Do you have a question about the GL Series and is the answer not in the manual?
Questions and answers
Summary of Contents for ReadyLinks GL Series
Page 1
GL-x Switch Series Version 1.3 May 31, 2019 ReadyLinks Inc.
Page 2
Revision History Reason for change Revision Date V 1.1 April 21, 2018 Initial release Sep 28, 2018 V 1.2 Added GL-4XCH product V 1.3 May 31, 2019 Added GL-8xT, GL-8xMTv2, GL-4xTH...
1 Overview 1 Overview The GL-x system contains two devices, the Headend Switch GL-8XC/GL-4XCH and the Client device. It enables IP-based Video, Data and VoIP applications over existing coax cabling or telephone lines. It is the industry leading solution solving the secure delivery of IP Multiservice in a high density copper environment.
1 Overview • Upload configuration files, notches management • Reliable HD IPTV and internet distribution • Unique solution for Last Mile, MDU & Campus • Up to 1 Km Bi-Directional solution with no need to upgrade/change the existing infrastructure • Up to 900 Mbps of actual throughput over twisted pair Applications: •...
Page 8
1 Overview Second IP: IP address : 192.168.10.251 IP netmask : 255.255.255.0 IP gateway : Account: Access Level User Name Password Rights Administrator superuser All operations on the switch All operations except the following • Create or delete accounts User manager •...
2 Hardware Descriptions 2 Hardware Descriptions The system contains two devices, local device and remote device, as show in the following drawings. GL-4xTH GL-8xC GL-4xCH GL-8xT GL-8xMTv2 2.1 GL-8xC (Headend) GL-8xC is the device of multiplexer system, as shown in the following drawings. It supports 2 x10G SFP ports, 2 x 10/100/1000BT ports, 8 x coax g.hn Ports, one gigabit monitor port.
Page 10
The following table shows the port descriptions. Label Description Console port: A RS-232 connector for connection to a computer for console control/administration. The RS-232 console port can Console be used for accessing the device CLI (command line interface) for out-of-band management. Monitor port, 1 x 1GE local system provision/monitoring port G1/G2 2 x 1GE Ethernet ports for uplink aggregation...
status Connection Rate 10/100 Mbps The corresponding port connection normal Yellow There is no connection to this port The G1/G2/ MON port is up and this port Blink is working. 2.1.2 Physical and Environmental • Dimension: 19-inch rack-mount width, 1.0U height. •...
Page 12
Label Description Console port: A RS-232 connector for connection to a computer for console control/administration. The RS-232 console port can Console be used for accessing the device CLI (command line interface) for out-of-band management. Monitor port, 1 x 1GE local system provision/monitoring port G1/G2 2 x 1GE Ethernet ports for uplink aggregation XG1/XG2...
The corresponding port connection normal Yellow There is no connection to this port The G1/G2/ MON port is up and this port Blink is working. 2.2.2 Physical and Environmental • Dimension: 19-inch rack-mount width, 1.0U height. • Case: Aluminum, degree of protection IP30 •...
Page 14
Console port: A RS-232 connector for connection to a computer for console control/administration. The RS-232 console port can Console be used for accessing the device CLI (command line interface) for out-of-band management. Monitor port, 1 x 1GE local system provision/monitoring port G1/G2 2 x 1GE Ethernet ports for uplink aggregation 2 x 10GE SFP Ethernet ports for uplink aggregation...
There is no connection to this port The G1/G2/ MON port is up and this port Blink is working. 2.3.2 Physical and Environmental • Dimension: 19-inch rack-mount width, 1.0U height. • Case: Aluminum, degree of protection IP30 • Weight: 3.2Kg •...
Page 16
The following table shows the port descriptions. Label Description Console port: A RS-232 connector for connection to a computer for console control/administration. The Console RS-232 console port can be used for accessing the device CLI (command line interface) for out-of-band management.
corresponding port connection normal Yellow There is no connection to this port The G1/G2/ MON port is up and this port Blink is working. 2.4.2 Physical and Environmental • Dimension: 19-inch rack-mount width, 1.0U height. • Case: Aluminum, degree of protection IP30 •...
