Niveo Professional NGSME16T2H-AV User Manual

Niveo Professional NGSME16T2H-AV User Manual

16-port 10/100/1000base-t(x) + 2 gigabit sfp ports layer 2+ full management poe+ switch
Table of Contents

Advertisement

Quick Links

NGSME16T2H / NGSME16T2H-AV
16-Port 10/100/1000Base-T(X) + 2 Gigabit SFP Ports
Layer 2+ Full Management PoE+ Switch
User Manual
Version 2.2

Advertisement

Table of Contents
loading

Summary of Contents for Niveo Professional NGSME16T2H-AV

  • Page 1 NGSME16T2H / NGSME16T2H-AV 16-Port 10/100/1000Base-T(X) + 2 Gigabit SFP Ports Layer 2+ Full Management PoE+ Switch User Manual Version 2.2...
  • Page 2 FCC/CE Mark Warning FCC Warning This Equipment has been tested and found to comply with the limits for a Class-A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy.
  • Page 3: Table Of Contents

    Table of Contents Table of Contents Before Starting ..........................10 Intended Readers ........................11 Icons for Note, Caution, and Warning .................. 11 Product Package Contents ....................12 Chapter 1: Product Overview ....................13 1.1. Product Brief Description ....................14 1.2. Product Specification .....................15 1.3. Hardware Description .....................18 1.4.
  • Page 4 Table of Contents 3.1.5.4. Security - Switch - SSH ..................56 3.1.5.5. Security - Switch - HTTPS .................57 3.1.5.6. Security - Switch - Access Management ............58 3.1.5.7. Security - Switch - SNMP ...................59 3.1.5.7.1. Security - Switch - SNMP - System .............59 3.1.5.7.2.
  • Page 5 Table of Contents 3.1.8. Configuration - Spanning Tree ................130 3.1.8.1. Spanning Tree - Bridge Settings ..............130 3.1.8.2. Spanning Tree - MSTI Mapping ............... 132 3.1.8.3. Spanning Tree - MSTI Priorities ..............134 3.1.8.4. Spanning Tree - CIST Ports ................135 3.1.8.5.
  • Page 6 Table of Contents 3.1.19. Configuration - QoS ....................193 3.1.19.1. QoS - Port Classification ................193 3.1.19.2. QoS - Port Policing ..................196 3.1.19.3. QoS - Port Scheduler ..................197 3.1.19.4. QoS - Port Shaping ..................201 3.1.19.5. QoS - Port Tag Remarking ................205 3.1.19.6.
  • Page 7 Table of Contents 3.2.5.2. DHCP - Snooping Table ................... 244 3.2.5.3. DHCP - Relay Statistics ................... 246 3.2.5.4. DHCP - Detailed Statistics ................248 3.2.6. Monitor - Security ....................250 3.2.6.1. Security - Access Management Statistics ............250 3.2.6.2. Security - Network.................... 251 3.2.6.2.1.
  • Page 8 Table of Contents 3.2.11.1.2. IPMC - IGMP Snooping - Groups Information ........296 3.2.11.1.3. IPMC - IGMP Snooping - IPv4 SFM Information ........297 3.2.11.2. IPMC - MLD Snooping ..................299 3.2.11.2.1. IPMC - MLD Snooping - Status ..............299 3.2.11.2.2.
  • Page 9 Table of Contents User Manual.NGSME16T2H 9...
  • Page 10: Before Starting

    Before Starting In Before Starting: This section contains introductory information, which includes:  Intended Readers  Icons for Note, Caution, and Warning  Product Package Contents User Manual. NGSME16T2H 10...
  • Page 11: Intended Readers

    Before Starting Intended Readers This manual provides information regarding to all the aspects and functions needed to install, configure, use, and maintain the product you’ve purchased. This manual is intended for technicians who are familiar with in-depth concepts of networking management and terminologies.
  • Page 12: Product Package Contents

    Before Starting Product Package Contents Before starting install this product, please check and verify the contents of the product package, which should include the following items: One Network Switch One Power Cord One User Manual CD One pair Rack-mount kit + 8 Screws Note: If any item listed in this table above is missing or damaged, please contact your distributor or retailer as soon as possible.
  • Page 13: Chapter 1: Product Overview

    Chapter 1: Product Overview In Product Overview: This section will give you an overview of this product, including its feature functions and hardware/software specifications.  Product Brief Description  Product Specification  Hardware Description  Hardware Installation User Manual. NGSME16T2H 13...
  • Page 14: Product Brief Description

    Chapter 1: Product Overview Product Brief Description 1.1. Product Brief Description Introduction The switch is 16-port 10 Base-T / 100 Base-TX / 1000 Base-T + 2 Gigabit SFP L2+ Management PoE Switch that is designed for small or medium network environment to strengthen its network connection.
  • Page 15: Product Specification

    Chapter 1: Product Overview Product Specification 1.2. Product Specification Interface 10 Base-T /100 Base-TX / 1000 Base-T RJ45 Ports 100/1000 SFP Ports Console Port for CLI Management System Performance Packet Buffer MAC Address Table Size 36Gbps Switching Capacity 26.78Mpps Forwarding Rate PoE Features IEEE 802.3 af/at IEEE 802.3 af/at...
  • Page 16 Chapter 1: Product Overview Product Specification QoS Features 8 queues/port Number of priority queue Yes, 1KBps/1pps Ingress Rate Limiting Yes, 1KBps/1pps Egress  DiffServ (RFC2474 Remarking)  Scheduling (WRR, Strict, Hybrid)  IEEE 802.1p  IP ToS precedence, IP DSCP Security ...
  • Page 17 Chapter 1: Product Overview Product Specification Standard IEEE 802.3 – 10BaseT   IEEE 802.3u - 100BaseTX  IEEE 802.3ab - 1000BaseT  IEEE 802.3z 1000BaseSX/LX  IEEE 802.3af Power over Ethernet (PoE)  IEEE 802.3at Power over Ethernet (PoE+) ...
  • Page 18: Hardware Description

    Chapter 1: Product Overview Hardware Description 1.3. Hardware Description This section mainly describes the hardware of Full-Management PoE switch and gives a physical and functional overview on the certain switch. Front Panel The front panel of the Full-Management PoE switch consists of 16 10 Base-T / 100 Base-TX / 1000 Base-T RJ-45 ports and 2 gigabit uplink SFP ports.
  • Page 19: Hardware Installation

    Chapter 1: Product Overview Hardware Installation 1.4. Hardware Installation To install the Full-Management PoE switch, please place it on a large flat surface with a power socket close by. This surface should be clean, smooth, and level. Also, please make sure that there is enough space around the Full-Management PoE switch for RJ45 cable, power cord and ventilation.
  • Page 20: Chapter 2: Preparing For Management

