Vivotek VivoCam AW-GEV-104B-130 User Manual
Vivotek VivoCam AW-GEV-104B-130 User Manual

Vivotek VivoCam AW-GEV-104B-130 User Manual

Vivocam web smart managed poe switch aw-gev series
Table of Contents

Advertisement

VivoCam Web Smart Managed PoE Switch
Copyright VIVOTEK Inc. 2017 | All rights reserved. All brand and product names are trademarks or registered
trademarks of their respective owners.
AW-GEV-104B-130
AW-GEV-184B-250
AW-GEV-264B-370
i

User Manual

Rev. 2.0
For firmware version 0003

Advertisement

Table of Contents
loading

Summary of Contents for Vivotek VivoCam AW-GEV-104B-130

  • Page 1: User Manual

    AW-GEV-104B-130 AW-GEV-184B-250 AW-GEV-264B-370 VivoCam Web Smart Managed PoE Switch User Manual Rev. 2.0 For firmware version 0003 Copyright VIVOTEK Inc. 2017 | All rights reserved. All brand and product names are trademarks or registered trademarks of their respective owners.
  • Page 2: About This Manual

    VIVOTEK. VIVOTEK assumes no responsibility for any inaccuracies that may be contained in this User Guide. VIVOTEK makes no commitment to update or keep current the information in this User Guide, and reserves the righter to make improvements to this User Guide and /or to the products described in this User Guide, at any time without notice.
  • Page 3: Table Of Contents

    Table of Contents ABOUT THIS MANUAL ..........................II Revision History ............................vii INTRODUCTION ............................1 CHAPTER 1 OPERATION OF WEB-BASED MANAGEMENT ............3 CHAPTER 2 SYSTEM ..........................7 2-1 S YSTEM NFORMATION ........................... 7 2-2 IP A DVANCE ..............................9 2-2.1 IP Configuration ..........................
  • Page 4 6-7 C S/802.1 APPING ..........................86 6-8 C S/802.1 EMARKING ..........................87 6-9 IP P RECEDENCE APPING ..........................88 6-10 IP P RECEDENCE EMARKING ........................89 6-11 DSCP M APPING ............................90 6-12 DSCP R EMARKING ............................ 91 CHAPTER 7 SPANNING TREE ......................
  • Page 5 GRAPHICAL MONITORING ............................OPOLOGY .............................. 157 LOOR ..............................165 ............................... 167 MANAGEMENT…………………………………………………………………………………………………………………………………………168 EVICE ..............................168 VVTK CAMERA & ENCODER……………………………………………………………………………………………………………………….169 CAMERA CONFIGURE………………………………………………………………………………………………………………………………..170 MAINTENANCE ............................171...
  • Page 6: Revision History

    Revision History Release Date Revision Initial Release 2016/08/25 FW0003 Release 2017/09/05 Hardware Reset / Mode Button The reset button is used to reboot the PoE switch or to restore the factory default settings. Sometimes resetting the system can return the PoE switch to normal operation. If the system problems remain after reset, restore the factory settings and try again.
  • Page 7: Introduction

    The AW-GEV series switches are the next generation web smart+ managed switch from VIVOTEK, is a portfolio of affordable managed switches that provides a reliable infrastructure for your business network. These switches deliver more intelligent features you need to improve the availability of your critical business applications, protect your sensitive information, and optimize your network bandwidth to deliver information and applications more effectively.
  • Page 8 Chapter 8 “MAC Address Tables”  Chapter 9 “Multicast”  Chapter 10 “Security”  Chapter 11 “Diagnostics”  Chapter 12 “Maintenance”  Chapter 13 "Surveillance" ...
  • Page 9: Chapter 1 Operation Of Web-Based Management

    DHCP client Subnet 255.255.255.0 Mask Default Gateway admin Username admin Password You can find the PoE switch using VIVOTEK’s IW2 utility. If network address conflicts occur, use this utility to locate the PoE switch. Publication date: Jul., 2016 Revision A1...
  • Page 10 If you double-click on the entry found on the IW2 utility, an IE console will be opened. If you prefer using Firefox or Google Chrome, you can manually enter the IP address in your browser’s URL field. If you enabled the onboard DHCP server on the PoE switch, you can browse it.
  • Page 11 A startup wizard page will prompt the first time you access the switch. The first step is to configure a password for access security. If necessary, configure a static IP for the switch. Click Next to proceed.
  • Page 12 You can then configuration the data and time setting for the switch either by assigning a network time server or manually enter the values using the calendar. You should enter additional information such as system contact and system location. When done, click the Apply button. The default username is “admin”...
  • Page 13 Figure 1: The login page...
  • Page 14: Chapter 2 System

    Chapter 2 System This chapter describes the entire basic configuration tasks which includes the System Information and any management parameters of the Switch (e.g. Time, Account, IP, Syslog, and NTP.) System Information You can identify the system by configuring system name, location and the contact of the switch.
  • Page 15 The physical location of this node(e.g., telephone closet, 3rd floor). The allowed string length is 0 to 128, and the allowed content is the ASCII characters from 32 to 1. Contact :  The textual identification of the contact person for this managed node, together with information on how to contact this person.
  • Page 16: Ip Advance