Page 18
The following table shows the port descriptions. Label Description Console port: A RS-232 connector for connection to a computer for console control/administration. The Console RS-232 console port can be used for accessing the device CLI (command line interface) for out-of-band management.
The corresponding port connection normal Yellow There is no connection to this port The G1/G2/ MON port is up and this port Blink is working. 2.5.2 Physical and Environmental • Dimension: 19-inch rack-mount width, 1.0U height. • Case: Aluminum, degree of protection IP30 •...
3 Web-based Management 3 GL-x Web-based Management The Web-based management interface is one of many tools specifically designed to assist the network manager in creating complex standalone or network configurations. The GL-x series provides the default network settings for the Web browsers as section Default Configuration, It offers three different login privileges: superuser, manager and guest.
3 Web-based Management 3.1.1 Basic Information The Basic Information is shown as below: 3.1.2 Node Summary Detailed information of all the devices in the system is shown below. Interface Ghn port node. Node Name Name of designated port MAC Address Designated port MAC address Domain Name Designated port domain name, local name is the same as remote...
3 Web-based Management state; Orange: Off state IP Address of designated port. Firmware Version Firmware version of designated port. Node Type Type of designated port. Hardware Version Hardware version of designated port. 3.1.3 Interface Information Interface Ghn Port Node Link Connection status of designated port Local MAC Address Local node MAC address of designated port...
3 Web-based Management Physical TX Speed(Mbps) Physical TX rate of designated portthe data stream rate from designated node to peer node. Unit: Mbps Physical RX Speed(Mbps) Physical RX rate for designated port, the data stream rate from peer node to designated node. Unit: Mbps Notch Index Notch Information Index of Designated Node.
3 Web-based Management be deleted, otherwise it will be saved. Ethernet PVID: When upstream Ethernet data packages without tags reach the port, it will have PVID tag. 3.2.3 Remote Node Configuration This page is to configure remote node and show remote node State. Content display include VLAN, VID, tag/untag/exclude port, PVID, priority of the remote node.
Page 25
3 Web-based Management 3.2.3.1 Remote Vlan Configuration This page is to configure remote node and show remote node state of the selected remote node. Priority: the VLAN priority, in the range of 0 to 7. Other descriptions refer to 3.3.2 802.1Q VLAN 3.2.3.2 Remote Vlan Model Create This page is to create remote node VLAN configuration model.
Page 26
3 Web-based Management Model Number :model number is to create. Model Name:Model name is to create. Model Name Set :Set model name by compound mode. 3.2.3.3 Remote Vlan Model List This page is to show Remote Node VLAN Configuration Model table, Configuration Model is deletable, mouse hover to display more information.
3 Web-based Management 3.2.3.5 Remote Port Setting This page is to configure remote node port and show remote node port state of the selected remote node. 3.2.4 Port Configuration At first, you should select a port for configuration. You can cofigure the port state, negotiation, speed and duplex, flow control, MAC learning and MDI/MDIX.
3 Web-based Management Speed & Duplex There are four choices: 10M Half, 10M Full, 100M Half, and 100M Full. Flow Control If flow control is enabled on both the local and peer switches. If congestion occurs on the local switch: ⚫...
Page 29
3 Web-based Management Step 4 Select the ports as members of an aggregate group (2 ~ 8 ports); Step 5 Click <Apply>, and then the link-aggregation Information will be listed at the lower part. Note: A trunk may be configured as a mirroring port, but it is not allowed to configure a trunk as a monitoring port.
Page 30
3 Web-based Management 3.2.3.3 LACP Port On this page, you can configure dynamic LACP aggregation. A dynamic LACP trunk can only be set or deleted automatically by the protocol. This protocol is based on IEEE802.3ad and uses LACPDUs (link aggregation control protocol data unit) to interact with its peer. After LACP is enabled on a port, LACP notifies the following information of the port to its peer by sending LACPDUs: priority and MAC address of this system, priority, number and operation key of the port.
3 Web-based Management 3.3 VLAN Management 3.3.1 Advanced This page globally sets the VLAN mode from the following: NO VLAN, port-based VLAN and 802.1Q VLAN. 3.3.2 802.1Q VLAN 3.3.2.1 VLAN Configuration On this tab page, you can create a new VLAN group with specific VID and VLAN group name. Up to 4K VLAN groups can be created;...
