Guide Overview ...1 Intended Audience ...2 Section 1. Getting Started ... 3 1.1 Configuring the device to use TP-Link Embedded Web Interface ...3 1.2 Starting the TP-Link Embedded Web Interface ...3 1.3 Understanding the TP-Link Embedded Web Interface ...4 1.3.1 Device Representation ...5 1.3.2 Using the TP-Link Embedded Web Interface Management Buttons ...5...
Guide Overview This user guide is divided into the following sections to provide concise information for configuring, and managing the TP-Link device: Section 1. Getting Started — Provides information about using the EWS, including the TP-Link Embedded Web Interface, management, and information buttons, as well as information about adding, modifying, and deleting devices.
Section 14. Performing Device Diagnostics — Provides information about port mirroring configuration, copper and fiber cables testing, and viewing device health information. Section 15. Viewing Statistics — Provides information about viewing device statistics, including Remote Monitoring On Network (RMON) statistics, and device history events. Intended Audience This guide is intended for network administrators familiar with IT concepts and network terminology.
When the device is received, the Embedded Web Interface can not be accessed until the device is properly configured. To use TP-Link Embedded Web Interface, use the console interface to assign an IP address and subnet mask on the default VLAN, and add a super-user with the highest privilege level (15) which is allowed to log onto the device via Embedded Web Interface.
3 Tab Area all the components under a specific feature. 4 Zoom View Provides a graphic of the device on which TP-Link Web Interface runs. 5 TP-Link Web Interface Provide access to online help, and contain information about the EWS.
Using the TP-Link Embedded Web Interface Management Buttons — Provides instructions for adding, modifying, and deleting configuration parameters. 1.3.1 Device Representation The TP-Link Embedded Web Interface Home Page contains a graphical representation of the device. This representation varies according to the device platform. Figure 3: Device Representation Figure 3:Device Representation Figures in this guide are based on the TL-SL3428 device.
Deleting Configuration Information 1.4.1 Adding Configuration Information User-defined information can be added to specific TP-Link Web Interface pages, by opening a new Add page. To add information to tables or TP-Link Web Interface pages: 1. Open an TP-Link Web Interface page.
Figure 6: IP Addressing Page 2. Select the Remove checkbox in the row of the item to delete. 3. Click . The information is deleted, and the device is updated. 1.6 Resetting the Device The Reset page enables resetting the device from a remote location. Note: To prevent the current configuration from being lost, save all changes from the running configuration file to the startup configuration file before resetting the device.
Section 2. Defining Device Information This section contains information for viewing and setting general system information. The System Description Page contains parameters for configuring general device information, including the system name, location, and contact, the system MAC Address, System Object ID, System Up Time, System IP and MAC addresses, and both software and hardware versions.
Section 3. Setting the System Time This section provides information for configuring system time parameters, including: Configuring Daylight Savings Time Configuring SNTP 3.1 Configuring Daylight Savings Time The System Information Time Page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock.
Page 17
Latvia — From the last weekend of March until the last weekend of October. Lebanon — From the last weekend of March until the last weekend of October. Lithuania — From the last weekend of March until the last weekend of October. ...
Page 18
The DST can be set according to unique start and end dates for a particular year or as a recurring period for any year. For a specific setting in a particular year, complete the fields in the Daylight Savings area; for a recurring setting, complete the fields in the Recurring area.
4. Click . The DST settings are saved, and the device is updated. 3.2 Configuring SNTP This section contains the following topics: SNTP Overview Defining SNTP Global Settings Configuring SNTP Authentication Defining SNTP Servers Defining SNTP Interface Settings ...
server, the SNTP client listens for the response. The SNTP client neither sends time information requests nor receives responses from the Broadcast server. Message Digest 5 (MD5) Authentication safeguards device synchronization paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication, authenticates the origin of the communication.
To configure SNTP authentication: 1. Click System > System Info > SNTP > Authentication. The SNTP Authentication Page opens: Figure 13: SNTP Authentication Page The SNTP Authentication Page contains the following fields: Enable SNTP Authentication — Indicates if authenticating an SNTP session between the device and an SNTP server is enabled on the device.
Figure 15: SNTP Servers Page The SNTP Servers Page contains the following fields: SNTP Server — Displays user-defined SNTP server IP addresses. Up to eight SNTP servers can be defined. Poll Interval — Indicates whether or not the device ...
