TP-Link TL-SG3109 User Manual

TP-Link TL-SG3109 User Manual

9-port gigabit managed switch/24+4g gigabit managed switch/48+4g gigabit managed switch embedded web system
Hide thumbs Also See for TL-SG3109:
Table of Contents

Advertisement

Embedded Web System User Guide
9-port Gigabit Managed Switch
24+4G Gigabit Managed Switch
48+4G Gigabit Managed Switch
TL-SG3109
TL-SL3428
TL-SL3452
Rev: 1.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the TL-SG3109 and is the answer not in the manual?

Questions and answers

Summary of Contents for TP-Link TL-SG3109

  • Page 1 Embedded Web System User Guide 9-port Gigabit Managed Switch 24+4G Gigabit Managed Switch 48+4G Gigabit Managed Switch TL-SG3109 TL-SL3428 TL-SL3452 Rev: 1.0...
  • Page 2: Fcc Statement

    No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK Technologies Co., Ltd. Copyright © 2006 TP-LINK Technologies Co., Ltd. All rights reserved.
  • Page 3: Table Of Contents

    Guide Overview ...1 Intended Audience ...2 Section 1. Getting Started ... 3 1.1 Configuring the device to use TP-Link Embedded Web Interface ...3 1.2 Starting the TP-Link Embedded Web Interface ...3 1.3 Understanding the TP-Link Embedded Web Interface ...4 1.3.1 Device Representation ...5 1.3.2 Using the TP-Link Embedded Web Interface Management Buttons ...5...
  • Page 4 4.3 Viewing Flash Logs ... 18 4.4 Defining System Log Servers ... 19 Section 5. Configuring Device Security ... 21 5.1 Configuring Management Security ... 21 5.1.1 Configuring Authentication Methods ... 21 5.1.1.1 Defining Access Profiles ... 21 5.1.1.2 Defining Profile Rules ... 23 5.1.1.3 Defining Authentication Profiles ...
  • Page 5 Section 7. Configuring Interfaces ... 45 7.1 Configuring Ports ... 45 7.2 Configuring LAGs ... 47 7.2.1 Defining LAG Members ... 47 7.2.2 Configuring LACP ... 48 7.3 Configuring VLANs ... 49 7.3.1 Defining VLAN Properties ... 49 7.3.2 Defining VLAN Membership ... 50 7.3.3 Defining VLAN Interface Settings ...
  • Page 6 11.3.1 Defining SNMP Global Parameters ... 71 11.3.2 Defining SNMP Views ... 71 11.3.3 Defining SNMP Group Profiles ... 72 11.3.4 Defining SNMP Group Members ... 73 11.3.5 Defining SNMP Communities ... 75 11.3.5.1 SNMP Communities Basic Table ... 75 11.3.5.2 SNMP Communities Advanced Table ...
  • Page 7 13.4 Copying System Files ... 88 Section 14. Performing Device Diagnostics ... 90 14.1 Configuring Port Mirroring ... 90 14.2 Viewing Integrated Cable Tests ... 91 14.3 Viewing Optical Transceivers ... 92 Section 15. Viewing Statistics ... 93 15.1 Viewing Interface Statistics ... 93 15.1.1 Viewing Device Interface Statistics ...
  • Page 8: Preface

     Guide Overview This user guide is divided into the following sections to provide concise information for configuring, and managing the TP-Link device: Section 1. Getting Started — Provides information about using the EWS, including the TP-Link Embedded Web Interface, management, and information buttons, as well as information about adding, modifying, and deleting devices.
  • Page 9: Intended Audience

    Section 14. Performing Device Diagnostics — Provides information about port mirroring configuration, copper and fiber cables testing, and viewing device health information. Section 15. Viewing Statistics — Provides information about viewing device statistics, including Remote Monitoring On Network (RMON) statistics, and device history events. Intended Audience This guide is intended for network administrators familiar with IT concepts and network terminology.
  • Page 10: Section 1. Getting Started

    When the device is received, the Embedded Web Interface can not be accessed until the device is properly configured. To use TP-Link Embedded Web Interface, use the console interface to assign an IP address and subnet mask on the default VLAN, and add a super-user with the highest privilege level (15) which is allowed to log onto the device via Embedded Web Interface.
  • Page 11: Understanding The Tp-Link Embedded Web Interface

    3 Tab Area all the components under a specific feature. 4 Zoom View Provides a graphic of the device on which TP-Link Web Interface runs. 5 TP-Link Web Interface Provide access to online help, and contain information about the EWS.
  • Page 12: Device Representation