Page 32
3 Web-based Management VLAN group: Indicates the port is a tagged member of the VLAN group. All packets forwarded by the port are tagged. The packets contain VLAN information. Untag Indicates the port is an untagged VLAN member of the VLAN group. Packets forwarded by the port are untagged.
3 Web-based Management the port accepts all ingress packages; while Admit Only Tagged accepts only tagged packages, and discards untagged ones. The lower part of this tab page lists the status of all ports. 3.3.3 VLAN List This page lists the information of all VLANs, including VID, Name, Type, Tagged ports, Untagged ports, and Forbidden ports.
Page 34
3 Web-based Management 3.3.4.2 Port Configuration With the VLAN VPN function enabled on port, a received packet is tagged with the default VLAN tag of the receiving port no matter whether or not the packet already carries a VLAN tag. If the packet already carries a VLAN tag, the packet becomes a double-tagged packet. Otherwise, the packet becomes a packet carrying the default VLAN tag of the port.
3 Web-based Management Outer Tag VID: A VLAN ID for the outer tag that will be added to the packet. Inner tag VID (Low)/ Inner tag VID (High): An outer tag is added to form a double tag package, if the incoming package has a VLAN ID value between Inner tag VID (Low) and Inner tag VID(High) (all inclusive).
3 Web-based Management 3.4 QoS Configurations In data communications, Quality of Service (QoS) is the ability of a network to provide differentiated service guarantees for diversified traffic in terms of bandwidth, delay, jitter, and drop rate. On traditional IP networks, devices treat all packets equally and handle them using the first in first out (FIFO) policy.
3 Web-based Management Port Select the port to configure The desired egress rate limit to be configured. Choose “disabled” to set the Egress port with no egress rate limit, which means the port will run in full speed for egress traffic. You can also select a specific egress rate from the drop-down list for a port.
3 Web-based Management 3.4.3 Scheduling Mechanism This page sets the queue scheduling algorithm and related parameters. Scheduling Mechanism: Can be set to Strict Priority or Weighted Round-Robin (WRR) Strict Priority: SP queue-scheduling algorithm is specially designed for critical service applications. An important feature of critical services is that they demand preferential service in congestion in order to reduce the response delay.
3 Web-based Management for each queue is not fixed; that is to say, if a queue is empty, the next queue will be scheduled. In this way, the bandwidth resources will be fully used. Weight values for WRR: Q1~Q4 can be set from 1 to 55. 3.4.4 Transmit Queues This page sets the 802.1p priority to local precedence mapping.
3 Web-based Management 3.4.6 Band Limit Band Limit Profile This page is to create ghn bandlimit Band Limit Bind This page is to create ghn bandlimit 3.5 Forwarding The switch has unicast MAC address forwarding, multicast MAC address forwarding, IGMP Snooping, MVR , and unknown muticast.
3 Web-based Management ⚫ The interface to which the device is connected ⚫ The VLAN to which the interface belongs Unicast MAC address configuration is for the unicast forwarding mode. On this page, you can add an entry in MAC table. Specifies a VLAN group with which the MAC address corresponds.
Page 42
3 Web-based Management 3.5.2.2 Node IGMP 3.5.2.3 IGMP Snooping Internet Group Management Protocol Snooping (IGMP Snooping) is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups. By listening to and analyzing IGMP messages, a Layer 2 device running IGMP Snooping establishes mappings between ports and multicast MAC addresses and forwards multicast data based on these mappings.
Page 43
3 Web-based Management shown in the following figure, when IGMP Snooping is not running on the device, multicast packets are broadcasted to all devices at Layer 2. When IGMP Snooping is running on the switch, multicast packets for known multicast groups are multicast to the receivers, rather than broadcast to all hosts, at Layer 2.
Page 44
3 Web-based Management On this page, you can enable the IGMP Snooping feature for a VLAN group. By default, the IGMP Snooping feature is disabled. With the wide use of multicast, IGMPv3 is used more and more. It adds the multicast source filtering function, which enables the receiver to be able to specify the multicast group to join in as well as specify the multicast source to receive multicast information from.
