Page 2
Important Safeguards and Warnings Please read the following safeguards and warnings carefully before using the product in order to avoid damages and losses. Attentions: Do not expose the device to lampblack, steam or dust. Otherwise it may cause fire or electric shock. ...
1 Overview 1.1 Product Introduction The product is a type of managed switch, it provides 16/24*10/100M PoE Ethernet port and 2 uplink Combo 1000M ports, supports layer 2 network management and PoE management functions based on Web, which helps to realize high speed data forwarding. It can be widely applied in places like security surveillance, network management and so on.
2 Device Structure 2.1.1 Front Panel Parameter Note RJ45 port Ethernet port, support 10/100M self-adaptation Combo port Ethernet port, support 10/100/1000M self-adaptation, Fiber port supports 1000M. Reset button Long press the button to reset the device and recover default configuration. Console serial port Device debugging port PoE power usage...
2.2 Front Panel Figure 2-3 Refer to table 2-3 for more details. Parameter Note RJ45 port Ethernet port, support 10/100M self-adaptation Combo port Ethernet port, support 10/100/1000M self-adaptation, Fiber port supports 1000M. Reset button Long press the button to reset the device. Console serial port Device debugging port PoE power usage...
3 Log in Switch 3.1 Switch Login It needs to log in switch first before configuring the switch, users can intuitively manage and maintain PFS42 series Ethernet switch via Web network management. Device network Figure 3-1 It can get access to switch via Web browser, please make sure your computer has connected to the network where the switch is located.
Figure 3-3 3.2.2 Navigation Bar The navigation bar control what is displayed in the config section. The contents in navigation bar is Displayed in the form of list, and it is divided by category. Please click the group name first if it needs to configure some item, click the sub items after the list is unfolded.
checked and config can be modified in the config section. Four config modules will be introduced via the following four chapters, which are system config, port management, device management and PoE. 4 System Config 4.1 System Config Overview Click system info and you can see what is shown in Figure 4-1. Figure 4-1 4.1.1 System Info Refer to Figure 4-2 for the switch system info display interface, where you can search the device model,...
4.1.2 Current Time Refer to Figure 4-3 for the display interface of switch system time, where you can set the device current time and time zone. Figure 4-3 4.1.3 CPU Usage Refer to Figure 4-4 for the display interface of switch CPU usage where you can search the CPU usage while the device is running.
Figure 4-5 Refer to Figure 4-5 for the IP config interface, where you can check the device IP address, subnet mask, default gateway and MAC address. The default IP of switch is 192.168.1.110, which can be modified in this interface. Refer to table 4-1 for the address config.
DHCP sever DHCP client DHCP client DHCP client DHCP client Figure 4-6 Config examples. 1. Networking requirement Configure switch as DHCP client, automatically acquire the switch management IP address. 2. Config steps a. Check “DHCP”, which is shown in Figure 4-7. Figure 4-7 b.
modified, and the factory default password is admin. Figure 4-9 4.6 Restore Default You can select default function when it needs to restore the switch config back to initial system default. Except management IP and login password, all other information will be restored to factory default setting.
4.8 Log Information Refer to Figure 4-12 for the system log display interface where you can check some system log information during the device operation, which is to make it convenient for maintenance personnel to analyze problems. Figure 4-12 Config example. 1.
5 Port Management 5.1 Port Config Port config can be used to configure each basic parameter which is related to switch port. The port basic parameter will directly affect the working mode of the port, please make config according to the practical requirements.
Refer to table 5-3 for the port speed duplex display. Port Current speed Speed duplex mode Auto(default) Auto negotiation mode 10M FULL 10M Full duplex 10M HALF 10M Half duplex Ethernet port 100M FULL 100M Full duplex 100M HALF 100M Half duplex 1000M FULL 1000M Full duplex Fiber port...
Page 18
ports (called a source port) to another port (called the destination port) connected with a monitoring device for packet analysis. It is to monitor the network and resolve the network malfunction. See Figure 5-2. Figure 5-2 Destination port: The monitor port. Please select only one item. The default setup is disabled. ...
(1) Enable port mirroring function and select the data streams to monitor. (2) Select source port. (3) Select destination port. Now the interface is shown as in Figure 5-3. Figure 5-3 5.3 Port Statistics Figure 5-4 is the switch port statistics interface. Here is to display the inbound/outbound packet amount of each port, conflict statistics, packet loss amount, CRC error packet and etc.
Figure 5-4 5.4 Port Speed Limit Here is to set port speed limit parameters, restrict exchanging rate of inbound/outbound data packets. See Figure 5-5.
Page 21
Figure 5-5 Refer to Figure 5-5 to set the speed limit policy of each port. Refer to Table 5-6 for port speed limit parameters. Name Note Port Display port list. It is to set port outbound rate. The value ranges from 0 to Tx speed 63Mbps.
