Advertisement

Quick Links

ELITE SERIES
POE-16MB2GC-ML2

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the POE-16MB2GC-ML2 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Security Camera King POE-16MB2GC-ML2

  • Page 1 ELITE SERIES POE-16MB2GC-ML2...
  • Page 2 Important Safeguards and Warnings Please read the following safeguards and warnings carefully before using the product in order to avoid damages and losses. Attentions:  Do not expose the device to lampblack, steam or dust. Otherwise it may cause fire or electric shock. ...
  • Page 3: Table Of Contents

    Table of Contents Overview ......................- 5 - Product Introduction ......................- 5 - Product Features ......................- 5 - Device Structure ....................- 6 - Structure ......................... - 6 - 2.1.1 Front Panel ........................ - 6 - 2.1.2 Rear Panel ........................
  • Page 4 6.1.2 Basic Concepts of STP ................... - 27 - 6.1.3 STP Bridge Settings ....................- 29 - 6.1.4 STP Port Settings ....................- 29 - VLAN Settings ........................ - 30 - 6.2.1 VLAN Definition ....................... - 30 - 6.2.2 VLAN Function ......................- 30 - 6.2.3 VLAN Based on the port ..................
  • Page 5: Overview

    1 Overview 1.1 Product Introduction The product is a type of managed switch, it provides 16/24*10/100M PoE Ethernet port and 2 uplink Combo 1000M ports, supports layer 2 network management and PoE management functions based on Web, which helps to realize high speed data forwarding. It can be widely applied in places like security surveillance, network management and so on.
  • Page 6: Device Structure

    2 Device Structure 2.1.1 Front Panel Parameter Note RJ45 port Ethernet port, support 10/100M self-adaptation Combo port Ethernet port, support 10/100/1000M self-adaptation, Fiber port supports 1000M. Reset button Long press the button to reset the device and recover default configuration. Console serial port Device debugging port PoE power usage...
  • Page 7: Front Panel

    2.2 Front Panel Figure 2-3 Refer to table 2-3 for more details. Parameter Note RJ45 port Ethernet port, support 10/100M self-adaptation Combo port Ethernet port, support 10/100/1000M self-adaptation, Fiber port supports 1000M. Reset button Long press the button to reset the device. Console serial port Device debugging port PoE power usage...
  • Page 8: Log In Switch

    3 Log in Switch 3.1 Switch Login It needs to log in switch first before configuring the switch, users can intuitively manage and maintain PFS42 series Ethernet switch via Web network management. Device network Figure 3-1 It can get access to switch via Web browser, please make sure your computer has connected to the network where the switch is located.
  • Page 9: Navigation Bar

    Figure 3-3 3.2.2 Navigation Bar The navigation bar control what is displayed in the config section. The contents in navigation bar is Displayed in the form of list, and it is divided by category. Please click the group name first if it needs to configure some item, click the sub items after the list is unfolded.
  • Page 10: System Config

    checked and config can be modified in the config section. Four config modules will be introduced via the following four chapters, which are system config, port management, device management and PoE. 4 System Config 4.1 System Config Overview Click system info and you can see what is shown in Figure 4-1. Figure 4-1 4.1.1 System Info Refer to Figure 4-2 for the switch system info display interface, where you can search the device model,...
  • Page 11: Current Time

    4.1.2 Current Time Refer to Figure 4-3 for the display interface of switch system time, where you can set the device current time and time zone. Figure 4-3 4.1.3 CPU Usage Refer to Figure 4-4 for the display interface of switch CPU usage where you can search the CPU usage while the device is running.
  • Page 12: Dhcp

    Figure 4-5 Refer to Figure 4-5 for the IP config interface, where you can check the device IP address, subnet mask, default gateway and MAC address. The default IP of switch is 192.168.1.110, which can be modified in this interface. Refer to table 4-1 for the address config.
  • Page 13: Software Upgrade

    DHCP sever DHCP client DHCP client DHCP client DHCP client Figure 4-6 Config examples. 1. Networking requirement Configure switch as DHCP client, automatically acquire the switch management IP address. 2. Config steps a. Check “DHCP”, which is shown in Figure 4-7. Figure 4-7 b.
  • Page 14: Restore Default

    modified, and the factory default password is admin. Figure 4-9 4.6 Restore Default You can select default function when it needs to restore the switch config back to initial system default. Except management IP and login password, all other information will be restored to factory default setting.
  • Page 15: Log Information

