Cerio CS-2424G User Manual

24 port 10/100/1000m gigabit web managed switch with 4 sfp ports

Advertisement

CERIO Corporation
CS-2424G
24 Port 10/100/1000M Gigabit Web Managed Switch with 4
SFP Ports
User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CS-2424G and is the answer not in the manual?

Questions and answers

Summary of Contents for Cerio CS-2424G

  • Page 1 CERIO Corporation CS-2424G 24 Port 10/100/1000M Gigabit Web Managed Switch with 4 SFP Ports User’s Manual...
  • Page 2 FCC Warning This device has been tested and found to comply with limits for a Class A digital device, pursuant to Part 2 and 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiates radio frequency energy and, if not installed and used in accordance with the user’s manual, may cause interference in which case user will be required to correct the interference at his own expense.
  • Page 3: Table Of Contents

    Introduction ............................6 Feature ............................6 Package Contents ........................8 Front Panel ..........................8 Rear Panel Layout ........................9 Software Configuration ........................10 Example of Segment: (Windows 7)..................10 System login username and password information ............. 14 System Status ........................... 15 Device Information .........................
  • Page 4 MAC Limit ..........................39 Port Aggregation ........................40 Port-IP-MAC-Binding ......................42 Rate Limit..........................43 Storm Control .......................... 44 Security .............................. 45 Port Grouping .......................... 45 Port Isolation ........................... 46 MAC filter ..........................46 DOS Defense ........................... 47 VLAN Configuration ........................49 802.1Q VLAN ..........................
  • Page 5 Specifications ............................... 66...
  • Page 6: Introduction

    1. Introduction CERIO CS-2000 Series Model: CS-2424G is a powerful high-performance 4 SFP Gigabit 24 port 10/100/1000Mbps web managed switch and supports Remote control and management through a web-based User Interface. This Layer 2 Web Managed switch supports Spanning Tree / Rapid Spanning Tree protocol, Port base IEEE802.1Q VLAN Tagging, IGMP snooping, IEEE802.1p port-based QoS, and Bandwidth control / Loop Detection.
  • Page 7  Supports up to 8K MAC addresses Up to 4Mb Packet Buffer size   VLAN and IEEE802.1Q tag-base VLAN based on ports & VIDs; add/remove/modify tag  IEEE802.3ad Link Aggregation LACP  Provides IGMP v1/v2/v3 snooping function  Supports Bandwidth Control with KB/s size control ...
  • Page 8: Package Contents

    1.2 Package Contents Before you start to install this switch, please verify your package contains the following items: CS-2424G Main Unit D Manual Power Cord 19” Mount Brackets Warranty Card 1.3 Front Panel Status LED lights for 24 Port 10/100/1000Mps with 4 SFP Port Status Explanation 1) Hardware Reset button, press and hold for approximately 10 seconds.
  • Page 9: Rear Panel Layout

    1) 24 10/100/1000Mbps Ethernet Ports 2) 4 SFP LED Status lights 3) 4 Fiber Ports 1.4 Rear Panel Layout 1) AC input (100-240V/AC, 50-60Hz) UL Safety...
  • Page 10: Software Configuration

    CS-2424G can be configured through a PC/NB by using its web browser such as Internet Explorer 6.0 or later. Set the IP segment of the administrator's computer to be in the same range as CS-2424G for accessing the system. Do not duplicate the IP Address used here with IP Address of CS-2424G or any other device within the network.
  • Page 11 Step 3 : In “Change adapter setting” Page, right click on Local LAN then select “Properties”...
  • Page 12 Step 4 : In the “Properties” page, click the “Properties” button to open TCP/IP setting Step 5 : In Properties page for setting IP addresses, find “Internet Protocol Version 4 (TCP/IPv4)” and double click to open TCP/IPv4 Properties window Double click...
  • Page 13 Step 6 : Select “Use the following IP address”, and fix in IP Address to: 192.168.2.X ex. The X is any number from 1 to 253 Subnet mask : 255.255.255.0 And Click "OK" to complete fixing the computer IP settings Step 7 : Open Web Browser Without a valid certificate, users may encounter the following problem in IE7 when they try to...
  • Page 14: System Login Username And Password Information

    System login Overview page will appear after successful login. 2.2 System login username and password information The CS-2424G web switch default IP is 192.168.2.200 Into the management page as follows, please enter Username and password Default IP Address: 192.168.2.200 ...
  • Page 15: System Status