    Using the TP-Link Embedded Web Interface Management Buttons — Provides instructions for adding, modifying,  and deleting configuration parameters. 1.3.1 Device Representation The TP-Link Embedded Web Interface Home Page contains a graphical representation of the device. This representation varies according to the device platform. Figure 3: Device Representation Figure 3:Device Representation Figures in this guide are based on the TL-SL3428 device.
  • Page 13: Using Screen And Table Options

    Deleting Configuration Information  1.4.1 Adding Configuration Information User-defined information can be added to specific TP-Link Web Interface pages, by opening a new Add page. To add information to tables or TP-Link Web Interface pages: 1. Open an TP-Link Web Interface page.
  • Page 14: Resetting The Device

    Figure 6: IP Addressing Page 2. Select the Remove checkbox in the row of the item to delete. 3. Click . The information is deleted, and the device is updated. 1.6 Resetting the Device The Reset page enables resetting the device from a remote location. Note: To prevent the current configuration from being lost, save all changes from the running configuration file to the startup configuration file before resetting the device.
  • Page 15: Section 2. Defining Device Information

    Section 2. Defining Device Information This section contains information for viewing and setting general system information. The System Description Page contains parameters for configuring general device information, including the system name, location, and contact, the system MAC Address, System Object ID, System Up Time, System IP and MAC addresses, and both software and hardware versions.
  • Page 16: Section 3. Setting The System Time

    Section 3. Setting the System Time This section provides information for configuring system time parameters, including: Configuring Daylight Savings Time  Configuring SNTP  3.1 Configuring Daylight Savings Time The System Information Time Page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock.
  • Page 17 Latvia — From the last weekend of March until the last weekend of October.  Lebanon — From the last weekend of March until the last weekend of October.  Lithuania — From the last weekend of March until the last weekend of October. ...
  • Page 18 The DST can be set according to unique start and end dates for a particular year or as a recurring period for any year. For a specific setting in a particular year, complete the fields in the Daylight Savings area; for a recurring setting, complete the fields in the Recurring area.
  • Page 19: Configuring Sntp

    4. Click . The DST settings are saved, and the device is updated. 3.2 Configuring SNTP This section contains the following topics: SNTP Overview  Defining SNTP Global Settings  Configuring SNTP Authentication  Defining SNTP Servers  Defining SNTP Interface Settings ...
  • Page 20: Defining Sntp Global Settings

    server, the SNTP client listens for the response. The SNTP client neither sends time information requests nor receives responses from the Broadcast server. Message Digest 5 (MD5) Authentication safeguards device synchronization paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication, authenticates the origin of the communication.
  • Page 21: Defining Sntp Servers

    To configure SNTP authentication: 1. Click System > System Info > SNTP > Authentication. The SNTP Authentication Page opens: Figure 13: SNTP Authentication Page The SNTP Authentication Page contains the following fields: Enable SNTP Authentication — Indicates if  authenticating an SNTP session between the device and an SNTP server is enabled on the device.
  • Page 22: Defining Sntp Interface Settings

    Figure 15: SNTP Servers Page The SNTP Servers Page contains the following fields: SNTP Server — Displays user-defined SNTP server IP  addresses. Up to eight SNTP servers can be defined. Poll Interval — Indicates whether or not the device ...
  • Page 23 Figure 17: SNTP Interface Settings Page The SNTP Interface Settings Page contains the following fields: Interface — Indicates the interface on which SNTP  can be enabled. The possible field values are: – Port — Indicates the specific port number on which SNTP is enabled.
  • Page 24: Section 4. Configuring System Logs

    Section 4. Configuring System Logs This section provides information for managing system logs. The system logs enable viewing device events in real time, and recording the events for later usage. System logs record and manage events and report errors and informational messages. Event messages have a unique format, as per the Syslog protocols recommended message format for all error reporting.
  • Page 25: Viewing Memory Logs

    Figure 19: Syslog Properties Page The Syslog Properties Page contains the following fields: Enable Logging — Indicates if device global logs for  Cache, File, and Server Logs are enabled. Console logs are enabled by default. The possible field values are: –...
  • Page 26: Defining System Log Servers

    To view Flash memory logs: 1. Click System > System Info > Syslog > Flash. The Syslog Flash Page opens: Figure 21: Syslog Flash Page The Syslog Flash Page contains the following information: Log Index — Lists the log index number. ...
  • Page 27 Figure 23: Add Syslog Server Page 3. Define the IP Address, UDP Port, Facility, Description, and Minimum Severity fields. 4. Click . The Log server is defined and the device is updated.
  • Page 28: Section 5. Configuring Device Security

    Section 5. Configuring Device Security This section describes pages that contain fields for setting security parameters for ports, device management methods, users, and server security for the TP-Link device. This section contains the following topics: Configuring Management Security  Configuring Network Security ...
  • Page 29 Figure 24: Access Profile Page The Access Profile Page contains the following fields: Access Profile Name — Defines the access profile  name. The access profile name can contain up to 32 characters. Active Profile — Defines the access profile currently ...
  • Page 30: Defining Profile Rules

    – Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address. Action —Defines the action attached to the access rule. The possible field values are:  –...
  • Page 31: Defining Authentication Profiles

    Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the  source IP address. Action — Defines the action attached to the rule. The possible field values are:  –...
  • Page 32: Mapping Authentication Profiles

    Each of the tables contains the following fields: Profile Name — Contains a list of user-defined authentication profile lists to which user-defined authentication profiles  are added. Methods — Defines the user authentication methods. The possible field values are:  –...
  • Page 33 Figure 32: Authentication Mapping Page The Authentication Mapping Page contains the following fields: Console — Indicates that authentication profiles are  used to authenticate console users. Telnet — Indicates that authentication profiles are used  to authenticate Telnet users. Secure Telnet (SSH) — Indicates that authentication ...
  • Page 34: Defining Tacacs+ Host Settings

    session is permitted. 2. Define the Console, Telnet, and Secure Telnet (SSH) fields. 3. Map the authentication method in the Secure HTTP selection box. 4. Map the authentication method in the HTTP selection box. 5. Click . The authentication mapping is saved, and the device is updated. 5.1.1.5 Defining TACACS+ Host Settings Terminal Access Controller Access Control System (TACACS+) provides centralized security user access validation.
  • Page 35: Defining Radius Server Settings

    Timeout for Reply — Defines the amount of time in seconds that passes before the connection between the device and  the TACACS+ times out. The field range is 1-1000 seconds. Single Connection — Maintains a single open connection between the device and the TACACS+ server. The possible ...
  • Page 36 Figure 36: Radius Page The Default Parameters section of the Radius Page contains the following fields: Retries — Defines the number of transmitted requests  sent to the RADIUS server before a failure occurs. Possible field values are 1-10. The default value is 3. Timeout for Reply —...
  • Page 37: Configuring Passwords

    1. Click . The RADIUS Server Settings Page opens: Figure 38: RADIUS Server Settings Page 2. Modify the fields. 3. Click . The RADIUS server settings are saved, and the device is updated. 5.1.2 Configuring Passwords This section contains information for defining device passwords, and includes the following topics. Defining Local Users ...
  • Page 38: Defining Line Passwords

    5.1.2.2 Defining Line Passwords Network administrators can define line passwords in the Line Password Page. After the line password is defined, a management method is assigned to the password. The device can be accessed using the following methods: Console Passwords ...
  • Page 39: Network Security Overview

    Network Security Overview  Defining Network Authentication Properties  Configuring Traffic Control  5.2.1 Network Security Overview This section provides an overview of network security and contains the following topics: Port-Based Authentication  Advanced Port-Based Authentication  5.2.1.1 Port-Based Authentication Port-based authentication authenticates users on a per-port basis via an external server.
  • Page 40: Defining Port Authentication Properties

    parameters. In addition, Guest VLANs are enabled from the Network Security Authentication Properties Page. To define the network authentication properties: 1. Click System > Network Security > Authentication > Properties. The Network Security Authentication Properties Page opens: Figure 43: Network Security Authentication Properties Page The Network Security Authentication Properties Page contains the following fields:...
  • Page 41: Configuring Multiple Hosts

    Current Port Control — Displays the current port authorization state. The possible field values are:  – Auto — Enables port-based authentication on the device. The interface moves between an authorized or unauthorized state based on the authentication exchange between the device and the client. –...
  • Page 42: Defining Authentication Hosts

    Figure 46: Multiple Hosts Page The Multiple Hosts Page contains the following fields: Port — Displays the port number for which advanced  port-based authentication is enabled. Multiple Hosts — Indicates whether multiple hosts  are enabled. Multiple hosts must be enabled in order to either disable the ingress-filter, or to use port-lock security on the selected port.
  • Page 43: Configuring Traffic Control

    When a packet is received on a locked port, and the packet TP-Link source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protection mechanism is invoked, and can provide various options.
  • Page 44: Enabling Storm Control

    Figure 49: Port Security Page The Port Security Page contains the following fields: Interface — Displays the Port or LAG name.  Interface Status — Indicates the host status. The  possible field values are: – Unauthorized — Indicates that the port control is Force Unauthorized, the port link is down or the port control is Auto, but a client has not been authenticated via the port.
  • Page 45 A Broadcast Storm is a result of an excessive amount of broadcast messages simultaneously transmitted across a network by a single port. Forwarded message responses are heaped onto the network, straining network resources or causing the network to time out. Storm control is enabled for all Gigabit ports by defining the packet type and the rate the packets are transmitted.
  • Page 46: Section 6. Defining Ip Addresses

