Dahua PFS4218-16GT-190 Web Config Manual

Dahua PFS4218-16GT-190 Web Config Manual

16/24-port poe gigabit managed switch

Advertisement

16/24-Port PoE
Gigabit Managed Switch
Web Config Manual
V1.0.0

Advertisement

Table of Contents
loading

Summary of Contents for Dahua PFS4218-16GT-190

  • Page 1 16/24-Port PoE Gigabit Managed Switch Web Config Manual V1.0.0...
  • Page 2 Cybersecurity Recommendations Mandatory actions to be taken towards cybersecurity 1. Change Passwords and Use Strong Passwords: The number one reason systems get “hacked” is due to having weak or default passwords. It is recommended to change default passwords immediately and choose a strong password whenever possible.
  • Page 3: Foreword

    16/24-Port PoE Gigabit Managed Switch. Models Name Model 16-Port PoE Gigabit Managed Switch (190 W) PFS4218-16GT-190 16-Port PoE Gigabit Managed Switch (240 W) PFS4218-16GT-240 24-Port PoE Gigabit Managed Switch (240 W) PFS4226-24GT-240 24-Port PoE Gigabit Managed Switch (360 W)
  • Page 4 Privacy Protection Notice As the device user or data controller, you might collect personal data of others' such as face, fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be in compliance with the local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures include but not limited to: providing clear and visible identification to inform data subject the existence of surveillance area and providing related contact.
  • Page 5: Important Safeguards And Warnings

    Important Safeguards and Warnings The Manual helps you to use our product properly. To avoid danger and property damage, read the Manual carefully before using the product, and we highly recommend you to keep it well for future reference. Operating Requirements ...
  • Page 6: Table Of Contents

    Table of Contents Cybersecurity Recommendations ......................I Foreword ..............................II Important Safeguards and Warnings ....................IV 1 Overview ..............................1 2 Login the Switch ............................ 2 3 General Settings ............................ 3 Device Information ........................3 Local .............................. 3 VLAN ............................. 4 Aggregation ...........................
  • Page 7 4.4.1 Restart Device ........................76 4.4.2 Factory Defaults ........................ 77 4.4.3 Software ..........................77 4.4.4 Configuration ........................78 Table of Contents VI...
  • Page 8: Overview

    Overview The 16/24-Port PoE Gigabit Managed Switch supports web access. You can visit the switch on web browser, and configure and manage the switch. Overview 1...
  • Page 9: Login The Switch

    Login the Switch Before login, make sure: You already configure the IP address of the switch. By default, the IP address of VLAN 1 is  192.168.1.110. The PC with web browser is connected to the network, and the PC can ping the switch ...
  • Page 10: General Settings

    General Settings Device Information You can view the Name, Device Type, Serial Number, and Software Version of the device. And you can view the port status and port information. Select General > Device Information, and you can view the System Information and Port State Overview.
  • Page 11: Vlan

    Figure 3-2 Local VLAN Add the port to the VLAN, and configure the VLAN. By default, the port belongs to VLAN1. Step 1 Select General > Vlan. VLAN interface is displayed. See Figure 3-3. General Settings 4...
  • Page 12: Aggregation

    Figure 3-3 Port VLAN configuration Step 2 Configure the port VLAN parameters. See Table 3-2. Table 3-2 Port VLAN configuration parameter Parameter Description Port Display all the ports. Mode Three modes: Access, Hybrid, and Trunk. Add the port to a VLAN. By default, the port belongs to VLAN 1. It Port VLAN ranges from 1 through 4094.
  • Page 13 Select General > Aggregation, and the Aggregation interface is displayed. See Figure 3-4. Figure 3-4 Aggregation Step 1 Add the port member to the static group. For example, add port 1 and port 2 to Static Group 1. See Figure 3-5. Up to 13 static groups can be set at the same time.
  • Page 14: Vlan Interface

