Page 2
CTC Union Technologies makes no warranty, representation, or guarantee regarding the suitability of its products for any particular purpose, nor does CTC Union assume any liability arising out of the application or use of any product and specifically disclaims any and all liability, including without limitation any consequential or incidental damages.
Page 3
MSW-4424C MSW-4424CS This document is the current official release manual. Please check CTC Union's website for any updated manual or contact us by E-mail at sales@ctcu.com. Please address any comments for improving this manual or to point out omissions or errors to marketing@ctcu.com. Thank you.
INTRODUCTION CHAPTER 1. INTRODUCTION Thank you for purchasing this product from CTC Union. We hope this product is everything you wanted and more. Our Product Managers and R&D team have placed a "quality first" motto in our development of this series of Ethernet switches with the desire of providing a highly stable and reliable product that will give years of trouble-free operation.
Page 19
AC, DC, 2 AC, 2 DC, AC+DC) Port21~24 Port1~20 Port 25~28 MGMT 1PPS/TOD Combo 1/10G SFP+ 100/1000M SFP Port for SyncE Console Default Push Earth Ground LED Indicators Figure 2. Front Panel for MSW-4424CS Port Button Fan Module Figure 3. Rear Panel for MSW-4424C &MSW-4424CS...
INSTALLATION CHAPTER 2. INSTALLATION The MSW-4424C(S) are designed to be placed on the flat desktop or to be mounted in a standardized 19-inch rack for rack-mount placement. The switch you purchase should come with rack-mounting brackets from the factory and these brackets are used for rack-mounting installation.
Transmit Data In from DTE Signal Ground CONSOLE 2.3.2 Accessory Cable This DB9F to RJ-45 cable provides a connection for the RS-232. This cable is used between the MSW-4424C(S) and the serial port of terminal. to PC COM Port Pins RJ-45 Ref.
CHAPTER 2 INSTALLATION 2.5 Rack Mounting When installing the rack mount brackets, be sure to correctly align the orientation pin. Use the screws provided in the rack-mounting kit to securely fasten the brackets. Figure 8. Attaching Rack-Mounting Brackets Figure 9. The Switch with Rack-Mounting Brackets Figure 10.
CHAPTER 2 INSTALLATION 2.6 LED Indicators & Reset to Default Button Color Status Meaning Green The switch is active. Alert The switch does not receive power. Power 1 module is working. PWR 1 Green Power 1 module is off. Power 2 module is working. PWR 2 Green Power 2 module is off.
PC can be physically connected to the local MSW-4424C(S) Series switch at the CONSOLE port using RJ45 to RS-232 console cable. Accessing the switch via CONSOLE port allows the user to use CLI (Command Line Interface) to manage and configure the device. The out-of- band management is relatively useful when you lose the network connection to the device.
CHAPTER 3 INTRODUCTION TO CLI 3.3 CLI Modes The Command Line Interface (CLI) is mainly divided into four basic modes; these are User mode, EXEC mode, Config mode and Config Interface mode. After entering the username and password, you start from the EXEC mode (prompted with “#”).
CHAPTER 3 INTRODUCTION TO CLI separate them. 2. The uter curly bracket means that this is a must parameter. At leaset one value should be specified. | (Vertical Use a vertical bar to separate { { <address> <netmask> } | Enter IP address or use bar) options.
CHAPTER 3 INTRODUCTION TO CLI ------------------ Image managed Version Date : 2015-01-01T00:03:06+00:00 Alternative Image ------------------ Image : managed.bk Version Date : 2015-08-03T16:21:44+08:00 ------------------ SID : 1 ------------------ Software Version : V1.038 Build Date : 2015-08-03T16:33:15+08:00 3.6.7 Show Running Configurations # show running-config Building configuration...
CHAPTER 3 INTRODUCTION TO CLI interface GigabitEthernet 1/1-5 exit interface GigabitEthernet 1/1-3,5,7 flowcontrol on exit show interface * status disable show clock detail show dot1x show history 3.6.9 Help Help command can be issued in User, Exec, and Global Config mode to get a hint message describing how to use “show”...
CHAPTER 3 INTRODUCTION TO CLI In User mode, only limited commands are available. These commands are used for clearing statistics, entering Exec mode and pinging the specified destination. To configure a function, you should enter Config mode or Config Interface mode. 3.7.1 >...
CHAPTER 3 INTRODUCTION TO CLI 3.8.29 # delete Syntax: # delete <path> Explanation: Delete a file saved in Flash. Parameters: <Path : word>: Name of the file in Flash to be deleted. Example: Delete a file named 201 in Flash. # dir Directory of flash: r- 1970-01-01 00:00:00...
CHAPTER 3 INTRODUCTION TO CLI [ size <size> ]: The size or length of echo packets. [ interval <seconds> ]: The time interval between each ping request. [ interface vlan <v_vlan_id> ]: Specify the VLAN ID. 3.8.40 # reload cold Syntax: # reload cold Explanation: Perform a cold reload on the system.
CHAPTER 3 INTRODUCTION TO CLI Negation: # no terminal editing 3.8.44 # terminal exec-timeout Syntax: # terminal exec-timeout <0-1440> [<0-3600>] Parameters: <0-1440>: Specify the timeout value in minutes. [<0-3600>]: Specify the timeout value in seconds. Explanation: Set up terminal timeout value. Show: >...
CHAPTER 3 INTRODUCTION TO CLI 3.8.47 # terminal width Syntax: # terminal width <0 or 40-512> Parameters: <0 or 40-512>: Specify the width displayed on the screen. “0” means unlimited width. Explanation: Set up terminal display width. Show: > show terminal # show terminal Negation: # no terminal width 3.8.48 # no port-security shutdown...
CHAPTER 3 INTRODUCTION TO CLI tacacs: Use remote TACACS+ server(s) for authentication. NOTE: Methods that involve remote servers will time out if the remote servers are offline. In this case the next method is tried. Each method is tried and continues until a method either approves or rejects a user. If a remote server is used for primary authentication it is recommended to configure secondary authentication as 'local'.
CHAPTER 3 INTRODUCTION TO CLI Negation: (config-if)# no access-list policy 3.9.3.7 (config-if)# access-list port-state Syntax: (config-if)# access-list port-state Explanation: Enable a specific port’s port state. Negation: (config-if)# no access-list port-state 3.9.3.8 (config-if)# access-list rate-limiter Syntax: (config-if)# access-list rate-limiter <rate_limiter_id> Parameters: <rate_limiter_id:1-16>: Specify a rate limiter ID to a specific port.
CHAPTER 3 INTRODUCTION TO CLI 3.9.4 (config)# aggregation 3.9.4.1 (config)# aggregation mode Syntax: (config)# aggregation mode { [ smac ] [ dmac ] [ ip ] [ port ] } Explanation: Configure aggregation mode. Parameters: [smac]: All traffic from the same Source MAC address is output on the same link in a trunk. [dmac]: All traffic with the same Destination MAC address is output on the same link in a trunk.
CHAPTER 3 INTRODUCTION TO CLI <word16>: Specify the name of the timezone. <-23-23>: Hours offset from UTC. [<0-59>]: Minutes offset from UTC. Negation: (config)# no clock timezone Show: # show clock # show clock detail 3.9.7 (config)# default access-list rate-limiter Syntax: (config)# default access-list rate-limiter [ <rate_limiter_list>...
CHAPTER 3 INTRODUCTION TO CLI 3.9.8.2 (config)# dot1x re-authentication Syntax: (config)# dot1x re-authentication Explanation: Set clients to be re-authenticated after an interval set in "Re-authenticate" field. Re-autentication can be used to detect if a new device is attached to a switch port. Example: Enable re-authentication function.
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# dot1x timeout tx-period 30 Negation: (config)# no dot1x timeout tx-period 3.9.8.5 (config)#dot1x authentication timer inactivity Syntax: (config)# dot1x authentication timer inactivity <10-1000000> Explanation: Specify the period that is used to age out a client’s allowed access to the switch via 802.1X and MAC- based authentication.
CHAPTER 3 INTRODUCTION TO CLI Parameters: { [ guest-vlan ] [ radius-qos ] [ radius-vlan ] }: [guest-vlan]: Enable guest VLAN. A Guest VLAN is a special VLAN typically with limited network access. When checked, the individual ports' ditto setting determines whether the port can be moved into Guest VLAN.
CHAPTER 3 INTRODUCTION TO CLI Explanation: The maximum number of times the switch transmits an EAPOL Request Identity frame without receiving a response before adding a port to the Guest VLAN. The value can only be changed when the Guest VLAN option is globally enabled.
CHAPTER 3 INTRODUCTION TO CLI Negation: (config-if)# no dot1x radius-vlan 3.9.8.15 (config-if)# dot1x re-authenticate Syntax: (config-if)# dot1x re-authenticate Explanation: Schedules reauthentication to whenever the quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, reauthentication will be attempted immediately. This command only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized.
CHAPTER 3 INTRODUCTION TO CLI Parameters: <inst>: Specify the instance number. { lockout | forced | manualp | manualw | exercise | freeze | lockoutlocal }: Specify one of the EPS commands required for EPS configuration. lockout: End-to-end lock out of the protection entity. forced: Forced switch to the protection entity.
CHAPTER 3 INTRODUCTION TO CLI <inst>: Specify the instance number. holdoff <hold>: Specify the hold off timer. The allowed value is in 100 ms (Max 10 sec.). Negation: (config)# no eps <inst> holdoff Show: # show eps [ <inst> ] [ detail ] 3.9.11.5 (config)# eps <inst>...
CHAPTER 3 INTRODUCTION TO CLI { owner | neighbor }: Specify the ring port is a owner or neighbor. RPL (Ring Protection Link) is responsible for blocking traffic over the RPL so that no loops are formed in the Ethernet traffic. { port0 | port1 }: Specify the port applies to this rule.
CHAPTER 3 INTRODUCTION TO CLI 3.9.12.9 (config)# erps <group> version { 1 | 2 } Syntax: (config)# erps <group> version { 1 | 2 } Explanation: Configure ERPS version for a specific profile. Parameters: <group: 1-64>: Specify a group number. The allowed range is from 1 to 64. { 1 | 2 }: Specify ERPS version 1 or 2.
CHAPTER 3 INTRODUCTION TO CLI { [ vid <evc_vid> ] }: Specify the VLAN ID in the PB network. It may be inserted in a C-tag, S-tag or S-custom tag depending on the NNI port VLAN configuration. The allowed range is from 1 through 4095. [ ivid <ivid>...
CHAPTER 3 INTRODUCTION TO CLI untagged: The ECE will match untagged frames only. tagged: The ECE will match tagged frames only. c-tagged: The ECE will match custom tagged frames only. s-tagged: The ECE will match service tagged frames only. any: The ECE will match both tagged and untagged frames. [ frame-type { any | ipv4 | ipv6 } ]: The frame type for the ECE.
