Ruijie Reyee RG-NBS Series Configuration Manual
Ruijie Reyee RG-NBS Series Configuration Manual

Ruijie Reyee RG-NBS Series Configuration Manual

Hide thumbs Also See for Reyee RG-NBS Series:

Advertisement

Quick Links

Ruijie Reyee RG-NBS Series Switches
ReyeeOS 1.86
Web-based Configuration Guide
Document Version: V1.0
Date: 2022.08.31
Copyright © 2022 Ruijie Networks

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Reyee RG-NBS Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Ruijie Reyee RG-NBS Series

  • Page 1 Ruijie Reyee RG-NBS Series Switches ReyeeOS 1.86 Web-based Configuration Guide Document Version: V1.0 Date: 2022.08.31 Copyright © 2022 Ruijie Networks...
  • Page 2 All rights are reserved in this document and this statement. Any reproduction, excerption, backup, modification, transmission, translation or commercial use of this document or any portion of this document, in any form or by any means, without the prior written consent of Ruijie Networks is prohibited.
  • Page 3 Intended Audience This document is intended for: ⚫ Network engineers ⚫ Technical support and servicing engineers ⚫ Network administrators Technical Support ⚫ Official website of Ruijie Reyee: https://www.ruijienetworks.com/products/reyee Technical Support Website: https://ruijienetworks.com/support ⚫ ⚫ Case Portal: https://caseportal.ruijienetworks.com ⚫ Community: https://community.ruijienetworks.com Technical Support Email: service_rj@ruijienetworks.com...
  • Page 4 Specification An alert that contains a description of product or version support. Note The manual offers configuration information (including model, description, port type, software interface) for indicative purpose only. In case of any discrepancy or inconsistency between the manual and the actual version, the actual version prevails.
  • Page 5: Logging In To The Web Page

    Web-based Configuration Guide Login Login Configuration Environment Requirements 1.1.1 ⚫ Google Chrome, Internet Explorer 9.0, 10.0, and 11.0, and some Chromium/Internet Explorer kernel-based browsers (such as 360 Extreme Explorer) are supported. Exceptions such as garble characters or format error may occur if an unsupported browser is used. ⚫...
  • Page 6: Quick Setup

    Web-based Configuration Guide Login Username and password are not required at your first login and you can configure the bridge directly. For device security, you are advised to set the management password after your first login to the web management system. After the password is set, you need to enter the password when you log in to the web management system again.
  • Page 7 Web-based Configuration Guide Login Note Under normal circumstances, when multiple new devices are powered on and connected, they will be automatically interconnected into a network, and the user only needs to confirm that the number of devices is correct. If there are other devices in the network that are not added to the current network, you can click Add to My Network and enter the management password of the added device to manually add the corresponding device to the network where the device is located, and then start the network-wide configuration.
  • Page 8: Work Mode

    Web-based Configuration Guide Login Click Create Network & Connect to deliver related configuration for initialization and detect the network. After completing the quick setup, the new device is connected to the Internet, and you can continue to bind the device to the cloud account for remote management.
  • Page 9 Web-based Configuration Guide Login logged in device. If only one device is configured or global configuration does not need to be synchronized to the device, you can disable the self-organizing network discovery function. Switching the Management Mode In standalone mode, you can configure and manage only the current logged in device without self-organizing network function.
  • Page 10 Web-based Configuration Guide Login The Web Page in Standalone Mode Figure1-1 The Web Page in Network Mode in Self-Organizing Mode Figure1-2...
  • Page 11 Web-based Configuration Guide Login The Web Page in Local Device Mode in Self-Organizing Mode Figure1-3...
  • Page 12: Network Management

    Web-based Configuration Guide Network management Network management Overviewing Network Information In network mode, the Overview page displays the current network topology, uplink and downlink real-time traffic, network connection status, and number of users and provides short-cut entries for configuring the network and devices.
  • Page 13 Web-based Configuration Guide Network management ⚫ Click a traffic data item to view the real-time total traffic information. ⚫ Click a device in the topology to view the running status and configuration of the device and configure device functions. By default, the product model is used as the device name. Click to modify the device name so that the description can distinguish devices from one another.
  • Page 14 Web-based Configuration Guide Network management ⚫ The update time is displayed in the lower-left corner of the topology view. Click Refresh to update the topology to the latest state. It takes some time to update the topology data. Please wait patiently.
  • Page 15: Wired Connection

    Web-based Configuration Guide Network management Adding Networking Devices Wired Connection 2.3.1 (1) When a new device connects to an existing device on the network, the system displays the message “A device not in SON is discovered.” and the number of such devices in orange under “Devices” on the upper- left corner of the [Overview] page.
  • Page 16 Web-based Configuration Guide Network management (3) You do not need to enter the password if the device to add is newly delivered from factory. If the device has a password, enter the configuring password of the device. Device addition fails if the password is incorrect.
  • Page 17 Web-based Configuration Guide Network management AP Mesh 2.3.2 If the AP supports the AP Mesh (Reyee Mesh) function, you do not need to connect cables after powering on the AP. The AP can be added to the current network in Reyee Mesh mode, establish a mesh networking with other wireless devices, and automatically synchronize Wi-Fi configuration.
  • Page 18 Web-based Configuration Guide Network management ⚫ Click the device SN to configure the specified device separately.
  • Page 19 Web-based Configuration Guide Network management ⚫ Check offline devices and click Delete Offline Devices to remove them from the list and networking topology. Configuring the Service Network The wireless and wired network configurations of the current network are displayed in the lower-left of the Overview page.
  • Page 20: Configuring The Wired Network

    Web-based Configuration Guide Network management Configuring the Wired Network 2.5.1 (1) Click Add Wired VLAN to add wired network configuration, or select an existing wired VLAN and click Setup to modify its configuration. (2) Configure a VLAN for wired access, specify the address pool server for access clients in this VLAN, and determine whether to create a new DHCP address pool.
  • Page 21 Web-based Configuration Guide Network management (3) Select the switch to configure in the topology, select the switch ports added to this VLAN, and click Next. (4) Confirm that the configuration items to be delivered are correct and then click Save. Wait a moment for the configuration to take effect.
  • Page 22: Configuring The Wireless Network

