Vivotek AW-IHT-1270 User Manual
Vivotek AW-IHT-1270 User Manual

Vivotek AW-IHT-1270 User Manual

8-port 10/100/1000base-t w/poe + 4 sfp gigabit ports managed industrial switch
Table of Contents

Advertisement

Quick Links

AW-IHT-1270
8-port 10/100/1000Base-T w/PoE + 4 SFP Gigabit ports
Managed Industrial Switch

User Manual

Advertisement

Table of Contents
loading

Summary of Contents for Vivotek AW-IHT-1270

  • Page 1: User Manual

    AW-IHT-1270 8-port 10/100/1000Base-T w/PoE + 4 SFP Gigabit ports Managed Industrial Switch User Manual...
  • Page 2 COPYRIGHT All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photo copying, recording or otherwise, without the prior written permission of the publisher. FCC WARNING This equipment has been tested and found to comply with the limits for a class A device, pursuant to part 15 of FCC rules.
  • Page 3: Table Of Contents

    ABOUT THIS GUIDE ......................1 ..........................1 1.1. ELCOME 1.1..........................1 URPOSE ........................1 1.2. ERMS SAGE ABOUT THE AW-IHT-1270 ....................2 ..........................2 2.1. EATURES ........................2 2.2. PECIFICATIONS HARDWARE DESCRIPTION ..................... 5 ........................5 3.1. ONNECTORS ....................5 3.1.1.
  • Page 4 5.1.4......................24 ANAGEMENT 5.1.4.1....................... 24 NTRODUCTION 5.1.4.2. CLI C ....................25 ONFIGURATION 5.1.4.3....................25 ONFIGURATION 5.2. MAC M ......................26 ANAGEMENT 5.2.1........................26 NTRODUCTION 5.2.2. CLI C ....................... 27 ONFIGURATION 5.2.3....................... 27 ONFIGURATION 5.2.4. MAC) ..................30 EFUSAL LACK HOLE...
  • Page 5 6.2.4.3....................65 ONFIGURATION 6.2.5....................... 66 ULTICAST DDRESS 6.2.5.1....................... 66 NTRODUCTION 6.2.5.2. CLI C ....................68 ONFIGURATION 6.2.5.3....................68 ONFIGURATION 6.2.6....................69 XPLICIT RACKING ....................69 6.2.6.1. CLI C ONFIGURATIONS ....................69 6.2.6.2. ONFIGURATIONS 6.3. VLAN ..........................70 6.3.1.
  • Page 6 6.7.2.1......................107 NTRODUCTION 6.7.2.2. CLI C ....................108 ONFIGURATION 6.7.2.3....................109 ONFIGURATION 6.8. (LLDP) ..............112 AYER ISCOVERY ROTOCOL 6.8.1......................... 112 NTRODUCTION 6.8.2. CLI C ...................... 112 ONFIGURATION 6.8.3...................... 113 ONFIGURATION 6.9......................115 ETECTION 6.9.1.........................
  • Page 7 SECURITY ......................... 159 7.1. IP S ......................159 OURCE UARD 7.1.1. DHCP S ......................159 NOOPING 7.1.1.1......................159 NTRODUCTION 7.1.1.2. CLI C ....................162 ONFIGURATION 7.1.1.3....................163 ONFIGURATION 7.1.1.4. DHCP S ..................165 ERVER CREENING 7.1.1.4.1......................165 NTRODUCTION ....................
  • Page 8 8.4.1........................ 193 NTRODUCTION 8.4.2. CLI C ..................... 193 ONFIGURATION 8.4.3..................... 193 ONFIGURATION 8.5. RMON S ......................193 TATISTICS 8.5.1........................ 193 NTRODUCTION 8.5.2. CLI C ..................... 193 ONFIGURATION 8.5.3..................... 194 ONFIGURATION 8.6. SFP I ......................194 NFORMATION 8.6.1.
  • Page 9: About This Guide

    This guide discusses how to install and configure your Managed Industrial Switch. 1.2. Terms/ Usage In this guide, the term “Switch” (first letter upper case) refers to the AW-IHT-1270 Switch, and “switch” (first letter lower case) refers to other switches.
  • Page 10: About The Aw-Iht-1270

    2. About the AW-IHT-1270 2.1. Features Port Security Network Functions Port-based Mirroring 802.1x Port Authentication GARP/GVRP Support Traffic management & QoS 4K Active VLAN Port Priority IGMP Snooping v1/v2/v3 Rate Limitation IGMP Querier Storm Control Port Isolation DHCP Relay/Option 82 802.1Q Tag-based VLAN...
  • Page 11 IEEE 802.3ad Port Trunk with LACP IEEE 802.3af Power over Ethernet (PoE) IEEE 802.3at High Power over Ethernet (PoE+) Performance Switching fabric 24Gbps L2 forwarding 17.86Mpps MAC Entries 16 K Jumbo frame 10 K Physical Ports 8 x 10/100/1000Base-T (PSE) 4 Gigabit SFP slots 1 x Console port (RJ-45 to RS-232) Mechanical &...
  • Page 12 Power Input Voltage: Primary inputs: 48~57V DC (or 24~57V DC for AW-IHT-1270-24V model) Redundant inputs:48~57V DC (or 24~57V DC for AW-IHT-1270-24V model) Connection: One removable 6-pin terminal block Support Overload current protection Support Reverse Polarity Protection One relay output with current carrying capacity of 1 A @ 24V DC...
  • Page 13: Hardware Description

    3. Hardware Description AW-IHT-1270 Front Panel 8-port 10/100/1000Base-T w/PoE + 4 SFP Gigabit Managed Industrial Switch 3.1. Connectors The Switch utilizes ports with copper and SFP fiber port connectors functioning under Ethernet/Fast Ethernet/Gigabit Ethernet standards. 3.1.1. 10/100/1000Base-T Ports The 10/100/1000Base-T ports support network speeds of 10Mbps, 100Mbps or 1000Mbps, and can operate in half- and full-duplex transfer modes.
  • Page 14: Installation

    ✓ Leave at least 10cm of space at the front and rear of the unit for ventilation. 3.2.1. Hardware Installation ✓ Step 1: Unpack the device and other contents of the package. ✓ Step 2: Fasten DIN-Rail or Wall-mount kit on the rear of the AW-IHT-1270...
  • Page 15: Din Rail Installation

    Location: The AW-IHT-1270 can be DIN-Rail-mounted in cabinet or enclosure. Mounting the switch Place the AW-IHT-1270 on the DIN rail from above using the slot. Push the front of the switch toward the mounting surface until it snaps into place with a click sound.
  • Page 16: Wall Mount Installation

    You can use “Terminal Block (PWR)” for Primary Power input and “Terminal Block (RPS)” for secondary power source for Redundant Power Input. To insert power wire and connect the 48~57V DC (or 24~57V DC for AW-IHT-1270-24V) power to the power terminal block, follow the steps below: ✓...
  • Page 17: Led Indicators

    The Switch accepts the power input voltage from 48~57V DC (or 24~57V DC for AW-IHT- 1270-24V). ✓ Insert the power cables into the terminal block located on the top of the device. ✓ Check the front-panel LEDs as the device is powered on to verify that the Power LED is lit.
  • Page 18: Dip Switches

    Activity (receiving or transmitting data) 10/100Mbps Blinking (Amber) Port disconnected or link failed 3.4. DIP Switches Power: DIP 1 and DIP 2 is for primary power and redundant power supply. Alarm Relay output: DIP 3 to DIP 14 control each of ports to trigger the external alarm device.
  • Page 19: System Status

    4. System Status 4.1. Console Port  Connect your computer to the console port on the Switch using the appropriate cable.  Use terminal emulation software with the following settings: Default Settings for the Console Port Setting Default Value VT100 Terminal Emulation 38400 Baud Rate...
  • Page 20: Cli Command Concept

    If you want to execute more powerful commands, you must enter the privileged mode. Input command “enable” L2SWITCH>enable Input a valid username and password when below prompt are displayed. user:admin password:admin L2SWITCH# 4.4. CLI command concept Node Command Description show hostname This command displays the system’s network name.
  • Page 21: Gui Login

    In Configure code, executing command “interface fastethernet1/0/5” enter the interface port 5 node. Note: depend on your port speed, gigaethernet1/0/5 for gigabit Ethernet ports and fastethernet1/0/5 for fast Ethernet ports. L2SWITCH(config)#interface gigaethernet1/0/5 L2SWITCH(config-if)#  vlan Its command prompt is “L2SWITCH(config-vlan)#”. It means these commands can be executed in this command prompt.
  • Page 22: Cli Configuration

    Password: admin. 4.6. CLI Configuration Node Command Description show hostname This command displays the system’s network name. enable show interface eth0 This command displays the current Eth0 enable configurations. show model This command displays the system information. enable show running-config This command displays the current operating enable configurations.
  • Page 23 Firmware Version This field displays the firmware version. Built Date This field displays the built date of the firmware. DHCP Client This field displays whether the DHCP client is enabled on the Switch. IP Address This field indicates the IP address of the Switch. Subnet Mask This field indicates the subnet mask of the Switch.
  • Page 24: Basic Settings

    5. Basic Settings 5.1. General Settings 5.1.1. System 5.1.1.1. Introduction Management VLAN To specify a VLAN group which can access the Switch.  The valid VLAN range is from 1 to 4094.  If you want to configure a management VLAN, the management VLAN should be created first and the management VLAN should have at least one member port.
  • Page 25 This command changes the mode to config mode. configure configure terminal This command changes the mode to eth0 mode. configure interface eth0 show This command displays the eth0 configurations. eth0 ip address A.B.C.D/M This command configures a static IP and subnet mask eth0 for the system.
  • Page 26: Web Configuration