Page 45
3 Web-based Management (4) Multicast Group This page shows IGMP Snooping multicast group information. VID:vlan id Multicast Group:IP address of Multicast Group MAC Address:MAC address of Multicast Group Member Ports:Member Ports of Multicast Group 3.5.2.4 MVR MVR (Multicast VLAN Registration) allows a subscriber on a port to subscribe or unsubscribe a multicast stream on the network-wide multicast VLAN.
Page 46
3 Web-based Management that MVR Group is not configured, multicast data received by the switch is forwarded to all ports, regardless of the port MVR membership setting. In the case that MVR Group is successfully configured, the multicast data is forwarded only to those joined receiver ports set by MVR static configuration.
3 Web-based Management 3.5.2.5 Unknown Multicast 3.6 Security 3.6.1 Management 3.6.1.1 Login There are four switch access methods, including via console, http, telnet and SSH. Each method has two ways: local and TACACS+. Local means you can log in with default account and password.
Page 48
3 Web-based Management 3.6.1.3 Radius This page configures Radius configuration Authentication RADIUS Server IP IP address of the radius server to be used, a valid unicast address in dotted decimal notation; the default value is 192.168.0.234. Authentication Port UDP port number of the radius server, ranging from 0 to 65535;...
3 Web-based Management IP Address Configure TACACS+ server IP address. TCP Port No. Configure TCP transmission port number, range is 0~65535,default value is 49. Generally, default configuration is OK. Encryption Key Configure the same key as TACACS+ server. Port Authentication 3.6.2 3.6.2.1 Basic Configuration IEEE 802.1x authentication system uses extensible authentication protocol (EAP) to exchange...
Page 50
3 Web-based Management another authentication request re-initiated by the supplicant system. During this quiet period, the switch does not perform any 802.1x authentication-related actions for the supplicant system. The value is in the range of 1 to 65535, and is set to 60 seconds by default. Tx Period Set the transmission timer, and is triggered in two cases.
Page 51
3 Web-based Management 3.6.2.2 802.1x Port-based This tab page sets 802.1x port enabling, port control, re-authentication and Guest VLAN for a specified Ethernet port. There are three choices for Port Control: Auto, Force Authorized and Force Unauthorized. Configuration Steps: Step 1 Specify the port to configure Caution: The port to configure authentication cannot be link-aggregation port.
3 Web-based Management to provide limited services to the clients. Step 4 Enable or disable Re-authentication Step 5 Enable or disable Guest VLAN The Guest VLAN function enables supplicant systems that that are not authenticated to access network resources in a restrained way. It enables supplicant systems that do not have 802.1x client installed to access specific network resources.
3 Web-based Management 3.6.3.3 Authentication Infor This page lists all the MAC authentication information including MAC Address, From Port, and Authenticate state. 3.6.4 IP Binding This page sets IP address, Unicast MAC Address, and Port for IP binding. The lower part of this page lists all the IP binding information 3.6.5 IP Source Guard By filtering packets on a per-port basis, IP source guard prevents illegal packets from...
3 Web-based Management binding entries. Binding is on a per-port basis. After a binding entry is configured on a port, it is effective only to the port. 3.6.5.1 Port Configuration On this page, you can enable or disable the IP Source Guard function on a specified port. It also shows the IP Source Guard Port List at the lower of the page.
Page 55
3 Web-based Management Automatic assignment The DHCP server assigns IP addresses to DHCP clients. The DHCP clients will occupy the IP addresses permanently. Dynamic assignment The DHCP server assigns IP addresses to DHCP clients for a predetermined period of time. In this case, a DHCP client must apply for an IP address again at the expiration of the period.
Page 56
3 Web-based Management If remote ID sub-option is configured, forward the packet after replacing the remote ID sub-option of the original Option 82 with the configured remote ID sub-option in ASCII format. Drop Drop the packet. Keep Forward the packet without changing Option 82. 3.7.6.2 Port Configuration When an unauthorized DHCP server exists in the network, a DHCP client may obtains an illegal IP address.
3 Web-based Management 3.6.6.3 Group Information This page displays the DHCP Snooping group information. Take the configuration in the following figure as an example for illustration. A device with the MAC 6c-f0-49-82-be-cf of VLAN 1, connected with the Ethernet 0/1 port, successfully got an IP address 192.168.104.250 from a DHCP server, and the lease time is 259200 seconds.