    Web-based Configuration Guide Network management Configuring the Wireless Network 2.5.2 (1) Click Add Wi-Fi VLAN to add wireless network configuration, or select an existing Wi-Fi VLAN and click Setup to modify its configuration. (2) Set the Wi-Fi name, Wi-Fi password, and applicable bands. Click Next.
  • Page 23 Web-based Configuration Guide Network management (3) Configure a VLAN for wireless access, specify the address pool server for access clients in this VLAN, and determine whether to create a new DHCP address pool. A switch or gateway device can be selected as the address pool server.
  • Page 24 Web-based Configuration Guide Network management Processing Alerts Choose Network > Overview. If a network exception occurs, alert message on this exception and the corresponding solution are displayed on the Overview page. Click the alert message in the Alert Center section to view the faulty device, problem details, and its solution.
  • Page 25 Web-based Configuration Guide Network management...
  • Page 26 Web-based Configuration Guide Network management Viewing Online Clients The Clients in the upper-left corner of the Overview page displays the total number of online clients in the current network; moving the cursor to the number of users will display the number of current wired users, wireless users in the 2.4GHz band, and wireless users in the 5GHz band.
  • Page 27 Web-based Configuration Guide Network management Field Description IP/MAC The IP address and the MAC address of the client. Current Rate Indicate the uplink and downlink data transmission rates of the client. Wireless network information associated with wireless clients, including channel, Wi-Fi signal strength, online time, negotiation rate, etc.
  • Page 28 Web-based Configuration Guide Network management (2) Click +Client Subnet, enter the client type (which can be selected or customized in the drop-down box), the network segment of the client, the planned number and the corresponding server IP address to identify the client.
  • Page 29 Web-based Configuration Guide Network management (4) Input the name of the VLAN, VLAN ID, gateway address, and subnet mask of the isolated client. Check the target network segment and click Generate Config. (5) After confirming the configuration, click Deliver Config. If you need to modify it, you can click Previous to return to the setting page.
  • Page 30 Web-based Configuration Guide Network management (6) The page displays that the configuration has been delivered successfully, indicating that the settings have been completed. Click the configuration item to view the configuration delivery details. After the configuration is delivered, click View Details to switch to the page that displays monitoring information of the smart device network;...
  • Page 31 Web-based Configuration Guide Network management...
  • Page 32: Basic Management

    Web-based Configuration Guide Basic Management Basic Management Overviewing Switch Information Basic information about the Device 3.1.1 Choose Local Device > Home > Basic Info. Basic information includes device name, device model, SN number, software version, management IP, MAC address, networking status, system time, working mode, etc. Setting the device name Click the device name to modify the device name in order to distinguish between different devices.
  • Page 33 Web-based Configuration Guide Basic Management Switching the Work Mode Click the current work mode to change the work mode. Setting MGMT IP Click current management IP address to jump to the management IP configuration page. For more information,...
  • Page 34: Hardware Monitor Information

    Web-based Configuration Guide Basic Management Hardware Monitor Information 3.1.2 Caution Only RG-NBS6002 Series, RG-NBS7003 Series and RG-NBS7006 Series devices support displaying this type of information. Choose Local Device > Home > Smart Monitoring. Display the current hardware operating status of the device, such as the device temperature and power supply status, etc.
  • Page 35 Web-based Configuration Guide Basic Management ⚫ Move the cursor to the icon of a port (for example, Gi14) on the port panel, and more information about the port will be displayed, including the port ID, port status, port rate, uplink and downlink traffic, transmission rate, and optical/electrical attribute of the port.
  • Page 36 Web-based Configuration Guide Basic Management ⚫ Traffic data is automatically updated every five minutes. You can click Refresh above the port panel to obtain the latest port traffic and status information simultaneously. Port Flow Statistics Choose Local Device > Monitor > Port Flow. Display traffic statistics such as the rate of the device port, the number of sent and received packets, and the number of error packets.
  • Page 37: Mac Address Management

    Web-based Configuration Guide Basic Management MAC Address Management Overview 3.3.1 A MAC address table records mappings of MAC addresses and interfaces to virtual local area networks (VLANs). A device queries the MAC address table based on the destination MAC address in a received packet. If the device finds an entry that is consistent with the destination MAC Address in the packet, the device forwards the packet through the interface corresponding to the entry in unicast mode.
  • Page 38 Web-based Configuration Guide Basic Management Querying MAC address entries: Support querying MAC address entries based on MAC address, VLAN ID or port. Select the search type, enter the search string, and click Search. MAC entries that meet the search criteria are displayed in the list.
  • Page 39 Web-based Configuration Guide Basic Management Delete dynamic MAC address: Select the clear type (by MAC address, by VLAN, or by port), enter a string for matching the dynamic MAC address entry, and click Clear. The device will clear MAC address entries that meet the conditions.
  • Page 40 Web-based Configuration Guide Basic Management Adding Static MAC Address Entries Choose Local Device > Monitor > Clients > Static MAC. Click Add, enter the MAC address and VLAN VLAN ID, select the port for packet forwarding, and click OK. After the addition is successful, the MAC address table will update the entry data.
  • Page 41: Configuring Mac Address Filtering

    Web-based Configuration Guide Basic Management Delete an entry: In MAC List, find the entry to be deleted, click Delete in the last Action column. In the displayed dialog box, click OK. Configuring MAC Address Filtering 3.3.5 To prohibit a user from sending and receiving packets in certain scenarios, you can add the MAC address of the user to a filtering MAC address entry.
  • Page 42: Configuring Mac Address Aging Time

    Web-based Configuration Guide Basic Management MAC Filter Choose Local Device > Monitor > Clients > MAC Filter. Batch delete: In MAC List, select the MAC address entries to be deleted and click Delete Selected. In the displayed dialog box, click OK. Delete an entry: In MAC List, find the entry to be deleted, click Delete in the last Action column.
  • Page 43 Web-based Configuration Guide Basic Management Displaying ARP Information Choose Local Device > Monitor > Clients > ARP List. When two IP-based devices need to communicate with each other, the sender must know the IP address and MAC address of the peer. With MAC addresses, an IP-based device can encapsulate link-layer frames and then send data frames to the physical network.
  • Page 44: Vlan Overview

    Web-based Configuration Guide Basic Management VLAN VLAN Overview 3.5.1 A virtual local area network (VLAN) is a logical network created on a physical network. A VLAN has the same properties as a normal physical network except that it is not limited by its physical location. Each VLAN has an independent broadcast domain.
  • Page 45 Web-based Configuration Guide Basic Management Create a VLAN: Click Add. Enter the VLAN ID and description for the VLAN, and click OK. The VLAN added will be displayed in VLAN List. Note ● The range of a VLAN ID is from 1 to 4094. ●...
  • Page 46 Web-based Configuration Guide Basic Management Delete a VLAN: In VLAN List, click Delete in the last Action column to delete the specified VLAN. Note The default VLAN (VLAN 1), management VLAN, native VLAN, and access VLAN cannot be deleted. For these VLANs, the Delete button is unavailable in gray.
  • Page 47 Web-based Configuration Guide Basic Management You can configure the port mode and VLAN members for a port to determine VLANs that are allowed to pass through the port and whether packets to be forwarded by the port carry the tag field. Port Modes Description Table 3-1 Port mode...
  • Page 48 Web-based Configuration Guide Basic Management Procedure Choose Local Device > VLAN > Port List. Configure port VLANs in a batch: Click Batch Edit, select the port to be configured on the port panel, and select the port mode. If the port mode is Access port, you need to select Access VLAN; if the port mode is Trunk port, you need to select Native VLAN and enter the allowed VLAN ID range;...
  • Page 49 Web-based Configuration Guide Basic Management Note ● VLAN ID range is from 1 to 4094, among which VLAN 1 is the default VLAN that cannot be deleted. ● When hardware resources are insufficient, the system displays a VLAN creation failure message. ●...
  • Page 50 Web-based Configuration Guide Basic Management (3) Configure port attributes for the ports selected in Step 1 in a batch. Select a port type. If you set Type to Access Port, you need to configure VLAN ID. If you set Type to Trunk Port, you need to configure Native VLAN and Permitted VLAN.
  • Page 51: Verifying Configuration

