Manufacture Corporation 94-1518PF User Manual

18-ports web smart+ gbe poe+ switch
Table of Contents

Advertisement

Quick Links

94-1518PF
GUI User Guide
18-Ports Web Smart+ GbE PoE+ Switch
Release A1
 2017, Manufacture Corporation. All rights reserved. All brand and product names are trademarks or registered
trademarks of their respective companies
i

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 94-1518PF and is the answer not in the manual?

Questions and answers

Summary of Contents for Manufacture Corporation 94-1518PF

  • Page 1 94-1518PF GUI User Guide 18-Ports Web Smart+ GbE PoE+ Switch Release A1  2017, Manufacture Corporation. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies...
  • Page 2: About This Manual

    Purpose This GUI user guide gives specific information on how to operate and use the management functions of the 94-1518PF via HTTP/HTTPs web browser Audience The Manual is intended for use by network administrators who are responsible for operating and maintaining network equipment;...
  • Page 3: Table Of Contents

    Table of Contents ABOUT THIS MANUAL ..........................II Revision History ............................viii INTRODUCTION ............................1 CHAPTER 1 OPERATION OF WEB-BASED MANAGEMENT ............3 CHAPTER 2 FIRST TIME WIZARD ...................... 3 CHAPTER 3 SYSTEM ..........................6 3-1 S YSTEM NFORMATION ........................... 6 3-2 IP A DDRESS ..............................
  • Page 4 6-5.1 Configuration ........................... 81 6-5.2 Status ..............................83 6-6 P VLAN ..........................84 ROTOCOL BASED 6-6.1 Protocol to Group ..........................84 6-6.2 Group to VLAN ..........................86 6-7 IP S VLAN ..........................88 UBNET BASED 6-8 P VLAN ............................90 RIVATE 6-9 P SOLATION...
  • Page 5 11-3.3 MVR Groups Information ......................158 11-3.4 MVR SFM Information ......................... 160 CHAPTER 12 DHCP .......................... 162 12-1 S NOOPING .............................. 162 12-1.1 Configuration ..........................162 12-1.2 Snooping Table ..........................164 12-1.3 Detailed Statistics ........................166 12-2 R ELAY ..............................168 12-2.1 Configuration ..........................
  • Page 6 16-1 P ............................... 256 16-2 C ABLE IAGNOSTICS ..........................258 16-3 T RACEROUTE ............................259 16-4 M IRROR ..............................260 CHAPTER 17 MAINTENANCE ......................262 17-1 C ONFIGURATION ............................. 262 17-1.1 Save startup-config ........................262 17-1.2 Backup ............................264 17-1.3 Restore ............................265 17-1.4 Activate config ..........................
  • Page 7: Revision History

    Revision History Release Date Revision Initial Release 2017/01/20 viii...
  • Page 8: Introduction

    In this User Guide, it will not only tell you how to install and connect your network system but configure and monitor the 94-1518PF through the web by (RJ-45) serial interface and Ethernet ports step-by-step. Many explanations in detail of hardware and software functions are shown as well as the examples of the operation for web-based interface.
  • Page 9 Chapter 7 “Quality of Service”  Chapter 8 “Spanning tree”  Chapter 9 “MAC Address Tables”  Chapter 10 “Multicast”  Chapter 11 “MVR”  Chapter 12 “DHCP”  Chapter 13 “Security”  Chapter 14 “Access Control”  Chapter 15 “Event Notification” ...
  • Page 10: Chapter 1 Operation Of Web-Based Management

    192.168.1.254 Username admin Password After the 94-1518PF has been finished configuration it interface, you can browse it. For instance, type http://192.168.1.1 in the address row in a browser, it will show the following screen and ask you inputting username and password in order to login and access authentication.
  • Page 11 AS 94-1518PF the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the Switch default ip 192.168.1.1 Figure 1: The login page...
  • Page 12: Chapter 2 First Time Wizard

    Chapter 2 First Time Wizard The first time you use this device you can configure some basic settings, such as password, IP address, date & time, system information. According to the following procedure: Step1: Change default password Configure new password and enter it again. Figure 2: Change default password Step2: Set IP address Select “obtain IP address via DHCP”...
  • Page 13 Figure 2: Set IP address Step3: Set date and time Enable “Automatic data and time” or select manually to set date and time. Figure 2: Set date and time Step4: Set system information You can set some system information to this device, such as “System contact”, “System name”, “System location”.
  • Page 14 Figure 2: Set system information...
  • Page 15: Chapter 3 System

    Chapter 3 System This chapter describes the entire basic configuration tasks which includes the System Information and any manage of the Switch (e.g. Time, Account, IP, Syslog and NTP.) System Information You can identify the system by configuring system name, location and the contact of the switch. The switch system’s contact information is provided here.
  • Page 16 Hardware-Mechanical Version  The hardware and mechanical version of this switch. Firmware Version  The software version of this switch. MAC Address  The MAC Address of this switch. Series Number  The serial number of this switch. System name : ...
  • Page 17: Ip Address

    3-2 IP Address 3-2.1 IP Settings The IPv4 address for the switch could be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to change the switch's default settings to values that are compatible with your network. You may also need to establish a default gateway between the switch and management stations that exist on another network segment.
  • Page 18 DNS Server :  This setting controls the DNS name resolution done by the switch. The following modes are supported: No DNS server  No DNS server will be used. Configured  Explicitly provide the IP address of the DNS Server in dotted decimal notation. From this DHCP interface ...
  • Page 19: 3-2.2 Advanced Ip Settings

    3-2.2 Advanced IP Settings Configure the switch-managed IP information on this page Configure IP basic settings, control IP interfaces and IP routes. The maximum number of interfaces supported is 8 and the maximum number of routes is 8. Web Interface To configure an Advanced IP Settings in the web interface: Click System, IP Address and Advanced IP Settings.
  • Page 20 IP Interfaces Delete :  Select this option to delete an existing IP interface. VLAN :  The VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface. This field is only available for input when creating an new interface. IPv4 DHCP Enabled : ...
  • Page 21 Mask Length :  The destination IP network or host mask, in number of bits (prefix length). It defines how much of a network address that must match, in order to qualify for this route. Valid values are between 0 and 32 bits respectively 128 for IPv6 routes. Only a default route will have a mask length of 0 (as it will match anything).
  • Page 22: 3-2.3 Status

    3-2.3 Status This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour cache (ARP cache) status. Web Interface To display the log configuration in the web interface: Click System, IP Address and Status.
  • Page 23 Show the name of the interface. Type :  Show the address type of the entry. This may be LINK or IPv4. Address :  Show the current address of the interface (of the given type). Status :  Show the status flags of the interface (and/or address). IP Routes Network : ...
  • Page 24: System Time

    3-3 System Time The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour” and “Minute” within the valid value range indicated in each item. Web Interface To configure Time in the web interface: 1.
  • Page 25 System Date :  Show the current time of the system. The year of system date limits between 2000 and 2037. Time Zone Configuration Time Zone :  Lists various Time Zones worldwide. Select appropriate Time Zone from the drop down and click Apply to set.
  • Page 26 Configure NTP Server :  Click to configure NTP server, When Clock Source select from NTP Server. Figure 3-3: The SNTP configuration NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manually specify an user-defined NTP server as well as Time Zone, the switch will sync the time in a short after pressing <Apply>...
  • Page 27: Log

    3-4 Log 3-4.1 Syslog Configuration The Syslog Configuration is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages.
  • Page 28 Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 29: 3-4.2 View Log

    3-4.2 View Log This section describes that display the system log information of the switch Web Interface To display the log Information in the web interface: Click System, Log and View Log. Display the log information. Figure 3-4.2: The System Log Information Parameter description: ID : ...
  • Page 30 You can choose how many items you want to show. Buttons Refresh :  Updates the system log entries, starting from the current entry ID. Clear Logs :  Clear all the system log entries. Next :  Updates the system log entries, turn to the next page. Previous : ...
  • Page 31: Lldp