Page 23
Figure 17: SNTP Interface Settings Page The SNTP Interface Settings Page contains the following fields: Interface — Indicates the interface on which SNTP can be enabled. The possible field values are: – Port — Indicates the specific port number on which SNTP is enabled.
Section 4. Configuring System Logs This section provides information for managing system logs. The system logs enable viewing device events in real time, and recording the events for later usage. System logs record and manage events and report errors and informational messages. Event messages have a unique format, as per the Syslog protocols recommended message format for all error reporting.
Figure 19: Syslog Properties Page The Syslog Properties Page contains the following fields: Enable Logging — Indicates if device global logs for Cache, File, and Server Logs are enabled. Console logs are enabled by default. The possible field values are: –...
To view Flash memory logs: 1. Click System > System Info > Syslog > Flash. The Syslog Flash Page opens: Figure 21: Syslog Flash Page The Syslog Flash Page contains the following information: Log Index — Lists the log index number. ...
Page 27
Figure 23: Add Syslog Server Page 3. Define the IP Address, UDP Port, Facility, Description, and Minimum Severity fields. 4. Click . The Log server is defined and the device is updated.
Section 5. Configuring Device Security This section describes pages that contain fields for setting security parameters for ports, device management methods, users, and server security for the TP-Link device. This section contains the following topics: Configuring Management Security Configuring Network Security ...
Page 29
Figure 24: Access Profile Page The Access Profile Page contains the following fields: Access Profile Name — Defines the access profile name. The access profile name can contain up to 32 characters. Active Profile — Defines the access profile currently ...
– Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address. Action —Defines the action attached to the access rule. The possible field values are: –...
Prefix Length — Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address. Action — Defines the action attached to the rule. The possible field values are: –...
Each of the tables contains the following fields: Profile Name — Contains a list of user-defined authentication profile lists to which user-defined authentication profiles are added. Methods — Defines the user authentication methods. The possible field values are: –...
Page 33
Figure 32: Authentication Mapping Page The Authentication Mapping Page contains the following fields: Console — Indicates that authentication profiles are used to authenticate console users. Telnet — Indicates that authentication profiles are used to authenticate Telnet users. Secure Telnet (SSH) — Indicates that authentication ...
session is permitted. 2. Define the Console, Telnet, and Secure Telnet (SSH) fields. 3. Map the authentication method in the Secure HTTP selection box. 4. Map the authentication method in the HTTP selection box. 5. Click . The authentication mapping is saved, and the device is updated. 5.1.1.5 Defining TACACS+ Host Settings Terminal Access Controller Access Control System (TACACS+) provides centralized security user access validation.
Timeout for Reply — Defines the amount of time in seconds that passes before the connection between the device and the TACACS+ times out. The field range is 1-1000 seconds. Single Connection — Maintains a single open connection between the device and the TACACS+ server. The possible ...
Page 36
Figure 36: Radius Page The Default Parameters section of the Radius Page contains the following fields: Retries — Defines the number of transmitted requests sent to the RADIUS server before a failure occurs. Possible field values are 1-10. The default value is 3. Timeout for Reply —...
1. Click . The RADIUS Server Settings Page opens: Figure 38: RADIUS Server Settings Page 2. Modify the fields. 3. Click . The RADIUS server settings are saved, and the device is updated. 5.1.2 Configuring Passwords This section contains information for defining device passwords, and includes the following topics. Defining Local Users ...
5.1.2.2 Defining Line Passwords Network administrators can define line passwords in the Line Password Page. After the line password is defined, a management method is assigned to the password. The device can be accessed using the following methods: Console Passwords ...
Network Security Overview Defining Network Authentication Properties Configuring Traffic Control 5.2.1 Network Security Overview This section provides an overview of network security and contains the following topics: Port-Based Authentication Advanced Port-Based Authentication 5.2.1.1 Port-Based Authentication Port-based authentication authenticates users on a per-port basis via an external server.
parameters. In addition, Guest VLANs are enabled from the Network Security Authentication Properties Page. To define the network authentication properties: 1. Click System > Network Security > Authentication > Properties. The Network Security Authentication Properties Page opens: Figure 43: Network Security Authentication Properties Page The Network Security Authentication Properties Page contains the following fields:...