Page 67
CHAPTER 3 INTRODUCTION TO CLI Explanation: Configure a EVCE policer entry. Parameters: [ update ]: Update this policer entey. <policer_id>: Specify the Policer ID that is used to identify one of the 2048 policers. [ { enable | disable } ]: The administrative state of the bandwidth profile. The allowed values are: enable: The bandwidth profile enabled.
CHAPTER 3 INTRODUCTION TO CLI 3.9.17 (config)# fanmode { auto | full | low } Syntax: (config)# fanmode { auto | full | low } Explanation: Adjust the fan speed of the device. Parameters: auto: The fan speed is adjusted automatically depending on the current temperature of the device. full: The fan operates in full speed.
CHAPTER 3 INTRODUCTION TO CLI 3.9.18.3 (config)# gvrp time Syntax: (config)# gvrp time { [ join-time <jointime> ] [ leave-time <leavetime> ] [ leave-all-time <leavealltime> ] } Explanation: Set up the maximum number of VLANs can be learned via GVRP. Parameters: [ join-time <jointime>...
CHAPTER 3 INTRODUCTION TO CLI <WORD32>: Specify a descriptive name for this device. Indicate the hostname for this device. Alphabets (A-Z; a-z), digits (0-9) and minus sign (-) can be used. However, space characters are not allowed. The first character must be an alphabet character.
CHAPTER 3 INTRODUCTION TO CLI 3.9.20.2 (config)# interface vlan Syntax: (config)# interface vlan <vlist> Explanation: Enter Config Interface VLAN mode for this specific interface. Example: Enter Config Interface VLAN 1 for port 1. # config t (config)# (config)# interface vlan 1 (config-if-vlan)# 3.9.21 (config)# ip 3.9.21.1 (config)# ip arp inspection...
CHAPTER 3 INTRODUCTION TO CLI 3.9.21.3 (config)# ip arp inspection translate Syntax: (config)# ip arp inspection translate [ interface <port_type> <in_port_type_id> <vlan_var> <mac_var> <ipv4_var> ] Explanation: Translate the dynamic entry to static one. Parameters: <port_type> <in_port_type_id>: Specify the port type and port number. <vlan_var>: Specify a configured VLAN ID.
CHAPTER 3 INTRODUCTION TO CLI Show: < show ip arp # show ip arp Clear: # clear ip arp 3.9.21.6 (config)# ip dhcp excluded-address Syntax: (config)# ip dhcp excluded-address <low_ip> [ <high_ip> ] Parameters: <low_ip> [ <high_ip> ]: Specify the IP address range that will not be used for DHCP IP assignment. Explanation: Configure IP addresses that are not used for DHCP IP allocation.
CHAPTER 3 INTRODUCTION TO CLI Explanation: Enable DHCP relay function. Example: Enable DHCP relay function. # config t (config)# ip dhcp relay Negation: (config)# no ip dhcp relay Show: > show ip dhcp relay [statistics] # show ip dhcp relay [statistics] Clear: # clear ip dhcp relay statistics 3.9.21.9 (config)# ip dhcp relay information circuit-id format Syntax: (config)# ip dhcp relay information circuit-id format { standard | tr101 | alias }...
CHAPTER 3 INTRODUCTION TO CLI 3.9.21.11 (config)# ip dhcp relay information policy {drop | keep |replace} Syntax: (config)# ip dhcp relay information policy { drop | keep | replace } Explanation: Specify DHCP Relay information reforwarding policy action. Parameters: { drop | keep | replace }: Specify one of the relay information policy options. drop: Drop the packet when it receives a DHCP message that already contains relay information.
CHAPTER 3 INTRODUCTION TO CLI Explanation: Specify the remoted ID format inserted in DHCP Relay information option. Negation: (config)# no ip dhcp relay information remote-id format Show: # show ip dhcp relay 3.9.21.14 (config)# ip dhcp server Syntax: (config)# ip dhcp server Explanation: Enable DHCP server function globally.
CHAPTER 3 INTRODUCTION TO CLI Explanation: Configure the allowed VLAN when DHCP Snooping is enabled. Show: > show ip dhcp snooping [ interface ( <port_type> [ <in_port_list> ] ) ] # show ip dhcp snooping [ interface ( <port_type> [ <in_port_list> ] ) ] # show ip dhcp snooping table 3.9.21.21 (config)# ip dns proxy Syntax: (config)# ip dns proxy...
CHAPTER 3 INTRODUCTION TO CLI 3.9.21.24 (config)# ip http secure-redirect Syntax: (config)# ip http secure-redirect Explanation: Enable the HTTPS redirect mode operation. It applies only if HTTPS mode is "Enabled". Automatically redirects HTTP of web browser to an HTTPS connection when both HTTPS mode and Automatic Redirect are enabled. Example: Enable HTTPs automatic redirect mode.
CHAPTER 3 INTRODUCTION TO CLI dhcp [ interface vlan <v_vlan_id> ]: Configure DNS IP address via specific VLAN DHCP server. Negation: (config)# no ip name-server Show: > show ip name-server # show ip name-server 3.9.21.31 (config)# ip route Syntax: (config)# ip route <v_ipv4_addr> <v_ipv4_netmask> <v_ipv4_gw> Explanation: Configure a static IP route.
CHAPTER 3 INTRODUCTION TO CLI # show ipv6 route [interface vlan<vlan_list>] # show ip route 127.0.0.1/32 via 127.0.0.1 <UP HOST> 224.0.0.0/4 via 127.0.0.1 <UP> # show ipv6 route interface vlan 1 ::1/128 via ::1 <UP HOST> 3.9.21.33 (config)# ip source binding interface Syntax: (config)# ip source binding interface <port_type>...
CHAPTER 3 INTRODUCTION TO CLI deny: Log denied entries. permit: Log permitted entries. all: Log all entries. Negation: (config-if)# no ip arp inspection logging 3.9.21.40 (config-if)# ip arp inspection trust Syntax: (config-if)# ip arp inspection trust Explanation: Enable trust state on the selected interfaces. Negation: (config-if)# no ip arp inspection trust 3.9.21.41 (config-if)# ip dhcp snooping trust Syntax: (config-if)# ip dhcp snooping trust...
CHAPTER 3 INTRODUCTION TO CLI { none | alias | configured }: Specify DHCP Option 82 suboption 6 (subscriber ID). none: Sub-option 6 is not used. alias: Use the individual values for port Alias on a per port basis. configured: Configure the desired Subscriber ID. Show: >...
CHAPTER 3 INTRODUCTION TO CLI 3.9.21.47 (config-if)# ip igmp snooping filter Syntax: (config-if)# ip igmp snooping filter <profile_name> Explanation: Use this command to filter specific multicast traffic on a per port basis. Parameters: <profile_name>: Specify the configured multicast groups that are denied on a port. When a certain multicast group is selected on a port, IGMP join reports received on a port are dropped.
CHAPTER 3 INTRODUCTION TO CLI 3.9.21.50 (config-if)# ip igmp snooping mrouter Syntax: (config-if)# ip igmp snooping mrouter Explanation: Set this interface to Router port. If IGMP snooping cannot locate the IGMP querier, you can manually designate a port which is connected to a known IGMP querier (i.e., a multicast router/switch). This interface will then join all the current multicast groups supported by the attached router/switch to ensure that multicast traffic is passed to all appropriate interfaces within the switch.
CHAPTER 3 INTRODUCTION TO CLI v3: Compatible with IGMP version 3. Negation: (config-if-vlan)# no ip igmp snooping compatibility 3.9.21.57 (config-if-vlan)# ip igmp snooping last-member-query-interval Syntax: (config-if-vlan)# ip igmp snooping last-member-query-interval <ipmc_lmqi> Explanation: LMQI stands for Last Member Query Interval and is to configure the maximum time to wait for IGMP/MLD report memberships on a receiver port before removing the port from multicast group membership.
CHAPTER 3 INTRODUCTION TO CLI 3.9.21.67 (config-if-vlan)# ipv6 mld snooping last-member-query-interval Syntax: (config-if-vlan)# ipv6 mld snooping last-member-query-interval <ipmc_lmqi> Explanation: LMQI stands for Last Member Query Interval and is to configure the maximum time to wait for IGMP/MLD report memberships on a receiver port before removing the port from multicast group membership. The allowed range is 0~31744 tenths of a second.
CHAPTER 3 INTRODUCTION TO CLI Show: # show ipmc profile 3.9.22.2 (config)# ipmc profile <profile_name> Syntax: (config)# ipmc profile <profile_name> Parameters: <profile_name: word16>: Specify the desired profile name in 16 characters. When entered is pressed, the command will change to (config-ipmc-profile)#. Explanation: Set up an IPMC profile.
CHAPTER 3 INTRODUCTION TO CLI Negation: (config-ipmc-profile)# no range <entry_name> Show: # show ipmc profile #show ipmc profile [ <profile_name> ] [ detail ] 3.9.23 (config)# ipv6 mld host-proxy 3.9.23.1 (config)# ipv6 mld host-proxy Syntax: (config)# ipv6 mld host-proxy Explanation: Enable IPv6 MLD proxy. When MLD proxy is enabled, the switch exchanges MLD messages with the router on its upstream interface, and performs the host portion of the MLD task on the upstream interface as follows: ...
CHAPTER 3 INTRODUCTION TO CLI 3.9.23.5 (config)# ipv6 mld ssm-range Syntax: (config)# ipv6 mld ssm-range <v_ipv6_mcast> <ipv6_prefix_length> Parameters: <v_ipv6_mcast>: Specify valid IPv6 mluticast address. <ipv6_prefix_length>: Specify prefix length range from 8 to 128. Explanation: Specify SSM (Source-Specific Multicast) Range. This setting allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range.
CHAPTER 3 INTRODUCTION TO CLI <v_ipv6_subnet>: Specify IPv6 route address. { <v_ipv6_ucast> | interface vlan <v_vlan_id> <v_ipv6_addr> }: Specify one of the options. This could be either IPv6 next hop unicast address or an interface. Explanation: Configure a static IPv6 route. Negation: (config)# no ipv6 route <v_ipv6_subnet>...
CHAPTER 3 INTRODUCTION TO CLI <throttling>: This field limits the maximum number of multicast groups that a port can join at the same time. When the maximum number is reached on a port, any new IGMP join reports will be dropped. By default, unlimited is selected.
CHAPTER 3 INTRODUCTION TO CLI 3.9.24.5 (config-if)# lacp role { active | passive } Syntax: (config-if)# lacp role { active | passive } Explanation: Configure LACP role for this interface. Parameters: { active | passive }: Specify either “Active” or “Passive” role depending on the device’s capability of negotiating and sending LACP control packets.
CHAPTER 3 INTRODUCTION TO CLI Example: Enter Console 0 mode. # config t (config)# line console 0 (config-line)# Show: > show line [ alive ] # show line [ alive ] 3.9.25.2 (config-line)# do Syntax: (config-line)# do <command> Explanation: To run EXEC. commands. Parameters: <command>: Enter the EXEC.
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# line console 0 (config-line)# end 3.9.25.5 (config-line)# exec-banner Syntax: (config-line)# exec-banner Explanation: Enable the display of EXEC banner. Example: Enable the display of EXEC banner. # config t (config)# line console 0 (config-line)# exec-banner Negation: (config-line)# no exec-banner Show: >...