    3-5 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally wired Ethernet.
  • Page 32 Figure 3-5.1: The LLDP Configuration Parameter description: LLDP Parameters Tx Interval :  The switch periodically transmits LLDP frames to its neighbours for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds. Tx Hold : ...
  • Page 33 Select CDP awareness. The CDP operation is restricted to decode incoming CDP frames (The switch doesn't transmit CDP frames). CDP frames are only decoded if LLDP on the port is enabled. Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbors’ table are decoded.
  • Page 34: 3-5.2 Lldp-Med Configuration

    3-5.2 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED that provides the following facilities: Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv) settings) enabling plug and play networking. Device location discovery to allow creation of location databases and, in the case of Voice over Internet Protocol (VoIP), Enhanced 911 services.
  • Page 35 Figure 3-5.2: The LLDP-MED Configuration Parameter description : Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general. In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the limited LLDPU space and to reduce security and system integrity issues...
  • Page 36 that can come with inappropriate knowledge of the network policy. With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction between the protocol and the application layers on top of the protocol, in order to achieve these related properties. Initially, a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU.
  • Page 37 Civic Address Location IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI). Country code :  The two-letter ISO 3166 country code in capital ASCII letters - Example: DK, DE or US. State :  National subdivisions (state, canton, region, province, prefecture). County : ...
  • Page 38 Floor :  Floor - Example: 4. Room no. :  Room number - Example: 450F. Place type :  Place type - Example: Office. Postal community name :  Postal community name - Example: Leonia. P.O. Box :  Post office box (P.O.
  • Page 39 policies per application type. LLDP-MED allows multiple policies to be advertised per port, each corresponding to a different application type. Different ports on the same Network Connectivity Device may advertise different sets of policies, based on the authenticated user identity or port configuration.
  • Page 40 Untagged indicates that the device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802.1Q-2003. In this case, both the VLAN ID and the Layer 2 priority fields are ignored and only the DSCP value has relevance. Tagged indicates that the device is using the IEEE 802.1Q tagged frame format, and that both the VLAN ID and the Layer 2 priority values are being used, as well as the DSCP value.
  • Page 41: 3-5.3 Lldp Neighbour

    3-5.3 LLDP Neighbour This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. The columns hold the following information: Web Interface To show LLDP neighbours: 1.
  • Page 42 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). System Description ...
  • Page 43: 3-5.4 Lldp-Med Neighbour

    3-5.4 LLDP-MED Neighbour This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. This function applies to VoIP devices which support LLDP-MED. The columns hold the following information: Web Interface To show LLDP-MED neighbor: 1.
  • Page 44 2. IEEE 802.1 Bridge 3. IEEE 802.3 Repeater (included for historical reasons) 4. IEEE 802.11 Wireless Access Point 5. Any device that supports the IEEE 802.1AB and MED extensions defined by TIA-1057 and can relay IEEE 802 frames via any method. LLDP-MED Endpoint Device Definition : ...
  • Page 45 2. Network Policy 3. Location Identification 4. Extended Power via MDI - PSE 5. Extended Power via MDI - PD 6. Inventory 7. Reserved Application Type :  Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device.
  • Page 46 device is using priority tagged frames as defined by IEEE 802.1Q-2003, meaning that only the IEEE 802.1D priority level is significant and the default PVID of the ingress port is used instead. Priority :  Priority is the Layer 2 priority to be used for the specified application type.One of the eight priority levels (0 through 7).
  • Page 47: 3-5.5 Lldp Statistics

    3-5.5 LLDP Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to per port counters for the currently selected switch. Web Interface To show LLDP Statistics: 1. Click System ,LLDP and LLDP Statistics. 2.
  • Page 48 Shows the number of entries deleted due to Time-To-Live expiring. Local Counters The displayed table contains a row for each port. The columns hold the following information: Local Port :  The port on which LLDP frames are received or transmitted. Tx Frames : ...
  • Page 49: Upnp

    3-6 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components Web Interface To configure the UPnP Configuration in the web interface:...
  • Page 50 Advertising Duration :  The duration, carried in SSDP packets, is used to inform a control point or control points how often it or they should receive an SSDP advertisement message from this switch. If a control point does not receive any message within the duration, it will think that the switch no longer exists.
  • Page 51: Chapter 4 Port Management

    Chapter 4 Port Management The section describes to configure the Port detail parameters of the switch. Others you could use the Port configure to enable or disable the Port of the switch. Monitor the ports content or status in the function. 4-1 Port Configuration This page displays current port configurations.
  • Page 52 Link :  The current link state is displayed graphically. Green indicates the link is up and red that it is down. Current Link Speed :  Provides the current link speed of the port. Configured Link Speed :  Selects any available link speed for the given switch port.
  • Page 53 Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 54: Port Statistics

    4-2 Port Statistics The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports. Web Interface To Display the Port Statistics Overview in the web interface: 1. Click Port Management and Port Statistics. 2.
  • Page 55 Refresh :  Click to refresh the page. Clear :  Clears the counters for all ports. If you want to see the detail of port statistic then you need to click that port. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
  • Page 56 Rx and Tx Unicast :  The number of received and transmitted (good and bad) unicast packets. Rx and Tx Multicast :  The number of received and transmitted (good and bad) multicast packets. Rx and Tx Broadcast :  The number of received and transmitted (good and bad) broadcast packets.
  • Page 57 Click to refresh the page. Clear :  Clears the counters for the selected port.
  • Page 58: Sfp Port Info

    4-3 SFP Port Info The section describes that switch could display the SFP module detail information which you connect it to the switch. The information includes: Connector type, Fiber type, wavelength, bit rate and Vendor OUI etc. Web Interface To Display the SFP information in the web interface: 1.
  • Page 59 Display the Manufacturer's OUI code which is assigned by IEEE. Vendor Name:  Display the company name of the module manufacturer. Vendor P/N:  Display the product name of the naming by module manufacturer. Vendor Rev (Revision):  Display the module revision. Vendor SN (Serial Number): ...
  • Page 60: Energy Efficient Ethernet

    4-4 Energy Efficient Ethernet EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. This page allows the user to inspect and configure the current EEE port settings. EEE is a power saving option that reduces the power usage when there is very low traffic utilization (or no traffic).
  • Page 61: Link Aggregation

    4-5 Link Aggregation 4-5.1 Port This section describes that Port setting/status is used to configure the trunk property of each and every port in the switch system. Web Interface To configure the trunk property of each and every port in the web interface: Click Port Management, Link Aggregation and port.
  • Page 62 Ports choosing the same trunking method other than “None” must be assigned a unique Group number in order to declare that they wish to aggregate with each other. LACP Role:  This field is only referenced when a port’s trunking method is LACP. Active : ...
  • Page 63: 4-5.2 Aggregator View

    4-5.2 Aggregator View To display the current port trunking information from the aggregator point of view. Web Interface To see the LACP detail in the web interface: Click Port Management, Link Aggregation and Aggregator View. Click the LACP Detail. Figure 4-5.2: The Aggregator View Parameter description: Aggregator : ...
  • Page 64 Figure 4-5.2: The Lacp Detail Parameter description: Actor System Priority :  Show the System Priority part of the aggregation Actor. (1-65535) Mac Address :  The system ID of the aggregation Actor. Actor Port :  The actor's port number connected to this port. Actor Key : ...
  • Page 65: 4-5.3 Aggregation Hash Mode

    4-5.3 Aggregation Hash Mode Web Interface hash mode in the web interface: To configure the Aggregation Click Port Management, Link Aggregation and Aggregator Hash Mode. Click Hash Code Contributors to select the mode. Click the apply to save the setting. If you want to cancel the setting then you need to click the Reset button.
  • Page 66 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 67: 4-5.4 Lacp System Priority

    4-5.4 LACP System Priority It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system. Each system supports LACP will be assigned a globally unique System Identifier for this purpose.
  • Page 68: Loop Protection