    Chapter 2: Preparing for Management In Preparing for Management: This section will guide your how to manage this product via serial console, management web page, and Telnet/SSH interface. The switch provides both out-of-band and in-band managements. Out-of-band Management: You can configure the switch via RS232 console cable without having the switch or your PC connecting to a network.
  • Page 21: Preparation For Serial Console

    Chapter 2: Preparing for Management Preparation for Serial Console 2.1. Preparation for Serial Console Inside the product package, you can find an RS-232 console cable. Before managing your switch via out-of-band management, please attach this cable’s RJ45 connector to your switch’s console port and its RS-232 female connector to your PC’s COM port.
  • Page 22 Chapter 2: Preparing for Management Preparation for Serial Console Set the serial port settings as: Baud Rate: 115200, Data Bit: 8, Parity: None, Stop Bit: 1, Row Control: None. The system will prompt you to login the out-of-band management CLI. The default username/password is admin/admin.
  • Page 23: Preparation For Web Interface

    Chapter 2: Preparing for Management Preparation for Web Interface 2.2. Preparation for Web Interface The management web page allows you to use a web browser (such as Microsoft IE, Google Chrome, or Mozilla Firefox) to configure and monitor the switch from anywhere on the network.
  • Page 24 Chapter 2: Preparing for Management Preparation for Web Interface The web browser will prompt you to sign in. The default username/password for the configuration web page is admin/admin. For more information, please refer to Appendix B: IP Configuration for Your PC. User Manual.NGSME16T2H 24...
  • Page 25: Preparation For Telnet/Ssh Interface

    Chapter 2: Preparing for Management Preparation for Telnet/SSH Interface 2.3. Preparation for Telnet/SSH Interface Both telnet and SSH (Secure Shell) are network protocols that provide a text-based command line interface (CLI) for in-band system management. However, only SSH provides a secure channel over an un-secured network, where all transmitted data are encrypted. This switch support both telnet and SSH management CLI.
  • Page 26 Chapter 2: Preparing for Management Preparation for Telnet/SSH Interface If you’re connecting to the switch via SSH for the first time, a “PuTTY Security Alert” window will pop up. Please press “Yes” to continue. This window won’t pop up if you’re using telnet to connect to the in-band management CLI.
  • Page 27: Chapter 3: Web Management

    Chapter 3: Web Management In Web Management: As mentioned in Chapter 2.2. Preparation for Web Interface, This switch provides a web-based management interface. You can make all settings and monitor system status with this management web page. Configuration/Monitor options included in the management web page can be divided into the following 4 categories, which will be discussed in detail in this chapter: ...
  • Page 28: Web Management - Configure

    Chapter 3: Web Management Web Management - Configure 3.1. Web Management - Configure In here you can access all the configuration options of the switch. The configuration options here include:  System: Here you can configure basic system settings such as system information, switch IP, NTP, system time and log.
  • Page 29 Chapter 3: Web Management Web Management - Configure  VLANs: VLAN stands for Virtual LAN, which allows you to separate ports into different VLAN groups. Only member of the same VLAN group can transmit/receive packets among each other, while other ports in different VLAN group can’t. Here you can set port-based VLAN.
  • Page 30: Configuration - System

    Chapter 3: Web Management System - Information 3.1.1. Configuration - System 3.1.1.1. System - Information The switch system information is provided here. System Contact The textual identification of the contact person for this managed node, together with information on how to contact this person. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126.
  • Page 31: System - Ip

    Chapter 3: Web Management System - IP 3.1.1.2. System - IP Configure IP basic settings, control IP interfaces and IP routes. The maximum number of interfaces supported is 128 and the maximum number of routes is Basic Settings Mode Configure whether the IP stack should act as a Host or a Router. In Host mode, IP traffic between interfaces will not be routed.
  • Page 32 Chapter 3: Web Management System - IP IP Interfaces Delete Select this option to delete an existing IP interface. VLAN The VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface. This field is only available for input when creating an new interface. IPv4 DHCP Enabled Enable the DHCP client by checking this box.
  • Page 33 Chapter 3: Web Management System - IP System accepts the valid IPv6 unicast address only, except IPv4-Compatible address and IPv4-Mapped address. The field may be left blank if IPv6 operation on the interface is not desired. IPv6 Mask The IPv6 network mask, in number of bits (prefix length). Valid values are between 1 and 128 bits for a IPv6 address.
  • Page 34 Chapter 3: Web Management System - IP  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values. User Manual.NGSME16T2H 34...
  • Page 35: System - Ntp

    Chapter 3: Web Management System - NTP 3.1.1.3. System - NTP NTP stands for Network Time Protocol, which allows switch to perform clock synchronization with the NTP server. Mode You can enable or disable NTP function on this switch:  Enabled: Enable NTP client mode.
  • Page 36: System - Time

    Chapter 3: Web Management System - Time 3.1.1.4. System - Time This page allows you to configure the Time Zone and daylight saving time. Time Zone Configuration  Time Zone: Lists various Time Zones world wide. Select appropriate Time Zone from the drop down and click Save to set.
  • Page 37 Chapter 3: Web Management System - Time Start time settings  Week - Select the starting week number.  Day - Select the starting day.  Month - Select the starting month.  Hours - Select the starting hour.  Minutes - Select the starting minute.
  • Page 38: System - Log

    Chapter 3: Web Management System - Log 3.1.1.5. System - Log Configure System Log on this page. Server Mode When enabled, the system log message will be sent out to the system log server you set here. The system log protocol is based on UDP communication and received on UDP port 514 and the system log server will not send acknowledgments back sender since UDP is a connectionless protocol and it does not provide acknowledgments.
  • Page 39: Configuration - Green Ethernet

    Chapter 3: Web Management Green Ethernet - Port Power Savings 3.1.2. Configuration - Green Ethernet 3.1.2.1. Green Ethernet - Port Power Savings EEE is a power saving option that reduces the power usage when there is low or no traffic utilization.
  • Page 40 Chapter 3: Web Management Green Ethernet - Port Power Savings Port Power Savings Configuration Optimize EEE for Here you can set the EEE optimization option:  Latency: When choosing this option, the switch will focus more on reducing network latency. ...
  • Page 41: Configuration - Ports

    Chapter 3: Web Management Configuration - Ports 3.1.3. Configuration - Ports This page displays current port configurations. Ports can also be configured here. The port settings relate to the currently selected stack unit, as reflected by the page header. Port This is the logical port number for this row.
  • Page 42 Chapter 3: Web Management Configuration - Ports Flow Control When Auto Speed is selected on a port, this section indicates the flow control capability that is advertised to the link partner. When a fixed-speed setting is selected, that is what is used. The Current Rx column indicates whether pause frames on the port are obeyed, and the Current Tx column indicates whether pause frames on the port are transmitted.
  • Page 43: Configuration - Dhcp