     Please set the static global IPv6 address first. L2SWITCH(config-if)#ip ipv6-address 3ffe::1235/64  And the set the IPv6 default gateway address. L2SWITCH(config-if)#ip ipv6-address default-gateway 3ffe::1234 5.1.1.3. Web Configuration Configures a IPv4 address for your Switch in dotted decimal notation. IP Address For example, 192.168.0.254.
  • Page 27: Jumbo Frame

    Apply Click this button to take effect the settings. Refresh Click this button to reset the fields to the last setting. 5.1.2. Jumbo Frame 5.1.2.1. Introduction Jumbo frames are Ethernet frames with a payload greater than 1500 bytes. Jumbo frames can enhance data transmission efficiency in a network.
  • Page 28: Web Configuration

    5.1.2.3. Web Configuration Parameter Description Port This field specifies a port or a range of ports for configuration. This field configures the maximum number of bytes of frame size for Frame Size specified port(s). Apply Click this button to take effect the settings. Refresh Click this button to reset the fields to the last setting.
  • Page 29: Cli Configuration

    Note: The SNTP server always replies the UTC current time. When the Switch receives the SNTP reply time, the Switch will adjust the time with the time zone configuration and then configure the time to the Switch. If the time server’s IP address is not configured, the Switch will not send any SNTP request packets.
  • Page 30 configure no time daylight-saving- This command disables daylight saving on the time Switch. configure time daylight-saving-time This command sets the start time of the Daylight start-date (first | second | Saving Time. third | fourth | last) (Sunday | Monday | Tuesday | Wednesday | Thursday | Friday | Saturday) MONTH HOUR...
  • Page 31: Web Configuration

    5.1.3.3. Web Configuration Parameter Description Current Time and Date Current Time This field displays the time you open / refresh this menu. Current Date This field displays the date you open / refresh this menu. Time and Date Setting Manual Select this option if you want to enter the system date and time manually.
  • Page 32: Management Host

    from the drop-down list box. Daylight Saving Settings Select Enable if you want to use Daylight Saving Time. Otherwise, State select Disable to turn it off. Configure the day and time when Daylight Saving Time starts if you enabled Daylight Saving Time. The time is displayed in the 24 hour format.
  • Page 33: Cli Configuration

    Default Settings The default is none, any host can manage the Switch via telnet or web browser. 5.1.4.2. CLI Configuration Node Command Description enable show interface eth0 The command displays the all of the interface eth0 configurations. eth0 show The command displays the all of the interface eth0 configurations.
  • Page 34: Mac Management

    This field displays a sequential number for each management host. Management Host This field displays the management host. Action Click the Delete button to remove the specified entry. 5.2. MAC Management 5.2.1. Introduction Dynamic Address: The MAC addresses are learnt by the switch. When the switch receives frames, it will record the source MAC, the received port and the VLAN in the address table with an age time.
  • Page 35: Cli Configuration

    Figure MAC Table Flowchart Default Settings The default MAC address table age time is 300 seconds. The Maximum static address entry is 256. 5.2.2. CLI Configuration Node Command Description show mac-address-table This command displays the current MAC enable aging-time address table age time. show mac-address-table This command displays the current enable...
  • Page 36 Parameter Description Static MAC Settings Enter the MAC address of a computer or device that you want to add MAC Address to the MAC address table. Valid format is hh:hh:hh:hh:hh:hh. VLAN ID Enter the VLAN ID to apply to the computer or device. Port Enter the port number to which the computer or device is connected.
  • Page 37 MAC Table Parameter Description Show Type Select All, Static, Dynamic or Port and then click Apply to display the Apply corresponding MAC address entries on this screen. Refresh Click this to update the information in the MAC table. MAC Address This field displays a MAC address.
  • Page 38: Refusal (Black - Hole Mac)

    Refresh Click this to update the information in the MAC table. Refusal ( 5.2.4. Black-hole MAC) 5.2.4.1. Introduction This type of MAC address entries are configured manually. A switch discards the packets destined for or originated from the MAC addresses contained in blackhole MAC address entries. Blackhole entries are configured for filtering out frames with specific source or destination MAC addresses Notice: User can configure up to 20 entries.
  • Page 39: Web Configuration

    5.2.4.3. Web Configuration Parameter Description Enter the MAC address of a computer or device that you want to MAC Address refusal. Valid format is hh:hh:hh:hh:hh:hh. VLAN ID Enter the VLAN ID to apply to the computer or device. Apply Click Apply to take effect the settings. Refresh Click Refresh to begin configuring this screen afresh.
  • Page 40: Cli Configuration

    Port Mirroring, together with a network traffic analyzer, helps to monitor network traffic. Users can monitor the selected ports (Source Ports) for egress and/or ingress packets. Source Mode: Ingress : The received packets will be copied to the monitor port. Egress : The transmitted packets will be copied to the monitor port.
  • Page 41: Web Configuration

    5.3.3. Web Configuration Parameter Description State Select Enable to turn on port mirroring or select Disable to turn it off. Monitor to Port Select the port which connects to a network traffic analyzer. Settings in this field apply to all ports. Use this field only if you want to make some settings the same for all All Ports ports.
  • Page 42 A duplex communication system is a system composed of two connected parties or devices that can communicate with one another in both directions. Half Duplex: A half-duplex system provides for communication in both directions, but only one direction at a time (not simultaneously).
  • Page 43: Cli Configuration

    If the peer port does not support auto-negotiation or turns off this feature, the Switch determines the connection speed by detecting the signal on the cable and using half duplex mode. When the Switch’s auto-negotiation is turned off, a port uses the pre-configured speed and duplex mode when making a connection, thus requiring you to make sure that the settings of the peer port are the same in order to connect.
  • Page 44 description STRINGs This command configures a description interface for the specific port. no description This command configures the default port interface description. cable test This command diagnostics the Ethernet interface cable and shows the broken distance. clean cable-test result This command cleans the test result of the interface Ethernet cable test.
  • Page 45: Web Configuration

    5.4.3. Web Configuration Parameter Description Port Select a port or a range ports you want to configure on this screen. State Select Enable to activate the port or Disable to deactivate the port. Select the speed and duplex mode of the port. The choices are: •...
  • Page 46 This field displays the speed either 10M, 100M or 1000M and the duplex Speed/Duplex mode Full or Half. Flow Control This field displays whether the port’s flow control is On or Off. This field displays the link status of the port. If the port is up, it displays the Link Status port’s speed, duplex and flow control setting.
  • Page 47: Advanced Settings

    6. Advanced Settings 6.1. Bandwidth Control 6.1.1. 6.1.1.1. Introduction Each egress port can support up to 8 transmit queues. Each egress transmit queue contains a list specifying the packet transmission order. Every incoming frame is forwarded to one of the 8 egress transmit queues of the assigned egress port, based on its priority.
  • Page 48  DSCP Based QoS - Assign priority to packets based on their Differentiated Services Code Points (DSCPs). Note: Advanced QoS methods only affect the internal priority queue mapping for the Switch. The Switch does not modify the IEEE 802.1p value for the egress frames. You can choose one of these ways to alter the way incoming packets are prioritized or you can choose not to use any QoS enhancement setting on the Switch.
  • Page 49 Network Priority Traffic Characteristics 0 (lowest) Background Best Effort Excellent Effort Critical Applications Video, <100ms latency Video, < 10ms latency Internetwork Control 7 (highest) Network Control DiffServ (DSCP) Differentiated Services or DiffServ is a computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for classifying, managing network traffic and providing Quality of Service (QoS) guarantees on modern IP networks.
  • Page 50 Bits 5: 0 = Normal Reliability, 1 = High Reliability. Bit 6-7: Reserved for Future Use. +-----+-----+-----+-----+-----+-----+-----+-----+ PRECEDENCE | D | T | R | 0 | 0 | +-----+-----+-----+-----+-----+-----+-----+-----+ Precedence 111 - Network Control 110 - Internetwork Control 101 - CRITIC/ECP 100 - Flash Override 011 - Flash 010 - Immediate...
  • Page 51 Queuing Algorithms Queuing algorithms allow switches to maintain separate queues for packets from each individual source or flow and prevent a source from monopolizing the bandwidth.  Strict-Priority (SPQ) The packets on the high priority queue are always service firstly. ...
  • Page 52: Cli Configuration

    Note: If the DiffServ is disabled, the 802.1p tag priority will be used. 6.1.1.2. CLI Configuration Node Command Description show queue cos-map This command displays the current 802.1p priority enable mapping to the service queue. show qos mode This command displays the current QoS scheduling enable mode of IEEE 802.1p.
  • Page 53: Web Configuration

    6.1.1.3. Web Configuration Port Priority Parameter Description Use this field to set a priority for all ports. All Ports 802.1p The value indicates packet priority and is added to the priority tag field priority of incoming packets. The values range from 0 (lowest priority) to 7 (highest priority).
  • Page 54 IP DiffServ (DSCP) Parameter Description “Tag Over DSCP” or “DSCP Over Tag”. “Tag Over DSCP” means the 802.1p Mode tag has higher priority than DSCP. This field displays each priority level. The values range from 0 (lowest Priority priority) to 7 (highest priority). Apply Click Apply to take effect the settings.
  • Page 55 Priority/Queue Mapping Parameter Description Reset to Default Click this button to reset the priority to queue mappings to the defaults. This field displays each priority level. The values range from 0 (lowest Priority priority) to 7 (highest priority). Queue ID Select the number of a queue for packets with the priority level.
  • Page 56: Rate Limitation