    Web-based Configuration Guide Basic Management Verifying Configuration 3.5.5 View the VLAN and port information of switches to check whether the batch configurations are successfully delivered.
  • Page 52: Port Management

    Web-based Configuration Guide Port Management Port Management Overview Ports are important components for data exchange on network devices. The port management module allows you to configure basic settings for ports, and configure port aggregation, switched port analyzer (SPAN), port rate limiting, management IP address, etc.
  • Page 53 Web-based Configuration Guide Port Management Description of Port Type Table 4-1 Port Type Note Remarks A switch port consists of a single physical port on the device and provides only the L2 switching function. Switch ports are used to manage physical port and their associated L2 protocols.
  • Page 54 Web-based Configuration Guide Port Management Port Type Note Remarks An Interface binds multiple physical members to form a logical link. For L2 switching, an aggregate port is like a high-bandwidth switch port. It can combine the bandwidths of multiple ports to expand link bandwidth. In addition, for frames sent through an L2 aggregate port, load balancing is performed on member ports of the L2 aggregate port.
  • Page 55 Web-based Configuration Guide Port Management Port Type Note Remarks A switch virtual interface (SVI) serves as the management interface of the device, through which the device can be managed. You can also create an SVI as a gateway interface, which is equivalent to the virtual interface of corresponding VLAN and can be used for inter-VLAN routing on L3 devices.
  • Page 56: Port Configuration

    Web-based Configuration Guide Port Management Port Type Note Remarks An L3 aggregate port is a logical aggregate port group composed of multiple physical member ports, just like an L2 aggregate port. The ports to be aggregated must be L3 ports of the same type.
  • Page 57 Web-based Configuration Guide Port Management Batch configure: Click Batch Edit, select the port to be configured In the displayed dialog box, select the port switch, rate, work mode, and flow control mode, and click OK to deliver the configuration. In batch configuration, optional configuration items are a common collection of selected ports (that is, attributes supported the selected ports).
  • Page 58 Web-based Configuration Guide Port Management Configure one port: In Port List, select a port entry and click Edit in the Action column. In the displayed dialog box, select port status, rate, work mode, and flow control mode, and click OK. Description of Basic Port Configuration Parameters Table 4-2 Parameter...
  • Page 59: Physical Settings

    Web-based Configuration Guide Port Management Parameter Description Default Value port, and the corresponding data processing function will be lost, but the PoE power supply function of the port will not be affected. Set the rate at which the Ethernet physical interface works. Set to Auto means that the port rate is determined by the Rate Auto...
  • Page 60 Web-based Configuration Guide Port Management Batch configure: Click Batch Edit. In the displayed dialog box, select the port to be configured, configure the EEE switch, MTU, enter the port description, and click OK. Note Copper ports and SFP ports cannot be both configured during batch configuration.
  • Page 61 Web-based Configuration Guide Port Management Configure one port: Click Edit in the Action column of the list. In the displayed configuration box, configure the EEE switch, port mode, enter the port description, and click OK. Description of Physical Configuration Parameters Table 4-3 Parameter Description...
  • Page 62 Web-based Configuration Guide Port Management Aggregate Ports Aggregate Port Overview 4.3.1 An aggregate port (AP) is a logical link formed by binding multiple physical links. It is used to expand link bandwidth, thereby improving connection reliability. The AP function supports load balancing and therefore, evenly distributes traffic to member links. The AP implements link backup.
  • Page 63 Web-based Configuration Guide Port Management Load Balancing An AP, based on packet characteristics such as the source MAC address, destination MAC address, source IP address, destination IP address, L4 source port ID, and L4 destination port ID of packets received by an inbound interface, differentiates packet flows according to one or several combined algorithms.
  • Page 64 Web-based Configuration Guide Port Management Modifying Member Ports of a Static Aggregate Port Click an added static aggregate port. Member ports of the aggregate port will become selected. Click a port to deselect it; or select other ports to join the current aggregate port. Click Save to modify the member ports of the aggregate port.
  • Page 65 Web-based Configuration Guide Port Management Deleting an Aggregate Port Move the cursor over an aggregate port icon and click upper-right, or select the aggregate port to be deleted, and click Delete Selected to delete the selected aggregate port. After deleted, the corresponding ports become available on the port panel to set a new aggregate port.
  • Page 66: Port Mirroring

    Web-based Configuration Guide Port Management Select Load Balance Algorithm and click Save. The Device distributes incoming packets among member links by using the specified load balancing algorithm. The packet flow with the consistent feature is transmitted by one member link, whereas different packet flows are evenly distributed to various links. Port Mirroring Overview 4.4.1...
  • Page 67 Web-based Configuration Guide Port Management Caution ● You can select multiple source traffic monitoring ports but only one destination port. Moreover, the source traffic monitoring ports cannot contain the destination port. ● An aggregate port cannot be used as the destination port. ●...
  • Page 68 Web-based Configuration Guide Port Management Description of Port Mirroring Parameters Table 4-4 Default Parameter Description Value A source port is also called a monitored port. Data flows on the source port are monitored for network analysis or troubleshooting. Src Port Support selecting multiple source ports and mirroring multiple ports to one destination port The destination port is also called the monitoring port, that is, the port...
  • Page 69: Rate Limiting

    Web-based Configuration Guide Port Management Default Parameter Description Value The type of packets (data flow direction) to be monitored by a source port. Both: All packets passing through the port, including incoming and outgoing packets Monitor Direction Both Incoming: All packets received by a source port are copied to the destination port Outcoming: All packets transmitted by a source port are copied to the destination port...
  • Page 70 Web-based Configuration Guide Port Management Description of Rate Limiting Parameters Table 4-5 Parameter Description Default Value Max Rate at which packets are sent from a port to a switch, in Rx Rate Not limited kbps. Max Rate at which packets are sent out of a switch through a Tx Rate Not limited port, in kbps.
  • Page 71 Web-based Configuration Guide Port Management Deleting Rate Limiting Batch configure: Select multiple records in Port List, click Delete Selected and click OK in the confirmation dialog box. Configure one port: In Port List, click Delete on the corresponding port entry, and click OK in the confirmation dialog box.
  • Page 72 Web-based Configuration Guide Port Management The device can be networked in two modes: DHCP: Uses a temporary IP address dynamically assigned by the upstream DHCP server for Internet access. ⚫ ⚫ Static IP: Uses a static IP address manually configured by users for Internet access. If you select DHCP, the device obtains parameters from the DHCP Server.
  • Page 73: Poe Configuration

