class value can be any of (0-7) DPL : ...
  • Page 179: 2-17.8 Dscp Translation

    2-17.8 DSCP Translation The section describes the swtich allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. Web Interface To configure the DSCP Translation parameters in the web interface: 1.
  • Page 180 Parameter description: DSCP :  Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to Ingress :  Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map.
  • Page 181: 2-17.9 Dscp Classification

    2-17.9 DSCP Classification The section describes to teach user to configure and allows you to map DSCP value to a QoS Class and DPL value. Others the settings relate to the currently selected stack unit, as reflected by the page header. Web Interface To configure the DSCP Classification parameters in the web interface: 1.Click Configuration, QoS, DSCP Translation...
  • Page 182 Parameter description: QoS Class :  Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters. DPL :  Drop Precedence Level (0-1) can be configured for all available QoS Classes. DSCP : ...
  • Page 183: 2-17.10 Qos Control List Configuration

    2-17.10 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list. Web Interface To configure the QoS Control List parameters in the web interface: 1.
  • Page 184 Parameter description: QCE# :  Indicates the index of QCE. Port :  Indicates the list of ports configured with the QCE. DMAC :  Indicates the destination MAC address. Possible values are: Any: Match any DMAC. Unicast: Match unicast DMAC. Multicast: Match multicast DMAC.
  • Page 185 PCP :  Priority Code Point: Valid values of PCP are specific(0, 1, 2, 3, 4, 5, 6, 7) or range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any'. DEI :  Drop Eligible Indicator: Valid value of DEI are 0, 1 or 'Any'. Frame Type : ...
  • Page 186 6-7, 0-3, 4-7) or 'Any' DEI Drop Eligible Indicator: Valid value of DEI can be any of values between 0, 1 or 'Any' SMAC Source MAC address: 24 MS bits (OUI) or 'Any' DMAC Type Destination MAC type: possible values are unicast(UC), multicast(MC), broadcast(BC) or 'Any' Frame Type Frame Type can have any of the following values 1.
  • Page 187 Action Configuration :  Class QoS Class: "class (0-7)", default- basic classification DP Valid DP Level can be (0-3)", default- basic classification DSCP Valid dscp value can be (0-63, BE, CS1-CS7, EF or AF11-AF43) Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values.
  • Page 188: 2-17.11 Storm Control

    2-17.11 Storm Control The section allows user to configure the Storm control for the switch. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table. The configuration indicates the permitted packet rate for unicast, multicast or broadcast traffic across the switch Web Interface...
  • Page 189: Mirror

    2-18 Mirror You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Mirror Configuration is to monitor the traffic of the network.
  • Page 190: Mirror Port Configuration

    Parameter description: Port to mirror on :  Port to mirror also known as the mirror port. Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored on this port. Disabled disables mirroring. Mirror Port Configuration The following table is used for Rx and Tx enabling.
  • Page 191: Upnp

    2-19 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components Web Interface To configure the UPnP Configuration in the web interface:...
  • Page 192 Buttons:  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Publication date: June, 2015 Revision A1...
  • Page 193: Switch2Go

    2-20 Switch2go 2-20.1 Switch2go setting Configure Switch2go management and link setting. Web Interface To configure Switch2go setting in the web interface: Click Configuration, Switch2go and and Switch2go setting. Set the parameters Click Apply. Figure 2-20.1: The Switch2go setting Parameter description: Management mode : ...
  • Page 194 Server Address :  Indicates the IPv4 host address of server. If the switch provide DNS feature, it also can be a host name. Server State :  Report network information between Switch and Server. Link Option :  Indicates the Link Option operation. When the Link Option in Automatic, enabling applications to access the services provided by an UPnP "Internet Gateway Device (IGN)"...
  • Page 195: 2-20.2 User Link Management

    2-20.2 User Link Management Configure User Link Management on this page. Web Interface To configure User Link Management in the web interface: Click Configuration, Switch2go and and User Link Management. Set the parameters Click Get Activity Code. Figure 2-20.2: The User Link Management Parameter description: Mobile 1 ~ 3 : ...
  • Page 196: 2-20.3 Port Name Service

    2-20.3 Port Name Service This page displays current port name and role. Web Interface To configure Port Name Service in the web interface: Click Configuration, Switch2go and and Port Name Servic Specify the detail Port Name and set the Role. Click Apply.
  • Page 197: Smtp Configuration

