Chapter 1 Product Introduction Congratulations on your purchasing of the Web Smart Ethernet Switch. Before you install and use this product,please read this manual carefully for full exploiting the functions of this product . 1.1 Product Overview The Web Smart Ethernet Switch provides the seamless network connection. This device integrates 1000Mbps Gigabit Ethernet, 100Mbps Fast Ethernet and 10Mbps Ethernet network capabilities...
1.3 External Component Description 1.3.1 Front Panel The front panel of the Switch consists of 24 x 10/100/1000Mbps RJ-45 ports,2 x SFP ports,1 x Console port, 1 x Reset button and a series of LED indicators as shown as below. Figure 1 - Front Panel 10/100/1000Mbps RJ-45 ports (1~24): Designed to connect to the device with a bandwidth of 10Mbps, 100Mbps or 1000Mbps.
The following chart shows the LED indicators of the Switch along with explanation of each indicator. COLOR STATUS STATUS DESCRIPTION Power On Power Power Off 10/100Mbps: A device is connected to the port LNK/ACT/ Amber Speed A device is disconnected to the port 1000Mbps: (1~24) Green...
1.4 Package Contents Before installing the Switch, make sure that the following the "packing list" listed OK. If any part is lost and damaged, please contact your local agent immediately. In addition, make sure that you have the tools install switches and cables by your hands. ...
Chapter 2 Installing and Connecting the Switch This part describes how to install your Web Smart Ethernet Switch and make connections to it. Please read the following topics and perform the procedures in the order being presented. 2.1 Installation Please follow the following instructions in avoid of incorrect installation causing device damage and security threat.
2.1.2 Rack-mountable Installation in 19-inch Cabinet The Switch can be mounted in an EIA standard-sized, 19-inch rack, which can be placed in a wiring closet with other equipment. To install the Switch, please follow these steps: attach the mounting brackets on the Switch’s side panels (one on each side) and secure them with the screws provided.
with the included power cord, and check the power indicator is ON or not. When it is ON, it indicates the power connection is OK. 2.2 Connect Computer (NIC) to the Switch Please insert the NIC into the computer, after installing network card driver, please connect one end of the twisted pair to RJ-45 jack of your computer, the other end will be connected to any RJ-45 port of the Switch, the distance between Switch and computer is around 100 meters.
Chapter 3 How to Login the Switch 3.1 Switch to End Node Use standard Cat.5/5e Ethernet cable (UTP/STP) to connect the Switch to end nodes as described below. Switch ports will automatically adjust to the characteristics(MDI/MDI-X, speed, duplex) of the device to which is connected. Please refer to the LED Indicator Specification.
Page 13
Figure 7- Login Windows Switching language to english .Enter the Username and Password (The factory default Username is admin and Password is admin), and then click “login” to log in to the Switch configuration window as below.
Chapter 4 Switch Configuration The Web Smart Ethernet Switch Managed switch software provides rich layer 2 functionality for switches in your networks. This chapter describes how to use Web-based management interface(Web UI) to this switch configure managed switch software features. In the Web UI, the left column shows the configuration menu.
Page 15
【parameter description】 parameter description VLAN ID VLAN number,24GE default VLAN 1 VLAN name VLAN mark Manage IP Manage the IP address of the VLAN device name Switch name Manage VLAN Switches management in use of the VLAN 【instructions】 Native VLAN: as a Trunk, the mouth will belong to a Native VLAN. The so-called Native VLAN, is refers to UNTAG send or receive a message on the interface, is considered belongs to the VLAN.
Page 16
2) click“next step” button ,into other settings,such as : manage ip address set as 192.168.2.11,device name set as switch-123,default gateway with the dns server set as 172.16.1.241 Use 192.168.2.11 to log in, set a new password for 1234...
4.2 PORT In the navigation bar to select “PORT”,You may conduct basic config, port aggregation, port mirroring , port limit and port isolation. 4.2.1 Basic config In the navigation bar to select “PORT>basic config”,For panel port to port described , port speed, port status, working mode, flow control, cross line order configuration, the following picture: 【parameter description】...
Can choose the following kinds: Aggregation port speed 10 M 100 M 1000 M Can choose the following kinds: Self negotiated working mode 10 M 100 M 1000 M port described The port is described Cross line sequence Whether open intersection line sequence 【instructions】...
Page 19
【parameter description】 parameter description 26GE switch can be set up eight link trunk group, group_1 to Aggregation port group_8 For each of the members of the group and add your own port, Member port and with members of other groups 【instructions】...