    Web-based Configuration Guide Port Management Note No IP address is configured for the MGMT port by default. Currently, only a static IP address can be configured for the MGMT port but DHCP is not supported. PoE Configuration Caution Only PoE switches (The device models are marked with -P) support this function. Choose Local Device >...
  • Page 74 Web-based Configuration Guide Port Management PoE Global Settings 4.8.1 Choose Local Device > Ports > PoE > PoE Settings. PoE Transmit Power Mode refers to the way that a device allocates power to a connected PD (Powered Device). It supports Auto mode and Energy-saving mode. In Auto mode, the system allocates power based on the classes of PDs detected on ports.
  • Page 75 Web-based Configuration Guide Port Management Power Supply Configuration of Ports 4.8.2 Choose Local Device > Ports > PoE > Port List. Click Edit in the port entry or click Batch Edit to set the PoE power supply function of the port.
  • Page 76 Web-based Configuration Guide Port Management Description of Parameters for Power Supply Configuration of Ports Table 4-6 Parameter Description Default Value Whether to enable the power supply function on the ports Enable By default, the device only supplies power to PDs that comply with the standard IEEE 802.3af and 802.3at protocols.
  • Page 77 Web-based Configuration Guide Port Management When the PD device connected to the port needs to be restarted, for example, when the AP connected to the port is abnormal, you can click Repower to make the port power off briefly and then power on again to restart the device connected to the power supply port.
  • Page 78 Web-based Configuration Guide Port Management Field Description The classification level of the PD connected to the port is divided into Class PD Class 0~4, based on the IEEE 802.3af/802.3at standard.
  • Page 79: Multicast Overview

    Web-based Configuration Guide L2 Multicast L2 Multicast Multicast Overview IP transmission methods are categorized into unicast, multicast, and broadcast. In IP multicast, an IP packet is sent from a source and forwarded to a specific group of receivers. Compared with unicast and broadcast, IP multicast saves bandwidth and reduces network loads.
  • Page 80: Igmp Snooping

    Web-based Configuration Guide L2 Multicast Description of Configuration Parameters of Global Multicast Table 5-1 Parameter Description Default Value The Internet Group Management Protocol (IGMP) is a TCP/IP protocol that manages members in an IPv4 multicast group and runs on the multicast devices and hosts residing on the stub of the multicast network, creating and maintaining membership of the multicast group between the hosts and Version...
  • Page 81 Web-based Configuration Guide L2 Multicast Enabling Global IGMP Snooping 5.3.2 Choose Local Device > Multicast > IGMP Snooping. Turn on IGMP Snooping and click Save. Configuring Protocol Packet Processing Parameters 5.3.3 By controlling protocol packet processing, an L2 multicast device can establish static or dynamic multicast forwarding entries.
  • Page 82 Web-based Configuration Guide L2 Multicast Description of VLAN Configuration Parameters of IGMP Snooping Table 5-2 Parameter Description Default Value Whether to enable or disable the VLAN multicast function. The multicast function of a VLAN takes effect only when both the Multicast Status Disable global IGMP snooping and VLAN multicast functions are...
  • Page 83: Configuring Mvr

    Web-based Configuration Guide L2 Multicast Parameter Description Default Value The device running IGMP Snooping identifies the ports in the VLAN as router ports or member ports. The router port is the port on the Layer 2 multicast device that is connected to the Layer 3 multicast device, and the member port is the host port Dynamic Learning Enable...
  • Page 84 Web-based Configuration Guide L2 Multicast Configuring Global MVR Parameters 5.4.2 Choose Local Device > L2 Multicast > MVR. Click to enable the MVR, select the MVR VLAN, set the multicast group supported by the VLAN, and click Save. Multiple multicast groups can be specified by entering the start and end multicast IP addresses. Description of Configuring Global MVR Parameters Table 5-3 Parameter...
  • Page 85 Web-based Configuration Guide L2 Multicast Parameter Description Default Value Multicast VLAN VLAN of a multicast source Learned or configured start multicast IP address of an MVR Start IP Address multicast group. Learned or configured end multicast IP address of an MVR End IP Address multicast group.
  • Page 86 Web-based Configuration Guide L2 Multicast Description of MVR Configuration Parameters of Ports Table 5-4 Parameter Description Default Value NONE: Indicates that the MVR function is disabled. SOURCE: Indicates the source port that receives multicast Role NONE data streams. RECEIVER: Indicates the receiver port connected to a client. Configures the fast leave function for a port.
  • Page 87 Web-based Configuration Guide L2 Multicast Description of Multicast Group Configuration Parameters Table 5-5 Parameter Description Default Value VLAN ID VLAN, to which received multicast traffic belongs Multicast IP On-demand multicast IP address Address If the VLAN ID is a multicast VLAN and the multicast address is within the multicast IP address range of the MVR, the Protocol protocol is MVR.
  • Page 88: Configuring A Port Filter