    4.8 Log Information Refer to Figure 4-12 for the system log display interface where you can check some system log information during the device operation, which is to make it convenient for maintenance personnel to analyze problems. Figure 4-12 Config example. 1.
  • Page 16: Port Management

    5 Port Management 5.1 Port Config Port config can be used to configure each basic parameter which is related to switch port. The port basic parameter will directly affect the working mode of the port, please make config according to the practical requirements.
  • Page 17: Port Mirroring

    Refer to table 5-3 for the port speed duplex display. Port Current speed Speed duplex mode Auto(default) Auto negotiation mode 10M FULL 10M Full duplex 10M HALF 10M Half duplex Ethernet port 100M FULL 100M Full duplex 100M HALF 100M Half duplex 1000M FULL 1000M Full duplex Fiber port...
  • Page 18 ports (called a source port) to another port (called the destination port) connected with a monitoring device for packet analysis. It is to monitor the network and resolve the network malfunction. See Figure 5-2. Figure 5-2  Destination port: The monitor port. Please select only one item. The default setup is disabled. ...
  • Page 19: Port Statistics

    (1) Enable port mirroring function and select the data streams to monitor. (2) Select source port. (3) Select destination port. Now the interface is shown as in Figure 5-3. Figure 5-3 5.3 Port Statistics Figure 5-4 is the switch port statistics interface. Here is to display the inbound/outbound packet amount of each port, conflict statistics, packet loss amount, CRC error packet and etc.
  • Page 20: Port Speed Limit

    Figure 5-4 5.4 Port Speed Limit Here is to set port speed limit parameters, restrict exchanging rate of inbound/outbound data packets. See Figure 5-5.
  • Page 21 Figure 5-5 Refer to Figure 5-5 to set the speed limit policy of each port. Refer to Table 5-6 for port speed limit parameters. Name Note Port Display port list. It is to set port outbound rate. The value ranges from 0 to Tx speed 63Mbps.
  • Page 22: Broadcast Storm Control

    Figure 5-6 (2) Click Save button. 5.5 Broadcast Storm Control The broadcast storm refers to a phenomenon: the broadcast frames on the network are forwarded again and again, which affects the proper communications. It greatly reduces the network performance. The storm control can limit the broadcast flows of the port and it can discard the broadcast frames once the flow has exceeded the specified threshold.
  • Page 23 Figure 5-7 Refer to Table 5-7 for broadcast control parameters. Name Note The broadcast packets limit of one port during the specified Threshold period. Port Port name. Table 5-7 Config example. Network connection Set all-port broadcast storm control function. In case there is malfunction port and device cannot properly transmit the data when there are so much broadcast packets.
  • Page 24: Long Distance Transmit

    Figure 5-8 (3) Click Save button. 5.6 Long Distance Transmit In this interface, it is to set port long distance transmission mode. For the standard Ethernet mode, the transmission speed can becomes 10Mbps/250meters instead of 100Mbps/100Meters. See Figure 5-9.
  • Page 25 Figure 5-9 Figure 5-9 Config example. Network connection Set all-port long distance transmission function so that it can support 250 meters data proper transmission. Settings (1) Check a port to enable long distance transmission function. (2) Click Save button. See Figure 5-10.
  • Page 26 Figure 5-10...
  • Page 27: Device Management

    6 Device Management 6.1 Ring Network 6.1.1 STP Definition The basic idea of STP protocol is very simple. We all know that the trees growing in the nature won't generate loop circuit, so it won't generate loop circuit if network grows like trees in the nature. Therefore, it defines Root Bridge, Root Port, Designated Port, Path Cost and other concepts in the STP protocol, which is to realize the purpose of clipping redundant loop circuit via structuring a tree, and meanwhile it can realize link backup and path optimization.
  • Page 28 switch with the lowest Bridge ID will be selected as Designated Bridge when all the switches have the same Root Path Cost. Root Path Cost: it is the total of all path costs on the path between two network bridges. The Root Path Cost of Root Bridge is zero.
  • Page 29: Stp Bridge Settings

    Max.Age It ranges from 6s to 40s. The switch will send BPDU data package to all the switches and calculate spanning tree again if it exceeds aging time and fails to receive BPDU data package sent by Root Bridge. Forward Delay: It ranges from 4s to 30s.
  • Page 30: Vlan Settings