Figure 5-6 (2) Click Save button. 5.5 Broadcast Storm Control The broadcast storm refers to a phenomenon: the broadcast frames on the network are forwarded again and again, which affects the proper communications. It greatly reduces the network performance. The storm control can limit the broadcast flows of the port and it can discard the broadcast frames once the flow has exceeded the specified threshold.
Page 23
Figure 5-7 Refer to Table 5-7 for broadcast control parameters. Name Note The broadcast packets limit of one port during the specified Threshold period. Port Port name. Table 5-7 Config example. Network connection Set all-port broadcast storm control function. In case there is malfunction port and device cannot properly transmit the data when there are so much broadcast packets.
Figure 5-8 (3) Click Save button. 5.6 Long Distance Transmit In this interface, it is to set port long distance transmission mode. For the standard Ethernet mode, the transmission speed can becomes 10Mbps/250meters instead of 100Mbps/100Meters. See Figure 5-9.
Page 25
Figure 5-9 Figure 5-9 Config example. Network connection Set all-port long distance transmission function so that it can support 250 meters data proper transmission. Settings (1) Check a port to enable long distance transmission function. (2) Click Save button. See Figure 5-10.
6 Device Management 6.1 Ring Network 6.1.1 STP Definition The basic idea of STP protocol is very simple. We all know that the trees growing in the nature won't generate loop circuit, so it won't generate loop circuit if network grows like trees in the nature. Therefore, it defines Root Bridge, Root Port, Designated Port, Path Cost and other concepts in the STP protocol, which is to realize the purpose of clipping redundant loop circuit via structuring a tree, and meanwhile it can realize link backup and path optimization.
Page 28
switch with the lowest Bridge ID will be selected as Designated Bridge when all the switches have the same Root Path Cost. Root Path Cost: it is the total of all path costs on the path between two network bridges. The Root Path Cost of Root Bridge is zero.
Max.Age It ranges from 6s to 40s. The switch will send BPDU data package to all the switches and calculate spanning tree again if it exceeds aging time and fails to receive BPDU data package sent by Root Bridge. Forward Delay: It ranges from 4s to 30s.
Figure 6-4 Port No: Select the port you want to configure. Priority: Configure port priority, it ranges from 0-240, it has to be the integral multiple of 16. RPC: Configure the path cost from the current port to root bridge, it ranges from 1-200000000, it is the default path cost when it is set as 0.
Page 31
Figure 6-5 Untag is the general Ethernet frame. The network adapter of the general PC can recognize the frame and then communicate. For tag frame, it adds the 4bytes vlan information after the source mac address and the destination address. It is the blue pane (the vlan tag head) in the above figure. Usually, the network adapter of the general PC cannot recognize this kind of frame, switch needs to use vlan tag to distinguish different VLANs, so that different VLANs cannot communicate with each other.
the frame. send out the frame. Use “port hybrid untagged/tagged vlan” to set with Tag or not when sending out. Table 6-1 Config example. Network connection PC1 and IPC2 belong to one department, PC2 and IPC1 belong to one department, it can realize intercommunication within the department, but it fails to realize communication between departments.
belong to the same aggregation group can be considered as a logical link with bigger bandwidth. Link aggregation can realize sharing responsibility of communication flow among each member port in the aggregation group, which is to increase bandwidth. Meanwhile, mutual dynamic backup can be realized among each member port in the same aggregation group, which is to improve the link reliability.
Figure 6-8 6.3.2 LACP Mode LACP (Link Aggregation Control Protocol) is used to realize link dynamic convergence and convergence separation which is based on IEEE 802.3ad standard. The both parties of convergence devices converge the matched links together and receive & send data via LACPDU packet interacting convergence information.
Config Example: 1. Network Requirement It needs to realize link backup and dual GB link uplink via link aggregation function because there is hidden trouble on the single GN link. 2. Config Steps (1) Select aggregation group 3, click port 25 and 26. (2) Select link aggregation mode as LACP, configure Activity as "Activity".
Figure 6-10 The group streams are from the high-speed linkage to the device and forward via the low speed linkage, The group streams are connected to the network device via several ports and then forward via one port (the speeds of the multiple input ports are larger than the speed of the output port.) If the flow speed is too huge, it may encounter resources threshold and result in flow congestion.
categorize the flows and use the priority algorithm to send out these kinds of flows first. Each queue algorithm is to fix the pending network flow problems; it has great effect on the bandwidth resources allocation, delay, jitter and etc. This series product supports two priority queue: high priority queue and low priority queue.
Page 38
Figure 6-12 Based on port When a port is set as the high priority, the received packets are placing in the high priority queue. Each port can set as the high priority. Based on 802.1p 802.1p priority is at the 2-layer packet head. It is for the environment where there is no need to analyze the 3rd head and shall guarantee the QoS in the 2-layer.
