Eneo IAR-7SH1024MMA User Manual

Gigabit switch, managed, 390w, 4x sfp 10g, 24x poe, 10/100/1000 mbps, 19”, 1he

Advertisement

Quick Links

EN

User Manual

Gigabit
Switch,
Managed,
390W, 4x SFP 10G, 24x PoE,
10/100/1000 Mbps, 19", 1HE
IAR-7SH1024MMA

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IAR-7SH1024MMA and is the answer not in the manual?

Questions and answers

Summary of Contents for Eneo IAR-7SH1024MMA

  • Page 1: User Manual

    User Manual Gigabit Switch, Managed, 390W, 4x SFP 10G, 24x PoE, 10/100/1000 Mbps, 19”, 1HE IAR-7SH1024MMA...
  • Page 2: Table Of Contents

    Content Product Introduction................................4 Overview...................................4 Product Feature................................ 4 Board Diagram................................5 Specification................................6 Installation.................................... 6 Shipping List................................7 Installation Precautions............................7 Installation Way................................ 9 Cable Connection..............................11 Function Configuration Guide............................12 Computer Requirements............................12 Set Up Network Connection...........................12 Web Page Configuration Guide..........................16 Quick Guide..................................
  • Page 3 Chapter 12 IP Route................................65 11.1 IP Route..................................65 11.2Routing table configuration............................66 System Management..............................68 12.1 IP Address................................68 12.2 Username and password............................70 12.3 SNMP Setup................................71 12.4 Log Output................................74 12.5 File Management..............................75 Console Interface Settings..............................76 13.1 Login Equipment Console Interface........................76...
  • Page 4: Product Introduction

    1 Product Introduction 1.1 Overview The switch series contain 24 ports switch(PoE and no PoE) and 16 ports switch(PoE and no PoE). 24 ports PoE Gigabit managed Ethernet switch(abbreviated to 24P switch), which provide 24* PoE Gigabit downlink Ethernet ports , 4* 10Gigabit uplink SFP ports . The Products support IEEE 802.3 af/at ,support Web layer-3 network management and PoE management.
  • Page 5: Board Diagram

    1.3 Board Diagram 16 P ort s sw i t ch(16S ) ↓ 1 1 1 3 1 5 P o w e r 1 1 2 1 4 1 6 2 10G BASE X × × 1 0 G B A S E 24 P ort s sw i t ch(24S ) ↓...
  • Page 6: Specification

    1.4 Specification Products are subject to change without prior notice. 2 Installation Caution Anti-counterfeiting label is attached to switch's cover. Product damage caused by unauthorized disassembly is not covered under warranty.
  • Page 7: Shipping List

    2.1 Shipping List Please check the following items before installation, if any missing, please contact your local dealer. the 24S and 16S switch have redundance power module, including 2 AC power lines. 2.2 Installation Precautions To avoid device damage or personal injury by improper use, please observe the following precautions.
  • Page 8  The switch will work normally under the correct voltage. Please ensure the voltage indicated on the switch corresponds to the power voltage;  To avoid the danger of electric shock, please do not open the switch case. Do not open the switch case even if the switch is powered off;...
  • Page 9: Installation Way

     Use electromagnetic shielding if necessary, such as shielded cable;  Interface cables should be arranged indoor rather than outdoor to prevent over-voltage or over-current damage to the signal port. 2.3 Installation Way There are 3 installation ways: rack, workbench and wall-hung installation. Caution Please pull out the power plug before installing or moving the switch.
  • Page 10 installed at rack’s bracket steadily. Figure 2 2 Install switch to the rack Instruction This product’s fixing hangers are just to fix the switch rather than support it. Use brackets under the device (fixed to the rack) to support switch when install the switch to the rack. 2.3.2 Workbench Installation You can put this product on clean, stable, grounded workbench.
  • Page 11: Cable Connection