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# line console 0 (config-line)# exit (config)# 3.9.25.8 (config-line)# help Syntax: (config-line)# help Explanation: Show the Help explanation. Example: Show Help explanation. # config t (config)# line console 0 (config-line)# help Help may be requested at any point in a command by entering a question mark '?'.
CHAPTER 3 INTRODUCTION TO CLI 3.9.25.10 (config-line)# length Syntax: (config-line)# length <length> Explanation: Configure the number of lines displayed on the screen. Parameters: <length>: Specify the number of lines displayed on the screen. The allowed range is 3 to 512. Specify “0” for no pausing.
CHAPTER 3 INTRODUCTION TO CLI Negation: (config-line)# no width Show: > show line [ alive ] # show line [ alive ] 3.9.26 (config)# lldp 3.9.26.1 (config)# lldp holdtime Syntax: (config)# lldp holdtime <val> Explanation: This setting defines how long LLDP frames are considered valid and is used to compute the TTL. The default is 4.
CHAPTER 3 INTRODUCTION TO CLI <val>: Specify a value between 5 and 32768 (seconds). Example: Set the LLDP timer value to 35. # config t (config)# lldp timer 35 Negation: (config)# no lldp timer 3.9.26.4 (config)# lldp transmission-delay Syntax: (config)# lldp transmission-delay <val> Parameters: <val>: Specify a value between 1 and 8192 (seconds).
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# lldp med datum wgs84 Negation: (config)# no lldp med datum 3.9.26.6 (config)# lldp med fast Syntax: (config)# lldp med fast <v_1_to_10> Explanation: Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general.
CHAPTER 3 INTRODUCTION TO CLI floor: Example: 4. room-number: Room number - Example: 450F. place-type: Example: Office. postal-community-name: Example: Leonia. p-o-box: Example: 12345. additional code: Example: 1320300003. Example: Set the country code to “UK”. Example: Set the holdtime to 5. # config t (config)# lldp med location-tlv civic-addr country UK Negation: (config)# no lldp med location-tlv civic-addr { country | state | county | city | district | block | street |...
CHAPTER 3 INTRODUCTION TO CLI Example: Set the holdtime to 5. # config t (config)# lldp med location-tlv latitude north 5 Negation: (config)# no lldp med location-tlv latitude 3.9.26.11 (config)# lldp med location-tlv longitude Syntax: (config)# lldp med location-tlv longitude { west | east } <v_word9> Explanation: Configure a value for longitude.
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# lldp med media-vlan-policy 1 voice tagged 100 l2-priority 7 DSCP 63 Negation: (config)# no lldp med media-vlan-policy <policies_list> Show: > show lldp med media-vlan-policy [ <v_0_to_31> ] # show lldp med media-vlan-policy [ <v_0_to_31> ] 3.9.26.13 (config-if)# lldp cdp-aware Syntax: (config-if)# lldp cdp-aware Explanation: Configures if the interface shall be CDP aware (CDP discovery information is added to the LLDP neighbor...
CHAPTER 3 INTRODUCTION TO CLI Show: > show lldp med media-vlan-policy [ <v_0_to_31> ] # show lldp med media-vlan-policy [ <v_0_to_31> ] 3.9.26.16 (config-if)# lldp receive Syntax: (config-if)# lldp receive Explanation: The switch will analyze LLDP information received from neighbours. Negation: (config-if)# no lldp receive Show: >...
CHAPTER 3 INTRODUCTION TO CLI received on UDP port 514. Syslog server will not send acknowledgments back to the sender since UDP is a connectionless protocol and it does not provide acknowledgments. The syslog packet will always send out, even if the syslog server does not exist.
CHAPTER 3 INTRODUCTION TO CLI 3.9.28.3 (config)# loop-protect transmit-time Syntax: (config)# loop-protect transmit-time <t> Explanation: Configure the interval between each loop protection PDU sent on each port. Parameters: <t: 1-10>: Specify a transmit time value. The valid values are from 1 to 10 seconds. Example: Set the transmit time value to 5 seconds.
CHAPTER 3 INTRODUCTION TO CLI Show: # show loop-protect [ interface ( <port_type> [ <plist> ] ) ] 3.9.29 (config)# mac 3.9.29.1 (config)# mac address-table aging-time Syntax: (config)# mac address-table aging-time <v_0_10_to_1000000> Explanation: Configure the aging time for a learned MAC to be appeared in MAC learning table. Parameters: <v_0_10_to_1000000>: Specify an aging time value for MAC address table.
CHAPTER 3 INTRODUCTION TO CLI Syntax: (config-if)# mtu <max_length> Explanation: Configure the maximum transmission unit for this specific interface. Parameters: <max_length: 1518-10056>}: Specify the MTU. The range is 1518 to 10056 bytes. Negation: (config-if)# no mtu Show: # show interface ( <port_type> [ <v_port_type_list> ] ) status 3.9.32 (config)# mep 3.9.32.1 (config)# mep <inst>...
CHAPTER 3 INTRODUCTION TO CLI { [ interface ( <port_type>) [ <v_port_type_list> ] ]}: Specify one of the options. * means all interfaces. { both | rx | tx }: Specify which direction of traffic should be mirrored to the destination port. “both” means both received and transmitted traffic.
CHAPTER 3 INTRODUCTION TO CLI 3.9.34.5 (config)# mvr name <mvr_name> igmp-address Syntax: (config)# mvr name <mvr_name> igmp-address <v_ipv4_ucast> Explanation: Configure IGMP IPv4 address for the specified MVR entry. Parameters: <mvr_name>: Specify a name for this MVR entry. The allowed characters are 16. <v_ipv4_ucast>: Specify the IPv4 unicast address as source address used in IP header for IGMP control frames.
CHAPTER 3 INTRODUCTION TO CLI 3.9.34.7 (config)# mvr name <mvr_name> mode Syntax: (config)# mvr name <mvr_name> mode { dynamic | compatible } Explanation: Configure MVR mode. Parameters: <mvr_name>: Specify a name for this MVR entry. The allowed characters are 16. { dynamic | compatible }: Specify one of the options.
CHAPTER 3 INTRODUCTION TO CLI 3.9.34.9 (config)# mvr vlan <v_vlan_list> channel Syntax: (config)# mvr vlan <v_vlan_list> channel <profile_name> Explanation: Configure MVR name and channel. Parameters: <v_vlan_list>: Specify MVR VLAN ID for this entry. <profile_name>: Specify a channel name for this MVR entry. The allowed characters are 16. Example: Set up Set up MVR VLAN 201 and its corresponding channel.
CHAPTER 3 INTRODUCTION TO CLI 3.9.34.13 (config)# mvr vlan <v_vlan_list> last-member-query-interval Syntax: (config)# mvr vlan <v_vlan_list> last-member-query-interval <ipmc_lmqi> Explanation: Configure the maximum time to wait for IGMP/MLD report memberships on a receiver port before removing the port from multicast group membership. Parameters: <v_vlan_list>: Specify MVR VLAN ID for this entry.
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# port-security aging time 1800 Negation: (config)# no port-security aging time Show: > show port-security port [ interface ( <port_type> [ <v_port_type_list> ] ) ] # show port-security port [ interface ( <port_type> [ <v_port_type_list> ] ) ] 3.9.36.4 (config-if)# port-security Syntax: (configt-if)# port-security Explanation: Enable the port security function on the selected ports.
CHAPTER 3 INTRODUCTION TO CLI 3.9.36.6 (config-if)# port-security violation Syntax: (configt-if)# port-security violation { protect | trap | trap-shutdown | shutdown } Explanation: If the limit is exceeded, the specified action will take effect. Parameters: { protect | trap | trap-shutdown | shutdown }: Specify one of the actions taken when the limit is exceeded. protect: Do not allow more than the specified limit of MAC addresses to access on a port.
CHAPTER 3 INTRODUCTION TO CLI <cmd>: Initial valid words and literals of the command to modify, in 128 characters. Example: The following example sets the privilege level to 15 for any Exec mode (user or privileged) command that start with the letter "v" # config t (config)# privilege exec level 15 host Negation: (config)# no privilege { exec | configure | config-vlan | line | interface | if-vlan | ipmc-profile | snmps-host |...
CHAPTER 3 INTRODUCTION TO CLI va: Voice Admit PHB (DSCP 44). cos <cos>: Indicate the Class of Service level. The allowed range is 0 to 7. A CoS class of 0 has the lowest priority, while 7 has the highest priority. dpl <dpl>: Specify the Drop Precedence Level.
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# qos qce refresh 3.9.39.7 (config)# qos qce update Syntax: (config)# qos qce { [ update ] } <qce_id> [ { next <qce_id_next> } | last ] [ interface ( <port_type> [ <port_list> ] ) ] [ smac { <smac> | <smac_24> | any } ] [ dmac { <dmac> | unicast | multicast | broadcast | any } ] [ tag { [ type { untagged | tagged | c-tagged | s-tagged | any } ] [ vid { <ot_vid>...
Page 151
CHAPTER 3 INTRODUCTION TO CLI etype: This option can only be used to filter Ethernet II formatted packets. (Options: Any, Specific – 600-ffff hex; Default: ffff). Note that 800 (IPv4) and 86DD (IPv6) are excluded. A detailed listing of Ethernet protocol types can be found in RFC 1060.
CHAPTER 3 INTRODUCTION TO CLI Parameters: cos <cos: 0-7>: Specify a QoS class value. dpl <dpl:0-1>: Specify a DPL value (0 or 1). pcp <pcp: 0-7>: Specify a PCP (Priority Code Point) value. dei <dei: 0-1>: Specify a DEI value (0 or 1). Negation: (config-if)# no qos map cos-tag cos <cos>...
CHAPTER 3 INTRODUCTION TO CLI 3.9.39.17 (config-if)# qos ingress cos Syntax: (config-if)# qos ingress cos <cos> Explanation: Configure CoS value on this selecte infterface. Parameters: <cos>: Specify COS value (1-7). Negation: (config-if)# no qos ingress cos Show: # show qos # show qos [ { interface [ ( <port_type>...
CHAPTER 3 INTRODUCTION TO CLI [ flowcontrol ]: Enable Flow Control. If flow control is enabled and the port is in flow control mode, then pause frames are sent instead of discarding frames Negation: (config-if)# no qos ingress policer Show: # show qos # show qos [ { interface [ ( <port_type>...
CHAPTER 3 INTRODUCTION TO CLI 3.9.40.4 (config)# radius-server deadtime Syntax: (config)# radius-server deadtime <minutes> Explanation: Configure RADIUS server deadtime value. Deadtime is the period during which the switch will not send new requests to a server that has failed to respond to a previous request. This will stop the switch from continually trying to contact a server that it has already determined as dead.
CHAPTER 3 INTRODUCTION TO CLI 3.9.40.6 (config)# radius-server key Syntax: (config)# radius-server key <key> Explanation: Configure RADIUS server key value. This key is shared between the RADIUS sever and the switch. Parameters: <key>: Specify RADIUS server secret key value. The valid range is 1 to 63. Example: Set RADIUS server secret key to 803321 # config t (config)# radius-server key 803321...