    Parameter Description Select Strict Priority (SP) or Weighted Round Robin (WRR). Note: Queue weights can only be changed when Weighted Round Robin is selected. Schedule Mode Weighted Round Robin scheduling services queues on a rotating basis based on their queue weight (the number you configure in the queue Weight field).
  • Page 57: Cli Configuration

    6.1.2.1.2. CLI Configuration Node Command Description show storm-control This command displays the current enable storm control configurations. configure storm-control rate RATE_LIMIT type This command enables the bandwidth (bcast | mcast | DLF | bcast+mcast | limit for broadcast or multicast or DLF bcast+DLF | mcast+DLF | packets and set the limitation.
  • Page 58: Bandwidth Limitation

    Select the number of packets (of the type specified in the Type field) per second Rate the Switch can receive per second. Select Broadcast - to specify a limit for the amount of broadcast packets received per second. Type Multicast - to specify a limit for the amount of multicast packets received per second.
  • Page 59: Web Configuration

    6.1.2.2.3. Web Configuration Parameter Description Port Selects a port that you want to configure. Ingress Configures the rate limitation for the ingress packets. Egress Configures the rate limitation for the egress packets. Apply Click Apply to take effect the settings. Refresh Click Refresh to begin configuring this screen afresh.
  • Page 60 IGMP packets passing through it, picks out the group registration information, and configures multicasting accordingly. IGMP snooping allows the Switch to learn multicast groups without you having to manually configure them. The Switch forwards multicast traffic destined for multicast groups (that it has learned from IGMP snooping or that you have manually configured) to ports that are members of that group.
  • Page 61: Cli Configuration

    for which this router is the Querier, to solicit membership information. On startup, a router SHOULD send [Startup Query Count] General Queries spaced closely together [Startup Query Interval] in order to quickly and reliably determine membership information. A General Query is addressed to the all-systems multicast group (224.0.0.1), has a Group Address field of 0, and has a Max Response Time of [Query Response Interval].
  • Page 62 show igmp-snooping This command displays the current IGMP snooping enable counters counters. show igmp-snooping This command displays the current IGMP Queriers. enable querier show multicast This command displays the multicast group in IP enable format. configure clear igmp-snooping This command clears all of the IGMP snooping counters counters.
  • Page 63: Web Configuration

    igmp-snooping group- This command configures the maximum groups for the if-range limit VALUE specific ports. no igmp-snooping This command removes the limitation of the maximum if-range group-limit groups for the specific ports. igmp-querier-mode This command specifies whether or not and under what if-range (auto|fixed|edge) conditions the ports is (are) IGMP query port(s).
  • Page 64 Report Suppression Select Enable/Disable to activate/deactivate IGMP Snooping report State suppression function. Select Add and enter VLANs upon which the Switch is to perform IGMP snooping. The valid range of VLAN IDs is between 1 and IGMP Snooping 4094. Use a comma (,) or hyphen (-) to specify more than one VLAN State VLANs.
  • Page 65: Igmp Snooping Querier

    query packets. Fixed means the Switch always treats the port(s) as IGMP query port(s). This is for when connecting an IGMP multicast server to the port(s). Edge means the Switch does not use the port as an IGMP query port. In this case, the Switch does not keep a record of an IGMP router being connected to this port and the Switch does not forward IGMP join or leave packets to this port.
  • Page 66: Web Configurations

    6.2.2.2. Web Configurations Parameter Description Querier State This field configures the global Querier state. Querier VLAN This field enables the Querier state in a vlan or a range of vlan. State Apply Click Apply to apply the settings. Refresh Click this to reset the fields to the last setting. This filed indicates the current global Querier status.
  • Page 67: Web Configurations

    filtering all filtering profiles from the Switch. no igmp-snooping This command removes the IGMP snooping configure filtering STRINGS filtering profiles by name from the Switch. Group GROUP_ID start- This command configures the group config- address START-ADDR configurations, including group index and start igmp end-address END- multicast address and end multicast address.
  • Page 68 Parameter Description IGMP Filtering This field configures the global IGMP Filtering state. State Profile This field creates the IGMP Filtering profile. Type The field configures the type of action for the profile. Apply Click Apply to apply the settings. Refresh Click this to reset the fields to the last setting.
  • Page 69: Mvr

    Apply Click Apply to apply the settings. Refresh Click this to reset the fields to the last setting. Port Settings: Parameter Description Profile This field selects the profile which you want to activate on the ports. Activate IGMP Selects the ports which you want to activate the IGMP Filtering Filtering on Ports profile.
  • Page 70 MVR Mode  Dynamic Mode: If we select the dynamic mode in MVR setting, IGMP report message transmitted from the receiver port will be forwarded to a multicast router through its source port. Multicast router knows which multicast groups exist on which interface dynamically. ...
  • Page 71 Switch supports MVR MoD Server Receiver Ports VLAN1 VLAN2 VLAN3 VLAN4 VLAN5 VLAN6 Default Settings There is no MVR vlan. Default configuration for a new MVR: MVR VLAN Information VLAN ID Name : MVR2 Active : Enabled Mode : Dynamic Source Port(s) : None Receiver Port(s)
  • Page 72: Cli Configuration

    6.2.4.2. CLI Configuration Node Command Description show mvr This command displays the current MVR enable configurations. show mvr vlan This command displays the current MVR configurations enable VLANID of the specific VLAN. show igmp-snooping This command displays the current IGMP snooping enable configurations.
  • Page 73: Web Configuration

    6.2.4.3. Web Configuration MVR Settings Parameter Description VLAN ID Configures a VLAN. NAME Configures a name for the MVR. Priority Enable / Disable for the priority override. Override State Enables / Disables the MVR. Mode Configures the mode for the MVR. 802.1p The priority for these multicast group packets.
  • Page 74: Multicast Address

    Group Settings Parameter Description MVR VLAN Select a MVR VLAN. Group Name Configures the group name. Start Address Configures the multicast start address. Quantity Configures the quantity of the multicast address. 6.2.5. Multicast Address 6.2.5.1. Introduction A multicast address is associated with a group of interested receivers. According to RFC 3171, addresses 224.0.0.0 to 239.255.255.255, the former Class D addresses, are designated as multicast addresses in IPv4.
  • Page 75 Class Address Range Supports Supports 16 million hosts on each of 127 Class A 1.0.0.1 to 126.255.255.254 networks. Supports 65,000 hosts on each of 16,000 128.1.0.1 to 191.255.255.254 Class B networks. Supports 254 hosts on each of 2 million Class C 192.0.1.1 to 223.255.254.254 networks.
  • Page 76: Cli Configuration

    224.0.0.13 PIM Version 2 (Protocol Independent Multicast) 224.0.0.18 Virtual Router Redundancy Protocol 224.0.0.19 - 21 IS-IS over IP 224.0.0.22 IGMP Version 3 (Internet Group Management Protocol) 224.0.0.102 Hot Standby Router Protocol Version 2 224.0.0.251 Multicast DNS address 224.0.0.252 Link-local Multicast Name Resolution address 224.0.1.1 Network Time Protocol address 224.0.1.39...
  • Page 77: Explicit Host Tracking

    VLAN ID Configures the VLAN that you want to configure. Configures the multicast MAC which will not be aged out. Address Valid format is hh:hh:hh:hh:hh:hh. Port Configures the member port for the multicast address. Apply Click Apply to save your changes back to the Switch. Refresh Click Refresh to begin configuring this screen afresh.
  • Page 78: Vlan

    Index This field indicates the index of the entry. Port This field indicates the port of the entry. Multicast This field indicates the multicast address of the entry. Group This field indicates the vlan of the entry. Timeout This field indicates the remaining time in the table of the entry. Host IP This field indicates the host IP which joins the multicast group.
  • Page 79: Web Configuration

    “-” indicates the port’s packets cannot be sent to that port. port-isolation ports This command configures a port or a range of ports to interface PORTLISTS egress traffic from the specific port. no port-isolation This command configures all ports to egress traffic from interface the specific port.
  • Page 80: Q Vlan

    port currently being configured. Click Select All to mark all ports as egress ports and permit traffic. Select All/ Click Deselect All to unmark all ports and isolate them. Deselect All Deselecting all ports means the port being configured cannot communicate with any other port.
  • Page 81  Forwarding Tagged and Untagged Frames Each port on the Switch is capable of passing tagged or untagged frames. To forward a frame from an 802.1Q VLAN-aware switch to an 802.1Q VLAN-unaware switch, the Switch first decides where to forward the frame and then strips off the VLAN tag. To forward a frame from an 802.1Q VLAN-unaware switch to an 802.1Q VLAN-aware switch, the Switch first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port's default VID.
  • Page 82 vlan <1~4094> This command enables a VLAN and enters the VLAN configure node. no vlan <1~4094> This command deletes a VLAN. configure show This command displays the current VLAN vlan configurations. name STRING This command assigns a name for the specific VLAN. vlan The VLAN name should be the combination of the digit or the alphabet or hyphens (-) or underscores (_).
  • Page 83 add PORTLISTS This command adds a port or a range of ports to the vlan- vlans. range fixed PORTLISTS This command assigns ports for permanent member of vlan- the VLAN group. range no fixed PORTLISTS This command removes all fixed member from the vlan- vlans.
  • Page 84 6.3.2.3. Web Configuration VLAN Settings Parameter Description VLAN ID Enter the VLAN ID for this entry; the valid range is between 1 and 4094. Enter a descriptive name for the VLAN for identification purposes. The VLAN name should be the combination of the digit or the alphabet or VLAN Name hyphens (-) or underscores (_).
  • Page 85 Tag Settings Parameter Description Select a VLAN ID to configure its port tagging settings. VLAN ID Selecting a port which is a member of the selected VLAN ID will make Tag Port it a tag port. This means the port will tag all outgoing frames transmitted with the VLAN ID.
  • Page 86 Port Settings Parameter Description Select a port number to configure from the drop-down box. Port Select All to configure all ports at the same time. PVID Select a PVID (Port VLAN ID number) from the drop-down box. Specify the type of frames allowed on a port. Choices are All, VLAN Untagged Only or VLAN Tagged Only.
  • Page 87: Cli Configuration Web Configuration Garp/Gvrp