    Chapter 3: Web Management DHCP - Server - Mode 3.1.4. Configuration - DHCP 3.1.4.1. DHCP - Server 3.1.4.1.1. DHCP - Server - Mode This page configures global mode and VLAN mode to enable/disable DHCP server per system and per VLAN. Global Mode Configure operation mode to enable/disable DHCP server per system.
  • Page 44 Chapter 3: Web Management Configuration - Ports Mode Indicate the operation mode per VLAN. Possible modes are:  Enabled: Enable DHCP server per VLAN.  Disabled: Disable DHCP server pre VLAN. Buttons  Add VLAN Range: Click to add a new VLAN range. ...
  • Page 45: Dhcp - Server - Excluded Ip

    Chapter 3: Web Management DHCP - Server - Excluded IP 3.1.4.1.2. DHCP - Server - Excluded IP This page configures excluded IP addresses. DHCP server will not allocate these excluded IP addresses to DHCP client. Excluded IP Address Configure excluded IP addresses. IP Range Define the IP range to be excluded IP addresses.
  • Page 46: Dhcp - Server - Pool

    Chapter 3: Web Management DHCP - Server - Pool 3.1.4.1.3. DHCP - Server - Pool This page manages DHCP pools. According to the DHCP pool, DHCP server will allocate IP address and deliver configuration parameters to DHCP client. Pool Setting Add or delete pools.
  • Page 47 Chapter 3: Web Management DHCP - Server - Pool Lease Time Display lease time of the pool. Buttons  Add New Pool: Click to add a new DHCP pool.  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values.
  • Page 48: Dhcp - Snooping

    Chapter 3: Web Management DHCP - Snooping 3.1.4.2. DHCP - Snooping Configure DHCP Snooping on this page. Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are:  Enabled: Enable DHCP snooping mode operation. When DHCP snooping mode operation is enabled, the DHCP request messages will be forwarded to trusted ports and only allow reply packets from trusted ports.
  • Page 49: Dhcp - Relay

    Chapter 3: Web Management Configuration - Ports 3.1.4.3. DHCP - Relay A DHCP relay agent is used to forward and to transfer DHCP messages between the clients and the server when they are not in the same subnet domain. It stores the incoming interface IP address in the GIADDR field of the DHCP packet.
  • Page 50 Chapter 3: Web Management Configuration - Ports  Disabled: Disable DHCP relay information mode operation. Relay Information Policy Indicates the DHCP relay information option policy. When DHCP relay information mode operation is enabled, if the agent receives a DHCP message that already contains relay agent information it will enforce the policy.
  • Page 51: Configuration - Security

    Chapter 3: Web Management Security - Switch - Users 3.1.5. Configuration - Security This section provides settings regarding to the switch’s security functions. Settings provided here can be divided into 3 categories:  Switch: Here you can make security settings regarding to the switch itself. ...
  • Page 52 Chapter 3: Web Management Security - Switch - Users This page configures a user. User Name A string identifying the user name that this entry should belong to. The allowed string length is 1 to 31. The valid user name is a combination of letters, numbers and underscores. Password The password of the user.
  • Page 53: Security - Switch - Privilege Level

    Chapter 3: Web Management Security - Switch - Privilege Level 3.1.5.2. Security - Switch - Privilege Level This page provides an overview of the privilege levels. Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g.
  • Page 54 Chapter 3: Web Management Security - Switch - Privilege Level Privilege Levels Every group has an authorization Privilege level for the following sub groups: configuration read-only, configuration/execute read-write, status/statistics read-only, status/statistics read- write (e.g. for clearing of statistics). User Privilege should be same or greater than the authorization Privilege level to have the access to that group.
  • Page 55: Security - Switch - Authentication Method

    Chapter 3: Web Management Security - Switch - Authentication Method 3.1.5.3. Security - Switch - Authentication Method This page allows you to configure how a user is authenticated when he logs into the stack via one of the management client interfaces. Client The management client for which the configuration below applies.
  • Page 56: Security - Switch - Ssh

    Chapter 3: Web Management Security - Switch - SSH 3.1.5.4. Security - Switch - SSH Configure SSH on this page. Mode Indicates the SSH mode operation. Possible modes are:  Enabled: Enable SSH mode operation.  Disabled: Disable SSH mode operation. Buttons ...
  • Page 57: Security - Switch - Https

    Chapter 3: Web Management Security - Switch - HTTPS 3.1.5.5. Security - Switch - HTTPS Configure HTTPS on this page. Mode Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection.
  • Page 58: Security - Switch - Access Management

    Chapter 3: Web Management Security - Switch - Access Management 3.1.5.6. Security - Switch - Access Management Configure access management table on this page. The maximum number of entries is 16. If the application's type match any one of the access management entries, it will allow access to the switch.
  • Page 59: Security - Switch - Snmp

    Chapter 3: Web Management Security - Switch - SNMP - System 3.1.5.7. Security - Switch - SNMP 3.1.5.7.1. Security - Switch - SNMP - System Configure SNMP on this page. Mode Indicates the SNMP mode operation. Possible modes are:  Enabled: Enable SNMP mode operation.
  • Page 60 Chapter 3: Web Management Security - Switch - SNMP - System Engine ID Indicates the SNMPv3 engine ID. The string must contain an even number(in hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not allowed. Change of the Engine ID will clear all original local users.
  • Page 61 Chapter 3: Web Management Security - Switch - SNMP - System Trap Destination IPv6 Address Indicates the SNMP trap destination IPv6 address. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:).
  • Page 62 Chapter 3: Web Management Security - Switch - SNMP - System Trap Security Name Indicates the SNMP trap security name. SNMPv3 traps and informs using USM for authentication and privacy. A unique security name is needed when traps and informs are enabled.
  • Page 63: Security - Switch - Snmp - Trap

    Chapter 3: Web Management Security - Switch - SNMP - Trap 3.1.5.7.2. Security - Switch - SNMP - Trap Configure SNMP trap on this page. Global Settings Mode Indicates the trap mode operation. Possible modes are:  Enabled: Enable SNMP trap mode operation. ...
  • Page 64 Chapter 3: Web Management Security - Switch - SNMP - System represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros;...
  • Page 65: Security - Switch - Snmp - Community

    Chapter 3: Web Management Security - Switch - SNMP - Community 3.1.5.7.3. Security - Switch - SNMP - Community Configure SNMPv3 community table on this page. The entry index key is Community. Delete Check to delete the entry. It will be deleted during the next save. Community Indicates the community access string to permit access to SNMPv3 agent.
  • Page 66: Security - Switch - Snmp - User

    Chapter 3: Web Management Security - Switch - SNMP - User 3.1.5.7.4. Security - Switch - SNMP - User Configure SNMPv3 user table on this page. The entry index keys are Engine ID and User Name. Delete Check to delete the entry. It will be deleted during the next save. Engine ID An octet string identifying the engine ID that this entry should belong to.
  • Page 67 Chapter 3: Web Management Security - Switch - SNMP - User Authentication Protocol Indicates the authentication protocol that this entry should belong to. Possible authentication protocols are:  None: No authentication protocol.  MD5: An optional flag to indicate that this user uses MD5 authentication protocol. ...
  • Page 68: Security - Switch - Snmp - Groups