    Web-based Configuration Guide L2 Multicast Note Static multicast groups cannot learn other dynamic forwarding ports. Configuring a Port Filter Choose Local Device > L2 Multicast > IGMP Filter. Generally, the device running ports can join any multicast group. A port filter can configure a range of multicast groups that permit or deny user access, you can customize the multicast service scope for users to guarantee the interest of operators and prevent invalid multicast traffic.
  • Page 89 Web-based Configuration Guide L2 Multicast Description of Profile Configuration Parameters Table 5-6 Parameter Description Default Value Profile ID Profile ID DENY: Forbids demanding multicast IP addresses in a specified range. Behavior PERMIT: Only allows demanding multicast IP addresses in a specified range.
  • Page 90 Web-based Configuration Guide L2 Multicast Description of Port Filter Configuration Parameters Table 5-7 Parameter Description Default Value Profile that takes effect on a port. If it is not set, no profile rule Profile ID is bound to the port. Maximum number of multicast groups that a port can join. If too much multicast traffic is requested concurrently, the Max Multicast multicast device will be severely burdened.
  • Page 91 Web-based Configuration Guide L2 Multicast Setting an IGMP Querier Overview 5.7.1 In a three-layer multicast network, the L3 multicast device serves as the querier and runs IGMP to maintain group membership. L2 multicast devices only need to listen to IGMP packets to establish and maintain forwarding entries and implement L2 multicasting.
  • Page 92 Web-based Configuration Guide L2 Multicast Description of Querier Configuration Parameters Table 5-8 Parameter Description Default Value Querier Status Whether to enable or disable the VLAN querier function. Disable IGMP Protocol version of query packets sent by the querier. It can Version IGMPv2 be set to IGMPv2 or IGMPv3.
  • Page 93 Web-based Configuration Guide L3 Management L3 Management Caution This section is applicable only to NBS Series Switches that support L3 functions. Products that do not support L3 functions such as RG-NBS3100 Series Switches, RG-NBS3200 Series Switches, do not support the functions mentioned in this section.
  • Page 94 Web-based Configuration Guide L3 Management Description of Configuration Parameters of L3 Interfaces Table 6-1 Parameter Description The type of a created L3 interface. It can be an SVI, routed port, or L3 aggregate port. For details, Port Type Table 4-1 Networking Specifies DHCP or static mode for a port to obtain the IP address.
  • Page 95 Web-based Configuration Guide L3 Management Enable DHCP Services 6.2.1 Choose Local Device > L3 Interfaces > L3 Interfaces. Click Edit on the designated port, or click Add L3 Interface to add a Layer 3 interface, select DHCP mode for local allocation, and enter the starting IP of the address pool, the number of allocated IPs, the excluded IP address range, and the address lease time.
  • Page 96 Web-based Configuration Guide L3 Management Description of DHCP Server Configuration Parameters Table 6-2 Parameter Description DHCP Mode To choose DHCP server The DHCP server assigns the Start IP address automatically, which is the Start IP address of the DHCP address pool. A client obtains an IP address Start from the address pool.
  • Page 97 Web-based Configuration Guide L3 Management Displays the client entries which are converted into static addresses in the client list as well as manually added static address entries. The upper-right search box supports searching for corresponding entries based on the assigned IP address or the Device MAC Address Click Add.
  • Page 98: Configuring Static Routes

    Web-based Configuration Guide L3 Management Description of the DHCP Server Options Configuration Parameters Table 6-3 Parameter Description DNS server address provided by an ISP. Multiple IP addresses can be entered and DNS Server separated by spaces. When the AC (wireless controller) and the AP are not in the same LAN, the AP cannot discover the AC through broadcast after obtaining an IP address from the Option 43 DHCP server.
  • Page 99 Web-based Configuration Guide L3 Management Static routes are manually configured by the user. When a data packet matches a static route, the packet will be forwarded according to the specified forwarding mode. Caution Static routes cannot automatically adapt to changes of the network topology. When the network topology changes, you need to reconfigure the static routes.
  • Page 100: Configuring A Static Arp Entry

    Web-based Configuration Guide L3 Management Parameter Description Specify the subnet mask of the destination network. The Subnet Mask device matches the data packet based on the destination address and subnet mask. Outbound Interface Specify the interface that forwards the data packet. Specify the IP address of the next hop in the route for the Next Hop data packet...
  • Page 101 Web-based Configuration Guide L3 Management To remove the binding between a static IP address and a MAC address, click Delete in the Action column.
  • Page 102 Web-based Configuration Guide Security Security DHCP Snooping Overview 7.1.1 The Dynamic Host Configuration Protocol (DHCP) snooping function allows a device to snoop DHCP packets exchanged between clients and a server to record and monitor the IP address usage and filter out invalid DHCP packets, including request packets from the clients and response packets from the server.
  • Page 103 Web-based Configuration Guide Security Enabling DHCP Snooping on network switches can ensure that users can only obtain network configurationparameters from the DHCP server within the control range, and avoid the occurrence of “the Internet terminal in the original network obtains the IP address assigned by the privately accessed router”, to guarantee the stability of the network.
  • Page 104 Web-based Configuration Guide Security (3) After the configuration is delivered, if you need to modify the effective range of the anti-private connection function, click Configure to reselect the switch that enables the anti-private connection in the topology.After the configuration is delivered, if you want to modify the effective range of the DHCP Snooping function, click Configure to select desired switches in the topology again.
  • Page 105: Storm Control

    Web-based Configuration Guide Security Storm Control Overview 7.2.1 When a local area network (LAN) has excess broadcast, multicast, or unknown unicast data flows, the network speed will slow down and packet transmission will have an increased timeout probability. This is called LAN storm, which may be caused by topology protocol execution errors or incorrect network configuration.
  • Page 106 Web-based Configuration Guide Security ⚫ Storm control based on kilobytes per second: If the rate of data flows received over a device port exceeds the configured kilobytes-per-second threshold, excess data flows are discarded until the rate falls within the threshold. Overview 7.3.1 An access control list (ACL) is commonly referred to as packet filter in some documents.
  • Page 107: Creating Acl Rules

    Web-based Configuration Guide Security Creating ACL Rules 7.3.2 Choose Local Device > Security > ACL > ACL List. (1) Click Add to set the ACL control type, enter an ACL name, and click OK. Based on MAC address: To control the L2 packets entering/leaving the port, and deny or permit specific L2 packets destined to a network.
  • Page 108 Web-based Configuration Guide Security Description of ACL Rule Configuration Parameters Table 7-1 Parameter Description Configuring ACL Rules Action Block: If packets match this rule, the packets are denied. Allow: If packets match this rule, the packets are permitted. Match IP protocol number The value ranges from 0 to 255. Check All to IP Protocol Number match all IP protocols.
  • Page 109 Web-based Configuration Guide Security Parameter Description match all protocol type numbers. Match the MAC address of the source host. Check All to match all source Src Mac MAC addresses Match the MAC address of the destination host. Check All to match all Dest MAC destination MAC addresses Note...
  • Page 110: Port Protection

    Web-based Configuration Guide Security After an ACL is applied to a port, you can click Unbind in the Action column, or check the port entry and click Delete Selected to unbind the ACL from the port. Port Protection Choose Local Device > Security > Port Protection. In some scenarios, it is required that communication be disabled between some ports on the device.
  • Page 111: Ip-Mac Binding

    Web-based Configuration Guide Security IP-MAC Binding Overview 7.5.1 After IP-MAC binding is configured on a port, to improve security, the device checks whether the source IP addresses and source MAC addresses of IP packets are those configured for the device, filters out IP packets not matching the binding, and strictly control the validity of input sources.
  • Page 112 Web-based Configuration Guide Security Searching Binding Entries The search box in the upper-right corner supports finding binding entries based on IP addresses, MAC addresses or ports. Select the search type, enter the search string, and click Search. Entries that meet the search criteria are displayed in the list.
  • Page 113: Ip Source Guard