    4-6 Loop Protection 4-6.1 Configuration The loop Protection is used to detect the presence of traffic. When switch receives packet’s (looping detection frame) MAC address the same as oneself from port, show Loop Protection happens. The port will be locked when it received the looping Protection frames. If you want to resume the locked port, please find out the looping path and take off the looping path, then select the resume the locked port and click on “Resume”...
  • Page 69 detected (and the port action shuts down the port). Valid values are 10 to 604800 seconds (7 days). Port Configuration Port :  The switch port number of the port. Enable :  Controls whether loop protection is enabled on this switch port Action: ...
  • Page 70: 4-6.2 Status

    4-6.2 Status This section displays the loop protection port status the ports of the currently selected switch. Web Interface To display the Loop Protection status in the web interface: 1. Click Port Management, Loop Protection and Status. 2. If you want to auto-refresh the information then you need to evoke the “Auto refresh”. 3.
  • Page 71 Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately.
  • Page 72: Chapter 5 Poe Management

    Chapter 5 PoE Management PoE is an acronym for Power over Ethernet. Power over Ethernet is used to transmit electrical power, to remote devices over standard Ethernet cable. It could for example be used for powering IP telephones, wireless LAN access points and other equipment, where it would be difficult or expensive to connect the equipment to main power supply.
  • Page 73 Primary Power Supply [W] :  To display watts for the primary power supply. Capacitor Detection :  Click to enable or disable the capacitor configuration. PoE Port Configuration Port :  This is the logical port number for this row. PoE Mode : ...
  • Page 74: Poe Status

    5-2 PoE Status This page allows the user to inspect the current status for all PoE ports. Web Interface To Display PoE Status in the web interface: Click PoE Management and PoE Status Scroll “Auto-refresh” to on/off. Click “Refresh” to refresh the port detailed statistics. Figure 5-2: The PoE Status Parameter description: Local Port :...
  • Page 75 The Port Status shows the port's status. The status can be one of the following values: PoE not available - No PoE chip found - PoE not supported for the port. PoE turned OFF - PoE disabled : PoE is disabled by user. PoE turned OFF - Power budget exceeded - The total requested or used power by the PDs exceeds the maximum power the Power Supply can deliver, and port(s) with the lowest priority is/are powered down.
  • Page 76: Poe Power Delay

    5-3 PoE Power Delay This page allows the user to setting the delay time of power providing after device rebooted. Web Interface To Display Power over Ethernet Status in the web interface: 1. Click PoE Management and PoE Power delay. 2.
  • Page 77: Poe Auto Checking

    5-4 PoE Auto Checking This page allows the user to specify the auto detection parameters to check the linking status between PoE ports and PDs. When it detected the fail connect, will reboot remote PD automatically. Web Interface To configue Power over Ethernet Auto Checking in the web interface: Click PoE Management and PoE Auto checking.
  • Page 78 it will trigger failure action. Default: 3, range: 1-5. Failure Log :  Failure loggings counter. Failure Action :  The action when the third fail detection. Nothing : Keep Ping the remote PD but does nothing further. Reboot : Cut off the power of the PoE port, make PD rebooted. Reboot time(sec) : ...
  • Page 79: Poe Schedule Profile

    5-5 PoE Schedule Profile This page allows user to define the profile for PoE scheduling. Web Interface To configure PoE Schedule Profile in the web interface: Click PoE Management and PoE Scheduling Profile. Select profile number and specify the profile name. Select Week Day and Specify Start Time, End Time.
  • Page 80: Chapter 6 Vlan Management

    Chapter 6 VLAN Management 6-1 VLAN Configuration To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workstation connected to a port in the VLAN. This connection supports a VSM, SNMP, and Telnet session. By default, the active management VLAN is VLAN 1, but you can designate any VLAN as the management VLAN using the Management VLAN window.
  • Page 81 By default, only VLAN 1 exists. More VLANs may be created by using a list syntax where the individual elements are separated by commas. Ranges are specified with a dash separating the lower and upper bound. The following example will create VLANs 1, 10, 11, 12, 13, 200, and 300: 1,10-13,200,300. Spaces are allowed in between the delimiters.
  • Page 82 default being 1. On ingress, frames get classified to the Port VLAN if the port is configured as VLAN unaware, the frame is untagged, or VLAN awareness is enabled on the port, but the frame is priority tagged (VLAN ID = 0). On egress, frames classified to the Port VLAN do not get tagged if Egress Tagging configuration is set to untag Port VLAN.
  • Page 83 Tagged Only Only tagged frames are accepted on ingress. Untagged frames are discarded. Untagged Only Only untagged frames are accepted on ingress. Tagged frames are discarded. Egress Tagging :  Ports in Trunk and Hybrid mode may control the tagging of frames on egress. Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged.
  • Page 84: Vlan Membership

    6-2 VLAN Membership This page provides an overview of membership status of VLAN users. The ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure VLAN membership configuration in the web interface: 1.
  • Page 85 spanning trees in a network, which significantly improves network resource utilization while maintaining a loop-free environment. DMS: Shows DMS VLAN membership status. VCL : Shows MAC-based VLAN entries configured by various MAC-based VLAN users. VLAN ID :  VLAN ID for which the Port members are displayed. Port Members : ...
  • Page 86: Vlan Port Status

    6-3 VLAN Port Status The function Port Status gathers the information of all VLAN status and reports it by the order of Combined, Admin, NAS, GVRP, MVR, Voice VLAN, MSTP, DMS, VCL. Web Interface To Display VLAN Port Status in the web interface: 1.
  • Page 87 Port Type :  Shows the Port Type. Port type can be any of Unaware, C-port, S-port, Custom S-port. If Port Type is Unaware, all frames are classified to the Port VLAN ID and tags are not removed. C-port is Customer Port. S-port is Service port. Custom S-port is S-port with Custom TPID. Ingress Filtering : ...
  • Page 88: Vlan Selective Qinq Configuration

    6-4 VLAN Selective QinQ Configuration A Q-in-Q VLAN tunnel enables a service provider to segregate the traffic of different customers in their infrastructure, while still giving the customer a full range of VLANs for their internal use by adding a second 802.1Q tag to an already tagged frame. Web Interface To configure VLAN selective QinQ in the web interface: 1.
  • Page 89 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 90: Mac-Based Vlan

    6-5 MAC-based VLAN 6-5.1 Configuration MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. A most common way of grouping VLAN members is by port, hence the name port-based VLAN. Typically, the device adds the same VLAN tag to untagged packets that are received through the same port.
  • Page 91 VLAN ID :  Indicates the VLAN ID. Buttons Adding New Entry :  Click to add a new MAC-based VLAN entry. An empty row is added to the table, and the MAC-based VLAN entry can be configured as needed. Any unicast MAC address can be configured for the MAC-based VLAN entry.
  • Page 92: 6-5.2 Status

    6-5.2 Status Show the MAC-based VLAN status. Web Interface To Display MAC address-based VLAN configuration in the web interface: Click VLAN Management, MAC-based VLAN and Status. If you want to auto-refresh the information then you need to evoke the “Auto-refresh”. Click “Refresh”...
  • Page 93: Protocol-Based Vlan

    6-6 Protocol-based VLAN This section describe Protocol -based VLAN, The Switch support Protocol include Ethernet LLC SNAP Protocol, The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI reference model.
  • Page 94 Ethernet SNAP On changing the Frame type field, valid value of the following text field will vary depending on the new frame type you selected. Value :  Valid value that can be entered in this text field depends on the option selected from the the preceding Frame Type selection menu.
  • Page 95: 6-6.2 Group To Vlan

    6-6.2 Group to VLAN This section allows you to map an already configured Group Name to a VLAN for the selected stack switch unit switch. Web Interface To configure Group Name to VLAN mapping table configured in the web interface: 1.
  • Page 96 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 97: Ip Subnet-Based Vlan

    6-7 IP Subnet-based VLAN The IP subnet-based VLAN entries can be configured here. This page allows for adding, updating and deleting IP subnet-based VLAN entries and assigning the entries to different ports. This page shows only static entries. Web Interface To configure IP subnet-based VLAN Membership to configured in the web interface: 1.
  • Page 98 Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 99: Private Vlan