    Chapter 3: Web Management Security - Switch - SNMP - Groups 3.1.5.7.5. Security - Switch - SNMP - Groups Configure SNMPv3 group table on this page. Delete Check to delete the entry. It will be deleted during the next save. Security Model Indicates the security model that this entry should belong to.
  • Page 69: Security - Switch - Snmp - Views

    Chapter 3: Web Management Security - Switch - SNMP - Views 3.1.5.7.5. Security - Switch - SNMP - Views Configure SNMPv3 view table on this page. The entry index keys are View Name and OID Subtree. Delete Check to delete the entry. It will be deleted during the next save. View Name A string identifying the view name that this entry should belong to.
  • Page 70: Security - Switch - Snmp - Access

    Chapter 3: Web Management Security - Switch - SNMP - Access 3.1.5.7.6. Security - Switch - SNMP - Access Configure SNMPv3 access table on this page. Delete Check to delete the entry. It will be deleted during the next save. Group Name A string identifying the group name that this entry should belong to.
  • Page 71: Security - Switch - Rmon

    Chapter 3: Web Management Security - Switch - RMON - Statistics 3.1.5.8. Security - Switch - RMON 3.1.5.8.1. Security - Switch - RMON - Statistics Configure RMON Statistics table on this page. The entry index key is ID. Delete Check to delete the entry. It will be deleted during the next save. Indicates the index of the entry.
  • Page 72: Security - Switch - Rmon - History

    Chapter 3: Web Management Security - Switch - RMON - History 3.1.5.8.2. Security - Switch - RMON - History Configure RMON History table on this page. The entry index key is ID. Delete Check to delete the entry. It will be deleted during the next save. Indicates the index of the entry.
  • Page 73: Security - Switch - Rmon - Alarm

    Chapter 3: Web Management Security - Switch - RMON - Alarm 3.1.5.8.3. Security - Switch - RMON - Alarm Configure RMON Alarm table on this page. The entry index key is ID. Delete Check to delete the entry. It will be deleted during the next save. Indicates the index of the entry.
  • Page 74 Chapter 3: Web Management Security - Switch - RMON - Alarm The method of sampling the selected variable and calculating the value to be compared against the thresholds, possible sample types are:  Absolute: Get the sample directly.  Delta: Calculate the difference between samples (default). Value The value of the statistic during the last sampling period.
  • Page 75: Security - Switch - Rmon - Event

    Chapter 3: Web Management Security - Switch - RMON - Event 3.1.5.8.4. Security - Switch - RMON - Event Configure RMON Event table on this page. The entry index key is ID. Delete Check to delete the entry. It will be deleted during the next save. Indicates the index of the entry.
  • Page 76: Security - Network - Limit Control

    Chapter 3: Web Management Security - Network - Limit Control 3.1.5.9. Security - Network - Limit Control This page allows you to configure the Port Security Limit Control system and port settings. Limit Control allows for limiting the number of users on a given port. A user is identified by a MAC address and VLAN ID.
  • Page 77 Chapter 3: Web Management Security - Network - Limit Control is not exceeded. Now suppose that the end-host logs off or powers down. If it wasn't for aging, the end-host would still take up resources on this switch and will be allowed to forward.
  • Page 78 Chapter 3: Web Management Security - Network - Limit Control Disable and re-enable Limit Control on the port or the stack, Click the Reopen button.  Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port, both the "Trap" and the "Shutdown"...
  • Page 79: Security - Network - Nas (Network Access Server)

    Chapter 3: Web Management Security - Network - NAS (Network Access Server) 3.1.5.10. Security - Network - NAS (Network Access Server) This page allows you to configure the IEEE 802.1X and MAC-based authentication system and port settings. The IEEE 802.1X standard defines a port-based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication.
  • Page 80 Chapter 3: Web Management Security - Network - NAS (Network Access Server) For MAC-based ports, re-authentication is only useful if the RADIUS server configuration has changed. It does not involve communication between the switch and the client, and therefore doesn't imply that a client is still present on a port (see Aging Period below). Re-authentication Period Determines the period, in seconds, after which a connected client must be re-authenticated.
  • Page 81 Chapter 3: Web Management Security - Network - NAS (Network Access Server) because the RADIUS server request times out (according to the timeout specified on the "Configuration→Security→AAA" page) - the client is put on hold in the Unauthorized state. The hold timer does not count during an on-going authentication. In MAC-based Auth.
  • Page 82 Chapter 3: Web Management Security - Network - NAS (Network Access Server) Guest VLAN ID This is the value that a port's Port VLAN ID is set to if a port is moved into the Guest VLAN. It is only changeable if the Guest VLAN option is globally enabled. Valid values are in the range [1;...
  • Page 83 Chapter 3: Web Management Security - Network - NAS (Network Access Server) Port Configuration The table has one row for each port on the selected switch in the stack and a number of columns, which are: Port The port number for which the configuration below applies. Admin State If NAS is globally enabled, this selection controls the port's authentication mode.
  • Page 84 Chapter 3: Web Management Security - Network - NAS (Network Access Server) When authentication is complete, the RADIUS server sends a special packet containing a success or failure indication. Besides forwarding this decision to the supplicant, the switch uses it to open up or block traffic on the switch port connected to the supplicant. Note: Suppose two backend servers are enabled and that the server timeout is configured to X seconds (using the AAA configuration page), and suppose that the first server in the list is currently down (but not considered dead).
  • Page 85 Chapter 3: Web Management Security - Network - NAS (Network Access Server) MAC address for EAPOL frames sent from the switch towards the supplicant, since that would cause all supplicants attached to the port to reply to requests sent from the switch. Instead, the switch uses the supplicant's MAC address, which is obtained from the first EAPOL Start or EAPOL Response Identity frame sent by the supplicant.
  • Page 86 Chapter 3: Web Management Security - Network - NAS (Network Access Server) Class. If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a QoS Class or it's invalid, or the supplicant is otherwise no longer present on the port, the port's QoS Class is immediately reverted to the original QoS Class (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned).
  • Page 87 Chapter 3: Web Management Security - Network - NAS (Network Access Server) RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an Access-Accept packet. The following criteria are used:  The Tunnel-Medium-Type, Tunnel-Type, and Tunnel-Private-Group-ID attributes must all be present at least once in the Access-Accept packet.
  • Page 88 Chapter 3: Web Management Security - Network - NAS (Network Access Server) Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If the number of transmissions of such frames exceeds Max. Reauth.
  • Page 89 Chapter 3: Web Management Security - Network - NAS (Network Access Server)  Re-authenticate: Schedules a re-authentication whenever the quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, re- authentication will be attempted immediately. The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized.
  • Page 90: Security - Network - Acl