6.4.6 TCP/UDP Port TCP and UDP adopt 16bit port to recognize the applications. The server usually uses the port to recognize. For example, the TCP port of the FTP server is the 21, TCP port of each Telnet server is 23, UDP port of each TFTP server is 69.
Page 41
Figure 6-18 (2) Set port 2 as high priority. Figure 6-19 (3) Set device to discard FTP data packet, block user to access FTP server.
Figure 6-20 6.5 Security MAC (Media Access Control) records the relationship between the MAC address and the port, and port belonging VLAN information and etc. 6.5.1 MAC Address List When device forwards the packet, it searches the MAC address sheet according to the packet destination MAC address.
forward the binding MAC address. Figure 6-22 Config example. Network connection User uses WEB to set port MAC binding so that the port can only be used by current device. Settings (1) From Device Management>Security, go to MAC Address Table interface. (2)...
If it is same, then the packet is considered as legal, and it will continue to implement follow-up processing; If it is different, then the packet is considered as illegal, and it will be discarded. 6.6 SNMP Settings SNMP network includes two elements: NMS and Agent.
warning information from the Agent. SNMPv2 adopts the community name to certify. SNMPv2c has expand the functions of the SNMPv1. It provides more operation types and supports more data types, provides abundant error codes and can accurately distinguish the errors. ...
Page 46
Figure 6-28 Refer to Table 6-6 for detailed information. Name Note Read The community name to access the network administrator. The right is community read. The default setup is public. Write The community name to access the network administrator. The right is community write.
Page 47
Figure 6-29 SNMPv3 Network connection Refer to Figure 6-31, the NMS connects with the Switch and it shall realize the following requirements. NMS monitors and manages the Switch via SNMPv3. Switch can auto send out Trap message to the NMS when there is a malfunction. ...
Figure 6-32 6.7 802.1x IEEE 802.1x is the authentication standard about user network access which is designated by IEEE, it is a type of network access control protocol based on port, therefore, the exact 802.1x authentication function has to be configured on the device port. As for the user device which is accessed to port has to control access upon network source via authentication.
device end in the LAN. The client has to install client software which supports 802.1x authentication. Device end is the network device which controls client access in the LAN, it is located between client and authentication server, which provides LAN access port for customers (physical port or logical port), and it implements authentication upon the connected client via interaction with server.
authentication, and it will users to visit network source. Config Example: 1. Network Requirement The client IP is 192.168.1.1/24 segment, authentication server IP is 192.168.1.100, and it is required to be authenticated by authentication server when all the ports of device are accessed. 2.
multicast group will not be broadcasted in the layer two network but multicasted to designated receivers. IGMP Snooping can only forward the information to the needed receivers via layer two multicast, which can bring following advantages: Reduce broadcast packet in the layer two network, save network bandwidth; ...
Page 52
The PoE remote power supplying has two modes: Over signal wires—The PSE uses the pairs (1, 2, 3, 6) for transmitting data in a category 3/5 twisted pair cable to supply DC power while transmitting data to PDs. Over spare wires—The PSE uses the pairs (4, 5, 7, 8) not transmitting data in a category 3/5 twisted pair cable to supply DC power to PDs.
Figure 7-2 7.2 PoE Events Figure 7-3 In Figure 7-3, it is to display the PoE event statistics of each port. It includes Overload, Short Circuit Limit, DC Disconnect, Server Short Circuit, and Thermal Shutdown. Refer to Table 7-2 for PoE event parameters. Name Note Overload...
7.3 Green PoE In Figure 7-4, it is to set PoE energy-saving parameters. The PoE function is off in the specified period to save power. When the period is over, the port auto resumes providing power. Figure 7-4 Refer to Table 7-3 for detailed Green PoE setup information. Name Note PoE off time...
8 AppendixⅠTechnical Specifications PoE Protocol IEEE802.3af、 IEEE802.3at Switching Capacity 8.8G Packet Forwarding 5.36Mpps 6.55Mpps Rate Humidity 10%-90% Power AC 100~240V Common Mode 4KV Lightning Protection Differential Mode 2KV Working ﹣10℃~55℃ Temperature Weight 3.54k Dimension(W×D×H) 440mm x300mm x44mm Username / password: admin/admin System IP Address :192.168.1.110/24 PoE Budget...
Page 57
Mirroring Support many-to-one port mirroring DHCP Support DHCP-Client Long Distance Mode Support the delivery distance of powering and network data is up to 250m Support half-duplex based on back pressure type control; Flow Control Support full duplex based on PAUSE frame; Hardware supports IP+MAC binding based on port;...
Need help?
Do you have a question about the POE-16MB2GC-ML2 and is the answer not in the manual?
Questions and answers