    Web-based Configuration Guide Security IP Source Guard Overview 7.6.1 After the IP Source Guard function is enabled, the device checks IP packets from DHCP non-trusted ports. You can configure the device to check only the IP field or IP+MAC field to filter out IP packets not matching the binding list.
  • Page 114 Web-based Configuration Guide Security Enabling Port IP Source Guard 7.6.3 Choose Local Device > Security > IP Source Guard > Basic Settings. In Port List, click Edit in the Action column. Select Enabled and select the match rule, and click OK. There are two match rules: ⚫...
  • Page 115 Web-based Configuration Guide Security Configuring Exceptional VLAN Addresses 7.6.4 Choose Local Device > Security > IP Source Guard > Excluded VLAN. When IP Source Guard is enabled on an interface, it is effective to all the virtual local area networks (VLANs) under the interface by default.
  • Page 116: Anti-Arp Spoofing

    Web-based Configuration Guide Security Anti-ARP Spoofing Overview 7.7.1 Gateway-targeted ARP spoofing prevention is used to check whether the source IP address of an ARP packet through an access port is set to the gateway IP address. If yes, the packet will be discarded to prevent hosts from receiving wrong ARP response packets.
  • Page 117 Web-based Configuration Guide Security Disabling Anti-ARP Spoofing Batch disable: Select an entry to be deleted in the list and click Delete Selected. Disable one port: click Delete in the last Action column of the corresponding entry.
  • Page 118: Advanced Configuration

    Web-based Configuration Guide Advanced Configuration Advanced Configuration STP (Spanning Tree Protocol) is an L2 management protocol that eliminates L2 loops by selectively blocking redundant links in the network. It also provides the link backup function. STP Global Settings 8.1.1 Choose Local Device > Advanced > STP > STP. (1) Click to to enable the STP function, and click OK in the displayed box.
  • Page 119 Web-based Configuration Guide Advanced Configuration Description of STP Global Configuration Parameters Table 8-1 Default Parameter Description Value Whether to enable the STP function. It takes effect globally. STP attributes Disable can be configured only after STP is enabled. Bridge priority. The device compares the bridge priority first during root bridge Priority 32768 selection.
  • Page 120 Web-based Configuration Guide Advanced Configuration Description of STP Configuration Parameters of Ports Table 8-2 Default Parameter Description Value Root: A port with the shortest path to the root Alternate: A backup port of a root port. Once the root port fails, the alternate port becomes the root port immediately.
  • Page 121 Web-based Configuration Guide Advanced Configuration Default Parameter Description Value Disable: The port is closed manually or due to a fault, does not participate in spanning tree and does not forward data, and can be turned into a blocking state after initialization or opening. Blocking: A port in the blocking state cannot forward data packets or learn addresses, but can send or receive configuration BPDUs and send them to the CPU.
  • Page 122: Lldp Global Settings

    Web-based Configuration Guide Advanced Configuration Note ● It is recommended to enable Port Fast on the port connected to a PC. ● A port switches to the forwarding state after STP is enabled more than 30 seconds. Therefore transient disconnection may occur and packets cannot be forwarded. LLDP Overview 8.2.1...
  • Page 123 Web-based Configuration Guide Advanced Configuration Parameter Description Default Value TTL multiplier of LLDP In LLDP packets, TTL TLV indicates the TTL of local information on a neighbor. The value of TTL TLV is calculated using the following formula: TTL Hold Multiplier TLV = TTL multiplier ×...
  • Page 124: Displaying Lldp Information

    Web-based Configuration Guide Advanced Configuration Send LLDPDU: After Send LLDPDU is enabled on a port, the port can send LLDPDUs. Receive LLDPDU: After Receive LLDPDU is enabled on a port, the port can receive LLDPDUs. LLDPMED: After LLDPMED is enabled, the device is capable of discovering neighbors when its peer endpoint supports LLDP-MED (the Link Layer Discovery Protocol-Media Endpoint Discovery).
  • Page 125 Web-based Configuration Guide Advanced Configuration port rate, duplex mode, an error will be prompted if the configurations do not match those on the connected neighbor. RLDP Overview 8.3.1 The Rapid Link Detection Protocol (RLDP) is an Ethernet link failure detection protocol, which is used to rapidly detect unidirectional link failures, bidirectional link failures, and downlink loop failures.
  • Page 126 Web-based Configuration Guide Advanced Configuration RLDP automatically shuts down relevant ports or asks users to manually shut down the ports according to the configured failure handling methods, to avoid wrong forwarding of traffic or Ethernet L2 loops. Supports enabling the RLDP function of the access switches in the network in a batch. By default, the switch ports will be automatically shut down when a loop occurs.
  • Page 127 Web-based Configuration Guide Advanced Configuration Applying RLDP to a Port Choose Local Device > Advanced > RLDP > RLDP Management. In Port List, click Edit in the Action column or click Batch Edit, select the desired port, configure whether to enable loop detection on the port and the handling method after a fault is detected, and click OK.
  • Page 128 Web-based Configuration Guide Advanced Configuration You can view the detection status, failure handling methods, and ports that connect the neighbor device to the local device. You can click Reset to restore the faulty RLDP status triggered by a port to the normal state. Batch Configuring Network Switches 8.3.3 Choose Network >...
  • Page 129 Web-based Configuration Guide Advanced Configuration (2) In the networking topology, you can select the access switches on which you want to enable RLDP in either recommended or custom mode. If you select the recommended mode, all access switches in the network are selected automatically.
  • Page 130 Web-based Configuration Guide Advanced Configuration Configuring the Local DNS The local DNS server is optional. The device obtains the DNS server address from the connected uplink device by default. Choose Local Device > Advanced > Local DNS. Enter the DNS server address used by the local device. If multiple addresses exist, separate them with spaces. Click Save.
  • Page 131: Voice Vlan

    Web-based Configuration Guide Advanced Configuration Voice VLAN Caution The Voice VLAN function is supported by RG-NBS3100 Series, RG-NBS3200 Series, RG-NBS5100 Series and RG-NBS5200 Series Switches. Overview 8.5.1 A voice virtual local area network (VLAN) is a VLAN dedicated to voice traffic of users. By creating a voice VLAN and adding ports connected to voice devices to the voice VLAN, you can have voice data transmitted in the voice VLAN and deliver specified policy of the quality of service (QoS) for voice streams, to improve the transmission priority of voice traffic and ensure the call quality.
  • Page 132 Web-based Configuration Guide Advanced Configuration Parameter Description Default Value Aging time of voice VLAN, in minutes. In automatic mode, after the MAC address in a voice packet ages, if the port does not receive any more voice Max Age 1440 minutes packets within the aging time, the device removes this port from the voice VLAN The L2 Priority of voice stream packets in a Voice VLAN.
  • Page 133 Web-based Configuration Guide Advanced Configuration Configuring the Voice VLAN Function on a Port 8.5.4 Choose Local Device > Advanced > Voice VLAN > Port Settings. Click Edit in the port entry or click Batch Edit on the upper -right corner. In the displayed dialog box, select whether to enable the voice VLAN function on the port, voice VLAN mode to be applied, and whether to enable the security mode, and Click OK.
  • Page 134 Web-based Configuration Guide Advanced Configuration Description of the Voice VLAN Configuration Parameters on a Port Table 8-6 Parameter Description Default Value Based on different ways the Voice VLAN function is enabled on the port, the Voice VLAN Mode can be Auto Mode or Manual Mode: Auto Mode: In this mode, the device checks whether the permit VLANs of a port contain the voice VLAN after the voice VLAN function is enabled on the port.
  • Page 135 Web-based Configuration Guide Advanced Configuration ● After the voice VLAN function is enabled on a port, do not switch the L2 mode (trunk or access mode) of the port to ensure normal operation of the function. If you need to switch the L2 mode of the port, disable the voice VLAN function on the port first.
  • Page 136: Info Center