    2-21 SMTP Configuration The function is used to set an Alarm trap when the switch alarm then you could set the SMTP server to send you the alarm mail. Web Interface To configure the SMTP Configuration in the web interface: 1.
  • Page 198 Sender :  Specify the sender name of the alarm mail. Return-Path :  Specify the sender email address of the alarm mail. This address will be the "from" address on the email message. Email Address 1-6 :  Email address that would like to receive the alarm message. Buttons: ...
  • Page 199: Chapter 3. Monitor

    Monitor Chapter 3. This chapter describes all of the basic network statistics which includes the Ports, Layer 2 network protocol (e.g. NAS, ACL, DHCP, AAA and RMON etc.) and any setting of the Switch. 3-1 System After you login, the switch shows you the system information. This page is default and tells you the basic information of the system, including “Model Name”, “System Description”, “Contact”, “Location”, “System Up Time”, “Firmware Version”, “Host Mac Address”, “Device Port”.
  • Page 200 Figure 3-1.1: System Information Parameter description: Model Name  Displays the factory defined model name for identification purpose. System Description  Displays the system description. Location  The system location configured in Configuration | System | Information | System Location. Contact ...
  • Page 201  Bootloader Version Displays the current boot loader version number.  Firmware Version The software version of this switch.  Hardware-Mechanical Version The hardware and mechanical version of this switch. Series Number  The serial number of this switch. MAC Address ...
  • Page 202: 3-1.2 Ip Status

    3-1.2 IP Status This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour cache (ARP cache) status. Web Interface To display the log configuration in the web interface: 1.
  • Page 203 Parameter description: IP Interfaces Interface  Show the name of the interface. Type  Show the address type of the entry. This may be LINK or IPv4. Address  Show the current address of the interface (of the given type). Status ...
  • Page 204: 3-1.3 Log

    3-1.3 Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the web interface: 1. Click Monitor, System and Log. 2. Display the log information. Figure 3- 1.3: The System Log Information Parameter description: Auto-refresh ...
  • Page 205 Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every seconds. Refresh: Updates the system log entries, starting from the current entry ID. Clear: Flushes the selected log entries. |<<: Updates the system log entries, starting from the first available entry ID. <<...
  • Page 206: 3-1.4 Detailed Log

    3-1.4 Detailed Log This section describes that display the detailed log information of the switch Web Interface To display the detailed log configuration in the web interface: 1. Click Monitor, System and Detailed Log. 2. Display the log information. Figure 3- 1.4: The Detailed System Log Information Parameter description: ...
  • Page 207: Green Ethernet

    3-2 Green Ethernet 3-2.1 Port Power Savings This page provides the current status for EEE. Web Interface To display the power Saving in the web interface: 1. Click Monitor, Port Power Savings. Figure 3- 2.1: The Ports States Parameter description: Local Port ...
  • Page 208: Ports

    PerfectReach Savings  Shows if the system is currently saving power due to PerfectReach. 3-3 Ports The section describes to configure the Port detail parameters of the switch. Others you could using the Port configure to enable or disable the Port of the switch. Monitor the ports content or status in the function.
  • Page 209 Bytes :  The number of received and transmitted bytes per port. Errors  The number of frames received in error and the number of incomplete transmissions per port. Drops  The number of frames discarded due to ingress or egress congestion. Filtered ...
  • Page 210: 3-3.2 Qos Statistics

    3-3.2 Qos Statistics The section describes that switch could display the QoS detailed Queuing counters for a specific switch port. for the different queues for all switch ports. Web Interface To Display the Queuing Counters in the web interface: 1. Click Monitor, Ports, then QoS Statistics 2.
  • Page 211 Refresh: Click to refresh the page. Clear: Clears the counters for all ports. Publication date: June, 2015 Revision A1...
  • Page 212: 3-3.3 Qcl Status

    3-3.3 QCL Status The section will let you know how to configure and shows the QCL status by different QCL users. Each row describes the QCE that is defined. It is a conflict if a specific QCE is not applied to the hardware due to hardware limitations. The maximum number of QCEs is 256 on each switch.
  • Page 213 matched with the frame's content. There are three action fields: Class, DPL and DSCP. Class: Classified QoS Class; if a frame matches the QCE it will be put in the queue. DPL: Drop Precedence Level; if a frame matches the QCE then DP level will set to value displayed under DPL column.
  • Page 214: 3-3.4 Detailed Statistics

