Cybersecurity Recommendations Mandatory actions to be taken towards cybersecurity 1. Change Passwords and Use Strong Passwords: The number one reason systems get “hacked” is due to having weak or default passwords. It is recommended to change default passwords immediately and choose a strong password whenever possible.
Page 4
In the event that your social media, bank, email, etc. account is compromised, you would not want someone collecting those passwords and trying them out on your video surveillance system. Using a different username and password for your security system will make it more difficult for someone to guess their way into your system.
General This user’s manual introduces the functions and operations of 8-Port Gigabit + 2-Port Gigabit SFP L2 Managed PoE Switch devices. Models DH-PFS4210-8GT-150 Safety Instructions The following categorized signal words with defined meaning might appear in the Manual. Signal Words...
Page 6
About the Manual The Manual is for reference only. If there is inconsistency between the Manual and the actual product, the actual product shall govern. We are not liable for any loss caused by the operations that do not comply with the Manual. ...
Important Safeguards and Warnings Electrical safety All installation and operation here should conform to your local electrical safety codes. The product must be grounded to reduce the risk of electric shock. We assume no liability or responsibility for all the fires or electrical shock caused by ...
Introduction Overview The Switch is a new generation designed for high security and high performance network the second layer switch. Provides eight 10/100/1000Mbps self-adaption RJ45 port, and two 100/1000Mbps SFP ports, all ports support wire-speed forwarding, can provide you with larger network flexibility.
External Component Description 1.3.1 Front Panel The front panel of the Switch consists of AC power connector, one marker, 1 x Reset button, a series of LED indicators, 8 x 10/100/1000Mbps RJ-45 ports, 2 x SFP ports and 1x Console port as shown as below.
Faceplate Status Indication Indicator Marker System not started System System is starting or the system indicator Blinking green starts successfully 10/100/10 The port is NOT connected. Solid green The port is connected at 1000Mbps. BASE-T adaptive Link/Act Solid orange The port is connected at 100/10Mbps Ethernet /Speed port...
Package Contents Before installing the Switch, make sure that the following the "packing list" listed OK. If any part is lost and damaged, please contact your local agent immediately. In addition, make sure that you have the tools install switches and cables by your hands. One PoE Web Smart Ethernet Switch ...
Installation and Connection This part describes how to install your PoE Ethernet Switch and make connections to it. Please read the following topics and perform the procedures in the order being presented. Installation Please follow the following instructions in avoid of incorrect installation causing device damage and security threat.
Figure 2-1 Bracket installation Step 2 Use the screws provided with the equipment rack to mount the Switch on the rack and tighten it. Figure 2-2 Rack installation 2.1.3 Power on the Switch The Switch is powered on by the AC 100-240V 50/60Hz internal high-performance power supply.
Switch connection to the PD 1-8 ports of the Switch have PoE power supply function, the maximum output power up to 30W each port, it can make PD devices, such as internet phone, network camera, wireless access point work. You only need to connect the Switch PoE port directly connected to the PD port by network cable.
Login to the Switch Switch to End Node Use standard Cat.5/5e Ethernet cable (UTP/STP) to connect the Switch to end nodes as described below. Switch ports will automatically adjust to the characteristics (MDI/MDI-X, speed, duplex) of the device to which is connected. Figure 3-1 Connect PC to switch Login the Switch...
Page 19
Figure 3-2 Login windows Step 5 Switching language to English .Enter the Username and Password (The factory default Username is admin and Password is admin123), and then click "LOGIN" to log in to the Switch configuration window. Figure 3-3 Switch configuration window Login to the Switch 9...
Switch Configuration The Web Smart Ethernet Switch Managed switch software provides rich layer 2 functionality for switches in your networks. This chapter describes how to use Web-based management interface(Web UI) to this switch configure managed switch software features. In the Web UI, the left column shows the configuration menu. Above you can see the information for switch system, such as memory, software version.