    Section 6. Defining IP Addresses This section provides information for defining IP addresses on the device using DHCP and ARP. In addition, this section contains parameters for defining device default gateways, and Domain Name Servers. This section contains the following topics: Defining IP Addressing ...
  • Page 47: Defining The Default Gateway

    Figure 54: Add IP Interface Page 3. Define the IP Address, Network Mask, Prefix Length and Interface (Port, LAG or VLAN). 4. Click . The new interface is added and the device is updated. To modify IP interface settings: 1. Click System > System Info > IP Configuration > IP Addressing. The IP Interface Page opens. 2.
  • Page 48: Defining Arp

    Figure 57: DHCP Page The DHCP Page contains the following fields: Interface — Displays the IP address of the interface  which is connected to the DHCP server. Host Name — Displays the system name.  Remove — Removes DHCP interfaces. The possible ...
  • Page 49: Defining Domain Name System

    IP Address - Indicates the station IP address, which is associated with the MAC address filled in below.  MAC Address - Displays the station MAC address, which is associated in the ARP table with the IP address.  Status - Displays the ARP table entry type. Possible field values are: ...
  • Page 50: Configuring Host Mapping

    field values are: – Dynamic — The IP address is dynamically created. – Static — The IP address is a static IP address. Remove — Removes DNS servers. The possible field values are:  – Checked — Removes the selected DNS server –...
  • Page 51 Figure 64: Add DNS Host Page 3. Enter the Host Name and IP Address. 4. Click . The new DNS host is added to the hosts list in the Host Mapping Page.
  • Page 52: Section 7. Configuring Interfaces

    Section 7. Configuring Interfaces This section contains the following topics: Configuring Ports  Configuring LAGs  Configuring VLANs  7.1 Configuring Ports The Interface Configuration Page contains fields for defining port parameters. To define port parameters: 1. Click System > Bridging Config > Interface > Interface Configuration. The Interface Configuration Page opens: Figure 65: Interface Configuration Page The Interface Configuration Page is divided into the following sections:...
  • Page 53 – 1000 Half — Indicates that the port advertises for a 1000 Mbps speed port and half duplex mode setting. Back Pressure — Displays the back pressure mode on the port. Back pressure mode is used with half duplex mode to ...
  • Page 54: Configuring Lags

    The TP-Link device supports both static LAGs and Link Aggregation Control Protocol (LACP) LAGs. LACP LAGs negotiate aggregating port links with other LACP ports located on a different device. If the other device ports are also LACP ports, the devices establish a LAG between them.
  • Page 55: Configuring Lacp

    Figure 68: LAG Membership Settings Page The LAG Membership Settings Page contains the following fields: LAG — Contains a user-defined drop-down LAG list.  Lag Name — Displays the user-defined LAG name.  LACP — Indicates if LACP is defined on the LAG. The ...
  • Page 56: Configuring Vlans

    Figure 70: LACP Parameters Settings Page 3. Define the Port Priority and LACP Timeout settings. 4. Click . The LACP settings are saved and the device is updated. 7.3 Configuring VLANs VLANs are logical subgroups with a Local Area Network (LAN) which combine user stations and network devices into a single unit, regardless of the physical LAN segment to which they are attached.
  • Page 57: Defining Vlan Membership

    Figure 71: VLAN Member Properties Page The VLAN Member Properties Page contains the following fields: Select VLAN ID — Displays the properties of the  selected VLAN in the VLANs table below. Show All — Displays the properties of all defined ...
  • Page 58: Defining Vlan Interface Settings

    To define VLAN membership: 1. Click System > Bridging Config > VLAN >Membership > Membership. The VLAN Member Membership Page opens: Figure 74: VLAN Member Membership Page The VLAN Member Membership Page contains the following fields: VLAN ID — Displays the user-defined VLAN ID. ...
  • Page 59: Configuring Garp

    disabled on an access port. – Trunk — Indicates the port belongs to VLANs in which all ports are tagged, except for one port that can be untagged. – PVE - Promiscuous — Indicates the port is part of a PV Promiscuous VLAN. –...
  • Page 60: Defining Gvrp

    1. Click System > Bridging Config > VLAN > GARP. The GARP Parameters Page opens: Figure 77: GARP Parameters Page The GARP Parameters Page contains the following fields: Copy from Entry Number — Indicates the row  number from which GARP parameters are copied. To Entry Number —...
  • Page 61 Figure 79: GVRP Parameters Page The GVRP Parameters Page is divided into port and LAG parameters. The field definitions are the same. The GVRP Parameters Page contains the following fields: GVRP Global — Indicates if GVRP is enabled on the ...
  • Page 62: Section 8. Defining The Forwarding Database

