Edimax ES-5160G+ User Manual
Edimax ES-5160G+ User Manual

Edimax ES-5160G+ User Manual

16-port gbe web smart switch
Hide thumbs Also See for ES-5160G+:

Advertisement

ES-5160G+
16-Port GbE Web Smart Switch
User's Manual
Version 1.0 / June 2007

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ES-5160G+ and is the answer not in the manual?

Questions and answers

Summary of Contents for Edimax ES-5160G+

  • Page 1 ES-5160G+ 16-Port GbE Web Smart Switch User's Manual Version 1.0 / June 2007...
  • Page 2 Further, Edimax this company reserves the right to revise this publication and to make changes from time to time in the contents thereof without obligation to notify any person of such revision or...
  • Page 3: Table Of Contents

    2-1-2-1. Cabling Requirements for TP Ports ...9 2-1-2-2. Cabling Requirements for 1000SX/LX SFP Module ...9 2-1-2-3. Switch Cascading in Topology ...10 2-1-3. Configuring the Management Agent of 16-Port GbE Web Smart Switch ...13 2-1-4. IP Address Assignment...15 2-2. Typical Applications...20 Basic Concept and Management...22...
  • Page 4 4-3-3. LACP Status ...88 4-3-4. RSTP Status ...89 4-3-5. IGMP Status...90 4-3-6. Ping Status...91 4-4. Maintenance...92 4-4-1. Warm Restart...94 4-4-2. Factory Default ...95 4-4-3. Software Upgrade...96 4-4-4. Configuration File Transfer ...97 4-4-5. Logout...98 5. Maintenance ...99 5-1. Resolving No Link Condition ...99 5-2.
  • Page 5: Caution

    Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
  • Page 6: Introduction

    In addition, the switch implements the QoS (Quality of Service), VLAN, and Trunking. It is suitable for office application. In this switch, Port 13, 14, 15, 16 includes two types of media --- TP and SFP Fiber (LC, BiDi-SC…); this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function.
  • Page 7: Checklist

    1-2. Checklist Before you start installing the switch, verify that the package contains the following: A 12-Port GbE Web Smart Switch ⎯ Modules (optional) ⎯ Mounting Accessory (for 19” Rack Shelf) ⎯ This User's Manual in CD-ROM ⎯ AC Power Cord ⎯...
  • Page 8 • Supports to send the trap event while monitored events happened • Supports default configuration which can be restored to overwrite the current configuration which is working on via Web UI and Reset button of the switch • Supports on-line plug/unplug SFP modules •...
  • Page 9: View Of 16-Port Gbe Web Smart Switch

    There are 12 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional removable modules on the front panel of the switch. LED display area, locating on the left side of the panel, contains a Power LED, which indicates the power status and 16 ports working status of the switch.
  • Page 10: User Interfaces On The Rear Panel

    Lit when SFP connection with remote device is SFP(LINK/ACT) Green good Blinks when any traffic is present 1-4-2. User Interfaces on the Rear Panel Fig. 1-3 Rear View of 16-Port GbE Web Smart Switch Function Table1-1 AC Line 100-240V 50/60 Hz...
  • Page 11: View Of The Optional Modules

    1-5. View of the Optional Modules In the switch, Port 13~16 includes two types of media --- TP and SFP Fiber (LC, BiDi-SC…); this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high- speed connection expansion;...
  • Page 12: Installation

    At the beginning, please do first: ⇒ Wear a grounding device to avoid the damage from electrostatic discharge ⇒ Be sure that power switch is OFF before you insert the power cord to power source • Installing Optional SFP Fiber Transceivers to the 16-Port GbE Web Smart Switch Note: If you have no modules, please skip this section.
  • Page 13: Cabling Requirements

    It means you do not have to tell from them, just plug it. ⇒ Use Cat. 5 grade RJ-45 TP cable to connect to a TP port of the switch and the other end is connected to a network-aware device such as a workstation or a server.
  • Page 14: Cabling Requirements For Tp Ports

    2-1-2-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters.
  • Page 15: Switch Cascading In Topology