    6-8 Private VLAN The Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be added or deleted here. Port members of each Private VLAN can be added or removed here. Private VLANs are based on the source port mask, and there are no connections to VLANs. This means that VLAN IDs and Private VLAN IDs can be identical.
  • Page 100 Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 101: Port Isolation

    6-9 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair.
  • Page 102: Voice Vlan

    6-10 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can perform QoS-related configuration for voice data, ensuring the transmission priority of voice traffic and voice quality. 6-10.1 Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic.
  • Page 103 Indicates the Voice VLAN ID. It should be a unique VLAN ID in the system and cannot equal each port PVID. It is a conflict in configuration if the value equals management VID, MVR VID, PVID etc. The allowed range is 1 to 4095. Aging Time : ...
  • Page 104: 6-10.2 Oui

    6-10.2 OUI The section describes to Configure VOICE VLAN OUI table. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. Web Interface To configure Voice VLAN OUI Table in the web interface: 1.
  • Page 105: Chapter 7 Quality Of Service

    Chapter 7 Quality of Service 7-1 Global Settings Use the Global Settings page to set the trust behavior for QoS basic mode. This configuration is active when the switch is in QoS basic mode. Packets entering a QoS domain are classified at the edge of the QoS domain.
  • Page 106 Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 107: Port Settings

    7-2 Port Settings Web Interface To configure the QoS Port Setting in the web interface: Click Quality of Service and Port Settings. Select Mode, Default CoS, Source CoS, Remark CoS to each port. Click which port need to enable the Remark Cos, Remark DSCP, Remark IP Precedence Click Apply to save the configuration.
  • Page 108 Click the checkbox to remark the IP precedence for egress traffic on this port. Note: The CoS/802.1p priority and IP Precedence, or the CoS/802.1p priority and DSCP value can be remarked simultaneously for egress traffic on a port, but the DSCP value and IP Precedence cannot be remarked simultaneously.
  • Page 109: Port Policing

    7-3 Port Policing This section provides an overview of QoS Ingress Port Policers for all switch ports The Port Policing is useful in constraining traffic flows and marking frames above specific rates. Policing is primarily useful for data flows and voice or video flows because voice and video usually maintains a steady rate of traffic Web Interface To configure the QoS Port Policers in the web interface:...
  • Page 110: Port Shaper

    7-4 Port Shaper This section provides an overview of QoS Egress Port Shapers for all switch ports. Others the user could get all detail information of the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port Shapers in the web interface: 1.
  • Page 111 Port Shaper Enable :  Controls whether the port shaper is enabled for this switch port. Rate(kbps) :  Controls the rate for the port shaper. The default value is 1000000. Buttons Apply :  Click to save changes. Reset : ...
  • Page 112: Storm Control

    7-5 Storm Control The section allows user to configure the Storm control for the switch. There is a destination lookup failure storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
  • Page 113 Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 114: Port Scheduler

    7-6 Port Scheduler This section provides an overview of QoS Egress Port Scheduler for all switch ports. and the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port Schedulers in the web interface: 1.
  • Page 115: Cos/802.1P Mapping

    7-7 CoS/802.1p Mapping Use the CoS/802.1p to Queue page to map 802.1p priorities to egress queues. The CoS/802.1p to Queue table determines the egress queues of the incoming packets based on the 802.1p priority in their VLAN tags. For incoming untagged packets, the 802.1p priority will be the default CoS/802.1p priority assigned to the ingress ports.
  • Page 116: Cos/802.1P Remarking

    7-8 CoS/802.1p Remarking Use the Queues to CoS/802.1p page to remark the CoS/802.1p priority for egress traffic from each queue. Web Interface To configure the Cos/802.1p Remarking in the web interface: 1. Click Quality of Service and Cos/802.1p Remarking. 2. Select CoS/802.1p. 3.
  • Page 117: Ip Precedence Mapping

    7-9 IP Precedence Mapping To map IP precedence to egress queue. Web Interface To configure the IP Precedence Mapping in the web interface: 1. Click Quality of Service and IP Precedence Mapping. 2. Select Queue ID. 3. Click the Apply to save the setting. 4.
  • Page 118: Ip Precedence Remarking

    7-10 IP Precedence Remarking To map egress queue to IP precedence. Web Interface To configure the IP Precedence Remarking in the web interface: 1. Click Quality of Service and IP Precedence Remarking. 2. Select IP Precedence. 3. Click the Apply to save the setting. 4.
  • Page 119: Dscp Mapping

    7-11 DSCP Mapping Use the DSCP to Queue page to map IP DSCP to egress queues. The DSCP to Queue table determines the egress queues of the incoming IP packets based on their DSCP values. The original VLAN Priority Tag (VPT) of the packet is unchanged. It is possible to achieve the desired QoS in a network by simply changing the DSCP to Queue mapping, the queue schedule method, and bandwidth allocation.
  • Page 120: Dscp Remarking

    7-12 DSCP Remarking Use the Queues to DSCP page to remark DSCP value for egress traffic from each queue. Web Interface To configure the DSCP Remarking in the web interface: 1. Click Quality of Service and DSCP Remarking. 2. Select DSCP. 3.
  • Page 121: Chapter 8 Spanning Tree

    Chapter 8 Spanning tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 122 Figure 8-1: The Spanning Tree state Parameter description: Multiple Spanning Tree Protocol :  You can select enable spanning tree protocol or not. Force Version :  The STP protocol version setting. Valid values are STP, RSTP and MSTP. Buttons Apply : ...
  • Page 123: Region Config

    8-2 Region Config The section describes to configure the basic identification of a MSTP bridge. Bridges participating in a common MST region must have the same Region Name and Revision Level. Web Interface To configure the Region Config in the web interface: Click Spanning Tree and Region Config.
  • Page 124: Instance View

    8-3 Instance View The section providing an MST instance table which include information(vlan membership of a MSTI ) of all spanning instances provisioned in the particular MST region which the bridge belongs to. Through this table, additional MSTP configuration data can be applied and MSTP status can be retrieved.
  • Page 125 Port Config :  To provision spanning tree performance parameters per instance per port. Instance Status :  To show the status report of a particular spanning tree instance. Port Status :  To show the status report of all ports regarding a specific spanning tree instance. Please refer to the following introduction: Add Vlan : ...
  • Page 126 Instance Config to Instance 0 :  Figure 8-3: Instance Config to Instance 0 Parameter description: Priority :  The priority parameter used in the CIST(Common and Internal Spanning Tree) connection. 0 / 4096 / 8192 / 12288 / 16384 / 20480 / 24576 / 28672 / 32768 / 36864 / 40960 / 45056 / 49152 / 53248 / 57344 / 61440 MAX.
  • Page 127 Port Config to Instance 0 :  Figure 8-3: Port Config to Instance 0 Parameter description: Port :  The logical port for the settings contained in the same row. Path Cost :  1 – 200,000,000 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI.
  • Page 128 topology changes to other Ports. This parameter is “No” by default. If set it can cause temporary loss of connectivity after changes in a spanning trees active topology as a result of persistent incorrectly learned station location information. It is set by a network administrator to prevent bridges external to a core region of the network, causing address flushing in that region, possibly because those bridges are not under the full control of the administrator.
  • Page 129 Spanning tree priority value for a specific tree instance(CIST or MSTI) Bridge Mac Address :  The Mac Address of the bridge itself. CIST ROOT PRIORITY :  Spanning tree priority value of the CIST root bridge CIST ROOT MAC : ...
  • Page 130 Port Status to Instance 0 :  Figure 8-3: Port Status to Instance 0 Parameter description: Port No:  The port number to which the configuration applies. Status:  The forwarding status. Same definition as of the RSTP specification Possible values are “FORWARDING”...
  • Page 131: Chapter 9 Mac Address Tables

    Chapter 9 MAC Address Tables 9-1 Configuration Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame).
  • Page 132 Figure 9-1: The MAC Address Table Configuration Parameter description: Aging Configuration : By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Configure aging time by entering a value here in seconds; for example, Age time seconds. The allowed range is 10 to 1000000 seconds.
  • Page 133 Adding a New Static Entry :  Click to add a new entry to the static MAC table. Specify the VLAN ID, MAC address, and port members for the new entry. Click "Apply". Apply :  Click to save changes. Reset : ...
  • Page 134: Information

