Versitron Web Smart+ SG71070M User Manual

10-port 10/100/1000 managed switch with 1g/10g sfp slots
Table of Contents

Advertisement

Quick Links

SG71070M
10-Port 10/100/1000
Web Smart+ Managed Switch
with 1G/10G SFP Slots
'
'
U
s
e
r
s
M
U
s
e
r
s
M
v
v
1
1
.
.
0
0
© November 2016
VERSITRON, Inc.
83 Albe Drive / Suite C
Newark, DE 19702
www.versitron.com
i
a
n
u
a
l
a
n
u
a
l
0
0
SG71070M
Revision A3

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Web Smart+ SG71070M and is the answer not in the manual?

Questions and answers

Summary of Contents for Versitron Web Smart+ SG71070M

  • Page 1 SG71070M 10-Port 10/100/1000 Web Smart+ Managed Switch with 1G/10G SFP Slots ’ ’ © November 2016 VERSITRON, Inc. 83 Albe Drive / Suite C Newark, DE 19702 www.versitron.com SG71070M Revision A3...
  • Page 2 Copyright  VERSITRON, Inc. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies. PROPRIETARY DATA All data in this manual is proprietary and may not be disclosed, used or duplicated, for procurement or manufacturing purposes, without prior written permission by VERSITRON.
  • Page 3 See the VERSITRON, Inc. warranty statement. Disclaimer VERSITRON, Inc. does not warrant that the hardware will work properly in all environments and applications, and marks no warranty and representation, either implied or expressed, with respect to the quality, performance, merchantability, or fitness for a particular purpose.
  • Page 4: Table Of Contents

    Table of Contents Revision History .............................. vi INTRODUCTION ........................1 CHAPTER 1 OPERATION OF WEB-BASED MANAGEMENT ........2 CHAPTER 2 SYSTEM CONFIGURATION ..............3 2-1 System ..............................3 2-1.1 Information ............................. 3 2-1.2 IP ................................4 2-1.3 NTP ................................7 2-1.4 Time .................................
  • Page 5 2-9.3 Filtering Profile ............................. 51 2-10 VLANS ..............................52 2-11 Private VLANS ........................... 56 2-11.1 VLAN Membership ..........................56 2-11.2 Port Isolation ............................57 2-12 VCL ..............................58 2-12.1 MAC-based VLAN..........................58 2-12.2 Protocol -based VLAN ........................59 2-12.2.1 Group to VLAN ........................... 59 2-12.2.2 Protocol to Group ........................
  • Page 6: Revision History

    3-6 IGMP Snooping ........................... 96 3-6.1 Status ..............................96 3-6.2 Group Information ..........................98 3-6.3 IPv4 SSM Information ......................... 99 3-7 VLANS ..............................100 3-7.1 VLAN Membership ..........................100 3-7.2 VLAN Port ............................101 3-8 Loop Protection ..........................103 3-9 LLDP ..............................104 3-9.1 LLDP information ..........................
  • Page 7: Introduction

    INTRODUCTION Overview The SG71070M Web Smart+ Managed Switch is a cost-effective 10GbE Ethernet Switch offering 10G copper and fiber connections in a small form factor. With the enormous growth of network traffic and network storage in recent years, 10GbE is becoming a natural upgrade for many businesses in order to keep up with their network performance and business efficiency demands.
  • Page 8: Chapter 1 Operation Of Web-Based Management

    Operation of Web-based Management Chapter 1 Initial SG71070M This chapter instructs you how to configure and manage the through the web user interface. With this feature, you can easily access and monitor the switch Configuration through any port, including MIBs status, port activity, port aggregation status, multicast traffic, VLAN and priority status, even illegal access records, etc..
  • Page 9: Chapter 2 System Configuration

    System Configuration Chapter 2 This chapter describes the basic configuration tasks which include the System Information and any other settings (e.g. Time, Account, IP, Syslog and SNTP.) 2-1 System You can identify the system by configuring the contact information, name, and location of the switch.
  • Page 10: 2-1.2 Ip