    3. System Status Device Information This administrator can check device system information from the “Device Information” tab Host Name: Display host name for the device.  Model: Display switch model name.  Firmware Version: Display system firmware version.  MAC Address: Display MAC address for the device. ...
  • Page 16: Port Flow Chart

    3.2 Port Flow Chart Administrator can monitor ports through graphical flow charts. View: Administrator can select all or one port to monitor.  3.3 Traffic Statistics Administrator can check the cumulative flow of each port.
  • Page 17: Mac Table

    3.4 MAC Table The MAC Table page can monitor device MAC information based on the connected port. Administrators can set individual ports to static or dynamic MAC addresses. If dynamic MAC Address is selected, administrators can then set dynamic aging time. Forwarding List: Display MAC address of the devices.
  • Page 18: System Load

    Dynamic Address settings: Administrator can set aging Time for Dynamic MAC  address. Aging Time: Administrator can set a time for aging time. (Range 10~630 min)  3.5 System Load System Load function to display the usage status of the memory and the CPU/ Memory of switch via the data graph.
  • Page 19: Network Detection

    3.6 Network Detection Administrators can diagnose network connectivity via the PING or TRACERT  Detection Address: Enter detection IP address.  Detection Packets: Select ping packets frequency. View: Check device to destination will through hoe many gateway. ...
  • Page 20: Network

    4. Network 4.1 IP Address Administrator can set IP address for the system. The IP address support IPv4 & IPv6 protocol, if switch device must want to internet, administrator can set gateway IP address in the page. List of the Default: Administrator can select default used IP address. ...
  • Page 21: Mac Address

    4.2 MAC Address Administrator can view and modify MAC address in the system. 4.3 DNS Settings Administrator can set IP Address for the DNS Server. Primary DNS Server: Enter IP address for Primary DNS Server.  Secondary DNS server: Enter IP address for Secondary DNS server. ...
  • Page 22: Dhcp Protect (Snooping)

    4.4 DHCP Protect (snooping) Administrator can set Dynamic Host Configuration Protocol (DHCP) snooping, preventing interference from other DHCP server. Service: Administrator can select Enable or Disable for the DHCP Protect function.  IP Version: Administrator must select IP protocol of the Version 4 or 6. ...
  • Page 23: Dhcp Option82

    4.5 DHCP Option82 The DHCP Relay Agent Information Option passes along port and agent information to a central DHCP server. It is useful in statistical analysis, as well as, indicating where an assigned IP address physically connects to the network. It may also be used to make DHCP decisions based on where the request is coming from or even which user is making the request.
  • Page 24: Igmp Snooping

    DHCP Host Information:  To Client Port: Display port number of the client send request.  To Server Port: Display port number for the DHCP server response.  Client IP: Display IP address for client.  Server IP: Display IP address for DHCP Server. ...
  • Page 25 IGMP Snooping: Administrator can select enable or disable for the service.  Version: Administrator can select v2 or v3 for the IGMP version.  Unknown Multicast: Administrator can forward or drop Unknown Multicast.  Router Port: Set router port.  Port Fast Leave: In immediate leave mode, when the switch receives IGMP leave ...
  • Page 26: Multicast Vlan

    4.7 Multicast VLAN In multicast VLAN networks, subscribers to a multicast group can exist in VLAN. Administrator can set multicast VLAN ID, multicast VLAN by its VLAN ID in the range of 1 to 4094. Service: Administrator can select enable or disable the Service ...
  • Page 27 Service: Administrator can select enable or disable the Service  Voice VLAN: Administrator can set VLAN ID in the range of 1 to 4094.  Voice VLAN Port: Administrator can select ports for the voice VLAN.  Organizationally Unique Identifiers (OUI) is the first three bytes of a MAC Address, while the last three bytes contain a unique station ID.
  • Page 28: Mac Vlan

    4.9 MAC VLAN A MAC VLAN takes a single Network interface and creates multiple virtual ones with different MAC addresses (many to one). MAC VLAN: Administrator can enable or disable the service.  Administrator can click button to create MAC VLAN. 4.10 802.1x When client used RJ-45 link to switch port, the switch port will request 802.1x authentication of the client.
  • Page 29 802.1x Configuration Service: Administrator can enable or disable the 802.1x authentication service.  Auth Method: Administrator can select authentication method for 802.1x.  Administrator can click button in the Operating list to modify authentication function. Port: Display Port number.  Status: Administrator can select enable or disable the service.
  • Page 30: Server Configuration