    9-2 Information Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Web Interface To Display MAC Address Table in the web interface: 1.
  • Page 135 Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page. Clear :  Click to clear the page. Next :  Updates the mac address entries, turn to the next page. Previous : ...
  • Page 136: Chapter 10 Multicast

    Chapter 10 Multicast 10-1 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping cannot tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
  • Page 137 Figure 10-1.1: The IGMP Snooping Configuration Parameter description: Global Configuration Snooping Enabled :  Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled :  Enable unregistered IPMCv4 traffic flooding. Unregistered IPMCv4 traffic is so-called unknown multicast. After selected, the unregistered multicast stream will be forwarded like normal packets. Once you un-selected it, such stream will be discarded IGMP SSM Range : ...
  • Page 138 You can select profile when you edit in Multicast Filtering Profile. Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 139: 10-1.2 Vlan Configuration

    10-1.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For Each setting page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table.
  • Page 140 Enable to join IGMP Querier election in the VLAN. Disable to act as an IGMP Non-Querier. Compatibility :  Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network. The allowed selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2, Forced IGMPv3, default compatibility value is IGMP-Auto.
  • Page 141: 10-1.3 Status

    10-1.3 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Section provides you to let switch to display the IGMP Snooping detail status. Web Interface To display the IGMP Snooping status in the web interface: 1.
  • Page 142 The number of Received V1 Reports. V2 Reports Received :  The number of Received V2 Reports. V3 Reports Received :  The number of Received V3 Reports. V2 Leaves Received :  The number of Received V2 Leaves. Router Port Display which ports act as router ports.
  • Page 143: 10-1.4 Group Information

    10-1.4 Group Information After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Information. Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. This will use the last entry of the currently displayed table as a basis for the next lookup.
  • Page 144 Port Members :  Ports under this group. Buttons Figure 10-1.4: The IGMP Snooping Groups Information buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Next : ...
  • Page 145: 10-1.5 Igmp Sfm Information

    10-1.5 IGMP SFM Information Entries in the IGMP SFM Information Table are shown on this page. The IGMP SFM (Source- Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
  • Page 146 Mode :  Indicates the filtering mode maintained per (VLAN ID, port number, Group Address) basis. It can be either Include or Exclude. Source Address :  IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128.
  • Page 147: Mld Snooping

    10-2 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snooping—it just provides multicast traffic, and MLD doesn’t interact with it. (Note, however, that in an application like desktop conferencing a network node may act as both a source and an MLD host;...
  • Page 148 previously saved values Figure 10-2.1: The MLD Snooping Basic Configuration Parameter description : Global Configuration Snooping Enabled :  Enable the Global MLD Snooping. Unregistered IPMCv6 Flooding enabled :  Enable unregistered IPMCv6 traffic flooding. The flooding control takes effect only when MLD Snooping is enabled. When MLD Snooping is disabled, unregistered IPMCv6 traffic flooding is always active in spite of this setting.
  • Page 149 Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 150: 10-2.2 Vlan Configuration

    10-2.2 VLAN Configuration When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the switch receives multicast traffic destined for a given multicast address, it forwards that traffic only to ports on the VLAN that have MLD hosts for that address. It drops that traffic for ports on the VLAN that have no MLD hosts The will use the last entry of the currently displayed entry as a basis for the next lookup.
  • Page 151 The allowed range is 1 to 31744 seconds; default query interval is 125 seconds. QRI(0.1sec) :  Query Response Interval. The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries. The allowed range is 0 to 31744 in tenths of seconds;...
  • Page 152: 10-2.3 Status

    10-2.3 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status and detail information. It will help you to find out the detail information of MLD Snooping status. Web Interface To display the MLD Snooping Status in the web interface: 1.
  • Page 153 V1 Leaves Received :  The number of Received V1 Leaves. Router Port  Display which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier. Static denotes the specific port is configured to be a router port.
  • Page 154: 10-2.4 Groups Information

    10-2.4 Groups Information The section describes user could get the MLD Snooping Groups Information. The "Search" input fields allow the user to select the starting point in the MLD Group Table Web Interface To display the MLD Snooping Group information in the web interface: 1.
  • Page 155 Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately.
  • Page 156: 10-2.5 Mld Sfm Information

    10-2.5 MLD SFM Information Entries in the MLD SFM Information Table are shown on this page. The MLD SFM (Source- Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
  • Page 157 IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128. Type :  Indicates the Type. It can be either Allow or Deny. Show entries :  You can choose how many items you want to show off. Buttons Figure 10-2.5: The MLD SFM Information buttons Auto-refresh :...
  • Page 158: Multicast Filtering Profile

    10-3 Multicast Filtering Profile This page provides Multicast Filtering Profile related configurations. 10-3.1 Filtering Profile Table The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each. Web Interface To configure the IPMC Profile Configuration in the web interface: Figure 10-3.1: The IPMC Profile Configuration...
  • Page 159 Parameter description: Global Profile Mode :  Enable/Disable the Global IPMC Profile. System starts to do filtering based on profile settings only when the global profile mode is enabled. Profile Name :  The name used for indexing the profile table. Each entry has the unique name which is composed of at maximum 16 alphabetic and numeric characters.
  • Page 160 Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save". Delete :  Check to delete the entry. The designated entry will be deleted during the next save. Apply :  Click to save changes. Reset : ...
  • Page 161: 10-3.2 Filtering Address Entry

    10-3.2 Filtering Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile. It is allowed to create at maximum 128 address entries in the system. Web Interface To configure the IPMC Profile Address Configuration in the web interface: Figure 10-3.2: The IPMC Profile Address Configuration...
  • Page 163: Chapter 11 Mvr

    Chapter 11 The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a television with a set-top box can receive the multicast stream. Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.
  • Page 164 Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full. MVR VID :  Specify the Multicast VLAN ID. Be Caution: MVR source ports are not recommended to be overlapped with management VLAN ports.
  • Page 165 Subscribers cannot be directly connected to source ports. Receiver: Configure a port as a receiver port if it is a subscriber port and should only receive multicast data. It does not receive data unless it becomes a member of the multicast group by issuing IGMP/MLD messages.
  • Page 166: 11-3.2 Status

    11-3.2 Status The section describes the switch will display the MVR detail Statistics after you had configured MVR on the switch. It provides the detail MVR Statistics Information Web Interface To display the MVR Statistics Information in the web interface: 1.
  • Page 167: 11-3.3 Mvr Groups Information

    11-3.3 MVR Groups Information The section describes user could display the MVR Groups detail information on the switch. Entries in the MVR Group Table are shown on this page. The MVR Group Table is sorted first by VLAN ID, and then by group Web Interface To display the MVR Groups Information in the web interface: 1.
  • Page 168 Group ID of the group displayed. Port Members :  Ports under this group. Buttons Figure 11-3.3: The MVR Groups Information buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh : ...
  • Page 169: 11-3.4 Mvr Sfm Information

    11-3.4 MVR SFM Information The MVR SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source- Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry. Web Interface To display the MVR SFM Information in the web interface: 1.
  • Page 170 Port :  Switch port number. Mode :  Indicates the filtering mode maintained per (VLAN ID, port number, Group Address) basis. It can be either Include or Exclude. Source Address :  IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128.
  • Page 171: Chapter 12 Dhcp

    Chapter 12 DHCP The section describes to configure and display the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from adding their own DHCP servers to the network. 12-1 Snooping 12-1.1 Configuration DHCP Snooping is used to block intruder on the untrusted ports of the switch device when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server.
  • Page 172 packets from trusted ports. off: Disable DHCP snooping mode operation. Port Mode Configuration  Indicates the DHCP snooping port mode. Possible port modes are: Trusted: Configures the port as trusted source of the DHCP messages. Trusted port can forward DHCP packets normally. Untrusted: Configures the port as untrusted source of the DHCP messages.
  • Page 173: 12-1.2 Snooping Table