    2-1.2 IP The IPv4 address for the switch could be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to change the switch's default settings to values that are compatible with your network. You may also need to establish a default gateway between the switch and management stations that exist on another network segment.
  • Page 11 IP Interfaces Delete  Select this option to delete an existing IP interface. VLAN  The VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface. This field is only available for input when creating a new interface. IPv4 DHCP Enabled ...
  • Page 12 Mask Length  The destination IP network or host mask, in number of bits (prefix length). It defines how much of a network address that must match, in order to qualify for this route. Valid values are between 0 and 32 bits respectively 128 for IPv6 routes. Only a default route will have a mask length of 0 (as it will match anything).
  • Page 13: 2-1.3 Ntp

    2-1.3 NTP NTP is Network Time Protocol and is used to sync the network time based on Greenwich Mean Time (GMT). If you use the NTP mode and select a built-in NTP time server or manually specify a user-defined NTP server as well as Time Zone, the switch will sync the time shortly after pressing the <Apply>...
  • Page 14 can only appear once. It can also represent a legally valid IPv4 address. For example, '::192.1.2.34'. Buttons  These buttons are displayed on the NTP page: Apply – Click to save changes. Reset - Click to undo any changes made locally and revert to previously saved values. SG71070M Revision A3...
  • Page 15: 2-1.4 Time

    2-1.4 Time The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour” and “Minute” within the valid value range indicated in each item. Web interface To configure Time Configuration in the web interface: 1.
  • Page 16 Show the current time of the system. The year of system date limits between 2011 and 2037. Time Zone Configuration Time Zone  Lists various Time Zones worldwide. Select appropriate Time Zone from the drop down and click Apply to set. Acronym ...
  • Page 17: 2-1.5 Log

    2-1.5 Log The log is standard for logging program messages . It allows separation of the software that generates messages from the system that stores them, and the software that reports and analyzes them. It can be used as well for generalized information, analysis and debugging messages.
  • Page 18: Ports Configuration

    2-2 Ports Configuration The section describes how to configure the Port detail parameters of the switch. Port configure can be used to enable or disable a port, monitor the ports content, or status. 2-2.1 Ports This page displays current port configurations. Web Interface To configure a port in the web interface: 1.
  • Page 19 Maximum Frame Size  Enter the maximum frame size allowed for the switch port, including FCS.  Controls whether EEE is enabled for this switch port. Buttons  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. Upper right icon (Refresh) ...
  • Page 20: Dhcp

    2-3 DHCP The section describes how to configure the DHCP Snooping parameters of the switch. DHCP Snooping can prevent attackers from adding their own DHCP servers to the network. 2-3.1 Snooping DHCP Snooping is used to block intruders on the untrusted ports of the switch when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server.
  • Page 21: Security

    2-4 Security This section shows you to configure the Port Security settings of the switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. 2-4.1 Switch 2-4.1.1 Users This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser.
  • Page 22 ASCII characters from 32 to 126. Password (again)  To type the password again. You must type the same password again in the field. Privilege Level  The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e.
  • Page 23: 2-4.2 Network

    2-4.2 Network 2-4.2.1 Access Control List The section describes how to configure the Access Control List rules. An Access Control List (ACL) is a sequential list of permit or deny conditions that apply to IP addresses, MAC addresses, or other more specific criteria. This switch tests ingress packets against the conditions in an ACL one by one.
  • Page 24 Parameter description: Ingress Port  Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Policy: The ACE will match ingress ports with a specific policy. Port: The ACE will match a specific ingress port. Frame Type ...
  • Page 25 Enabled: Frames received on the port are mirrored. Disabled: Frames received on the port are not mirrored. The default value is "Disabled". Logging  Indicates the logging operation of the ACE. Possible values are: Enabled: Frames matching the ACE are stored in the System Log. Disabled: Frames matching the ACE are not logged.
  • Page 26 DMAC Value  When "Specific" is selected for the DMAC filter, you can enter a specific destination MAC address. The legal format is "xx-xx-xx-xx-xx-xx" or "xx.xx.xx.xx.xx.xx" or "xxxxxxxxxxxx" (x is a hexadecimal digit). A frame that hits this ACE matches this DMAC value. Buttons ...
  • Page 27: 2-4.2.2 Ip Source Guard