    Server Configuration Auth Key: Enter RADIUS Server Key.  Num Of Retry: Enter re-check frequency.  Primary Server: Administrator can set RADIUS Server information for Primary.  Backup Server: Administrator can set RADIUS Server information for Backup.  User Info: Administrator can monitor user authentication information.
  • Page 31: Lldp

    4.11 LLDP The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP information is sent by devices from each of their interfaces at a fixed interval, in the form of an Ethernet frame.
  • Page 32: Stp

    4.12 STP The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling or disabling of these backup links.
  • Page 33 STP Port Configuration Administrator can click Operating list button to set STP service. STP Port Information Display STP information for all Port...
  • Page 34: Loop Detection

    4.13 Loop Detection Loop detection can be used in an MCT topology to detect Layer 2 loops that occur due to misconfigurations, for example, on the client side when MCT links are not configured as trunk links on the MCT-unaware client. Administrator can click Operating list button to set Action for Port shutdown or Port Blocking.
  • Page 35: Jumbo Frame

    4.14 Jumbo Frame A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes. Jumbo frames are used on local area networks that support at least 1 Gbps and can be as large as 9,000 bytes. Administrator can select enable or disable the service.
  • Page 36: Snmp

    4.16 SNMP Using SNMP, you can monitor network performance, audit network usage, detect network faults or inappropriate access, and in some cases configure remote devices. SNMP is designed to be deployed on the largest possible number of network devices, to have minimal impact on the managed nodes, to have minimal transport requirements, and to continue working when most other network applications fail.
  • Page 37: Port Configuration

    5. Port Configuration 5.1 Port Configuration Administrator can click Operating list button to modify port Operation.
  • Page 38: Mdix Configuration

    5.2 MDIX Configuration A medium dependent interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDI-X) interface.
  • Page 39: Mac Limit

    5.4 MAC Limit MAC limiting protects against flooding of the Ethernet switching table (also known as the MAC forwarding table or Layer 2 forwarding table). MAC limiting sets a limit on the number of MAC addresses that can be learned on a single Layer 2 access interface or on all the Layer 2 access interfaces on the switch, or on a specific VLAN.
  • Page 40: Port Aggregation

    5.5 Port Aggregation Port Aggregation is also referred to as link aggregation, teaming port, and port trunking for 802.3ad (LACP, Link Aggregation Control Protocol), The Port Aggregation can aggregate multiple Ethernet ports together to form a logical aggregation group. To upper layer entities, all the physical links in an aggregation group are a single logical link.
  • Page 41 LACP Priority Administrator configures the LACP system priority on each switch running LACP. LACP uses the system priority with the switch MAC address to form the system ID and also during negotiation with other switches. The function with the lower system priority value determines which links between LACP partner devices are active and which are in standby for each LACP group.
  • Page 42: Port-Ip-Mac-Binding

    5.6 Port-IP-MAC-Binding Port-IP-MAC-Binding is a powerful, integrated authentication function that ensures the correctness of MAC address, IP address, and connected port for devices connected to the network. It monitors the information among the ARP, DHCP or IPv4/v6 ARP ND packets to make sure they are all from legal sources help to quarantine illegal device or hackers intend to fake the IP or MAC address on legal devices at the edge of network.
  • Page 43: Rate Limit

    5.7 Rate Limit The rate limiting function can be configured to limit of Ingress/Egress traffic on a particular interface. Administrator can click button in Operating list.
  • Page 44: Storm Control

    5.8 Storm Control Traffic storm control (also called traffic suppression) allows you to monitor the levels of the incoming broadcast, multicast, and unicast traffic over a 1-second interval. During this interval, the traffic level, which is a percentage of the total available bandwidth of the port, is compared with the traffic storm control level that you configured.
  • Page 45: Security

    6. Security 6.1 Port Grouping Administrator can create own grouping of devices and ports to efficiently update and manage devices. Administrator can click button to modify or create Port Grouping in the Operating list.
  • Page 46: Port Isolation

    6.2 Port Isolation When administrators use the port isolation feature, the selected ports will no longer be able to communicate with each other. 6.3 MAC filter MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
  • Page 47: Dos Defense

    6.4 DOS Defense The Switch function support DoS(denial-of-service) defense. Denial-of-service (DoS) is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Administrator can click button to enable the security in Operating list.
  • Page 48 6.5 Web Access Control Administrator can set source IP address in list. When this function is enabled, the source IP address can be used to login to the management page of the switch. Other IP addresses can no longer be used to login.
  • Page 49: Vlan Configuration