    2-2 IP Address 2-2.1 IP Settings IPv4 DHCP Enable: Enables the DHCP client mode setting for listening to a DHCP server in the local network. IPv4 Address: The IPv4 address of the interface VLAN1. Subnet mask: The IPv4 network mask of the interface VLAN1. DNS Server: Select the source of DNS service.
  • Page 17 Figure 2-2.2: The IP configuration Parameter description: IP Configuration DNS Server :  This setting controls the DNS name resolution done by the switch. The following modes are supported: No DNS server  No DNS server will be used. Configured ...
  • Page 18 fallback mechanism, such that DHCP will keep retrying until a valid lease is obtained. Legal values are 0 to 4294967295 seconds. IPv4 DHCP Current Lease :  For DHCP interfaces with an active lease, this column show the current interface address, as provided by the DHCP server.
  • Page 19 Buttons Add Interface :  Click to add a new IP interface. A maximum of 8 interfaces is supported. Add Route :  Click to add a new IP route. A maximum of 8 routes is supported. Apply :  Click to save changes.
  • Page 20: 2-2.2 Ip Status

    2-2.2 IP Status This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour cache (ARP cache) status. Web Interface To display the log configuration in the web interface: Click System, IP Advance and IP Status.
  • Page 21 Parameter description: IP Interfaces Interface :  Show the name of the interface. Type :  Show the address type of the entry. This may be LINK or IPv4. Address :  Show the current address of the interface (of the given type). Status : ...
  • Page 22: System Time

    2-3 System Time The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour” and “Minute” within the valid value range indicated in each item. Web Interface To configure Time in the web interface: 1.
  • Page 23 Parameter description: Time Configuration Clock Source :  There are two modes for configuring how the Clock Source from. Select "Local Settings" : Clock Source from Local Time. Select "NTP Server" : Clock Source from NTP Server. System Date : ...
  • Page 24 Reset :  Click to undo any changes made locally and revert to previously saved values. Figure 4-4: The Configure NTP Server button Configure NTP Server :  Click to configure NTP server, When Clock Source select from NTP Server. Figure 4-4: The SNTP configuration NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT).
  • Page 25 Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 26: Log

    2-4 Log 2-4.1 Syslog Configuration The Syslog Configuration is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages.
  • Page 27 Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 28: 2-4.2 View Log

    2-4.2 View Log This section describes that display the system log information of the switch Web Interface To display the log configuration in the web interface: Click System, Log and View Log. Display the log information. Figure 2-4.2: The System Log Information Parameter description: ID : ...
  • Page 29 You can choose how many items you want to show off. Buttons Refresh :  Updates the system log entries, starting from the current entry ID. Clear Logs :  Clear all the system log entries. Next :  Updates the system log entries, turn to the next page. Previous : ...
  • Page 30: Lldp

    2-5 LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally wired Ethernet.
  • Page 31 Figure 2-5.1: The LLDP Configuration Parameter description: LLDP Parameters Tx Interval :  The switch periodically transmits LLDP frames to its neighbours for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds. Tx Hold : ...
  • Page 32 The CDP operation is restricted to decoding incoming CDP frames (The switch doesn't transmit CDP frames). CDP frames are only decoded if LLDP on the port is enabled. Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbors’ table are decoded.
  • Page 33: 2-5.2 Lldp-Med Configuration

    2-5.2 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED that provides the following facilities: Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv) settings) enabling plug and play networking. Device location discovery to allow creation of location databases and, in the case of Voice over Internet Protocol (VoIP), Enhanced 911 services.
  • Page 34 Figure 2-5.2: The LLDP-MED Configuration Parameter description : Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general. In addition, it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types (for example only advertise the voice network policy to permitted voice-capable devices), both in order to conserve the limited LLDPU space and to reduce security and system integrity issues...
  • Page 35 that can come with inappropriate knowledge of the network policy. With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction between the protocol and the application layers on top of the protocol, in order to achieve these related properties. Initially, a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU.
  • Page 36 Civic Address Location IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI). Country code :  The two-letter ISO 3166 country code in capital ASCII letters - Example: DK, DE or US. State :  National subdivisions (state, canton, region, province, prefecture). County : ...
  • Page 37 Floor - Example: 4. Room no. :  Room number - Example: 450F. Place type :  Place type - Example: Office. Postal community name :  Postal community name - Example: Leonia. P.O. Box :  Post office box (P.O. BOX) - Example: 12345. Additional code : ...
  • Page 38 Connectivity Device may advertise different sets of policies, based on the authenticated user identity or port configuration. It should be noted that LLDP-MED is not intended to run on links other than between Network Connectivity Devices and Endpoints, and therefore does not need to advertise the multitude of network policies that frequently run on an aggregated link interior to the LAN.
  • Page 39 Layer 2 priority fields are ignored and only the DSCP value has relevance. Tagged indicates that the device is using the IEEE 802.1Q tagged frame format, and that both the VLAN ID and the Layer 2 priority values are being used, as well as the DSCP value. The tagged format includes an additional field, known as the tag header.
  • Page 40: 2-5.3 Lldp Neighbour

    2-5.3 LLDP Neighbour This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. The columns hold the following information: Web Interface To show LLDP neighbours: 1.
  • Page 41 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). System Description ...
  • Page 42: 2-5.4 Lldp-Med Neighbour

    2-5.4 LLDP-MED Neighbour This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. This function applies to VoIP devices which support LLDP-MED. The columns hold the following information: Web Interface To show LLDP-MED neighbor: 1.
  • Page 43 2. IEEE 802.1 Bridge 3. IEEE 802.3 Repeater (included for historical reasons) 4. IEEE 802.11 Wireless Access Point 5. Any device that supports the IEEE 802.1AB and MED extensions defined by TIA-1057 and can relay IEEE 802 frames via any method. LLDP-MED Endpoint Device Definition : ...
  • Page 44 2. Network Policy 3. Location Identification 4. Extended Power via MDI - PSE 5. Extended Power via MDI - PD 6. Inventory 7. Reserved Application Type :  Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device.
  • Page 45 device is using priority tagged frames as defined by IEEE 802.1Q-2003, meaning that only the IEEE 802.1D priority level is significant and the default PVID of the ingress port is used instead. Priority :  Priority is the Layer 2 priority to be used for the specified application type. One of the eight priority levels (0 through 7).
  • Page 46: 2-5.5 Lldp Statistics