    Figure 6-4  Port No: Select the port you want to configure.  Priority: Configure port priority, it ranges from 0-240, it has to be the integral multiple of 16.  RPC: Configure the path cost from the current port to root bridge, it ranges from 1-200000000, it is the default path cost when it is set as 0.
  • Page 31 Figure 6-5 Untag is the general Ethernet frame. The network adapter of the general PC can recognize the frame and then communicate. For tag frame, it adds the 4bytes vlan information after the source mac address and the destination address. It is the blue pane (the vlan tag head) in the above figure. Usually, the network adapter of the general PC cannot recognize this kind of frame, switch needs to use vlan tag to distinguish different VLANs, so that different VLANs cannot communicate with each other.
  • Page 32: Link Aggregation

    the frame. send out the frame. Use “port hybrid untagged/tagged vlan” to set with Tag or not when sending out. Table 6-1 Config example. Network connection PC1 and IPC2 belong to one department, PC2 and IPC1 belong to one department, it can realize intercommunication within the department, but it fails to realize communication between departments.
  • Page 33: Static Aggregation Mode

    belong to the same aggregation group can be considered as a logical link with bigger bandwidth. Link aggregation can realize sharing responsibility of communication flow among each member port in the aggregation group, which is to increase bandwidth. Meanwhile, mutual dynamic backup can be realized among each member port in the same aggregation group, which is to improve the link reliability.
  • Page 34: Lacp Mode

    Figure 6-8 6.3.2 LACP Mode LACP (Link Aggregation Control Protocol) is used to realize link dynamic convergence and convergence separation which is based on IEEE 802.3ad standard. The both parties of convergence devices converge the matched links together and receive & send data via LACPDU packet interacting convergence information.
  • Page 35: Qos Settings

    Config Example: 1. Network Requirement It needs to realize link backup and dual GB link uplink via link aggregation function because there is hidden trouble on the single GN link. 2. Config Steps (1) Select aggregation group 3, click port 25 and 26. (2) Select link aggregation mode as LACP, configure Activity as "Activity".
  • Page 36: Congestion Settlement

    Figure 6-10 The group streams are from the high-speed linkage to the device and forward via the low speed linkage, The group streams are connected to the network device via several ports and then forward via one port (the speeds of the multiple input ports are larger than the speed of the output port.) If the flow speed is too huge, it may encounter resources threshold and result in flow congestion.
  • Page 37: Priority Mode

    categorize the flows and use the priority algorithm to send out these kinds of flows first. Each queue algorithm is to fix the pending network flow problems; it has great effect on the bandwidth resources allocation, delay, jitter and etc. This series product supports two priority queue: high priority queue and low priority queue.
  • Page 38 Figure 6-12 Based on port When a port is set as the high priority, the received packets are placing in the high priority queue. Each port can set as the high priority. Based on 802.1p 802.1p priority is at the 2-layer packet head. It is for the environment where there is no need to analyze the 3rd head and shall guarantee the QoS in the 2-layer.
  • Page 39 Byte 1 Byte 2 Byte 3 Byte 4 TPID ( Tag protocol identifier ) TCI ( Tag control information ) 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 Priority VLAN ID 5 4 3 2 1 0 7 5 4 3 2 1 0 5 4 3 2 1 0 7 5 4 3 2 1 0...
  • Page 40: Tcp/Udp Port

    6.4.6 TCP/UDP Port TCP and UDP adopt 16bit port to recognize the applications. The server usually uses the port to recognize. For example, the TCP port of the FTP server is the 21, TCP port of each Telnet server is 23, UDP port of each TFTP server is 69.
  • Page 41 Figure 6-18 (2) Set port 2 as high priority. Figure 6-19 (3) Set device to discard FTP data packet, block user to access FTP server.
  • Page 42: Security

    Figure 6-20 6.5 Security MAC (Media Access Control) records the relationship between the MAC address and the port, and port belonging VLAN information and etc. 6.5.1 MAC Address List When device forwards the packet, it searches the MAC address sheet according to the packet destination MAC address.
  • Page 43: Port Mac Filtering

    forward the binding MAC address. Figure 6-22 Config example. Network connection User uses WEB to set port MAC binding so that the port can only be used by current device. Settings (1) From Device Management>Security, go to MAC Address Table interface. (2)...
  • Page 44: Snmp Settings

