8 port 10/100/1000/2500m multi gigabit switch (2 pages)
Summary of Contents for Cerio CS-2424G
Page 1
CERIO Corporation CS-2424G 24 Port 10/100/1000M Gigabit Web Managed Switch with 4 SFP Ports User’s Manual...
Page 2
FCC Warning This device has been tested and found to comply with limits for a Class A digital device, pursuant to Part 2 and 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiates radio frequency energy and, if not installed and used in accordance with the user’s manual, may cause interference in which case user will be required to correct the interference at his own expense.
Introduction ............................6 Feature ............................6 Package Contents ........................8 Front Panel ..........................8 Rear Panel Layout ........................9 Software Configuration ........................10 Example of Segment: (Windows 7)..................10 System login username and password information ............. 14 System Status ........................... 15 Device Information .........................
Page 4
MAC Limit ..........................39 Port Aggregation ........................40 Port-IP-MAC-Binding ......................42 Rate Limit..........................43 Storm Control .......................... 44 Security .............................. 45 Port Grouping .......................... 45 Port Isolation ........................... 46 MAC filter ..........................46 DOS Defense ........................... 47 VLAN Configuration ........................49 802.1Q VLAN ..........................
1. Introduction CERIO CS-2000 Series Model: CS-2424G is a powerful high-performance 4 SFP Gigabit 24 port 10/100/1000Mbps web managed switch and supports Remote control and management through a web-based User Interface. This Layer 2 Web Managed switch supports Spanning Tree / Rapid Spanning Tree protocol, Port base IEEE802.1Q VLAN Tagging, IGMP snooping, IEEE802.1p port-based QoS, and Bandwidth control / Loop Detection.
Page 7
Supports up to 8K MAC addresses Up to 4Mb Packet Buffer size VLAN and IEEE802.1Q tag-base VLAN based on ports & VIDs; add/remove/modify tag IEEE802.3ad Link Aggregation LACP Provides IGMP v1/v2/v3 snooping function Supports Bandwidth Control with KB/s size control ...
1.2 Package Contents Before you start to install this switch, please verify your package contains the following items: CS-2424G Main Unit D Manual Power Cord 19” Mount Brackets Warranty Card 1.3 Front Panel Status LED lights for 24 Port 10/100/1000Mps with 4 SFP Port Status Explanation 1) Hardware Reset button, press and hold for approximately 10 seconds.
CS-2424G can be configured through a PC/NB by using its web browser such as Internet Explorer 6.0 or later. Set the IP segment of the administrator's computer to be in the same range as CS-2424G for accessing the system. Do not duplicate the IP Address used here with IP Address of CS-2424G or any other device within the network.
Page 11
Step 3 : In “Change adapter setting” Page, right click on Local LAN then select “Properties”...
Page 12
Step 4 : In the “Properties” page, click the “Properties” button to open TCP/IP setting Step 5 : In Properties page for setting IP addresses, find “Internet Protocol Version 4 (TCP/IPv4)” and double click to open TCP/IPv4 Properties window Double click...
Page 13
Step 6 : Select “Use the following IP address”, and fix in IP Address to: 192.168.2.X ex. The X is any number from 1 to 253 Subnet mask : 255.255.255.0 And Click "OK" to complete fixing the computer IP settings Step 7 : Open Web Browser Without a valid certificate, users may encounter the following problem in IE7 when they try to...
System login Overview page will appear after successful login. 2.2 System login username and password information The CS-2424G web switch default IP is 192.168.2.200 Into the management page as follows, please enter Username and password Default IP Address: 192.168.2.200 ...
3. System Status Device Information This administrator can check device system information from the “Device Information” tab Host Name: Display host name for the device. Model: Display switch model name. Firmware Version: Display system firmware version. MAC Address: Display MAC address for the device. ...
3.2 Port Flow Chart Administrator can monitor ports through graphical flow charts. View: Administrator can select all or one port to monitor. 3.3 Traffic Statistics Administrator can check the cumulative flow of each port.
3.4 MAC Table The MAC Table page can monitor device MAC information based on the connected port. Administrators can set individual ports to static or dynamic MAC addresses. If dynamic MAC Address is selected, administrators can then set dynamic aging time. Forwarding List: Display MAC address of the devices.
Dynamic Address settings: Administrator can set aging Time for Dynamic MAC address. Aging Time: Administrator can set a time for aging time. (Range 10~630 min) 3.5 System Load System Load function to display the usage status of the memory and the CPU/ Memory of switch via the data graph.
3.6 Network Detection Administrators can diagnose network connectivity via the PING or TRACERT Detection Address: Enter detection IP address. Detection Packets: Select ping packets frequency. View: Check device to destination will through hoe many gateway. ...