    Web-based Configuration Guide Diagnostics Diagnostics Info Center Choose Local Device > Diagnostics > Info Center. In Info Center, you can view port traffic, VLAN information, routing information, client list, ARP list, MAC address, DHCP snooping , IP-MAC binding, IP Source Guard, and CPP statistics of the device and relevant configurations. Port Info 9.1.1 Choose Local Device >...
  • Page 137: Routing Info

    Web-based Configuration Guide Diagnostics VLAN Info 9.1.2 Choose Local Device > Diagnostics > Info Center > VLAN Info. Display SVI port and routed port information, including the port information included in the VLAN, the port IP address, and whether the DHCP address pool is enabled. Note ●...
  • Page 138: Dhcp Clients

    Web-based Configuration Guide Diagnostics Choose Local Device > Diagnostics > Info Center > Routing Info. Displays the routing information on the device. The search box in the upper-right corner supports finding route entries based on IP addresses. Note To set up static routes, see 6.3. DHCP Clients 9.1.4 Caution...
  • Page 139: Mac Address

    Web-based Configuration Guide Diagnostics Note To bind dynamic ARP or manually configure static ARP, see 6.4. MAC Address 9.1.6 Choose Local Device > Diagnostics > Info Center > MAC. Displays the MAC address information of the device, including the static MAC address manually configured by the user, the filtering MAC address, and the dynamic MAC address automatically learned by the device.
  • Page 140: Dhcp Snooping

    Web-based Configuration Guide Diagnostics DHCP Snooping 9.1.7 Choose Local Device > Diagnostics > Info Center > DHCP Snooping. Displays the current configuration of the DHCP snooping function and the user information dynamically learned by the trust port. Note To modify DHCP Snooping related configuration, see 7.1. IP-MAC Binding 9.1.8 Choose Local Device >...
  • Page 141 Web-based Configuration Guide Diagnostics IP Source Guard 9.1.9 Choose Local Device > Diagnostics > Info Center > Source Guard. Displays the binding list of the IP Source Guard function. The IP Source Guard function will check the IP packets from non-DHCP trusted ports according to the list, and filter out the IP packets that are not in the binding list. Note To configure IP Source Guard function, see 7.6.
  • Page 142: Network Tools

    Web-based Configuration Guide Diagnostics Network Tools The Network Tools page provides three tools to detect the network status: Ping, Traceroute, and DNS Lookup. Ping 9.2.1 Choose Local Device > Diagnostics > Network Tools. The Ping command is used to detect the network connectivity. Select Ping as the diagnosis mode, enter the destination IP address or website address, configure the ping count and packet size, and click Start to test the network connectivity between the device and the IP address or website.
  • Page 143: Dns Lookup

    Web-based Configuration Guide Diagnostics Select Traceroute as the diagnosis mode, enter a destination IP address or the maximum TTL value used by the URL and traceroute, and click Start. DNS Lookup 9.2.3 Choose Local Device > Diagnostics > Network Tools. DNS Lookup is used to query the information of network domain name or diagnose DNS server problems.
  • Page 144: Cable Diagnostics

    Web-based Configuration Guide Diagnostics Fault Collection Choose Local Device > Diagnostics > Fault Collection. When an unknown fault occurs on the device, you can collect fault information by one click on this page. Click Start. The configuration files of the device will be packed into a compressed file. Download the compressed file locally and provide it to R&D personnel for fault locating.
  • Page 145: System Logs

    Web-based Configuration Guide Diagnostics Caution ● The SPF port does not support the function. ● If a detected port contains an uplink port, the network may be intermittently disconnected. Exercise caution when performing this operation. System Logs Choose Local Device > Diagnostics > System Logs. System logs record device operations, operation time, and operation modules.
  • Page 146 Web-based Configuration Guide Diagnostics Displays possible problems on the network environment to facilitate fault prevention and troubleshooting. You can view the alert occurrence time, port, alert impact, and handling suggestions, and rectify device faults according to handling suggestions. All types of alerts are concerned by default. You can click Unfollow to unfollow this type of alert. The system will no longer display this type of alert.
  • Page 147 Web-based Configuration Guide Diagnostics Alert Type Description Support Description The number of L2 MAC address entries is The MAC address about to reach the hardware capacity limit of table is full of entries. the product. The ARP table is full of The number of ARP entries on the network ARP entries.
  • Page 148: System Configuration

    Web-based Configuration Guide System Configuration System Configuration Setting the System Time 10.1 Choose System > System Time. You can view the current system time. If the time is incorrect, check and select the local time zone. If the time zone is correct but time is still incorrect, click Edit to manually set the time. In addition, the device supports Network Time Protocol (NTP) servers.
  • Page 149 Web-based Configuration Guide System Configuration Setting the Web Login Password 10.2 Choose System > Login > Login Password. Enter the old password and new password. After saving the configuration, use the new password to log in. Caution When self-organizing network discovery is enabled, the login password of all devices in the network will be changed synchronously.
  • Page 150: Resetting The Device

    Web-based Configuration Guide System Configuration Configuration Backup and Import 10.4 Choose System > Management > Backup & Import. Configure backup: Click Backup to generate the backup configuration and download it locally. Configure import: Click Browse, select a backup configuration file locally, and click Import to apply the configuration specified by the file to the device After importing the configuration, the device will restart.
  • Page 151: Rebooting The Device

    Web-based Configuration Guide System Configuration Caution Resetting the device will clear current settings and reboot the device. If a useful configuration exists in the current system, you can export the current configuration (see 10.4) before restoring the factory settings. Exercise caution when performing this operation. Resetting the Devices in the Network 10.5.2 Choose Network >...
  • Page 152 Web-based Configuration Guide System Configuration Rebooting the Devices in the Network 10.6.2 Choose Network > System > Reboot > Reboot. Select All Devices, and click Reboot All Device to reboot all devices in the current network. Caution It will take some time for the network to reboot, please be patient. The network operation will affect the entire network.
  • Page 153 Web-based Configuration Guide System Configuration Configuring Scheduled Reboot 10.7 Confirm that the system time is accurate. For details about how to configure the system time, see 10.1 . To avoid network interruption caused by device reboot at wrong time. Choose Self-Organizing Mode > Network > System> Scheduled Reboot. Choose Standalone Mode >...
  • Page 154: Online Upgrade