     If it is same, then the packet is considered as legal, and it will continue to implement follow-up processing;  If it is different, then the packet is considered as illegal, and it will be discarded. 6.6 SNMP Settings SNMP network includes two elements: NMS and Agent.
  • Page 45: Snmp

    warning information from the Agent.  SNMPv2 adopts the community name to certify. SNMPv2c has expand the functions of the SNMPv1. It provides more operation types and supports more data types, provides abundant error codes and can accurately distinguish the errors. ...
  • Page 46 Figure 6-28 Refer to Table 6-6 for detailed information. Name Note Read The community name to access the network administrator. The right is community read. The default setup is public. Write The community name to access the network administrator. The right is community write.
  • Page 47 Figure 6-29 SNMPv3 Network connection Refer to Figure 6-31, the NMS connects with the Switch and it shall realize the following requirements.  NMS monitors and manages the Switch via SNMPv3.  Switch can auto send out Trap message to the NMS when there is a malfunction. ...
  • Page 48: 802.1X Networking Structure

    Figure 6-32 6.7 802.1x IEEE 802.1x is the authentication standard about user network access which is designated by IEEE, it is a type of network access control protocol based on port, therefore, the exact 802.1x authentication function has to be configured on the device port. As for the user device which is accessed to port has to control access upon network source via authentication.
  • Page 49: 802.1X Authentication Control/Uncontrolled Port

    device end in the LAN. The client has to install client software which supports 802.1x authentication.  Device end is the network device which controls client access in the LAN, it is located between client and authentication server, which provides LAN access port for customers (physical port or logical port), and it implements authentication upon the connected client via interaction with server.
  • Page 50: Igmp Snooping

    authentication, and it will users to visit network source. Config Example: 1. Network Requirement The client IP is 192.168.1.1/24 segment, authentication server IP is 192.168.1.100, and it is required to be authenticated by authentication server when all the ports of device are accessed. 2.
  • Page 51: Poe

    multicast group will not be broadcasted in the layer two network but multicasted to designated receivers. IGMP Snooping can only forward the information to the needed receivers via layer two multicast, which can bring following advantages:  Reduce broadcast packet in the layer two network, save network bandwidth; ...
  • Page 52 The PoE remote power supplying has two modes:  Over signal wires—The PSE uses the pairs (1, 2, 3, 6) for transmitting data in a category 3/5 twisted pair cable to supply DC power while transmitting data to PDs.  Over spare wires—The PSE uses the pairs (4, 5, 7, 8) not transmitting data in a category 3/5 twisted pair cable to supply DC power to PDs.
  • Page 53: Poe Events

    Figure 7-2 7.2 PoE Events Figure 7-3 In Figure 7-3, it is to display the PoE event statistics of each port. It includes Overload, Short Circuit Limit, DC Disconnect, Server Short Circuit, and Thermal Shutdown. Refer to Table 7-2 for PoE event parameters. Name Note Overload...
  • Page 54: Green Poe

    7.3 Green PoE In Figure 7-4, it is to set PoE energy-saving parameters. The PoE function is off in the specified period to save power. When the period is over, the port auto resumes providing power. Figure 7-4 Refer to Table 7-3 for detailed Green PoE setup information. Name Note PoE off time...
  • Page 55 Figure 7-5...
  • Page 56: Appendixâ…°technical Specifications

    8 AppendixⅠTechnical Specifications PoE Protocol IEEE802.3af、 IEEE802.3at Switching Capacity 8.8G Packet Forwarding 5.36Mpps 6.55Mpps Rate Humidity 10%-90% Power AC 100~240V Common Mode 4KV Lightning Protection Differential Mode 2KV Working ﹣10℃~55℃ Temperature Weight 3.54k Dimension(W×D×H) 440mm x300mm x44mm Username / password: admin/admin System IP Address :192.168.1.110/24 PoE Budget...
  • Page 57 Mirroring Support many-to-one port mirroring DHCP Support DHCP-Client Long Distance Mode Support the delivery distance of powering and network data is up to 250m Support half-duplex based on back pressure type control; Flow Control Support full duplex based on PAUSE frame; Hardware supports IP+MAC binding based on port;...

This manual is also suitable for:

Elite series

Table of Contents