    3-3.4 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
  • Page 215 Parameter description: Auto-refresh:  To evoke the auto-refresh to refresh the Port Statistics information automatically. Upper left scroll bar:  To scroll which port to display the Port statistics with “Port-0”, “Port-1... Receive Total and Transmit Total Rx and Tx Packets : ...
  • Page 216 Rx and Tx Pause :  A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation. Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes.
  • Page 217: 3-3.5 Sfp Information

    Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Clear: Clears the counters for the selected port. Refresh: Click to refresh the page. 3-3.5 SFP Information The section describes that switch could display the SFP module detail information which you connect it to the switch.
  • Page 218 Baud Rate:  Display the maximum baud rate of the fiber module supported, for instance, 10M, 100M, 1G and so on. Vendor OUI:  Display the Manufacturer's OUI code which is assigned by IEEE. Vendor Name:  Display the company name of the module manufacturer. Vendor P/N: ...
  • Page 219: Dhcp

    3-4 DHCP 3-4.1 Server DHCP Server is used to allocate network addresses and deliver configuration parameters to dynamically configured hosts called DHCP client. 3-4.1.1 Statistics This page displays the database counters and the number of DHCP messages sent and received by DHCP server. Web Interface Display the DHCP server Statistics Overview in the web interface: Click Protocol -based VLAN configuration and add new entry.
  • Page 220: 3-4.1.2 Binding

    Database Counters Automatic Binding :  Number of bindings with network-type pools. Manual Binding :  Number of bindings that administrator assigns an IP address to a client. That is, the pool is of host type. Expired Binding :  Number of bindings that their lease time expired or they are cleared from Automatic/Manual type bindings.
  • Page 221: 3-4.1.3 Declined Ip

    Figure 3-4.1.2: The Group Name of VLAN Mapping Table Parameter description: IP :  IP address allocated to DHCP client. Type :  Type of binding. Possible types are Automatic, Manual, Expired. State :  State of binding. Possible states are Committed, Allocated, Expired. Pool Name : ...
  • Page 222: 3-4.1 Snooping Table

    Server ID :  Server IP address to service the binding. 3-4.1 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses.
  • Page 223: 3-4.2 Detailed Statistics

    3-4.2 Detailed Statistics This page provides statistics for DHCP snooping. Notice that the normal forward per-port TX statistics isn't increased if the incoming DHCP packet is done by L3 forwarding mechanism. And clear the statistics on specific port may not take effect on global statistics since it gathers the different layer overview.
  • Page 224 Rx and Tx ACK:  The number of ACK (option 53 with value 5) packets received and transmitted. Rx and Tx NAK:  The number of NAK (option 53 with value 6) packets received and transmitted. Rx and Tx Release: ...
  • Page 225: Security

    3-5 Security 3-5.1 Network 3-5.1.1 Port Security 3-5.1.1.1 Switch This section shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
  • Page 226 Parameter description: User Module Legend :  The legend shows all user modules that may request Port Security services. User Module Name :  The full name of a module that may request Port Security services. Abbr :  A one-letter abbreviation of the user module. This is used in the Users column in the port status table.
  • Page 227 If no user modules are enabled on the port, the Current column will show a dash (-). If the Limit Control user module is not enabled on the port, the Limit column will show a dash (-). Indicates the number of currently learned MAC addresses (forwarding as well as blocked) on the port.
  • Page 228 3-5.1.1.2 Port This section shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
  • Page 229 If aging is disabled or a user module has decided to hold the MAC address indefinitely, a dash (-) will be shown. Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. Publication date: June, 2015 Revision A1...
  • Page 230: 3-5.1.2 Nas

    3-5.1.2 NAS 3-5.1.2.1 Switch The section describes to show the each port NAS status information of the switch.The status includes Admin State Port State, Last Source, Last ID, QoS Class, and Port VLAN ID. Web Interface To configure a NAS Switch Status Configuration in the web interface: Click Security, Network, NAS,then Port.
  • Page 231 Last ID :  The user name (supplicant identity) carried in the most recently received Response Identity EAPOL frame for EAPOL-based authentication, and the source MAC address from the most recently received frame from a new client for MAC-based authentication. QoS Class : ...
  • Page 232: Port Counters