3 Web-based Management 3.6.7.2 Basic Configuration This page sets the DHCP Misc Configuration. DHCP Protective-down Recover Enable/disable the recovering function when DHCP has been off due to exceeding the speed limit. Recover Interval When DHCP traffic over-speeds the rate limit, the specified port will be disabled for a specified time.
3 Web-based Management consistent with the DHCP-Snooping information, if matching, ARP packets will be forwarded. The lower part of this page lists all Dynamic ARP Inspection VLAN status. 3.6.8.2 Port Configuration This page sets the Dynamic ARP Inspection trust port for the specified Ethernet Port. ARP packets coming from the trusted ports will not be checked.
3 Web-based Management normally and even goes down. In addition, the switch supports port state auto-recovery. After a port is shut down due to over-high packet rate, it resumes automatically after a configurable period of time. 3.6.9.1 Port Configuration This page sets the ARP Rate Limit for a specified Ethernet Port. Port Specify a port to configure DHCP rate limit Rate Limit...
3 Web-based Management (Destination Lookup Failed) packets passing through a port, thus it will lead to traffic congestion. If the transmission rate of the three kinds of packets exceeds the set bandwidth, the packets will automatically be discarded to avoid network broadcast storm. This page sets thresholds of the specified Traffic Type.
3 Web-based Management authenticated users allowed, however, cannot exceed the configured upper limit. By setting the maximum number of MAC addresses allowed on a port, you can • Control the maximum number of users who are allowed to access the network through the port •...
Page 63
3 Web-based Management On this tab page, you can create a new ACL with specific ACL ID and type of ACL. There are three types of ACL: Basic IP ACL: The filtering packets only based on source IP address. Advance IP ACL: The filtering packets based on source IP address, destination IP address, IP protocol type, and more.
Page 64
3 Web-based Management 3.6.12.3 Advanced IP ACL This page sets ACL rules based on packet Src IP Address, Dst IP Address, IP Protocol type and other protocol features, such as TCP or UDP source port, destination port, ICMP protocol message type etc. Rule ID: identification of the ACL rule.
Page 65
3 Web-based Management Protocol Type: an existing protocol type such as Icmp, igmp, Udp, Tcp, Ospf, or an integer between 1 and 255. Src IP Address: source host IP address. Src IP Mask: source host IP subnet mask. Src L4 Port: TCP/UDP source port, an existing Echo, Frp, telnet, Smtp, WWW, or an integer between 1 to 65535.
3 Web-based Management Rule ID Specify ACL rules. Priority Re-set packet priority. Traffic Limit Enable/disable traffic limit. Target Rate Set target rate. Burst Set burst rate. Traffic Statistic Enable/disable traffic statistics. 3.6.12.6 Port Binding This page sets the binding of an Ethernet port to a specified ACL ID. If a port is bound, the binding will be applied to all the rules associated to this ACL ID.
3 Web-based Management 3.6.14 LBD Loopback Detection to monitor whether the packet from the port back through the port equipment, used to determine under port network whether there is a loop. 3.6.14.1 Basic Configuration LBD: enable or disabled LBD Interval Times: config interval time for loopback detection 3.6.14.2 Port Configuration LBD Admin: enable or disable Loopback detection on this port LBD Control: configure port loopback detection control.
3 Web-based Management 3.7.1 Global Configuration Before configuring STP, make sure STP is enabled This page sets bridge configurations: Mode, Max Hops, Hello Time, Max Age, Forward Delay Time, Priority, and BPDU Guard. Mode: Three spanning tree modes are supported: STP, RSTP, and MSTP. Max Hops: This value is in the range of 1 to 20, and is 20 by default.
3 Web-based Management As for the configuration of Hello Time, Forward Delay Time, and Max Age, the following formulas must be met to prevent frequent network jitter: 2 × (Forward Delay Time – 1 second) >= Max Age, and Max Age >= 2 × (Hello Time + 1 second).
Page 70
3 Web-based Management because no loop can be incurred by network topology change on edge ports. The spanning tree protocol allows a port to enter the forwarding state rapidly by setting it to be an edge port, and it is recommended to configure the Ethernet ports connected directly to user terminals as edge ports, so that they may enter the forwarding state immediately.
