Certification Inscape Data Corporation certifies that this product met its published specifications at time of shipment from the factory. FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
Page 3
Product (if any), the Hardware will be free from defects in material and workmanship under normal use. The date of shipment of a Product by Inscape Data is set forth on the packaging material in which the Product is shipped. This limited warranty extends only to the original user of the Product.
COURSE OF DEALING, LAW, USAGE, OR TRADE PRACTICE, ARE HEREBY EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW AND ARE EXPRESSLY DISCLAIMED BY INSCAPE DATA, ITS SUPPLIERS AND LICENSORS. TO THE EXTENT AN IMPLIED WARRANTY CANNOT BE EXCLUDED, SUCH WARRANTY IS LIMITED IN DURATION TO THE EXPRESS WARRANTY PERIOD.
Page 5
1-Year Limited Hardware Warranty Terms The following are special terms applicable to your hardware warranty. Your formal Warranty Statement, including the warranty applicable to Inscape Data software, appears in the End User License Agreement that accompanies your Inscape Data product.
Page 6
SOFTWARE, YOU ARE BINDING YOURSELF AND THE BUSINESS ENTITY THAT YOU REPRESENT (COLLECTIVELY, “CUSTOMER”) TO THE AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THE AGREEMENT, THEN INSCAPE DATA IS UNWILLING TO LICENSE THE SOFTWARE TO YOU AND (A) YOU MAY NOT DOWNLOAD,...
Page 7
Software in any manner (including on CD-ROM, or on-line). In order to use the Software, Customer may be required to input a registration number or product authorization key and register Customer’s copy of the Software online at Inscape Data’s website to obtain the necessary license key or license file.
Page 8
Data. Customer shall implement reasonable security measures to protect such trade secrets. To the extent required by applicable law, and at Customer’s written request, Inscape Data shall provide Customer with the interface information needed to achieve interoperability between the Software and another independently created program, on payment of Inscape Data’s applicable fee, if any.
Page 9
Software and any Documentation. Customer’s rights under the Agreement will terminate immediately without notice from Inscape Data if Customer fails to comply with any provision of the Agreement. Upon termination, Customer shall destroy all copies of Software and Documentation in its possession or control.
Page 10
(b) the Software substantially conforms to the Documentation. The date of shipment of a Product by Inscape Data is set forth on the packaging material in which the Product is shipped. Except for the foregoing, the Software is provided “AS IS”.
Page 11
Software to Customer may, at its option, require return of the Software and/or Documentation as a condition to the remedy. In no event does Inscape Data warrant that the Software is error free or that Customer will be able to operate the Software without problems or interruptions. In...
Page 12
AGENTS, SUPPLIERS AND LICENSORS COLLECTIVELY, TO CUSTOMER, WHETHER IN CONTRACT, TORT (INCLUDING NEGLIGENCE), BREACH OF WARRANTY OR OTHERWISE, SHALL NOT EXCEED THE PRICE PAID BY CUSTOMER TO INSCAPE DATA FOR THE SOFTWARE THAT GAVE RISE TO THE CLAIM OR IF THE SOFTWARE IS PART OF ANOTHER PRODUCT, THE PRICE PAID FOR SUCH OTHER PRODUCT.
Page 13
CONSEQUENTIAL, INCIDENTAL, OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY OR WHETHER ARISING OUT OF THE USE OF OR INABILITY TO USE SOFTWARE OR OTHERWISE AND EVEN IF INSCAPE DATA OR ITS SUPPLIERS OR LICENSORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Page 14
Customer has accepted the Software or any other product or service delivered by Inscape Data. Customer acknowledges and agrees that Inscape Data has set its prices and entered into the Agreement in reliance upon the disclaimers of warranty and the limitations...
Safety Summary The following general safety precautions must be observed during all phases of operation of this instrument. Failure to comply with these precautions or with specific warnings elsewhere in this manual violates safety standards of design, manufacture, and intended use of the instrument. Inscape Data Corporation assumes no liability for the customer’s failure to comply with these requirements.
Page 17
Do not operate the product in the presence of flammable gases or fumes. Chassis Power Connection Before connecting or disconnecting ground or power wires to the chassis, ensure that power is removed from the device. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the device, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.
Foreword Introduction This manual is written for LPS1800 Managed PoE (Power over Ethernet) Switch, and all the major functions of the fast Ethernet switch are described in detail. Through reading of this manual, you will understand the functions of the switch’s characteristic, port Settings, VLAN, QoS Settings, and so on various system configurations.
Chapter 1 Access Device Access Method Via the WEB login to the device configuration page, to conduct all the configuration management, including switches port Settings and VLAN Settings, and so on through the WEB pages. You can use a Web browser (it is recommended to use the Internet Explorer5.0 above). Login Configuration All network ports of this device support WEB management equipment, IP management by default 192.168.2.1, subnet mask: 255.255.255.0, the default gateway: 192.168.2.254.