    2-5.5 LLDP Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to per port counters for the currently selected switch. Web Interface To show LLDP Statistics: 1. Click System ,LLDP and LLDP Statistics. 2.
  • Page 47 Shows the number of entries deleted due to Time-To-Live expiring. Local Counters The displayed table contains a row for each port. The columns hold the following information: Local Port :  The port on which LLDP frames are received or transmitted. Tx Frames : ...
  • Page 48: Upnp

    2-6 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components Web Interface To configure the UPnP Configuration in the web interface:...
  • Page 49 86400. Buttons Apply :  Click to save changes.  Reset : Click to undo any changes made locally and revert to previously saved values.
  • Page 50: Chapter 3 Port Management

    Chapter 3 Port Management The section describes to configure the Port detail parameters of the switch. Others you could using the Port configure to enable or disable the Port of the switch. Monitor the ports content or status in the function. 3-1 Port Configuration This page displays current port configurations.
  • Page 51 This is the logical port number for this row. Link :  The current link state is displayed graphically. Green indicates the link is up and red that it is down. Current Link Speed :  Provides the current link speed of the port. Configured Link Speed : ...
  • Page 52 Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 53: Port Statistics

    3-2 Port Statistics The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports. Web Interface To Display the Port Statistics Overview in the web interface: 1. Click Port Management and Port Statistics. 2.
  • Page 54 Refresh :  Click to refresh the page. Clear :  Clears the counters for all ports. If you want to see the detailed of port statistic then you need to click that port. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
  • Page 55 The number of received and transmitted (good and bad) bytes. Includes FCS, but excludes framing bits. Rx and Tx Unicast :  The number of received and transmitted (good and bad) unicast packets. Rx and Tx Multicast :  The number of received and transmitted (good and bad) multicast packets. Rx and Tx Broadcast : ...
  • Page 56 Figure 3-2: The Detailed Port Statistics buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page. Clear :  Clears the counters for the selected port.
  • Page 57: Sfp Port Info

    3-3 SFP Port Info The section describes that switch could display the SFP module detail information which you connect it to the switch. The information includes: Connector type, Fiber type, wavelength, bit rate and Vendor OUI etc. Web Interface To Display the SFP information in the web interface: 1.
  • Page 58 Display the OUI code which is assigned by IEEE. Vendor Name:  Display the company name of the module manufacturer. Vendor P/N:  Display the product name of the naming by module manufacturer. Vendor Rev (Revision):  Display the module revision. Vendor SN (Serial Number): ...
  • Page 59: Energy Efficient Ethernet

    3-4 Energy Efficient Ethernet EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. This page allows the user to inspect and configure the current EEE port settings. EEE is a power saving option that reduces the power usage when there is very low traffic utilization (or no traffic).
  • Page 60: Link Aggregation

    3-5 Link Aggregation 3-5.1 Port This section describes that Port setting/status is used to configure the trunk property of each and every port in the switch system. Web Interface To configure the trunk property of each and every port in the web interface: Click Port Management, Link Aggregation and port.
  • Page 61 Ports choosing the same trunking method other than “None” must be assigned a unique Group number (i.e. Group ID, valid value is from 1 to 5) in order to declare that they wish to aggregate with each other. LACP Role: ...
  • Page 62: 3-5.2 Aggregator View

    3-5.2 Aggregator View To display the current port trunking information from the aggregator point of view. Web Interface To see the LACP detail in the web interface: Click Port Management, Link Aggregation and Aggregator View. Click the LACP Detail. Figure 3-5.2: The Aggregator View Parameter description: Aggregator : ...
  • Page 63 Figure 3-5.2: The Lacp Detail Parameter description: Actor System Priority :  Show the System Priority part of the aggregation Actor. (1-65535) Mac Address :  The system ID of the aggregation Actor. Actor Port :  The actor's port number connected to this port. Actor Key : ...
  • Page 64: 3-5.3 Aggregation Hash Mode

    3-5.3 Aggregation Hash Mode Web Interface hash mode in the web interface: To configure the Aggregation Click Port Management, Link Aggregation and Aggregator Hash Mode. Click Hash Code Contributors to select the mode. Click the apply to save the setting. If you want to cancel the setting then you need to click the Reset button.
  • Page 65 Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 66: 3-5.4 Lacp System Priority

    3-5.4 LACP System Priority It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system. Each system supports LACP will be assigned a globally unique System Identifier for this purpose.
  • Page 67: Loop Protection

    3-6 Loop Protection 3-6.1 Configuration The loop Protection is used to detect the presence of traffic. When switch receives packet’s (looping detection frame) MAC address the same as oneself from port, show Loop Protection happens. The port will be locked when it received the looping Protection frames. If you want to resume the locked port, please find out the looping path and take off the looping path, then select the resume the locked port and click on “Resume”...
  • Page 68 The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action shuts down the port). Valid values are 0 to 604800 seconds (7 days). A value of zero will keep a port disabled (until next device restart). Port Configuration Port : ...
  • Page 69: 3-6.2 Status