    6.3.3. GARP/GVRP 6.3.3.1. Introduction GARP and GVRP are industry-standard protocols that are described in IEEE 802.1p. GVRP is a GARP application that provides 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk ports. With GVRP, the switch can exchange VLAN configuration information with other GVRP switches, prune unnecessary broadcast and unknown unicast traffic, and dynamically create and manage VLANs on switches that are connected through 802.1Q trunk ports.
  • Page 88: Cli Configuration

    The value for leave must be greater than three times the join value (leave >= join * 3). The value for leaveall must be greater than the value for leave (leaveall > leave). Default Settings The default port Join Time is 20 for all ports. The default port Leave Time is 60 for all ports.
  • Page 89: Web Configuration

    6.3.3.3. Web Configuration GVRP Settings Parameter Description Select Enable to activate GVRP function to exchange VLAN GVRP State configuration information with other GVRP switches. Select Disable to deactivate the feature. Port Select the port that you want to configure the GVRP settings. Select Enable to activate the port GVRP function.
  • Page 90: Mac-Based Vlan

    GARP Timer Parameter Description Specifies the maximum number of milliseconds the interface waits before Join Time sending VLAN advertisements. Specifies the number of milliseconds an interface waits after receiving a Leave Time leave message before the interface leaves the VLAN specified in the message.
  • Page 91: Cli Configuration

    matched the MAC-based VLAN configures, the Switch replace the VLAN with user configured and them forward them. For example: Configurations: 00:01:02, VLAN=23, Priority=2. The packets with SA=00:01:02:xx:xx:xx will be forwarded to VLAN 22 member ports. Notices: The 802.1Q port base VLAN should be created first. 6.3.4.2.
  • Page 92: Protocol-Based Vlan

    VLAN Configures the VLAN. Priority Configures the 802.1Q priority. Action Click the “Delete” button to delete the protocol VLAN profile. 6.3.5. Protocol-based VLAN 6.3.5.1. Introduction The Protocol based VLAN allows users to create VLAN with packet frame type. The packet frame type can be one of the three frame types: EthernetII, NonLLC-SNAP and LLC-SNAP.
  • Page 93: Q- In -Q Vlan (Vlan Stacking )

    L2SWITCH(config)#protocol-vlan frame-type nonLLC-SNAP vlan 13 ports 3-4 L2SWITCH(config)#protocol-vlan frame-type ethernetII ether-type 0800 vlan 14 ports 1-2 6.3.5.3. Web Configuration Parameter Description Select one of three frame types, “EthernetIU” and “NonLLC-SNAP” Frame Type and “LLC-SNAP”. Ethernet type Input the Ethernet type for the EthernetII frame type. VLAN Configure the VLAN ID.
  • Page 94 decisions, similar to an Ethernet frame arriving from a physical Ethernet port. The SP VLAN tag determines the VPLS (Virtual Private LAN Service) membership. Double tagging aggregates multiple VLANs within another VLAN and provides a private, dedicated Ethernet connection between customers to reach their subnet transparently across multiple networks. Thus service providers can create their own VLANs without interfering with customer VLANs by using double tagging.
  • Page 95 tagged Etype frame TPID DA: Destination Address SA: Source Address Tunnel TPID: Tag Protocol Identifier added on a tunnel port P: 802.1p priority VID: VLAN ID Len or Etype: Length or Ethernet frame type Data: Frame data FCS: Frame Check Sequence VLAN Stacking Port Roles Each port can have three VLAN stacking “roles”, Normal, Access Port and Tunnel Port.
  • Page 96 This example shows how to configure switch A with ports 1 on the Switch to tag incoming frames with the service provider’s VID of 200 (ports are connected to customer X network) and configure port 7 to service provider’s VID of 100 (ports are connected to customer Y network). This example also shows how to set the priority for port 1 to 3 and port 7 to 4.
  • Page 97 L2SWITCH(config-if)# vlan-stacking port-based role tunnel L2SWITCH(config-if)# vlan-stacking tunnel-tpid index 2 L2SWITCH(config)# interface gigaethernet1/0/7 L2SWITCH(config-if)# vlan-stacking port-based role access L2SWITCH(config-if)# vlan-stacking spvid 100 L2SWITCH(config-if)# vlan-stacking priority 4 L2SWITCH(config)# interface gigaethernet1/0/8 L2SWITCH(config-if)# vlan-stacking port-based role tunnel L2SWITCH(config-if)# vlan-stacking tunnel-tpid index 2 L2SWITCH(config-if)# exite L2SWITCH(config)# exit L2SWITCH# show vlan-stacking L2SWITCH# show vlan-stacking tpid-table...
  • Page 98 L2SWITCH(config-vlan)# tagged 3 L2SWITCH(config-vlan)# exit L2SWITCH(config)# vlan 40 L2SWITCH(config-vlan)# fixed 3,4 L2SWITCH(config-vlan)# tagged 3 L2SWITCH(config-vlan)# exit L2SWITCH(config)# vlan 500 L2SWITCH(config-vlan)# fixed 3,4 L2SWITCH(config-vlan)# tagged 4 L2SWITCH(config-vlan)# exit L2SWITCH(config)# vlan 600 L2SWITCH(config-vlan)# fixed 3,4 L2SWITCH(config-vlan)# tagged 4 L2SWITCH(config-vlan)# exit L2SWITCH(config)# vlan 700 L2SWITCH(config-vlan)# fixed 3,4 L2SWITCH(config-vlan)# tagged 4 L2SWITCH(config-vlan)# exit...
  • Page 99: Cli Configuration

    L2SWITCH(config-if)# exit L2SWITCH(config)# exit L2SWITCH# show vlan-stacking L2SWITCH# show vlan-stacking tpid-table L2SWITCH# show vlan-stacking selective-qinq Default Setting: VLAN Stacking is disabled. 6.3.6.2. CLI Configuration Node Command Description enable show vlan-stacking This command displays the current vlan-stacking type. enable show vlan-stacking This command displays the selective Q-in-Q selective-qinq configurations.
  • Page 100 index <1-6> port. qinq active This command enables the selective Q-in-Q profile. qinq inactive This command disables the selective Q-in-Q profile. qinq cvid VLANID This command specifies the customer’s VLAN range on the incoming packets. qinq spvid VLANID This command sets the service provider’s VLAN ID for outgoing packets in selective Q-in-Q.
  • Page 101: Web Configuration

    6.3.6.3. Web Configuration VLAN Stacking Parameter Description Select one of the three modes, Disable or Port-Based or Selective for Action the VLAN stacking. Configures the TPID Table: The TPID table has 6 entries. Tunnel TPID Index Selects the table index. TPID Configures the TPID.
  • Page 102 Port-Based Q-in-Q Parameter Description Port Selects a port or a range of ports which you want to configure. Selects one of the three roles, Normal and Access and Tunnel, for the Role specific ports. SPVID Configures the service provider’s VLAN. Priority Configures the priority for the specific ports.
  • Page 103: Dhcp Option 82

    Parameter Description Name Configures the selective Q-in-Q profile name. Access Ports Configures a port or a range of ports for the access ports. Tunnel Ports Configures a port or a range of ports for the tunnel ports. CVID Configures a customer’s VLAN. SPVID Configures a service provider’s VLAN.
  • Page 104  The switch forwards the DHCP request that includes the option-82 field to the DHCP server.  The DHCP server receives the packet. If the server is option-82 capable, it can use the remote ID, the circuit ID, or both to assign IP addresses and implement policies, such as restricting the number of IP addresses that can be assigned to a single remote ID or circuit ID.
  • Page 105: Cli Configuration

    Rules:  The keyword must have a leading code ‘%’. For example: %HOSTNAME.  If there are any characters following the keywords, you must add ‘+’ between the keyword and character. For example: %HOSTNAME+/.  If there are any characters before the keyword, you must add ‘+’ between the character and the keyword.
  • Page 106: Web Configuration

    configurations. dhcp-options option82 This command disables / enables the DHCP option configure (disable | enable) 82 on the Switch. dhcp-options option82 This command configures the information of the configure circuit_id circuit ID sub-option. dhcp-options option82 This command configures the information of the configure remote_id remote ID sub-option.
  • Page 107: Dhcp Relay

    Parameter Description Select this option to enable / disable the DHCP option 82 on the State Switch. Circuit Frame The frame ID for the circuit sub-option. Circuit Shelf The shelf ID for the circuit sub-option. Circuit Slot The slot ID for the circuit sub-option. Circuit-ID String The String of the circuit ID sub-option information.
  • Page 108 converts them to unicast (with a destination MAC/IP address of the configured DHCP server, source MAC/IP of the router itself). The field identified as the GIADDR in the main DHCP page is populated with the IP address of the interface on the router it received the DHCP request on. The DHCP server uses the GIADDR field to identify the subnet the device and select an IP address from the correct pool.
  • Page 109: Cli Configuration

