8 port gigabit unmanaged switch with 8 ports poe or 4 ports poe+ (9 pages)
Summary of Contents for Pakedge Device & Software SK24
Page 1
PAKEDGEDEVICE&SOFTWARE INC. SK Series SK24, SK24f...
Page 2
FCC Declaration of Conformity Pakedge Device & Software, Inc., 2847 Breakwater Avenue, Hayward, CA, declares under sole responsibility that the SK series switches complies with 47 CFR Parts 2 and 15 of the FCC Rules as a Class B digital device. These devices comply with Part 15 of FCC Rules. Operation of the devices is subject to the following two conditions: (1) These devices may not cause harmful interference, and (2) these devices must accept any interference that may cause undesired operation.
Page 3
Use Notes 1. Use the provided accessories, such as the cable, mounting kit, etc; 2. Ensure the basic supply voltage standard must be met; 3. Keep the power plug clean and dry in case of electric shock or other dangers; 4.
CONTENTS Introduction ..............................5 Customer service and technical support ...................... 5 ACCESSING THE WEB INTERFACE ........................7 Dashboard ..............................9 Menu ................................10 System ................................. 10 System Settings ............................10 Basic Information ..........................10 User Management ..........................11 Safe Mangement ..........................12 System reboot .............................
INTRODUCTION The SK Series 24 port Smart Gigabit Switches provide 24 10/100/100. Mbps RJ45 ports, 2 Independent 1000Mbps fiber ports and one Console port. These switches support VLANs, QoS, DHCP relay, IGMP snooping, ACL, STP, RSTP, port mirroring, link aggregation and other features. This switch provides great performance for mid-sized home networks.
Page 7
GETTING TO KNOW YOUR PRODUCT Package Contents: • SK Series Switch Power cord • • Rack Mount Set The front panel of the SK switches has several blue LEDs. See Table1 below for more information. Table 1: Front panel LED explanation from left to right. Status Operation POWER...
Status Operation Reset Press and hold for about 10 seconds to factory reset the switch Blue Switch is booting up Flashing Blue Switch is turned on Switch is powered off Console Blue Switch is booting up Flashing Blue Activitys through console port No activity through port SFP Port 25-26 Blue...
Page 9
Click OK to log in to the web administration portal. Note: It is recommended that you change this default password. Once you have logged in to the switch, you will be able to configure changes. The following is an example of the Dashboard page on the SK24...
MENU The menu provides access to all of the configurable options on the switch. An example of the menu is shown below. These options are described in detail in this manual. SYSTEM The System section contains the four sub sections Systems Settings, IP Setting, ACL, SNMP SYSTEM SETTINGS There are four tabs under System Settings.
Further down, is the serial information, this is the information that you will need to console into the switch. The following three parameters can be changed on this page. Name – Give the switch a unique name. • Location –Allows you to enter the location of the switch. Depending on your network •...
You can also change the telnet password at the bottom. The telnet password will be used if you ever need to access the switch via terminal, such as Putty or Hypertext terminal. SAFE MANGEMENT Safe Management determines by which methods users are allowed to access the switch. In this example http and telnet are enabled, while snmp is disabled.
As traffic increases and the network grows, network security appears more and more important. Packet filtering can effectively block unauthorized users from accessing network and control traffic volume on the network for the purpose of conserving network resources. An access control list (ACL) implements packet filter via configured rules and operations attached to a packet.
ACE Number - ACE controls and monitors access to the object. In the above example this is set to 1. Source IP Address – Specify the IP address that you would like to permit or deny. Source Wildcard – This is used to determine the range of the IP addresses. In the above example, the source IP address is 192.168.1.2, we want to include all IP addresses in the 192.168.1.x subnet.
Page 16
ACL Extended Group Num – Select the group number you would like to use, this is simply an identification number. In this example, it has been set to 10. ACE Number - ACE controls and monitors access to the object. In the above example this is set to 0. Source IP –...
*Note - To enable this rule on particular ports, please see the “ACL Reference Section” MAC IP ACL Mac IP Group Num - Select the group number you would like to use, this is simply an identification number. In this example, it has been set to 20. ACE Num –...
*Note - To enable this rule to particular ports, please see the “ACL Reference Section” ACL REFERENCE The ACL Reference page allows you to apply your rules to ports on the switch.
Page 19
Port - Select the port that you would like to apply or view the rule. All ACL Groups- From this column, select the rule that you would like to use for the port number you selected. Then click the add button, the rule will move over to the right hand column. Reference ACL Groups- This is where your rules will show that are applied to the particular port selected.
SNMP SNMP allows a compliant device to broadcast its information. This information can be broadcasted to other devices on the network. This can be useful for networking monitoring on devices such as Ihiji. There are two sections, Community Name and Trap Target. COMMUNITY NAME The Community Name section is where you define the SNMP settings.
