Pakedge Device & Software SK24 User Manual

Pakedge Device & Software SK24 User Manual

Sk series 24-port managed

Advertisement

PAKEDGEDEVICE&SOFTWARE INC.
SK Series
SK24, SK24f

Advertisement

Table of Contents
loading

Summary of Contents for Pakedge Device & Software SK24

  • Page 1 PAKEDGEDEVICE&SOFTWARE INC. SK Series SK24, SK24f...
  • Page 2 FCC Declaration of Conformity Pakedge Device & Software, Inc., 2847 Breakwater Avenue, Hayward, CA, declares under sole responsibility that the SK series switches complies with 47 CFR Parts 2 and 15 of the FCC Rules as a Class B digital device. These devices comply with Part 15 of FCC Rules. Operation of the devices is subject to the following two conditions: (1) These devices may not cause harmful interference, and (2) these devices must accept any interference that may cause undesired operation.
  • Page 3 Use Notes 1. Use the provided accessories, such as the cable, mounting kit, etc; 2. Ensure the basic supply voltage standard must be met; 3. Keep the power plug clean and dry in case of electric shock or other dangers; 4.
  • Page 4: Table Of Contents

    CONTENTS Introduction ..............................5 Customer service and technical support ...................... 5 ACCESSING THE WEB INTERFACE ........................7 Dashboard ..............................9 Menu ................................10 System ................................. 10 System Settings ............................10 Basic Information ..........................10 User Management ..........................11 Safe Mangement ..........................12 System reboot .............................
  • Page 5 COnfiguration ............................31 Traffic ................................39 QOS ................................39 Apply ..............................39 STP ................................41 COnfiguration ............................41 POrt Configuration ..........................42 IGMP Snooping ............................44 Snooping ............................. 44 Multicast group INfo ........................... 45 Management ............................... 45 Maintenance ............................... 45 Configuration file ..........................
  • Page 6: Introduction

    INTRODUCTION The SK Series 24 port Smart Gigabit Switches provide 24 10/100/100. Mbps RJ45 ports, 2 Independent 1000Mbps fiber ports and one Console port. These switches support VLANs, QoS, DHCP relay, IGMP snooping, ACL, STP, RSTP, port mirroring, link aggregation and other features. This switch provides great performance for mid-sized home networks.
  • Page 7 GETTING TO KNOW YOUR PRODUCT Package Contents: • SK Series Switch Power cord • • Rack Mount Set The front panel of the SK switches has several blue LEDs. See Table1 below for more information. Table 1: Front panel LED explanation from left to right. Status Operation POWER...
  • Page 8: Accessing The Web Interface

    Status Operation Reset Press and hold for about 10 seconds to factory reset the switch Blue Switch is booting up Flashing Blue Switch is turned on Switch is powered off Console Blue Switch is booting up Flashing Blue Activitys through console port No activity through port SFP Port 25-26 Blue...
  • Page 9 Click OK to log in to the web administration portal. Note: It is recommended that you change this default password. Once you have logged in to the switch, you will be able to configure changes. The following is an example of the Dashboard page on the SK24...
  • Page 10: Dashboard

    DASHBOARD The dashboard provides frequently used quick links to help with more efficient setup.
  • Page 11: Menu

    MENU The menu provides access to all of the configurable options on the switch. An example of the menu is shown below. These options are described in detail in this manual. SYSTEM The System section contains the four sub sections Systems Settings, IP Setting, ACL, SNMP SYSTEM SETTINGS There are four tabs under System Settings.
  • Page 12: User Management

    Further down, is the serial information, this is the information that you will need to console into the switch. The following three parameters can be changed on this page. Name – Give the switch a unique name. • Location –Allows you to enter the location of the switch. Depending on your network •...
  • Page 13: Safe Mangement

    You can also change the telnet password at the bottom. The telnet password will be used if you ever need to access the switch via terminal, such as Putty or Hypertext terminal. SAFE MANGEMENT Safe Management determines by which methods users are allowed to access the switch. In this example http and telnet are enabled, while snmp is disabled.
  • Page 14: Acl