    VLAN 3: port 5, 6 VLAN 4: port 7, 8 DHCP Server  Port 1. DHCP Client  Port 2, 3, 4, 5, 6, 7, 8. Result: Hosts connected to port 2,3,4,5,6,7,8 can get IP from DHCP server. Note: The DHCP Server must connect to the management VLAN member ports. The DHCP Relay in management VLAN should be enabled.
  • Page 110: Web Configuration

    6.5.3. Web Configuration Parameter Description State Enables / disables the DHCP relay for the Switch. VLAN State Enables / disables the DHCP relay on the specific VLAN(s). DHCP Server IP Configures the DHCP server’s IP address. 6.6. DHCP Server 6.6.1. Introduction Dynamic Host Configuration Protocol (DHCP) uses Boot Strap protocol (BOOTP) for automatically configuring DHCP clients.
  • Page 111: Cli Configuration

    i. 1.2.0.0/16 ii. 1.2.3.0/20 And DHCP Server’s VLAN 10 host address should be same as interface address in router. As per above example, host address should 1.2.3.4. Better way is administrator has to configure Router before DHCP server configurations. 6.6.2. CLI Configuration Node Command Description...
  • Page 112 global option in DHCP server. dhcp-server pool <POOL_ID> This command creates new address pool, if it configure is not already exist. no dhcp-server pool This command disables all existing configure <POOL_ID> configurations on specifed address pool and deletes the pool from DHCP server pool list. network <IPADDR_MASK>...
  • Page 113: Link Aggregation

    parameter. This option allowed up to 8 addresses. no netbios-name-server This command disables already configured dhcp- <IPADDR> IP address from NetBios server parameter. server netbios-node-type (b-node|h- This command configures pool with NetBios dhcp- node|m-node|p-node) node type parameter. server no netbios-node-type (b- This command disables already configured dhcp- node|h-node|m-node|p-node)
  • Page 114: Cli Configuration

    Maximum link aggregation group : 6. Maximum port in link aggregation group : 8. 6.7.1.2. CLI Configuration Node Command Description show link-aggregation The command displays the current trunk enable configurations. link-aggregation [GROUP_ID] The command disables / enables the trunk configure (disable | enable) on the specific trunk group.
  • Page 115: Lacp

    Select the group ID to use for this trunk group, that is, one logical link Group State containing multiple ports. Select Enable to use this static trunk group. Load Balance Configures the load balance algorithm for the specific trunk group. Member Ports Select the ports to be added to the static trunk group.
  • Page 116: Cli Configuration

    smaller the number, the higher the priority level. System ID: The LACP system ID is the combination of the LACP system priority value and the MAC address of the router. Administrative Key: The administrative key defines the ability of a port to aggregate with other ports. A port's ability to aggregate with other ports is determined by these factors: ...
  • Page 117: Web Configuration

    no lacp port_priority This command configures the default for the priority interface for the specific port. interface range This command enters the interface configure node. configure gigabitethernet1/0/ PORTLISTS lacp port_priority <1- This command configures the priority for the specific if-range 65535>...
  • Page 118 LACP system priority is a number between 1 and 65,535. The switch with the lowest system priority (and lowest port number if system priority is the same) becomes the LACP “server”. The LACP “server” controls the System Priority operation of LACP setup. Enter a number to set the priority of an active port using Link Aggregation Control Protocol (LACP).
  • Page 119 LACP Info. Parameter Description Group ID Select a LACP group that you want to view. Neighbors Information Port The LACP member port ID. LACP system priority is used to determine link aggregation group System Priority (LAG) membership, and to identify this device to other switches during LAG negotiations.
  • Page 120: Link Layer Discovery Protocol (Lldp)

    Port State The port state of the LACP member port. 6.8. Link Layer Discovery Protocol (LLDP) 6.8.1. Introduction The Link Layer Discovery Protocol (LLDP) specified in this standard allows stations attached to an IEEE 802® LAN to advertise, to other stations attached to the same IEEE 802 LAN, the major capabilities provided by the system incorporating that station, the management address or addresses of the entity or entities that provide management of those capabilities, and the identification of the station’s point of attachment to the IEEE 802 LAN required by those...
  • Page 121: Web Configuration

    determines the TTL of the Switch’s message. (TTL=tx- hold * tx-interval) lldp-agent This command configures the LLDP agent function. interface (disable|enable|rx- disable – Disable the LLDP on the specific port. only|tx-only) enable – Transmit and Receive the LLDP packet on the specific port.
  • Page 122 State Globally enables / disables the LLDP on the Switch. Tx Interval Configures the interval to transmit the LLDP packets. Configures the tx-hold time which determines the TTL of the Switch’s Tx Hold message. (TTL=tx-hold * tx-interval) Time To Live The hold time for the Switch’s information.
  • Page 123: Loop Detection

    System Capabilities The neighbor’s capability. Management The neighbor’s management address. Address Time To Live The hold time for the neighbor’s information. 6.9. Loop Detection 6.9.1. Introduction Loop detection is designed to handle loop problems on the edge of your network. This can occur when a port is connected to a Switch that is in a loop state.
  • Page 124: Cli Configuration

    Disabled Normal Enabled 1 10 Disabled Normal Enabled 1 11 Disabled Normal Enabled 1 12 Disabled Normal Enabled 1 6.9.2. CLI Configuration Node Command Description show loop-detection This command displays the current loop detection enable configurations. loop-detection (disable | This command disables / enables the loop detection configure enable) on the switch.
  • Page 125: Web Configuration

    6.9.3. Web Configuration Parameter Description State Select this option to enable loop guard on the Switch. Enter the destination MAC address the probe packets will be sent to. MAC Address If the port receives these same packets the port will be shut down. Port Select a port on which to configure loop guard protection.
  • Page 126: Modbus

    Physical Output Read Holding Not support now Registers Registers MODBUS Data Map and Information Interpretation of VIVOTEK IE Switches MODBUS base address of VIVOTEK switches is 1001(decimal) for Function Code 4. Address Offset Data Type Interpretation Description System Information 0x0000...
  • Page 127 Word 6 Hi byte = ‘.’ Word 6 Lo byte = ‘\0’ 0x0020 16 words ASCII Product Name = “INS-8648” Word 0 Hi byte = ‘I’ Word 0 Lo byte = ‘N’ Word 1 Hi byte = ‘S’ Word 1 Lo byte = ‘-’ Word 2 Hi byte = ‘8’...
  • Page 128 Port Information 0x0100 to 1 word Port 1 to 10 Link Status 0x0109 0x0000: Link down 0x0001: 10M-Full-FC_ON (FC: Flow Control) 0x0002: 10M-Full-FC_OFF 0x0003: 10M-Half-FC_ON 0x0004: 10M-Half-FC_OFF 0x0005: 100M-Full-FC_ON 0x0006: 100M-Full-FC_OFF 0x0007: 100M-Half-FC_ON 0x0008: 100M-Half-FC_OFF 0x0009: 1000M-Full-FC_ON 0x000A: 1000M-Full-FC_OFF 0x000B: 1000M-Half-FC_ON 0x000C: 1000M-Half-FC_OFF 0xFFFF: No port 0x0200 to...
  • Page 129: Cli Configuration

    0x0511 1 word Status of Xpress-ring2 of the Switch 0x0000 : Disabled 0x0001 : Enabled 0x0512 3 word Destination MAC of the Xpress-ring1 Word 0 Lo byte = MAC0 Word 0 Hi byte = MAC1 Word 1 Lo byte = MAC2 Word 1 Hi byte = MAC3 Word 2 Lo byte = MAC4 Word 2 Hi byte = MAC5...
  • Page 130: Web Configuration

    This command disables / enables the Modbus on the configure modbus switch. (disable|enable) 6.10.3. Web Configuration Parameter Description State Select this option to enable / disable the Modbus on the Switch. Apply Click Apply to save your changes to the Switch. Refresh Click Refresh to begin configuring this screen afresh.
  • Page 131 Ethernet port. Standard PoE parameters and comparison Property 802.3af (802.3at Type 1) 802.3at Type 2 Power available at PD 12.95 W 25.50 W per mode Maximum power 15.40 W 30.00 W per mode delivered by PSE Voltage range (at PSE) 44.0 - 57.0 V 50.0 - 57.0 V Voltage range (at PD)
  • Page 132: Cli Configuration

    Default Settings State : Disabled Total Power(W) Port State Status Priority ---- ----------- ---------- -------- Disabled Disabled High Disabled Disabled High Disabled Disabled High Disabled Disabled High Disabled Disabled High Disabled Disabled High Disabled Disabled High Disabled Disabled High 6.11.1.2. CLI Configuration Node Command Description...
  • Page 133: Web Configuration

    6.11.1.3. Web Configuration Parameter Description Selects the PoE mode, classification or consumption. Classification - Allocated power according to class (0 to 4). PoE Mode Consumption - Allocated power according to the actual need of each Selects a port or a range of ports that you want to configure the PoE Port function.
  • Page 134: Introduction

    Total Power Displays the total power that the Switch supports. Total Consuming Displays the total consuming power for all of the PDs. Power External Power Displays the status of the external power module. Module Port Display the Port No. State Displays the PoE state for the specific port.
  • Page 135: Cli Configuration