    Chapter 3: Web Management Security - Network - ACL - Ports 3.1.5.11. Security - Network - ACL 3.1.5.11.1. Security - Network - ACL - Ports Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The settings relate to the currently selected stack unit, as reflected by the page header.
  • Page 91 Chapter 3: Web Management Security - Network - ACL - Ports Logging Specify the logging operation of this port. The allowed values are:  Enabled: Frames received on the port are stored in the System Log.  Disabled: Frames received on the port are not logged. The default value is "Disabled".
  • Page 92: Security - Network - Acl - Rate Limiter

    Chapter 3: Web Management Security - Network - ACL - Rate Limiter 3.1.5.11.2. Security - Network - ACL - Rate Limiter Configure the rate limiter for the ACL of the switch. Rate Limiter ID The rate limiter ID for the settings contained in the same row. Rate The allowed values are: 0-131071 in pps Unit...
  • Page 93: Security - Network - Acl - Access Control List

    Chapter 3: Web Management Security - Network - ACL - Access Control List 3.1.5.11.3. Security - Network - ACL - Access Control List This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch.
  • Page 94 Chapter 3: Web Management Security - Network - ACL - Access Control List Port Redirect Indicates the port redirect operation of the ACE. Frames matching the ACE are redirected to the port number. The allowed values are Disabled or a specific port number. When Disabled is displayed, the port redirect operation is disabled.
  • Page 95 Chapter 3: Web Management Security - Network - ACL - Access Control List Configure an ACE (Access Control Entry) on this page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type.
  • Page 96 Chapter 3: Web Management Security - Network - ACL - Access Control List Frame Type Select the frame type for this ACE. These frame types are mutually exclusive.  Any: Any frame can match this ACE.  Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE 802.3 describes the value of Length/Type Field specifications to be greater than or equal to 1536 decimal (equal to 0600 hexadecimal).
  • Page 97 Chapter 3: Web Management Security - Network - ACL - Access Control List Counter The counter indicates the number of times the ACE was hit by a frame. User Manual.NGSME16T2H 97...
  • Page 98 Chapter 3: Web Management Security - Network - ACL - Access Control List MAC Parameters SMAC Filter (Only displayed when the frame type is Ethernet Type or ARP.) Specify the source MAC filter for this ACE.  Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ...
  • Page 99 Chapter 3: Web Management Security - Network - ACL - Access Control List VLAN Parameters VLAN ID Filter Specify the VLAN ID filter for this ACE.  Any: No VLAN ID filter is specified. (VLAN ID filter status is "don't-care".) ...
  • Page 100 Chapter 3: Web Management Security - Network - ACL - Access Control List ARP Parameters The ARP parameters can be configured when Frame Type "ARP" is selected. ARP/RARP Specify the available ARP/RARP opcode (OP) flag for this ACE.  Any: No ARP/RARP OP flag is specified. (OP is "don't-care".) ...
  • Page 101 Chapter 3: Web Management Security - Network - ACL - Access Control List Target IP Filter Specify the target IP filter for this specific ACE.  Any: No target IP filter is specified. (Target IP filter is "don't-care".)  Host: Target IP filter is set to Host. Specify the target IP address in the Target IP Address field that appears.
  • Page 102 Chapter 3: Web Management Security - Network - ACL - Access Control List Specify whether frames can hit the action according to their ARP/RARP hardware address space (HRD) settings.  0: ARP/RARP frames where the HLD is not equal to Ethernet (1). ...
  • Page 103 Chapter 3: Web Management Security - Network - ACL - Access Control List IP Parameters The IP parameters can be configured when Frame Type "IPv4" is selected. IP Protocol Filter Specify the IP protocol filter for this ACE.  Any: No IP protocol filter is specified ("don't-care"). ...
  • Page 104 Chapter 3: Web Management Security - Network - ACL - Access Control List must not be able to match this entry.  Yes: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry. ...
  • Page 105 Chapter 3: Web Management Security - Network - ACL - Access Control List DIP Mask When "Network" is selected for the destination IP filter, you can enter a specific DIP mask in dotted decimal notation. User Manual.NGSME16T2H 105...
  • Page 106 Chapter 3: Web Management Security - Network - ACL - Access Control List ICMP Parameters ICMP Type Filter Specify the ICMP filter for this ACE.  Any: No ICMP filter is specified (ICMP filter status is "don't-care").  Specific: If you want to filter a specific ICMP filter with this ACE, you can enter a specific ICMP value.
  • Page 107 Chapter 3: Web Management Security - Network - ACL - Access Control List TCP/UDP Parameters TCP/UDP Source Filter Specify the TCP/UDP source filter for this ACE.  Any: No TCP/UDP source filter is specified (TCP/UDP source filter status is "don't- care").
  • Page 108 Chapter 3: Web Management Security - Network - ACL - Access Control List  Specific: If you want to filter a specific TCP/UDP destination filter with this ACE, you can enter a specific TCP/UDP destination value. A field for entering a TCP/UDP destination value appears.
  • Page 109 Chapter 3: Web Management Security - Network - ACL - Access Control List Specify the TCP "Acknowledgment field significant" (ACK) value for this ACE.  0: TCP frames where the ACK field is set must not be able to match this entry. ...
  • Page 110 Chapter 3: Web Management Security - Network - ACL - Access Control List Ethernet Type Parameters The Ethernet Type parameters can be configured when Frame Type "Ethernet Type" is selected. EtherType Filter Specify the Ethernet type filter for this ACE. ...
  • Page 111: Security - Network - Ip Source Guard

    Chapter 3: Web Management Security - Network - IP Source Guard - Configuration 3.1.5.12. Security - Network - IP Source Guard 3.1.5.12.1. Security - Network - IP Source Guard - Configuration This page provides IP Source Guard related configuration. Mode of IP Source Guard Configuration Enable the Global IP Source Guard or disable the Global IP Source Guard.
  • Page 112: Security - Network - Ip Source Guard - Static Table

    Chapter 3: Web Management Security - Network - IP Source Guard - Static Table 3.1.5.12.2. Security - Network - IP Source Guard - Static Table Delete Check to delete the entry. It will be deleted during the next save. Port The logical port for the settings.
  • Page 113: Security - Network - Arp Inspection

    Chapter 3: Web Management Security - Network - ARP Inspection - Port Configuration 3.1.5.13. Security - Network - ARP Inspection 3.1.5.13.1. Security - Network - ARP Inspection - Port Configuration This page provides ARP Inspection related configuration. Mode Enable the Global ARP Inspection or disable the Global ARP Inspection. Port Mode Configuration Specify ARP Inspection is enabled on which ports.
  • Page 114 Chapter 3: Web Management Security - Network - ARP Inspection - Port Configuration Only the Global Mode and Port Mode on a given port are enabled, and the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. There are four log types and possible types are: ...
  • Page 115: Security - Network - Arp Inspection - Vlan Configuration