4. Network 4.1 IP Address Administrator can set IP address for the system. The IP address support IPv4 & IPv6 protocol, if switch device must want to internet, administrator can set gateway IP address in the page. List of the Default: Administrator can select default used IP address. ...
4.2 MAC Address Administrator can view and modify MAC address in the system. 4.3 DNS Settings Administrator can set IP Address for the DNS Server. Primary DNS Server: Enter IP address for Primary DNS Server. Secondary DNS server: Enter IP address for Secondary DNS server. ...
4.4 DHCP Protect (snooping) Administrator can set Dynamic Host Configuration Protocol (DHCP) snooping, preventing interference from other DHCP server. Service: Administrator can select Enable or Disable for the DHCP Protect function. IP Version: Administrator must select IP protocol of the Version 4 or 6. ...
4.5 DHCP Option82 The DHCP Relay Agent Information Option passes along port and agent information to a central DHCP server. It is useful in statistical analysis, as well as, indicating where an assigned IP address physically connects to the network. It may also be used to make DHCP decisions based on where the request is coming from or even which user is making the request.
DHCP Host Information: To Client Port: Display port number of the client send request. To Server Port: Display port number for the DHCP server response. Client IP: Display IP address for client. Server IP: Display IP address for DHCP Server. ...
Page 25
IGMP Snooping: Administrator can select enable or disable for the service. Version: Administrator can select v2 or v3 for the IGMP version. Unknown Multicast: Administrator can forward or drop Unknown Multicast. Router Port: Set router port. Port Fast Leave: In immediate leave mode, when the switch receives IGMP leave ...
4.7 Multicast VLAN In multicast VLAN networks, subscribers to a multicast group can exist in VLAN. Administrator can set multicast VLAN ID, multicast VLAN by its VLAN ID in the range of 1 to 4094. Service: Administrator can select enable or disable the Service ...
Page 27
Service: Administrator can select enable or disable the Service Voice VLAN: Administrator can set VLAN ID in the range of 1 to 4094. Voice VLAN Port: Administrator can select ports for the voice VLAN. Organizationally Unique Identifiers (OUI) is the first three bytes of a MAC Address, while the last three bytes contain a unique station ID.
4.9 MAC VLAN A MAC VLAN takes a single Network interface and creates multiple virtual ones with different MAC addresses (many to one). MAC VLAN: Administrator can enable or disable the service. Administrator can click button to create MAC VLAN. 4.10 802.1x When client used RJ-45 link to switch port, the switch port will request 802.1x authentication of the client.
Page 29
802.1x Configuration Service: Administrator can enable or disable the 802.1x authentication service. Auth Method: Administrator can select authentication method for 802.1x. Administrator can click button in the Operating list to modify authentication function. Port: Display Port number. Status: Administrator can select enable or disable the service.
Server Configuration Auth Key: Enter RADIUS Server Key. Num Of Retry: Enter re-check frequency. Primary Server: Administrator can set RADIUS Server information for Primary. Backup Server: Administrator can set RADIUS Server information for Backup. User Info: Administrator can monitor user authentication information.
4.11 LLDP The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP information is sent by devices from each of their interfaces at a fixed interval, in the form of an Ethernet frame.
4.12 STP The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling or disabling of these backup links.
Page 33
STP Port Configuration Administrator can click Operating list button to set STP service. STP Port Information Display STP information for all Port...
4.13 Loop Detection Loop detection can be used in an MCT topology to detect Layer 2 loops that occur due to misconfigurations, for example, on the client side when MCT links are not configured as trunk links on the MCT-unaware client. Administrator can click Operating list button to set Action for Port shutdown or Port Blocking.
4.14 Jumbo Frame A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes. Jumbo frames are used on local area networks that support at least 1 Gbps and can be as large as 9,000 bytes. Administrator can select enable or disable the service.
4.16 SNMP Using SNMP, you can monitor network performance, audit network usage, detect network faults or inappropriate access, and in some cases configure remote devices. SNMP is designed to be deployed on the largest possible number of network devices, to have minimal impact on the managed nodes, to have minimal transport requirements, and to continue working when most other network applications fail.
5.2 MDIX Configuration A medium dependent interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDI-X) interface.
5.4 MAC Limit MAC limiting protects against flooding of the Ethernet switching table (also known as the MAC forwarding table or Layer 2 forwarding table). MAC limiting sets a limit on the number of MAC addresses that can be learned on a single Layer 2 access interface or on all the Layer 2 access interfaces on the switch, or on a specific VLAN.
5.5 Port Aggregation Port Aggregation is also referred to as link aggregation, teaming port, and port trunking for 802.3ad (LACP, Link Aggregation Control Protocol), The Port Aggregation can aggregate multiple Ethernet ports together to form a logical aggregation group. To upper layer entities, all the physical links in an aggregation group are a single logical link.