    3-6.2 Status This section displays the loop protection port status the ports of the currently selected switch. Web Interface To display the Loop Protection status in the web interface: 1. Click Port Management, Loop Protection and Status. 2. If you want to auto-refresh the information then you need to evoke the “Auto refresh”. 3.
  • Page 70 Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh :  Click to refresh the page immediately.
  • Page 71: Chapter 4 Poe Management

    Chapter 4 PoE Management PoE is an acronym for Power over Ethernet. Power over Ethernet is used to transmit electrical power, to remote devices over standard Ethernet cable. It could for example be used for powering IP telephones, wireless LAN access points and other equipment, where it would be difficult or expensive to connect the equipment to main power supply.
  • Page 72 Port :  This is the logical port number for this row. PoE Mode :  The PoE Mode represents the PoE operating mode for the port. Enable or Disable PoE. Priority :  The Priority represents the ports priority. There are three levels of power priority named Low, High and Critical.
  • Page 73: Poe Status

    4-2 PoE Status This page allows the user to inspect the current status for all PoE ports. Web Interface To Display PoE Status in the web interface: Click PoE Management and PoE Status Scroll “Auto-refresh” to on/off. Click “Refresh” to refresh the port detailed statistics. Figure 4-2: The PoE Status Parameter description: Local Port :...
  • Page 74 Port Status :  The Port Status shows the port's status. The status can be one of the following values: PoE not available - No PoE chip found - PoE not supported for the port. PoE turned OFF - PoE disabled : PoE is disabled by user. PoE turned OFF - Power budget exceeded - The total requested or used power by the PDs exceeds the maximum power the Power Supply can deliver, and port(s) with the lowest priority is/are powered down.
  • Page 75: Chapter 5 Vlan Management

    Chapter 5 VLAN Management 5-1 VLAN Configuration To assign a specific VLAN for management purpose. The management VLAN is used to establish an IP connection to the switch from a workstation connected to a port in the VLAN. This connection supports a VSM, SNMP, and Telnet session. By default, the active management VLAN is VLAN 1, but you can designate any VLAN as the management VLAN using the Management VLAN window.
  • Page 76 individual elements are separated by commas. Ranges are specified with a dash separating the lower and upper bound. The following example will create VLANs 1, 10, 11, 12, 13, 200, and 300: 1,10-13,200,300. Spaces are allowed in between the delimiters. Ethertype for Custom S-ports : ...
  • Page 77 Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on. Likewise, on egress, the Port Type determines the TPID of the tag, if a tag is required. Unaware: On ingress, all frames, whether carrying a VLAN tag or not, get classified to the Port VLAN, and possible tags are not removed on egress.
  • Page 78 Untag All All frames, whether classified to the Port VLAN or not, are transmitted without a tag. This option is only available for ports in Hybrid mode. Allowed VLANs :  Ports in Trunk and Hybrid mode may control which VLANs they are allowed to become members of. Access ports can only be member of one VLAN, the Access VLAN.
  • Page 79: Vlan Membership

    5-2 VLAN Membership This page provides an overview of membership status of VLAN users. The ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure VLAN membership configuration in the web interface: 1.
  • Page 80 If a port is included in a Forbidden port list and dynamic VLAN user register VLAN on same Forbidden port, then conflict port will be displayed as Untagged port Members :  The interface is an untagged member of the VLAN. Frames of the VLAN are sent untagged to the interface VLAN.
  • Page 81: Vlan Port Status

    5-3 VLAN Port Status The function Port Status gathers the information of all VLAN status and reports it by the order of Static NAS MVRP MVP Voice VLAN MSTP GVRP Combined. Web Interface To Display VLAN Port Status in the web interface: 1.
  • Page 82 Shows the Port Type. Port type can be any of Unaware, C-port, S-port, Custom S-port. If Port Type is Unaware, all frames are classified to the Port VLAN ID and tags are not removed. C-port is Customer Port. S-port is Service port. Custom S-port is S-port with Custom TPID.
  • Page 83: Chapter 6 Quality Of Service

    Chapter 6 Quality of Service 6-1 Global Settings Use the Global Settings page to set the trust behavior for QoS basic mode. This configuration is active when the switch is in QoS basic mode. Packets entering a QoS domain are classified at the edge of the QoS domain.
  • Page 84 Buttons Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 85: Port Settings

    6-2 Port Settings Web Interface To configure the QoS Port Setting in the web interface: Click Quality of Service and Port Settings. Select Mode, Default CoS, Source CoS, Remark CoS to each port. Click which port need to enable the Remark Cos, Remark DSCP, Remark IP Precedence Click Apply to save the configuration.
  • Page 86 Click the checkbox to remark the IP precedence for egress traffic on this port. Note: The CoS/802.1p priority and IP Precedence, or the CoS/802.1p priority and DSCP value can be remarked simultaneously for egress traffic on a port, but the DSCP value and IP Precedence cannot be remarked simultaneously.
  • Page 87: Port Policing

    6-3 Port Policing This section provides an overview of QoS Ingress Port Policers for all switch ports The Port Policing is useful in constraining traffic flows and marking frames above specific rates. Policing is primarily useful for data flows and voice or video flows because voice and video usually maintains a steady rate of traffic Web Interface To configure the QoS Port Policers in the web interface:...
  • Page 88: Port Shaper

    6-4 Port Shaper This section provides an overview of QoS Egress Port Shapers for all switch ports. Others the user could get all detail information of the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port Shapers in the web interface: 1.
  • Page 89 Port Shaper Enable :  Controls whether the port shaper is enabled for this switch port. Rate(kbps) :  Controls the rate for the port shaper. The default value is 1000000. Buttons Apply :  Click to save changes. Reset : ...
  • Page 90: Storm Control