    If more than two switches are connected in the same network, select one switch as Level 1 switch and connect all other switches to it at Level 2. Server/Host is recommended to connect to the Level 1 switch.
  • Page 16 Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-2). Fig. 2-2 No VLAN Configuration Diagram If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area.
  • Page 17 Case 2b: Port-based VLAN (See Fig.2-4). Fig. 2-4 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4.
  • Page 18: Configuring The Management Agent Of 16-Port Gbe Web Smart Switch

    Switch In the way of web, user is allowed to startup the switch management function. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures. Section 2-1-3-1: Configuring Management Agent of 16-Port GbE Web Smart Switch...
  • Page 19 There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. We just introduce the first type of management interface. Web-based UI for the switch is an interface in a highly friendly way.
  • Page 20: Ip Address Assignment

    Fig. 2-7 the Login Screen for Web 2-1-4. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication.
  • Page 21 With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24.
  • Page 22 Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network.
  • Page 23 In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched.
  • Page 24 IP address, known as default router. Basically, it is a routing policy. For assigning an IP address to the switch, you just have to check what the IP address of the network will be connected with the switch. Use the same network address and append your host address to it.
  • Page 25: Typical Applications

    The 24-Port GbE Web Smart Switch provides auto MDIX on its TP ports and supports fiber types like: LC and BiDi-LC SFP for removable modules on its four slots. For more details on the specification of the switch, please refer to Appendix A. The switch is suitable for the following applications.
  • Page 26 Fig. 2-11 Peer-to-peer Network Connection Fig. 2-12 Office Network Connection...
  • Page 27: Basic Concept And Management

    3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What’s the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980.
  • Page 28 Data Link Layer IEEE802.3 CSMA/CD MAC IEEE 802.3 PLS Physical Layer IEEE 802.3 Coaxial/STP/UTP This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model. In this section, we are mainly describing the MAC sub-layer.
  • Page 29 The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address.
  • Page 30: Media Access Control (Mac)

    3-2. Media Access Control (MAC) MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer.
  • Page 31 Bit 47 1st byte 2nd byte 3rd byte OUI code Table 3-3 Ethernet MAC address The first bit of the first byte in the Destination address (DA) determines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1).
  • Page 32 Destination address (DA) — The DA field is used to identify which network device(s) should receive the packet. It is a unique address. Please see the section of MAC addressing. Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0.
  • Page 33 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to detect error; when transmitting data, it performs frame assembly. 2. Performing Media access control. It prepares the initiation jobs for a frame transmission and makes recovery from transmission failure.
  • Page 34 So this criterion should not exist at the present time and in the future. The switch’s Gigabit module supports only full-duplex mode. 64 bytes Fig. 3-4 Gigabit Ethernet Frame...
  • Page 35 Parameter 10Base value/LAN Max. collision domain DTE to 100 meters Max. collision domain with 2500 meters repeater Slot time 512 bit times Interframe Gap 9.6us AttemptLimit BackoffLimit JamSize 32 bits MaxFrameSize 1518 MinFrameSize BurstLimit Not applicable Table 3-4 Ethernet parameters for half duplex mode In full-duplex operation mode, both transmitting and receiving frames are processed simultaneously.
  • Page 36: Flow Control

    PAUSE operation can not be used to inhibit the transmission of MAC control frame. Normally, in 10Mbps and 100Mbps Ethernet, only symmetric flow control is supported. However, some switches (e.g. 16-Port GbE Web Smart Switch) support not only symmetric but asymmetric flow controls for the special application. In Gigabit Ethernet, both symmetric flow control and asymmetric flow control are supported.
  • Page 37 Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame.
  • Page 38 0x8100 at the location of the Length/Type field of the normal non-VLAN frame, it will interpret the received frame as a tagged VLAN frame. If this happens in a switch, the MAC will forward it, according to its priority and egress rule, to all the ports that is associated with that VID.
  • Page 39: How Does A Switch Work