    12-1.2 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is enabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses. Entries in the Dynamic DHCP snooping Table are shown on this page.
  • Page 174 Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Next :  Updates the system log entries, turn to the next page. Previous :  Updates the system log entries, turn to the previous page.
  • Page 175: 12-1.3 Detailed Statistics

    12-1.3 Detailed Statistics This page provides statistics for DHCP snooping. Notice that the normal forward per-port TX statistics isn't increased if the incoming DHCP packet is done by L3 forwarding mechanism. And clear the statistics on specific port may not take effect on global statistics since it gathers the different layer overview.
  • Page 176 Rx and Tx Inform :  The number of inform (option 53 with value 8) packets received and transmitted. Rx and Tx Lease Query :  The number of lease query (option 53 with value 10) packets received and transmitted. Rx and Tx Lease Unassigned : ...
  • Page 177: Relay

    12-2 Relay 12-2.1 Configuration A DHCP relay agent is used to forward and to transfer DHCP messages between the clients and the server when they are not in the same subnet domain. It stores the incoming interface IP address in the GIADDR field of the DHCP packet.
  • Page 178 "00030108" means the DHCP message receive form VLAN ID 3, switch ID 1, port No 8. And the option 82 remote ID value is equal the switch MAC address. Possible modes are: Enabled: Enable DHCP relay information mode operation. When DHCP relay information mode operation is enabled, the agent inserts specific information (option 82) into a DHCP message when forwarding to DHCP server and removes it from a DHCP message when transferring to DHCP client.
  • Page 179: 12-2.2 Statistics

    12-2.2 Statistics This page provides statistics for DHCP relay. Web Interface To monitor a DHCP Relay statistics in the web interface: Click DHCP, Relay and Relay Statistics. To display DHCP relay statistics. Figure 12-2.2: The DHCP relay statistics Parameter description: Server Statistics Transmit to Server : ...
  • Page 180 The number of received packets with relay agent information option. Replace Agent Option :  The number of packets which were replaced with relay agent information option. Keep Agent Option :  The number of packets whose relay agent information was retained. Drop Agent Option : ...
  • Page 181: Server

    12-3 Server This page configures mode to enable/disable DHCP server per system and per VLAN. And configures Start IP and End IP addresses. DHCP server will allocate these IP addresses to DHCP client. And deliver configuration parameters to DHCP client. Web Interface To configure DHCP server Configuration in the web interface: Click DHCP and Server.
  • Page 182 DNS Server :  Specify DNS server. Buttons Delete :  Check to delete the entry. It will be deleted during the next save. Add Interface :  Click to add a new DHCP server. Apply :  Click to save changes. Reset : ...
  • Page 183: Chapter 13 Security

    Chapter 13 Security This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. 13-1 Management 13-1.1 Account This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser Web Interface To configure User in the web interface:...
  • Page 184 ASCII characters from 32 to 126. Password (again) :  To type the password again. You must type the same password again in the field. Privilege Level :  The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e.
  • Page 185: 13-1.2 Privilege Levels

    13-1.2 Privilege Levels This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation, Diagnostics, EEE, GARP, GVRP,IP, IPMC Snooping LACP LLDP LLDP MED MAC Table MRP MVR MVRP Maintenance Mirroring POE Ports Private VLANs QoS SMTP SNMP Security Spanning Tree System Trap Event VCL VLANs Voice VLAN Privilege Levels from 1 to 15 .
  • Page 186 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 187: 13-1.3 Auth Method

    13-1.3 Auth Method This page shows how to configure a user with auth method when he logs into the switch via one of the management client interfaces. Web Interface To configure an Auth Method Configuration in the web interface: Click Security, Management and Auth Method. Specify the Client (console, telent, ssh, web) which you want to monitor.
  • Page 188 Authentication Method can be set to one of the following values: none : authentication is disabled and login is not possible.  local : use the local user database on the switch for authentication.  radius : use a remote RADIUS server for authentication. ...
  • Page 189 that should be authorized. Valid entries are 0 through 15. Exec :  Runs accounting to determine if the user is allowed to run an EXEC shell. This facility might return user profile information such as autocommand information. Buttons Apply : ...
  • Page 190: 13-1.4 Access Management

    13-1.4 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELNET/SSH. You can manage the Switch over an Ethernet LAN, or over the Internet. Web Interface To configure an Access Management Configuration in the web interface: Click Security, Management and Access Management.
  • Page 191 SNMP :  Indicates that the host can access the switch from SNMP interface if the host IP address matches the IP address range provided in the entry. TELNET/SSH :  Indicates that the host can access the switch from TELNET/SSH interface if the host IP address matches the IP address range provided in the entry.
  • Page 192: Snmp

    13-2 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
  • Page 193 Write Community :  Indicates the community write access string to permit access to SNMP agent. The allowed string length is 1 to 31, and the allowed content is the ASCII characters from 33 to 126. The field is applicable only when SNMP version is SNMPv1 or SNMPv2c. If SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table.
  • Page 194: 13-2.2 Snmpv3

    13-2.2 SNMPv3 13-2.2.1 Communities The function is used to configure SNMPv3 communities. The Community is unique. To create a new community account, please check <Add new community> button, and enter the account information then check <Save>. Max Group Number: 6. Web Interface To configure the configure SNMP Communities in the web interface: Click Security, SNMP, SNMPv3 and Communities.
  • Page 195 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 196 13-2.2.2 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check <Add new user> button, and enter the user information then check <Apply>. Max Group Number: 6. Web Interface To configure SNMP Users in the web interface: Click Security, SNMP, SNMPv3 and Users.
  • Page 197 A string identifying the authentication password phrase. For MD5 authentication protocol, the allowed string length is 8 to 39. For SHA authentication protocol, the allowed string length is 8 to 39. The allowed content is ASCII characters from 33 to 126. Privacy Protocol : ...
  • Page 198 13-2.2.3 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group account, please check <Add new group> button, and enter the group information then check <Save>. Max Group Number:12. Web Interface To configure SNMP Groups in the web interface: 1.
  • Page 199 Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 200 13-2.2.4 Views The function is used to configure SNMPv3 view. The Entry index keys are OID Subtree and View Name. To create a new view account, please check <Add new view> button, and enter the view information then click <Apply>. Max Group Number: 12. Configure SNMPv3 view table on this page.
  • Page 201 Add New Entry :  Click to add new entry. Specify the name and configure the new entry. Click "Save". Delete :  Check to delete the entry. It will be deleted during the next save. Apply :  Click to save changes. Reset : ...
  • Page 202 13-2.2.5 Access The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create a new access account, please check <Add new access> button, and enter the access information then check <Apply>. Max Group Number : Web Interface To display the configure SNMP Access in the web interface: Click Security, SNMP, SNMPv3 and Accesses.
  • Page 203 Read View Name :  The name of the MIB view defining the MIB objects for which this request may request the current values. The allowed string length is 1 to 31, and the allowed content is ASCII characters from 33 to 126. Write View Name : ...
  • Page 204: 13-2.3 Trap Event Severity

    13-2.3 Trap Event Severity This page displays current trap event severity configurations. Trap event severity can also be configured here. Web Interface To display the configure Trap Event Severity in the web interface: Click Security, SNMP and Trap Event Severity. Scroll to select the Group name and Severity Level Click the Apply to save the setting If you want to cancel the setting then you need to click the Reset button.
  • Page 205 Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 206: Rmon Configuration

    13-3 RMON Configuration An RMON implementation typically operates in a client/server model. Monitoring devices contain RMON software agents that collect information and analyze packets. These probes act as servers and the Network Management applications that communicate with them act as clients.
  • Page 207 Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 208 13-3.1.2 Status This section provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table.
  • Page 209 FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Under-size : ...
  • Page 210 Click to refresh the page immediately. Next :  Updates the system log entries, turn to the next page. Previous :  Updates the system log entries, turn to the previous page.
  • Page 211: 13-3.2 History