    Section 8. Defining the Forwarding Database Packets addressed to destinations stored in either the Static or Dynamic databases are immediately forwarded to the port. The Dynamic MAC Address Table can be sorted by interface, VLAN, or MAC Address, whereas MAC addresses are dynamically learned as packets from sources that arrive at the device.
  • Page 63: Configuring Dynamic Forwarding Addresses

    2. Click . The Add Forwarding Database Page opens: Figure 82: Add Forwarding Database Page 3. Define the Interface, MAC Address, VLAN ID or VLAN Name, and Status fields. 4. Click . The forwarding database information is modified, and the device is updated. 8.2 Configuring Dynamic Forwarding Addresses The Dynamic Addresses Page contains parameters for querying information in the Dynamic MAC Address Table, including the interface type, MAC addresses, VLAN, and table storing.
  • Page 64 1. Click System > Bridging Config > Forwarding Database > Dynamic Addresses. The Dynamic Addresses Page opens. 2. Select the Interface, the MAC Address, and the VLAN ID. 3. Select an Address Table Sort Key. 4. Click . The Dynamic MAC Address Table is queried, and the results are displayed in the Current Address Table.
  • Page 65: Section 9. Configuring The Spanning Tree Protocol

    The TP-Link device supports the following STP versions: Classic STP — Provides a single path between end stations, avoiding and eliminating loops.
  • Page 66: Defining Stp Interface Settings

    – Rapid STP — Enables Rapid STP on the device. – Multiple STP — Enables Multiple STP on the device. BPDU Handling — Determines how BPDU packets are managed when STP is disabled on the port or device. BPDUs  are used to transmit spanning tree information.
  • Page 67 Figure 85: STP Interface Settings Page The STP Interface Settings Page contains the following fields: Interface — The interface for which the information is  displayed. STP Status — Indicates if STP is enabled on the port.  The possible field values are: –...
  • Page 68: Configuring The Rapid Stp

    9.2 Configuring the Rapid STP While Classic STP prevents Layer 2 forwarding loops in a general network topology, convergence can take between 30-60 seconds. This time may delay detecting possible loops and propagating status topology changes. Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies that allow a faster STP convergence without creating forwarding loops.
  • Page 69: Configuring The Multiple Stp

    Point-to-Point Operational Status — Displays the point-to-point operating state.  LAG — Displays the LAG to which the interface is attached.  . The RSTP Settings Page opens: 2. Click Figure 88: RSTP Settings Page The RSTP Settings Page contains the following fields in addition to the settings listed in the RSTP Page: Activate Protocol Migration —...
  • Page 70: Configuring Mstp Instances

    Figure 89: MSTP Properties Page The MSTP Properties Page contains the following fields: Region Name — Indicates the name of the user-  defined STP region. Revision — Indicates that an unsigned 16-bit number  that identifies the revision of the current MSTP configuration.
  • Page 71: Configuring Mstp Vlan Instances

    3. Click . The MSTP settings are saved and the device is updated. 9.3.3 Configuring MSTP VLAN Instances Network Administrator can assign MSTP for VLAN instances. To define MSTP for VLAN instances: 1. Click System > Bridging Info > Spanning Tree > MSTP > Instance Settings > VLAN Instance Configuration. The MSTP VLAN Instance Configuration Page opens: Figure 91: MSTP VLAN Instance Configuration Page The MSTP VLAN Instance Configuration Page page...
  • Page 72 The possible field values are: – Root — Provides the lowest cost path to forward packets to the root device. – Designated — Indicates the port or LAG through which the designated device is attached to the LAN. – Alternate — Provides an alternate path to the root device from the root interface. –...
  • Page 73: Section 10. Configuring Multicast Forwarding

    Section 10. Configuring Multicast Forwarding Multicast forwarding enables transmitting packets from either a specific multicast group to a source, or from a nonspecific source to a multicast group. This section contains the following topics: Enabling IGMP Snooping  Defining Multicast Bridging Groups ...
  • Page 74: Defining Multicast Bridging Groups

    The default value is 300 seconds. Leave Timeout — Indicates the amount of time the host waits, after requesting to leave the IGMP group and not  receiving a Join message from another station, before timing out. If a Leave Timeout occurs, the switch notifies the Multicast device to stop sending traffic The Leave Timeout value is either user-defined, or an immediate leave value.
  • Page 75 Bridge Multicast Address — Identifies the Multicast group MAC address/IP address.  Port — Displays the port that can be added to a Multicast service.  LAG — Displays the LAG that can be added to a Multicast service.  The following table contains the IGMP port and LAG members management settings: Table 5: IGMP Port/LAG Members Table Control Settings Port Control...
  • Page 76: Defining Multicast Forward All Parameters