Page 22
In the "user name" and "password" column Users input corresponding user name and password, press [sure], can enter the configuration main page. Note: Default login ID: “admin” and login password: “system”. Corresponding user name and password can be modified in the 【 password setting】. After successfully login, the main page is displayed as below: Page left margin lists respectively each option directory, right border shows the switch’s “advanced features”...
Chapter 2 Switch Management Authentication Configuration Click “Authentication configuration” in the directory (Administrator) of the “switch management” on the left side, go to the following page This page is used to modify the current login user name and password Click "Update" configuration. If you modify successfully, then it will go to the following page: Click on the “back”, re-enter the password Settings page.
Note: the user name and password can only use letters or Numbers. System IP Configuration Click “System IP Configuration” in the directory “Administrator” of the “Switch Management “on the left side, go to the following page: Here, you can configure the IP Address, Subnet Mask, Gateway, and IP Configure of the switch. IP address configuration can’t be all zeros, all F and multicast address .Click "Update"...
In “comment “(machine identifier) input box, input machine id, click the “Update” (submit) can modify successfully, the marks will be shown in the login page. Load Default Setting Restore the default value of the switch configuration back to the initial state, but does not include the IP address of the device, the user name and password.
Firmware Update / Upgrade The switch firmware update and upgrade can be done the following two ways: Web Browser Click directory [ the directory [ on the left jump Firmware Update] listed in Administrator] side, following page Enter the password and confirm (the same as the user password), click "Update" to enter the flash erase page, after the flash erase will pop up the following page Click on the "browse”, select the upgrade file that you need in the file selection box, click "Update"...
Firmware upgrade is complete, click the "Continue" TFTP upgrades After the flash erase, in Microsoft's command line window to run a TFTP client program, here assumes that the IP address is 192.168.2.1 for the equipment, input format: c: \ TFTP -i 192.168.2.1 put file path \ filename.
Chapter 3 Port Setting Port Configuration In port configuration page, setting the port features include: automatic negotiation (Auto-Negotiation), speed rate (Speed), Duplex mode (Duplex), flow control (802.3 x/backpressure) and port learning (Addr. Learning) function In [the Select Port No.] Port, check the configuration on the function of the drop-down box to choose Port configuration, click "Update"...
【Port status 】bar refers to the actual status of port link after consultation. Port Mirroring The system provides port-based mirroring, you can assign one or more ports packets copied to monitoring port, used to analyze and monitor packets. As shown below, the [destination port] (Dest Port), select the mirror port, in [Source Port] (Source Port) is selected to be mirrored port.
Bandwidth Control In this function, the user can configure the maximum sending rate and receiving rate for each port. Rate granularity as follows: Low: 32Kbps and High: 512Kbps. The formula: maximum transmit / receive rate = Rate control (0 ~ 255) x 32 kbps (low bandwidth) = Rate control (0 ~ 255) x 512 kbps (high bandwidth) Click [Submit] (Update) is configured successfully.
Note: if the selected port connection rate is less than the bandwidth control rate, the system will be connected rate as bandwidth control rate. Broadcast Storm Control As shown in [ Port Enable] (Enable Port) , the selected configuration port , it says the maximum broadcast packets of the port...
Chapter 4 VLAN Setting VLAN mode VLAN mode is divided into the Port -based VLAN and Tag Base VLAN. The default mode is the Port - based VLAN mode. The following figure: Click "Change VLAN Mode” can be switched systems VLAN mode. In the Tag Base VLAN mode page, the user can configure the port Tag property three kinds: Tag, Unmodify...
Note: if the connection to end is a PC card, generally it’s unable to identify 802.1 Q Tag. In this case, please set the corresponding port to Untagged properties VLAN Member Based on the system, VLAN mode can be divided into: 1.
Page 36
Port] (Dest PORT) used for uplink port settings, [ members port selection (select) used for down link port setting, [ Restore Default] (Load Default) to restore the default settings For example, set port 16 to be uplink port , set port 01 to 15 to be the downlink ports , so that, the port 16 of the switch will forward...
Chapter 5 Port Packet Count 5.1 Port Packet Count Port Count mode includes four types: the Receive Packet & Transmit Packet, the Transmit Packet & Collision Count, the Receive Packet & Drop the Packet and the Receive Packet & CRC error Packet. After choosing type, click the "submit"...
Page 38
Note: system does not automatically refresh the count, must manually click on the "refresh". When the count value reaches the maximum value, will be reset automatically Page 38 Revision 1.0...
Chapter 6 QoS Setting Priority Mode Priority mode including: First-in priority scheduling( First - In - First Out) When Queue scheduling, according to the time order of message in the queue, switch to first-in priority scheduling rule processing first message system (by default) for the pattern. Strict priority scheduling (All - High - Before - Low) When Queue scheduling, All - High - Before - Low, in strict accordance with the order of the priority from High to Low priority to send groups of higher priority queue, when the higher...