    13-3.2 History 13-3.2.1 Configuration Configure RMON History table on this page. The entry index key is ID. Web Interface To configure the RMON History Configuration in the web interface: Click Security, RMON, History and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.
  • Page 212 Check to delete the entry. It will be deleted during the next save. Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 213 13-3.2.2 Status This section provides an overview of RMON History entries. Each page shows up to 99 entries from the History table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the History table.
  • Page 214 The total number of good packets received that were directed to a multicast address. CRC Errors :  The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
  • Page 215: 13-3.3 Alarm

    13-3.3 Alarm 13-3.3.1 Configuration Configure RMON Alarm table on this page. The entry index key is ID. Web Interface To configure the RMON Alarm Configuration in the web interface: Click Security, RMON, Alarm and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.
  • Page 216 The number of inbound packets that are discarded even the packets are normal. InErrors: The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. InUnknownProtos: the number of the inbound packets that were discarded because of the unknown or un- support protocol.
  • Page 217 Delete :  Check to delete the entry. It will be deleted during the next save. Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 218 13-3.3.2 Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table. The first displayed will be the one with the lowest ID found in the Alarm table Web Interface To display a RMON Alarm Status in the web interface:...
  • Page 219 Falling Index :  Falling event index. Search :  You can search for the information that you want to see. Show entries :  You can choose how many items you want to show off. Buttons Figure 13-3.3.2: RMON Alarm Status buttons Auto-refresh : ...
  • Page 220: 13-3.4 Event

    13-3.4 Event 13-3.4.1 Configuration Configure RMON Event table on this page. The entry index key is ID. Web Interface To configure the RMON Event Configuration in the web interface: Click Security, RMON, Event and Configuration. Click Add New Entry. Specify the ID parameters. Click Apply.
  • Page 221 Buttons Delete :  Check to delete the entry. It will be deleted during the next save. Add New Entry :  Click to add a new entry. Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 222 13-3.4.2 Status This page provides an overview of RMON Event table entries. Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table.
  • Page 223 Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately. Next :  Updates the system log entries, turn to the next page. Previous :  Updates the system log entries, turn to the previous page.
  • Page 224: Ieee 802.1X

    13-3 IEEE 802.1X 13-3.1 Configuration The section describes to configure the 802.1X parameters of the switch. The 802.1X can be employed to connect users to a variety of resources including Internet access, conference calls, printing documents on shared printers, or by simply logging on to the Internet. Web Interface To configure the IEEE 802.1X in the web interface: Click Security, IEEE 802.1X and Configuration.
  • Page 225 Reauthentication Enabled :  If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Reauthentication Period. Reauthentication for 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached.
  • Page 226 Force Authorized :  In this mode, the switch will send one EAPOL Success frame when the port link comes up, and any client on the port will be allowed network access without authentication. Force Unauthorized :  In this mode, the switch will send one EAPOL Failure frame when the port link comes up, and any client on the port will be disallowed network access.
  • Page 227 When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If the number of transmissions of such frames exceeds Max. Reauth. Count and no EAPOL frames have been received in the meanwhile, the switch considers entering the Guest VLAN.
  • Page 228: 13-3.2 Status

    13-3.2 Status The section describes to show the each port 802.1X status information of the switch. The status includes Admin State, Port State, Last Source, Last ID and Port VLAN ID. Web Interface To displays 802.1X Status in the web interface: Click Security, IEEE 802.1X and Status.
  • Page 229 overridden by 802.1X. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID. Read more about RADIUS-assigned VLANs here. If the port is moved to the Guest VLAN, "(Guest)" is appended to the VLAN ID. Read more about Guest VLANs here.
  • Page 230: Ip Source Guard

    13-4 IP Source Guard The section describes to configure the IP Source Guard detail parameters of the switch. You could use the IP Source Guard configure to enable or disable with the Port of the switch. 13-4.1 Configuration This section describes how to configure IP Source Guard setting including: Mode (Enabled and Disabled) Maximum Dynamic Clients (0, 1, 2, Unlimited) Web Interface...
  • Page 231 client is equal to 0, it means only allow the IP packets forwarding that are matched in static entries on the specific port. Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 232: 13-4.2 Static Table

    13-4.2 Static Table The section describes to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Source Guard Table configure to manage the entries. Web Interface To configure a Static IP Source Guard Table Configuration in the web interface: Click Security, IP Source Guard and Static Table.
  • Page 233: 13-4.3 Dynamic Table

    13-4.3 Dynamic Table Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by IP address, and then by MAC address. Web Interface To configure a Dynamic IP Source Guard Table Configuration in the web interface: 1.
  • Page 234 Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every seconds. Refresh :  Click to refresh the page immediately.
  • Page 235: Arp Inspection

    13-5 ARP Inspection The section describes to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configure to manage the ARP table. 13-5.1 Configuration This section describes how to configure ARP Inspection setting including: Mode (on and off) Port (Enabled and Disabled) Web Interface To configure an ARP Inspection Configuration in the web interface:...
  • Page 236 Enabled: Enable check VLAN operation. Disabled: Disable check VLAN operation. Only the Global Mode and Port Mode on a given port are enabled, and the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. There are four log types and possible types are: None: Log nothing.
  • Page 237: 13-5.2 Vlan Configuration

    13-5.2 VLAN Configuration Specify ARP Inspection is enabled on which VLANs Web Interface To configure a VLAN Mode Configuration in the web interface: Click Security, ARP Inspection and VLAN Configuration. 2. Click “Add new entry”. 3. Specify the VLAN ID, Log Type 4.
  • Page 238: 13-5.3 Static Table

    13-5.3 Static Table The section describes to configure the Static ARP Inspection Table parameters of the switch. You could use the Static ARP Inspection Table configure to manage the ARP entries. Web Interface To configure a Static ARP Inspection Table Configuration in the web interface: Click Security, ARP Inspection and Static Table.
  • Page 239 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 240: 13-5.4 Dynamic Table

    13-5.4 Dynamic Table Entries in the Dynamic ARP Inspection Table are shown on this page. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address. Navigating the ARP Inspection Table Each page shows up to many entries from the Dynamic ARP Inspection table, default being 10, selected through the "entries per page"...
  • Page 241 Figure 13-5.4: The Dynamic ARP Inspection Table buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every seconds. Refresh :  Click to refresh the page immediately. Next :  Updates the system log entries, turn to the next page. Previous : ...
  • Page 242: Port Security

    13-6 Port Security 13-6.1 Configuration This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. Web Interface To configure a Port Security Configuration in the web interface: Click Security, Port Security and Configuration.
  • Page 243 the underlying port security features without enabling Limit Control on a given port. Limit :  The maximum number of MAC addresses that can be secured on this port. This number cannot exceed 1024. If the limit is exceeded, the corresponding action is taken. The switch is "born"...
  • Page 244 Click to undo any changes made locally and revert to previously saved values.
  • Page 245: 13-6.2 Status

    13-6.2 Status This section shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
  • Page 246 The columns indicates the number of currently learned MAC addresses (forwarding as well as blocked) and the number of MAC addresses that can be learned on the port, respectively. If no user modules are enabled on the port, the Current column will show a dash (-). Buttons Figure 13-6.2: The Port Security Status buttons Auto-refresh :...
  • Page 247: Radius

    13-7 RADIUS 13-7.1 Configuration Web Interface To configure a RADIUS in the web interface: Click Security, RADIUS and Configuration. Set Timeout, Retransmit, Deadtime, Key, NAS-IP-Address, NAS IPv6-Address,NAS- Identifier. Click “Add New Entry”. Set Hostname, Auth Port, Acct Port, Timeout, Retransmit, Key. Click the Apply to save the setting.
  • Page 248 Deadtime, which can be set to a number between 0 to 1440 minutes, is the period during which the switch will not send new requests to a server that has failed to respond to a previous request. This will stop the switch from continually trying to contact a server that it has already determined as dead.
  • Page 249 Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 250: 13-7.2 Status