    3-5.1.2.2 Port The section describes to provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics, only Web Interface To configure a NAS Port Status Configuration in the web interface: 1.
  • Page 233 • Force Unauthorized • Port-based 802.1X • Single 802.1X • Multi 802.1X Backend Server Counters :  These backend (RADIUS) frame counters are available for the following administrative states: • Port-based 802.1X • Single 802.1X • Multi 802.1X • MAC-based Auth. Last Supplicant/Client Info : ...
  • Page 234 State :  The client can either be authenticated or unauthenticated. In the authenticated state, it is allowed to forward frames on the port, and in the unauthenticated state, it is blocked. As long as the backend server hasn't successfully authenticated the client, it is unauthenticated. If an authentication fails for one or the other reason, the client will remain in the unauthenticated state for Hold Time seconds.
  • Page 235: 3-5.1.3 Acl Status

    3-5.1.3 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations.
  • Page 236 Action :  Indicates the forwarding action of the ACE. Permit: Frames matching the ACE may be forwarded and learned. Deny: Frames matching the ACE are dropped. Filter: Frames matching the ACE are filtered. Rate Limiter :  Indicates the rate limiter number of the ACE. The allowed range is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled.
  • Page 237: 3-5.1.4 Arp Inspection

    3-5.1.4 ARP Inspection The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address. Web Interface To configure a Dynamic ARP Inspection Table Configuration in the web interface: 1.
  • Page 238: 3-5.1.5 Ip Source Guard

    User IP address of the entry. Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. |<<: Updates the system log entries to the first available entry ID. >>...
  • Page 239 Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. |<<: Updates the system log entries to the first available entry ID. >> : Updates the system log entry to the next available entry ID. Publication date: June, 2015 Revision A1...
  • Page 240: 3-5.2 Aaa

    3-5.2 AAA 3-5.2.1 RADIUS Overview This section shows you an overview of the RADIUS Authentication and Accounting servers status to ensure the function is workable. Web Interface To configure a RADIUS Overview Configuration in the web interface: Click Security, AAA, then RADIUS Overview. Checked “Auto-refresh”.
  • Page 241 State :  The current state of the server. This field takes one of the following values: Disabled: The server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept access attempts.
  • Page 242: 3-5.2.2 Radius Details

    3-5.2.2 RADIUS Details This section shows you an detailed statistics for a particular RADIUS server. Web Interface To configure a RADIUS Details Configuration in the web interface: Specify Port which want to check. Click Security, AAA, then RADIUS Overview. Checked “Auto-refresh”. Click “...
  • Page 243 Parameter description: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB. Use the server select box to switch between the backend servers to show details for. Packet Counters RADIUS authentication server packet counter. There are seven receive and four transmit counters.
  • Page 244 Dropped Dropped received from the server on the authentication port and dropped for some other reason. The number of RADIUS Access-Request Access radiusAuthClientExtAccessR packets sent to the server. This does not Requests equests include retransmissions. Access The number of RADIUS Access-Request radiusAuthClientExtAccessR Retransmissi packets retransmitted to the RADIUS...
  • Page 245 RADIUS Accounting Statistics The statistics map closely to those specified in RFC4670 - RADIUS Accounting Client MIB. Use the server select box to switch between the backend servers to show details for. Packet Counters RADIUS accounting server packet counter. There are five receive and four transmit counters. Direction Name RFC4670 Name...
  • Page 246 Name RFC4670 Name Description IP address and UDP port for the accounting server in IP Address - question. Shows the state of the server. It takes one of the following values: Disabled: The selected server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running.
  • Page 247: 3-5.3 Switch

    3-5.3 Switch 3-5.3.1 RMON 3-5.3.1.1 Statistics This section provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table.
  • Page 248 packets) received. Broad-cast  he total number of good packets received that were directed to the broadcast address. Multi-cast  The total number of good packets received that were directed to a multicast address. CRC Errors  The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
  • Page 249 every seconds. Refresh: Click to refresh the page immediately. |<< : Updates the table starting from the first entry in the Statistics table, i.e. the entry with the lowest ID. >> : Updates the table, starting with the entry after the last entry currently displayed. Publication date: June, 2015 Revision A1...
  • Page 250 3-5.3.1.2 History This section provides an overview of RMON History entries. Each page shows up to 99 entries from the History table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the History table.
  • Page 251 Octets  The total number of octets of data (including those in bad packets) received on the network. Pkts  The total number of packets (including bad packets, broadcast packets, and multicast packets) received. Broadcast  The total number of good packets received that were directed to the broadcast address. Multicast ...
  • Page 252 3-5.3.1.3 Alarm This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table.
  • Page 253 Startup Alarm  The alarm that may be sent when this entry is first set to valid. Rising Threshold  Rising threshold value. Rising Index  Rising event index. Falling Threshold  Falling threshold value. Falling Index  Falling event index. Buttons ...
  • Page 254 3-5.3.1.4 Event This page provides an overview of RMON Event table entries.Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table.
  • Page 255 Refresh: Click to refresh the page immediately. |<< : Updates the table starting from the first entry in the Event Table, i.e. the entry with the lowest Event Index and Log Index. >>: Updates the table, starting with the entry after the last entry currently displayed Publication date: June, 2015 Revision A1...
  • Page 256: Lacp