    VLAN Interface You can add the IP address for VLAN interface, and add new IP route. See “4.1.1.2 VLAN Interface” for configuration details. Step 1 Select General > Vlan Interface. VLAN interface is displayed. See Figure 3-6. Figure 3-6 VLAN interface Step 2 Add the VLAN interface.
  • Page 15 Figure 3-8 IP routes Set the parameters. See Table 3-4. Table 3-4 IP routes Parameter Description Network It is the destination address of the IP packet. Mask length, with destination address, is to identify the IP address of the destination host or the route. After logical AND between Mask Length destination address and network mask, you can get the IP address of the destination host or the route.
  • Page 16: Advanced Settings

    Advanced Settings Configuration 4.1.1 System 4.1.1.1 Information You can set the system contact, system name, and system location. Step 1 Select Advanced > Configuration > System > Information. The Information interface is displayed. See Figure 4-1. Figure 4-1 System information configuration Step 2 Set the System Contact, System Name, and System Location.
  • Page 17 Click Add Interface. A new record is added. See Figure 4-3. Figure 4-3 VLAN interface Set the parameters. See Table 4-1. Table 4-1 VLAN interface Parameter Sub-parameter Description VLAN Input VLAN number. IP Address Set the IP address of the VLAN interface. IPv4 Mask Length Set the mask length of the IP address.
  • Page 18 Figure 4-5 NTP configuration (1) Step 2 Select the mode as Enabled to enable the NTP service. By default, the mode is Disabled. Step 3 Set the IP address of the NTP server. See Figure 4-6. Figure 4-6 NTP configuration (2) Step 4 Click Save.
  • Page 19 Figure 4-7 Time settings 4.1.1.5 Log You can configure the system log information, including Server Mode, Server Address, and System Log Level. Step 1 Select Advanced > Configuration > System > Log. The System Log Configuration interface is displayed. See Figure 4-8. Figure 4-8 System log configuration Step 2...
  • Page 20: Port

    Parameter Description Server Address Input the IP address of the log server. Select the system log lever, including: Error  System Log Level Warning  Notice   Informational Step 3 Click Save. 4.1.2 Port You can set the port parameters, including speed, duplex, flow control, and so on. Step 1 Select Advanced >...
  • Page 21: Dhcp

    Parameter Description Set the duplex of the port. Full duplex (Fdx) and half duplex Duplex (Hdx) are selectable. Set the average speed of the port. 10 M, 100 M, and 1 G are Adv Speed selectable. Flow Control You can select Enable to enable flow control function. Maximum Frame Set the Maximum frame size.
  • Page 22 Figure 4-11 Add a new pool Input the pool name. For example, vlan2_test2. Click Save. Click the pool name link. See Figure 4-12. DHCP Pool Configuration interface is displayed. See Figure 4-13. Figure 4-12 Name link Advanced Settings 15...
  • Page 23 Figure 4-13 DHCP pool configuration Set the parameters in DHCP Pool Configuration interface. See Figure 4-13. And see Table 4-5 for details about the parameters. Table 4-5 DHCP pool configuration parameter Parameter Description Advanced Settings 16...
  • Page 24 Parameter Description Two types: network and host. Type Network: a segment of IP address.  Host: a specific IP address.  Input the IP address of the host or the network. Subnet Mask Input the subnet mask. Lease Time Input the lease time of the address pool. Domain Name Configure the domain name.
  • Page 25 Figure 4-16 Excluded IP Click Add IP Range. A new record is added. See Figure 4-17. Figure 4-17 Add IP range Input the IP address range. For example, 192.168.100.2-192.168.100.50. Click Save. 4.1.3.2 DHCP Snooping DHCP Snooping is a security feature of DHCP to make sure that the client acquires the IP address from the legal server.
  • Page 26: Security