    2-4.2.2 IP Source Guard The section describes how to configure the IP Source Guard detail parameters of the switch. You could use the IP Source Guard configuration to enable or disable a port of the switch. 2-4.2.2.1 Configuration This section describes how to configure IP Source Guard settings including: Mode (Enabled and Disabled) Maximum Dynamic Clients (0, 1, 2, Unlimited) Web Interface...
  • Page 28 2-4.2.2.2 Static Table The section describes how to configure the Static IP Source Guard Table parameters of the switch. You could use the Static IP Source Guard Table configuration to manage the entries. Web Interface To configure a Static IP Source Guard Table Configuration in the web interface: 1.
  • Page 29: 2-4.2.3 Arp Inspection

    2-4.2.3 ARP Inspection The section describes how to configure the ARP Inspection parameters of the switch. You could use the ARP Inspection configuration to manage the ARP table. 2-4.2.3.1 Configuration This section describes how to configure ARP Inspection settings including: Mode (Enabled and Disabled).
  • Page 30 Enabled: Enable check VLAN operation. Disabled: Disable check VLAN operation. Only the Global Mode and Port Mode on a given port are enabled, and the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. There are four log types and possible types are: None: Log nothing.
  • Page 31 2-4.2.3.2 VLAN Mode Configuration Each page shows up to 4K entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table.
  • Page 32 2-4.2.3.3 Static Table The section describes how to configure the Static ARP Inspection Table parameters of the switch. You could use the Static ARP Inspection Table configuration to manage the ARP entries. Web Interface To configure a Static ARP Inspection Table Configuration in the web interface: 1.
  • Page 33: Aggregation

    2-5 Aggregation Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex, and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipment to build the bandwidth aggregation.
  • Page 34 LACP: A port use LACP as its trunk method to get aggregated with other ports also using LACP. Static: A port use Static Trunk as its trunk method to get aggregated with other ports also using Static Trunk. Group  Ports choosing the same trunking method other than “None”...
  • Page 35: 2-5.2 Aggregator View

    2-5.2 Aggregator View To display the current port trunking information from the aggregator point of view. Web Interface To configure the Aggregation view in the web interface: 1. Click Configuration, Aggregation, and Aggregator View. 2. Select Lacp Detail. 3. Click the Lacp Detail. Figure 2-5.2: The Aggregator View Parameter description: Aggregator...
  • Page 36: 2-5.3 Aggregation Hash Mode

    Show only the ready member ports within an aggregator (port). Lacp Detail  Select port to show lacp detail. 2-5.3 Aggregation Hash Mode To display the current port trunking information from the aggregator point of view. Web Interface To configure the Aggregation Hash Mode in the web interface: 1.
  • Page 37: 2-5.4 Lacp System Priority

    2-5.4 LACP System Priority It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system. Each system that supports LACP will be assigned a globally unique System Identifier for this purpose.
  • Page 38: Mstp

    2-6 MSTP Multiple Spanning Tree Protocol. MSTP allows frames assigned to different VLANS to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MST Bridges. Proper configuration of MSTP in an 802.1Q VLAN environment can ensure a loop-free data path for a group of VLANS within an MSTI.
  • Page 39: 2-6.2 Region Config

    2-6.2 Region Config To configure the basic identification of a MSTP bridge, bridges participating in a common MST region must have the same Region Name and Revision Level. Web Interface To configure the Region Config in the web interface: 1. Click Configuration, MSTP, and Region config. 2.
  • Page 40: 2-6.3 Instance View