    3-6 LACP 3-6.1 System Status This section describes that when you complete to set LACP function on the switch then it provides a status overview for all LACP instances Web Interface To display the LACP System status in the web interface: Click Monitor, LACP, System Status Checked “Auto-refresh”.
  • Page 257: 3-6.2 Port Status

    3-6.2 Port Status This section describes that when you complete to set LACP function on the switch then it provides a Port Status overview for all LACP instances Web Interface To display the LACP Port status in the web interface: 1.
  • Page 258 Partner Prio:  The partner's port priority. Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. Publication date: June, 2015 Revision A1...
  • Page 259: 3-6.3 Port Statistics

    3-6.3 Port Statistics This section describes that when you complete to set LACP function on the switch then it provides a Port Statistics overview for all LACP instances Web Interface To display the LACP Port status in the web interface: 1.
  • Page 260 Refresh: Click to refresh the page. Publication date: June, 2015 Revision A1...
  • Page 261: Loop Protection

    3-7 Loop Protection This section displays the loop protection port status the ports of the currently selected switch. Web Interface To display the Loop Protection status in the web interface: 1. Click Monitor, Loop Protection 2. If you want to auto-refresh the information then you need to evoke the “Auto refresh”. 3.
  • Page 262: Spanning Tree

    3-8 Spanning Tree 3-8.1 Bridge Status After you complete the MSTI Port configuration the you could to ask the switch display the Bridge Status. The Section provides a status overview of all bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: Web Interface To display the STP Bridges status in the web interface:...
  • Page 263 Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. Publication date: June, 2015 Revision A1...
  • Page 264: 3-8.2 Port Status

    3-8.2 Port Status After you complete the STP configuration the you could to ask the switch display the STP Port Status. The Section provides you to ask switch to display the STP CIST port status for physical ports of the currently selected switch.: Web Interface To display the STP Port status in the web interface: 1.
  • Page 265 Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. Publication date: June, 2015 Revision A1...
  • Page 266: 3-8.3 Port Statistics

    3-8.3 Port Statistics After you complete the STP configuration then you could to let the switch display the STP Statistics. The Section provides you to ask switch to display the STP Statistics detail counters of bridge ports in the currently selected switch. Web Interface To display the STP Port status in the web interface: 1.
  • Page 267 Clear: Clears the counters for the selected port. Refresh: Click to refresh the page. Publication date: June, 2015 Revision A1...
  • Page 268: Ipmc

    3-10 IPMC 3-10.1 IGMP Snooping 3-10.1.1 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Section provides you to let switch to display the IGMP Snooping detail status. Web Interface To display the IGMP Snooping status in the web interface: 1.
  • Page 269 Host Version :  Working Host Version currently. Querier Status :  Shows the Querier status is "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled. Queries Transmitted :  The number of Transmitted Queries. Queries Received : ...
  • Page 270: 3-10.1.2 Group Information

    3-10.1.2 Group Information After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Information. Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. The will use the last entry of the currently displayed table as a basis for the next lookup.
  • Page 271 Groups :  Group address of the group displayed. Port Members :  Ports under this group. Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. |<<: Updates the system log entries to the first available entry ID >>...
  • Page 272: Lldp

    3-11 LLDP 3-11.1 Neighbour This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. The columns hold the following information: Web Interface To show LLDP neighbours: 1.
  • Page 273 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). Management Address : ...
  • Page 274: 3-11.2 Lldp-Med Neighbour