    7. VLAN Configuration 7.1 802.1Q VLAN The VLAN function can set Tag Based VLAN. None: No change any egress packets.  Tag: Insert port's tag for egress packets.  UnTagged: Remove tag ID. ...
  • Page 50: Pvid

    7.2 PVID The Page administrator can set PVID protocol. 8. ACL 8.1 MAC ACL ACL is Access Control List, MAC ACLs are Layer 2 ACLs. Administrator can configure the Source/Destination MAC address and MAC mask rules to Permit or deny for the packet.
  • Page 51: Ip Acl

    8.2 IP ACL Administrator can configure the Source IP address and IP mask rules to Permit or deny for the packet.
  • Page 52 Name:Administrator can enter the rule name.  Privilege:Administrator can select Permit or Deny for the rule.  SIP: If administrator want to deny an IP address, administrator can setting source IP  address for deny. SIP Mask:Administrator must to enter source IP Mask. example: block a IP address, the ...
  • Page 53: Qos

    9. QoS Quality of Service (QoS) prioritizes network traffic and manages available bandwidth so that the most important traffic goes first. QoS is implemented as rules or policies that prioritize packets, optionally change information in the packet header, and assign them to outbound port queues based on their priority.
  • Page 54: Queue Algorithm

    9.3 Queue Algorithm WFQ: Each Queue can set the weight by QoS. The QoS function will be based on weights  to allocate bandwidth to ensure basic.
  • Page 55: Default Priority

    WRR: Weight Round Robin Scheduling is like waiting in line, Packets in all the queues are  sent in order based on the weight value for each queue. WRR+SP: Weight Round Robin + Strict Priority, Queues in SP are scheduled strictly ...
  • Page 56: Qos Trust

    CoS: Class of Service is data frame in the level 2. When the port priority is specified, the  data will be classified into the egress queue based on the CoS value of the ingress port and the mapping relation between the CoS in cos mapping. ...
  • Page 57: System Setting

    10. System Setting 10.1 Quick Settings The function administrator can quick set switch for the hostname, IP address, DNS and gateway. 10.2 Web Management The page administrator can change login service and login timeout.
  • Page 58: Internal No

    10.3 Internal No. The feature is used to identify the switch in LAN. Administrator can set a number in switch. 10.4 Administrator Administrator can change login password or create new account / password for the system login, the account can set Ordinary or Administrator Permissions.
  • Page 59: System Config

    10.5 System Config This function can restore the system to default settings, and also backup or restore the device using preconfigured profile settings. Restore Factory: Administrator can click the "Restore" button to reset back to default settings. This will restore factory configuration and all user configurations will be deleted.
  • Page 60: Firmware Upgrade

    10.6 Firmware Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations. Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 2 minutes to upgrade due to complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade button to upgrade.
  • Page 62: Reboot

    10.8 Reboot This function allows administrator to reboot system or click “Timing Restart” function set auto reboot for the time schedule. Click Reboot button to proceed and take around one minute to complete. Timing Restart Status Operation: Administrator can choose Enable or Disable for the service. ...
  • Page 63: System Log

    System Log 11.1 Event Log The Event log displays system events when system is up and running. Also, it becomes very useful as a troubleshooting tool when issues are experienced in system.
  • Page 64: Alarm Log

    11.2 Alarm Log When system is up and running, the Alarm Log page can display system Alarm information. 11.3 Security Log When system is up and running, the security Log page can display system security information.
  • Page 65: Network Log

    11.4 Network Log When system is up and running, the Network Log page can display system Network information. 11.5 Protocol Log When system is up and running, the Protocol Log page can display Protocol information.
  • Page 66: Specifications

    Specifications Standards & Hardware Specifications IEEE 802.3 10Base-T IEEE 802.3u 100Base-TX, IEEE 802.3ab 1000Base-T, IEEE 802.3z 1000Base-SX/LX Standards Conformance IEE 802.3x Flow Control IEEE 802.1p QoS IEEE 802.3az EEE IEEE 802.1Q VLAN Tag IEEE 802.3ad Link Aggregation 24 ports RJ-45 connectors for 10/100/1000 BASE-TX Port Configuration 4 SFP Gigabit uplink ports Media Access Protocol...
  • Page 67 Quality of Service (QoS) Supports IEEE 802.1p QoS, Port-based QoS Bandwidth Control Supported Spanning Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP) IGMP Snooping v1, v2, v3 MAC Filtering Supported DHCP Snooping Supported VLAN IEEE802.1Q Tagging VLAN , Port-Based ,Tag based VLAN SNMP Supports SNMP v1/v2c Environmental &...

Table of Contents