Chapter 7 Packet Security Filter MAC Address Binding The following figure, "binding" state that can enable effective, otherwise is invalid, "read" binding MAC value for read port. Each port can be bound 3 groups of MAC address, the binding of MAC message will not be forwarded.
TCP/UDP Filter 【Function Enable】(Function Enable) drop-down boxes“ Enable ”makes this function be available , otherwise it is invalid. 【Port Filter rules】(Port Filter Rule) option Deny is said the selected protocol Port message is discarded, other protocol Port is forwarded message, Allow is said the selected protocol Port is forwarded message, other protocol Port packet is discarded.
Chapter 8 Spanning Tree Settings STP Bridge Settings There is an example of STP Bridge Setting: STP mode: disable、stp、rstp Bridge Priority:0-61440 Hello Time:1-10 seconds Max Age:6-40 seconds Forward Delay:4-30 seconds Page 42 Revision 1.0...
STP Port Settings 1.STP Port Settings To set port priority and port path cost 2. STP Port Status To display port path cost, priority, forward status, STP port states, and so on Page 43 Revision 1.0...
Loopback Detection Settings 1. Loopback Detect Function Enable: on; Disable: off 2. Auto Wake Up Enable: on Disable: off 3. Wake-Up Time Interval Open Auto wake up, there are loop of ports Discard the duration of the state. Page 45 Revision 1.0...
Chapter 9 Link Aggregation Settings Link Aggregation Settings Link Aggregation Settings function are divided into four strategies: the port ID, SA, DA and SA&DA as per hash logic relations based on relations System by default is the port ID type. Note: alone choose a port as Link Aggregation is void Settings.
Chapter 9 DHCP Relay Agent Configuration 10.1 DHCP Relay Agent Setting 【DHCP Relay State】: when selecting “ Enable “ , its function is on ; when selecting “ Disable “ , it’s off . Hops count limit range is 1 ~ 16. 【DHCP Relay Option 82 state】when selecting “ Enable “ , its function is on ;...
Chapter 11 Configuration Backup/Recovery 11.1 Configuration Backup/Recovery 1. Configuring Backup Click ”download”(Download) the file download box will pop up, choose path to save to the local in Bin file format. 2.Configuring Recovery Click on the "Browse", the file selection box will pop up, open the configuration file in the corresponding local path .
Chapter 12 Miscellaneous 12.1 Miscellaneous Setting Miscellaneous Setting includes: 1. The output queue aging time: The Output Queue Packet Aging time can be set to 200 ms, 400 ms, 600 ms and 800 ms, Disable shows no aging. 2. VLAN Striding After the feature enabled, even two ports are not in the same VLAN, the switch will also forward destination MAC known single broadcast packets to the port of destination.
Chapter 13 Hardware Default Value Recovery 13.1 Hardware Default Value Recovery Before the users to start, i.e., turn on, the switch for the first time, it is suggested that to restore the default hardware setting. After switch on electricity, hold down the RESET button, loosen after 5 seconds .The switch will automatically restore the default Settings, you can see the System LED flashing.
Appendix 1 Common Fault Diagnosis Fault phenomenon Fault causes Solving methods When Power up, Power supply connection all the lights are error or the power supply is Check the power cord and plug not bright not normal Cable damage; Cable type error;...
Appendix 2 Terminology Descriptions Terminologies Descriptions The main path of transmission between network segment Backbone traffic network The bandwidth of network channel usually indicates the ability Bandwidth of network data transmission channel Due to a large number of broadcast packets Ethernet packet , Broadcast Storm make network congestion , this caused by network failure IEEE802.3 short terminology, said 10 MBPS Ethernet on the...
Page 55
data Medium interface, it is the name of the connector that’s used between the transceiver and media to set up physical and electrical connection Cross media interface, it can send the sending signal of a MDIX device to the receiving end of another device , and vice versa. RJ-45 A 8-pin module connector used in Twisted-pair link A network packets forwarding process according to the...
Appendix 3 Network Cable Production RJ-45 connector Figure 1 RJ-45 connector Attached figure 1 is a RJ - 45 connector (the pressed the twisted-pair RJ - 45), from top to bottom, pin number named are from 1 to 8 in turn. Table 1 shows the function definition of each pin about the RJ - 45 connector on the MDI mode function Table 2 shows the function definition of each pin about the RJ - 45 connector on the MDIX mode...
Table 2 MDIX interface pin assignment Pin No. Signal Function RxData+ receiving data RxData- receiving data TxData+ sending data reserve reserve TxData - sending data reserve reserve Network Cable Production blue Pair 1 white/blue orange Pair 2 white/orange green Pair 3 white/green brown Pair 4...
Page 58
Chart 2 is the production of Cat5 twisted-pair RJ - 45 connector Ethernet cable sample, reference for users to use.Cat5 twisted pair is composed of 8-core thread, use the color of the thread on the outer insulation layer to group identity. Usually use single color and monochrome with white as standard in pairs, also coloring point pairs are identified.
Need help?
Do you have a question about the LinkPower LPS1800 Series and is the answer not in the manual?
Questions and answers