    As traffic increases and the network grows, network security appears more and more important. Packet filtering can effectively block unauthorized users from accessing network and control traffic volume on the network for the purpose of conserving network resources. An access control list (ACL) implements packet filter via configured rules and operations attached to a packet.
  • Page 15: Extended Ip

    ACE Number - ACE controls and monitors access to the object. In the above example this is set to 1. Source IP Address – Specify the IP address that you would like to permit or deny. Source Wildcard – This is used to determine the range of the IP addresses. In the above example, the source IP address is 192.168.1.2, we want to include all IP addresses in the 192.168.1.x subnet.
  • Page 16 ACL Extended Group Num – Select the group number you would like to use, this is simply an identification number. In this example, it has been set to 10. ACE Number - ACE controls and monitors access to the object. In the above example this is set to 0. Source IP –...
  • Page 17: Mac Ip

    *Note - To enable this rule on particular ports, please see the “ACL Reference Section” MAC IP ACL Mac IP Group Num - Select the group number you would like to use, this is simply an identification number. In this example, it has been set to 20. ACE Num –...
  • Page 18: Acl Reference

    *Note - To enable this rule to particular ports, please see the “ACL Reference Section” ACL REFERENCE The ACL Reference page allows you to apply your rules to ports on the switch.
  • Page 19 Port - Select the port that you would like to apply or view the rule. All ACL Groups- From this column, select the rule that you would like to use for the port number you selected. Then click the add button, the rule will move over to the right hand column. Reference ACL Groups- This is where your rules will show that are applied to the particular port selected.
  • Page 20: Snmp

    SNMP SNMP allows a compliant device to broadcast its information. This information can be broadcasted to other devices on the network. This can be useful for networking monitoring on devices such as Ihiji. There are two sections, Community Name and Trap Target. COMMUNITY NAME The Community Name section is where you define the SNMP settings.
  • Page 21 When you are done making changes, then click “Apply” The SNMP item will then show at the bottom of the screen as shown below. In the below example, the community name has been set up as “sk24” and has Read-Write permissions. If you wish to delete the item, click the...
  • Page 22: Trap Target

    TRAP TARGET The Trap Target is where you define the monitoring device. Below is an example of the “Trap Target” page. Select “new” from the drop down menu on the left. Name the device. In this example we are using an Ihiji so we will name it “ihiji.
  • Page 23: Ports

    SNMP Version – There are two versions available on the SK-24 Switch, V1 and V2C. Version 1 will broadcast the necessary information but there will be no acknowledgement of the reception of the message. Version V2C, will send acknowledgment that a message has been received. When not sure which one to use, it is usually acceptable to use V2C.
  • Page 24: Common Configuration

    COMMON CONFIGURATION Common configuration is where the ports are enabled or disabled and allow for the speed of the port to be manually set. Below is an example of the Common Configuration Page. To disable a port, click on the port, then click on the “down” radio button. Then click “Apply” The port will look like this in the above port field.
  • Page 25: Broadcast Storm

    temporarily stop sending packets to the switch, thus avoiding packets drop and ensuring a reliable network. Meanwhile, if a certain port receives a Pause frame, it will also stop sending packets out. By default, the flow control feature is disabled. To enable flow control, click on the port you want to enable flow control on.
  • Page 26: Port Rate Limit

    PORT RATE LIMIT The Port Ratelimit page will allow you to define how much data is allowed to pass through a port on the switch. You can select ports and then towards the bottom set the Send Packets Rate Control and Receive Packets Rate Control to On.
  • Page 27: Ag Group

    AG GROUP The Ag Group tab is where you can set up Link Aggregation. Link Aggregation allow you to combine the bandwidth of 2 to 8 ports. On a device. Note: the device must have more than one Ethernet port on it and must support this feature for it to work.
  • Page 28: Mirror

    MIRROR Port Mirroring allows you to watch traffic using Wireshark or another tool, without disturbing the original port. We want to monitor traffic on port 10. We will mirror port 4. Port 4 will be monitoring the traffic on port 10. We will connect a laptop to port 4 with Wireshark installed to monitor the traffic on port 3 through port 4.
  • Page 29: Mac Control