CHAPTER 3 INTRODUCTION TO CLI { [ rising | falling | both ] }: Specify a method that is used to sample the selected variable and calculate the value to be compared against the thresholds. rising: Trigger alarm when the first value is larger than the rising threshold. falling: Trigger alarm when the first value is less than the falling threshold.
CHAPTER 3 INTRODUCTION TO CLI [ interval <interval> ]: Indicates the polling interval. By default, 1800 seconds is specified. The allowed range is 1~3600 seconds. Negation: (config-if)# no rmon collection history <id> Show: # show rmon history [ <id_list> ] 3.9.42.4 (config-if)# rmon collection stats Syntax: (config-if)# rmon collection stats <id>...
CHAPTER 3 INTRODUCTION TO CLI [ ro | rw ]: Indicates whether the specified community applies to read only access string or read & write access string. Example: Set Write community access string to private123. # config t (config)# snmp-server community v2c private124 rw Negation: (config)# no snmp-server community v2c Show: # show snmp 3.9.44.4 (config)# snmp-server community v3...
CHAPTER 3 INTRODUCTION TO CLI 3.9.44.6 (config)# snmp-server engine-id local Syntax: (config)# snmp-server engine-id local <engineID> Explanation: Configure SNMP server v3 Engine ID value. Parameters: <engineID>: Indicates the SNMPv3 engine ID. The string must contain an even number (in hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not allowed.
CHAPTER 3 INTRODUCTION TO CLI 3.9.44.9 (config)# snmp-server security-to-group model Syntax: (configt)# snmp-server security-to-group model { v1 | v2c | v3 } name <security_name> group <group_name> Explanation: Configure SNMPv3 Group settings. Parameters: { v1 | v2c | v3 }: Indicates the security model that this entry should belong to. <security_name>: A string identifying the security name that this entry should belong to.
CHAPTER 3 INTRODUCTION TO CLI 'F's are not allowed. The SNMPv3 architecture uses the User-based Security Model (USM) for message security and the View-based Access Control Model (VACM) for access control. For the USM entry, the usmUserEngineID and usmUserName are the entry's keys. In a simple agent, usmUserEngineID is always that agent's own snmpEngineID value.
CHAPTER 3 INTRODUCTION TO CLI 3.9.44.13 (config)# snmp-server view Syntax: (configt)# snmp-server view <view_name> <oid_subtree> { include | exclude } Explanation: Configure SNMPv3 MIB view name. Parameters: <view_name>: A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
CHAPTER 3 INTRODUCTION TO CLI <v_ipv6_ucast>: Specify the IPv6 address. It allows a valid IP address in dotted decimal notation ('x.y.z.w'). Also allowed is a valid hostname. A valid hostname is a string drawn from the alphabet (A-Z; a-z), digits (0-9), dot (.) and dash (-).
CHAPTER 3 INTRODUCTION TO CLI enabled, the ID will be probed automatically. Otherwise, the ID specified in this field is used. The string must contain an even number (in hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not allowed.
CHAPTER 3 INTRODUCTION TO CLI 3.9.45.2 (config-stp-aggr)# spanning-tree Syntax: (config-stp-aggr)# spanning-tree Explanation: Enable Spanning Tree under aggregation mode. Negation: (config-stp-aggr)# no spanning-tree Show: # show spanning-tree 3.9.45.3 (config-stp-aggr)# spanning-tree auto-edge Syntax: (config-stp-aggr)# spanning-tree auto-edge Explanation: Enable auto edge function. When enabled, a port is automatically determined to be at the edge of the network when it receives no BPDUs.
CHAPTER 3 INTRODUCTION TO CLI 3.9.45.6 (config-stp-aggr)# spanning-tree link-type Syntax: (config-stp-aggr)# spanning-tree link-type { point-to-point | shared | auto } Explanation: Configure the link type attached to an interface. Parameters: { point-to-point | shared | auto }: Select the link type attached to an interface. point-to-point: It is a point-to-point connection.
CHAPTER 3 INTRODUCTION TO CLI port-priority <prio>: Specify a port priority value. Negation: (config-stp-aggr)# no spanning-tree mst <instance> port-priority Show: # show spanning-tree 3.9.45.9 (config-stp-aggr)# spanning-tree restricted-role Syntax: (config-stp-aggr)# spanning-tree restricted-role Explanation: Enable restricted role function. If enabled, this causes the port not to be selected as Root Port for the CIST or any MSTI, even if it has the best spanning tree priority.
CHAPTER 3 INTRODUCTION TO CLI <prio: 0-61440>: Specify a priority value. Explanation: Specify an appropriate priority for a MSTI instance. Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority becomes the root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device.
CHAPTER 3 INTRODUCTION TO CLI # config t (config)# spanning-tree mst forward-time 15 Negation: (config)# no spanning-tree mst forward-time Show: # show spanning-tree 3.9.45.17 (config)# spanning-tree mst max-age Syntax: (config)# spanning-tree mst max-age <maxage> [ forward-time <fwdtime> ] Parameters: <maxage: 6-40>: Specify the max age value. The valid range is from 6 to 40. [ forward-time <fwdtime>...
CHAPTER 3 INTRODUCTION TO CLI Show: # show spanning-tree 3.9.45.19 (config)# spanning-tree mst name Syntax: (config)# spanning-tree mst name <name> revision <v_0_to_65535> Parameters: name <name>: Specify a name for this MSTI. By default, the switch’s MAC address is used. The maximum length is 32 characters.
CHAPTER 3 INTRODUCTION TO CLI Explanation: The number of BPDU sent by a bridge port per second. When exceeded, transmission of the next BPDU will be delayed. By default, it is set to 6. The allowed transmit hold count is 1 to 10. Please note that increasing this value might have a significant impact on CPU utilization and decreasing this value might slow down convergence.
CHAPTER 3 INTRODUCTION TO CLI 3.9.45.25 (config-if)# spanning-tree edge Syntax: (config-if)# spanning-tree edge Explanation: If an interface is attached to end nodes, you can set it to “Edge”. Negation: (config-if)# no spanning-tree edge Show: # show spanning-tree 3.9.45.26 (config-if)# spanning-tree link-type Syntax: (config-if)# spanning-tree link-type { point-to-point | shared | auto } Explanation: Configure the link type attached to an interface.
CHAPTER 3 INTRODUCTION TO CLI 3.9.47 (config)# switchport 3.9.47.1 (config)# switchport vlan mapping Syntax: (config)# switchport vlan mapping <group ID> <vlan_list> <translation_vlan> Explanation: VLAN Translation is especially useful for users who want to translate the original VLAN ID to a new VLAN ID so as to exchange data across different VLANs and improve VLAN scaling.
CHAPTER 3 INTRODUCTION TO CLI 3.9.47.3 (config-if)# switchport forbidden vlan Syntax: (config-if)# switchport forbidden vlan { add | remove } <vlan_list> Explanation: Add or remove a port from the forbidden VLAN list. Parameters: { add | remove }: Add or remove this specific interface from the forbidden VLAN list. <vlan_list>: Specify the VLAN ID.
CHAPTER 3 INTRODUCTION TO CLI remove: Remove VLANs from the current list except: All VLANs except the following specified in <vlan_list>. <vlan_list>: Specify the VLAN list. Negation: (config-if)# no switchport hybrid allowed vlan Show: # show vlan status 3.9.47.6 (config-if)# switchport hybrid egress-tag Syntax: (config-if)# switchport hybrid egress-tag { none | all [ except-native ] } Explanation: Determines egress tagging of a port.
CHAPTER 3 INTRODUCTION TO CLI Negation: (config-if)# no switchport hybrid native vlan Show: # show vlan status 3.9.47.9 (config-if)# switchport hybrid port-type Syntax: (config-if)# switchport hybrid port-type { unaware | c-port | s-port | s-custom-port } Explanation: Configures the port type in Hybrid mode for the port. Parameters: { unaware | c-port | s-port | s-custom-port }: There are four port types available.
CHAPTER 3 INTRODUCTION TO CLI 3.9.47.13 (config-if)# switchport trunk vlan tag native Syntax: (config-if)# switchport trunk vlan tag native Explanation: Configure this specific interface to tag native VLAN traffic. Negation: (config-if)# no switchport trunk vlan tag native 3.9.47.14 (config-if)# switchport vlan ip-subnet id Syntax: (config-if)# switchport vlan ip-subnet id <vce_id>...
CHAPTER 3 INTRODUCTION TO CLI 3.9.47.16 (config-if)# switchport vlan mapping Syntax: (config-if)# switchport vlan mapping <group> Explanation: Configure group VLAN mapping table for this specific interface. Parameters: <group: 1-20>: Indicate the Group ID that applies to this rule. Negation: (config-if)# no switchport vlan mapping 3.9.47.17 (config-if)# switchport vlan protocol group Syntax: (config-if)# switchport vlan protocol group <grp_id>...
CHAPTER 3 INTRODUCTION TO CLI 3.9.48.2 (config)# tacacs-server deadtime Syntax: (config)# tacacs-server deadtime <minutes> Explanation: Deadtime is the period during which the switch will not send new requests to a server that has failed to respond to a previous request. This will stop the switch from continually trying to contact a server that it has already determined as dead.
CHAPTER 3 INTRODUCTION TO CLI Example: Set the upnp ttl value to 10. # config t (config)# upnp ttl 10 Negation: (config)# no upnp ttl Show: # show upnp 3.9.50 (config)# username 3.9.50.1 (config)# username<username>privilege<priv>password encrypted Syntax: (config)# username <username> privilege <priv> password encrypted <encry_password> Explanation: By default, there is only one user, 'admin', assigned the highest privilege level of 15.
CHAPTER 3 INTRODUCTION TO CLI Parameters: username <username: word31>: Specify a new username. The allowed characters are 31. privilege <priv: 0-15>: Specify the privilege level for this new user account. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully control of the device. But other values need to refer to each group privilege level.
CHAPTER 3 INTRODUCTION TO CLI # show users 3.9.51 (config)# vlan 3.9.51.1 (config)# vlan Syntax: (config)# vlan <vlist> Explanation: Configure allowed VLANs. Parameters: <vlist>: This shows the allowed access VLANs. This setting only affects ports set in “Access” mode. Ports in other modes are members of all VLANs specified in “Allowed VLANs”...
CHAPTER 3 INTRODUCTION TO CLI VLAN. This may require non-standard devices to pass traffic between different VLANs in order to encompass all the devices participating in a specific protocol. This kind of configuration deprives users of the basic benefits of VLANs, including security and easy accessibility.
MSW-4424C(S) series provide one MGMT port on the front panel for accessing Web Management via IP connectivity. For the first time user, connect one end of RJ-45 cable to the MSW-4424C(S) and the other end of RJ-45 cable to your management PC. Then, open the web browser such as IE, Firefox, etc and input the default IP address 10.1.1.1.