Page 21
Figure 4-2 Quickly setting 【Parameter Description】 Parameter Description VLAN ID VLAN number VLAN Name VLAN mark Manage the IP address of the VLAN IP VLAN Device Name Switch name Switch’s management in use of Management VLAN the VLAN 【Instructions】 Native VLAN: as a Trunk, the mouth will belong to a Native VLAN. The so-called Native VLAN, is refers to UNTAG send or receive a message on the interface, is considered belongs to the VLAN.
Page 22
Figure 4-3 VLAN setting I Figure 4-4 VLAN setting II Step 2 Click "next step" button, into other settings, such as: manage ip address set as 192.168.1.11, device name set as switch-123, default gateway with the dns server set as 172.16.1.241. Switch Configuration 12...
Figure 4-5 Save Step 3 Use 192.168.1.11 to log in, set a new password for admin1234. Figure 4-6 Finish Port In the navigation bar to select "PORT", you may conduct Basic config, Port aggregation, Port mirroring, Port limit and port isolation. Figure 4-7 Port 4.2.1 Basic config...
Page 24
Figure 4-8 Basic settings I 【Parameter Description】 Parameter Description Select the current configuration Port port number Status Choose whether to close link port Flow Control Whether open flow control Can choose the following kinds: Auto Port Speed 10 M 100 M 1000 M Can choose the following kinds: Auto...
【Configuration Example】 Such as: The port is set to 10 M, half duplex, open flow control and cross line sequence and port state. Figure 4-9 Basic settings II 4.2.2 Port aggregation In the navigation bar to select "PORT>port aggregation", In order to expand the port bandwidth or achieve the bandwidth of the redundancy backup, the following picture: Figure 4-10 Port aggregation...
Such as: set the port 7, 8, for aggregation port 1, lets this aggregation port 1 connected to other switch aggregation port 1 to build switch links. Figure 4-11 Configuration example 4.2.3 Port mirroring In the navigation bar to select "PORT>port mirroring", Open port mirror feature, All packets on the source port are copied and forwarded to the destination port, Destination port is usually connected to a packet analyzer to analyze the source port, Multiple ports can be mirrored to a destination port, the following picture:...
Parameter Description Mirror group Range: 1-4 【Instructions】 The port of the aggregate port cannot be used as a destination port and the source port, destination port and source port cannot be the same. 【Configuration Example】 Such as: set a mirror group for port 3 regulatory port 4, 5, 6 on and out flow conditions. Figure 4-13 Configuration example 4.2.4 Port rate-limit...
Figure 4-14 Port rate-limit 【Parameter Description】 Parameter Description Input speed limit Set port input speed Output speed limit Set port output speed 【Instructions】 1 Mbit/s = 1000 Kbit/s = 1000 / 8 KB/s = 125 KB/s. That is, the theoretical rate of 1M bandwidth is125KB/s.
Page 29
Figure 4-16 Storm control 【Parameter Description】 Parameter Description Storm suppression value of the Broadcast Limit broadcast packets Storm suppression value of the Multicast Limit multicast packets Storm suppression value of the Unicast Limit unicast packets 【Instructions】 1 Mbit/s = 1000 Kbit/s = 1000 / 8 KB/s = 125 KB/s. That is, the theoretical rate of 1M bandwidth is 125KB/s.
Figure 4-17 Configuration example 4.2.6 Port isolation In the navigation bar to select "PORT>port isolation ", ports are isolated. The following picture: Figure 4-18 Port isolation 【Parameter Description】 Parameter Description Choose a port, to configure the Source port isolated port Isolated port Port will be isolated 【Instructions】...
Figure 4-19 Configuration example I Figure 4-20 Configuration example II 4.2.7 Port information In the navigation bar to select “PORT>Port Information”, the following picture: Figure 4-21 Port information 【Parameter Description】 Parameter Description Input Flow Port input flow statistics Output Flow Port output flow statistics 【Instructions】...