    10.3 Defining Multicast Forward All Parameters The Multicast Forward All Page contains fields for attaching ports or LAGs to a device that is attached to a neighboring Multicast router/switch. Once IGMP Snooping is enabled, Multicast packets are forwarded to the appropriate port or VLAN. Unless LAGs are defined, only a Multicast Forward All table displays.
  • Page 77: Section 11. Configuring Snmp Management

    Section 11. Configuring SNMP Management Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports the following SNMP versions: SNMP version 1  SNMP version 2c  SNMP version 3  11.1 SNMP v1 and v2c The SNMP agents maintain a list of variables, which are used to manage the device.
  • Page 78: Defining Snmp Global Parameters

    Defining SNMP Group Members  Defining SNMP Communities  11.3.1 Defining SNMP Global Parameters The SNMP Security Global Parameters Page permits the enabling of both SNMP and Authentication notifications. To define SNMP security global parameters: 1. Click System > SNMP Management > Security > Global Parameters. The SNMP Security Global Parameters Page opens: Figure 100: SNMP Security Global Parameters Page The SNMP Security Global Parameters Page contains the...
  • Page 79: Defining Snmp Group Profiles

    SNMP view. Remove — Deletes the currently selected view. The possible field values are:  – Checked — Removes the selected view. – Unchecked — Maintains the list of views. . The Add SNMP View Page opens: 2. Click Figure 102: Add SNMP View Page 3.
  • Page 80: Defining Snmp Group Members

    2. Click . The Add SNMP Group Profile Page opens: Figure 104: Add SNMP Group Profile Page 3. Define the Group Name, Security Model, Security Level, and Operation fields. 4. Click . The SNMP group profile is added, and the device is updated. To modify the SNMP Group settings: 1.
  • Page 81 – SHA Password — Users are authenticated using the HMAC-SHA-96 authentication level. The user should enter a password. – No Authentication — No user authentication is used. Remove — Removes users from a specified group. The possible field values are: ...
  • Page 82: Defining Snmp Communities

    11.3.5 Defining SNMP Communities Access rights are managed by defining communities in the SNMP Communities Page. When the community names are changed, access rights are also changed. SNMP communities are defined only for SNMP v1 and SNMP v2c. To define SNMP communities: 1.
  • Page 83: Configuring Snmp Notification Settings

    the device is updated. To modify SNMP Group Membership settings: 1. Click System > SNMP Management > Security > Communities. The SNMP Community Settings Page opens: Figure 111: SNMP Community Settings Page 2. Modify the SNMP Management Station, Community String, and Basic or Advanced fields. 3.
  • Page 84: Defining Notification Receivers

    1. Click System > SNMP Management > Notification > Notification Filter. The SNMP Notification FiIter Page opens: Figure 113: SNMP Notification FiIter Page The SNMP Notification FiIter Page contains the following fields: Filter Name — Contains a list of user-defined ...
  • Page 85: Snmpv1,2C Notification Recipient

    Figure 115: SNMP Notification Receiver Page The SNMP Notification Receiver Page c is divided into the following tables: SNMPv1,2c Notification Recipient  SNMPv3 Notification Recipient  11.4.3.1 SNMPv1,2c Notification Recipient The SNMP v1, v2c Recipient table contains the following fields: Recipients IP —...
  • Page 86 – Unchecked — Maintains the list of recipients. 2. Click . The Add SNMP Notification Receiver Page opens: Figure 116: Add SNMP Notification Receiver Page 3. Define the Recipient IP, Notification Type, SNMPV1,v2c or SNMPv3, UPD Port, Filter Name, Timeout, and Retries fields.
  • Page 87: Section 12. Configuring Quality Of Service

    Section 12. Configuring Quality of Service This section contains the following topics: Quality of Service Overview  Enabling Quality of Service  Mapping Queues  12.1 Quality of Service Overview Network traffic is usually unpredictable, and the only basic assurance that can be offered is best effort traffic delivery. To overcome this challenge, Quality of Service (QoS) is applied throughout the network.
  • Page 88: Qos Modes

    The following table contains the VPT to Queue default settings: Table 7: VPT Default Mapping Table VPT Value Mapping of the VPT to the output queue is performed on a system-wide basis, and can be enabled or disabled per port. Default CoS—...
  • Page 89: Basic Qos Mode

    Note: When moving to and from basic and advanced QoS modes, some settings may be lost. 12.1.2.1 Basic QoS Mode Basic Mode supports activating one of the following Trust settings: VLAN Point Tag  DiffServ Code Point  None  In addition, a single IP-based ACL can be attached directly to the interface (see section on network security for more information).
  • Page 90: Defining Queues

    Figure 118: CoS Settings Page The CoS Settings Page contains the following fields: Quality of Service— Indicates if QoS is enabled on  the interface. The possible values are: – Enable — Enables QoS on the interface. – Disable — Disables QoS on the interface. Trust Mode —...
  • Page 91: Mapping Queues