    Chapter 3: Web Management Security - Network - ARP Inspection - VLAN Configuration 3.1.5.13.2. Security - Network - ARP Inspection - VLAN Configuration This page provides ARP Inspection related configuration. Navigating the VLAN Configuration Each page shows up to 9999 entries from the VLAN table, default being 20, selected through the "entries per page"...
  • Page 116: Security - Network - Arp Inspection - Static Table

    Chapter 3: Web Management Security - Network - ARP Inspection - Static Table 3.1.5.13.3. Security - Network - ARP Inspection - Static Table Delete Check to delete the entry. It will be deleted during the next save. Port The logical port for the settings. VLAN ID The vlan id for the settings.
  • Page 117: Security - Network - Arp Inspection - Dynamic Table

    Chapter 3: Web Management Security - Network - ARP Inspection - Dynamic Table 3.1.5.13.4. Security - Network - ARP Inspection - Dynamic Table Entries in the Dynamic ARP Inspection Table are shown on this page. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address.
  • Page 118 Chapter 3: Web Management Security - Network - ARP Inspection - Dynamic Table Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Refreshes the displayed table starting from the input fields. ...
  • Page 119: Security - Aaa

    Chapter 3: Web Management Security - AAA - RADIUS 3.1.5.3. Security - AAA 3.1.5.3.1. Security - AAA - RADIUS This page allows you to configure the RADIUS servers. Global Configuration Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request.
  • Page 120 Chapter 3: Web Management Security - AAA - RADIUS NAS-IP-Address (Attribute 4) The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used. NAS-IPv6-Address (Attribute 95) The IPv6 address to be used as attribute 95 in RADIUS Access-Request packets.
  • Page 121 Chapter 3: Web Management Security - AAA - RADIUS Adding a New Server Click Add New Server button to add a new RADIUS server. An empty row is added to the table, and the RADIUS server can be configured as needed. Up to 5 servers are supported.
  • Page 122: Security - Aaa - Tacacs

    Chapter 3: Web Management Security - AAA - TACACS+ 3.1.5.3.2. Security - AAA - TACACS+ This page allows you to configure the TACACS+ servers. Global Configuration These setting are common for all of the TACACS+ servers. Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a TACACS+ server before it is considered to be dead.
  • Page 123 Chapter 3: Web Management Security - AAA - TACACS+ Port The TCP port to use on the TACACS+ server for authentication. Timeout This optional setting overrides the global timeout value. Leaving it blank will use the global timeout value. This optional setting overrides the global key. Leaving it blank will use the global key. Adding a New Server Click Add New Server button to add a new TACACS+ server.
  • Page 124: Configuration - Aggregation

    Chapter 3: Web Management Aggregation - Static 3.1.6. Configuration - Aggregation 3.1.6.1. Aggregation - Static This page is used to configure the Aggregation hash mode and the aggregation group. Hash Code Contributors Source MAC Address The Source MAC address can be used to calculate the destination port for the frame. Check to enable the use of the Source MAC address, or uncheck to disable.
  • Page 125 Chapter 3: Web Management Aggregation - Static Aggregation Group Configuration Locality Indicates the aggregation group type. This field is only valid for stackable switches.  Global: The group members may reside on different units in the stack. Each global aggregation may consist of up to 8 members. ...
  • Page 126: Aggregation - Lacp

    Chapter 3: Web Management Aggregation - LACP 3.1.6.2. Aggregation - LACP This page allows the user to inspect the current LACP port configurations, and possibly change them as well. The LACP port settings relate to the currently selected stack unit, as reflected by the page header.
  • Page 127 Chapter 3: Web Management Aggregation - LACP Buttons  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values. User Manual.NGSME16T2H 127...
  • Page 128: Configuration - Loop Protection

    Chapter 3: Web Management Loop Protection 3.1.7. Configuration - Loop Protection This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well. General Settings Enable Loop Protection Controls whether loop protections is enabled (as a whole). Transmission Time The interval between each loop protection PDU sent on each port.
  • Page 129 Chapter 3: Web Management Loop Protection Port Configuration Port The switch port number of the port. Enable Controls whether loop protection is enabled on this switch port. Action Configures the action performed when a loop is detected on a port. Valid values are Shutdown Port, Shutdown Port and Log or Log Only.
  • Page 130: Configuration - Spanning Tree

    Chapter 3: Web Management Spanning Tree - Bridge Settings 3.1.8. Configuration - Spanning Tree 3.1.8.1. Spanning Tree - Bridge Settings This page allows you to configure STP system settings. The settings are used by all STP Bridge instances in the Switch Stack. Basic Settings Protocol Version The MSTP / RSTP / STP protocol version setting.
  • Page 131 Chapter 3: Web Management Spanning Tree - Bridge Settings Maximum Hop Count This defines the initial value of remaining Hops for MSTI information generated at the boundary of an MSTI region. It defines how many bridges a root bridge can distribute its BPDU information to.
  • Page 132: Spanning Tree - Msti Mapping

    Chapter 3: Web Management Spanning Tree - MSTI Mapping 3.1.8.2. Spanning Tree - MSTI Mapping This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. Configuration Identification Configuration Name The name identifying the VLAN to MSTI mapping.
  • Page 133 Chapter 3: Web Management Spanning Tree - MSTI Mapping VLANs Mapped The list of VLANs mapped to the MSTI. The VLANs can be given as a single (xx, xx being between 1 and 4094) VLAN, or a range (xx-yy), each of which must be separated with comma and/or space.
  • Page 134: Spanning Tree - Msti Priorities

    Chapter 3: Web Management Spanning Tree - MSTI Priorities 3.1.8.3. Spanning Tree - MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. MSTI The bridge instance. The CIST is the default instance, which is always active. Priority Controls the bridge priority.
  • Page 135: Spanning Tree - Cist Ports

    Chapter 3: Web Management Spanning Tree - CIST Ports 3.1.8.4. Spanning Tree - CIST Ports This page allows the user to inspect the current STP CIST port configurations, and possibly change them as well. This page contains settings for physical and aggregated ports. The aggregation settings are stack global.
  • Page 136 Chapter 3: Web Management Spanning Tree - CIST Ports operEdge (state flag) Operational flag describing whether the port is connecting directly to edge devices. (No Bridges attached). Transition to the forwarding state is faster for edge ports (having operEdge true) than for other ports. The value of this flag is based on AdminEdge and AutoEdge fields.
  • Page 137 Chapter 3: Web Management Spanning Tree - CIST Ports Buttons  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values. User Manual.NGSME16T2H 137...
  • Page 138: Spanning Tree - Msti Ports