    (2) Drill holes on the strong position of wall and then drive the rubber plug into the hole; (3) Drive these screws into the hole for the rack and fix the product by aiming at the rubber plug . 2.4 Cable Connection 2.4.1 Device Connection Use cross network cable or cross-over cable to connect PC or other device with switch's Ethernet port;...
  • Page 12: Function Configuration Guide

    the another side with external AC power socket; (2)Turn on the power ,check if switch's AC power LED is on, that means power connected correctly; (3)Use the power plug snap to jammed the AC Power cable. 3 Function Configuration Guide 3.1 Computer Requirements ...
  • Page 13 the router can do the job above. (4) This product can't assign the IP address for the management PC, you need to set the management static IP by yourself. 3.2.1 Set Static IP for the Management Computer al connection property" windoOperation steps (take Windows XP as sample): (1) Click <start>...
  • Page 14 (3)Select "Internet protocol (TCP/IP), click <property> button, enter”Internet protocol (TCP/IP) property” window. Select “ use the IP address below” button, input IP address ( use arbitrary value between 192.168.1.1~192.168.1.254, besides 192.168.1.200) and the subnet mask(255.255.255.0). Click "OK" to finish the configuration. Instruction DNS server address can be empty or be filled in with the real server address.
  • Page 15 check if the network connection is correct. 3.2.3 Cancel the Proxy Server If this management PC use proxy server to visit the internet, then you must prohibit the proxy service, following is the operation: (1) In browser, select [ tool/Internet option] enter [Internet option] window. (2) Select “connection”...
  • Page 16: Web Page Configuration Guide

    (3) Make sure the “Use proxy server for LAN”option is not selected. If selected, please cancel it and click <yes> button. The menu bar has the following options: [System Status], [Port Configuration], [VLAN Settings], [QoS management], [link management], [Port Security], [network management], [Network Statistics], [System management], [Exit] and drop-down menu bar of the "language switching function".
  • Page 17 Caution Please follow the steps to check if the switch is installed correctly: (1) Whether the physical connection of the equipment is correct? Use network cable to connect the product’s Ethernet port(except the console port) with managed computer network card, and ensure the link LED of the port is on. (2) Whether the computer TCP/IP agreement setting is correct? Your computer's IP address must be 192.168.1.x (x range is 1~254 and x can not be 200, otherwise it will conflict with the product IP address 192.168.1.200 ), subnet mask:...
  • Page 18: Quick Guide

    Web English language switching page diagram Environment protection This product design is environmental friendly and the product should be stored, used and dicarded in accordance with relevant national legal / regulatory requirements. 4 Quick Guide 4.1 Quick Guide 4.1.1 Port VLAN setting: Enter the [Quick Guide] page, you can see port range, link type, PVID, VLAN forwarding table, click <configuration>...
  • Page 19 number in the port range; if you set a group of ports, you can use "," or "-" separated. "," Is used to set a set of discrete ports, such as 1,3,5. "-" is used to set up a set of consecutive ports, such as link type Select the link type of the port according to the different processing mode of the tag on the port when...
  • Page 20 4.1.2 Configure the interface attribute for each virtual VLAN Enter the [Quick Guide] page, you can see network interface, IP address settings, etc., click the <configuration> button to modify the settings. As shown below: Configuration instructions: Each VLAN can be configured with an IP, but not necessary, if you do not want it to do layer 3 forwarding, you can not configure the IP address, in turn, to be layer 3 forwarding, IP address must be configured .
  • Page 21 Configuration instructions: The main parameters for setting DHCP are the IP address segments that are expected to be assigned by each interface. DNS must be provided, and the allocation network segments should be set as needed. Similarly, not all interfaces need to allocate addresses. 4.1.4 Setting up static routes Enter the Quick Guide page, you can set the routing table configuration, such as turning on / off dynamic RIP routing, target network, subnet mask, next hop address, network port, etc.,...
  • Page 22: Interface Management