    Web-based Configuration Guide System Configuration Upgrade 10.8 Caution ● It is recommended to backup the configuration before software upgrade. ● Version upgrade will restart the device. Do not refresh or close the browser during the upgrade process. Online Upgrade 10.8.1 Choose Local Device >...
  • Page 155: Local Upgrade

    Web-based Configuration Guide System Configuration Local Upgrade 10.8.2 Choose Local Device > System > Upgrade > Local Upgrade. Displays the device model and current software version. You can choose whether to keep the configuration upgrade or not. Click Browse to select the local software installation package, click Upload to upload the installation package and upgrade.
  • Page 156 Web-based Configuration Guide System Configuration Switching the System Language 10.10 Click in the upper-right corner of the Web page. Click a required language to switch the system language.
  • Page 157: Wi-Fi Network Setup

    Web-based Configuration Guide Wi-Fi Network Setup Wi-Fi Network Setup Note ● To manage other devices in the self-organizing network, enable the self-organizing network discovery function. (See Switching the Work Mode)The wireless settings are synchronized to all wireless devices in the network by default. You can configure groups to limit the device scope under wireless management. For details, see 11.1 ●...
  • Page 158 Web-based Configuration Guide Wi-Fi Network Setup name or click to delete the group. You cannot modify the name of the default group or delete the default group. (3) Click a group name in the left. All APs in the group are displayed. One AP can belong to only one group. By default, all APs belong to the default group.
  • Page 159 Web-based Configuration Guide Wi-Fi Network Setup Configuring Wi-Fi 11.2 Choose Network > Wi-Fi > Wi-Fi Settings. Enter the Wi-Fi name and Wi-Fi password, select the frequency band used by the Wi-Fi signal, and click Save. Click Advanced Settings to configure more Wi-Fi parameters. Caution Modification will cause restart of the wireless configuration, resulting in logout of connected clients.
  • Page 160 Web-based Configuration Guide Wi-Fi Network Setup Parameter Description Chinese, this item will be displayed. You can select UTF-8 or GBK. Set the band used by the Wi-Fi signal. The options are 2.4 GHz and 5 GHz. The 5 GHz band provides faster network transmission rate and less interference than the 2.4 GHz band, but is inferior to the 2.4 GHz band in terms of signal coverage range Band and wall penetration performance.
  • Page 161 Web-based Configuration Guide Wi-Fi Network Setup Parameter Description support 802.11ax to experience high-speed network access empowered by Wi-Fi 6. If clients do not support Wi-Fi 6, disable this function. Configuring Guest Wi-Fi 11.3 Choose Network > Wi-Fi > Guest Wi-Fi. Guest Wi-Fi is a wireless network provided for guests, and is disabled by default.
  • Page 162 Web-based Configuration Guide Wi-Fi Network Setup Adding a Wi-Fi 11.4 Choose Network > Wi-Fi > Wi-Fi List. Click Add, enter the Wi-Fi name and password, and click OK to create a Wi-Fi. Click Expand to configure more Wi-Fi parameters. For details, see 11.2 .
  • Page 163 Web-based Configuration Guide Wi-Fi Network Setup Healthy Mode 11.5 Choose Network > Wi-Fi > Healthy Mode. Turn on healthy mode and select a wireless schedule for the mode. After the healthy mode is enabled, the RF transmit power and Wi-Fi coverage range of the wireless device are reduced in the schedule.
  • Page 164 Web-based Configuration Guide Wi-Fi Network Setup The wireless device can detect the surrounding wireless environment upon power-on and select properconfiguration. However, network freezing caused by wireless environment changes cannot be prevented. You can analyze the wireless environment around the APs and routers and manually select proper parameters. Caution Modification will cause restart of the wireless configuration, resulting in logout of connected clients.
  • Page 165 Web-based Configuration Guide Wi-Fi Network Setup Parameter Description If a large number of users access the AP or router, the wireless network performance of the AP or router may be degraded, affecting users' Internet access experience. After you set this parameter, new user Client Count Limit access is prohibited when the number of access users reaches the specified value.
  • Page 166 Web-based Configuration Guide Wi-Fi Network Setup Select the blacklist or whitelist mode and click Add to configure a blacklist or whitelist client. In the Add window, enter the MAC address and remark of the target client and click OK. If a client is already associated with the access point, its MAC address will pop up automatically.
  • Page 167 Web-based Configuration Guide Wi-Fi Network Setup Configuring an SSID-based Blacklist/Whitelist 11.7.3 Choose Clients > Blacklist/Whitelist > SSID-Based Blacklist/Whitelist. Select a target Wi-Fi network from the left column, select the blacklist or whitelist mode, and click Add to configure a blacklist or whitelist client. The SSID-based blacklist and whitelist will restrict the client access to the specified Wi-Fi.
  • Page 168 Web-based Configuration Guide Wi-Fi Network Setup Caution Clients may be kicked offline during optimization and the configuration cannot be rolled back after optimization starts. Exercise caution when performing this operation. After optimization starts, please wait patiently until optimization is complete. After optimization ends, click Cancel Optimization to restore optimized RF parameters to default values.
  • Page 169 Web-based Configuration Guide Wi-Fi Network Setup Enabling the Reyee Mesh Function 11.9 Choose Network > Reyee Mesh. After the Reyee Mesh function is enabled, the devices that support EasyLink can be paired to form a mesh network. Devices can automatically search for new routers around them and pair with each other via the Mesh button, or log in to the router management page to search and select a new router for pairing.
  • Page 170 Web-based Configuration Guide Wi-Fi Network Setup Choose Network > LAN Ports. Enter the VLAN ID and click Save to configure the VLAN, to which the AP wired ports belong. If the VLAN ID is null, the wired ports and WAN port belong to the same VLAN. In self-organizing network mode, the AP wired port configuration applies to all APs having wired LAN ports on the current network.
  • Page 171 Web-based Configuration Guide FAQs FAQs Failing to log in to the Eweb Management System 12.1 (1) Confirm that the network cable is correctly connected to the port of the device, and the corresponding indicator is flashing or steady on. (2) Before accessing the Web management system, it is recommended to set the PC to use a static IP address and set the IP of the computer to be in the same network segment as the IP of the device (the default IP of the device is 10.44.77.200 and the subnet mask is 255.255.255.0) For example, set the IP address of the computer to10.44.77.100 and the subnet mask to 255.255.255.0.

Table of Contents