    2-6.3 Instance View Providing an MST instance table which includes information (VLAN membership of a MSTI) of all spanning instances provisioned in the particular MST region which the bridge belongs. Through this table, additional MSTP configuration data can be applied and MSTP status can be retrieved.
  • Page 41 MSTP. Instance Status  To show the status report of a particular spanning tree instance. Port Status  To show the status report of all ports regarding a specific spanning tree instance. Instance ID  Every spanning tree instance need to have a unique instance ID within 0~4095. Instance 0 (CIST) always exists and cannot be deleted.
  • Page 42 to the neighboring bridge. If the Remaining Hops in a message is zero, the message (BPDU) would be regarded as invalid. Max Hops is used to specify the initial value of the Remaining Hops for Regional Root Bridge (Either CIST Regional Root or MSTI Regional Root). Path Cost ...
  • Page 43 “Yes” causes the Port not to propagate received topology change notifications and topology changes to other Ports. This parameter is “No” by default. If set it can cause temporary loss of connectivity after changes in a spanning trees active topology as a result of persistent incorrectly learned station location information.
  • Page 44 Mac Address of the CIST root bridge. CIST EXTERNAL ROOT PATH COST  Root path cost value from the point of view of the bridge’s MST region. CIST ROOT PORT ID  The port ID of the bridge’s root port. In MSTP, peer port of a root port may reside in different MST region or in the same MST region.
  • Page 45 Display currently resolved port path cost value for each port in a particular spanning tree instance. Priority  Display port priority value for each port in a particular spanning tree instance. Hello  Per port Hello Time display. It takes the following form: Current Hello Time/Hello Time Setting.
  • Page 46: Ipmc Profile

    2-7 IPMC Profile This page provides IPMC Profile related configurations. 2-7.1 Profile Table The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each. Web Interface To configure the IPMC Profile Configuration in the web interface: Figure 2-7.1: The IPMC Profile Configuration...
  • Page 47: 2-7.1.1 Ipmc Profile Rule Settings Table

    Port  The switch port number of the corresponding STP CIST (and MSTI) port. Global Profile Mode  Enable/Disable the Global IPMC Profile. System starts to do filtering based on profile settings only when the global profile mode is enabled. Delete ...
  • Page 48 will be adjusted automatically according to the selected profile entry. Action  Indicates the learning action upon receiving the Join/Report frame that has the group address matches the address range of the rule. Permit: Group address matches the range specified in the rule will be learned. Deny: Group address matches the range specified in the rule will be dropped.
  • Page 49: 2-7.2 Address Entry

    2-7.2 Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile. It is allowed to create at maximum 128 address entries in the system. Web Interface To configure the IPMC Profile Address Configuration in the web interface: Figure 2-7.2: The IPMC Profile Address Configuration...
  • Page 50: Mac Table

    2-8 MAC Table Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame). This table contains both static and dynamic entries.
  • Page 51 Parameter description: Aging Configuration  By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Configure aging time by entering a value here in seconds; for example, Age time seconds. The allowed range is 10 to 1000000 seconds. Disable the automatic aging of dynamic entries by checking Disable automatic aging.
  • Page 52 Block  Block all packet which VLAN and Mac address is match if the “block” is evoke. Port Members  Checkmarks indicate which ports are members of the entry. Check or uncheck as needed to modify the entry. Buttons  Apply –...
  • Page 53: Igmp Snooping

    2-9 IGMP Snooping The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping cannot tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
  • Page 54 Parameter description: Snooping Enabled  Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled  Enable unregistered IPMCv4 traffic flooding. IGMP SSM Range  SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Format: (IP address/ Sub mask) Proxy Enabled ...
  • Page 55: 2-9.2 Vlan Configuration

    2-9.2 VLAN Configuration The section describes the VLAN configuration setting process integrated with IGMP Snooping function. For each setting, the page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table.
  • Page 56 the versions of IGMP operating on hosts and routers within a network. The allowed selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2, Forced IGMPv3, default compatibility value is IGMP-Auto.  Robustness Variable. The Robustness Variable allows tuning for the expected packet loss on a network.
  • Page 57: 2-9.3 Filtering Profile

    2-9.3 Filtering Profile The section describes how to set the IGMP Port Group Filtering. With the IGMP filtering feature, a user can exert this type of control. In some network application environments, as like the metropolitan or multiple-dwelling unit (MDU) installations, a user might want to control the multicast groups to which a user on a switch port can belong.
  • Page 58: Vlans

    Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. 2-10 VLANS Assign a specific VLAN for management. The management VLAN is used to establish an IP connection to the switch from a workstation connected to a port in the VLAN.
  • Page 59 the individual elements are separated by commas. Ranges are specified with a dash separating the lower and upper bound. The following example will create VLANS 1, 10, 11, 12, 13, 200, and 300: 1, 10-13,200,300. Spaces are allowed in between the delimiters. Port ...
  • Page 60 Port Type  Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on. Likewise, on egress, the Port Type determines the TPID of the tag, if a tag is required.
  • Page 61 relevant tag. Tag All All frames, whether classified to the Port VLAN or not, are transmitted with a tag. Untag All All frames, whether classified to the Port VLAN or not, are transmitted without a tag. This option is only available for ports in Hybrid mode. Allowed VLANS ...
  • Page 62: Private Vlans