    Chapter 3: Web Management Spanning Tree - MSTI Ports 3.1.8.5. Spanning Tree - MSTI Ports This page allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. An MSTI port is a virtual port, which is instantiated separately for each active CIST (physical) port for each MSTI instance configured on and applicable to the port.
  • Page 139 Chapter 3: Web Management Spanning Tree - MSTI Ports Priority Controls the port priority. This can be used to control priority of ports having identical port cost. (See above). Buttons  Get: Click to retrieve settings for a specific MSTI. ...
  • Page 140: Configuration - Ipmc Profile

    Chapter 3: Web Management IPMC Profile - Profile Table 3.1.9. Configuration - IPMC Profile 3.1.9.1. IPMC Profile - Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create at maximum 64 Profiles with at maximum 128 corresponding rules for each.
  • Page 141 Chapter 3: Web Management IPMC Profile - Profile Table Rule When the profile is created, click the edit button to enter the rule setting page of the designated profile. Summary about the designated profile will be shown by clicking the view button.
  • Page 142: Ipmc Profile - Address Entry

    Chapter 3: Web Management IPMC Profile - Profile Table 3.1.9.2. IPMC Profile - Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile.
  • Page 143: Configuration - Mvr

    Chapter 3: Web Management 3.1.10. Configuration - MVR This page provides MVR related configurations. Most of the settings are global, whereas the Immediate Leave and MVR Port-Role configuration is related to the current selecting stack unit, as reflected by the page header. The MVR feature enables multicast traffic forwarding on the Multicast VLANs.
  • Page 144 Chapter 3: Web Management MVR Name MVR Name is an optional attribute to indicate the name of the specific MVR VLAN. Maximum length of the MVR VLAN Name string is 32. MVR VLAN Name can only contain alphabets or numbers. When the optional MVR VLAN name is given, it should contain at least one alphabet.
  • Page 145 Chapter 3: Web Management Note: MVR source ports are not recommended to be overlapped with management VLAN ports. Select the port role by clicking the Role symbol to switch the setting. Immediate Leave Enable the fast leave on the port. Buttons ...
  • Page 146 Chapter 3: Web Management This page provides MVR channel settings for a specific MVR VLAN. Delete Check to delete the entry. The designated entry will be deleted during the next save. VLAN ID Display the specific Multicast VLAN ID. This field is not editable. VLAN Name Display the name of the specific Multicast VLAN.
  • Page 147: Configuration - Ipmc

    Chapter 3: Web Management IPMC - IGMP Snooping - Basic Configuration 3.1.11. Configuration - IPMC 3.1.11.1. IPMC - IGMP Snooping 3.1.11.1.1. IPMC - IGMP Snooping - Basic Configuration This page provides IGMP Snooping related configuration. Most of the settings are global, whereas the Router Port configuration is related to the currently selected stack unit, as reflected by the page header.
  • Page 148 Chapter 3: Web Management IPMC - IGMP Snooping - Basic Configuration Proxy Enabled Enable IGMP Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the router side. Router Port Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier.
  • Page 149: Ipmc - Igmp Snooping - Vlan Configuration

    Chapter 3: Web Management IPMC - IGMP Snooping - VLAN Configuration 3.1.11.1.2. IPMC - IGMP Snooping - VLAN Configuration Navigating the IGMP Snooping VLAN Table Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page"...
  • Page 150 Chapter 3: Web Management IPMC - IGMP Snooping - VLAN Configuration Otherwise, system uses a pre-defined value. By default, this value will be 192.0.2.1. Compatibility Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network. The allowed selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2, Forced IGMPv3, default compatibility value is IGMP-Auto.
  • Page 151 Chapter 3: Web Management IPMC - IGMP Snooping - VLAN Configuration 10 in tenths of seconds (1 second). Unsolicited Report Interval. The Unsolicited Report Interval is the time between repetitions of a host's initial report of membership in a group. The allowed range is 0 to 31744 seconds, default unsolicited report interval is 1 second.
  • Page 152: Ipmc - Igmp Snooping - Port Group Filtering

    Chapter 3: Web Management IPMC - IGMP Snooping - Port Group Filtering 3.1.11.1.3. IPMC - IGMP Snooping - Port Group Filtering Port The logical port for the settings. Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button.
  • Page 153: Ipmc - Mld Snooping

    Chapter 3: Web Management IPMC - MLD Snooping - Basic Configuration 3.1.11.2. IPMC - MLD Snooping 3.1.11.2.1. IPMC - MLD Snooping - Basic Configuration This page provides MLD Snooping related configuration. Most of the settings are global, whereas the Router Port configuration is related to the currently selected stack unit, as reflected by the page header.
  • Page 154 Chapter 3: Web Management IPMC - MLD Snooping - Basic Configuration Router Port Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier. If an aggregation member port is selected as a router port, the whole aggregation will act as a router port.
  • Page 155: Ipmc - Mld Snooping - Vlan Configuration

    Chapter 3: Web Management IPMC - MLD Snooping - VLAN Configuration 3.1.11.2.2. IPMC - MLD Snooping - VLAN Configuration Navigating the MLD Snooping VLAN Table Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page"...
  • Page 156 Chapter 3: Web Management IPMC - MLD Snooping - VLAN Configuration Priority of Interface. It indicates the MLD control frame priority level generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0. Robustness Variable.
  • Page 157 Chapter 3: Web Management IPMC - MLD Snooping - VLAN Configuration Unsolicited Report Interval. The Unsolicited Report Interval is the time between repetitions of a node's initial report of interest in a multicast address. The allowed range is 0 to 31744 seconds, default unsolicited report interval is 1 second. Buttons ...
  • Page 158: Ipmc - Mld Snooping - Port Group Filtering

    Chapter 3: Web Management IPMC - MLD Snooping - Port Group Filtering 3.1.11.2.3. IPMC - MLD Snooping - Port Group Filtering Port The logical port for the settings. Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button.
  • Page 159: Configuration - Lldp

    Chapter 3: Web Management LLDP - LLDP 3.1.12. Configuration - LLDP 3.1.12.1. LLDP - LLDP This page allows the user to inspect and configure the current LLDP port settings. LLDP Parameters Tx Interval The switch periodically transmits LLDP frames to its neighbors for having the network discovery information up-to-date.
  • Page 160 Chapter 3: Web Management LLDP - LLDP Tx Reinit When a port is disabled, LLDP is disabled or the switch is rebooted, an LLDP shutdown frame is transmitted to the neighboring units, Signaling that the LLDP information isn't valid anymore. Tx Reinit controls the amount of seconds between the shutdown frame and a new LLDP initialization.
  • Page 161 Chapter 3: Web Management LLDP - LLDP CDP TLV "Port ID" is mapped to the LLDP "Port ID" field. CDP TLV "Version and Platform" is mapped to the LLDP "System Description" field. Both the CDP and LLDP support "system capabilities", but the CDP capabilities cover capabilities that are not part of the LLDP.
  • Page 162: Lldp - Lldp-Med