Enter port number 8 for the query. Figure 4-22 Configuration example VLAN In the navigation bar to select "VLAN", you can manage the VLAN config, Trunk Settings and Hybrid Settings, the following picture: Figure 4-23 VLAN settings 4.3.1 VLAN Settings In the navigation bar to select "VLAN config>VLAN Settings", Vlans can be created and set the port to the VLAN (port default state for the access mode), the following picture: Figure 4-24...
Figure 4-25 Configuration example 4.3.2 Access Port Settings In the navigation bar to select "VLAN config>Access-port setting", can set port to Access port, the following picture: Figure 4-26 Access port settings 【Parameter Description】 Parameter Description Native VLAN Only set one 【Instructions】...
Figure 4-27 Configuration example I Figure 4-28 Configuration example II 4.3.3 Trunk-port setting In the navigation bar to select "VLAN config>trunk-port setting", can set port to Trunk port, the following picture: Figure 4-29 Trunk port 【Parameter Description】 Parameter Description Native VLAN Only set one Allowing VLAN Can set up multiple...
【Configuration Example】 Such as: PVID=VLAN2 PC1:192.168.1.122, port 8, access VLAN2 PC2:192.168.1.123, port 7, Trunk allowed VLAN 1-2 PC3:192.168.1.124, port 6, access VLAN1 (The default port belongs to VLAN1) Can let the PC2 PING PC1, cannot PING PC3 Figure 4-30 Configuration example I Figure 4-31 Configuration example II 4.3.4 Hybrid-port setting...
Page 36
Step 1 Determine the VLAN in this port attributes (disp interface can see the port to which VLAN untag, which VLAN tag). Step 2 If it is untag stripping VLAN information, send again, if the tag is sent directly. 【Configuration Example】 Such as: create vlans 10, 20, VLAN sets the Native VLAN port 1 to 10, to tag VLAN for 10, 20, sets the Native VLAN port 2 to 20, to tag VLAN for 10, 20.
Page 37
Figure 4-33 Configuration example I Figure 4-34 Configuration example II Figure 4-35 Configuration example III Figure 4-36 Configuration example IV Switch Configuration 27...
This system e0/1 and the receive system e0/2 PC can be exchanged, but when each data taken from a VLAN is different Data from the pc1, by inter0/1 pvid VLAN10 encapsulation VLAN10 labeled into switches, switch found system e0/2 allows 10 data through the VLAN, so the data is forwarded to the system e0/2, because the system e0/2 VLAN is untagged 10, then switches at this time to remove packet VLAN10 tag, in the form of ordinary package sent to pc2, pc1 - >...
Page 39
Open DHCP attack prevention function, need to set the DHCP protective vlan simultaneously, other functions to take effect. 【Configuration Example】 Step 1 DHCP snooping open Figure 4-39 Snooping open Step 2 Setting DHCP snooping vlan Figure 4-40 Set DHCP snooping vlan Step 3 Set the connection router 8 ports for trust, then 6 port is set to the prohibit.
Page 40
Figure 4-44 Set option82 information Figure 4-45 IP address Step 6 The port 7 for binding. Figure 4-46 Binding table 4.4.1.2 OS In the navigation bar to select "fault/safety>anti attack>DOS", Open the anti DOS attack function, intercept Land attack packets, illegal TCP packets, to ensure that the device or server to provide normal service to legitimate users, the following picture: Figure 4-47 【Instructions】...
Page 41
Figure 4-48 Configuration example 4.4.1.3 IP source guard In the navigation bar to select "fault/safety>anti attack>ip source guard", Through the source port security is enabled, on port forwarding the packet filter control, prevent illegal message through the port, thereby limiting the illegal use of network resources, improve the safety of the port, the following picture: Figure 4-49 IP source guard...
Page 42
Figure 4-50 Configuration example I Figure 4-51 Configuration example II 4.4.1.4 IP/Mac/Port In the navigation bar to select "fault/safety>anti attack>IP/Mac/Port", automatically detect the port based IP address, MAC address of the mapping relationship, and then realize the function of a key binding, the following picture: Figure 4-52 IP/Mac/Port 【Instructions】...