Current Port Control — Displays the current port authorization state. The possible field values are: – Auto — Enables port-based authentication on the device. The interface moves between an authorized or unauthorized state based on the authentication exchange between the device and the client. –...
Figure 46: Multiple Hosts Page The Multiple Hosts Page contains the following fields: Port — Displays the port number for which advanced port-based authentication is enabled. Multiple Hosts — Indicates whether multiple hosts are enabled. Multiple hosts must be enabled in order to either disable the ingress-filter, or to use port-lock security on the selected port.
When a packet is received on a locked port, and the packet TP-Link source MAC address is not tied to that port (either it was learned on a different port, or it is unknown to the system), the protection mechanism is invoked, and can provide various options.
Figure 49: Port Security Page The Port Security Page contains the following fields: Interface — Displays the Port or LAG name. Interface Status — Indicates the host status. The possible field values are: – Unauthorized — Indicates that the port control is Force Unauthorized, the port link is down or the port control is Auto, but a client has not been authenticated via the port.
Page 45
A Broadcast Storm is a result of an excessive amount of broadcast messages simultaneously transmitted across a network by a single port. Forwarded message responses are heaped onto the network, straining network resources or causing the network to time out. Storm control is enabled for all Gigabit ports by defining the packet type and the rate the packets are transmitted.
Section 6. Defining IP Addresses This section provides information for defining IP addresses on the device using DHCP and ARP. In addition, this section contains parameters for defining device default gateways, and Domain Name Servers. This section contains the following topics: Defining IP Addressing ...
Figure 54: Add IP Interface Page 3. Define the IP Address, Network Mask, Prefix Length and Interface (Port, LAG or VLAN). 4. Click . The new interface is added and the device is updated. To modify IP interface settings: 1. Click System > System Info > IP Configuration > IP Addressing. The IP Interface Page opens. 2.
Figure 57: DHCP Page The DHCP Page contains the following fields: Interface — Displays the IP address of the interface which is connected to the DHCP server. Host Name — Displays the system name. Remove — Removes DHCP interfaces. The possible ...
IP Address - Indicates the station IP address, which is associated with the MAC address filled in below. MAC Address - Displays the station MAC address, which is associated in the ARP table with the IP address. Status - Displays the ARP table entry type. Possible field values are: ...
field values are: – Dynamic — The IP address is dynamically created. – Static — The IP address is a static IP address. Remove — Removes DNS servers. The possible field values are: – Checked — Removes the selected DNS server –...
Page 51
Figure 64: Add DNS Host Page 3. Enter the Host Name and IP Address. 4. Click . The new DNS host is added to the hosts list in the Host Mapping Page.
Section 7. Configuring Interfaces This section contains the following topics: Configuring Ports Configuring LAGs Configuring VLANs 7.1 Configuring Ports The Interface Configuration Page contains fields for defining port parameters. To define port parameters: 1. Click System > Bridging Config > Interface > Interface Configuration. The Interface Configuration Page opens: Figure 65: Interface Configuration Page The Interface Configuration Page is divided into the following sections:...
Page 53
– 1000 Half — Indicates that the port advertises for a 1000 Mbps speed port and half duplex mode setting. Back Pressure — Displays the back pressure mode on the port. Back pressure mode is used with half duplex mode to ...
The TP-Link device supports both static LAGs and Link Aggregation Control Protocol (LACP) LAGs. LACP LAGs negotiate aggregating port links with other LACP ports located on a different device. If the other device ports are also LACP ports, the devices establish a LAG between them.
Figure 68: LAG Membership Settings Page The LAG Membership Settings Page contains the following fields: LAG — Contains a user-defined drop-down LAG list. Lag Name — Displays the user-defined LAG name. LACP — Indicates if LACP is defined on the LAG. The ...
Figure 70: LACP Parameters Settings Page 3. Define the Port Priority and LACP Timeout settings. 4. Click . The LACP settings are saved and the device is updated. 7.3 Configuring VLANs VLANs are logical subgroups with a Local Area Network (LAN) which combine user stations and network devices into a single unit, regardless of the physical LAN segment to which they are attached.
Figure 71: VLAN Member Properties Page The VLAN Member Properties Page contains the following fields: Select VLAN ID — Displays the properties of the selected VLAN in the VLANs table below. Show All — Displays the properties of all defined ...