    13-7.2 Status This section shows you an overview/detail of the RADIUS Authentication and Accounting servers’ status to ensure the function is workable. Web Interface To display a RADIUS Status in the web interface: Click Security, RADIUS and Status. Select server to display the detail statistics for a particular RADIUS Figure 13-7.2: The RADIUS Server Status Overview Parameter description: RADIUS Authentication Server Status...
  • Page 251 Access attempts were made to this server, but it did not reply within the configured timeout. The server has temporarily been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses.
  • Page 252 Figure 13-7.2: The RADIUS Statistics Server Parameter description: server :  You can select which server that you want to display RADIUS. RADIUS Authentication Statistics for Server #1 The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB. Use the server select box to switch between the backend servers to show details for.
  • Page 253 The number of RADIUS Access-Request packets destined for the server that have not yet timed out or received a response. This variable is incremented when an Access-Request is sent and decremented due to receipt of an Access-Accept, Access-Reject, Access-Challenge, timeout, or retransmission. Timeouts : ...
  • Page 254 Packets Dropped :  The number of RADIUS packets that were received from the server on the accounting port and dropped for some other reason. Requests :  The number of RADIUS packets sent to the server. This does not include retransmissions Retransmissions : ...
  • Page 255: Tacacs

    13-8 TACACS+ 13-8.1 Configuration Web Interface To configure the TACACS+ servers in the web interface: Click Security and TACACS+. 2. Click “Add New Entry”. 3. Specify the Timeout, Deadtime, Key. 4. Specify the Hostname, Port, Timeout and Key in the server. 5.
  • Page 256 Deadtime :  Deadtime, which can be set to a number between 0 to 1440 minutes, is the period during which the switch will not send new requests to a server that has failed to respond to a previous request. This will stop the switch from continually trying to contact a server that it has already determined as dead.
  • Page 257: Chapter 14 Access Control

    Chapter 14 Access Control 14-1 Access Control List The section describes how to configure Access Control List rule. An Access Control List (ACL) is a sequential list of permit or deny conditions that apply to IP addresses, MAC addresses, or other more specific criteria.
  • Page 258 Figure 14-1: The Access Control List Configuration & ACE Configuration Parameter description: ACE :  The ACE number for the Access Control List. Ingress Port :  Indicates the ingress port of the ACE. Frame Type :  Indicates the frame type of the ACE. Possible values are: Any: The ACE will match any frame type.
  • Page 259 An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected. A frame that hits this ACE matches the configuration that is defined here.
  • Page 260 Figure 14-1: The ACE Configuration (Select Frame Type to Ethernet Type) MAC Parameters SMAC Filter :  Specify the destination MAC filter for this ACE. Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) Specific: If you want to filter a specific destination MAC address with this ACE, choose this value.
  • Page 261 Specify the S-VLAN ID filter for this ACE. Any: No S-VLAN ID filter is specified. (S-VLAN ID filter status is "don't-care".) Specific: If you want to filter a specific S-VLAN ID with this ACE, choose this value. A field for entering a S-VLAN ID number appears.
  • Page 262 Click to undo any changes made locally and revert to previously saved values. Auto-refresh :  To evoke the auto-refresh to refresh the information automatically. Refresh, clear, Remove All :  You can click them for refresh the ACL configuration or clear them by manual. Others remove all to clean up all ACL configurations on the table.
  • Page 263: Chapter 15 Event Notification

    Chapter 15 Event Notification 15-1 SNMP Trap Configure Trap on this page. Web Interface To configure SNMP Trap Configuration in the web interface: 1. Click Event Notification and SNMP Trap. 2. Click any entry then you can create new SNMP Trap on the switch. 3.
  • Page 264 Server IP :  This is the IP of the trap host. Community Name :  Indicates the community access string when sending SNMP trap packet. The allowed string length is 0 to 255, and the allowed content is ASCII characters from 33 to 126. Severity Level : ...
  • Page 265: Chapter 16 Diagnostics

    Chapter 16 Diagnostics This chapter provides a set of basic system diagnosis. These includes Ping, Traceroute, Cable Diagnostics and port mirror. 16-1 Ping This section allows you to issue ICMP Echo packets to troubleshoot Ipv4/6 connectivity issues. Web Interface To configure a PING in the web interface: Click Diagnostics and Ping.
  • Page 266 The payload size of the ICMP packet. Values range from 1 bytes to 1452 bytes. Ping Count :  The count of the ICMP packet. Values range from 1 time to 60 times. Start:  Click the “Start” button to start to ping the target IP Address.
  • Page 267: Cable Diagnostics

    16-2 Cable Diagnostics This section shows how to run Cable Diagnostics for copper ports. Web Interface To configure a Cable Diagnostics Configuration in the web interface: 1. Click Diagnostics and Cable Diagnostics. 2. Specify Port which want to check. 3. Click Start. Figure 16-2: The Cable Diagnostics Parameter description: Port :...
  • Page 268: Traceroute

    16-3 Traceroute This page allows you to issue ICMP, TCP, or UDP packets to diagnose network connectivity issues. Web Interface To start a Traceroute in the web interface: 1. Click Diagnostics and Traceroute. 2. Specify IP Address, IP Version, IP Protocol, traceroute Size. 3.
  • Page 269: Mirror

    16-4 Mirror You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Mirror Configuration is to monitor the traffic of the network.
  • Page 270 The following table is used for Rx and Tx enabling. Port :  The logical port for the settings contained in the same row. Mode :  Select mirror mode. Rx only : Frames received on this port are mirrored on the mirror port. Frames transmitted are not mirrored.
  • Page 271: Chapter 17 Maintenance

    Chapter 17 Maintenance This chapter describes the entire Maintenance configuration tasks including Save/Backup/Restore/Activate/Delete Restart Device, Factory Defaults, Firmware upgrade. 17-1 Configuration The switch stores its configuration in a number of files in text format. The files are either virtual (RAM-based) or stored in flash on the switch. There are three system files: running-config: A virtual file that represents the currently active configuration on the ...
  • Page 272 Parameter description: Button Save Configuration :  Click to save configuration, the running configuration will be written to flash memory for system boot up to load this startup configuration file.
  • Page 273: 17-1.2 Backup

    17-1.2 Backup This section describes how to export the Switch Configuration for maintenance needs. Any current configuration files will be exported as text format. The configuration files on the switch can be backed up and saved on the station running the web browser.
  • Page 274: 17-1.3 Restore

    17-1.3 Restore It is possible to import a file from the web browser to all the files on the switch, except default-config, which is read-only. Select the source file to restore, and select the destination file on the target. If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: Replace mode: The current configuration is fully replaced with the configuration specified ...
  • Page 275: 17-1.4 Activate Config

    17-1.4 Activate config It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click. This will initiate the process of completely replacing the existing configuration with that of the selected file.
  • Page 276: 17-1.5 Delete Config

    17-1.5 Delete config It is possible to delete any of the writable files stored in flash, including startup-config. If this is done and the switch is rebooted without a prior save operation, this effectively resets the switch to default configuration. Web Interface To delete configuration in the web interface: 1.
  • Page 277: Restart Device

    17-2 Restart Device This section describes how to restart the device for any maintenance needs. Any configuration files or scripts that you saved in the switch should still be available afterwards. Web Interface To Restart Device in the web interface: 1.
  • Page 278: Factory Defaults

    17-3 Factory Defaults This section describes how to restore the Switch configuration to Factory Defaults. Web Interface To restore a Factory Defaults in the web interface: 1. Click Maintenance and Factory Defaults. 2. You can choose if you want to keep ip configuration or not. 3.
  • Page 279: Firmware

    17-4 Firmware This section describes how to upgrade (or update) Firmware. 17-4.1 Firmware Upgrade This page facilitates an update of the firmware controlling the switch.. Web Interface To update firmware of the device in the web interface: 1. Click Maintenance, Firmware and Firmware Upgrade. 2.
  • Page 280: 17-4.2 Firmware Selection

    17-4.2 Firmware Selection This page provides information about the active and alternate (backup) firmware images in the device, and allows you to activate the alternate image. The web page displays two tables with information about the active and alternate firmware images.

Table of Contents