    6.11.2.2. CLI Configuration Node Command Description show poe schedule port This command displays the PoE port schedule enable PORT_ID configurations. poe schedule (disable|enable) This command disables or enables the PoE interface schedule on the specific port. poe schedule week This command enables or disables the PoE interface (Sun|Mon|Tue|Wed|Thu|Fri|Sat) schedule on the specific day.
  • Page 136: Pd Alive Check

    Week Select a week day that you want to configure the schedule. Enables or Disables the PoE schedule on the specific port for a defined Check time period. Time (Hour) 6.11.3. PD Alive Check 6.11.3.1. Introduction The function has a global state configuration. If the global state configuration is enabled. The Switch will check the configurations of every port.
  • Page 137: Web Configuration

    probe packet. pd-alive interval This command configures the interval to send the Interface VALUE keep-a-live probe packets to check if the host is still alive for the specific port. pd-alive ip IP_ADDR This command configures the Host IP address which Interface connects to the specific port.
  • Page 138: Power Delay

    Interval The interval to send the packet probes to check if the host is still alive. The retry times when no response from the host for the keep-a-live Retry Time probe packet. The action to the Power Device when the system detects that the Power Action Device cannot respond the keep-a-live probe packet.
  • Page 139: Web Configuration

    6.11.4.3. Web Configuration Parameter Description Port Selects a port or a range of ports which you want to configure. State Enables/Disables the PoE Power Delay for the specific ports. Time The delay time for the specific ports. Apply Click Apply to take effect the settings. Refresh Click Refresh to begin configuring this screen afresh.
  • Page 140: Static Route

    6.12. Static Route 6.12.1. Introduction Static routes, which define explicit paths between two routers, cannot be automatically updated; you must manually reconfigure static routes when network changes occur. Static routes use less bandwidth than dynamic routes. No CPU cycles are used to calculate and analyze routing updates. IP forwarding IP forwarding provides on end to end delivery of IP packet between hosts with help of routers.
  • Page 141 ARP table. <IPv4_ADDR> <MAC_ADDR> This command deletes a static IPv6 ARP entry from configure no ipv6 arp ARP table. <IPv6_ADDR> <MAC_ADDR> interface vlan VLAN- This command enters the L3 interface node. configure ipv4 address This command assigns a specified IPv4 interface route A.B.C.D/M to the interface.
  • Page 142 Example: ➢ IP Forwarding Enable: This command is used to enable ip forwarding (routing). L2SWITCH(config)#ip forwarding enable ➢ IP Forwarding Disable: This command is used to disable ip forwarding. L2SWITCH(config)#no ip forwarding enable ➢ ARP proxy enable: This command is used to enable ARP proxy. L2SWITCH(config)#ip arp proxy enable ➢...
  • Page 143: Web Configuration

    6.12.3. Web configuration Parameter Description Global Settings IP Forwarding Enables / disables the IP forwarding globally. IP ARP Proxy Enables / disables the route to act as an ARP proxy globally. Adds a static IPv4 ARP entry in the ARP table. IPv4 ARP Table / Deletes a static IPv4 ARP entry from the ARP table.
  • Page 144: Stp

    The IP address for the entry. MAC: The MAC address for the entry. Route Settings vlan Specifics an interface vlan. Adds an IPv4 Interface Route / Static Route onto the interface vlan. / Deletes an IPv4 Interface Route / Static Route from the interface vlan. IPv4 Selects the route type, Interface Route or Static Route.
  • Page 145 notifies the network. Both RSTP and STP flush unwanted learned addresses from the filtering database. In STP, the port states are Blocking, Listening, Learning, Forwarding. In RSTP, the port states are Discarding, Learning, and Forwarding. Note: In this document, “STP” refers to both STP and RSTP. STP Terminology ...
  • Page 146 PathCost: Path cost is the cost of transmitting a frame on to a LAN through that port. It is recommended to assign this value according to the speed of the bridge, the slower the media, the higher the cost. How STP Works? After a bridge determines the lowest cost-spanning tree with STP, it enables the root port and the ports that are the designated ports for connected LANs, and disables all other ports that participate in STP.
  • Page 147  Disabled - Not strictly part of STP, a network administrator can manually disable a port 802.1w RSTP In 1998, the IEEE with document 802.1w introduced an evolution of the Spanning Tree Protocol: Rapid Spanning Tree Protocol (RSTP), which provides for faster spanning tree convergence after a topology change.
  • Page 148 value is from 0 to 240. Path Cost: The valid value is from 1 to 200000000. Higher cost paths are more likely to be blocked by STP if a network loop is detected. BPDU Guard This is a per port setting. If the port is enabled in BPDU guard and receive any BPDU, the port will be set to disable to avoid the error environments.
  • Page 149: Cli Configuration

    6.13.1.2. CLI Configuration Node Command Description show spanning-tree This command displays the spanning tree information enable active for only active port(s) show spanning-tree This command displays the spanning tree information enable blockedports for only blocked port(s) show spanning-tree This command displays the spanning tree information enable port detail PORT_ID for the interface port.
  • Page 150 spanning-tree This command configures enables/disables the STP interface (disable|enable) function for the specific port. spanning-tree This command configures enables/disables the interface bpdufilter bpdufilter function for the specific port. (disable|enable) spanning-tree This command configures enables/disables the interface bpduguard bpduguard function for the specific port. (disable|enable) spanning-tree This command enables/disables the BPDU Root guard...
  • Page 151: Web Configuration

    spanning-tree port- This command configures the port priority for the if-range priority <0-240> specific port. Default: 128. no spanning-tree port- This command configures the port priority to default for if-range priority the specific port. 6.13.1.3. Web Configuration General Settings Parameter Description Select Enabled to use Spanning Tree Protocol (STP) or Rapid Spanning Tree State...
  • Page 152 to 10 seconds. Priority is used in determining the root switch, root port and designated port. The switch with the highest priority (lowest numeric value) becomes the STP root switch. If all switches have the same priority, the switch with the lowest MAC address will then become the root switch.
  • Page 153 BPDU Filter Enables/Disables the BPDU filter function for the specific port. BPDU Guard Enables/Disables the BPDU guard function for the specific port. ROOT Guard Enables/Disables the BPDU root guard function for the specific port. Port Status Active The state of the STP function. The port role.
  • Page 154 STP Status Parameter Description Current Root Status MAC address This is the MAC address of the root bridge. Root refers to the base of the spanning tree (the root bridge). This field Priority displays the root bridge’s priority. This Switch may also be the root bridge.
  • Page 155: Mstp

    This is the time interval in seconds between BPDU (Bridge Protocol Hello Time Data Units) configuration message generations by the root switch. This is the maximum time (in seconds) the Switch will wait before changing states. This delay is required because every switch must receive information about topology changes before it starts to forward Forward Delay frames.
  • Page 156: Cli Configurations

    different MST configuration. A boundary port also connects to a LAN, the designated switch of which is either a single spanning-tree switch or a switch with a different MST configuration. At the boundary, the roles of the MST ports do not matter, and their state is forced to be the same as the IST port state (MST ports at the boundary are in the forwarding state only when the IST port is forwarding).
  • Page 157 show spanning-tree This command displays all of the instance enable mst instance configurations of the MSTP. show spanning-tree This command displays specific instance configurations enable mst instance <0-63> of the MSTP. show spanning-tree This command displays specific instance configurations enable mst instance <0-63>...
  • Page 158 instance STRING for the MSTP. port-priority <0-240> no spanning-tree mst This command resets the priority on the specific port for interface instance STRING the MSTP. port-priority spanning-tree mst This command enters the MSTP configure node. configure configuration no spanning-tree mst This command resets all of configurations for the configure configuration...
  • Page 159: Web Configurations

    6.13.2.3. Web Configurations General Settings: Parameter Description Select Enabled to use Spanning Tree Protocol (STP) or Rapid Spanning State Tree Protocol (RSTP) or Multiple Spanning Tree Protocol (MSTP). Selects the Spanning Tree running mode. STP - Spanning Tree Protocol. Mode RSTP - Rapid Spanning Tree Protocol.
  • Page 160 Action Click Delete button to delete this instance. Bridge Parameters: Parameter Description This is the maximum time (in seconds) the Switch will wait before changing states. This delay is required because every switch must receive information about topology changes before it starts to forward Forward Time frames.
  • Page 161 network. The allowed range is 6 to 40 seconds. Max Hops Instance Selects an instance which you want to configure. Configures the priority for the instance. Priority is used in determining the root switch, root port and designated port. The switch with the highest priority (lowest numeric value) becomes the STP root switch.
  • Page 162 Instance Selects a instance that you want to configure. Port Selects a port or a range of ports that you want to configure. Path Cost Configures the path cost for the specific port. Priority Configures the priority for the specific port. Port Selects a port or a range of ports that you want to configure.
  • Page 163 STP Status: Parameter Description Current Root Status Instance The Instance ID. MAC address This is the MAC address of the root bridge. Root refers to the base of the spanning tree (the root bridge). This field Priority displays the root bridge’s priority. This Switch may also be the root bridge.
  • Page 164: Xpress Ring

    6.14. Xpress Ring 6.14.1. Introduction The Xpress-Ring is a fast-acting, self-healing ring recovery technology that enables networks to recover from link failure within 10ms. Fast Link Recovery and Ring Redundancy are important features for increasing the reliability of non-stop systems. If the network is planned correctly with an arbiter Switch and ring ports, the network will recover from any segment failure within a very short time.
  • Page 165: Web Configuration