To define VLAN membership: 1. Click System > Bridging Config > VLAN >Membership > Membership. The VLAN Member Membership Page opens: Figure 74: VLAN Member Membership Page The VLAN Member Membership Page contains the following fields: VLAN ID — Displays the user-defined VLAN ID. ...
disabled on an access port. – Trunk — Indicates the port belongs to VLANs in which all ports are tagged, except for one port that can be untagged. – PVE - Promiscuous — Indicates the port is part of a PV Promiscuous VLAN. –...
1. Click System > Bridging Config > VLAN > GARP. The GARP Parameters Page opens: Figure 77: GARP Parameters Page The GARP Parameters Page contains the following fields: Copy from Entry Number — Indicates the row number from which GARP parameters are copied. To Entry Number —...
Page 61
Figure 79: GVRP Parameters Page The GVRP Parameters Page is divided into port and LAG parameters. The field definitions are the same. The GVRP Parameters Page contains the following fields: GVRP Global — Indicates if GVRP is enabled on the ...
Section 8. Defining the Forwarding Database Packets addressed to destinations stored in either the Static or Dynamic databases are immediately forwarded to the port. The Dynamic MAC Address Table can be sorted by interface, VLAN, or MAC Address, whereas MAC addresses are dynamically learned as packets from sources that arrive at the device.
2. Click . The Add Forwarding Database Page opens: Figure 82: Add Forwarding Database Page 3. Define the Interface, MAC Address, VLAN ID or VLAN Name, and Status fields. 4. Click . The forwarding database information is modified, and the device is updated. 8.2 Configuring Dynamic Forwarding Addresses The Dynamic Addresses Page contains parameters for querying information in the Dynamic MAC Address Table, including the interface type, MAC addresses, VLAN, and table storing.
Page 64
1. Click System > Bridging Config > Forwarding Database > Dynamic Addresses. The Dynamic Addresses Page opens. 2. Select the Interface, the MAC Address, and the VLAN ID. 3. Select an Address Table Sort Key. 4. Click . The Dynamic MAC Address Table is queried, and the results are displayed in the Current Address Table.
– Rapid STP — Enables Rapid STP on the device. – Multiple STP — Enables Multiple STP on the device. BPDU Handling — Determines how BPDU packets are managed when STP is disabled on the port or device. BPDUs are used to transmit spanning tree information.
Page 67
Figure 85: STP Interface Settings Page The STP Interface Settings Page contains the following fields: Interface — The interface for which the information is displayed. STP Status — Indicates if STP is enabled on the port. The possible field values are: –...
9.2 Configuring the Rapid STP While Classic STP prevents Layer 2 forwarding loops in a general network topology, convergence can take between 30-60 seconds. This time may delay detecting possible loops and propagating status topology changes. Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies that allow a faster STP convergence without creating forwarding loops.
Point-to-Point Operational Status — Displays the point-to-point operating state. LAG — Displays the LAG to which the interface is attached. . The RSTP Settings Page opens: 2. Click Figure 88: RSTP Settings Page The RSTP Settings Page contains the following fields in addition to the settings listed in the RSTP Page: Activate Protocol Migration —...
Figure 89: MSTP Properties Page The MSTP Properties Page contains the following fields: Region Name — Indicates the name of the user- defined STP region. Revision — Indicates that an unsigned 16-bit number that identifies the revision of the current MSTP configuration.
3. Click . The MSTP settings are saved and the device is updated. 9.3.3 Configuring MSTP VLAN Instances Network Administrator can assign MSTP for VLAN instances. To define MSTP for VLAN instances: 1. Click System > Bridging Info > Spanning Tree > MSTP > Instance Settings > VLAN Instance Configuration. The MSTP VLAN Instance Configuration Page opens: Figure 91: MSTP VLAN Instance Configuration Page The MSTP VLAN Instance Configuration Page page...
Page 72
The possible field values are: – Root — Provides the lowest cost path to forward packets to the root device. – Designated — Indicates the port or LAG through which the designated device is attached to the LAN. – Alternate — Provides an alternate path to the root device from the root interface. –...
Section 10. Configuring Multicast Forwarding Multicast forwarding enables transmitting packets from either a specific multicast group to a source, or from a nonspecific source to a multicast group. This section contains the following topics: Enabling IGMP Snooping Defining Multicast Bridging Groups ...