    Figure 4-18 DHCP Snooping configuration Step 2 Select the Snooping Mode as Enabled to enable DHCP Snooping . Step 3 Set the port as Trusted or Untrusted. Step 4 Click Save. 4.1.4 Security 4.1.4.1 Users You can add, edit, and delete the user. Advanced Settings 19...
  • Page 27 Select Advanced > Configuration > Security > Users. Users Configuration interface is displayed. See Figure 4-19. Figure 4-19 Users configuration Add a user Step 1 Click Add New User. The Add User interface is displayed. See Figure 4-20. Figure 4-20 Add a user.
  • Page 28 Figure 4-22 Edit user 4.1.4.2 SSH Secure Shell (SSH) is the security procotol to protect the security in remote login session and other network service, and avoid information leakage problem in remote management. You can enable or disable SSH function. Select Advanced >...
  • Page 29 4.1.4.4 SNMP SNMP (Simple Network Management Protocol) is the standard protocol for network management in Internet, and it is widely applied for management device to access and manage the managed devices. SNMP has the following features:  It supports intelligent management for network device. By using the network management platform based on SNMP, the network administrator can query the running status and the parameters of the network device, and can set the parameter, find the error, perform fault diagnosis, and then to plan the capacity and create the report.
  • Page 30 Trap packet is the packet that Agent proactively sends to NMP to report some emergent and important events, for example, the manged device roots. By default, Agent is allowed to send SNMP Trap packet. Step 1 Select Advanced > Configuration > Security > SNMP > Trap. The Trap interface is displayed.
  • Page 31 Parameter Description Select Enabled or Disabled to enable or disable the function. Only Trap Inform Mode versions of SNMP v2c and SNMP v3 support the function. Input the timeout. Only versions of SNMP v2c and SNMP v3 Trap Inform Timeout support the function.
  • Page 32 Step 2 Click Add New Entry. A new record is added. See Figure 4-31. Figure 4-31 Add a user. Step 3 Set the parameters. See Table 4-7. Table 4-7 User parameter Parameter Description Engine ID It is created automatically. User Name Input the user name.
  • Page 33 Figure 4-33 Add a group Step 3 Set the parameters. See Table 4-8. Table 4-8 Group parameter Parameter Description Select the security mode from the drop-down list, including v1, v2c, Security Mode and usm. Security Name Select the security name from the drop-down list. Group Name Input the group name.
  • Page 34 Parameter Description Select the view type from the drop-down list to set whether the View Type object decided by OID of MIB subtree and subtree mask is included in the view type. Input the OID of MIB subtree root node (for example, 1.4.5.3.1), or the name (for example, system).
  • Page 35 Figure 4-37 Add a new statistics group Step 3 Set the parameters. See Table 4-10. Table 4-10 Statistics group parameter Parameter Description ID number is user-defined. Date Source It is the mapping reference number of switch port in SNMP client. Step 4 Click Save.
  • Page 36 (shown as the black curve) exceeds the threshold (shown as the blue curve) for several times, and there are several cross points. Only the points marked with red crosses trigger alarm event. Figure 4-39 Upper threshold and lower threshold alarm Step 1 Select Advanced >...
  • Page 37 Figure 4-41 Event Step 2 Click Add New Entry, and set the parameters according to the interface, including ID, Desc, and type. Step 3 Click Save. 4.1.4.6 ACL ACL (Access Control List) is for flow identification. For filtering the packet, the network device needs to configure a series of matching conditions to classify the packets.
  • Page 38 Figure 4-42 Ports Step 2 Set the parameters including Policy ID, Action, Rate Limiter ID, and so on. Step 3 Click Save. Rate Limiters Advanced Settings 31...
  • Page 39 Step 1 Select Advanced > Configuration > Security > ACL > Rate Limiters. The Rate Limiters interface is displayed. See Figure 4-43. Figure 4-43 Rate limiters Step 2 Set the parameters including Rate and Unit. Step 3 Click Save. Access Control List Step 1 Select Advanced >...
  • Page 40 Figure 4-45 ACE configuration Step 3 Set the parameters. Step 4 Click Save. 4.1.4.7 IP Source Guard Through IP Source Guard binding function, the packet forwarded in the port can be filtered and controlled, and the illegal packet cannot pass through the port. The illicit use of network resource is limited, and security performance of the port is enhanced.
  • Page 41 Figure 4-46 IP source guard Step 2 Select the Mode as Enabled to enable IP Source Guard function. Step 3 Set the parameters. See Table 4-11. Table 4-11 IP source guard parameter Parameter Description Translate dynamic to Click the button to switch dynamic/static. The premise is that the static IGMP Snooping is enabled.
  • Page 42 Static Table Step 1 Select Advanced > Configuration > Security > IP Source Guard > Static Table. The Static Table interface is displayed. See Figure 4-47. Figure 4-47 Static Table Step 2 Click Add New Entry. See Figure 4-48 for the Static IP Source Guard Table. Figure 4-48 Static IP source guard table Step 3...
  • Page 43 Figure 4-49 Port configuration Step 2 Select the Mode as Enabled in ARP Inspection Configuration to enable ARP inspection function. Step 3 Set the parameters. See Table 4-12. Table 4-12 ARP inspection parameter Parameter Description Translate dynamic to Click the button to switch dynamic/static. static Mode: Disabled and Enabled are selectable.
  • Page 44 VLAN Configuration Step 1 Select Advanced > Configuration > Security > ARP Inspection > VLAN Configuration. The VLAN Configuration interface is displayed. See Figure 4-50. Figure 4-50 VLAN mode configuration (1) Step 2 Click Add New Entry. A new record is added. See Figure 4-51. Figure 4-51 VLAN mode configuration (2) Step 3...
  • Page 45 Step 2 Click Add New Entry. A new record is added. See Figure 4-53. Figure 4-53 Add a new static table Step 3 Set the parameters including Port, VLAN ID, MAC Address, and IP Address. Step 4 Click Save. Dynamic Table Dynamic table is automatically created and maintained by ARP through ARP packet.
  • Page 46 Figure 4-55 Step 2 Select the Mode as Enabled to enable Nas in System Configuration. Step 3 Set the parameters including Reauthentication Enabled, Reauthentication Period, EAPOL Timeout, Aging Period, and so on in System Configuration. Step 4 Set the parameters including Admin State, Port State, and so on in Port Configuration. Step 5 Click Save.
  • Page 47 Figure 4-56 Radius Step 2 Set the parameters including Timeout, Retransmit, Deadtime, and so on in Global Configuration. Step 3 Click Add New Server in Server Configuration. A new record is added. See Figure 4-57. Figure 4-57 Server configuration Step 4 Set the parameters including Hostname, Timeout, Retransmit, and so on.
  • Page 48: Aggregation