A bond must be bound before the binding to enable the switch to open, And if you want to access shall be binding and switch the IP address of the same network segment . 【Configuration Example】 Such as: the binding to make first can open, must be a key bindings port 7 Figure 4-53 Configuration example I Figure 4-54...
Page 44
Figure 4-56 Ping 【Parameter Description】 Parameter Description Fill in the IP address of the need Destination IP address to detect Timeout in Seconds Range of 1 to 10 Ping Count Testing number 【Instructions】 Use ping function to test internet connect and host whether to arrive. 【Configuration Example】...
Page 45
Parameter Description Fill in the IP address of the need Destination IP address to detect Timeout period Range of 1 to 10 【instruction】 The function is used to detect more is up to and reach the destination path. If a destination unreachable, diagnose problems.
Figure 4-61 Configuration example 4.4.3 ACL In the navigation bar to select "fault/safety>ACL", can be applied to port ACL rules and Settings to take effect in time. Figure 4-62 【Instruction】 The ACL rules are sequenced, row in front of the match will be priority rule. Many, if the strategy items operating time is relatively longer.
Page 47
Figure 4-63 Configuration example I Figure 4-64 Configuration example II Figure 4-65 Configuration example III Figure 4-66 Configuration example IV Switch Configuration 37...
Figure 4-67 Configuration example V In the navigation bar to select "PoE", you can set the PoE Port Config configuration. Figure 4-68 4.5.1 PoE Port Config 4.5.1.1 Poe Port Config In the navigation bar to select "POE>POE Port Config>Poe Port Config", you can set Poe Port, As follows.
Parameter Description You can enable or disable PoE port enabled function Configure port priority, when the load exceeds the maximum power POE, low priority port Power supply priority equipment will be dropped threshold You can specify threshold You can configure max power of Port power port 【Configuration Example】...
Figure 4-72 4.6.1 MSTP region In the navigation bar to select "STP>MSTP region", Can modify the domain and domain name, add instance is mapped to a VLAN. The following picture. Figure 4-73 MSTP region 【Parameter Description】 Parameter Description Region Name Configure the region name Parameter configuration revision Revision Level...
Figure 4-74 Configuration example I Figure 4-75 Configuration example II 4.6.2 STP bridge In the navigation bar to select "STP>STP bridge", Can be related to bridge, port configuration, the following picture: Figure 4-76 STP bridge 【Parameter Description】 Parameter Description Instance Priority Whether open instance priority Switch Configuration 41...
Page 52
Parameter Description setting Select the created instance id is Instance ID configured Priority setting bridge example, Bridge Priority the default instance bridge priority for 32768 Whether to open the STP bridge Enable function The model is divided into: the Mode STP, RSTP, MSTP Switches sends bpdu in packet Hello Time...
Figure 4-77 Configuration example I Figure 4-78 Configuration example II Step 2 Set MSTP has launched port configuration, select the created instance, set priority (port configuration is not online, on-line configuration will only take effect, can click on the "view the current configuration" button to view the configured completed) DHCP relay In the navigation bar to select "DHCP relay", you can set to the DHCP relay and option82.
Figure 4-79 DHCP relay 4.7.1 DHCP relay In the navigation bar to select "DHCP relay>DHCP relay", Open the DHCP relay function, set up and view the relay server IP address and its status. The following picture. Figure 4-80 Enable 【Parameter Description】 Parameter Description IP address...
Page 55
Figure 4-82 Option82 【Parameter Description】 Parameter Description VLAN ID the DHCP request message in the VLAN, value range is 1 ~ 4094 Circuit Control Circuit ID to populate the user custom content, scope of string length is 3 ~ 63 Proxy Remote Configuration ASCII remote id string value, the length of the...
Figure 4-83 Configuration example I Figure 4-84 Configuration example II Figure 4-85 Configuration example III In the navigation bar to select "QoS", you can set to the Remark, queue config and mapping the queue. Figure 4-86 4.8.1 Queue config In the navigation bar to select" QoS>queue config", Can be set up queue scheduling policy .the following picture: Switch Configuration 46...