    2-11 Private VLANS In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a private VLAN. 2-11.1 VLAN Membership The VLAN membership configuration for the selected stack switch unit switch can be monitored and modified here.
  • Page 63: 2-11.2 Port Isolation

    Reset- Click to undo any changes made locally and revert to previously saved values. 2-11.2 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port.
  • Page 64: Vcl

    2-12 VCL 2-12.1 MAC-based VLAN MAC address-based VLAN decides the VLAN for forwarding an untagged frame based on the source MAC address of the frame. A most common way of grouping VLAN members is by port, hence the name port-based VLAN.
  • Page 65: 2-12.2 Protocol -Based Vlan

    2-12.2 Protocol -based VLAN This section describes Protocol-based VLAN. The switch supports protocols including Ethernet, LLC, and SNAP. The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI reference model.
  • Page 66: 2-12.2.2 Protocol To Group

    VLAN ID :  Indicates the ID to which Group Name will be mapped. A valid VLAN ID ranges from 1-4095. Port Members  A row of check boxes for each port is displayed for each Group Name to VLAN ID mapping. To include a port in a mapping, check the box.
  • Page 67 On changing the Frame type field, valid value of the following text field will vary depending on the new frame type you selected. Value  Valid value that can be entered in this text field depends on the option selected from the preceding Frame Type selection menu.
  • Page 68: 2-12.3 Ip Subnet-Based Vlan

    2-12.3 IP Subnet-based VLAN The IP subnet-based VLAN entries can be configured here. This page allows for adding, updating, and deleting IP subnet-based VLAN entries and assigning the entries to different ports. This page shows only static entries. Web Interface To Display IP subnet-based VLAN Membership to configured in the web interface: Click VCL, Group Name VLAN configuration and add new entry.
  • Page 69: Qos

    2-13 QoS This switch supports four QoS queues per port with strict or weighted fair queuing scheduling. It supports QoS Control Lists (QCL) for advance programmable QoS classification, based on IEEE 802.1p, Ethertype, VID, IPv4/IPv6 DSCP and UDP/TCP ports and ranges. High flexibility in the classification of incoming frames to a QoS class.
  • Page 70 Parameter description: Port  The port number for which the configuration below applies.  Controls the default PCP value. All frames are classified to a PCP value. If the port is VLAN aware and the frame is tagged, then the frame is classified to the PCP value in the tag.
  • Page 71: 2-13.2 Port Policing

    2-13.2 Port Policing This section provides an overview of the QoS Ingress Port Policers for all switch ports. The Port Policing is useful in constraining traffic flows and marking frames above specific rates. Policing is primarily useful for data flows and voice or video flows because voice and video usually maintains a steady rate of traffic.
  • Page 72: 2-13.3 Port Shaper

    2-13.3 Port Shaper This section provides an overview of QoS Egress Port Shaping for all switch ports, such as getting detailed information for the ports belonging to the currently selected unit, as reflected by the page header. Web Interface To display the QoS Egress Port Shaper in the web interface: 1.
  • Page 73 Port Shaper Enable  Controls whether the port shaper is enabled for this switch port. Port Shaper Rate  Controls the rate for the port shaper. The default value is 500. This value is restricted to 100-1000000 when the "Unit" is "kbps", and it is restricted to 1-13200 when the "Unit" is "Mbps".
  • Page 74: 2-13.4 Port Scheduler

    2-13.4 Port Scheduler This section provides an overview of QoS Egress Port Shapers for all switch ports, such as getting detailed information for the ports belonging to the currently selected stack unit, as reflected by the page header. Web Interface To display the QoS Egress Port Scheduler in the web interface: 1.
  • Page 75 This parameter is only shown if "Scheduler Mode" is set to "Weighted". . Buttons  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. SG71070M Revision A3...
  • Page 76: 2-13.5 Port Tag Classification