    Micro-segmentation: To have a port of the switch connected to a single host is referred to as micro-segmentation. It has the following interesting characteristics. There is no need the access contention (e.g.Collision). They have their own access domain.
  • Page 40 2500 meters and 185 meters when using coaxial cable. The switch with its per port per collision domain can extend the distance like a bridge does. And what’s more, when operating in full-duplex mode, the distance can reach farther than half duplex because it is not limited by the maximum propagation delay time (512 bits time).
  • Page 41 Fig. 3-6 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination port(s). Here we introduce some important features of a switch and how they work.
  • Page 42 There is a field in MAC address table used to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA. Usually, the age time is programmable.
  • Page 43: Virtual Lan

    3-5. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different physical network segments bridged by switches or bridges which attach to end stations in the same broadcast domain.
  • Page 44 Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical networks which have their own broadcast domain. The traffic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1 does not flow to VLAN 2 and others.
  • Page 45 There are many types of VLAN applied. Most popular is port-based VLAN, tag-based VLAN and protocol-based VLAN. Port-based VLAN Some physical ports are configured as members of a VLAN. All stations attached on these ports can communicate with each other. Tag-based VLAN It identifies the membership by VLAN ID, no matter where the packet comes from.
  • Page 46 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification with the value of 0 and priority information. Untagged frame: An Ethernet frame carries no VLAN tag information.
  • Page 47 GbE Web Smart Switch, you can choose a VID for sharing filtering database in Shared VID field if you wish to use the existed filtering database. For a specified VLAN, when a MAC address is learned by a switch, VLAN will use this formation to make forwarding decision.
  • Page 48 VLAN existed, then floods the packet to all the ports the VLAN covers. If we plan to deploy four VLANs in an office and use a switch to partition them, we should check which ports belong to which VLAN first. Assuming a 24-port switch is applied.
  • Page 49: Link Aggregation

    Therefore, offering a tool with automatic recovery capability is necessary for an administrator. LACP is a protocol that allows a switch able to know whether its partner has the capability to co-setup a trunk between them.
  • Page 50 There are three cases of link used in the network, which are switch to switch, switch to station and station to station. Here station may be a host or a router. Link Aggregation, called port trunking sometimes, has two types of link configuration, including static port trunk and dynamic port trunk.
  • Page 51: Operation Of Web-Based Management

    10/100/1000Mbps TP Ports and Gigabit TP/SFP Fiber dual media ports on the switch via web user interfaces. Web Smart Switch provides 12 fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports. With this facility, you can easily access and monitor the status like MIBs, port activity, and multicast traffic through any ports on the switch.
  • Page 52: Web Management Home Overview

    4-1. Web Management Home Overview After login, System Information would be displayed as Fig. 4-2 illustrated. This page lists default values and shows you the basic information of the switch, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”.
  • Page 53 The Information of Page Layout • On the top part of the information page, it shows the front panel of the switch. ⎯ Linked ports will be displayed in green color, and linked-off ones will be in black. For the optional modules, the slots with no module will only show covered plates, the other slots with installed modules would present modules.
  • Page 54: Configuration

    4-2. Configuration Configuration includes the following functions: System Configuration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuration, Aggregation, LACP, RSTP, 802.1X, IGMP Snooping, Mirror, QoS, Filter, Rate Limit, Storm Control and SNMP. Configuration System Configuration Ports Configuration VLAN Mode Configuration VLAN Group Configuration Aggregation LACP...
  • Page 55: System Configuration

    4-2-1. System Configuration System configuration is one of the most important functions. Without a proper setting, network administrator would not be able to manage the device. The switch supports manual IP address setting. Function name: System Configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, active IP address, active subnet mask, active gateway, DHCP server and Lease time left.
  • Page 56 Lease Time Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 characters are allowed in this parameter. Any alphanumeric character and null are acceptable. Default: Giga Switch DHCP Enabled: Enable DHCP snooping, Just tick the check box ( ) to enable it.
  • Page 57 Default: 192.168.1.254 Management VLAN: Show the management VLAN number. Password: Set a password for this switch. Up to 16 characters are allowed in this parameter. Any alphanumeric character is acceptable. Default: admin Inactivity Timeout(secs): Set the auto-logout timer. The valid value is 0 ~ 60 in the unit of minute and a decimal point is not allowed.
  • Page 58: Ports Configuration