    Figure 4-58 Loop protection Step 2 Select Enable Loop Protection as Enabled to enable the function. You can set the Transmission Time and the Shutdown Time. Step 3 Set the parameters in Port Configuration, including Enabled, Action, and Tx Mode. Step 4 Click Save.
  • Page 49 Static Step 1 Select Advanced > Configuration > Aggregation > Static. The Statics interface is displayed. See Figure 4-59. Figure 4-59 Static configuration (1) Step 2 Select the Hash Code Contributors in Aggregation Mode Configuration. There are four types:  Source MAC Address: the aggregation load balancing algorithm based on MAC address.
  • Page 50: Spanning Tree

    Figure 4-60 Static configuration (2) Step 4 Click Save. The port 1 and port 2 form the logical port. 4.1.6 Spanning Tree The spanning tree protocol is the protocol of layer 2. It can eliminate the ring cycle of layer 2 by choosing to block the redundant links in the network, and it can back up the links.
  • Page 51 Figure 4-61 STP Bridge Configuration Step 2 Set the parameters, including Basic Settings and Advanced Settings. See Table 4-13 and Table 4-14. Table 4-13 Basic settings Parameter Description Select the protocol version. There are three types selectable:  STP: The most basic spanning tree protocol. ...
  • Page 52 Parameter Description Edge Port BPDU You can select the checkbox to enable the edge port BPDU guard Guard function. You can select the checkbox to enable the port error recovery Port Error Recovery function. Port Error Recovery Set the port error recovery timeout value. Timeout Step 3 Click Save.
  • Page 53 Parameter Description Set the domain name of the MST domain. Configuration Name By default, the domain name of the MST domain is the bridge MAC address of the device. Configuration Revision Set the MST domain version. Table 4-16 MSTI mapping Parameter Description MSTI...
  • Page 54 Figure 4-64 STP CIST port configuration Step 2 Set the parameters in CIST Aggregated Port Configuration. See Table 4-17. Table 4-17 CIST aggregated port configuration Parameter Description STP Enabled Select the checkbox to enable STP. Select the Path Cost from the drop-down list. Auto and Specific are Path Cost selectable.
  • Page 55 4.1.6.5 MSTI Ports Step 1 Select Advanced > Configuration > Spanning Tree > MSTI Ports. The MST1 MSTI Port Configuration interface is displayed. See Figure 4-65. Figure 4-65 MST1 MSTI port configuration (1) Step 2 Select MSTI from the drop-down list. 7 types are selectable. For example, you can select MST1.
  • Page 56: Igmp Snooping