    Figure 120: QoS Queue Settings Page The QoS Queue Settings Page contains the following fields: Queue — Indicates the queue number.  Scheduling  – Strict Priority — Indicates that traffic scheduling for the selected queue is based strictly on the queue priority.
  • Page 92 1. Click System > Quality of Service > Queue Mapping > DSCP to Queue. The DSCP to Queue Page opens: Figure 122: DSCP to Queue Page The CoS Settings Page page contains the following fields: DSCP In — Displays the incoming packet’s DSCP ...
  • Page 93: Section 13. Managing System Files

    Section 13. Managing System Files File maintenance on the device includes configuration file management and device access. The configuration file structure consists of the following configuration files: Startup configuration file — Contains the commands required to reconfigure the device to the same settings as when ...
  • Page 94: Firmware Download

    13.1.2 Firmware Download The Firmware Download section contains the following fields: TFTP Server IP Address — Specifies the address of the TFTP server from which files are downloaded.  Source File Name — Specifies the file to be downloaded.  Destination File —...
  • Page 95: Software Image Upload

    13.2.2 Software Image Upload The Software Image Upload section contains the following fields: TFTP Server IP Address — Specifies the address of the TFTP server to which the Software Image is uploaded.  Destination File Name — Specifies the name of the software image file to which the Software Image is uploaded. ...
  • Page 96 Figure 126: Copy Files Page The Copy Files Page contains the following fields: Copy Configuration — Copies the Running  Configuration file to the Startup Configuration file. Source — Indicates the Running Configuration file is  selected. Destination — Indicates the Startup Configuration file is selected. ...
  • Page 97: Section 14. Performing Device Diagnostics

    Section 14. Performing Device Diagnostics This section contains the following topics: Configuring Port Mirroring  Viewing Integrated Cable Tests  Viewing Optical Transceivers  14.1 Configuring Port Mirroring Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.
  • Page 98: Viewing Integrated Cable Tests

    To modify port mirroring settings: 1. Click . The Port Mirroring Settings Page opens. Figure 129: Port Mirroring Settings Page 2. Modify the Type field. 3. Click . Port mirroring settings are modified, and the device is updated. To remove port mirroring: 1.
  • Page 99: Viewing Optical Transceivers

    14.3 Viewing Optical Transceivers The Optical Transceivers Page allows network managers to perform tests on fiber-optic cables. Note: Optical transceiver diagnostics can be performed only when the link is present. To test cables: Click System > Maintenance > Diagnostics > Optical Transceivers. The Optical Transceivers Page opens: ...
  • Page 100: Section 15. Viewing Statistics

    Section 15. Viewing Statistics This section describes how to view and manage device statistics for interfaces, GVRP, EAP, and Etherlike and how to view and define as RMON statistics, history and alarms. This section contains the following topics: Viewing Interface Statistics ...
  • Page 101: Transmit Statistics

    Packets with Errors — Displays the number of error packets received from the selected interface.  Transmit Statistics Total Bytes (Octets) — Displays the number of octets transmitted from the selected interface.  Unicast Packets — Displays the number of Unicast packets transmitted from the selected interface. ...
  • Page 102: Viewing Gvrp Statistics

    To update the refresh time: To change the refresh rate for statistics, select another rate from the Refresh Rate dropdown list.  To reset Etherlike interface statistics counters: 1. Open the Etherlike Statistics Page. 2. Click 15.1.3 Viewing GVRP Statistics The GVRP Statistics Page contains device statistics for GVRP.
  • Page 103: Viewing Eap Statistics

    1. Open the GVRP Statistics Page. 2. Click . The GVRP interface statistics counters are cleared. 15.1.4 Viewing EAP Statistics The EAP Statistics Page contains information about EAP packets received on a specific port. To view the EAP Statistics: 1. Click System > Statistics > Interface Statistics > EAP. The EAP Statistics Page opens: Figure 135: EAP Statistics Page The EAP Statistics Page contains the following fields: Port —...
  • Page 104: Viewing Rmon Statistics

    Configuring RMON History  Defining RMON Alarms  15.2.1 Viewing RMON Statistics The RMON Statistics Page contains fields for viewing information about device utilization and errors that occurred on the device. To view RMON statistics: 1. Click System > Statistics > RMON > Statistics. The RMON Statistics Page opens: Figure 136: RMON Statistics Page The RMON Statistics Page contains the following fields: Interface —...
  • Page 105: Configuring Rmon History

    Frames of xx Bytes — Number of xx-byte frames received on the interface since the device was last refreshed.  2. Select an interface (Port or LAG) in the Interface field. The RMON statistics are displayed. To update the refresh time: To change the refresh rate for statistics, select another rate from the Refresh Rate dropdown list.
  • Page 106: Viewing The Rmon History Table