    To access the 192.168.11.0 network segment, this network segment in 192.168.1.x / 24 hidden behind 192.168.1.10, as shown in Figure: This is the so-called routing table, the routing table is to tell you the next hop who will send you a message. 5 Interface Management 5.1 port settings Go to the [Interface Management] - [Port Settings] menu bar.
  • Page 23 Port Enable Select to enable / disable the port. Port rate Set the port port rate, can be set to auto-negotiation, 100M full duplex, 100M half duplex, 10M full duplex, 10M half duplex. Flow Control Select to enable / disable flow control. Port Range Enter the port number to be modified, enter one or a group of ports, or select from the following check boxes.
  • Page 24 Current status Displays the connection rate of the current port. Port Rate Displays the port rate of the current port. Flow Control Displays the status of the current port's flow control function. Port Enable Displays the status of the current port. 5.1.1 Port setup example Configuration requirements Open ports 1-2, 4-5, set the port rate to "auto-negotiation", and enable the flow control...
  • Page 25: Storm Suppression

    save the configuration. 5.2 Storm suppression A broadcast storm occurs when the host system responds to a packet that is cycling on the network or attempts to respond to an unresponsive system. In general, in order to change this state, the request or the response group is constantly generated, often making the situation worse.
  • Page 26 The interface item is described as follows: Item description Storm Select Enable / Disable Storm suppression. suppression Note: The following parameter settings can be set only after the Storm suppression is enabled. Port range Enter the port number you want to modify. Broadcast The amount of broadcast packet traffic that is suppressed by the input limits Packet...
  • Page 27: Bandwidth Settings

    5.3 bandwidth settings Enter 【Interface Management】 - 【Bandwidth Setting】 menu bar. In the Bandwidth Setting page, you can limit the speed of each port's outbound / inbound bandwidth, click <Configure> button to modify the setting, after setting, click <Save > Button to save the configuration.
  • Page 28 speed ~ 100M; if you do not limit the entrance speed, please do not fill in. Export speed Set the port exit speed, Fast port speed range can be set to 64k ~ 100M; if you do not limit the export speed, please do not fill in. In the [Bandwidth Settings] page, you can view the bandwidth limit of each port.
  • Page 29: Port Protection

    5.4 Port Protection Port protection is that in some application environments, certain ports on a device can not communicate with each other. In this environment, the communication between these ports, whether unicast frames, broadcast frames, or multicast frames, can not be forwarded between the protection ports.
  • Page 30 The interface items are as follows: Interface item description Port Select Enable / Disable Port Protection. Protection Note: The following parameter settings can only be set if the port Configuration protection function is enabled. Port Set the port to be an isolated port or a normal port. Isolation port and Protection isolation port can not communicate between isolation port and normal port can communicate properly.
  • Page 31 Port ID Displays the ID of the current port. Port Protection Displays the port protection status of the current port. 5.4.1 Port Protection Example Configure the requirements In a residential environment, all users are in a VLAN, but users can not access each other, and the gateway can only communicate to access the Internet.
  • Page 32: Loop Detection

    5.5 loop detection Loopback detection determines whether a loopback condition exists on the port by sending a special packet on the port and checking whether the packet can be sent back from the port to be sent. Enter [Interface Management] - [Loopback Detection] menu bar. On the loopback detection page, you can enable / disable the loopback detection function, enable / disable the protection and recovery function, disable the port loop time and click the button to modify settings and settings Click the <Save>...
  • Page 33 Loopback Select to enable / disable loopback detection. detection Note: The following parameter settings can be set only when loopback detection is enabled. Protection protection Automatic recovery is the loop in the port for protection, the automatic port protection for a period of time, the port can resume forwarding state. recovery Enabled: The forwarding status is automatically restored after the port protection time expires.
  • Page 34: Mac Address Table

    In the [Loopback Detection] page, you can view the loopback detection information of each port. The interface items are as follows: Interface item description Port Number Displays the serial number of each port on the switch. Port ID Displays the ID of the current port. Loopback Displays the loopback detection enabled status of the current port.
  • Page 35 Table page, you can query the MAC address table of the switch according to different query conditions. As shown below: The interface items are as follows: Interface item description Query by physical port Query by physical port, the specified physical port range is 1 ~ 26.
  • Page 36: Traffic Statistics

    In the [MAC Address Table] page, you can view the found MAC address table information. The interface items are as follows: Interface Item description Serial Number Displays the serial number of each MAC address. Source Address Displays the current source MAC address. VLAN ID Displays the corresponding VLAN ID number.
  • Page 37: Vlan Settings

