Foreword General This manual introduces operations on web page of the 16&24-port managed desktop switch (hereinafter referred to as "the Switch"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
Privacy Protection Notice As the device user or data controller, you might collect the personal data of others such as their face, fingerprints, and license plate number. You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures which include but are not limited: Providing clear and visible identification to inform people of the existence of the surveillance area and provide required contact information.
Important Safeguards and Warnings This section introduces content covering the proper handling of the device, hazard prevention, and prevention of property damage. Read carefully before using the device, comply with the guidelines when using it. Operating Requirements ● Make sure that the power supply of the device works properly before use. ●...
Page 5
● Do not block the ventilator of the device with objects, such as newspapers, table clothes or curtains. ● Do not put open flames, such as a lit candle, on the device. ● When installing the device, make sure the power plug and appliance coupler are easy to reach to cut off the power.
Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................III 1 Login ........................................... 1 2 Device Information ....................................2 3 Configuring System ..................................... 3 3.1 Configuring System Info ................................ 3 3.1.1 Viewing System Info ..............................3 3.1.2 Configuring Current Time ............................4 3.1.3 Viewing CPU Usage ................................
Page 7
5.2.6 Example of Configuring VLAN ..........................24 5.3 Link Aggregation ..................................24 5.3.1 Static Aggregation Mode ............................25 5.3.2 LACP Mode ..................................26 5.4 Security ......................................27 5.4.1 MAC Address List ................................27 5.4.2 Binding Port MAC ................................. 28 5.4.3 Filtering Port MAC ................................ 29 5.5 Configuring SNMP ...................................
1 Login Prerequisites ● The main program file running on the Switch must support web access. ● The IP address of the computer and the Switch must be on the same network segment. Procedure Step 1 Enter the IP address of the Switch (192.168.1.110 by default) in the address bar and press the Enter key.
2 Device Information You can view the information on the Switch. Figure 2-1 Web management Table 1-1 Description of the web page Function Description ● Device Info: View information on the Switch. ● System Info: Configure the Switch by accessing System Navigation bar Config, Port Management, Device Management and PoE.
3 System Configuration 3.1 Configuring System Information This section introduces operations of viewing system information, configuring system time, and viewing CPU usage. Select System Config > System Info, and then you will see the options in the menu. Figure 2-1 System configuration Information 3.1.1 Viewing System You can view information on the Switch model, MAC address and software version.
3.1.2 Configuring Current Time You can view and configure the current time and time zone of the Switch. Select System Config > System Info > Current Time on the System Info page. Step 1 Step 2 Configure the Switch time. There are two ways to configure the time. ●...
Figure 2-5 Network configuration Step 2 Configure parameters. Table 2-1 Description of the network configuration Parameter Description Select the mode for the Switch to obtain IP. ● Static: Manually configure the IP Address, Subnet mask and Default Gateway. After clicking Save, you will automatically be redirected to Mode the login page of the new IP address.
Procedure Step 1 Select System Config > Software Upgrade on the System Info page. Figure 2-6 Upgrading software Step 2 Click Browse... to choose the upgrade file. Step 3 Click Upgrade. 3.4 Changing Password You can change the user login password in the Password Change tab. The username is admin by default, which cannot be changed.
Click Default to restore the Switch to its default settings. Step 2 Figure 2-8 Restore to default 3.6 Restarting the System The Switch can be restarted. Make sure to save the configurations before restarting the Switch, otherwise all the configurations will be lost. You need to log in to the web page again after the Switch restarts.
Figure 2-10 Log information 3.8 Viewing Legal Information You can view the software license agreement, privacy policy and open source software notice. Step 1 Select System Config > Legal Info on the System Info page. Step 2 View related legal information.
4 Port Management 4.1 Configuring Port Port configuration can be used to configure basic parameters which are related to switch port. The port parameters will directly affect the working mode of the port. Make configurations according to the practical requirements. Select Port Management >...
Parameter Description Configure the modes of the port speed duplex. ● Ethernet port. ◇ Auto (default): Auto negotiation mode. ◇ 10 M FULL: 10 M full duplex. ◇ 10 M HALF: 10 M half duplex. ◇ 100 M FULL: 100 M full duplex. ◇...
Figure 3-3 Configure port statistics Step 2 Select Counter Mode Selection, including Transmit Packet & Receive Packet, Collision Packet & Transmit Packet, Drop Packet & Receive Packet and CRC (Cyclic Redundancy Check) Error Packet & Receive Packet, and then view the results. If there are too many error packets from the port, the working status of the port is very poor.
Figure 3-4 Port speed limit Table 3-3 Description of the port speed limit parameter Name Note Port Displays port list. Set port outbound rate. The value ranges from 0 through 63 Mbps. The Tx Rate default setup is 0, which means there is no speed limit. Set port inbound rate.