    Figure 4-66 MST1 MSTI port configuration (2) Step 4 Set the Path Cost and the Priority in MSTI Aggregated Ports Configuration. Step 5 Set the Path Cost and the Priority in MSTI Normal Ports Configuration. Step 6 Click Save. 4.1.7 IGMP Snooping IGMP Snooping (Internet Group Management Protocol Snooping) is the multicast constraint mechanism running on the device of layer 2, for managing and controlling the multicast.
  • Page 57 creates the mapping between the port and the MAC multicast address, and forwards the multicast data according to the mapping. 4.1.7.1 Basic Configuration Step 1 Select Advanced > Configuration > IGMP Snooping > Basic Configuration. The IGMP Snooping Configuration is displayed. See Figure 4-67. Figure 4-67 IGMP snooping configuration Step 2...
  • Page 58: Lldp

    Parameter Description Unregistered IPMCv4 You can select the checkbox to enable unregistered IPMCv4 flooding. Flooding Enabled IGMP SSM Range Set the IGMP SSM range. Leave Proxy Enabled You can select the checkbox to enable leave proxy. Proxy Enabled You can select the checkbox to enable proxy. Step 3 Set the parameters in Port Related Configuration.
  • Page 59 LLDPDU (Link Layer Discovery Protocol Data Unit) to release to the neighbors connected to itself directly. The neighbors receive the information, and save it in standard MIB (Management Information Base) format, for the network management system to quiry and judge the link communication status.
  • Page 60 Step 1 Select Advanced > Configuration > LLDP > LLDP-MED. The LLDP-MED Configuration interface is displayed. See Figure 4-71. Figure 4-71 LLDP-MED configuration Step 2 Set the Fast Start Repeat Count. Step 3 Set the Transmit TLVs and the Device Type in LLDP-MED Interface Configuration. Step 4 Set the location information in Coordinates Location.
  • Page 61: Poe

    Figure 4-72 Add new policy Step 8 Set the parameters including Application Type, Tag, VLAN ID and so on. Step 9 Click Save. 4.1.9 PoE PoE (Power Over Ethernet) is the function that through Ethernet RJ-45 port, the device can provide power for the external PD remotely with twisted pair.
  • Page 62: Mac Table

    Step 2 Select PD Class or LLDP-MED for Reserved Power. By default, PD Class is selected. Step 3 Set the Primary Power Supply and the System Power Reserved in PoE Power Supply Configuration. Step 4 Select ON or OFF for PoE Mode from the drop-down list. Step 5 Click Save.
  • Page 63: Vlans

    Figure 4-75 Static MAC table configuration Set the parameters including VLAN ID, MAC address, and port members. Step 5 Click Save. 4.1.11 VLANs Select Advanced > Configuration > VLANs. The Port VLAN Configuration interface is displayed. See Figure 4-76. See “3.3 VLAN” for details. Figure 4-76 Port VLAN configuration Advanced Settings 56...
  • Page 64: Mirroring