Page 71
3 Web-based Management disconnected from the link). This page sets STP, Edge Port, P2P, Migration, Tx Hold Count, External Cost, Priority, and Root Guard for each port. Edge Port: selects Enabled to configure the specified Ethernet port as an edge port. By default, all Ethernet ports are non-edge ports.
3 Web-based Management configuration BPDUs with priorities higher than that of a root bridge, which will cause a new root bridge to be elected and network topology jitter will occur. In this case, data flows that should have been transmitted along a high-speed link may be led to a low-speed link. This problem can be resolved by enabling the root protection function.
Page 73
3 Web-based Management 3.7.3.1 Basic Configuration This page sets Region Name and Revision level of MST configuration Identifiers. Region Name: a variable length text string of up to 32 octets Revision level: a 2-octet unsigned integer. It ranges from 0 to 65535. 3.7.3.2 MSTI Configuration This page sets MSTI ID, MSTI Admin, and Priority for each MST instance.
3 Web-based Management 3.7.4 MSTP Ports 3.7.4.1 Basic Configuration This page can set Port, Admin, Edge Port, P2P, and External Cost for each port. Similar to STP and RSTP port configuration described in section 3.4.2 Ports Configuration, this page sets MSTP port configuration. 3.7.4.2 MSTI Ports This page sets the Internal Cost and Priority for each MST instance.
3 Web-based Management Internal Cost: sets the path cost of the specified port in a specified MST instance. It is in the range from 1 to 200000000, and the default value is 0 (Auto). Priority: sets the port priority for the specified port in a specified MST instance. It is in the range from 0 to 240, and the default value is 128.
3 Web-based Management TxGoodPkts The total number of outgoing normal packets on the port, including outgoing normal packets and normal pause frames TxBadPkts The total byte number of outgoing error frames RxGoodPkts The total number of incoming normal packets on the port, including incoming normal packets and normal pause frames RxBadPkts The total number of incoming error frames...
3 Web-based Management Tx Speed Threshold:Tx Speed Threshold(0=Disable) Alarm:Red is on if alarm occurs; Green is on if there is no alarm. 3.8.3 Port Mirroring Port mirroring refers to the process of copying the packets received or sent by the specified port to the destination port for packet analysis and monitoring.
3 Web-based Management Tx Port: Means only to mirror the packets sent by the port; Rx /Tx Port: Means to mirror the packets received and sent by the port. Step 4 Click <Apply> to make it effective. 3.8.4 Port SFP Information This page shows the optical module information 3.8.5 Port Cable Diag This page shows the port cable diagnosis information...
3 Web-based Management 3.9 SNMP Manager The Simple Network Management Protocol (SNMP) is an Internet standard protocol used to transmit network management information between any two devices. It enables network...
3 Web-based Management administrators to read and set the variables on managed devices, diagnose network problems, plan for network capacity, and create reports. SNMP employs a polling mechanism. It offers an essential set of features, and is especially suitable for small, fast, and low-cost networks. SNMP is based on the connectionless protocol UDP in the transport layer;...
3 Web-based Management SNMP Version To create a SNMPv1 user. To create a SNMPv2c user. Community Name The name of the community. It is a string with 3 to 16 characters Access Privilege The rights to read and/or write The community has read-only privilege of MIB objects. This type of communities can only query MIBs for device information.
3 Web-based Management The authentication is performed via SHA (Secure Hash Algorithm). This authentication mode is of higher security than MD5 mode. Auth Password: Type the password for authentication. It is a string of 9 to 15 characters in plain text, or a 32-bit hexadecimal number in cipher text if MD5 algorithm is used, or a 40-bit hexadecimal number in cipher text if SHA algorithm is used.
3 Web-based Management 3.9.3.3 Trap Port Enable or disable the trap function for each port. The lower part of this page lists the trap status of all ports. 3.10 RMON Remote Monitoring (RMON) is used to realize the monitoring and management from the management devices to the managed devices on the network by implementing such functions as statistics and alarm.
Page 84
3 Web-based Management Stats Octets The total number of octets of received and sent data, including bad packets, received from network; it excludes framing bits but includes Frame Check Sequence (FCS) octets. Stats Pkts The total number of packets received and sent, including bad packets, broadcast packets and multicast packets.