Figure 4-87 Queue config 【Parameter Description】 Parameter Description Can choose four kinds of modes: RR round-robin scheduling SP absolute priority scheduling Scheduling strategy WRR weighted round-robin scheduling WFQ weighted fair scheduling Set the weights of each queue, they will be in proportion to WRR-weights occupy the bandwidth to send data...
Page 58
Figure 4-89 COS queue map 【Parameter Description】 Parameter Description COS the VLAN priority fields (0 to Server ID Set each cosine value mapping Queue ID queue number (0 to 7) 【Configuration Example】 Such as: cos 3 mapping to the queue 7, set the queue weight 7 to 10. Figure 4-90 Configuration example I Figure 4-91...
Page 59
Figure 4-92 DSCP COS map 【Parameter Description】 Parameter Description DSCP field has seven (0-63) is Server list divided into four tables Map the DSCP to COS fields (0 to Server ID 7), based on the cosine is mapped to a queue 【Instruction】...
Page 60
Figure 4-94 Port COS map 【Parameter Description】 Parameter Description Port Select the port number (1-10) Mapped to the service ID, and Service ID then according to the service ID into the queue 【Instruction】 Cos priority is greater than the DSCP, DSCP priority is greater than the port. 【Configuration Example】...
Figure 4-95 Configuration example I Figure 4-96 Configuration example II Figure 4-97 Configuration example III Figure 4-98 Configuration example IV Addr table In the navigation bar to select “Address table", you can set to MAC Management, MAC learning and Aging and MAC Filter. Switch Configuration 51...
Figure 4-99 MAC management 4.9.1 MAC Management In the navigation bar to select “Address table>MAC Management", you can add static Mac and delete Mac and view to the current of the Mac address table. The following picture: Figure 4-100 MAC management 【Parameter Description】...
【Instruction】 According to different conditions to clear Mac address, view/add/learn the Mac address, Mac address filtering. 【Configuration Example】 Step 1 The port 6 Mac set to static Mac. Figure 4-101 Configuration example I Step 2 Clear port 6 static Mac addresses. Figure 4-102 Configuration example II 4.9.2 MAC Learning and Aging...
Page 64
Figure 4-103 MAC learning and aging 【Parameter Description】 Parameter Description Mac address Range 0-8191,default 8191 Mac address study limit Default 300 【Configuration Example】 Step 1 Setting port 2, 3, 4, 5 address study limit for 2000. Figure 4-104 Configuration example I Step 2 Will be dropped or learn the Mac address of the port equipment after 2 minutes disappear automatically from the Mac address table.
Figure 4-105 Configuration example II 4.9.3 MAC Filter In the navigation bar to select "address table>MAC Filter", Can be filtered according to the condition does not need the Mac address. The following picture: Figure 4-106 MAC filter 【Parameter Description】 Parameter Description Can’t add multicast Mac address Mac address...
Figure 4-108 SNMP 4.10.2 Snmp config 4.10.2.1 Snmp config In the navigation bar to select “Snmp >Snmp config", you can Snmp function enable. The following picture: Figure 4-109 SNMP Config 【Instruction】 The SNMP function must be turned on in the configuration RMON, otherwise it will be configured to fail.
Page 67
Parameter Description communication between the password Read-only: specify the NMS (Snmp host) of MIB variables can only be read, cannot be modified Access authority Read-only can write: specify the NMS (Snmp host) of MIB variables can only read, can also be modified 【Instruction】...
Page 68
Parameter Description View the associated MIB object, is MIB Subtree OID a number of MIB Subtree mask MIB OID mask 【Instruction】 Each view is best to configure a view rule; otherwise it will affect the SNMP function. 【Configuration Example】 Such as: establish a view 123 , MIB subtree oid .1.3.6.1 contain among them. Figure 4-114 Configuration example I Figure 4-115...
Page 69
Parameter Description No authentication encryption: this group of users' messages don't need to verify data transmission also does not need to be kept secret Both authentication and encryption: this group of users need to verify the news of transmission and transmission of data need to be kept secret Read view, read and write The associated view name...