    MAC CONTROL Mac Control allows you to block or allow access or deny access to a device via MAC address. BINDING CONFIGURATION Binding allows you to bind a mac address on the port. Under the Mac type drop down menu, there are 3 options.
  • Page 30 Static The static Mac Type allows you to bind a certain IP address to a particular port. To set this up choose the port from the “port” dropdown menu. In the Mac Address Field, type in the Mac address. If you would like to bind the mac address AA:AA:BB:BB:CC:CC you would type it as shown below, AAA.BBBB.CCCC.
  • Page 31: Filter Configuration

    The “All” option shows you all mac addresses both Dynamic and Static. FILTER CONFIGURATION Filter Configuration allows you to define what mac addresses are allowed through the switch are blocked through the switch. Type the Mac Address in the “Mac Address” Field. The Mac address be typed in the same format as described in the “Binding Configuration”...
  • Page 32: Vlan

    Click on “apply” when finished. VLAN The VLAN section allows you to set up VLANs. VLANs are subnetworks that help to segregate network traffic. The below section describes how to configure VLANs. CONFIGURATION Configuration allows you to set up VLAN and assign ports to them. Note: The VLANs will only work if you have a VLAN aware router.
  • Page 33 Below is an example of what the VLAN page looks like. First step is to add a VLAN under “Manage VLANs.” Click the “Add” button as shown below. You will then see the below screen.
  • Page 34 In the “VLAN ID” field you will type the VLAN number that you would like to add. Then Name the VLAN (optional). Note: The VLAN ID’s must be set up in the router to work on the switch. In this example, we are adding VLAN 6 and naming it “Guest.” Then click on the “apply” You will now see the new VLAN ID populate Next you have to add the ports to be members of a VLAN.
  • Page 35 Then click on the ports that you would like to add to the VLAN. In this example, we are adding ports 5,7,9,11. When ports are selected they will look like this The ports will then populate next to the VLAN as shown below. When you are finished hit apply. The ports on the page will then look like this.
  • Page 36 When you are down click on “Apply” at the bottom of the page. The ports will then show the VLAN below the port. As seen below. Adding a Hybrid Port To add a hybrid port, click on the next to the “hybrid” column. The staggered line field will appear as seen below.
  • Page 37 Then click on the VLAN that you would like to add. This should be your primary VLAN or the VLAN that you want the physical device to be on. In this example we are adding VLAN 1. VLAN 1 is the After clicking on VLAN 1, it will populate below.
  • Page 38 The finished product is shown below. This example shows port 1 as the default VLAN with VLAN 2-6 tagged on port 21 and 22. In the port image, the hybrid ports will show in a broken line box as shown below. Adding a Trunk in Port To add a Trunk port, click on the next to the “Trunk”...
  • Page 39 Select the VLANs you would like to tag. They will then show up in the (T) field as shown below. Then click on the “Assigned Port” Select the following ports you want the trunk setting to be on. In this example we are using ports 8, 10, and 12.
  • Page 40: Traffic

    When finish click on “Apply.” TRAFFIC The Traffic Section is where you can configure QoS, STP and IGMP. Quality of Service (QOS) allows you to prioritize the traffic on your network. There are two tabs in this section, schedule and apply. We will focus on the Apply section. APPLY You will see a page that looks like this.
  • Page 41 First click on the ports that you would like to prioritize. In this example 5, 7 and 9 are selected. Select COS-Based from the drop down menu under “QOS” type. Then assign the priority from the drop down meu. In this example we chose 7, which is the highest priority. When you are finished hit apply.
  • Page 42: Stp

    Spanning tree protocol (STP) prevents loops that might be caused in a network. Loops are caused when there are multiple “paths” in a network between a device on the network and a device such as a router or a switch. The loop can then cause Broadcast storms. Broadcast storms occur when broadcast or multicast data is forwarded by the switch out of every port.
  • Page 43: Port Configuration

    Max Hops - maximum number of hops that would be required to get back to the main switch or to the router. If not certain to what this number should be, it is best to use it at the Default of 20 hops. Hello Time –...
  • Page 44 To enable spanning tree on a particular port, click on the port that you would like to configure spanning tree on. Status – This is where you enable or disable spanning tree on a port. In this example we are enabling it on port 3.
  • Page 45: Igmp Snooping