    (RING1|RING2) role for the ring on the Switch. (forwarder|arbiter) configure xpress-ring ring This command configures the primary port for the (RING1|RING2) ring on the Switch. primary-port PORTID Notice: If the global xpress ring is disabled or ring state is disabled, you can input 0 to reset the primary port.
  • Page 166 Role Configures the role for the ring. Primary Port Configures the primary port for the ring. Secondary Port Configure the secondary port for the ring. Xpress Ring Status State The current state of the ring. Destination MAC The destination MAC for the ring. Role The current role of the ring.
  • Page 167: Security

    7. Security 7.1. IP Source Guard IP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings. This feature helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
  • Page 168 Use DHCP snooping to filter unauthorized DHCP packets on the network and to build the binding table dynamically. This can prevent clients from getting IP addresses from unauthorized DHCP servers. Trusted vs. Untrusted Ports Every port is either a trusted port or an untrusted port for DHCP snooping. This setting is independent of the trusted/untrusted setting for ARP inspection.
  • Page 169 The DHCP server connected to an un-trusted port will be filtered. Default Settings The DHCP snooping on the Switch is disabled. The DHCP snooping is enabled in VLAN(s): None. Maximum Maximum Port Trusted Host Count Port Trusted Host Count ---- --------- -------------- ------ ---------- -----------------...
  • Page 170: Cli Configuration

     DHCP Client-1 can get an IP address. 3. Enable the global DHCP Snooping and VLAN 1 DHCP Snooping. A. L2SWITCH(config)#dhcp-snooping B. L2SWITCH(config)#dhcp-snooping vlan 1 C. DHCP Client-1: ipconfig /release D. DHCP Client-1: ipconfig /renew  DHCP Client-1 cannot get an IP address. ;...
  • Page 171: Web Configuration

    dhcp-snooping host This command configures the maximum host count for if-range the specific ports. no dhcp-snooping This command configures the maximum host count to if-range host default for the specific ports. dhcp-snooping trust This command configures the trust port for the specific if-range ports.
  • Page 172 Apply Click Apply to take effect the settings. Refresh Click Refresh to begin configuring this screen afresh. DHCP Snooping Status DHCP Snooping This field displays the current status of the DHCP snooping feature, State Enabled or Disabled. This field displays the VLAN IDs that have DHCP snooping enabled Enabled on VLAN on them.
  • Page 173: Dhcp Server Screening

    7.1.1.4. DHCP Server Screening 7.1.1.4.1. Introduction The Switch supports DHCP Server Screening, a feature that denies access to rogue DHCP servers. That is, when one or more DHCP servers are present on the network and both provide DHCP services to different distinct groups of clients, the valid DHCP server’s packets will be passed to the client.
  • Page 174: Binding Table

    Server Screening List This field displays the index number of the DHCP server entry. Click the number to modify the entry. IP Address This field displays the IP address of the DHCP server. Action Click Delete to remove a configured DHCP server. 7.1.2.
  • Page 175: Web Configuration

    7.1.2.3. Web Configuration Static Entry Settings Parameter Description MAC Address Enter the source MAC address in the binding. IP Address Enter the IP address assigned to the MAC address in the binding. VLAN ID Enter the source VLAN ID in the binding. Port Specify the port in the binding.
  • Page 176: Arp Inspection

    Binding Table Bindings are used by DHCP snooping and ARP inspection to distinguish between authorized and unauthorized packets in the network. The Switch learns the dynamic bindings by snooping DHCP packets and from information provided manually in the Static Entry Settings screen. Parameter Description MAC Address...
  • Page 177: Cli Configuration

    Dynamic ARP inspection ensures that only valid ARP requests and responses are relayed. The switch performs these activities:  Intercepts all ARP requests and responses on untrusted ports.  Verifies that each of these intercepted packets has a valid IP-to-MAC address binding before it updates the local ARP cache or before it forwards the packet to the appropriate destination.
  • Page 178: Web Configuration

    configurations. arp-inspection This command disables/enables the ARP Inspection configure (disable | enable) function on the switch. arp-inspection vlan This command enables the ARP Inspection function on a configure VLANID VLAN or range of VLANs. no arp-inspection This command disables the ARP Inspection function on a configure vlan VLANID VLAN or range of VLANs.
  • Page 179: Filter Table

    Enter the VLAN IDs you want the Switch to enable ARP Inspection for. VLAN State You can designate multiple VLANs individually by using a comma (,) and by range with a hyphen (-). Select the ports which are trusted and deselect the ports which are untrusted.
  • Page 180: Cli Configuration

     When MAC address filter table of ARP Inspection is full, the Switch receives unauthorized ARP packet, and it automatically creates a SYSLOG and drop this ARP packet. The SYSLOG event happens on the first time. Default Settings The mac-filter age time : 5 minutes.
  • Page 181: Acl

    This field displays a sequential number for each MAC address filter. MAC Address This field displays the source MAC address in the MAC address filter. VLAN This field displays the source VLAN ID in the MAC address filter. Port This field displays the source port of the discarded ARP packet. This field displays how long (in minutes) the MAC address filter Expiry (min) remains in the Switch.
  • Page 182: Cli Configuration

    Command: destination ip host IPADDR 3. Filter a range of source IP address. Command: source ip IPADDR IPADDR The second IPADDR is a mask, for example: 255.255.0.0 4. Filter a range of destination IP address. Command: destination ip IPADDR IPADDR L4 ACL Support: 1.
  • Page 183 profile. destination mac host This command configures the destination MAC and MACADDR mask for the profile. destination mac This command configures the destination MAC and MACADDR mask for the profile. MACADDR destination mac This command configures the destination MAC and MACADDR mask for the profile.
  • Page 184 PORT_ID profile. no source interface This command removes the source interface from the PORT_ID profile. Where the MAC mask allows users to filter a range of MAC in the packets’ source MAC or destination MAC. For example: source mac 00:01:02:03:04:05 ff:ff:ff:ff:00 ...
  • Page 185: Web Configuration

    7.2.3. Web Configuration Parameter Description IP Type Selects IPv4 / IPv6 type for the profile. Profile Name The access control profile name.
  • Page 186 Action Selects Disables / Drop / Permits / DSCP action for the profile. Ethernet Type Configures the Ethernet type of the packets that you want to filter. VLAN Configures the VLAN of the packets that you want to filter. Source MAC Configures the source MAC of the packets that you want to filter.
  • Page 187: Introduction

    Apply Click Apply to add/modify the settings. Refresh Click Refresh to begin configuring this screen afresh. 7.3. 802.1x 7.3.1. Introduction IEEE 802.1X is an IEEE Standard for port-based Network Access Control ("port" meaning a single point of attachment to the LAN infrastructure). It is part of the IEEE 802.1 group of networking protocols.
  • Page 188 When the client provides the login credentials, the Switch sends an authentication request to a RADIUS server. The RADIUS server validates whether this client is allowed access to the port. Local User Accounts By storing user profiles locally on the Switch, your Switch is able to authenticate users without interacting with a network authentication server.
  • Page 189: Cli Configuration

    Specify a period of the time the client has to wait before the next re-authentication attempt. This will prevent the Switch from becoming overloaded with continuous re-authentication attempts from the client. The acceptable range for this field is 0 to 65535 seconds. ...
  • Page 190: Web Configuration

    server-ip <IP> port PORTID key KEY dot1x radius This command configures the secondary radius server. configure secondary-server-ip <IP> port PORTID dot1x radius This command configures the secondary radius server. configure secondary-server-ip <IP> port PORTID key no dot1x radius This command removes the secondary radius server. configure secondary-server-ip dot1x username...
  • Page 191 Parameter Description Select Enable to permit 802.1x authentication on the Switch. State Note: You must first enable 802.1x authentication on the Switch before configuring it on each port. Select whether to use Local or RADIUS as the authentication method. The Local method of authentication uses the “guest” and “user” user groups of the user account database on the Switch itself to authenticate.
  • Page 192 UDP Port The default port of a RADIUS server for authentication is 1812. Specify a password (up to 32 alphanumeric characters) as the key to be shared between the external RADIUS server and the Switch. This key is Share Key not sent over the network.
  • Page 193 Port Settings Parameter Description Port Select a port number to configure. Select Enable to permit 802.1x authentication on the port. 802.1x State You must first enable 802.1x authentication on the Switch before configuring it on each port. Select Both to drop incoming and outgoing packets on the port when Admin Control a user has not passed 802.1x port authentication.
  • Page 194 unauthorized. No packets can pass through this port. Select Disable to disable Guest VLAN on the port. Guest VLAN Select Enable to enable Guest VLAN on the port. Specify the amount of times the Switch will try to connect to the Max-req Time authentication server before determining the server is down.
  • Page 195: Port Security

    This field displays how often a client has to re-enter his or her Reauth period username and password to stay connected to the port. This field displays the period of the time the client has to wait before Quiet period the next re-authentication attempt.
  • Page 196: Web Configuration

    (disable|enable) function on the specific port. port-security limit This command configures the maximum MAC entries interface VALUE on the specific port. interface range This command enters the interface configure node. configure gigabitethernet1/0/ PORTLISTS port-security This command enables / disables the port security if-range (disable|enable) function for the specified ports...
  • Page 197 This field displays if Port Security is Enabled or Disabled State Maximum MAC This field displays the maximum number of MAC addresses...
  • Page 198: Monitor

    8. Monitor 8.1. Alarm 8.1.1. Introduction The feature displays if there are any abnormal situation need process immediately. Notice: The Alarm DIP Switch allow users to configure if send alarm message when the corresponding event occurs. For Example: P1: ON, The Switch will send alarm message when port 1 is link down. PWR: ON, The Switch will send alarm message when the main power supply disconnect.
  • Page 199: Hardware Information