4.2.3 Port mirroring In the navigation bar to select “PORT>port mirroring”,Open port mirror feature,All packets on the source port are copied and forwarded to the destination port,Destination port is usually connected to a packet analyzer to analyze the source port,Multiple ports can be mirrored to a destination port,the following picture: 【parameter description】...
4.2.4 Port rate-limit In the navigation bar to select “PORT>port rate-limit ”, To port output, input speed limit,the following picture: 【parameter description】 parameter description Set port input speed Input speed limit Set port output speed Output speed limit...
【instructions】 1 Mbit/s = 1000 Kbit/s = 1000 / 8 KB/s = 125 KB/s . That is, the theoretical rate of 1M bandwidth is125KB/s . 【Configuration example】 Such as: the port 9 input rate is set to 6400 KB/s, the output rate is set to 3200 KB/s 4.2.5 Storm control In the navigation bar to select “PORT>Storm control”, To port storm control config,the following ficture:...
【instructions】 1 Mbit/s = 1000 Kbit/s = 1000 / 8 KB/s = 125 KB/s . That is, the theoretical rate of 1M bandwidth is125KB/s . 【Configuration example】 Such as: should be forwarded to the port 1-8 of all kinds of packet forwarding rate is 5000 KB/s 4.2.6 Port isolation In the navigation bar to select “PORT>port isolation ”,...
Port will be isolated Isolated port 【instructions】 Open port isolation function, All packets on the source port are not forwarded from the isolated port, the selected ports are isolated. Ports that have been added to the aggregate port aren't also capable of being a destination port and source port, destination port and source port cannot be the same 【Configuration example】...
4.3.1 VLAN config In the navigation bar to select“VLAN config”,Vlans can be created and set the port to the VLAN (port default state for the access mode) ,the following picture: 【parameter description】 parameter description VLAN ID VLAN number,24GE default VLAN 1 VLAN name VLAN mark VLAN IP address...
4.3.2 Trunk-port setting In the navigation bar to select“VLAN config>trunk-port setting”,can set port to Trunk port,the following picture: 【parameter description】 parameter description Native VLAN Only set one Allowing vlan Can set up multiple 【instructions】 Native VLAN: as a Trunk, the mouth will belong to a Native VLAN. The so-called Native VLAN, is refers to UNTAG send or receive a message on the interface, is considered belongs to the VLAN.
PC3:192.168.2.124,port 10, access VLAN1(The default port belongs to VLAN1) Can let the PC2 PING PC1, cannot PING PC3 4.3.3 Hybrid-port setting In the navigation bar to select“VLAN config>hybrid-port setting”,Can set the port to take the tag and without the tag ,the following picture: 【instructions】...
Such as: create vlans 10, 20, VLAN sets the Native VLAN port 1 to 10, to tag VLAN for 10, 20, sets the Native VLAN port 2 to 20, to tag VLAN for 10, 20 This system e0/1 and the receive system e0/2 PC can be exchanged, but when each data taken from a VLAN is different.
4.4.1 Anti attack 4.4.1.1 Anti DHCP attack In the navigation bar to select“fault/safety>anti attack>anti dhcp attack”,Open the DHCP anti-attack function, intercepting counterfeit DHCP server and address depletion attack packets ban kangaroo DHCP server,the following picture: 【instructions】 DHCP trusted port configuration,select the port as a trusted port. Prohibit DHCP for address, select the port and save, you can disable this feature for the port。...
Page 30
Set the connection router 10 ports for trust, then 12 port is set to the prohibit 3.Verify source mac F0:DE:F1:12:98:D2,set server ip address to 192.168.2.1 4.Set option82 information...
5.The port 7 for binding 4.4.1.2 Anti DOS In the navigation bar to select“fault/safety>anti attack>anti dhcp attack”,Open the anti DOS attack function, intercept Land attack packets, illegal TCP packets, to ensure that the device or server to provide normal service to legitimate users.,the following picture:...
【instructions】 Open the anti DOS attack function, intercept Land attack packets, illegal TCP packets, to ensure that the device or server to provide normal service to legitimate users. 【Configuration example】 Such as:Open the anti DOS attack function 4.4.1.3 IPsource guard In the navigation bar to select“fault/safety>anti attack>ip source guard”,Through the source port security is enabled, on port forwarding the packet filter control, prevent illegal message through the port, thereby limiting the illegal use of network resources, improve...
4.4.1.4 Anti three bind In the navigation bar to select“fault/safety>anti attack>anti three bind”,Automatically detect the port based IP address, MAC address of the mapping relationship, and then realize the function of a key binding,the following picture:...