Page 21
When you are done making changes, then click “Apply” The SNMP item will then show at the bottom of the screen as shown below. In the below example, the community name has been set up as “sk24” and has Read-Write permissions. If you wish to delete the item, click the...
TRAP TARGET The Trap Target is where you define the monitoring device. Below is an example of the “Trap Target” page. Select “new” from the drop down menu on the left. Name the device. In this example we are using an Ihiji so we will name it “ihiji.
SNMP Version – There are two versions available on the SK-24 Switch, V1 and V2C. Version 1 will broadcast the necessary information but there will be no acknowledgement of the reception of the message. Version V2C, will send acknowledgment that a message has been received. When not sure which one to use, it is usually acceptable to use V2C.
COMMON CONFIGURATION Common configuration is where the ports are enabled or disabled and allow for the speed of the port to be manually set. Below is an example of the Common Configuration Page. To disable a port, click on the port, then click on the “down” radio button. Then click “Apply” The port will look like this in the above port field.
temporarily stop sending packets to the switch, thus avoiding packets drop and ensuring a reliable network. Meanwhile, if a certain port receives a Pause frame, it will also stop sending packets out. By default, the flow control feature is disabled. To enable flow control, click on the port you want to enable flow control on.
PORT RATE LIMIT The Port Ratelimit page will allow you to define how much data is allowed to pass through a port on the switch. You can select ports and then towards the bottom set the Send Packets Rate Control and Receive Packets Rate Control to On.
AG GROUP The Ag Group tab is where you can set up Link Aggregation. Link Aggregation allow you to combine the bandwidth of 2 to 8 ports. On a device. Note: the device must have more than one Ethernet port on it and must support this feature for it to work.
MIRROR Port Mirroring allows you to watch traffic using Wireshark or another tool, without disturbing the original port. We want to monitor traffic on port 10. We will mirror port 4. Port 4 will be monitoring the traffic on port 10. We will connect a laptop to port 4 with Wireshark installed to monitor the traffic on port 3 through port 4.
MAC CONTROL Mac Control allows you to block or allow access or deny access to a device via MAC address. BINDING CONFIGURATION Binding allows you to bind a mac address on the port. Under the Mac type drop down menu, there are 3 options.
Page 30
Static The static Mac Type allows you to bind a certain IP address to a particular port. To set this up choose the port from the “port” dropdown menu. In the Mac Address Field, type in the Mac address. If you would like to bind the mac address AA:AA:BB:BB:CC:CC you would type it as shown below, AAA.BBBB.CCCC.
The “All” option shows you all mac addresses both Dynamic and Static. FILTER CONFIGURATION Filter Configuration allows you to define what mac addresses are allowed through the switch are blocked through the switch. Type the Mac Address in the “Mac Address” Field. The Mac address be typed in the same format as described in the “Binding Configuration”...
Click on “apply” when finished. VLAN The VLAN section allows you to set up VLANs. VLANs are subnetworks that help to segregate network traffic. The below section describes how to configure VLANs. CONFIGURATION Configuration allows you to set up VLAN and assign ports to them. Note: The VLANs will only work if you have a VLAN aware router.
Page 33
Below is an example of what the VLAN page looks like. First step is to add a VLAN under “Manage VLANs.” Click the “Add” button as shown below. You will then see the below screen.
Page 34
In the “VLAN ID” field you will type the VLAN number that you would like to add. Then Name the VLAN (optional). Note: The VLAN ID’s must be set up in the router to work on the switch. In this example, we are adding VLAN 6 and naming it “Guest.” Then click on the “apply” You will now see the new VLAN ID populate Next you have to add the ports to be members of a VLAN.
Page 35
Then click on the ports that you would like to add to the VLAN. In this example, we are adding ports 5,7,9,11. When ports are selected they will look like this The ports will then populate next to the VLAN as shown below. When you are finished hit apply. The ports on the page will then look like this.
Page 36
When you are down click on “Apply” at the bottom of the page. The ports will then show the VLAN below the port. As seen below. Adding a Hybrid Port To add a hybrid port, click on the next to the “hybrid” column. The staggered line field will appear as seen below.
Page 37
Then click on the VLAN that you would like to add. This should be your primary VLAN or the VLAN that you want the physical device to be on. In this example we are adding VLAN 1. VLAN 1 is the After clicking on VLAN 1, it will populate below.
Page 38
The finished product is shown below. This example shows port 1 as the default VLAN with VLAN 2-6 tagged on port 21 and 22. In the port image, the hybrid ports will show in a broken line box as shown below. Adding a Trunk in Port To add a Trunk port, click on the next to the “Trunk”...
Page 39
Select the VLANs you would like to tag. They will then show up in the (T) field as shown below. Then click on the “Assigned Port” Select the following ports you want the trunk setting to be on. In this example we are using ports 8, 10, and 12.