4.2.3 Help System The MSW-4424C(S) switches have an online "help" system to aid the engineer when setting the parameters of the device. Each functional setting page is accompanied by a specific "help" for that functional page. The user can display this help "pop up"...
For the remainder of this section, each menu item will be explained one by one, in order as they descend down the menu screen, starting with the "System" menu. 4.3 Configuration This section offers explanations for both basic and advanced management functions available in MSW-4424C(S). They are introduced below individually in separate sub-sections. 4.3.1 System The configurations under the "System"...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.1.2 Fan FAN Mode: This drop-down menu adjusts fan speed of the device. Auto: The fan speed is adjusted automatically depending on the current temperature of the device. Full Speed: The fan operates in full speed.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION IP Interfaces Click "Add Interface" to add a new IP interface. A maximum of 128 interfaces is supported. VLAN: This is the VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface. This field is only available for input when creating a new interface.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Mode: Configure the NTP mode operation. Possible modes are: Enabled: Enable NTP client mode operation. Disabled: Disable NTP client mode operation. Server #: Enter the IPv4 or IPv6 address of an NTP server. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:).
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Time Zone Configuration Time Zone: Lists various Time Zones worldwide. Select appropriate Time Zone from the drop down and click Save to set. Acronym: Set the acronym of the time zone. Daylight Saving Time Configuration Daylight Saving Time: This is used to set the clock forward or backward according to the configurations set below for a defined Daylight Saving Time duration.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.2 Ports This page displays current port configurations and allows some configuration here. Port: This device is a L2 carrier Ethernet access switch with 20 SFP ports (numbered 1 to 20), 4 combo ports (numbered 21~24) and 4 SFP-based uplink ports (numbered 25~28).
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Disabled: Disables the switch port operation. Twin Rate Fiber: When this option is selected, the device will automatically detect the slide-in SFP transceiver’s speed and choose the most appropriate speed (either 100M or 1000M) for this port. Auto: Port auto negotiating speed with the link partner, selecting the highest speed that is compatible with the link partner.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.3.1 Server 4.3.3.1.1 Mode Global Mode Mode: Enable or disable DHCP server mode. When enabled, this device can act as a DHCP server and provide IP address to clients that request for one. VLAN Mode Click “Add VLAN Range”...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION IP Range: Enter the starting and ending IP address that are not allocated to DHCP clients. The starting IP address must be smaller or equal to the ending IP address. If there is only one excluded IP address, it can be entered either in starting or ending IP address field.
Page 212
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Pool Name: Select the pool name that you want to configure from the pull-down menu. Setting Pool Name: Display the pool name for this configured entry. Type: Select the pool type. Network: The pool defines a pool of IP addresses to service more than one DHCP client.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.3.2 DHCP Snooping DHCP Snooping allows the switch to protect a network from being attacked by other devices or rogue DHCP servers. When DHCP Snooping is enabled on the switch, it can filter IP traffic on insecure (untrusted) ports that the source addresses cannot be identified by DHCP Snooping.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port Mode Configuration Port: Port number. "Port *" rules apply to all ports. Mode: Select the DCHP Snooping port mode. Ports can be set to either “Trusted” or “Untrusted”. Trusted: Devices under your administrative network can be set to Trusted sources.
Page 215
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Relay Server: Enter DHCP server IP address that is used by the switch’s DHCP relay agent. Relay Information Mode: Enable or disable DHCP Relay option 82 function. Please note that “Relay Mode” must be enabled before this function is able to take effect.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port Alias: Use the individual values for port Alias. Remote ID Format: Select the appropriate remote ID format. None: Sub-option 2 is not used. MAC Address: Add MAC address to Option 82 information. Subscriber ID Format: Select the appropriate Subscriber ID format.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.4.1 Switch 4.3.4.1.1 Users This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser. By default, there is only one user, 'admin', assigned the highest privilege level of 15.
Page 218
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Group Name: This name identifies the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contains more than one. The following description defines these privilege level groups in details: System: Contact, Name, Location, Timezone, Daylight Saving Time, Log.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION configuration read-only configuration/execute read-write status/statistics read-only status/statistics read-write (e.g. for clearing of statistics) User Privilege should be the same or greater than the authorization Privilege level to have access to that group. 4.3.4.1.3 Auth Method This page allows you to configure how users are authenticated when they log into the switch via one of the management client interfaces.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Disabled: Disable SSH mode operation. NOTE: SSH is preferred to Telnet, unless the management network is trusted. Telnet passes authentication credentials in plain text, making those credentials susceptible to packet capture and analysis. SSH provides a secure authentication method.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION VLAN ID: Indicates the VLAN ID for the access management entry. Start IP address: Indicates the start IP address for the access management entry. End IP address: Indicates the end IP address for the access management entry. HTTP/HTTPS: Checked indicates that the matched host can access the switch from HTTP/HTTPS interface.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION applicable only for SNMP version v1 or v2c. If SNMP version is v3, the community string will be associated with SNMPv3 communities table. SNMPv3 provides more flexibility to configure security name than a SNMPv1 or SNMPv2c community string.
Page 223
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Trap Config Name: Indicates a descriptive name for this SNMP trap entry. Trap Mode: Indicates the SNMP trap mode operation. Enabled: Enable SNMP trap mode operation. Disabled: Disable SNMP trap mode operation. Trap Version: Indicates the SNMP trap supported version.
Page 224
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION SNMP Trap Event System: The system trap events include the following. Warm Start: The switch has been rebooted from an already powered on state. Cold Start: The switch has booted from a powered off or due to power cycling (power failure). Interface: Indicates the Interface group's traps.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION After completing all the trap settings, click the "Save" button. 4.3.4.1.7.3 SNMPv3 Community Configuration Configure SNMPv3 community table on this page. The entry index key is Community. Delete: Check to delete the entry. It will be deleted during the next save. Community: Indicates the community access string to permit access to SNMPv3 agent.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION The value of security level cannot be modified if entry already exists. That means it must first be ensured that the value is set correctly. Authentication Protocol: Indicates the authentication protocol that this entry should belong to. Possible authentication protocols are: None: No authentication protocol.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM) for SNMPv3. Security Name: A string identifying the security name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION any: Any security model accepted(v1|v2c|usm). v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM) for SNMPv3. Security Level: Indicates the security level that this entry should belong to. Possible security models are: NoAuth, NoPriv: No authentication and no privacy.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Data Source: Indicates the port ID which wants to be monitored. Interval: Indicates the polling interval. By default, 1800 seconds is specified. The allowed range is 1 - 3600 seconds. Buckets: The number of buckets requested for this entry.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Falling: Trigger alarm when the first value is less than the falling threshold. Rising Threshold: If the current value is greater than the rising threshold and the last sample value is less than this threshold, then an alarm will be triggered.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Event Last Time: The value of sysUpTime when an event was last generated for this entry. 4.3.4.2 Network Port Security Limit Control can restrict the number of users that can access the switch based on users’ MAC address and VLAN ID on a per port basis.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION None: Do not allow more than the specified limit of MAC addresses to access on a port. No action is further taken. Trap: If Limit + 1 MAC addresses are seen on the port, send an SNMP trap. If Aging is disabled, only one SNMP trap will be sent, but with Aging enabled, new SNMP traps will be sent every time the limit is exceeded.
Page 233
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION System Configuration Mode: Enable 802.1X and MAC-based authentication globally on the switch. If globally disabled, all ports are allowed to forward frames. Reauthentication Enabled: Select the checkbox to set clients to be re-authenticated after an interval set in "Reauthentication Period"...
Page 234
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Guest VLAN ID: This VLAN ID is functional only when Guest VLAN is enabled. This is the value that a port’s Port VLAN ID is set to if a port is moved into the Guest VLAN. The range is 1–4095. Max.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Globally Disabled: 802.1X and MAC-based authentication are globally disabled. Link Down: 802.1X and MAC-based authentication are enabled but there is no link on a port. Authorized: The port is forced in authorized mode and the supplicant is successfully authorized. Unauthorized: The port is forced in unauthorized mode and the supplicant is not successfully authorized by the RADIUS server.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Action: Permit or deny a frame based on whether it matches a rule defined in the assigned policy. Rate Limiter ID: Select a rate limiter ID to apply to a port. Rate Limiter rule can be set up in “Rate Limiters” configuration page.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.4.2.3.3 Access Control List Access Control List is to establish filtering rules for an ACL policy, for a particular port or for all ports. Rules applied to a port take effect immediately.
Page 238
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Action: Select the action type, either to permit or deny. Rate Limiter: Enable or disable the rate limiter when matched frames are found. Logging: Enable or disable logging when a frame is matched. Shutdown: Enable or disable shutdown a port when a frame is matched.
Page 239
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION ARP Parameter Select “ARP” frame type, then Ethernet Type parameters appear. ARP/RARP: Specify the type of ARP packet. Any: No ARP/RARP opcode flag is specified ARP: The frame must have ARP/RARP opcode set to ARP, RARP: The frame must have ARP/RARP opcode set to RARP Other: The frame has unknown ARP/RARP opcode flag Request/Reply: Specify whether the packet is an ARP request, reply, or either type.
Page 240
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION field is equal to IPv4 (0x4). Select “Any” to indicate a match and not a match. IP: Select “0” to indicate that Protocol Address Space field in ARP/RARP frame is not equal to IP (0x800). Select “1” to indicate that Protocol Address Space is equal to IP (0x800).