    2-13.5 Port Tag Classification The section allows you to configure the basic QoS Ingress Classification settings for all switch ports as they relate to the currently selected stack unit, as reflected by the page header. Web Interface To configure the QoS Ingress Port Classification parameters in the web interface: 1.
  • Page 77: 2-13.6 Port Tag Remarking

    Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters.  Actual Drop Precedence Level. Buttons  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previously saved values. 2-13.6 Port Tag Remarking The Section provides an overview of QoS Egress Port Tag Remarking for all switch ports as they relate to the currently selected stack unit, as reflected by the page header.
  • Page 78: 2-13.7 Dscp Translation

    Cancel – Click to cancel the changes. 2-13.7 DSCP Translation The section describes how the switch allows you to configure the basic QoS DSCP Translation settings for the switch. DSCP translation can be done in Ingress or Egress. Web Interface To configure the DSCP Translation parameters in the web interface: 1.
  • Page 79: 2-13.8 Storm Control

    2-13.8 Storm Control The section allows the user to configure the Storm control for the switch. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC table. The configuration indicates the permitted packet rate for unicast, multicast or broadcast traffic across the switch.
  • Page 80: 2-13.9 Wred

    2-13.9 WRED The section allows the user to configure the WRED function for the switch. This page allows you to configure the Random Early Detection (RED) settings for queue 0 to 5. RED cannot be applied to queue 6 and 7. Through different RED configuration for the queues (QoS classes) it is possible to obtain Weighted Random Early Detection (WRED) operation between queues.
  • Page 81: 2-13.9.2 Configuration

    2-13.9.2 Configuration Web Interface To configure the WRED configuration in the web interface: 1. Click Configuration, WRED, Basic Configuration. 2. Key-in each Parameter value. 3. Click the Apply to save the setting. 4. If you want to cancel the setting then you need to click the Reset button. It will revert to previously saved values.
  • Page 82 NOTE: RED Drop Probability Function The following illustration shows the drop probability function with associated parameters. Max. DP 1-3 is the drop probability when the average queue filling level is 100%. Frames marked with Drop Precedence Level 0 are never dropped.
  • Page 83: Mirror

    2-14 Mirror You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Mirror Configuration is used to monitor the traffic of the network.
  • Page 84 not mirrored. Tx only Frames transmitted on this port are mirrored on the mirror port. Frames received are not mirrored. Disabled Neither frames transmitted nor frames received are mirrored. Enabled Frames received and frames transmitted are mirrored on the mirror port. For a given port, a frame is only transmitted once.
  • Page 85: Upnp

    2-15 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components.
  • Page 86: Loop Protection

    2-16 Loop Protection The loop Protection is used to detect the presence of traffic. When the switch receives a packet’s (looping detection frame) MAC address and it is the same as oneself, the Loop Protection occurs. The port will be locked when it receives the looping protection frames. Web Interface To configure the Loop Protection Configuration parameters in the web interface: 1.
  • Page 87 Shutdown Time  The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action shuts down the port). Valid values are 0 to 604800 seconds (7 days). A value of zero will keep a port disabled (until next device restart). Port Configuration: Port ...
  • Page 88: Chapter 3 Monitor

    Monitor Chapter 3 This chapter describes all of the basic network statistics which includes the Ports, Layer 2 network protocol (e.g. ACL and DHCP etc.) and any setting of the Switch. 3-1 System After you log in, the switch shows the system information. This is the default page and it shows basic information of the system, including “Model Name”, “System Description”, “Contact”, “Location”, “System Up Time”, “Firmware Version”, “Host Mac Address”, “Device Port”.
  • Page 89 Model Name  Displays the factory defined model name for identification purpose. System Description  Displays the system description.  Firmware Version The software version of this switch.  Hardware Version The hardware version of this switch.  Mechanical Version The mechanical version of this switch.
  • Page 90: 3-1.2 Ip Status

    3-1.2 IP Status This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes, and the neighbor cache (ARP cache) status. Web Interface To display the IP Status in the web interface: 1.
  • Page 91 Address  Show the current address of the interface (of the given type). Status  Show the status flags of the interface (and/or address). IP Routes Network  Show the destination IP network or host address of this route. Gateway ...
  • Page 92: 3-1.3 Log