    IGMP SNOOPING IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. IGMP snooping, as implied by the name, is a feature that allows a network switch to listen to on the IGMP conversation between hosts and routers. By listening to the conversations between hosts and routers, the switch maintains a map of links which need IP multicast streams.
  • Page 46: Multicast Group Info

    MULTICAST GROUP INFO This is where you set up the multicast group information. These are the devices that need to talk to each other using multicast traffic. MANAGEMENT The Management section allows to perform management tasks such as factory defaulting and saving configurations.
  • Page 47: Configuration File

    CONFIGURATION FILE The configuration file page is shown below. The text shown in the below figure, is the plain text of the configuration. Here you can save or delete your configuration of the switch. To save the configuration, Click on the “Download” button. FILE UPLOAD The file upload tab allows you to load a firmware file or a configuration file.
  • Page 48 To upload a file, click on the” browse” button, and navigate to the file you want to upload. You will see the file next to the “Browse” button. If it is a configuration file (.cfg) click on “Import” If it is a firmware file (.iso) click upgrade, like in the below example...
  • Page 49: Log

    This section is used for Pakedge use when to determine issues on the switch when troubleshooting steps have been exhausted. LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device information periodically to neighbors on the same IEEE 802 local area network. The advertised information, including details such as device identification, capabilities and configuration settings, is represented in TLV (Type/Length/Value) format according to the IEEE 802.1ab standard, and these TLVs are encapsulated in LLDPDU (Link Layer Discovery Protocol Data Unit).
  • Page 50 The Table below describes the options displayed on this page.
  • Page 51: Port Setup Select

    PORT SETUP SELECT The Port Setup Select allows you to configure the LLDP port properties. By selecting a port, you will be able to make the following changes from the below dropdown menu. • Disable – Disable the LLDP functions on the selected port. TX –...
  • Page 52: Port Statistics

    PORT STATISTICS The Port Statistics page will display LLDP statistics on each port.
  • Page 54: Appendix A - Technical Support

    APPENDIX A – TECHNICAL SUPPORT Please visit our website for up-to-date support information: Website: www.pakedge.com Email: support@pakedge.com CONTACT INFORMATION: Pakedge Device & Software Inc. 3847 Breakwater Avenue Hayward, CA 94545-3606...
  • Page 55: Appendix B- Specifications

    APPENDIX B- SPECIFICATIONS Feature Description Specifications Powered By PoE Port Orientation Available as rear and front facing 1. Telnet Configuration Management 2. Console interface configuration 3. SNMP (Simple Network management protocol) Pakedge Zone Support Basic Zones Port Density Total Ports None PoE+ None...
  • Page 56 DRAM 128Mbits Power Input Voltage 100-240AC, 50/60Hz Physical Specification Dimensions 17.36 x 10 x 1.73 in (44.09 x 25.4 x 4.39 cm) Weight 6.7 lbs (3.04 kg) Operation Temperature -0°C-40°C (32°F-104°F) Storage Temperature -40 ~ 70° (-40°~158°F) Operating Humidity 10% - 90% non-condensing Certifications FCC/CE, RoHS Standards...
  • Page 57: Appendix C- Limited Warranty

    APPENDIX C- LIMITED WARRANTY SK Series Congratulations on your purchase of a Pakedge Device & Software product! Pakedge designs and manufactures the finest home networking products. With proper installation, setup, and care, you should enjoy many years of unparalleled performance. Please read this consumer protection plan carefully and retain it with your other important documents.
  • Page 58 INSTALLTION AND SETUP WORK BE PERFORMED ONLY BY AN AUTHORIZED PAKEDGE DEALER TO PROTECT YOUR RIGHTS UNDER THIS WARRANTY. THIS WILL ALSO ENSURE THAT YOU ENJOY THE FINE PERFORMANCE YOUR PAKEDGE PRODUCT IS CAPABLE OF PROVIDING. Rights, Limits, and Exclusions Pakedge limits its obligation under any implied warranties under state laws to a period not to exceed the warranty period.

This manual is also suitable for:

Sk24f

Table of Contents