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION IPv6 Parameters Next Header Filter: Select next header filter option. Available options include ICMP, UDP, TCP, Other. SIP Filter: Select a source IP filter. “Any” denotes that any SIP filter is allowed. Select “Specific” to enter self-define SIP filter.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Mode: Enable or disable IP source guard on a port. Please note that to make IP source guard work, both global mode and port mode must be enabled. Max Dynamic Clients: Select the maximum number of dynamic clients that can be learned on a port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.4.2.5 ARP inspection 4.3.4.2.5.1 Port Configuration ARP Inspection Configuration Mode: Enable or disable ARP inspection function globally. Port Mode Configuration Port: The port number. “Port *” rules apply to all ports. Mode: Enable or disable ARP Inspection on a port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.4.2.5.2 VLAN Configuration VLAN ID: Specify ARP Inspection is enabled on which VLANs. First, you have to enable the port setting on Port mode configuration web page. Only when both Global Mode and Port Mode on a given port are enabled, ARP Inspection is enabled on this given port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Click the “Save” button to save newly-configured settings or changes. Click the “Reset” button to restore settings to default settings or previously configured settings. 4.3.4.2.5.4 Dynamic Table Configuration Port: The port number of this entry.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Deadtime: Deadtime is the period during which the switch will not send new requests to a server that has failed to respond to a previous request. This will stop the switch from continually trying to contact a server that it has already determined as dead.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Global Configuration Timeout: The time the switch waits for a reply from a TACACS+ server before it retransmits the request. Deadtime: Deadtime is the period during which the switch will not send new requests to a server that has failed to respond to a previous request.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.5.1 Static Aggregation Mode Configuration Source MAC Address: All traffic from the same Source MAC address is output on the same link in a trunk. Destination MAC Address: All traffic with the same Destination MAC address is output on the same link in a trunk. IP Address: All traffic with the same source and destination IP address is output on the same link in a trunk.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.5.2 LACP The Switch supports dynamic Link Aggregation Control Protocol (LACP) which is specified in IEEE 802.3ad. Static trunks have to be manually configured at both ends of the link. In other words, LACP configured ports can automatically negotiate a trunked link with LACP configured ports on another devices.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.6 Link OAM The Ethernet Operation, Administration, and Maintenance (OAM; IEEE 802.3ah) protocol for monitoring, and troubleshooting Metro Ethernet networks and Ethernet WANs relies on an optional sub-layer in the data link layer of the Normal link operation.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Loopback Support: Select the checkbox to enable loopback support on a port. Link OAM remote loopback support can be used for fault localization and link performance testing. Enabling the loopback support will allow the DTE to execute the remote loopback command that helps in the fault detection.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Error Threshold: Specify the error threshold value for the window period for the appropriate Link event so as to notify the peer of this error. 4.3.7 Loop Protection Loops sometimes occur in a network due to improper connecting, hardware problem or faulty protocol settings.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Shutdown Port: A loop-detected port is shutdown for a period of time configured in “Shutdown Time”. Shutdown Port and Log: A loop-detected port is shutdown for a period of time configured in “Shutdown Time” and the event is logged.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.8.1 Bridge Settings Basic Settings Protocol Version: Select the appropriate spanning tree protocol. Protocol versions provided include “STP”, “RSTP”, and “MSTP”. Bridge Priority: Each switch has a relative priority and cost that is used to decide what the shortest path is to forward a packet.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION BPDU Guard is therefore used to prevent the device from suffering malicious attacks. With this function enabled, when edge ports receive configuration BPDUs, STP disables those affected edge ports. After a period of recovery time, those disabled ports are re-activated.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.8.3 MSTI Priorities MSTI: Display MSTI instance number. “MSTI *” priority rule applies to all ports. Priority: Select an appropriate priority for each MSTI instance. Bridge priority is used in selecting the root device, root port, and designated port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Priority: Select port priority. Admin Edge: If an interface is attached to end nodes, you can set it to “Edge”. Auto Edge: Select the checkbox to enable this feature. When enabled, a port is automatically determined to be at the edge of the network when it receives no BPDUs.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port: The port number. Path Cost: Path cost is used to determine the best path between devices. If “Auto” mode is selected, the system automatically detects the speed and duplex mode to decide the path cost. Select “Specific”, if you want to use user- defined value.
Page 259
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION IPMC Profile Table Setting Profile Name: Enter a name for this profile. Profile Description: Enter a brief description for this profile. Click the "Add New IPMC Profile" to insert a new entry to the table. Select the "Delete"...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.9.2 Address Entry Entry Name: Enter a name which is used for indexing the address entry table. Start Address: Enter the starting IPv4 or IPv6 multicast address used in this address range. End Address: Enter the ending IPv4 or IPv6 multicast address used in this address range.
Page 261
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION MVR Configurations MVR Mode: Enable or disable MVR feature globally on this device. Any multicast data from source ports will be sent to associated receiver ports registered in the table. By default, MVR feature is turned off. VLAN Interface Setting MVR ID: Specify multicast VLAN ID.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Interface Channel Profile: Select an IPMC profile from the drop-down menu. Click the button to view a summary about the selected IPMC profile settings. Port Role: Click the Port Role symbol to change the role status. Inactive (I): By default, all ports are set to inactive.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION of multicast traffic reduces the packet processing at the switch (at the cost of needing additional memory to handle the multicast tables) and also decreases the workload at the end hosts since their network cards (or operating system) will not receive and filter all the multicast traffic generated in the network.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION querier, you can manually designate a port which is connected to a known IGMP querier (i.e., a multicast router/switch). This interface will then join all the current multicast groups supported by the attached router/switch to ensure that multicast traffic is passed to all appropriate interfaces within the switch.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION QRI: The Query Response Interval is the maximum amount of time that the IGMP router waits to receive a response to a General Query message. The QRI applies when the switch is acting as the querier and is used to inform other devices of the maximum time this system waits for a response to general queries.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.11.2.1 Basic Configuration Global Configuration Snooping Enabled: Select the checkbox to globally enable MLD Snooping feature. When enabled, this device will monitor network traffic and determine which hosts would like to receive multicast traffic. The switch can passively monitor or snoop on MLD Listener Query and Report packets transferred between IP multicast routers and IP multicast service subscribers to identify the multicast group members.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION to ensure that multicast traffic is passed to all appropriate interfaces within the switch. Fast Leave: Enable fast leave function if the checkbox is ticked. When a leave packet is received, the switch immediately removes it from a multicast service without sending a MLD group-specific (GS) query to that interface.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION URI: The Unsolicited Report Interval is the amount of time that the upstream interface should transmit unsolicited IGMP reports when report suppression/proxy reporting is enabled. By default, URI is set to 1 second. The allowed range for URI is 0 -31744 seconds.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.12.1 LLDP Configuration LLDP Parameters Tx Interval: Specify the interval between LLDP frames are sent to its neighbors for updated discovery information. The valid values are 5 - 32768 seconds. The default is 30 seconds. Tx Hold: This setting defines how long LLDP frames are considered valid and is used to compute the TTL.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION capabilities, management address can be sent from this device. Uncheck the boxes if they are not appropriate to be known by other neighbour devices. 4.3.12.2 LLDP-MED LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches.
Page 271
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Altitude: Altitude SHOULD be normalized to within -32767 to 32767 with a maximum of 4 digits. It is possible to select between two altitude types (floors or meters). Meters: Representing meters of Altitude defined by the vertical datum specified.
Page 272
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Building: Building (structure). Example: Low Library. Apartment: Unit (Apartment, suite). Example: Apt 42. Floor: Example: 4. Room no.: Room number - Example: 450F. Place type: Example: Office. Postal community name: Example: Leonia. P.O.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.13 SyncE SyncE Configuration Clock Source: List the instance number of clock source. Priority: The priority for this clock source. Lowest number (0) is the highest priority. If two clock sources has the same priority, the lowest clock source number gets the highest priority in the clock selection process.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION SSM Overwrite: A selectable clock source Quality Level (QL) to overwrite any QL received in a SSM. If QL is not Received in a SSM (SSM is not enabled on this port), the SSM Overwrite QL is used as if received. The SSM Overwrite can be set to QL_NONE, indicating that the clock source is without any known quality (Lowest compared to clock source with known quality) Clock Selection Mode and State...
Page 275
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION EPS ID: Specify EPS ID for this entry. Click the ID number to further configure detailed EPS settings. Domain: Select the flow domain. Currently, only “Port” option is available for use. Architecture: The EPS architecture.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Instance Configuration Protection Type: Select the protection type either unidirectional or bidirectional switching. APS: Select the checkbox to enable APS (Automatic Protection Switching) feature. Revertive: Select the checkbox to enable revertive mode. Leaving the checkbox unchecked will operate on non- revertive mode.
Page 277
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port: This is a MEP in the Port Domain. 'Flow Instance' is a Port. (CURRENTLY, Port is available for use.) Evc: This is a MEP in the EVC Domain. 'Flow Instance' is a EVC. The EVC must be created. VLAN: This is a MEP in the VLAN Domain.
Page 278
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Format: Two formats are available. ITU ICC: This is defined by ITU in Y.1731 ANNEX A. The maximum characters allowed for ICC format is 6. MEG id can allow 7 characters in maximum. IEEE String: This is defined by IEEE in 802.1ag.
Page 279
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION cPeriod: Fault Cause indicating that a CCM is received with a period different what is configured for this MEP - from this peer MEP. cPriority: Fault Cause indicating that a CCM is received with a priority different what is configured for this MEP - from this peer MEP.
Page 280
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Loop Back Enable: Select the checkbox to enable Loop Back based on transmitting and receiving LBM/LBR PDU. Loop Back is automatically disabled when all “To Send” LBM PDU has been transmitted. Dei: The DEI to be inserted as PCP bits in TAG (if any).
Page 281
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Out of Order: The number of LBR PDU received from this “Reply MAC” with incorrect “Transaction ID”. Link Trace Enable: Select the checkbox to enable Link Trace based on transmitting and receiving LTM/LTR PDU. Link Trace is automatically disabled when all 5 transactions are done with 5 sec.
Page 282
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Pattern: The 'empty' TST PDU has the size of 12 bytes. In order to achieve the configured frame size a data TLV will be added with a pattern. All Zero: Pattern will be 00000000 All One: Pattern will be 11111111 10101010: Pattern will be 10101010...
Page 283
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Enable: Enable or disable the insertion of AIS signal (AIS PDU transmission) in client layer flows. Frame Rate: Select the frame rate of AIS PDU. This is the inverse of transmission period as described in Y.1731. Protection: Select the checkbox to enable protection.
Page 284
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Performance Monitoring Data Set Enable: When enabled, this MEP instance will contribute to the Performance Monitoring Data Set gathered by the Performance Monitoring session. Loss Measurement/Loss Measurement State Enable: Loss Measurement based on transmitting/receiving CCM or LMM/LMR PDU can be enabled/disabled - see 'Ended'.
Page 285
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Peer MEP: This is only used if the 'Cast' is configured to Uni. The 1DM/DMR unicast MAC will be taken from the 'Unicast Peer MAC' configuration of this peer. Way: One-Way or Two-Way Delay Measurement implemented on 1DM or DMM/DMR, respectively.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Delay Min.: The minimum delay - since last 'clear'. The unit is microsecond. Delay Max.: The maximum delay - since last 'clear'. The unit is microsecond. Average Variation last N: The average delay variation of the last n packets - since last 'clear'. The unit is microsecond. Average Variation Min.: The minimum delay variation - since last 'clear'.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port 1 SF MEP: This is also known as West Signal Fail APS MEP. When interconnected with the other sub-ring, “0” is used in this field to indicate that no west SF MEP is associated with this instance. Assign the West Signal Fail reporting MEP in this field.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION MAC Learning Table: Three options are available on each port. Auto: On a given port, learning is automatically done once unknown SMAC is received. Disable: Disable MAC learning function. Secure: Only static MAC entries listed in “Static MAC Table Configuration”...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.18 1 Port to Group Mapping Group ID: The total VLAN Translation group can be used is 11 which is automatically created in Group Mapping Table when entering “Port to Group Mapping” page. A port can be mapped to any of the groups. Multiple ports can be mapped to a single group with the same Group ID.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.19 VLANs IEEE 802.1Q VLAN (Virtual Local Area Network) is a popular and cost-effectively way to segment your networking deployment by logically grouping devices with similar attributes irrespective of their physical connections. VLANs also segment the network into different broadcast domains so that packets are forwarded to ports within the VLAN that they belong.