    3-11.2 LLDP-MED Neighbour This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. This function applies to VoIP devices which support LLDP-MED. The columns hold the following information: Web Interface To show LLDP-MED neighbor: 1.
  • Page 275 further Endpoint Device Classes, as defined in the following. Each LLDP-MED Endpoint Device Class is defined to build upon the capabilities defined for the previous Endpoint Device Class. For-example will any LLDP-MED Endpoint Device claiming compliance as a Media Endpoint (Class II) also support all aspects of TIA-1057 applicable to Generic Endpoints (Class I), and any LLDP-MED Endpoint Device claiming compliance as a Communication Device (Class III) will also support all aspects of TIA-1057 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I).
  • Page 276 Application Type :  Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device. The possible application types are shown below. 1. Voice - for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services.
  • Page 277: 3-11.3 Poe

    DSCP :  DSCP is the DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474. Contain one of 64 code point values (0 through 63). Auto-negotiation  Auto-negotiation identifies if MAC/PHY auto-negotiation is supported by the link partner. Auto-negotiation status ...
  • Page 278 Power Type :  The Power Type represents whether the device is a Power Sourcing Entity (PSE) or Power Device (PD). If the Power Type is unknown it is represented as "Reserved". Power Source :  The Power Source represents the power source being utilized by a PSE or PD device. If the device is a PSE device it can either run on its Primary Power Source or its Backup Power Source.
  • Page 279: 3-11.4 Eee

    3-11.4 EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE turn off to save power, need time to boot up before sending traffic over the link. This time is called "wakeup time". To achieve minimal latency, devices can use LLDP to exchange information about their respective tx and rx "wakeup time ", as a way to agree upon the minimum wakeup time they need.
  • Page 280 from the remote link partner it can determine whether or not the remote link partner has received, registered and processed its most recent values. For example, if the local link partner receives echoed parameters that do not match the values in its local MIB, then the local link partner infers that the remote link partners request was based on stale information.
  • Page 281: 3-11.5 Port Statistics

    3-11.5 Port Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to per port counters for the currently selected switch Web Interface To show LLDP Statistics: 1. Click Monitor ,LLDP, then click Port Statistics to show LLDP counters 2.
  • Page 282 Total Neighbours Entries Deleted :  Shows the number of new entries deleted since switch reboot. Total Neighbours Entries Dropped :  Shows the number of LLDP frames dropped due to the entry table being full. Total Neighbours Entries Aged Out : ...
  • Page 283: Poe

    3-12 PoE This page allows the user to inspect the current status for all PoE ports. Web Interface To Display ECE Statistics in the web interface: Click Monitor, PoE Checked “Auto-refresh”. Click “ Refresh“ to refresh the port detailed statistics. Figure 3-12: The PoE Statistics Parameter description: Local Port...
  • Page 284 Port Status  The Port Status shows the port's status. The status can be one of the following values: PoE not available - No PoE chip found - PoE not supported for the port. PoE turned OFF - PoE disabled : PoE is disabled by user. PoE turned OFF - Power budget exceeded - The total requested or used power by the PDs exceeds the maximum power the Power Supply can deliver, and port(s) with the lowest priority is/are powered down.
  • Page 285: Mac Table

    3-13 MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Web Interface To Display MAC Address Table in the web interface: 1.
  • Page 286 Type :  Indicates whether the entry is a static or a dynamic entry. VLAN :  The VLAN ID of the entry. MAC address :  The MAC address of the entry. Port Members :  The ports that are members of the entry. Buttons ...
  • Page 287: Vlans

    3-14 VLANs 3-14.1 VLAN Membership This page provides an overview of membership status of VLAN users. The ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure VLAN membership configuration in the web interface: 1.
  • Page 288 If a port is included in a VLAN, an image will be displayed. If a port is included in a Forbidden port list, an image will be displayed. If a port is included in a Forbidden port list and dynamic VLAN user register VLAN on same Forbidden port, then conflict port will be displayed as VLAN Membership ...
  • Page 289: 3-14.2 Vlan Port

    3-14.2 VLAN Port The function Port Status gathers the information of all VLAN status and reports it by the order of Static NAS MVRP MVP Voice VLAN MSTP GVRP Combined. Web Interface To Display VLAN Port Status in the web interface: 1.
  • Page 290 Port :  The logical port for the settings contained in the same row. Port Type :  Shows the Port Type. Port type can be any of Unaware, C-port, S-port, Custom S-port. If Port Type is Unaware, all frames are classified to the Port VLAN ID and tags are not removed.
  • Page 291: Vcl