When finish click on “Apply.” TRAFFIC The Traffic Section is where you can configure QoS, STP and IGMP. Quality of Service (QOS) allows you to prioritize the traffic on your network. There are two tabs in this section, schedule and apply. We will focus on the Apply section. APPLY You will see a page that looks like this.
Page 41
First click on the ports that you would like to prioritize. In this example 5, 7 and 9 are selected. Select COS-Based from the drop down menu under “QOS” type. Then assign the priority from the drop down meu. In this example we chose 7, which is the highest priority. When you are finished hit apply.
Spanning tree protocol (STP) prevents loops that might be caused in a network. Loops are caused when there are multiple “paths” in a network between a device on the network and a device such as a router or a switch. The loop can then cause Broadcast storms. Broadcast storms occur when broadcast or multicast data is forwarded by the switch out of every port.
Max Hops - maximum number of hops that would be required to get back to the main switch or to the router. If not certain to what this number should be, it is best to use it at the Default of 20 hops. Hello Time –...
Page 44
To enable spanning tree on a particular port, click on the port that you would like to configure spanning tree on. Status – This is where you enable or disable spanning tree on a port. In this example we are enabling it on port 3.
IGMP SNOOPING IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. IGMP snooping, as implied by the name, is a feature that allows a network switch to listen to on the IGMP conversation between hosts and routers. By listening to the conversations between hosts and routers, the switch maintains a map of links which need IP multicast streams.
MULTICAST GROUP INFO This is where you set up the multicast group information. These are the devices that need to talk to each other using multicast traffic. MANAGEMENT The Management section allows to perform management tasks such as factory defaulting and saving configurations.
CONFIGURATION FILE The configuration file page is shown below. The text shown in the below figure, is the plain text of the configuration. Here you can save or delete your configuration of the switch. To save the configuration, Click on the “Download” button. FILE UPLOAD The file upload tab allows you to load a firmware file or a configuration file.
Page 48
To upload a file, click on the” browse” button, and navigate to the file you want to upload. You will see the file next to the “Browse” button. If it is a configuration file (.cfg) click on “Import” If it is a firmware file (.iso) click upgrade, like in the below example...
This section is used for Pakedge use when to determine issues on the switch when troubleshooting steps have been exhausted. LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device information periodically to neighbors on the same IEEE 802 local area network. The advertised information, including details such as device identification, capabilities and configuration settings, is represented in TLV (Type/Length/Value) format according to the IEEE 802.1ab standard, and these TLVs are encapsulated in LLDPDU (Link Layer Discovery Protocol Data Unit).
Page 50
The Table below describes the options displayed on this page.
PORT SETUP SELECT The Port Setup Select allows you to configure the LLDP port properties. By selecting a port, you will be able to make the following changes from the below dropdown menu. • Disable – Disable the LLDP functions on the selected port. TX –...
APPENDIX A – TECHNICAL SUPPORT Please visit our website for up-to-date support information: Website: www.pakedge.com Email: support@pakedge.com CONTACT INFORMATION: Pakedge Device & Software Inc. 3847 Breakwater Avenue Hayward, CA 94545-3606...
APPENDIX B- SPECIFICATIONS Feature Description Specifications Powered By PoE Port Orientation Available as rear and front facing 1. Telnet Configuration Management 2. Console interface configuration 3. SNMP (Simple Network management protocol) Pakedge Zone Support Basic Zones Port Density Total Ports None PoE+ None...
Page 56
DRAM 128Mbits Power Input Voltage 100-240AC, 50/60Hz Physical Specification Dimensions 17.36 x 10 x 1.73 in (44.09 x 25.4 x 4.39 cm) Weight 6.7 lbs (3.04 kg) Operation Temperature -0°C-40°C (32°F-104°F) Storage Temperature -40 ~ 70° (-40°~158°F) Operating Humidity 10% - 90% non-condensing Certifications FCC/CE, RoHS Standards...
APPENDIX C- LIMITED WARRANTY SK Series Congratulations on your purchase of a Pakedge Device & Software product! Pakedge designs and manufactures the finest home networking products. With proper installation, setup, and care, you should enjoy many years of unparalleled performance. Please read this consumer protection plan carefully and retain it with your other important documents.
Page 58
INSTALLTION AND SETUP WORK BE PERFORMED ONLY BY AN AUTHORIZED PAKEDGE DEALER TO PROTECT YOUR RIGHTS UNDER THIS WARRANTY. THIS WILL ALSO ENSURE THAT YOU ENJOY THE FINE PERFORMANCE YOUR PAKEDGE PRODUCT IS CAPABLE OF PROVIDING. Rights, Limits, and Exclusions Pakedge limits its obligation under any implied warranties under state laws to a period not to exceed the warranty period.