Page 34
【instructions】 A bond must be bound before the binding to enable the switch to open,And if you want to access shall be binding and switch the IP address of the same network segment 。 【Configuration example】 Such as: the binding to make first can open, must be a key bindings port 7 Can check the delete option.
4.4.2 Channel detection 4.4.2.1 Ping testing In the navigation bar to select“fault/safety> channel detection>ping testing”,Use ping function to test internet connect and host whether to arrive. The following picture : 【parameter description】 parameter description destination IP address Fill in the IP address of the need to detect Timeout period Range of 1 to 10 Repeat number...
4.4.2.2 Tracert testing In the navigation bar to select“fault/safety> channel detection>tracert testing”,Tracert detection can detect to the destination through the .following picture : 【parameter description】 parameter description destination IP address Fill in the IP address of the need to detect Timeout period Range of 1 to 10 【instruction】...
【Configuration example】 Such as: PING connect the IP address of the PC 4.4.2.3 Cable testing In the navigation bar to select“fault/safety> channel detection>cable tracert testing”,Can detect connection device status ,the following picture: 【Configuration example】...
4.4.3 ACL In the navigation bar to select“fault/safety>ACL”,Can be applied to port ACL rules and Settings to take effect in time 【instruction】 The ACL rules are sequenced, row in front of the match will be priority rule. Many, if the strategy items operating time is relatively longer.
4.5 MSTP In the navigation bar to select“MSTP”,you can set to the MSTP region and MSTP bridge configuration。 4.5.1 MSTP region In the navigation bar to select“MSTP>MSTP region”,Can modify the domain and domain name, add instance is mapped to a VLAN.the following picture 【parameter description】...
4.5.2 MSTP bridge In the navigation bar to select“MSTP>MSTP bridge”,Can be related to bridge, port configuration,the following picture: 【parameter description】...
Page 42
parameter description inst-priority Whether open instance priority setting Instance ID Select the created instance id is configured enable Whether to open the STP bridge function Priority setting bridge example, the default Bridge priority instance bridge priority for 32768 mode The model is divided into: the STP, RSTP, MSTP Hello-time Switches sends bpdus in packet interval Ports are not yet received a message in the time,...
Page 43
2)Set MSTP has launched port configuration, select the created instance, set priority (port configuration is not online, on-line configuration will only take effect, can click on the "view the current configuration" button to view the configured completed)
4.6 DHCP relay In the navigation bar to select“DHCP relay”,you can set to the DHCP relay option82。 4.6.1 DHCP relay In the navigation bar to select“DHCP relay”,Open the DHCP relay function, set up and view the relay server IP address and its status.the following picture...
【parameter description】 parameter description IP address DHCP server address status Invalid and vaild 【instruction】 If open the function of relay agent, then receives the broadcast DHCP message, to be delivered in the form of unicast to configure on the server. The DHCP server to IP and switches in the same network segment will only take effect.
Page 46
【parameter description】 parameter description VLAN id the DHCP request message in the VLAN, value range is 1 ~ 4094 Circuit control Circuit ID to populate the user custom content, scope of string length is 3 ~ 63 Proxy remote Configuration ASCII remote id string value, the length of the range of 1 ~ 63 IP address Decimal IP address...
4.7 QoS In the navigation bar to select“QoS”,you can set to the Remark、queue config and mapping the queue。 4.7.1 Remark In the navigation bar to select“QoS>Remark”,According to the rules for port traffic bag tag or queue map。the following picture...
Page 48
【parameter description】 parameter parameter By setting the rule of heavy tag index number, the current switch Rule index can be set up 32 rule Choose always said - match the match, all the data for tags Choose can be set to equal matching rules, comply with the rules Operation type of heavy tag data Adaptable to the rules of the heavy tag which data is mapped to a...
4.7.2 Queue config In the navigation bar to select“ QoS>queue config”,Can be set up queue scheduling policy 。the following picture: 【parameter description】 parameter description Can choose four kinds of modes: Scheduling strategy RR round-robin scheduling...
SP absolute priority scheduling WRR weighted round-robin scheduling WFQ weighted fair scheduling Set the weights of each queue, they will be in proportion to occupy WRR-weights the bandwidth to send data 【instruction】 Queue 7 can not for 0. 【Configuration example】 Such as: set the scheduling strategy for WRR, weight value respectively, 10, 11, 12, 12, 14, 15, 16, 17.