    4-2-2. Port Configuration Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports on the switch. By this function, you can set or reset the values for Mode and Flow Control. Parameter description: Enable Jumbo Frames: This function support jumbo frames of up to 9600 bytes, Just tick the check box ( ) to enable it.
  • Page 59 Fig. 4-4 Port Configuration...
  • Page 60: Vlan Mode Configuration

    1, you can communicate with port 2&3&4. If you are on the port 5, then you cannot talk to them. Each port-based VLAN you built up must be assigned a group name. This switch can support up to maximal 16 port-based VLAN groups.
  • Page 61: Vlan Group Configuration

    VID、Member of the existed tag-based VLAN group. The switch can store the configuration of port-based VLAN and tag-based VLAN separately. When you choose one of VLAN mode, the switch will bring you the responded VLAN configuration which keeps the default data. You can easily create and delete a VLAN group by pressing <Add>...
  • Page 62 VLAN identifier. Each tag-based VLAN group has a unique VID. It appears only in tag-based mode. Member: In modify function this is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box ( Fig.
  • Page 63 Just tick the check box ( beside the ID, then press the <Delete> button to delete the group. Fig. 4-9 Port-Based VLAN Configuration...
  • Page 64: Aggregation

    Fig. 4-10 Aggregation/Trunking Configuration 4-2-6. LACP Smart Web Switch supports link aggregation IEEE802.3ad standard. The standard describes Link Aggregate Control Protocol (LACP) which dynamically creates and manages trunk groups. When you enable LACP link aggregation on a port, the port can automatically negotiate with the ports at the remote end of a link to establish trunk groups.
  • Page 65 Just tick the check box ( <Apply> button to apply. Key Value: It’s key for an aggregation. This must be an integer value between 1 and 255 or auto select by switch. Fig. 4-11 LACP Port Configuration to enable LACP protocol then press the...
  • Page 66: Rstp

    Default: 32768 Hello Time: This is the time interval in seconds between BPDU configuration message generations by the root switch. The allowed range is 1 to 10 seconds. Default: 2 Max Age: This is the maximum time a switch can wait without receiving a BPDU before attempting to reconfigure.
  • Page 67 Function name: RSTP Port Configuration Function description: Enable or disable RSTP protocol on the ports that are selected and set path cost. Parameter description: Protocol Enabled: Just tick the check box ( then press the <Apply> button to apply. Edge: Just tick the check box ( Path Cost: Path cost is the cost of transmitting a frame on to a LAN through that port.
  • Page 68 4-2-8. 802.1X 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1x-enabled port.
  • Page 69 PC A, then, is allowed to access B and C via the switch. If there are two switches directly connected together instead of single one, for the link connecting two switches, it may have to act two port roles at the end of the link: authenticator and supplicant, because the traffic is bi-directional.
  • Page 70 At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage. Initiating a session. Either authenticator or supplicant can initiate the message exchange. If supplicant initiates the process, it sends EAPOL-start packet to the authenticator PAE and authenticator will immediately respond EAP-Request/Identity packet.
  • Page 71 The 802.1X “Enabled” is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port.
  • Page 72 Default: 0.0.0.0 RADIUS UDP Port: The port number to communicate with RADIUS server for the authentication service. The valid value ranges 1-65535. Default port number is 1812. RADIUS Secret: The secret key between authentication server and authenticator. It is a string with the length 1 –...
  • Page 73 Fig. 4-16 802.1X Configuration Statistics: Choose the port which you want to show of 802.1X statistics, the screen include Authenticator counters, backend Authenticator counters, dot1x MIB counters and Other statistics. Press the <Refresh> button will fresh the screen and see the newer counters.
  • Page 74 connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authentication will take place in this port. Default: disable Reauthentication Period (1-65535 s): A non-zero number seconds between the periodic re-authentication of the supplicant. Default: 3600 EAP timeout (1-255 s): A timeout condition in the exchange between the authenticator and the supplicant.
  • Page 75: Igmp Snooping

    Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch to constrain multicast traffic by listening to Internet Group Management Protocol (IGMP). After finishing the settings, please press <Apply> button to start up the function. Parameter description:...
  • Page 76 Fig. 4-19 IGMP Configuration...
  • Page 77: Mirror Configuration

    Function description: Mirror Configuration is provided to monitor the traffic in the network. This switch supports one-port mirror multi-ports. For example, we assume that Port A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the traffic passing through Port A and Port B will be copied to Port C for monitor purpose.
  • Page 78: Qos(Quality Of Service) Configuration

    Function description: This function will affect the priority of VLAN tag. Based on priority of VLAN tag, it can arrange 0~7 priorities, priorities can map to 4 queues of the switch (low, normal, medium, high) and possess different bandwidth distribution according to your weight setting.
  • Page 79 DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet. In the switch, user is allowed to set up these 64 kinds of Class that belong to any of queue (low, normal, medium, high).
  • Page 80 Fig. 4-23 DSCP Setting...
  • Page 81: Filter

    Function name: Filter Configuration Function description: This function lets administrators easily set management source IP addresses to the ports on the switch. After completing the settings, please press <Apply> button to make this function take effect. Parameter description: Source IP Filter: Mode: There are three types of mode in this drop-down menu.
  • Page 82 Fig. 4-24 Filter Configuration...
  • Page 83: Rate Limit

    4-2-13 Rate Limit Function name: Ingress and Egress Bandwidth Setting Function description: Ingress and Egress Bandwidth Setting function are used to set up the limit of Ingress or Egress bandwidth for each port. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field.
  • Page 84: Storm Control

    Storm Control Function description: Storm Control is used to block unnecessary multicast and broadcast frames that reduce switch’s performance. When the function is enabled and Storm Control rate settings are detected as exceeded, the unnecessary frames would be dropped. Fig.4-26 Storm Control Configuration...
  • Page 85 To enable the Multicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Flooded unicast Rate: To enable the Flooded unicast Storm capability. User can use drop-down menu to select number of frames.
  • Page 86: Snmp

    Basically, it is passive except issuing the trap information. The switch supports a switch to turn on or off the SNMP agent. If you set the field SNMP “Enable”, SNMP agent will be started up. All supported MIB OIDs, including RMON MIB, can be accessed via SNMP manager.
  • Page 87 Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig. 4-27 SNMP Configuration...
  • Page 88: Monitoring

    4-3. Monitoring There are six functions contained in the monitoring function. Monitoring 4-3-1. Statistics Overview The function of Statistics Overview collects any information and provides the counting summary about the traffic of the port, no matter the packet is good or bad. In the Fig.
  • Page 89: Detailed Statistics

    Tx Errors: Number of bad packets transmitted. Rx Errors: Number of bad packets received. Fig. 4-28 Statistics Overview for all ports 4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. In the Fig. 4-26, the window can show all counter information each port at one time.
  • Page 90 Show the counting number of the received broadcast with multicast packet. Rx Error Packets: Show the counting number of the received error packets. Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes. Tx High Priority Packets: Number of Tx packets classified as high priority.
  • Page 91 Number of 65 ~ 126-byte frames in good and bad packets transmitted. Tx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and bad packets transmitted. Tx 256-511 Bytes: Number of 256 ~ 511-byte frames in good and bad packets transmitted. Tx 512-1023 Bytes: Number of 512 ~ 1023-byte frames in good and bad packets transmitted.
  • Page 92 Fig. 4-29 Detailed Statistics for each port...
  • Page 93: Lacp Status

    4-3-3. LACP Status Function name: LACP Status Function description: Display LACP status. Fig. 4-30 illustrates that LACP Status window can show LACP information and status for all ports in the same time. Parameter description: LACP Aggregation Overview: Show the group/port status. Default will set to red sign for port link down, user can check legend table below for all reference.
  • Page 94: Rstp Status

    Topology: Show the root bridge’s spanning tree topology. Root Id: Show root bridge ID of this network segment. If this switch is a root bridge, the “This switch is Root” will show this switch’s bridge ID. Fig. 4-31 RSTP Status...
  • Page 95: Igmp Status