    6 VLAN Settings VLAN refers to Virtual Local Area Network, "virtual LAN." VLAN is a LAN device will be logically divided into a network segment, in order to achieve the virtual workgroup of emerging data exchange technology. This emerging technology is mainly used in switches. The IEEE released the draft 802.1Q protocol standard for implementing a standardized VLAN in 1999.
  • Page 38 connect to terminal devices that can not identify VLAN tags or to distinguish different VLAN members. As shown in the following figure, Device A is connected to a common PC. The PC does not recognize packets with VLAN tags. Therefore, you need to set the link type of Device A and the PC to Access as Access.
  • Page 39 The interface items are as follows: Interface item description Port VLAN Select Enable / Disable Port VLAN function. Note: The following parameter settings can be set only when the port VLAN function is enabled. Port Range Enter the port number to be modified, enter a port or a group of ports, or select from the check boxes below.
  • Page 40: Qinq Settings

    Hybrid. PVID input port to join the VLAN ID number. The specified VLAN ID ranges from 1 to 4094. In the [Port VLAN] page, you can view the configuration information of each port. The interface items are as follows: Interface item description Port Number Displays the serial number of each port on the switch.
  • Page 41: Vlan Forwarding Rules Introduction

    6.3 VLAN forwarding rules Introduction: The following is the definition of a variety of port types on a variety of data frame  processing methods; Tagged data Tagged data Untagged data Untagged data frame frame frame frame Hit Tag as port Receive as it is Hit Tag as PVID Tagged Port...
  • Page 42 A physical port that has a VID consistent with the TAG tag can accept tagged frames  tagged with this TAG tag from outside the switch only if it is a tagged port on this VID. Enter the [VLAN Settings] - [VLAN Forwarding Table] menu, set VLAN forwarding rules in the VLAN Forwarding Table page, click <Add>...
  • Page 43: Qos Management

    7 QoS Management QoS (Quality of Service) that quality of service. For network services, quality of service includes the transmission bandwidth, transmission delay, data packet loss rate. In the network, the service quality can be improved by ensuring the transmission bandwidth, reducing the transmission delay, reducing the data packet loss rate and delay jitter.
  • Page 44: Qos Settings

    can go through the switch without being affected by lower priority services, reducing latency incidents such as voice or video on time sensitive services. In order to provide priority, each port of the switch must have at least 2 queues. Although more queues per port can provide a more granular priority choice, it is not likely to require more than 4 queues per port in a LAN environment.
  • Page 45 to save the configuration. As shown below: The interface items are as follows: Interface item description Settings Enable / Disable QoS function. Select Note: The following parameter settings can be set only after the QoS function is enabled. priority selection QoS control data transmission priority, you can choose absolute queue priority and relative priority.
  • Page 46: Dscp Qos

    "-" is used to set a group of consecutive priorities, such as 1-4. Priority Select the 802.1p QoS priority queue. In the [QoS Settings] page, you can view the configuration information of 802.1p QoS. The interface items are as follows: Interface item description The 802.1p identifier...
  • Page 47: Network Management

    DSCP ID Range Enter the DSCP ID that needs to be configured. You can enter one or a group of IDs. If you set an ID, enter the corresponding ID number in the DSCP ID range. If you set a ID, you can use "," or "-" to separate it. ","...
  • Page 48 same time, each member port in the same aggregation group dynamically backs up each other, improving connection reliability. According to the different aggregation methods, link aggregation can be divided into two modes: Static aggregation mode  The static aggregation mode is manually configured by the user and does not allow the system to automatically add or delete ports in the aggregation group.
  • Page 49 QoS configuration is consistent, including: traffic rate limiting, priority marking, 802.1p priority, traffic redirection, traffic statistics. Enter 【Network Management】 - 【Trunking】 menu bar. In Trunking page, you can enable / disable aggregation function, set aggregation parameters, click <Add> button to add settings, click <Modify>...
  • Page 50 Operation key Set the operation key, the operation key at both ends must be the same. The value ranges from 1 to 65535. Port Range Set the port number to be added to the aggregation group. Up to eight ports can be assigned to each trunk group. Each port can belong to only one trunk group.
  • Page 51: Port Mirroring