Page 70
Figure 4-119 User Config 【Parameter Description】 Parameter Description User Name User name, range 1-16 Attestation not only encryption: this group of users transmission of the message need to verify the data don't need to confidential No authentication encryption: this group of users' messages don't need to verify data transmission Security Level also does not need to be kept...
Page 71
Figure 4-120 Configuration example 4.10.2.6 Trap Config In the navigation bar to select “Snmp>Snmp config>Trap Config", Can specify sent the trap messages to Snmp host (NMS). The following picture: Figure 4-121 Trap Config 【Parameter Description】 Parameter Description Destination IP address Snmp host ipv4 address Security name Snmp user name...
Figure 4-122 Configuration example 4.10.3 Rmon config 4.10.3.1 Statistics group In the navigation bar to select “Snmp>Rmon config>statistics group", Set an Ethernet interface statistics .the following picture: Figure 4-123 Statistics group 【Parameter Description】 Parameter Description The index number, the value Index range of statistical information table is 1 ~ 65535...
Page 73
Figure 4-124 Configuration example I Figure 4-125 Configuration example II 4.10.3.2 History group In the navigation bar to select “Snmp>Rmon config>history group", Record the history of an Ethernet interface information. The following picture. Figure 4-126 History group 【Parameter Description】 Parameter Description Historical control table item index Index...
Page 74
Parameter Description table, value range is 1 ~ 65535 Set up the statistical period, Sample Period scope for 5 ~ 3600, the unit is in seconds Set the table creator, range: 1 ~ Owner 30 characters of a string 【Instruction】 At the time of configuration Rmon Snmp functions must be open, otherwise the prompt dialog box will appear.
Page 75
Parameter Description when the event is triggered, the system will log Set the table creator, ownername Owner for 1 ~ 30 characters of a string 【Instruction】 At the time of configuration Rmon Snmp functions must be open; otherwise the prompt dialog box will appear.
Page 76
Parameter Description 15:Pkts65to127Octets. 16:Pkts128to255Octets. 17:Pkts256to511Octets. 18:Pkts512to1023Octets. 19:Pkts1024to1518Octets Set up the corresponding statistics statistical index number, Statistical Group Index decided to statistics to monitor the port number Sampling time interval, the scope Sampling Time Interval for 5 ~ 65535, the unit for seconds Sample types for the absolute value of sampling, the sampling Sampling Type...
Figure 4-131 Configuration example 4.11 LACP In the navigation bar to select "LACP”, you can set to the lacp config. Figure 4-132 LACP 4.11.2 Lacp config In the navigation bar to select "LACP>Lacp config" the following picture: Switch Configuration 67...
Page 78
Figure 4-133 LACP settings 4.11.2.2 LACP Setting In the navigation bar to select "LACP>Lacp config>LACP settings” the following picture: Figure 4-134 LACP settings LACP status Switch Configuration 68...
Page 79
Figure 4-135 LACP status Open or close LACP. LACP public parameter settings Figure 4-136 LACP public parameter settings You can set to System settings, range 1-65535. LACP activation port parameter settings Figure 4-137 LACP activation port parameter settings Port priority: You can set to Port priority. Rang 1-65535 Aggregate port number: You can select the Aggregate port number.
Figure 4-138 LACP display 4.12 SYSTEM In the navigation bar to select “SYSTEM", you can set to the system config, system update, config management, config save, administor privileges and info collect. Figure 4-139 System 4.12.2 System config 4.12.2.1 System settings In the navigation bar to select “SYSTEM>system config>System settings", Basic information set switch.
Page 81
Parameter Description Device Name Switch name Management VLAN Switches use VLAN management Management IP Switch IP address management Don't use more than login timeout Timeout after login to log in again 【Configuration Example】 Step 1 Set up the VLAN 2 is management VLAN, should first created VLAN 2 the VLAN Settings, and set a free port in the VLAN 2.