    4.1.12 Mirroring Port mirroring is also called port monitoring. Port monitoring is the data package acquiring technology that through configuring switch, data package from one or several ports (mirroring source ports) can be copied to a specific port (mirroring destination port). The mirroring destination port connects to a PC that data package analyzing software is installed, and it can analyze the received data package for network monitoring and troubleshooting.
  • Page 65: Serial Config

    Step 3 Input the VLAN ID in Source VLAN(s) Configuration. Step 4 Configure the Source and the Destination in Port Configuration. Step 5 Click Save. 4.1.13 Serial Config Set the conversion between the asynchronous serial port and the Ethernet. Select Advanced > Configuration > Serial Config. The Serial Config interface is displayed. See Figure 4-78.
  • Page 66 Select Advanced > Monitor > System > CPU Load. The CPU Load interface is displayed. See Figure 4-80. Figure 4-80 CPU load 4.2.1.3 IP Status You can view the IP status including IP interfaces, IP routes, and neighbour cache. Select Advanced > Monitor > System > IP Status. The IP Status interface is displayed. See Figure 4-81.
  • Page 67: Ports

    Figure 4-82 System log information 4.2.1.5 Detailed Log You can view the detailed information of the logs. Select Advanced > Monitor > System > Detailed Log. The Detailed System Log Information interface is displayed. See Figure 4-83. Figure 4-83 Detailed system log information 4.2.2 Ports 4.2.2.1 State You can view the port information including link, speed/duplex, media type, and VLAN.
  • Page 68 Figure 4-84 Port status overview Table 4-20 Port information Parameter Description Ports Display all the ports. Two link states: Up, Down. Up indicated the port is connected Link successfully, and Down indicates the port is not connected. Speed/Duplex Display the port rate and the duplex mode. Two media types: Copper, Fiber.
  • Page 69 Figure 4-86 Queuing counters 4.2.2.4 QCL Status You can view the QoS control list status, including user name, QCE, port, frame type, action, and conflict. Select Advanced > Monitor > Ports > QCL Status. The QoS Control List Status interface is displayed.
  • Page 70: Dhcp

    Figure 4-88 Detailed Port statistics port 1 4.2.3 DHCP 4.2.3.1 Server Statistics You can view the DHCP server statistics, including database counters, binding counters, DHCP packet received counters, and DHCP packet sent counters. Select Advanced > Monitor > DHCP > Server. The DHCP Server Statistics interface is displayed.
  • Page 71 Binding You can view the DHCP server binding IP address. Select Advanced > Monitor > DHCP > Server > Binding. The DHCP Server Binding IP interface is displayed. See Figure 4-90. Figure 4-90 DHCP server binding IP Declined IP You can view the declined IP. Select Advanced >...
  • Page 72: Security

    Figure 4-93 DHCP detailed statistics port 1 4.2.4 Security 4.2.4.1 Port Security Switch You can view the port security switch status. Select Advanced > Monitor > Security > Port Security. The Port Security Switch Status interface is displayed. See Figure 4-94. Figure 4-94 Port security switch status Port...
  • Page 73 Select Advanced > Monitor > Security > Port Security > Port. The Port interface is displayed. See Figure 4-95. Figure 4-95 Port 4.2.4.2 NAS Switch You can view network access server switch status. Select Advanced > Monitor > Security > NAS. The Network Access Server Switch Status interface is displayed.
  • Page 74 Select Advanced > Monitor > Security > ACL Status. The ACL Status interface is displayed. See Figure 4-98. Figure 4-98 ACL status 4.2.4.4 ARP Inspection You can view dynamic ARP inspection table. Select Advanced > Monitor > Security > ARP Inspection. The Dynamic ARP Inspection Table interface is displayed.
  • Page 75 Figure 4-101 RADIUS authentication statistics for server #1 4.2.4.7 RMON Statistics You can view the RMON statistics status. Select Advanced > Monitor > Security > RMON. The RMON Statistics Status Overview interface is displayed. See Figure 4-102. Figure 4-102 RMON statistics status overview History You can view the RMON history.
  • Page 76 You can view the RMON alarm information. Select Advanced > Monitor > Security > RMON > Alarm. The RMON Alarm Overview interface is displayed. See Figure 4-104. Figure 4-104 RMON alarm overview Event You can view the RMON event information. Select Advanced >...
  • Page 77: Aggregation