    Configuration steps Enter 【Network Management】 - 【Trunking】 menu bar. In the Trunking configuration page, enable the port aggregation function, set the name of the aggregation group, select the aggregation load mode as the source address, the aggregation mode as "dynamic LACP aggregation", set the operation The key is 12345.
  • Page 52 The interface items are as follows: Interface item description Port Mirroring Select to enable / disable port mirroring. Note: The following parameter settings can be set only if port mirroring is enabled. Monitoring port the monitoring port, which is about to copy or mirror the data stream of the mirror port to the traffic analyzer connected to the monitoring port.
  • Page 53 a group of ports, you can use "," or "-" separated. "," Used to set a group of non-contiguous ports, such as 1,3,5. "-" is used to set a group of contiguous ports, such as 1-8. Collect data Select the port to monitor the data collection hairstyle. Can choose all the data, import data and export data in 3 ways.
  • Page 54 8.2.1 Port Mirroring Configuration Example Configure the requirements All users to configure data traffic will be monitored by the administrator. Configure the topology Configuration steps Go to [Network Management] - [Port Mirroring] menu bar. In the port mirroring configuration page, enable port mirroring first, set monitoring port to "26", set mirror port range to "1-10"...
  • Page 55: Rstp

    8.3 RSTP RSTP is the abbreviation of Rapid Spanning Tree Protocol, which provides the same function as STP, and is completely backward compatible with 802.1D STP. Relative to the STP, the most important feature is "fast", if a LAN within the bridge are supported RSTP protocol, and the administrator configured properly, once the network topology changes, and to regenerate the topology tree only need not more than 1 second time (traditional STP takes about 50 seconds).
  • Page 56 value, the higher the priority. Tip: It is recommended to set the priority of the core switch to a smaller value so that the switch becomes the root bridge at election time, which is good for the stability of the entire network. Period Configure the interval for sending BPDUs periodically.
  • Page 57 Port Priority Port path cost, which must be a multiple of 16. Point-to-poi configuration Port Point to Point mode, when the port is only connected nt port with a bridge, then point to point port. "Yes" means a point-to-point port, "no"...
  • Page 58: Igmp Snooping

    9 IGMP Snooping IGMP snooping is an abbreviation of Internet Group Management Protocol snooping, which is a multicast constraint mechanism running on Layer 2 devices for managing and controlling multicast groups. The switch forms the correspondence between the group member and the switch interface by listening to the host to the IGMP member of the router. The switch will send the multicast packet to the interface with the group member according to the corresponding relationship.
  • Page 59: Chapter 11 Network Safety

    MAC address VLAN The VLAN ID of the static multicast MAC address (optional) Port Range The port number of the static multicast MAC address On the [IGMP Snooping] page, you can view the configuration information of IGMP snooping. The interface item is described as follows: Interface Item Description Display the number of the current static multicast...
  • Page 60 mechanism in the Ethernet is widely used, mainly to solve the Ethernet authentication and security issues. The 802.1X protocol is a port-based network access control protocol. "Port-based network access control" refers to the access and control of the access user equipment at the port of the LAN access device.
  • Page 61 Billing server Set the IP address, port number, and shared key for the settings accounting server. The shared key must be consistent (optional) with the shared key of the billing server. Control mode Set up 802.1X on the port for access control mode, the optional mode and its meaning as follows: Automatic identification mode: indicates that the port is in the unauthorized state.
  • Page 62: Static Address Lock

    port number in the port range;If you set a group of ports, you can use "," or "-" separated. "," is used to set a set of discrete ports, such as 1,3,5. "-" is used to set up a set of consecutive ports, such as 1-8.
  • Page 63 sent to this address will be forwarded to the port only. Also become MAC address binding. Static MAC address table is designed to limit the movement of the computer, all the computer's MAC and port binding, this computer moved to other ports can not communicate, and other computers to move to this interface can still communicate.
  • Page 64 Learning ability MAC address learning ability, you can choose to disable or enable. Function enabled Display the port number where the current function is port enabled. Function disabled Display the port number where the current function is port off. MAC Address Set the MAC address to be locked.
  • Page 65: Chapter 12 Ip Route

    Chapter 12 IP Route 11.1 IP Route In addition to the layer 3 switches can be the same as the layer 2 switches through a MAC address in a LAN to pass data packets, but also can be the same as the router through the IP address in multiple LAN packets.
  • Page 66: Routing Table Configuration