Select ports that need to be configured, and then select Enable to configure all-port Step 3 broadcast storm control function. You need to configure all the ports in case there might be malfunctions, and the Switch cannot properly transmit the data. Figure 3-5 Configure broadcast storm control Step 4 Click Save.
Figure 3-6 Configure long distance Step 3 Click Save. 4.7 Port Isolation Port isolation is to achieve layer 2 isolation between messages. You only need to add the port to the isolation group to isolate the layer 2 data between the ports in the isolation group. The port isolation function provides users a safer and more flexible networking solution.
Page 23
Figure 3-7 Configure port isolation Step 4 Select checkbox under Enable to select one or more ports to be isolated. Step 5 Click Save below the port list.
5 Device Management 5.1 Ring Network 5.1.1 STP Definition The protocol message adopted by STP is BPDU (Bridge Protocol Data Unit), which is also called configuration information. BPDU contains enough information to ensure the calculation process of spanning tree. STP can confirm network topological structure by transmitting BPDU among devices. BPDU format and field description can realize the functions of spanning tree.
page. Figure 4-2 STP bridge settings Step 2 Configure parameters. Table 4-1 Description of the STP bridge settings Parameter Description Enable or disable ring network function. ● When STP is enabled, the Switch cannot be managed through STP Mode iLinksView. ●...
Figure 4-3 Configure STP port Step 2 Configure parameters. Table 4-2 Description of parameters Parameter Description Port No. Select the port you want to configure. Configure the port priority. The value ranges from 0 to 240, and must be the Priority integral multiple of 16.
5.2.3 Port-based VLAN The messages of the switch include tag and untag messages. Figure 4-4 Tag position Untag is the general Ethernet message. The network adapter of the general PC can recognize the message to communicate. The VLAN tag head refers to the 4bytes VLAN information after the source MAC address and the destination address.
Port For messages without For messages with Tag For message to be sent Type ● When VLAN ID is the same as the default VLAN ID, and it is on the accepted list, remove the tag and ● Put the default VLAN send out the ID, when the default Trunk...
Figure 4-5 Enable VLAN Step 4 Click Add, and then configure VLAN ID and Description in the Add window. Figure 4-6 Add VLAN Step 5 Click Save. Related Operations ● Add VLAN member: On the Port VLAN Configuration page, after configuring VLAN related to port, the added VLAN member can be displayed.
Page 30
Figure 4-8 Configure port VLAN Step 2 Configure parameters. Table 4-4 Description of parameters Parameters Description Port Displays all ports of the Switch. Port Type Configure the port type, including three types: Access, Trunk and Hybrid. Add port to VLAN, all ports belong to VLAN 1 by default. The range is from Default VLAN 1 through 4094.
5.2.6 Example of Configuring VLAN Background Information Configuration requirements: PC1 and PC4 belong to one department, and PC2 and PC3 belong to one department. Only PCs in the same department can communicate. Hardware connection: PC1 connects to port 1 of switch A, and it belongs to VLAN2. PC2 connects to port 2 of switch A, and it belongs to VLAN3.
that belong to the same aggregation group can be considered as a logical link with bigger bandwidth. Link aggregation can realize sharing responsibility of communication flow among each member port in the aggregation group, which is to increase bandwidth. Meanwhile, mutual dynamic backup can be realized among each member port in the same aggregation group, which is to improve the link reliability.
Select State as Enable, and then select Type as Static. Step 6 Figure 4-11 Link aggregation Step 7 Click Submit. 5.3.2 LACP Mode Background Information LACP (Link Aggregation Control Protocol) is used to realize link dynamic convergence and convergence separation which is based on IEEE 802.3ad standard. The both parties of convergence devices converge the matched links together, receive and send data through LACPDU message interacting convergence information.
Parameters Description Configure operation Key. Members in the same aggregation group need to configure the same operation Key, ranging from 1 through 65535. Operation Key Operation Key is the basis of negotiation, and only ports with the same operation key can negotiate to form a convergence link. Time Out Long Timeout is selected by default, and can be selected as Short Timeout.
no item matching the message destination MAC address, the Switch adopts the broadcast mode to forward the message through the corresponding VLAN (except the input port). Step 1 Select Device Management > Security > MAC Address Table on the System Info page. Step 2 View MAC address list.
Figure 4-14 Bind port MAC Related Operations Unbind: In the list of bound switches, click Unbind to delete the bound switch. 5.4.3 Filtering Port MAC The function is used to restrict the allowed MAC message under port, which can prevent counterfeit attack.
Figure 4-15 Filter port MAC Step 3 Click Add, and then enter the MAC address that needs to be filtered in Add MAC Allowlist window. Step 4 Click Save. 5.5 Configuring SNMP SNMP network includes two elements: NMS and Agent. ●...
the encryption function can enhance the security level between the NMS and the Agent. Make sure that the NMS and the Agent are using the same SNMP version, otherwise the NMS and Agent connection might fail. 5.5.2 Configuring SNMP Step 1 Select Device Management >...