    4.2.5 Aggregation Static You can view the aggregation static configuration. Select Advanced > Monitor > Aggregation > Static. The Aggregation Status interface is displayed. See Figure 4-107. Figure 4-107 Aggregation status 4.2.6 Spanning Tree 4.2.6.1 Bridge Status You can view the STP bridge status, including MSTI, bridge ID, root, topology flag, and topology change last.
  • Page 78: Igmp Snooping

    4.2.6.3 Port Statistics You can view the STP port statistic. Select Advanced > Monitor > Spanning Tree > Port Statistics. The STP Statistics interface is displayed. See Figure 4-110. Figure 4-110 STP statistics 4.2.7 IGMP Snooping 4.2.7.1 Status You can view the IGMP Snooping status. Select Advanced >...
  • Page 79: Lldp

    Figure 4-112 IGMP Snooping group information 4.2.7.3 IPv4 SFM Information You can view the IGMP SFM information. Select Advanced > Monitor > IGMP Snooping > IPv4 SFM Information. The IPv4 SFM Information interface is displayed. See Figure 4-113. Figure 4-113 IPv4 SFM Information 4.2.8 LLDP 4.2.8.1 Neighbors...
  • Page 80 Select Advanced > Monitor > LLDP > PoE. The LLDP Neighbor Power Over Ethernet Information interface is displayed. See Figure 4-116. Figure 4-116 PoE LLDP neighbor information. 4.2.8.4 EEE You can view the LLDP neighbors EEE information. Select Advanced > Monitor > LLDP > EEE. The LLDP Neighbors EEE Information interface is displayed.
  • Page 81: Poe

    4.2.9 PoE You can view the port PoE status. Select Advanced > Monitor > PoE. The Power Over Ethernet Status interface is displayed. See Figure 4-119. Figure 4-119 PoE status 4.2.10 MAC Table You can view the MAC table of the switch. Select Advanced >...
  • Page 82: Vlans

    4.2.11 VLANs 4.2.11.1 Membership You can view the VLAN the port belongs to. Select Advanced > Monitor > VLANs > Membership. The VLAN Membership Status interface is displayed. See Figure 4-121. Figure 4-121 VLAN membership status 4.2.11.2 Ports You can view the VLAN port status, including port type, ingress filtering, frame type, and so on. Select Advanced >...
  • Page 83: Ping

    4.3.1 Ping Step 1 Select Advanced > Diagnostics > Ping. The ICMP Ping interface is displayed. See Figure 4-123. Figure 4-123 ICMP Ping Step 2 Input the IP address, and click Start. 4.3.2 Ping6 Step 1 Select Advanced > Diagnostics > Ping6. The ICMPv6 Ping interface is displayed.
  • Page 84: Factory Defaults

    4.4.2 Factory Defaults You can restore all the switch configuration to the factory defaults, except the VLAN IP address of the switch. Step 1 Select Advanced > Maintenance > Factory Defaults. The Factory Defaults interface is displayed. See Figure 4-126. Figure 4-126 Factory defaults Step 2...
  • Page 85: Configuration

    Step 2 Click Activate Alternate Image. The device reboots. After reboot, the Alternate Image changes to be the Active Image, and the Active Image changes to be the Alternate Image. 4.4.4 Configuration 4.4.4.1 Save startup-config You can save all the current configuration of the switch. Step 1 Select Advanced >...
  • Page 86 Figure 4-131 Upload configuration Step 2 Click Broswe, and select the configuration file to upload. Step 3 Select the File Name and the Parameters in Destination File. running-config  sartup-config  Create new file  Step 4 Click Upload Configuration. 4.4.4.4 Activate You can activate the configuration file.

This manual is also suitable for:

Pfs4226-24gt-360Pfs4218-16gt-240Pfs4226-24gt-240

Table of Contents