    6-5 Storm Control The section allows user to configure the Storm control for the switch. There is a destination lookup failure storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
  • Page 91 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 92: Port Scheduler

    6-6 Port Scheduler This section provides an overview of QoS Egress Port Scheduler for all switch ports. and the ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Port Schedulers in the web interface: 1.
  • Page 93: Cos/802.1P Mapping

    6-7 CoS/802.1p Mapping Use the CoS/802.1p to Queue page to map 802.1p priorities to egress queues. The CoS/802.1p to Queue table determines the egress queues of the incoming packets based on the 802.1p priority in their VLAN tags. For incoming untagged packets, the 802.1p priority will be the default CoS/802.1p priority assigned to the ingress ports.
  • Page 94: Cos/802.1P Remarking

    6-8 CoS/802.1p Remarking Use the Queues to CoS/802.1p page to remark the CoS/802.1p priority for egress traffic from each queue. Web Interface To configure the Cos/802.1p Remarking in the web interface: 1. Click Quality of Service and Cos/802.1p Remarking. 2. Select CoS/802.1p. 3.
  • Page 95: Ip Precedence Mapping

    6-9 IP Precedence Mapping To map IP precedence to egress queue. Web Interface To configure the IP Precedence Mapping in the web interface: 1. Click Quality of Service and IP Precedence Mapping. 2. Select Queue ID. 3. Click the Apply to save the setting. 4.
  • Page 96: Ip Precedence Remarking

    6-10 IP Precedence Remarking To map egress queue to IP precedence. Web Interface To configure the IP Precedence Remarking in the web interface: 1. Click Quality of Service and IP Precedence Remarking. 2. Select IP Precedence. 3. Click the Apply to save the setting. 4.
  • Page 97: Dscp Mapping

    6-11 DSCP Mapping Use the DSCP to Queue page to map IP DSCP to egress queues. The DSCP to Queue table determines the egress queues of the incoming IP packets based on their DSCP values. The original VLAN Priority Tag (VPT) of the packet is unchanged. It is possible to achieve the desired QoS in a network by simply changing the DSCP to Queue mapping, the queue schedule method, and bandwidth allocation.
  • Page 98: Dscp Remarking

    6-12 DSCP Remarking Use the Queues to DSCP page to remark DSCP value for egress traffic from each queue. Web Interface To configure the DSCP Remarking in the web interface: 1. Click Quality of Service and DSCP Remarking. 2. Select DSCP. 3.
  • Page 99: Chapter 7 Spanning Tree

    Chapter 7 Spanning tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 100 Figure 7-1: The Spanning Tree state Parameter description: Multiple Spanning Tree Protocol :  You can select enable spanning tree protocol or not. Force Version :  The STP protocol version setting. Valid values are STP, RSTP and MSTP. Buttons Apply : ...
  • Page 101: Region Config

    7-2 Region Config The section describes to configure the basic identification of a MSTP bridge. Bridges participating in a common MST region must have the same Region Name and Revision Level. Web Interface To configure the Region Config in the web interface: Click Spanning Tree and Region Config.
  • Page 102: Instance View

    7-3 Instance View The section providing an MST instance table which include information(vlan membership of a MSTI ) of all spanning instances provisioned in the particular MST region which the bridge belongs to. Through this table, additional MSTP configuration data can be applied and MSTP status can be retrieved.
  • Page 103 Instance Config :  To provision spanning tree performance parameters per instance. Port Config :  To provision spanning tree performance parameters per instance per port. Instance Status :  To show the status report of a particular spanning tree instance. Port Status : ...
  • Page 104 Figure 7-3: Instance Config to Instance 0 Parameter description: Priority :  The priority parameter used in the CIST(Common and Internal Spanning Tree) connection. 0 / 4096 / 8192 / 12288 / 16384 / 20480 / 24576 / 28672 / 32768 / 36864 / 40960 / 45056 / 49152 / 53248 / 57344 / 61440 MAX.
  • Page 105 Figure 7-3: Port Config to Instance 0 Parameter description: Port :  The logical port for the settings contained in the same row. Path Cost :  1 – 200,000,000 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI.
  • Page 106 temporary loss of connectivity after changes in a spanning trees active topology as a result of persistent incorrectly learned station location information. It is set by a network administrator to prevent bridges external to a core region of the network, causing address flushing in that region, possibly because those bridges are not under the full control of the administrator.
  • Page 107 Bridge Mac Address :  The Mac Address of the bridge itself. CIST ROOT PRIORITY :  Spanning tree priority value of the CIST root bridge. CIST ROOT MAC :  Mac Address of the CIST root bridge. CIST EXTERNAL ROOT PATH COST : ...
  • Page 108 Port Status to Instance 0 :  Figure 7-3: Port Status to Instance 0 Parameter description: Port No:  The port number to which the configuration applies. Status:  The forwarding status. Same definition as of the RSTP specification Possible values are “FORWARDING”...
  • Page 109: Chapter 8 Mac Address Tables

    Chapter 8 MAC Address Tables 8-1Configuration Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame). This table contains both static and dynamic entries.
  • Page 110 Figure 8-1: The MAC Address Table Configuration Parameter description: Aging Configuration : By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Configure aging time by entering a value here in seconds; for example, Age time seconds. The allowed range is 10 to 1000000 seconds.
  • Page 111 The VLAN ID of the entry. MAC Address :  The MAC address of the entry. Block :  Click it, if you want block this mac address. Port Members :  Checkmarks indicate which ports are members of the entry. Check or uncheck as needed to modify the entry.
  • Page 112: Information