The default value is 300 seconds. Leave Timeout — Indicates the amount of time the host waits, after requesting to leave the IGMP group and not receiving a Join message from another station, before timing out. If a Leave Timeout occurs, the switch notifies the Multicast device to stop sending traffic The Leave Timeout value is either user-defined, or an immediate leave value.
Page 75
Bridge Multicast Address — Identifies the Multicast group MAC address/IP address. Port — Displays the port that can be added to a Multicast service. LAG — Displays the LAG that can be added to a Multicast service. The following table contains the IGMP port and LAG members management settings: Table 5: IGMP Port/LAG Members Table Control Settings Port Control...
10.3 Defining Multicast Forward All Parameters The Multicast Forward All Page contains fields for attaching ports or LAGs to a device that is attached to a neighboring Multicast router/switch. Once IGMP Snooping is enabled, Multicast packets are forwarded to the appropriate port or VLAN. Unless LAGs are defined, only a Multicast Forward All table displays.
Section 11. Configuring SNMP Management Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports the following SNMP versions: SNMP version 1 SNMP version 2c SNMP version 3 11.1 SNMP v1 and v2c The SNMP agents maintain a list of variables, which are used to manage the device.
Defining SNMP Group Members Defining SNMP Communities 11.3.1 Defining SNMP Global Parameters The SNMP Security Global Parameters Page permits the enabling of both SNMP and Authentication notifications. To define SNMP security global parameters: 1. Click System > SNMP Management > Security > Global Parameters. The SNMP Security Global Parameters Page opens: Figure 100: SNMP Security Global Parameters Page The SNMP Security Global Parameters Page contains the...
SNMP view. Remove — Deletes the currently selected view. The possible field values are: – Checked — Removes the selected view. – Unchecked — Maintains the list of views. . The Add SNMP View Page opens: 2. Click Figure 102: Add SNMP View Page 3.
2. Click . The Add SNMP Group Profile Page opens: Figure 104: Add SNMP Group Profile Page 3. Define the Group Name, Security Model, Security Level, and Operation fields. 4. Click . The SNMP group profile is added, and the device is updated. To modify the SNMP Group settings: 1.
Page 81
– SHA Password — Users are authenticated using the HMAC-SHA-96 authentication level. The user should enter a password. – No Authentication — No user authentication is used. Remove — Removes users from a specified group. The possible field values are: ...
11.3.5 Defining SNMP Communities Access rights are managed by defining communities in the SNMP Communities Page. When the community names are changed, access rights are also changed. SNMP communities are defined only for SNMP v1 and SNMP v2c. To define SNMP communities: 1.
the device is updated. To modify SNMP Group Membership settings: 1. Click System > SNMP Management > Security > Communities. The SNMP Community Settings Page opens: Figure 111: SNMP Community Settings Page 2. Modify the SNMP Management Station, Community String, and Basic or Advanced fields. 3.
1. Click System > SNMP Management > Notification > Notification Filter. The SNMP Notification FiIter Page opens: Figure 113: SNMP Notification FiIter Page The SNMP Notification FiIter Page contains the following fields: Filter Name — Contains a list of user-defined ...
Figure 115: SNMP Notification Receiver Page The SNMP Notification Receiver Page c is divided into the following tables: SNMPv1,2c Notification Recipient SNMPv3 Notification Recipient 11.4.3.1 SNMPv1,2c Notification Recipient The SNMP v1, v2c Recipient table contains the following fields: Recipients IP —...
Page 86
– Unchecked — Maintains the list of recipients. 2. Click . The Add SNMP Notification Receiver Page opens: Figure 116: Add SNMP Notification Receiver Page 3. Define the Recipient IP, Notification Type, SNMPV1,v2c or SNMPv3, UPD Port, Filter Name, Timeout, and Retries fields.
Section 12. Configuring Quality of Service This section contains the following topics: Quality of Service Overview Enabling Quality of Service Mapping Queues 12.1 Quality of Service Overview Network traffic is usually unpredictable, and the only basic assurance that can be offered is best effort traffic delivery. To overcome this challenge, Quality of Service (QoS) is applied throughout the network.
The following table contains the VPT to Queue default settings: Table 7: VPT Default Mapping Table VPT Value Mapping of the VPT to the output queue is performed on a system-wide basis, and can be enabled or disabled per port. Default CoS—...