    3-1.3 Log This section describes the system log information of the switch. Web Interface To display the log configuration in the web interface: 1. Click Monitor, System and Log. 2. Display the log information. Figure 3- 1.3: The System Log Information Parameter description: Auto-refresh ...
  • Page 93: Ports

    3-2 Ports The section describes how to configure the Port detail parameters of the switch as well as how to enable or disable a port, and monitor the ports content or status. 3-2.1 Traffic Overview The section describes to the Port statistics information and provides an overview of general traffic statistics for all switch ports.
  • Page 94: 3-2.2 Detailed Statistics

    Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Refresh: Click to refresh the page. Clear: Clears the counters for all ports. 3-2.2 Detailed Statistics The section describes how to provide detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display.
  • Page 95 Parameter description: Auto-refresh  To evoke the auto-refresh to refresh the Port Statistics information automatically. Upper left scroll bar  To scroll which port to display the Port statistics with “Port-0”, “Port-1. Receive Total and Transmit Total Rx and Tx Packets ...
  • Page 96 Rx Undersize  The number of short 1 frames received with valid CRC. Rx Oversize  The number of long 2 frames received with valid CRC. Rx Fragments  The number of short 1 frames received with invalid CRC. Rx Jabber ...
  • Page 97: Dhcp

    3-3 DHCP 3-3.1 Snooping Table This page displays the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients that have obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses. Entries in the Dynamic DHCP snooping table are shown on this page.
  • Page 98: Security

    3-4 Security 3-4.1 Network 3-4.1.1 IP Source Guard Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by MAC address.
  • Page 99: 3-4.1.2 Arp Inspection

    3-4.1.2 ARP Inspection The section describes how to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address. Web Interface To configure a Dynamic ARP Inspection Table Configuration in the web interface: 1.
  • Page 100: Mac Table

    3-5 MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Web Interface To Display Dynamic MAC Table in the web interface: 1.
  • Page 101 Block  Block all packet which VLAN and Mac address is match if the “block” is evoke. Port Members  The ports that are members of the entry. Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
  • Page 102: Igmp Snooping

    3-6 IGMP Snooping 3-6.1 Status After you complete the IGMP Snooping configuration, it will display the IGMP Snooping Status. This section describes how to display the IGMP Snooping detailed status. Web Interface To display the IGMP Snooping status in the web interface: 1.
  • Page 103 The number of Transmitted Queries. Queries Received  The number of Received Queries. V1 Reports Received  The number of Received V1 Reports. V2 Reports Received  The number of Received V2 Reports. V3 Reports Received  The number of Received V3 Reports. V2 Leaves Received ...
  • Page 104: 3-6.2 Group Information

    3-6.2 Group Information After you complete setting up the IGMP Snooping function, the switch will display the IGMP Snooping Group Information. Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. The switch will use the last entry of the currently displayed table as a basis for the next lookup.
  • Page 105: 3-6.3 Ipv4 Ssm Information

    3-6.3 IPv4 SSM Information Entries in the IGMP SFM Information Table are shown on this page. The IGMP SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
  • Page 106: Vlans

    3-7 VLANS 3-7.1 VLAN Membership This page provides an overview of membership status of VLAN users. The ports belong to the currently selected stack unit, as reflected by the page header. Web Interface To configure VLAN membership configuration in the web interface: 1.
  • Page 107: 3-7.2 Vlan Port

    3-7.2 VLAN Port This function gathers the information of all VLAN status and reports it in the order of Static NAS, MVRP, MVP, Voice VLAN, MSTP, and GVRP Combined. Web Interface To Display VLAN Port Status in the web interface: 1.
  • Page 108 UVID  Shows UVID (untagged VLAN ID). Port's UVID determines the packet's behavior at the egress side. Conflicts  Shows status of Conflicts whether exists or not. When a Volatile VLAN User requests to set VLAN membership or VLAN port configuration, the following conflicts can occur: Functional Conflicts between features.
  • Page 109: Loop Protection