Page 82
Figure 4-144 Configuration example IV Step 3 Use 192.168.2.12 logging in, sets the system time. Figure 4-145 Configuration example V 4.12.2.2 System restart In the navigation bar to select “SYSTEM>system config>system restart", equipment can be restarted. The following picture: Figure 4-146 System restart 【Instruction】...
Page 83
Click the button to restart the switch. The restart process may take 1 minute. Please wait patiently. The page will be refreshed automatically after device restart.http://192.168.2.1/system/sysreload.htm?1448508984027 【Configuration Example】 Such as: click "restart" button. Figure 4-147 Configuration example 4.12.2.3 EEE Enable In the navigation bar to select "SYSTEM>system config>EEE Enable", The password change to equipment.
Page 84
Such as: amend the password to 1234. Figure 4-150 Configuration example 4.12.2.5 SSH login In the navigation bar to select "SYSTEM>system config>ssh login", SSH open. The following picture: Figure 4-151 SSH login 【Instruction】 Configure the user to be able to switch through the SSH login device. 【Configuration Example】...
Page 85
【Configuration Example】 Such as: Telnet open, PC Telnet function open, you can log in. Figure 4-154 Configuration example 4.12.2.7 System log In the navigation bar to select "SYSTEM>password change>system log", to view the log and set up the log server. the following picture: Figure 4-155 System log 【Parameter Description】...
Figure 4-156 Input the Mac keywords, click "query “button, click on the "clear log" button and can Step 2 clear the log. Figure 4-157 4.12.3 System upgrade In the navigation bar to select “SYSTEM>system upgrade", Optional upgrade file to upgrade. The following picture.
4.12.4 Config management 4.12.4.1 Import/Export Config In the navigation bar to select “SYSTEM>config management>Import/Export Config", can import and export configuration files, the backup file. The following picture: Figure 4-159 【Instruction】 Import process cannot be closed or refresh the page, or import will fail! After the introduction of configuration, to enable the new configuration, please in this page Restart device Otherwise configuration does not take effect.
Page 88
Figure 4-161 Configuration example II Figure 4-162 Configuration example III Step 3 Backup. Figure 4-163 Configuration example IV 4.12.4.2 Restore Config In the navigation bar to select “SYSTEM>config management>Restore Config", you can configure backup file. The following picture: Switch Configuration 78...
Page 89
Figure 4-164 Restore Config 【Instruction】 Operating this page should be in the current configuration page first, the backup file. 【Configuration Example】 Such as: restore backup. Figure 4-165 Configuration example 4.12.4.3 Factory Reset In the navigation bar to select “SYSTEM>config management> Factory configura", Can export the current configuration and restore factory configuration .the following picture: Figure 4-166 Factory reset...
Figure 4-167 Configuration example 4.12.5 Config save In the navigation bar to select “SYSTEM>config save", you can save current configuration. The following picture. Figure 4-168 Config save 【Instruction】 Save settings will delete all default configurations. If there are useful configurations, clickbackup Configurations before save the settings.
Such as: Figure 4-171 Configuration example 4.12.7 Info collect In the navigation bar to select “SYSTEM>info collect", you can collect to the system debug information. The following picture. Figure 4-172 Info collect 【Instruction】 Collect useful infomation, it may take a few moment. 【Configuration Example】...
Appendix 1 Technical Specifications The abbreviations in this glossary are related to the Manual. Hardware Specifications Standards and IEEE 802.3i, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3x, IEEE Protocols 802.3z, IEEE802.1Q , IEEE802.1p, IEEE802.3af, IEEE802.3at 8 x 10/100/1000Mbps Auto-Negotiation ports 2 x 100/1000Mbps SFP port Interface 1 x Console port 1 x AC Power Connector...
Page 93
Software Specification STP/RSTP/MSTP Filtering the IP port Storm-control Static binding IP and Port Monitor Arp trust port Port rate-limit Static routing capacity MAC filtering Ping and Traceroute VLAN Safety features Application protocol...
Need help?
Do you have a question about the DH-PFS4210-8GT-150 and is the answer not in the manual?
Questions and answers