    Dynamic routing - from the other routing router from the other routing to reach the target network to send the path, according to the changes in network structure to dynamically update the routing information. 11.2Routing table configuration Configure the routing function on the Layer 3 switch. You must enable the routing function.
  • Page 67 enabled. Target network The IP address of the destination address. (Default route using 0.0.0.0) Subnet mask Used to indicate which bits of an IP address identify the subnet where the host is located and which bits identify the host's bit mask (the default route uses 0.0.0.0) Next hop address The router looks at the destination address of the...
  • Page 68: System Management

    IP Address IP address is a unified address format provided by the IP protocol, assigns a logical address to each network and each host on the Internet. 12 System Management 12.1 IP Address The IP address is assigned to a 32-bit address of the device connected to the Internet. The IP address consists of two fields: the network number field (net-id) and the host number field (host-id).
  • Page 69 128.0.0.0~191.255.255.255 128.0.0.0~191.254.0.0 192.0.0.0~223.255.255.255 192.0.0.0~223.255.254.0 224.0.0.0~239.255.255.255 240.0.0.0~247.255.255.255 Class A, B, and Class C addresses are unicast addresses; Class D addresses are multicast addresses; Class E addresses are reserved addresses for future special purpose. At present, a large number of IP addresses used in the A, B, C three types of addresses. IP addresses are recorded in dotted decimal notation.
  • Page 70: Username And Password

    a static IP address is selected. Subnet Mask Set the subnet mask of the IP address of the device, which is available when a static IP address is selected.。 Default Sets the default gateway address for the device, which is Gateway available when a static IP address is selected.。...
  • Page 71: Snmp Setup

    The interface item is described as follows: Interface Description item User index Set the user ID of the login user. Access level Set the user's access level, select the administrator or customer. Administrator: You can do all the operations on the switch.
  • Page 72 Network size gradually increased, the number of network equipment to increase the number of stages, the network administrator is difficult to timely monitoring the status of all equipment, find and repair the fault. Network devices may come from different vendors, and if each vendor provides a separate set of management interfaces (such as the command line), network management will become increasingly complex.
  • Page 73 The interface item is described as follows: Interface Description Item SNMP Setup Select Enable/Disable SNMP function. Note: The following parameter settings can be set only after the SNMP function is enabled. SNMP SNMP Trap is part of SNMP. When a specific event is Gateway detected, it may be a performance problem.
  • Page 74: Log Output

    Read only Set the read-only community name, used to limit the community NMS access to the Agent, the device information can name only query. Read Set the read and write community name, used to limit write the NMS access to the Agent, not only can query the community device, but also on the device configuration.
  • Page 75: File Management

    Information Can select log processing, export logs, or delete logs. processing Numbering Display the serial number of the current log. Type Display the current log type. Time Display the time at which the current log was generated. Event Display the specific information of the log. 12.5 File Management Go to the [System Management] - [File Management] menu bar.
  • Page 76: Console Interface Settings

    Backup click the <Download> button to export the configuration file of the device. Restore the Restore the configuration file in the computer to the file device, select the exported configuration file via the <Browse> button, and click the <Upload> button to complete the import of the configuration file.
  • Page 77 interface of the device and configure the device accordingly. Specific configuration steps are as follows (Windows XP operating system as an example) 1. Open in turn 【Start】 - 【Program】 - 【Accessories】 - 【Communication】 - 【Hyper Terminal】 (You can also start 【Start】 - 【Run】 - 【type "hypertrm.exe"】 ) ; 1) Enter a name in the pop-up new connection and select an icon for the connection.
  • Page 78 The software included in this product contains copyrighted software that is licensed under open source licenses. You may obtain the complete corresponding source code from eneo for a period of three years after the last shipment of this product by sending email to: opensource@eneo-security.com.
  • Page 79 VIDEOR E. Hartig GmbH Exclusive distribution through specialised trade channels only. VIDEOR E. Hartig GmbH Carl-Zeiss-Straße 8 63322 Rödermark/Germany Tel. +49 (0) 6074 / 888-0 Technical changes reserved Fax +49 (0) 6074 / 888-100 www.videor.com...

Table of Contents