    3-15 VCL 3-15.1 MAC-based VLAN section This shows MAC-based VLAN entries configured by various MAC-based VLAN users. Currently we support following VLAN User types: CLI/Web/SNMP : These are referred to as static. NAS : NAS provides port-based authentication, which involves communications between a Supplicant, Authenticator, and an Authentication Server.
  • Page 292: 3-15.2 Protocol-Based Vlan

    3-15.2 Protocol-based VLAN 3-15.2.1 Protocol to Group This page shows you the protocols to Group Name (unique for each Group) mapping entries for the switch . Web Interface To Display Protocol-based VLAN configuration in the web interface: 1. Click Monitor, VCL, Protocol to Group. Checked “Auto-refresh”.
  • Page 293 b. PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP; if the OUI is an OUI for a particular organization, the protocol ID is a value assigned by that organization to the protocol running on top of SNAP.
  • Page 294: 3-15.2.2 Group To Vlan

    3-15.2.2 Group to VLAN This page shows you the configured Group Name to a VLAN for the switch . Web Interface To Display Group to VLAN configuration in the web interface: 1. Click Monitor, VCL, Group to VLAN. Checked “Auto-refresh”. 3.
  • Page 295: 3-15.3 Ip Subnet-Based Vlan

    3-15.3 IP Subnet-based VLAN The page shows IP subnet-based VLAN entries. This page shows only static entries. Web Interface To Display MAC-based VLAN configuration in the web interface: 1. Click Monitor, VCL, IP Subnet-based VLAN. Checked “Auto-refresh”. 3. Click “Refresh“ to refresh the port detailed statistics. Figure 3-15.3: The MAC-based VLAN Membership Status for User Static Parameter description: VCE ID :...
  • Page 296: Chapter 4. Diagnostics

    Diagnostics Chapter 4. This chapter provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed. The basic system check includes ICMP Ping, Link OAM, ICMPv6, and VeriPHY Cable Diagnostics. 4-1 Ping This section allows you to issue ICMP PING packets to troubleshoot IPv6 connectivity issues.
  • Page 297 Egress Interface (Only for IPv6):  The VLAN ID (VID) of the specific egress IPv6 interface which ICMP packet goes. The given VID ranges from 1 to 4094 and will be effective only when the corresponding IPv6 interface is valid. When the egress interface is not given, PING6 finds the best match interface for destination.
  • Page 298: Ping6

    4-2 Ping6 This section allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. Web Interface To configure an ICMPv6 PING Configuration in the web interface: 1. Specify ICMPv6 PING IP Address. 2. Specify ICMPv6 PING Size. 3. Click Start. Figure 4-2: The ICMPv6 Ping Parameter description: IP Address :...
  • Page 299 After you press , 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. PING server 10.10.132.20 64 bytes from 10.10.132.20: icmp_seq=0, time=0ms 64 bytes from 10.10.132.20: icmp_seq=1, time=0ms 64 bytes from 10.10.132.20: icmp_seq=2, time=0ms...
  • Page 300: Veriphy

    4-3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table.
  • Page 301: Traceroute

    4-4 Traceroute This page allows you to issue ICMP, TCP, or UDP packets to diagnose network connectivity issues. Web Interface To configure an ICMPv6 PING Configuration in the web interface: 1. Specify traceroute IP Address. 2. Specify traceroute Size. 3. Click Start. Figure 4-4: The ICMPv6 Ping Parameter description: Protocol :...
  • Page 302: Chapter 5. Maintenance

    Maintenance Chapter 5. This chapter describes the entire switch Maintenance configuration tasks to enhance the performance of local network including Restart Device, Firmware upgrade, Save/Restore, Import/Export. 5-1 Restart Device This section describes how to restart switch for any maintenance needs. Any configuration files or scripts that you saved in the switch should still be available afterwards.
  • Page 303: Factory Defaults

    5-2 Factory Defaults This section describes how to reset the Switch configuration to Factory Defaults. Any configuration files or scripts will recover to factory default values. Web Interface To configure a Factory Defaults Configuration in the web interface: 1. Chick Factory Defaults. 2.
  • Page 304: Software

    5-3 Software This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added functions by installing firmware upgrades. 5-3.1 Download This page facilitates an update of the firmware controlling the switch.. Web Interface To configure a Firmware Upgrade Configuration in the web interface: 1.
  • Page 305: 5-3.2 Software Image Select