Page 291
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port: List the number of each port. “Port *” settings apply to all ports. Mode: The port mode (default is Access) determines the fundamental behavior of the port in question. A port can be in one of three modes as described below.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION If a tagged frame with TPID=0x88A8, it is port will be set to 0x88A8 forwarded. If the TPID of tagged frame is not 0x88A8 (ex. 0x8810), it will be discarded. When an untagged frame is received on a port, a tag (PVID) is attached and then forwarded.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.20.1 Global Config Enable GVRP: Select the checkbox to globally enable GVRP function. Join-time: Specify the amount of time in units of centi-seconds that PDUs are transmitted. The default value is 20 centi-seconds.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.20.2 Port Config Port: The port number. Mode: Enable GVRP on a per port basis. 4.3.21 Private VLANs The “Private VLANs” menu contains the following sub menus. Select the appropriate one to configure its detailed settings.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION This page is used to configure private VLANs. New Private VLANs can be added here and existing VLANs can be modified. Private VLANs are based on the source port mask and there are no connections to VLANs which means that VLAN IDs and Private VLAN IDs can be identical.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION MAC Address: Indicate the source MAC address. Please note that the source MAC address can only map to one VLAN VLAN ID: Map this MAC address to the associated VLAN ID. Port Members: Ports that belong to this VLAN.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Frame Type: There are three frame types available for selection; these are “Ethernet”, “SNAP”, and “LLC”. The value field will change accordingly. Value: This field specifically indicates the protocol type. This value field varies depending on the frame type you selected.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.22.3 IP Subnet-based VLAN IP Subnet-based VLAN configuration is to map untagged ingress frames to a specific VLAN if the source address is found in the IP subnet-to-VLAN mapping table. When IP subnet-based VLAN classification is enabled, the source address of untagged ingress frames are checked against the IP subnet-to-VLAN mapping table.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.23.1 Configuration Voice VLAN Configuration Mode: Enable or disable Voice VLAN function on this switch. VLAN ID: Assign a VLAN ID to this Voice VLAN. Only one Voice VLAN is supported on the switch. By default, VLAN 1000 is set.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Security: Enable or disable security filtering feature on a per port basis. When enabled, any non-VoIP packets received on a port with Voice VLAN ID will be discarded. VoIP traffic is identified by source MAC addresses configured in the telephony OUI list or through LLDP which is used to discover VoIP devices attached to the switch.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.24 Ethernet Services 4.3.24.1 Ports Port: The port number. Port * rule applies to all ports. DEI Mode: The DEI mode for an NNI port determines whether frames transmitted on the port will have the DEI field in the outer tag marked based on the color of the frame.
Page 302
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION DMAC: The destination MAC address. The MAC DA range for Bridge block of protocol is 01-80-C2-00-00-00 through 01-80-C2-00-00-0F and for GARP block of protocol is 01-80-C2-00-00-20 through 01-80-C2-00-00-2F. L2CP Mode: Select the L2CP frame handling mode for the corresponding destination MAC address (DMAC).
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.24.3 Bandwidth Profiles Start Policer ID: The start Policer ID for displaying the table entries. The allowed range is from 1 through 2048. Number of Entries per page: The number of entries per page. The allowed range is from 1through 999. Policer ID: The Policer ID is used to identify one of the 2048 policers.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION EIR: The Excess Information Rate (EIR) for MEF type bandwidth profile. The allowed range is from 0 through 10000000 kilobit per second. EBS: The Excess Burst Size (EBS) for MEF type bandwidth profile. The allowed range is from 0 through 100000 bytes. 4.3.24.4 EVCs Click on the plus sign to add a new entry and configure its detailed settings.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION None: None bandwidth profile for the EVC. 4.3.24.5 ECEs Click on the plus sign to add a new entry and configure its detailed settings. NNI Ports: Select the network interface for ECE. Ingress Matching Tag Type: The tag type for matching the ECE.
Page 306
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Specific: If you want to filter a specific VLAN ID value with this ECE, choose this value. A field for entering a specific value appears. Range: If you want to filter a specific VLAN ID range filter with this ECE, choose this value. A field for entering a range appears.
Page 307
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Range: The ECE will match PCP values in the selected range 0-1, 2-3, 4-5, 6-7, 0-3 or 4-7. Specific: The ECE will match a specific PCP in the range 0 through 7. Inner Tag DEI: The inner DEI value for matching the ECE.
Page 308
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Specific: If you want to filter a specific policer ID value with this ECE, choose this value. A field for entering a specific value appears. Discard: All received frames are discarded for the ECE. None: All received frames are forwarded for the ECE.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Mapped: The inner tag PCP Mode is based on mapped (QOS, DP). PCP: The inner tag PCP value for the ECE. The allowed range is from 0 through 7. DEI: The inner tag DEI value for the ECE.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION CoS: Indicate the Class of Service level. A CoS class of 0 has the lowest priority. By Default, 0 is used. DPL: Select the default Drop Precedence Level. PCP: Select the appropriate value for the default Priority Code Point (or User Priority) for untagged frames.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.2.25.1.3 Port Policing This page allows users to set each port’s allowed bandwidth. Port: The port number. “Port *” settings apply to all ports. Enabled: Select the checkbox to enable port policing function on a port. Rate: Indicate the rate for the policer.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.25.1.4 Queue Policing Port: The port number. “Port *” settings apply to all ports. Queue 0~7 Enable: Select the appropriate checkboxes to enable queue policing function on switch ports. When enabled, the following image will appear:...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Rate: Indicate the rate for the ingress queue policer. By default, 500kbps is used. Allowed range for kbps is 100 to 1000000. Allowed range for Mbps is 1 to 3300Mbps. Unit: Select he unit of measure for the ingress queue policer.
Page 314
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION This page allows you to set up the Schedulers and Shapers for a specific port. Scheduler Mode: The device offers two modes to handle queues. Strict mode: This gives egress queues with higher priority to be transmitted first before lower priority queues are serviced.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Queue Shaper/Port Shaper/Queue Shaper Enable: Select the checkbox to enable queue shaper on a certain queue for this selected port. Rate: Indicate the rate for the queue shaper. By default, 500kbps is used. Allowed range for kbps is 100 to 1000000. Allowed range for Mbps is 1 to 13200Mbps.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION This displays each port’s queue shaper and port shaper’s rate. Click the port number to modify or reset queue shaper and port shaper’s rates. See “Port Scheduler” for detailed explanation on each configuration option.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Default: 0) DEI: Remarks matching egress frames with the specified Drop Eligible Indicator. (Range: 0-1; Default: 0) 4.3.25.3 Port DSCP Port: The port number. “Port *” settings apply to all ports. Ingress Translate: Select the checkbox to enable ingress translation of DSCP values based on the selected classification method.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.25.4 DSCP-Based QoS Ingress Classification DSCP: DSCP value in ingress packet. DSCP range is from 0 to 63. Trust: Select the checkbox to indicate that DSCP value is trusted. Only trusted DSCP values are mapped to a specific QoS class and drop precedence level (DPL).
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.25.5 DSCP Translation DSCP: DSCP value in ingress packet. DSCP range is from 0 to 63. Ingress Translate: Enable Ingress Translation of DSCP values based on the specified classification method. Ingress Classify: Enable classification at ingress side as defined in the QoS port DSCP Configuration Table.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.25.7 QoS Control List Quality of Service control list is used to establish policies for handling ingress packets based on frame type, MAC address, VID, PCP, DEI values. Once a QCE is mapped to a port, traffic matching the first entry in the QoS Control List is assigned to the QoS class, drop precedence level, and DSCP value defined by that entry.
Page 321
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION QCE Configuration Port Members: Select ports that use this rule. Key Parameters SMAC: Select source MAC address type. By default, any is used. Select “Specific” to specify a source MAC (first three bytes of the MAC address or OUI).
Page 322
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Control: Control field may contain command, response, or sequence information depending on whether the LLC frame type is Unnumbered, Supervisory, or Information. By default, any is used. Select specific to indicate a value (0x00 to 0xFF).
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.3.25.8 Storm Control Storm Control is used to keep a network from downgraded performance or a complete halt by setting up a threshold for traffic like broadcast, unicast and multicast. When a device on the network is malfunctioning or application programs are not well designed or properly configured, storms may occur and will degrade network performance or even cause a complete halt.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Max. DP 1: Controls the drop probability for the frames marked in drop precedence level 1 when the average queue filling level is 100%. The valid value is 0~100. Max.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION TTL: TTL (Time to live) is used to configure how many steps an UPnP advertisement can travel before it disappears. Advertising Duration: This defines how often an UPnP advertisement is sent. The duration is carried in Simple Service Discover Protocol (SSDP) packets which informs a control point how often it should receive a SSDP advertisement message from the switch.
Page 326
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Click on “Add New PTP Clock” button to create a new entry. Clock Instance: Indicate the Instance of a particular Clock Instance. The valid instance number is from 0 to 3. Device Type: Indicate the Type of the Clock Instance.
Page 327
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Local Clock Current time: This shows and updates local clock data. PTP Time: Shows the actual PTP time with nanosecond resolution. Clock Adjustment Method: Shows the actual clock adjustment method. The method depends on the available hardware.
Page 328
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Pri2: Configure Clock priority 2 used by the BMC master select algorithm. The valid value is from 0 to 255. Protocol: This shows transport protocol used by the PTP protocol engine. One-Way: If true, one way measurements are used.
Page 329
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Clock Time Properties Data Set: The clock time properties data set is defined in the IEEE 1588 Standard. The data set is both configurable and dynamic, i.e. the parameters can be configured for a grandmaster. In a slave clock the parameters are overwritten by the grandmasters timing properties.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Anv: The interval for issuing announce messages in master state. ATo: The timeout for receiving announce messages on the port. Syv: The interval for issuing sync messages in master. Dlm: Configure member delay Mechanism used for the port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.1.2 Power & Fan This screen page displays the current state of the built-in power and fan. If there is something wrong with fan modules, error messages will be displayed here. (If there is something wrong with fan modules, FAN LED indicators on the front panel will also be lit in red.) 4.4.1.3 System CPU Load This page displays the CPU load, using an SVG graph.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.1.6 System Detailed Log Displays individual log records. View each log, by ID number. 4.4.2 Ports 4.4.2.1 State Display an overview graphic of the switch. This is the same graphic overview shown when first logging into the switch for management. For Port 1~24, "Green" colored ports indicate a 100M linked state, while "Yellow"...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.2.3 Traffic Overview Packets Received & Transmitted: The number of received and transmitted packets per port. Bytes Received & Transmitted: The number of received and transmitted bytes per port. Errors Received &...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.2.4 QoS Statistics The displayed counters are: Port: The logical port for the settings contained in the same row. Qn: There are 8 QoS queues per port. Q0 is the lowest priority queue. Rx/Tx: The number of received and transmitted packets per queue.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. LLC: Only (LLC) frames are allowed. SNAP: Only (SNAP) frames are allowed. IPv4: The QCE will match only IPV4 frames. IPv6: The QCE will match only IPV6 frames.