    8-2 Information Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Web Interface To Display MAC Address Table in the web interface: 1.
  • Page 113 The MAC address of the entry. Block :  Whether the mac address is blocked or not. Port Members :  The ports that are members of the entry. Buttons Figure 8-2: The MAC Address Table Information buttons Auto-refresh : ...
  • Page 114: Chapter 9 Multicast

    Chapter 9 Multicast 9-1 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping cannot tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
  • Page 115 Figure 9-1.1: The IGMP Snooping Configuration Parameter description: Global Configuration Snooping Enabled :  Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled :  Enable unregistered IPMCv4 traffic flooding. IGMP SSM Range :  SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range.
  • Page 116 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 117: 9-1.2 Vlan Configuration

    9-1.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For Each setting page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table.
  • Page 118 Enable to join IGMP Querier election in the VLAN. Disable to act as an IGMP Non-Querier. Compatibility :  Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network. The allowed selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2, Forced IGMPv3, default compatibility value is IGMP-Auto.
  • Page 119: 9-1.3 Status

    9-1.3 Status After you complete the IGMP Snooping configuration, then you could to let the switch display the IGMP Snooping Status. The Section provides you to let switch to display the IGMP Snooping detail status. Web Interface To display the IGMP Snooping status in the web interface: 1.
  • Page 120 V1 Reports Received :  The number of Received V1 Reports. V2 Reports Received :  The number of Received V2 Reports. V3 Reports Received :  The number of Received V3 Reports. V2 Leaves Received :  The number of Received V2 Leaves. Router Port Display which ports act as router ports.
  • Page 121: 9-1.4 Group Information

    9-1.4 Group Information After you complete to set the IGMP Snooping function then you could let the switch to display the IGMP Snooping Group Information. Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. The will use the last entry of the currently displayed table as a basis for the next lookup.
  • Page 122 Group address of the group displayed. Port Members :  Ports under this group. Buttons Figure 9-1.4: The IGMP Snooping Groups Information buttons Auto-refresh :  Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh : ...
  • Page 123: 9-1.5 Igmp Sfm Information

    9-1.5 IGMP SFM Information Entries in the IGMP SFM Information Table are shown on this page. The IGMP SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
  • Page 124 Port :  Switch port number. Mode :  Indicates the filtering mode maintained per (VLAN ID, port number, Group Address) basis. It can be either Include or Exclude. Source Address :  IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128.
  • Page 125: Chapter 10 Security

    Chapter 10 Security This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. 10-1 Management 10-1.1 Account This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser.
  • Page 126 Password (again) :  To type the password again. You must type the same password again in the field. Privilege Level :  The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e.
  • Page 127 10-1.2 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELNET/SSH. You can manage the Switch over an Ethernet LAN, or over the Internet. Web Interface To configure an Access Management Configuration in the web interface: Click Security, Management and Access Management.
  • Page 128 address matches the IP address range provided in the entry. SNMP :  Indicates that the host can access the switch from SNMP interface if the host IP address matches the IP address range provided in the entry. TELNET/SSH : ...
  • Page 129: Ieee 802.1X

    10-2 IEEE 802.1X 10-2.1 Configuration The section describes to configure the 802.1X parameters of the switch. The 802.1X can be employed to connect users to a variety of resources including Internet access, conference calls, printing documents on shared printers, or by simply logging on to the Internet. Web Interface To configure the IEEE 802.1X in the web interface: Click Security, IEEE 802.1X and Configuration.
  • Page 130 interval specified by the Reauthentication Period. Reauthentication for 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached. For MAC-based ports, reauthentication is only useful if the RADIUS server configuration has changed.
  • Page 131 considered dead). Now, if the supplicant retransmits EAPOL Start frames at a rate faster than X seconds, then it will never get authenticated, because the switch will cancel on-going backend authentication server requests whenever it receives a new EAPOL Start frame from the supplicant. And since the server hasn't yet failed (because the X seconds haven't expired), the same server will be contacted upon the next backend authentication server request from the switch.
  • Page 132: 10-2.2 Status

    10-2.2 Status The section describes to show the each port 802.1X status information of the switch. The status includes Admin State, Port State, Last Source, Last ID and Port VLAN ID. Web Interface To displays 802.1X Status in the web interface: Click Security, IEEE 802.1X and Status.
  • Page 133 overridden by 802.1X. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID. Read more about RADIUS-assigned VLANs here. If the port is moved to the Guest VLAN, "(Guest)" is appended to the VLAN ID. Read more about Guest VLANs here.
  • Page 134: Port Security

    10-3 Port Security 10-3.1 Configuration This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. Web Interface To configure a Port Security Configuration in the web interface: Click Security, Port Security and Configuration.
  • Page 135 be set to Enabled for Limit Control to be in effect. Notice that other modules may still use the underlying port security features without enabling Limit Control on a given port. Limit :  The maximum number of MAC addresses that can be secured on this port. This number cannot exceed 1024.
  • Page 136 Reset  Click to undo any changes made locally and revert to previously saved values.
  • Page 137: 10-3.2 Status

    10-3.2 Status This section shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
  • Page 138 Web-page. MAC Count (Current, Limit) :  The two columns indicate the number of currently learned MAC addresses (forwarding as well as blocked) and the maximum number of MAC addresses that can be learned on the port, respectively. If no user modules are enabled on the port, the Current column will show a dash (-). Buttons Figure 10-3.2: The Port Security Status buttons Auto-refresh :...
  • Page 139: Radius