Such as: cos 3 mapping to the queue 7, set the queue weight 7 to 10 4.7.3.2 Differential service class mapping In the navigation bar to select“QoS>mapping the queue>differential service class mapping”,Differential service can be mapped to the corresponding service categories.the following picture: 【parameter description】...
Such as: the DSCP value of 3, 12,23 mapping to cos 5 4.7.3.3 Port to service class mapping In the navigation bar to select“QoS>mapping the queue>port to service class mapping”,Port can be mapped to the corresponding service categories。the following picture: 【parameter description】...
Such as:port 4、5、6 respectively cos4、cos5、cos6. 4.8 Address table In the navigation bar to select“Address table”,you can set to MAC add and delete、 MACstudy and aging and MAC address filtering。...
4.8.1 Mac add and delete In the navigation bar to select“Address table>Mac add and delete”,You can add static Mac and delete Mac and view to the current of the Mac address table.the following picture: 【parameter description】 parameter description Can choose to clear the multicast Mac address, clear dynamic unicast Mac address, clear static unicast Mac address, clear the Clear Mac specified Mac address, Mac address table...
【Configuration example】 Such as: 1) the port 6 Mac set to static Mac 2)clear port 6 static Mac addresses 4.8.2 Mac study and laging In the navigation bar to select“address table>Mac study and laging”,Can be set up port Mac address study limit and Mac address aging time . the following picture: 【parameter description】...
parameter description Mac address Range 0-8191,default 8191 Mac address study limit Default 300 【Configuration example】 Such as: 1) setting port 5, 6, 7, 8 address study limit for 2000 2) will be dropped or learn the Mac address of the port equipment after 2 minutes disappear automatically from the Mac address table 4.8.3 Mac address filtering In the navigation bar to select“address table>Mac address table”,Can be filtered...
Such as: the Mac address for 00:20:15:09:12:12 added to the filter in the table 4.9 Snmp config In the navigation bar to select“Snmp”,you can set to the Snmp config and Rmon config。 4.9.1 Snmp config 4.9.1.1 Snmp config In the navigation bar to select“Snmp >Snmp config”,you can Snmp function enable。the following picture:...
【instruction】 The SNMP function must be turned on in the configuration RMON, otherwise it will be configured to fail 【Configuration example】 Such as: open Snmp 4.9.1.2 Community config In the navigation bar to select“Snmp >Snmp config>community config”,Can specify group access. the following picture 【parameter description】...
4.9.1.3 View config In the navigation bar to select“Snmp >Snmp config>view config”,Set the view the rules to allow or disable access to some of the MIB object. the following picture 【parameter description】 parameter description View name Wiew mane include Indicate the MIB object number contained within the view exclude Indicate the MIB object son number was left out of view MIB subtree OID...
4.9.1.4 Group config In the navigation bar to select“Snmp>Snmp config>group config”,setting Snmp group。 the following picture 【parameter description】 parameter description Group name Group name Attestation not only encryption: this group of users transmission of the message need to verify the data don't need to confidential No authentication encryption: this group of users' messages don't need to verify data transmission also does not need to be kept secret...
4.9.1.5 User config In the navigation bar to select“Snmp>Snmp config>user config”,setting Snmp user。 the following picture: 【parameter description】 parameter description User name,range 1-16 User name Attestation not only encryption: this group of users transmission of the message need to verify the data don't need to confidential No authentication encryption: this group of users' messages don't need to verify data transmission also does not need to be kept secret...
protocol Group name A user group name encrypt password Range 8-60 【instruction】 Cap on the number configuration of 8, users need a new view and group to use, the user's security level must be consistent with the group level of security. Add a user authentication and encryption, and configure belong to groups of users, the user will be used for Snmpv3 connection.
protocol Group name User group name 【instruction】 The Trap cap on the number configuration of 8, you can configure a number of different Snmp Trap host used to receive messages. Trigger the trap message time: port Linkup/LinkDown, equipment of cold - start (restart when power supply drop)/warm - start (a warm restart), and Rmon set port port statistical fluctuation threshold.
parameter description index The index number, the value range of statistical information table is 1 ~ 65535 Interface mane To monitor the source port ower Set the table creator, range: 1 ~ 30 characters of a string 【instruction】 At the time of configuration Rmon Snmp functions must be open, otherwise the prompt dialog box will appear.
【parameter description】 parameter description index Historical control table item index number, value range is 1 ~ 65535 Interface name To record the Ethernet interface Maximum number of Set the history control table item of the corresponding table samples capacity, namely the Max for number of records the history table, value range is 1 ~ 65535 Sample period Set up the statistical period, scope for 5 ~ 3600, the unit is in...
send the Trap message Log events, when the event is triggered, the system will log owner Set the table creator, ownername for 1 ~ 30 characters of a string 【instruction】 At the time of configuration Rmon Snmp functions must be open, otherwise the prompt dialog box will appear.