5.5.3 Example of SNMPv1/v2 Configuration Background Information NMS is connected with the Switch, and the following requirements needs to be completed. ● NMS monitors and manages the Switch through SNMP v1 or SNMP v2. ● The Switch can actively send Trap messages to the NMS when an error occurs. Figure 4-18 Example of SNMP v1/v2 configuration Procedure Step 1...
Page 40
and the authentication password is admin123. ● The SNMP message among the NMS and the Agent must be encrypted, the encryption mode is DES56, and the encryption password is admin123. Figure 4-20 Example of SNMPv3 configuration Procedure Step 1 Select Device Management > SNMP Settings on the System Info page. Step 2 Select SNMP Version as SNMP v3.
Step 6 Click Save. 5.6 802.1x IEEE 802.1x is the authentication standard designated by IEEE about user accessing network, and is a type of network access control protocol based on port. Therefore, the exact 802.1x authentication function must be configured on the device port, and for the user device which is accessed through the port can have control on the access on network source through authentication.
device in the LAN. The Client must be installed with client software which supports 802.1x authentication. ● Switch is the network device that controls client access in the LAN, which is located between the Client and Authentication server. The Switch provides LAN access port for customers (physical port or logical port), and implements authentication upon the connected Client through interaction with the server.
authentication. It will send the message again if the Switch fails to receive the Client response within the set duration. 5.6.4 Configuring NAS By configuring the authorization status of the port, you can control whether users connected to the port need to be authenticated to access network resources. Step 1 Select Device Management >...
Figure 4-23 Configure NAS Table 4-8 Description of admin state State Description The port is always in the authorized status, and users are allowed to Force Authorized access network resources without authentication. The port is always in an unauthorized status, and users are not allowed to authenticate.
Figure 4-24 Radius configuration Click Add New Server, enter server address, authorized port and key in the pop-up Step 3 window. Figure 4-25 Add new server Step 4 Click Save. 5.7 IGMP Snooping IGMP Snooping (Internet Group Management Protocol Snooping) is operated on the layer two device.
receivers. IGMP Snooping can only forward the information to the needed receivers through layer two multicast with the following advantages: ● Reduce broadcast message in the layer two network, and save network bandwidth; ● Enhance security of multicast information; ● Bring convenience for realizing individual billing for each host. 5.7.2 Configuring IGMP Snooping Step 1 Select Device Management >...
Page 47
certificate again. ● If you use HTTPS for the first time after replacing your computer, you need to download root certificate again. Step 1 Select the checkbox next to the HTTPS, from Device Management > HTTPS on the System Info page. Step 2 Select HTTPS, and then click Save.
Page 48
Figure 4-29 Create Server (1) Step 5 Click Create. After the creation is successful, the prompt Create Succeed displays. Figure 4-30 Create Server (2) Click Download Root. Step 7 Step 8 Open the downloaded root certificate file, and then click Run on the Security Warning dialog box that pops up.
Page 49
Click Install Certificate. Step 9 Figure 4-32 Certificate Step 10 Click Next. Figure 4-33 Certificate import wizard Step 11 Select Automatically select the certificate store base on the type of certificate, and then click Next.
Page 50
Figure 4-34 Store certificate Step 12 Click Finish. Figure 4-35 Complete the certificate import wizard...
6 PoE 6.1 Configuring PoE Power Background Information Power over Ethernet (PoE) means the device is remotely powered up through the Ethernet port and connected to the PD (Powered Device) with the twisted pair cable. The PoE function realizes the centralized power supply and easy backup.
Page 52
Part Description The device that receives power from the PSE. It includes IP phone, wireless AP, portable recharger, POS, network camera and other devices. When the PD receives power from the PoE device, it can connect to other power supply to back up the power. Procedure Step 1 Select PoE >...
Parameters Description Displays the power supply level to the terminal devices. The power supply level ranges from 0 through Level Power 8, and the Hi-PoE power supply standard level is Port status displayed as 5+. and control Displays the current PoE power consumed by the Consumed Power corresponding single port.
Table 5-3 Description of parameters Name Description Single port boot up power current has exceeded the current Overload threshold. When powering chip sends power to the port, it becomes short- Short Circuit Limit circuit. DC Disconnect Single port power is off. Startup Short Circuit The power is short-circuit when the powering chip sends out power.
Click Save. Step 4 6.4 Configuring Legacy Support If the legacy support of a port is enabled, the port will provide power compulsorily no matter whether the connected PD device conforms to the standard or not. Be cautious with the function. Step 1 Select PoE >...
Appendix Cybersecurity Recommendations Mandatory actions to be taken for basic device network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: ● The length should not be less than 8 characters. ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols.
Page 58
reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.
Need help?
Do you have a question about the D-PFS4226-24ET-240 and is the answer not in the manual?
Questions and answers