Note: When moving to and from basic and advanced QoS modes, some settings may be lost. 12.1.2.1 Basic QoS Mode Basic Mode supports activating one of the following Trust settings: VLAN Point Tag DiffServ Code Point None In addition, a single IP-based ACL can be attached directly to the interface (see section on network security for more information).
Figure 118: CoS Settings Page The CoS Settings Page contains the following fields: Quality of Service— Indicates if QoS is enabled on the interface. The possible values are: – Enable — Enables QoS on the interface. – Disable — Disables QoS on the interface. Trust Mode —...
Figure 120: QoS Queue Settings Page The QoS Queue Settings Page contains the following fields: Queue — Indicates the queue number. Scheduling – Strict Priority — Indicates that traffic scheduling for the selected queue is based strictly on the queue priority.
Page 92
1. Click System > Quality of Service > Queue Mapping > DSCP to Queue. The DSCP to Queue Page opens: Figure 122: DSCP to Queue Page The CoS Settings Page page contains the following fields: DSCP In — Displays the incoming packet’s DSCP ...
Section 13. Managing System Files File maintenance on the device includes configuration file management and device access. The configuration file structure consists of the following configuration files: Startup configuration file — Contains the commands required to reconfigure the device to the same settings as when ...
13.1.2 Firmware Download The Firmware Download section contains the following fields: TFTP Server IP Address — Specifies the address of the TFTP server from which files are downloaded. Source File Name — Specifies the file to be downloaded. Destination File —...
13.2.2 Software Image Upload The Software Image Upload section contains the following fields: TFTP Server IP Address — Specifies the address of the TFTP server to which the Software Image is uploaded. Destination File Name — Specifies the name of the software image file to which the Software Image is uploaded. ...
Page 96
Figure 126: Copy Files Page The Copy Files Page contains the following fields: Copy Configuration — Copies the Running Configuration file to the Startup Configuration file. Source — Indicates the Running Configuration file is selected. Destination — Indicates the Startup Configuration file is selected. ...
Section 14. Performing Device Diagnostics This section contains the following topics: Configuring Port Mirroring Viewing Integrated Cable Tests Viewing Optical Transceivers 14.1 Configuring Port Mirroring Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.
To modify port mirroring settings: 1. Click . The Port Mirroring Settings Page opens. Figure 129: Port Mirroring Settings Page 2. Modify the Type field. 3. Click . Port mirroring settings are modified, and the device is updated. To remove port mirroring: 1.
14.3 Viewing Optical Transceivers The Optical Transceivers Page allows network managers to perform tests on fiber-optic cables. Note: Optical transceiver diagnostics can be performed only when the link is present. To test cables: Click System > Maintenance > Diagnostics > Optical Transceivers. The Optical Transceivers Page opens: ...
Section 15. Viewing Statistics This section describes how to view and manage device statistics for interfaces, GVRP, EAP, and Etherlike and how to view and define as RMON statistics, history and alarms. This section contains the following topics: Viewing Interface Statistics ...
Packets with Errors — Displays the number of error packets received from the selected interface. Transmit Statistics Total Bytes (Octets) — Displays the number of octets transmitted from the selected interface. Unicast Packets — Displays the number of Unicast packets transmitted from the selected interface. ...
To update the refresh time: To change the refresh rate for statistics, select another rate from the Refresh Rate dropdown list. To reset Etherlike interface statistics counters: 1. Open the Etherlike Statistics Page. 2. Click 15.1.3 Viewing GVRP Statistics The GVRP Statistics Page contains device statistics for GVRP.
1. Open the GVRP Statistics Page. 2. Click . The GVRP interface statistics counters are cleared. 15.1.4 Viewing EAP Statistics The EAP Statistics Page contains information about EAP packets received on a specific port. To view the EAP Statistics: 1. Click System > Statistics > Interface Statistics > EAP. The EAP Statistics Page opens: Figure 135: EAP Statistics Page The EAP Statistics Page contains the following fields: Port —...
Configuring RMON History Defining RMON Alarms 15.2.1 Viewing RMON Statistics The RMON Statistics Page contains fields for viewing information about device utilization and errors that occurred on the device. To view RMON statistics: 1. Click System > Statistics > RMON > Statistics. The RMON Statistics Page opens: Figure 136: RMON Statistics Page The RMON Statistics Page contains the following fields: Interface —...