Sampling interval Sampling time interval, the scope for 5 ~ 65535, the unit for seconds The sampling type Sample types for the absolute value of sampling, the sampling time arrived directly extracting the value of a variable The latest sampling Sampling type for change value sampling, extraction of the arrival of the sampling time is variable in the change of the sampling interval value...
update、config management、config save、administor privileges and info collect。 4.10.1 System config 4.10.1.1 System settings In the navigation bar to select“SYSTEM>system config>System settings”,Basic information set switch. the following picture: 【parameter description】 parameter description Device name switch name Manage VLAN Switches use VLAN management Manage ip Switch IP address management timeout...
Page 69
Such as: 1) set up the VLAN 2 is management VLAN, should first created vlan 2 the VLAN Settings, and set a free port in the VLAN 2 2) insert the PC interface 9 or 10 ports, set up the management IP for 192.168.2.12, device name is yoyo, timeout for 20 minutes ,Jumboframe for 5000.
3) use 192.168.1.12 logging in, sets the system time 4.10.1.2 System restart In the navigation bar to select“SYSTEM>system config>system restart”,equipment can be restarted. the following picture:...
【instruction】 Click the button to restart the switch.The restart process may take 1 minute. Please wait patiently. The page will be refreshed automatically after device restart. 【Configuration example】 Such as:click“restart”button 4.10.1.3 Password change In the navigation bar to select“SYSTEM>system config>password change”,The password change to equipment.
1. If you set a new Web login password, then log in again after seting the new password. 2. Password can not contain Chinese, full-width characters, question marks and spaces. 3.If forget the password reset, can be reset in the console. switch(config)# password admin New Password:3456 Confirm Password:3456...
4.10.1.5 Telnet login In the navigation bar to select“SYSTEM>system config>Telnet login”,Telnet open。The following picture: 【instruction】 Configure the user to be able to switch through the Telnet login device. 【Configuration example】 Such as:Telnet open,PC Telnet functiono open,you can log in 4.10.1.6 System log In the navigation bar to select“SYSTEM>system config>system log”,to view the log and set up the log server.
Page 74
【parameter description】 parameter description Log switch Open and close Server ip Appoint to server address Send log level Enter the required query of characters 【instruction】 Open log switch, set up the syslog server, system log will automatically be pushed to the server.
4.10.2 System upgrade In the navigation bar to select“SYSTEM>system upgrade”,Optional upgrade file to upgrade. the following picture 【instruction】 1 please confirm that the upgraded version of the same model and the same model. 2 in the upgrade process, you may encounter flash to make the page is temporarily unable to respond to the page, this time can not power off or restart the device, until prompted to upgrade successfully!
4.10.3 Config management 4.10.3.1 Current configuration navigation select“SYSTEM>config management>current configuration”,can import and export configuration files, the backup file. the following picture: 【instruction】 Import process can not be closed or refresh the page, or import will fail! After the introduction of configuration, to enable the new configuration, please in this page Restart device Otherwise configuration does not take effect.
4.10.3.2 Configuration backup navigation select“SYSTEM>config management>configuration backup”,you can configure backup file。the following picture: 【instruction】 Operating this page should be in the current configuration page first, the backup file. 【Configuration example】 Such as:restore backup...
4.10.3.3 Restore factory configuration In the navigation bar to select“SYSTEM>config management>restore factory configuraton”,Can export the current configuration and restore factory configuration .the following picture: 【instruction】 Restore the factory configuration, will delete all the current configuration. If you have any useful configuration, the current system can lead the factory configuration again after the current configuration.
4.10.4 Config save In the navigation bar to select“SYSTEM >config save”,you can save current configuration。the following picture 【instruction】 Save settings will delete all default configurations. If there are useful configurations, clickbackup Configurationsbefore save the settings. 【Configuration example】 Such as:click“save settings”button...
4.10.5 Administrator privileges In the navigation bar to select“SYSTEM>administrator privileges”,Configurable ordinary users. the following picture 【instruction】 Only the admin of the super administrator can access this page is used to manage users and visitors. The user can log in the Web management system of equipment for routine maintenance.
Page 82
【instruction】 collect useful infomation,it may take a few moment. 【Configuration example】 Such as: click on "collect" button...
Need help?
Do you have a question about the SW-MNG-24GE2GSFP and is the answer not in the manual?
Questions and answers