3 Web-based Management Jabbers The total number of the received packets that are longer than 1518 octets (excluding framing bits, but including FCS octets), and has either a bad FCS with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
3 Web-based Management Sampling number The number of discrete sampling intervals over which data shall be saved in the part of the media-specific table associated with this history control entry. The lower part of the interface will list the RMON history entries, which can be deleted. 3.10.2.2 History List On this page, one of the history can be selected to show the relate statistics.
3 Web-based Management Variable: The drop-down list includes In Octets, In Unicast Pks, In None Unicast Pks, In Discarded Pks, In Error Pks, In Unknown Protocol Pks, Out Octets, Out Unicast Pks, Out None Unicast Pks, Out Discarded Pks, Out Error Pks, RMON Drop Events, RMON Received Octets, RMON Received Pks, RMON Broadcast Pks, RMON Multicast Pks, RMON CRC Align Pks, RMON Undersize Pks, RMON Oversize Pks, RMON Fragments, RMON Jabbers, RMON Collisions, 64 Octets Pks, 65 to 127 Octets Pks, 128 to 255 Octets Pks, 256 to 511 Octets Pks,...
3 Web-based Management • Log and trap: The trap will be shown in Event Log and sent to the specified trap host. Step 4 Specify the owner for available management in Event Log. Step 5 Click <Create>. The bottom part of this tab page lists all existing event entries. 3.10.4.2 Event Log This page shows information about event log entries, including Event Index, Log Index, Log Time and Description.
3 Web-based Management EthernetII: the Ethernet frame of type 0x88cc. SNAP: the Ethernet frame of type 0xAAAA-0300-0000-88CC. 3.11.1.3 TLVs This page sets the type of transmitting information: Port Description, System Name, System Description, System Capability, and Management Address. 3.11.2 Neighbor This page shows the Local Port, Chassis Id of a local device, and the Remote Port ID, System name, Port description, System Capabilities, and Management Address of a neighbor device.
3 Web-based Management 3.12 Administration 3.12.1 DHCP Server 3.12.1.1 Configuration This page sets dhcp server information 3.12.1.2 Client List 3.12.2 SNTP An administrator is unable to keep time synchronized among all the devices within a network by changing the system clock on each device, because this is a significant amount of work and does not guarantee clock accuracy.
3 Web-based Management SNTP Mode Select Service mode or Client mode. If you select the Client mode, time synchronization on the switch can be achieved by sending a clock synchronization message to an SNTP server and receiving its reply. Service IP address IP address of the SNTP server Response Time Time interval in seconds for the switch to get a response from the...
3 Web-based Management 3.12.5 Account On this page, Add Account is used to add a new account. A set of specified Username, Password and Privilege for the new account shall be assigned. Username: Username, a string of 3 to 16 characters. Password: Password, a string of 1 to 16 characters.
3 Web-based Management 3.12.6 Firmware Upgrade 3.12.6.1 Switch Firmware This page sets TFTP Server IP and Firmware Name. Make sure the switch is connected to the TFTP server before clicking <Apply> to update the switch firmware. 3.12.6.2 Node Firmware 1) Firmware loader If you want to load local software, you must choose DM.
Page 94
3 Web-based Management Save And Reboot: To save current configuration and then reboot. Reboot Without Save: To directly reboot without saving current configuration -- all changes may be lost. 3.12.7.2 Switch Reset The switch will be reset to factory default setting, except for IP address and user accounts. 3.12.7.3 Switch Reset to Default The switch will be reset to factory default setting.
3 Web-based Management 3.12.8 Configuration Management 3.12.8.1 Backup Configuration This page sets TFTP Server IP and File Name. Make sure the switch is connected to the TFTP server before clicking <Apply> to upload the switch configuration file specified in “File Name”...
3 Web-based Management 3.12.10.2 System Logs This page shows the system logs. All logs can be shown on one page. Click <Clear>, all system logs can be cleared. The main type of log: ⚫ Port up/down ⚫ System Restart ⚫ Update Firmware ⚫...
Need help?
Do you have a question about the GL Series and is the answer not in the manual?
Questions and answers