Page 337
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Receive Total and Transmit Total Rx and Tx Packets: The number of received and transmitted (good and bad) packets. Rx and Tx Octets: The number of received and transmitted (good and bad) bytes. Includes FCS, but excludes framing bits.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.3 Link OAM 4.4.3.1 Statistics This page provides Link OAM statistics for the selected port. Use the pull-down menu to select the port that you want to view detailed statistics. Rx &...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.3.2 Port Status Detailed Link OAM Status PDU Permission: Displays the current permission rules set for the local DTE. Possible values are “Link fault”, “Receive only”, “Information exchange only”, “ANY”. Discovery State: Displays the current state of the discovery process.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION an OAM client may use this field to decide if it needs to be processed (an Information TLV that is identical to the previous Information TLV doesn't need to be parsed as nothing in it has changed). 4.4.3.3 Event Status Local &...
Page 341
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Frame Period Errors: This four-octet field indicates the number of frame errors in the period. Total frame period errors: This eight-octet field indicates the sum of frame errors that have been detected since the OAM sub-layer was reset.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.4 DHCP 4.4.4.1 Server 4.4.4.1.1 Statistics Database Counters Pool: The number of pool that has been configured. Excluded IP Address: The number of excluded IP address. Declined IP Address: The number of declined IP address. Binding Counters Automatic Binding: The number of bindings with network-type pools.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Release: The number of DHCP RELEASE messages received. Inform: The number of DHCP INFORM messages received. DHCP Message Sent Counters OFFER: The number of DHCP OFFER messages sent. ACK: The number of DHCP ACK messages sent.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.4.2.1 Relay Statistics DHCP Relay Statistics Transmit to Server: The number of packets that are relayed from client to server. Transmit Error: The number of packets that resulted in errors while being sent to clients. Receive from Client: The number of packets received from server.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.4.2.2 Detailed Statistics Rx and Tx Discover: The number of discover (option 53 with value 1) packets received and transmitted. Rx and Tx Offer: The number of offer (option 53 with value 2) packets received and transmitted. Rx and Tx Request: The number of request (option 53 with value 3) packets received and transmitted.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5 Security 4.4.5.1 Access Management Statistics This page provides statistics for access management. Interface: The interface type through which any remote host can access the switch. Received Packets: The number of received packets from the interface when access management mode is enabled. Allowed Packets: The number of allowed packets from the interface when access management mode is enabled.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5.2 Network 4.4.5.2.1 Port Security 4.4.5.2.1.1 Switch User Module Legend User Module Name: The full name of a module that may request Port Security services. Abbr: This column is the abbreviation for the user module used in the “Users” column in the “Port Status”. Port Status Port: Port number.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION indicated that the limit is exceeded. No MAC addresses can be learned on the port until it is administratively re- opened on the Limit Control configuration page. MAC Count (Current/Limit): The two columns indicate the number of currently learned MAC addresses (forwarding as well as blocked) and the maximum number of MAC addresses that can be learned on the port, respectively.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5.2.2 NAS 4.4.5.2.2.1 Switch Port: The port number. Click a port to view the detailed NAS statistics. Admin State: Display the port’s current administrative state. Port Status: Display the port state. Last Source: The source MAC address carried in the most recently received EAPOL frame for EAPOL-based authentication.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5.2.3 ACL Status This page shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations. The maximum number of ACEs is 256 on each switch.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Disabled: Frames received on the port are not mirrored. The default value is "Disabled". CPU: Forward packet that matched the specific ACE to CPU. CPU Once: Forward first packet that matched the specific ACE to CPU. Counter: The counter indicates the number of times the ACE was hit by a frame.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5.3 AAA 4.4.5.3.1 RADIUS Overview IP Address: The configured IP address and UPD port number. Status: The current state of RADIUS authentication & Accounting server. Displayed states include the following: Disabled: This server is disabled.
Page 353
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Access Rejects: The number of RADIUS Access-Reject packets (valid or invalid) received from the server. Access Challenges: The number of RADIUS Access-Challenge packets (valid or invalid) received from the server. Malformed Access Responses: The number of malformed RADIUS Access-Response packets received from the server.
Page 354
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Malformed Responses: The number of malformed RADIUS packets received from the server. Malformed packets include packets with an invalid length. Bad authenticators or unknown types are not included as malformed access responses.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5.4 Switch 4.4.5.4.1 RMON 4.4.5.4.1.1 RMON Statistics Overview This RMON statistics overview page shows interface statistics. All values displayed have been accumulated since the last system reboot and are shown as counts per second. The system will automatically refresh every 60 seconds by default.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.5.4.1.2 RMON History Overview History Index: Display Index of History control entry. Sample Index: Display Index of the data entry associated with the control entry. Sample Start: The time at which this sample started, expressed in seconds since the switch booted up. Drop: The total number of dropped packets due to lack of resources.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Variable: MIB object that is used to be sampled. Sample Type: The method of sampling the selected variable and calculating the value to be compared against the thresholds. Value: The value of the statistic during the last sampling period.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Aggr ID: Display the aggregation ID associated with the Link Aggregation Group (LAG). Partner System ID: LAG’s partner system ID (MAC address). Partner Key: The partner key assigned to this LAG. Partner Prio: The priority value of the partner.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Partner Port: The partner port connected to this local port. Partner Prio: The priority value of the partner. 4.4.6.3 Port Statistics Port: The port number. LACP Received: The number of LACP packets received on a port. LACP Transmitted: The number of LACP packets transmitted by a port Discarded: The number of unknown and illegal packets that have been discarded on a port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.7 Loop Protection Port: The port number. Action: Display the configured action that the switch will react when loops occur. Transmit: Display the configured transmit (Tx) mode. Loops: The number of loops detected on a port. Status: The current loop status detected on a port.
Page 361
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Root ID: Display the root device’s priority value and MAC address. Root Port: The number of the port on this switch that is closest to the root. This switch communicates with the root device through this port.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Topology Change Last: The time since this spanning tree was last configured. CIST Ports & Aggregations State Port: Display the port number. Port ID: The port identifier used by the RSTP protocol. This port ID contains the priority and the port number. Role: The role assigned by Spanning Tree Algorithm.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION CIST State: Display the current state of a port. The CIST state must be one of the following: Blocking: Ports only receive BPDU messages but do not forward them. Learning: Port has transmitted configuration messages for an interval set by the Forward Delay parameter without receiving contradictory information.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION IGMPv1 Joins Received: The number of IGMPv1 received joins IGMPv2/MLDv1 Reports Received: The number of IGMPv2 and MLDv1 received reports. IGMPv3/MLDv2 Reports Received: The number of IGMPv3 and MLDv2 received reports. IGMPv2/MLDv1 Leaves Received: The number of IGMPv2 and MLDv1 received leaves.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.10 IPMC 4.4.10.1 IGMP Snooping 4.4.10.1.1 Status Statistics VLAN ID: The VLAN ID of this entry. Querier Version: The current working Querier version. Host Version: The current host version. Querier Status: Show the Querier status that is either "ACTIVE"...
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Queries Received: The number of queries received. V1 Reports Received: The number of Received V1 Reports. V2 Reports Received: The number of Received V2 Reports. V3 Reports Received: The number of Received V3 Reports. V2 Leaves Received: The number of Received V2 Leaves.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Hardware Filter/Switch: Indicates whether the data plane destined to the specific group address from the source IPv4 address can be handled by the chip or not. 4.4.10.2 MLD Snooping 4.4.10.2.1 Status Statistics VLAN ID: The VLAN ID of this entry.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Port: The port number. Status: Indicate whether a specific port is a router port or not. 4.4.10.2.2 Groups Information VLAN ID: Display the VLAN ID of the group. Groups: Display the group address.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.11 LLDP 4.4.11.1 Neighbors Local Port: The local port that a remote LLDP-capable device is attached. Chassis ID: An ID indicating the particular chassis in this system. Port ID: A remote port ID that LDPDUs were transmitted. Port Description: A remote port's description.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.11.3 Port Statistics LLDP Global Counters Total Neighbours Entries Added: Shows the number of new entries added since the switch was rebooted, and for which the remote TTL has not yet expired. Total Neighbors Entries Deleted: The number of LLDP neighbors which have been removed from the LLDP remote systems MIB for any reason.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Age-Outs: Each LLDP frame contains information about how long the LLDP information is valid (age-out time). If no new LLDP frame is received within the age-out time, the LLDP information is removed, and the Age-Out counter is incremented.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.13 PTP PTP External Clock Mode One_PPS_Mode: Display the current 1 pps mode. External Enable: Display the currnet setting of external clock output. VCXO Enable: Display the current setting of VCXO. Clock Frequency: Display the current setting of clock frequency.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION VLAN ID: The VLAN ID associated with this entry. MAC Address: The MAC address learned on CPU or certain ports. Port Members: Ports associated with this entry. Flush Dynamic Entries: Refresh all MAC addresses or refresh MAC addresses on a per port or per VLAN basis. 4.4.15 VLANs 4.4.15.1 Membership This page shows the current VLAN membership saved on the Switch.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.4.15.2 Ports Port: The port number. Port Type: Displays the selected port type of each port. Ingress Filtering: Displays whether Ingress Filtering function of each port is enabled or not. When the checkbox is selected, it indicates that Ingress Filtering is enabled.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.5 Diagnostics The “Diagnostics” menu provides ping function to test the connectivity of a certain IP. 4.5.1 Ping This Ping function is for ICMPv4 packets. IP Address: Enter the IP address that you wish to ping. Ping Length: The size or length of echo packets.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION IP Address: Enter the IP address that you wish to ping. Ping Length: The size or length of echo packets. Ping Count: The number of echo packets will be sent. Ping Interval: The time interval between each ping request.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.6.2 Factory Defaults Click “Yes” button to reset your device to factory defaults settings. Please note that all changed settings will be lost. It is recommended that a copy of the current configuration is saved to your local device. 4.6.3 Software 4.6.3.1 Upload Update the latest Firmware file.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION Click on the “Save Configuration” button to save current running configurations to startup configurations. 4.6.4.2 Download running-config: Download a copy of the current running configurations to your local device. default-config: Download a copy of the factory default configurations to your local device.
CHAPTER 4 Chapter 4. Web Configuration & Operation WEB OPERATION & CONFIGURATION 4.6.4.5 Delete Select the file that you would like to delete. Click on the “Delete Configuration File” to remove the file from the device.
Descriptions 1. MSW-4424C(S) receives packets with VLAN ID 10 on port 1. 2. MSW-4424C(S) sneds packets with both VLAN ID 10 and 4000 from port 5. 3. Enable Ingress Filtering on Port 1 and Port 5. 4. Set Ingress Acceptance to "Tagged Only".
Page 381
This page is intentionally left blank. Version Date FW Version Descriptions 0.9a Preliminary version 0.9b Revise default IP address errors 0.9c 2015/11/13 Add CLI 0.9d 2015/11/27 Add Web 4.3.13 SyncE/ 4.3.28 IEEE1588/ 4.4.13 Monitor PTP Add Q-in-Q Application 0.9e 2016/2/5 1.040 Add Fan mode Add NL version...