Page 41
LACP Priority Administrator configures the LACP system priority on each switch running LACP. LACP uses the system priority with the switch MAC address to form the system ID and also during negotiation with other switches. The function with the lower system priority value determines which links between LACP partner devices are active and which are in standby for each LACP group.
5.6 Port-IP-MAC-Binding Port-IP-MAC-Binding is a powerful, integrated authentication function that ensures the correctness of MAC address, IP address, and connected port for devices connected to the network. It monitors the information among the ARP, DHCP or IPv4/v6 ARP ND packets to make sure they are all from legal sources help to quarantine illegal device or hackers intend to fake the IP or MAC address on legal devices at the edge of network.
5.7 Rate Limit The rate limiting function can be configured to limit of Ingress/Egress traffic on a particular interface. Administrator can click button in Operating list.
5.8 Storm Control Traffic storm control (also called traffic suppression) allows you to monitor the levels of the incoming broadcast, multicast, and unicast traffic over a 1-second interval. During this interval, the traffic level, which is a percentage of the total available bandwidth of the port, is compared with the traffic storm control level that you configured.
6. Security 6.1 Port Grouping Administrator can create own grouping of devices and ports to efficiently update and manage devices. Administrator can click button to modify or create Port Grouping in the Operating list.
6.2 Port Isolation When administrators use the port isolation feature, the selected ports will no longer be able to communicate with each other. 6.3 MAC filter MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
6.4 DOS Defense The Switch function support DoS(denial-of-service) defense. Denial-of-service (DoS) is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Administrator can click button to enable the security in Operating list.
Page 48
6.5 Web Access Control Administrator can set source IP address in list. When this function is enabled, the source IP address can be used to login to the management page of the switch. Other IP addresses can no longer be used to login.
7. VLAN Configuration 7.1 802.1Q VLAN The VLAN function can set Tag Based VLAN. None: No change any egress packets. Tag: Insert port's tag for egress packets. UnTagged: Remove tag ID. ...
7.2 PVID The Page administrator can set PVID protocol. 8. ACL 8.1 MAC ACL ACL is Access Control List, MAC ACLs are Layer 2 ACLs. Administrator can configure the Source/Destination MAC address and MAC mask rules to Permit or deny for the packet.
8.2 IP ACL Administrator can configure the Source IP address and IP mask rules to Permit or deny for the packet.
Page 52
Name:Administrator can enter the rule name. Privilege:Administrator can select Permit or Deny for the rule. SIP: If administrator want to deny an IP address, administrator can setting source IP address for deny. SIP Mask:Administrator must to enter source IP Mask. example: block a IP address, the ...
9. QoS Quality of Service (QoS) prioritizes network traffic and manages available bandwidth so that the most important traffic goes first. QoS is implemented as rules or policies that prioritize packets, optionally change information in the packet header, and assign them to outbound port queues based on their priority.
WRR: Weight Round Robin Scheduling is like waiting in line, Packets in all the queues are sent in order based on the weight value for each queue. WRR+SP: Weight Round Robin + Strict Priority, Queues in SP are scheduled strictly ...
CoS: Class of Service is data frame in the level 2. When the port priority is specified, the data will be classified into the egress queue based on the CoS value of the ingress port and the mapping relation between the CoS in cos mapping. ...
10. System Setting 10.1 Quick Settings The function administrator can quick set switch for the hostname, IP address, DNS and gateway. 10.2 Web Management The page administrator can change login service and login timeout.
10.3 Internal No. The feature is used to identify the switch in LAN. Administrator can set a number in switch. 10.4 Administrator Administrator can change login password or create new account / password for the system login, the account can set Ordinary or Administrator Permissions.
10.5 System Config This function can restore the system to default settings, and also backup or restore the device using preconfigured profile settings. Restore Factory: Administrator can click the "Restore" button to reset back to default settings. This will restore factory configuration and all user configurations will be deleted.
10.6 Firmware Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations. Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 2 minutes to upgrade due to complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade button to upgrade.
10.8 Reboot This function allows administrator to reboot system or click “Timing Restart” function set auto reboot for the time schedule. Click Reboot button to proceed and take around one minute to complete. Timing Restart Status Operation: Administrator can choose Enable or Disable for the service. ...
System Log 11.1 Event Log The Event log displays system events when system is up and running. Also, it becomes very useful as a troubleshooting tool when issues are experienced in system.
11.2 Alarm Log When system is up and running, the Alarm Log page can display system Alarm information. 11.3 Security Log When system is up and running, the security Log page can display system security information.
11.4 Network Log When system is up and running, the Network Log page can display system Network information. 11.5 Protocol Log When system is up and running, the Protocol Log page can display Protocol information.
Need help?
Do you have a question about the CS-2424G and is the answer not in the manual?
Questions and answers