    8.2. Hardware Information 8.2.1. Introduction The feature displays some hardware information to monitor the system to guarantee the network correctly. A. Displays the board’s and CPU’s and MAC chip’s temperature. B. Displays the 1.0V and 2.5V and 3.3V input status. 8.2.2.
  • Page 200: Port Statistics

    8.3. Port Statistics 8.3.1. Introduction This feature helps users to monitor the ports’ statistics, to display the link up ports’ traffic utilization only. 8.3.2. CLI Configuration Node Command Description This command displays the link up ports’ statistics. enable show port-statistics Example: L2SWITCH#show port-statistics Packets...
  • Page 201: Port Utilization

    8.4. Port Utilization 8.4.1. Introduction This feature helps users to monitor the ports’ traffic utilization, to display the link up ports’ traffic utilization only. 8.4.2. CLI Configuration Node Command Description This command displays the link up ports’ traffic enable show port-utilization utilization.
  • Page 202: Web Configuration

    8.5.3. Web Configuration Parameter Description Port Select a port or a range of ports to display their RMON statistics. Show Show them. Clear Clear the RMON statistics for the port or a range of ports. 8.6. SFP Information 8.6.1. Introduction The SFP information allows user to know the SFP module’s information, such as vendor name, connector type, revision, serial number, manufacture date, and to know the DDMI information if the SFP modules have supported the DDMI function.
  • Page 203: Web Configuration

    8.6.3. Web Configuration Parameter Description Port Select a port number to configure. Apply Click Apply to display the SFP information. Fiber Cable To indicate if the fiber cable is connected. Connector Code of optical connector type. Vendor Name SFP vendor name. Vendor PN Part Number.
  • Page 204: Cli Configuration

    The function will monitor the broadcast / multicast / broadcast and multicast packets rate. If the packet rate is over the user’s specification, the port will be blocked. And if the recovery function is enabled, the port will be enabled after recovery time. Default Settings Packet Packet...
  • Page 205: Web Configuration

    This command configures the packet rate and packet type if-range traffic-monitor rate for the traffic monitor on the port. RATE_LIMIT type bcast – Broadcast packet. (bcast|mcast|bcast+m mcast – Multicast packet. cast) This command enables / disables the recovery function if-range traffic-monitor for the traffic monitor on the port.
  • Page 206 Packet Type Specify the packet type which you want to monitor. Packet Rate Specify the packet rate which you want to monitor. Enables / disables the recovery function for the traffic monitor Recover State function on these ports. Configures the recovery time for the traffic monitor function on these Recovery Time ports.(Range: 1 –...
  • Page 207: Management

    9. Management 9.1. SNMP 9.1.1. SNMP 9.1.1.1. Introduction Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF).
  • Page 208: Cli Configuration

     The maximum entry for trap receiver : 5. 9.1.1.2. CLI Configuration Node Command Description show snmp This command displays the SNMP configurations. enable snmp community This command configures the SNMP community name. configure STRING (ro|rw) trusted-host IPADDR snmp (disable|enable) This command disables/enables the SNMP on the configure switch.
  • Page 209 Select Enable to activate SNMP on the Switch. SNMP State Select Disable to not use SNMP on the Switch. Type a System Name for the Switch. System Name (The System Name is same as the host name) System Location Type a System Location for the Switch. System Contact Type a System Contact for the Switch.
  • Page 210: Snmp Trap

    management station in dotted decimal notation, for example 255.255.255.0. Apply Click Apply to configure the settings. Refresh Click Refresh to begin configuring this screen afresh. Community Name List This field indicates the community number. It is used for identification only. Click on the individual community number to edit the community settings.
  • Page 211: Snmp V 3

    Community String Specify the community string used with this remote trap station. Apply Click Apply to configure the settings. Refresh Click Refresh to begin configuring this screen afresh. Trap Receiver List This field displays the index number of the trap receiver entry. Click the number to modify the entry.
  • Page 212: Web Configuration

    snmp view VIEWNAME configure To identify the subtree. STRINGS (included|excluded) no snmp user USERNAME configure This command removes a v3 user from switch. GROUPNAME This command removes a v3 group from configure no snmp group GROUPNAME switch. no snmp view VIEWNAME This command removes a v3 view from configure STRINGS...
  • Page 213 (pass phrases must be at least 8 characters long!) Priv Algorithm Select DES encryption when security level is priv. Set the password for this user when security level is priv. (pass phrases Priv Password must be at least 8 characters long!) Apply Click Apply to configure the settings.
  • Page 214 Security Level Select the security level of the v3 group to use. Note that if a group is defined without a read view than all objects are Read View available to read. (default value is none.) if no write or notify view is defined, no write access is granted and no Write View objects can send notifications to members of the group.
  • Page 215: Auto Provision

    Parameter Description Enter the v3 view name for creating an entry in the SNMPv3 MIB View Name view table. The OID defining the root of the subtree to add to (or exclude from) the View Subtree named view. Select included or excluded to define subtree adding to the view or View Type not.
  • Page 216: Cli Configuration

    2. If AUTO_PROVISION_VER is biggest than current auto provision version, do step 3; otherwise, wait 24 hours and go back to step 1. 3. If the Firmware_Upgrade_State =1, do step 4; otherwise, do step 6. 4. If the Firmware_Version is difference than current firmware version, download the Firmware_Image_File and upgrade firmware.
  • Page 217: Web Configuration

    IPADDR server’s IP. protocol The command configurations the upgrade protocol. auto-provision (tftp|http|ftp) FTP-user username The command configurations the username and auto-provision STRING password password for the FTP server. STRING folder STRING The command configurations the folder for the auto auto-provision provision server.
  • Page 218: Reference

    ----------------------------------------------- State : Disabled. Server IP : 0.0.0.0 Server Port : 25 Mail From Mail To Trap Event Status: ----------------------------------------------- System Reboot : Disabled. Port Link Change : Disabled. Configuration Change : Disabled. Firmware Upgrade : Disabled. User Login : Disabled. Port Blocked : Disabled.
  • Page 219: Cli Configuration

    9.3.3. CLI Configuration Node Command Description show mail-alarm This command displays Mail Alarm enable configurations. configure mail-alarm (disable|enable) This command disables / enables the Mail Alarm function. configure mail-alarm auth-account This command configures the Mail server authentication account. configure mail-alarm mail-from This command configures the mail sender.
  • Page 220: Maintenance

    Server IP Specifies the mail server’s IP address. Server Port Specifies the TCP port for the SMTP. Account Name Specifies the mail account name. Account Password Specifies the mail account password. Mail From Specifies the mail sender. Mail To Specifies the mail receiver. Trap State Enables / disables the mail trap event states.
  • Page 221: Web Configuration

    L2SWITCH(config-if)#ip address default-gateway 172.20.1.1 L2SWITCH(config-if)#management vlan 1 Enable the DHCP client function for the switch.  L2SWITCH#configure terminal  L2SWITCH(config)#interface eth0  L2SWITCH(config-if)#ip dhcp client enable L2SWITCH#show config-change-status The user configuration file is default. The configurations have been modified. 9.4.2. Web Configuration Save Configurations Press the Save button to save the current settings to the NV-RAM (flash).
  • Page 222 Upload / Download Configurations to /from a your server Follow the steps below to save the configuration file to your PC.  Select the “Press “Download” to save configurations file to your PC”.  Click the “Download” button to start the process. Follow the steps below to load the configuration file from your PC to the Switch.
  • Page 223: Server Control

    Reboot Reboot allows you to restart the Switch without physically turning the power off. Follow the steps below to reboot the Switch.  In the Reboot screen, click the Reboot button. The following screen displays.  Click OK again and then wait for the Switch to restart. This takes up to two minutes. This does not affect the Switch’s configuration.
  • Page 224: Web Configuration

    no web server This command disables the web on the Switch. configure 9.4.3.2. Web Configuration Parameter Description Server Settings Web Server State Selects Enable or Disable to enable or disable the Web service. Telnet Server State Selects Enable or Disable to enable or disable the Telnet service. SSH Server State Selects Enable or Disable to enable or disable the SSH service.
  • Page 225: System Log

    9.5. System log 9.5.1. Introduction The syslog function records some of system information for debugging purpose. Each log message recorded with one of these levels, Alert / Critical / Error / Warning / Notice / Information. The syslog function can be enabled or disabled. The default setting is disabled. The log message is recorded in the Switch file system.
  • Page 226: Web Configuration

    9.5.3. Web Configuration Parameter Description Enter the Syslog server IP address in dotted decimal notation. For Server IP example, 192.168.1.1. Select Enable to activate switch sent log message to Syslog server when any new log message occurred. Select Alert/Critical/Error/Warning/Notice/Information Log Level choose which log message to want see.
  • Page 227: Cli Configuration

     normal read only. ; Cannot enter the privileged mode in CLI. ; Cannot apply any configurations in web. The Switch also supports backdoor user account. In case of that user forgot their user name or password, the Switch can generate a backdoor account with the system’s MAC. Users can use the new user account to enter the Switch and then create a new user account.
  • Page 228: Web Configuration

    9.6.3. Web Configuration Parameter Description User Name Type a new username or modify an existing one. Type a new password or modify an existing one. Enter up to 32 User Password alphanumeric or digit characters. Select with which group the user associates: admin (read and write) or User Authority normal (read only) for this user account.

Table of Contents