    10-4 RADIUS 10-4.1 Configuration Web Interface To configure a RADIUS in the web interface: Click Security, RADIUS and Configuration. Set Timeout, Retransmit, Deadtime, Key, NAS-IP-Address, NAS IPv6-Address,NAS-Identifier. Click “Add New Entry”. Set Hostname, Auth Port, Acct Port, Timeout, Retransmit, Key. Click the Apply to save the setting.
  • Page 140 Deadtime, which can be set to a number between 0 to 1440 minutes, is the period during which the switch will not send new requests to a server that has failed to respond to a previous request. This will stop the switch from continually trying to contact a server that it has already determined as dead.
  • Page 141 Apply :  Click to save changes. Reset :  Click to undo any changes made locally and revert to previously saved values.
  • Page 142: 10-4.2 Status

    10-4.2 Status This section shows you an overview/detail of the RADIUS Authentication and Accounting servers’ status to ensure the function is workable. Web Interface To display a RADIUS Status in the web interface: Click Security, RADIUS and Status. Select server to display the detail statistics for a particular RADIUS. Figure 10-4.2: The RADIUS Server Status Overview Parameter description: RADIUS Authentication Server Status...
  • Page 143 Access attempts were made to this server, but it did not reply within the configured timeout. The server has temporarily been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses.
  • Page 144 Figure 10-4.2: The RADIUS Statistics Server Parameter description: server :  You can select which server that you want display RADIUS. RADIUS Authentication Statistics for Server #1 The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB. Use the server select box to switch between the backend servers to show details for.
  • Page 145 timed out or received a response. This variable is incremented when an Access-Request is sent and decremented due to receipt of an Access-Accept, Access-Reject, Access-Challenge, timeout, or retransmission. Timeouts :  The number of authentication timeouts to the server. After a timeout, the client may retry to the same server, send to a different server, or give up.
  • Page 146 The number of RADIUS packets that were received from the server on the accounting port and dropped for some other reason. Requests :  The number of RADIUS packets sent to the server. This does not include retransmissions Retransmissions : ...
  • Page 147: Chapter 11 Diagnostics

    Chapter 11 Diagnostics This chapter provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed. The basic system check includes Ping, Traceroute, and VeriPHY Cable Diagnostics. 11-1 Ping This section allows you to issue ICMP PING packets to troubleshoot IPv6 connectivity issues.
  • Page 148 The payload size of the ICMP packet. Values range from 2 bytes to 1452 bytes. Ping Count :  The count of the ICMP packet. Values range from 1 time to 60 times. Start:  Click the “Start” button then the switch will start to ping the device using ICMP packet size what set on the switch.
  • Page 149: Cable Diagnostics

    11-2 Cable Diagnostics This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table.
  • Page 150: Traceroute

    11-3 Traceroute This page allows you to issue ICMP, TCP, or UDP packets to diagnose network connectivity issues. Web Interface To configure a Traceroute in the web interface: 1. Click Diagnostics and Traceroute. 2. Specify IP Address, IP Version, IP Protocol, traceroute Size. 3.
  • Page 151: Mirror

    11-4 Mirror You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Mirror Configuration is to monitor the traffic of the network.
  • Page 152 The following table is used for Rx and Tx enabling. Port :  The logical port for the settings contained in the same row. Mode :  Select mirror mode. Rx only Frames received on this port are mirrored on the mirror port. Frames transmitted are not mirrored.
  • Page 153: Chapter 12 Maintenance

    Chapter 12 Maintenance This chapter describes the entire switch Maintenance configuration tasks to enhance the performance of local network including Save/Backup/Restore/Activate/Delete Restart Device, Factory Defaults, Firmware upgrade. 12-1 Configuration The switch stores its configuration in a number of text files in CLI format. The files are either virtual (RAM-based) or stored in flash on the switch.
  • Page 154 Figure 12-1.1: The Save Startup Configuration Parameter description: Button Save Configuration :  Click to save configuration, the running configuration will be written to flash memory for system boot up to load this startup configuration file.
  • Page 155: 12-1.2 Backup Config

    12-1.2 Backup config This section describes to export the Switch Configuration for maintenance needs. Any current configuration files will be exported as text format. It is possible to download a file from the web browser to all the files on the switch, except default-config, which is read-only.
  • Page 156: 12-1.3 Restore Config

    12-1.3 Restore config The configuration upload function will be backuped and saved configuration from the switch’s configuration into the running web browser PC. It is possible to upload any of the files on the switch to the web browser. Select the file and click Upload of running-config may take a little while to complete, as the file must be prepared for upload.
  • Page 157: 12-1.4 Activate Config

    12-1.4 Activate config It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click. This will initiate the process of completely replacing the existing configuration with that of the selected file.
  • Page 158: 12-1.5 Delete Config

    12-1.5 Delete config It is possible to delete any of the writable files stored in flash, including startup-config. If this is done and the switch is rebooted without a prior save operation, this effectively resets the switch to default configuration. Web Interface To delete configuration in the web interface: 1.
  • Page 159: Restart Device

    12-2 Restart Device This section describes how to restart switch for any maintenance needs. Any configuration files or scripts that you saved in the switch should still be available afterwards. Web Interface To configure a Restart Device Configuration in the web interface: 1.
  • Page 160: Factory Defaults