    4-3-5. IGMP Status Function name: IGMP Status Function description: Display IGMP status. In Fig. 4-29, the window shows VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted.
  • Page 96: Ping Status

    4-3-6. Ping Status Function name: Ping Status Function description: To set up target IP address for ping function and display ping status. In Fig. 4- 30, the window shows the ping information. Parameter description: Ping Parameters: Target IP address: Set up a Target IP address to ping. Count: Use drop-down menu to set Four type of number can choose, there are 1, 5, 10 and 20.
  • Page 97: Maintenance

    Received replies: Show the received replies number of times. Request timeouts: Show the timeout of request. Average Response times (In ms): Show the average response time in milliseconds. 4-4. Maintenance There are five functions contained in the maintenance function. Maintenance Fig.
  • Page 99: Warm Restart

    You can press RESET button in the front panel of your switch to reset the device and to retrieve default settings. After upgrading software, you have to reboot the device to have new configuration take effect.
  • Page 100: Factory Default

    4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and replace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed.
  • Page 101: Software Upgrade

    4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can just click Browse button to retrieve the file you want in your system to upgrade your switch. Fig. 4-36 Software Upgrade...
  • Page 102: Configuration File Transfer

    Configuration File Transfer Function description: You can backup your switch’s configuration file into your computer folder in case accident happens. In addition, uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes.
  • Page 103: Logout

    Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout. Besides this manually logout and implicit logout, you can set up the parameter of Auto Logout Timer in system configuration function to explicitly ON/OFF this logout function.
  • Page 104: Maintenance

    User can use IE browser program in window series of computer to control the web smart functions in 16-Port GbE Web Smart Switch. First, choose any port in 16-Port GbE Web Smart Switch. Then, use IE and type default IP address, 192.168.1.1, to connect to 16 Gigabit with RJ45 network line.
  • Page 105: Appendix A Technical Specifications

    • Supports Head of Line (HOL) blocking prevention. • Supports broadcast storm filtering. • Web-based management provides the ability to completely manage the switch from any web browser. • Supports Port-based VLAN and Tag-based (IEEE802.1Q) VLAN. • Auto-aging with programmable inter-age time.
  • Page 106: Hardware Specifications

    Hardware Specifications Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x Network Interface: Configuration 10/100/1000Mbps Gigabit TP 1000Base-SX Gigabit Fiber 1000Base-LX Gigabit Fiber 1000Base-LX Single Fiber WDM (BiDi) 1000 FDX *Port 13~16 are TP/SFP fiber dual media ports with auto detected function *Optional SFP module supports LC or BiDi SC transceiver Transmission Mode: 10/100Mbps support full or half duplex 1000Mbps support full duplex only...
  • Page 107 Diagnostic LED: System LED : Per Port LED: 10/100/1000M TP Port 1 to 16 1000M SFP Fiber Port 13~16 Power Requirement Voltage Frequency Consumption Ambient Temperature Humidity Dimensions Comply with FCC Part 15 Class A & CE Mark Approval Power : LINK/ACT, 10/100/1000Mbps : SFP(LINK/ACT) AC Line...
  • Page 108: Management Software Specifications

    (Full/Half duplex) on each port, enable/disable any port, set VLAN group, set Trunk Connection. Port-Base / 802.1Q-Tagged, allowed up to 24 active VLANs in one switch. Ports trunk connections allowed Supports by-port Egress/Ingress rate control Referred as Class of Service (CoS) by the IEEE 802.1P standard...
  • Page 109: Appendix Bmib Specifications

    OBJECT IDENTIFIER ::= { privatetech 2 } ES-5160G+ProductId OBJECT IDENTIFIER ::= { switch 7 } ES-5160G+Produces OBJECT IDENTIFIER ::= { ES-5160G+ProductId 1 } ES-5160G+IllegalLogin TRAP-TYPE ENTERPRISE ES-5160G+ProductId DESCRIPTION "Send this trap when the illegal user try to login the Web management UI. "...

Table of Contents