    3-8 Loop Protection This page displays the loop protection port status for the ports of the switch. Web Interface To configure the Loop Protection Status parameters in the web interface: 1. Click Configuration, Loop Protection, Status. 2. Evoke the Auto-refresh or click to refresh the Loop protection Port status by Manual. Figure 3-8: The Loop Protection Status Parameter description: Port...
  • Page 110: Lldp

    3-9 LLDP 3-9.1 LLDP information This page provides an overview for all LLDP information. The displayed table contains a row for each port on which an LLDP information is detected. The columns hold the following information: Web Interface To show LLDP information: 1.
  • Page 111 2. Repeater 3. Bridge 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9. Reserved When a capability is enabled, the capability is followed by (+). If the capability is disabled, the capability is followed by (-). Management Address ...
  • Page 112: 3-9.2 Lldp-Med Neighbor

    3-9.2 LLDP-MED Neighbor This page provides an overview of all LLDP-MED neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. This function applies to VoIP devices which support LLDP-MED. The columns hold the following information: Web Interface To show LLDP-MED Neighbor: 1.
  • Page 113 further Endpoint Device Classes, as defined in the following. Each LLDP-MED Endpoint Device Class is defined to build upon the capabilities defined for the previous Endpoint Device Class. For-example will any LLDP-MED Endpoint Device claiming compliance as a Media Endpoint (Class II) also support all aspects of TIA-1057 applicable to Generic Endpoints (Class I), and any LLDP-MED Endpoint Device claiming compliance as a Communication Device (Class III) will also support all aspects of TIA-1057 applicable to both Media Endpoints (Class II) and Generic Endpoints (Class I).
  • Page 114 Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device. The possible application types are shown below. 1. Voice - for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services.
  • Page 115 DSCP is the DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474. Contain one of 64 code point values (0 through 63). Auto-negotiation  Auto-negotiation identifies if MAC/PHY auto-negotiation is supported by the link partner. Auto-negotiation status ...
  • Page 116: 3-9.3 Lldp Statistics

    3-9.3 LLDP Statistics Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refer to per port counters for the currently selected switch Web Interface To show LLDP Statistics: 1. Click Monitor, LLDP, then click Port Statistics to show LLDP counters. 2.
  • Page 117 Shows the number of new entries deleted since switch reboot. Total neighbors Entries Dropped  Shows the number of LLDP frames dropped due to the entry table being full. Total neighbors Entries Aged Out  Shows the number of entries deleted due to Time-To-Live expiring. Local Counters The displayed table contains a row for each port.
  • Page 118: Chapter 4 Diagnostics

    Diagnostics Chapter 4 This chapter provides a set of basic system diagnosis. It lets users know whether the system is health or needs to be fixed. The basic system check includes ICMP Ping, Link OAM, ICMPv6, and Cable Diagnostics. 4-1 Ping This section allows you to issue ICMP PING packets to troubleshoot IPv6 connectivity issues.
  • Page 119: Cable Diagnostics

    4-2 Cable Diagnostics This section is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table.
  • Page 120: Traceroute

    4-3 Traceroute This page allows you to issue ICMP or UDP packets to diagnose network connectivity issues. Web Interface To configure a Cable Diagnostics in the web interface: 1. Specify traceroute IP Address. 2. Specify traceroute Size. 3. Click Start. Figure 4-3 The Traceroute Parameter description: IP Address...
  • Page 121: Chapter 5 Maintenance

    Maintenance Chapter 5 This chapter describes the switch Maintenance configuration tasks to enhance the performance of local network including Restart Device, Firmware upgrade, Save/Restore. 5-1 Restart Device This section describes how to restart the switch for any maintenance needs. Any configuration files or scripts that you saved in the switch should still be available afterwards.
  • Page 122: Firmware

    5-2 Firmware This section describes how to upgrade the Firmware. The switch can be enhanced with more value-added functions by installing firmware upgrades if available. 5-2.1 Firmware Upgrade This page facilitates an update of the firmware controlling the switch. Web Interface To configure a Soft Upgrade in the web interface: 1.
  • Page 123: Configuration

    5-3 Configuration The switch stores its configuration in a number of text files in CLI format. The files are either virtual (RAM-based) or stored in flash on the switch. 5-3.1 Save startup-config The copy running-config to startup-config, thereby ensuring that the currently active configuration will be used at the next reboot.

Table of Contents