    12-3 Factory Defaults This section describes how to reset the Switch configuration to Factory Defaults. Any configuration files or scripts will recover to factory default values. Web Interface To configure a Factory Defaults Configuration in the web interface: 1. Click Maintenance and Factory Defaults. 2.
  • Page 161: Firmware

    12-4 Firmware This section describes how to upgrade Firmware. The Switch can be enhanced with more value-added functions by installing firmware upgrades. 12-4.1 Firmware Upgrade This page facilitates an update of the firmware controlling the switch.. Web Interface To configure a Firmware Upgrade Configuration in the web interface: 1.
  • Page 162: Chapter 13 Surveillance - Graphical Monitoring

    Surveillance Chapter 13 IMPORTANT: It is recommended to use IE10 or IE11 to open a web console with the PoE switch. This PoE switch is specifically designed for surveillance applications. It comes with an integrated Surveillance interface for ease of configuration. The Surveillance interface is accessed through a tabbed menu, and the configuration changes made in its window have a higher priority than those in the Switch configuration menus.
  • Page 163 Identify where exactly the broken cable is, remotely. Detect abnormal traffic issues on IP cameras/NVR. Monitor devices status intuitively, e.g., link up, PoE power, traffic, etc. Configure VLAN/QoS intuitively for better solution quality/reliability. The interface supports up to 256 devices. The interface is designed to be extremely easy-to-use/manage/install IP Phone, IP Cam, or Wifi-AP for enterprise applications.
  • Page 164: Graphical Monitoring

    13-3. Graphical Monitoring - Topology View Figure 13-3: The Topology View Functional description: Icon with plus and minus buttons: Zoom in and zoom out on the topology view, users can scroll the mouse wheel to achieve the same purpose. Icon with screen view type: Click to change to Full Screen view or click again to return to the Normal View.
  • Page 165 Device Icons Icon in black: Device link up. Users can select functions and check its issues.  Icon in red: Device link down. Users can diagnose the link status.  Icon with numbers: It means some events have occurred (e.g. Device Off-line, ...
  • Page 166 Red icon: Device is not transmitted /receiving data correctly, which means the ping is not successful. Figure 13-3: The Diagnostics Live Stream: When connecting VIVOTEK cameras, it can support to  view live streaming via IE 11 browser with Quicktime player installed.
  • Page 167 Figure 13-3: Management Default: Reset VIVOTEK cameras back to factory default settings.  PoE Reboot: Click Reboot Action Icon to reboot the device remotely so  as to recover the device back to its normal operation. Figure 13-3: Switch Dashboard Login: Click the Login Action Icon to log in to the device via an http ...
  • Page 168 PoE Config: Enabling the Auto Checking function can detect the  connection between PoE port and powered device. If you disable this function, the detection will turn off. Icon with blank node: When the PoE switch detects more than two IP ...
  • Page 169 Figure 13-3: The Monitor Console On the upper right corner, there is a “Setting icon”. The Setting page provides access to the Device, Group, Config, export topology view and advanced search functions for the topology. 13-4. Device Search Console All devices and related information will display on the list. Function Filter devices by the Device Type Search devices by key words or using the full...
  • Page 170 Group Console  You can also configure VLAN grouping in the Topology View. To configure grouping, proceed with the following: Enable the Grouping mode by selecting the “Group” menu from the Device List menu. Select New Group from the pull-down menu. Single-click IP cameras or servers to include them into group.
  • Page 171 Function Group devices by filtering, searching, clicking device icons, or specifying OUI. Assign VLAN ID or Name to Group. Configure traffic priority for the VLAN. Organizationally Unique Identifiers (OUI), enter the first 3 octets as the hexadecimal xx-xx-xx to specify the device range. Figure 13-4: Group Console System Setting Console ...
  • Page 172: Floor View

    Floor View Users can easily plan and represent IP devices at the installation sites using the customizable floor images. Test02 Test02 Select devices from the Entry pane on the right. When the devices appear on the  floor image, drag it to a preferred location. Find Device Location Instantly ...
  • Page 173 Test01 Test01 Test02 Test02 If there are more than two floor images, select a floor image from the pull-down  list. Test01 Test01 Test02 Test02...
  • Page 174: Map View

    Map View On this page, you can view a realistic representation of devices through the Google map. This Map View applies in wide area, outdoor deployments. The preconditions for using this function are:  The client computer having a web session with the PoE switch must have an Internet connection.
  • Page 175: Management

    Management Device List It will show all devices and their information which are detected by Surveillance. If you want the PoE switch to automatically refresh the information then you need to evoke the “Auto refresh” function. Click this button to Refresh the status of all devices. Click this button to Edit Device Name and http Port.
  • Page 176: Vvtk Camera & Encoder

    Search devices by keying words with full text search. The Remove function only applies to the Offline devices. Note: The device name will not be saved until you click the Apply button. Please do not click on the refresh, auto-refresh or edit buttons before you apply new device name. VVTK Camera &...
  • Page 177: Camera Configure

    Camera Configure Config Export Web interface To configure Surveillance Information in the web interface: 1. Click Surveillance > Management > Camera & Encoder > Config Export 2. Select the Camera to export the configuration file from. You can export the configuration to a client computer, a TFTP server is required in your network.
  • Page 178: Maintenance

    Maintenance Floor Image In this page, users can add or delete floor images. Up to 30 image files can be uploaded to the PoE switch.  Only supports JPG and PNG formats.  The max. file size is limited to 512KB. ...

This manual is also suitable for:

Vivocam aw-gev-184b-250Vivocam aw-gev-264b-370

Table of Contents