Frames of xx Bytes — Number of xx-byte frames received on the interface since the device was last refreshed. 2. Select an interface (Port or LAG) in the Interface field. The RMON statistics are displayed. To update the refresh time: To change the refresh rate for statistics, select another rate from the Refresh Rate dropdown list.
Figure 138: Add History Entry User Page 3. Define the fields. 4. Click . The entry is added to the RMON History Control Page, and the device is updated. To modify a history entry user: 1. Open the RMON History Control Page. 2.
the device was last refreshed. Oversize Packets — Displays the number of oversized packets (over 1518 octets) received on the interface since the device was last refreshed. Fragments — Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including ...
Figure 142: Add RMON Event User Page 3. Define the fields. 4. Click . The entry is added to the RMON Events Control Page, and the device is updated. To modify an RMON Event user: 1. Click System > Statistics > RMON > Events. The RMON Events Control Page opens, displaying defined event entries.
Page 109
Interface — Displays interface for which RMON statistics are displayed. The possible field values are: – Port — Displays the RMON statistics for the selected port. – LAG — Displays the RMON statistics for the selected LAG. Counter Value — Displays the selected MIB variable value. ...
Page 110
Figure 147: Edit RMON Alarm User Page 2. Modify the fields. 3. Click . The entry is updated in the RMON Alarm Page, and the device is updated. 0 ...
Glossary This glossary contains terms commonly used in Embedded Web System documentation. Term Definition Access Mode Specifies the method by which user access is granted to the system. Allows network managers to define profiles and rules for accessing the device. Access to management functions can be limited to user groups, which are defined by the following criteria: Access Profile •...
Page 112
Term Backplane Bandwidth Bandwidth Assignment Baud Best Effort Boot Version BootP BPDU Bridge Broadcast Domain Broadcast Storm Broadcasting Burst Burst Size CIDR Class Map Class of Service Classless Inter-Domain Routing 0 Definition The main BUS that carries information in the device. Specifies the amount of data that can be transmitted in a fixed amount of time.
Page 113
Term Definition Command Line Interface. A set of line commands used to configure the system. A computer system or process that requires services or processes for another computer, Client typically a server. Classification Control Lists. Devices that grant, deny, or limit access to devices, features, or applications in QoS.
Page 114
Term Ethernet FIFO Flapping Flow Control Fragment Frame GARP GBIC Gigabit Ethernet GVRP Host Hot Swapping HTTP 0 Definition Uses a bus or star topology and supports data transfer rates of Mpbs. A newer version called Fast Ethernet supports 100 Mbps. Ethernet is standardized as per IEEE 802.3. Ethernet is the most commonly implemented LAN standard.
Page 115
Term Definition Integrated Access Device. Device that multiplexes varied communication technologies onto a single telephone line for transmission to the carrier. Integrated Circuit. Small electronic devices composed from semiconductor material. Internet Control Message Protocol. Allows the gateway or destination host to ICMP communicate with the source host.
Page 116
Term L2TP Layer 2 Layer 3 Layer 4 Load Balancing MAC Address MAC Address Learning MAC Layer Mask MDIX Multicast Network Processor 0 Definition Layer 2 Tunnel Protocol. Helps build virtual private networks in the dial access space, and provides Layer 2 Forwarding L2F) protocol and Point-to-Point Tunneling Protocol (PPTP).
Page 117
Term Definition Network Management System. An interface that provides a method of managing a system. A network connection endpoint or a common junction for multiple network lines. Nodes include: Node • Processors. • Controllers. • Workstations. Object Identifier. Used by SNMP to identify managed objects. In the SNMP Manager/ Agent network management paradigm, each managed object must have an OID to identify it.
Page 118
Term Redundancy Relay Agent RJ-11 Connector RJ-45 Connector RMON Router RSTP Running Configuration File RVSP Segmentation Server SNMP Spanning Tree Protocol Stand-alone Mode Startup Configuration Subnet Definition Provides duplication of devices, services, or events. If a device, service, or event fails, redundancy provides a backup that can replace the lost functionality.
Page 119
Term Definition Used to mask all or part of an IP address used in a subnet address. Switch Filters and Subnet Mask forwards packets between LAN segments. Switches support any packet protocol type. Transmissions Control Protocol. Enables two hosts to communicate and exchange data TCP/IP streams.
Need help?
Do you have a question about the TL-SG3109 and is the answer not in the manual?
Questions and answers