    5-3.2 Software Image Select This page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web page displays two tables with information about the active and alternate firmware images.
  • Page 306 Image Information Image  The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk. Version  The version of the firmware image. Date  The date where the firmware was produced. Buttons ...
  • Page 307: Configuration

    5-4 Configuration The switch stores its configuration in a number of text files in CLI format. The files are either virtual (RAM-based) or stored in flash on the switch. There are three system files: running-config: A virtual file that represents the currently active configuration on the ...
  • Page 308: 5-4.2 Upload

    5-4.2 Upload The configuration upload function will be backuped and saved configuration from the switch’s configuration into the running web browser PC. It is possible to upload any of the files on the switch to the web browser. Select the file and click Upload of running-config may take a little while to complete, as the file must be prepared for upload.
  • Page 309: 5-4.3 Download

    5-4.3 Download This section describes to export the Switch Configuration for maintenance needs. Any current configuration files will be exported as text format. It is possible to download a file from the web browser to all the files on the switch, except default-config, which is read-only.
  • Page 310 Parameter description: Browse :  Click the “Browse...” button to search the configuration text file and filename. Download:  Click the “Download” button then the switch will start to download the configuration from configuration stored location PC or Server. Publication date: June, 2015 Revision A1...
  • Page 311: 5-4.4 Activate

    5-4.4 Activate It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click . This will initiate the process of completely replacing the existing configuration with that of the selected file.
  • Page 312: 5-4.5 Delete

    5-4.5 Delete It is possible to delete any of the writable files stored in flash, including startup-config. If this is done and the switch is rebooted without a prior Save operation, this effectively resets the switch to default configuration. Web Interface To delete configuration in the web interface: 1.
  • Page 313: Chapter 6 Dms-Management

    DMS-Management Chapter 6 Information The Information page shows general system information for the PoE DMS Switch including its DMS software version, the maximum number of device can manage, MAC Address and IP Address for the Switch. Web interface To configure DMS Information in the web interface: 1.
  • Page 314 Parameter description: DMS Software Version:  Displays the current DMS firmware version number. Total Device:  Displays the number of devices in topology. MAC Address:  The MAC Address of this switch. Current IP Address:  The current address (IPv4). DMS use switch interface VLAN1. DMS State: ...
  • Page 315: Device List

    Device List You can identify the system by configuring switch contact information, name, and location. Web interface To configure DMS NVR & CMS in the web interface: 1. Click DMS, Management, and NVR & CMS. 2. Click Apply Figure 6-2: DMS NVR & CMS Parameter description: Remove: ...
  • Page 316: Chapter 7 Dms-Graphic Monitoring

    DMS-Graphic Monitoring Chapter 7 Topology View In this page, you can see a visual view of the topology in a cluster of networks. Web interface To configure DMS Topology View in the web interface: 1. Click DMS, Graphic Monitoring, and Topology View. Figure 7-1: Topology View Publication date: June, 2015 Revision A1...
  • Page 317: Floor View

    Floor View In this page, the administrator can place a device per time onto the custom image, which you have already uploaded, by dragging-and-dropping markers in the device list. Web interface To configure DMS Floor View in the web interface: 1.
  • Page 318: Map View

    Map View In this page, you can view a realistic representation of device in the network. To find one of devices within the network, enter the device name in the search bar. Click “Device List” to hide the “Device List” on the page or show a list of devices. Web interface To configure DMS Map View in the web interface: 1.
  • Page 319: Chapter 8 Dms-Mauntenance

    DMS-Mauntenance Chapter 8 8-1 Floor Image In this page, an administrator can add or delete a custom map or floor image Web interface To configure DMS Information in the web interface: 1. Click DMS, Maintenance, Camera config and Floor Image 2.
  • Page 320: Trouble Shooting

    Trouble shooting In this page, you can troubleshoot any issue you have with device connected to the network. This feature is designed primarily for administrators to verify and test the link route between the switch and the device. A troubleshooting solution is provided by the system so that administrators can detect where the problem lies.
  • Page 321: Traffic Chart

    8-3 Traffic Chart This page displays visual chart of network traffic of all the devices managed by PoE DMS switch. Web interface To configure DMS Information in the web interface: 1. Click DMS, Monitor and Traffic. 2. Specify the DMS state, longitude and latitude, IP address, Subnet Mask. 3.

Table of Contents