    Figure 138: Add History Entry User Page 3. Define the fields. 4. Click . The entry is added to the RMON History Control Page, and the device is updated. To modify a history entry user: 1. Open the RMON History Control Page. 2.
  • Page 107: Configuring Rmon Events

    the device was last refreshed. Oversize Packets — Displays the number of oversized packets (over 1518 octets) received on the interface since the  device was last refreshed. Fragments — Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including ...
  • Page 108: Viewing The Rmon Events Logs

    Figure 142: Add RMON Event User Page 3. Define the fields. 4. Click . The entry is added to the RMON Events Control Page, and the device is updated. To modify an RMON Event user: 1. Click System > Statistics > RMON > Events. The RMON Events Control Page opens, displaying defined event entries.
  • Page 109 Interface — Displays interface for which RMON statistics are displayed. The possible field values are:  – Port — Displays the RMON statistics for the selected port. – LAG — Displays the RMON statistics for the selected LAG. Counter Value — Displays the selected MIB variable value. ...
  • Page 110 Figure 147: Edit RMON Alarm User Page 2. Modify the fields. 3. Click . The entry is updated in the RMON Alarm Page, and the device is updated. 0 ...
  • Page 111: Glossary

    Glossary This glossary contains terms commonly used in Embedded Web System documentation. Term Definition Access Mode Specifies the method by which user access is granted to the system. Allows network managers to define profiles and rules for accessing the device. Access to management functions can be limited to user groups, which are defined by the following criteria: Access Profile •...
  • Page 112 Term Backplane Bandwidth Bandwidth Assignment Baud Best Effort Boot Version BootP BPDU Bridge Broadcast Domain Broadcast Storm Broadcasting Burst Burst Size CIDR Class Map Class of Service Classless Inter-Domain Routing 0  Definition The main BUS that carries information in the device. Specifies the amount of data that can be transmitted in a fixed amount of time.
  • Page 113 Term Definition Command Line Interface. A set of line commands used to configure the system. A computer system or process that requires services or processes for another computer, Client typically a server. Classification Control Lists. Devices that grant, deny, or limit access to devices, features, or applications in QoS.
  • Page 114 Term Ethernet FIFO Flapping Flow Control Fragment Frame GARP GBIC Gigabit Ethernet GVRP Host Hot Swapping HTTP 0  Definition Uses a bus or star topology and supports data transfer rates of Mpbs. A newer version called Fast Ethernet supports 100 Mbps. Ethernet is standardized as per IEEE 802.3. Ethernet is the most commonly implemented LAN standard.
  • Page 115 Term Definition Integrated Access Device. Device that multiplexes varied communication technologies onto a single telephone line for transmission to the carrier. Integrated Circuit. Small electronic devices composed from semiconductor material. Internet Control Message Protocol. Allows the gateway or destination host to ICMP communicate with the source host.
  • Page 116 Term L2TP Layer 2 Layer 3 Layer 4 Load Balancing MAC Address MAC Address Learning MAC Layer Mask MDIX Multicast Network Processor 0  Definition Layer 2 Tunnel Protocol. Helps build virtual private networks in the dial access space, and provides Layer 2 Forwarding L2F) protocol and Point-to-Point Tunneling Protocol (PPTP).
  • Page 117 Term Definition Network Management System. An interface that provides a method of managing a system. A network connection endpoint or a common junction for multiple network lines. Nodes include: Node • Processors. • Controllers. • Workstations. Object Identifier. Used by SNMP to identify managed objects. In the SNMP Manager/ Agent network management paradigm, each managed object must have an OID to identify it.
  • Page 118 Term Redundancy Relay Agent RJ-11 Connector RJ-45 Connector RMON Router RSTP Running Configuration File RVSP Segmentation Server SNMP Spanning Tree Protocol Stand-alone Mode Startup Configuration Subnet Definition Provides duplication of devices, services, or events. If a device, service, or event fails, redundancy provides a backup that can replace the lost functionality.
  • Page 119 Term Definition Used to mask all or part of an IP address used in a subnet address. Switch Filters and Subnet Mask forwards packets between LAN segments. Switches support any packet protocol type. Transmissions Control Protocol. Enables two hosts to communicate and exchange data TCP/IP streams.
  • Page 120 TP-LINK TECHNOLOGIES CO., LTD. E-mail: support@tp-link.com Website: http://www.tp-link.com Add: 3/F., Building R1-B, Hi-tech Industrial Park, Shennan Rd., Shenzhen, P.R.China...

This manual is also suitable for:

Tl-sl3452Tl-sl3428

Table of Contents