    Chapter 3: Web Management LLDP - LLDP-MED 3.1.12.2. LLDP - LLDP-MED This page allows you to configure the LLDP-MED. This function applies to VoIP devices which support LLDP-MED. Fast start repeat count Fast start repeat count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general.
  • Page 163 Chapter 3: Web Management LLDP - LLDP-MED possibility of the neighbors receiving the LLDP frame. With Fast start repeat count it is possible to specify the number of times the fast start transmission would be repeated. The recommended value is 4 times, given that 4 LLDP frames with a 1 second interval will be transmitted, when an LLDP frame with new information is received.
  • Page 164 Chapter 3: Web Management LLDP - LLDP-MED  NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich; The associated vertical datum is Mean Lower Low Water (MLLW). This datum pair is to be used when referencing locations on water/sea/ocean. Civic Address Location IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI).
  • Page 165 Chapter 3: Web Management LLDP - LLDP-MED Name Name (residence and office occupant) - Example: Flemming Jahn. Zip code Postal/zip code - Example: 2791. Building Building (structure) - Example: Low Library. Apartment Unit (Apartment, suite) - Example: Apt 42. Floor Floor - Example: 4.
  • Page 166 Chapter 3: Web Management LLDP - LLDP-MED Policies are only intended for use with applications that have specific 'real-time' network policy requirements, such as interactive voice and/or video services. The network policy attributes advertised are: 1. Layer 2 VLAN ID (IEEE 802.1Q-2003) 2.
  • Page 167 Chapter 3: Web Management LLDP - LLDP-MED 2. Voice Signaling (conditional) - for use in network topologies that require a different policy for the voice Signaling than for the voice media. This application type should not be advertised if all the same network policies apply as those advertised in the Voice application policy.
  • Page 168 Chapter 3: Web Management LLDP - LLDP-MED format also includes priority tagged frames as defined by IEEE 802.1Q-2003. VLAN ID VLAN identifier (VID) for the port as defined in IEEE 802.1Q-2003. L2 Priority L2 Priority is the Layer 2 priority to be used for the specified application type. L2 Priority may specify one of eight priority levels (0 through 7), as defined by IEEE 802.1D-2004.
  • Page 169: Configuration - Poe

    Chapter 3: Web Management 3.1.13. Configuration - PoE This page allows the user to inspect and configure the current PoE port settings. Power over Ethernet Configuration Reserved Power determined by There are three modes for configuring how the ports/PDs may reserve power. 1.
  • Page 170 Chapter 3: Web Management Power Management Mode There are 2 modes for configuring when to shut down the ports: 1. Actual Consumption: In this mode the ports are shut down when the actual power consumption for all ports exceeds the amount of power that the power supply can deliver or if the actual power consumption for a given port exceeds the reserved power for that port.
  • Page 171 Chapter 3: Web Management Priority The Priority represents the ports priority. There are three levels of power priority named Low, High and Critical. The priority is used in the case where the remote devices requires more power than the power supply can deliver. In this case the port with the lowest priority will be turn off starting from the port with the highest port number.
  • Page 172 Chapter 3: Web Management Note: If a PD is connected to the PoE switch and the PoE budget is not enough for that PD, the PoE LED will be blinking and provides no power to the newly connected PD. It is recommended to set the Power Management Mode to Actual Consumption, and set the ports that connect to crucial devices to High or Critical as shown in the figures down below.
  • Page 173: Configuration - Mac Table

    Chapter 3: Web Management MAC Table 3.1.14. Configuration - MAC Table The MAC Address Table is configured on this page. Set timeouts for entries in the dynamic MAC Table and configure the static MAC table here. Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging.
  • Page 174 Chapter 3: Web Management MAC Table Secure Only static MAC entries are learned, all other frames are dropped. Note: Make sure that the link used for managing the switch is added to the Static Mac Table before changing to secure learning mode, otherwise the management link is lost and can only be restored by using another non-secure port or by connecting to the switch via the serial interface.
  • Page 175: Configuration - Vlans

    Chapter 3: Web Management Configuration - VLANs 3.1.15. Configuration - VLANs This page allows for controlling VLAN configuration on the switch. The page is divided into a global section and a per-port configuration section. Global VLAN Configuration Allowed Access VLANs This field shows the allowed Access VLANs, i.e.
  • Page 176 Chapter 3: Web Management Configuration - VLANs Access ports are normally used to connect to end stations. Dynamic features like Voice VLAN may add the port to more VLANs behind the scenes. Access ports have the following characteristics:  Member of exactly one VLAN, the Port VLAN (a.k.a. Access VLAN), which by default is 1 ...
  • Page 177 Chapter 3: Web Management Configuration - VLANs Port VLAN Determines the port's VLAN ID (a.k.a. PVID). Allowed VLANs are in the range 1 through 4095, default being 1. On ingress, frames get classified to the Port VLAN if the port is configured as VLAN unaware, the frame is untagged, or VLAN awareness is enabled on the port, but the frame is priority tagged (VLAN ID = 0).
  • Page 178 Chapter 3: Web Management Configuration - VLANs Ingress Filtering Hybrid ports allow for changing ingress filtering. Access and Trunk ports always have ingress filtering enabled. If ingress filtering is enabled (checkbox is checked), frames classified to a VLAN that the port is not a member of get discarded.
  • Page 179 Chapter 3: Web Management Configuration - VLANs The field may be left empty, which means that the port will not become member of any VLANs. Forbidden VLANs A port may be configured to never be member of one or more VLANs. This is particularly useful when dynamic VLAN protocols like MVRP and GVRP must be prevented from dynamically adding ports to VLANs.
  • Page 180: Configuration - Private Vlan

    Chapter 3: Web Management Private VLAN - Port Isolation 3.1.16. Configuration - Private VLAN 3.1.16.1. Private VLAN - Membership The Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be added or deleted here. Port members of each Private VLAN can be added or removed here.
  • Page 181 Chapter 3: Web Management Private VLAN - Port Isolation Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Click to refresh the page immediately.  Save: Click to save changes. ...
  • Page 182: Private Vlan - Port Isolation

    Chapter 3: Web Management Private VLAN - Port Isolation 3.1.16.2. Private VLAN - Port Isolation Overview This page is used for enabling or disabling port isolation on ports in a Private VLAN. A port member of a VLAN can be isolated to other isolated ports on the same VLAN. The port settings relate to the currently selected stack unit, as reflected by the page header.
  • Page 183: Configuration - Vcl

    Chapter 3: Web Management VCL - MAC-based VLAN 3.1.17. Configuration - VCL 3.1.17.1. VCL - MAC-based VLAN The MAC-based VLAN entries can be configured here. This page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This page shows only static entries.
  • Page 184 Chapter 3: Web Management VCL - MAC-based VLAN Buttons  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values.  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
  • Page 185: Vcl - Port-Based Vlan

    Chapter 3: Web Management VCL - Port-based VLAN - Protocol to Group 3.1.17.2. VCL - Port-based VLAN 3.1.17.2.1. VCL - Port-based VLAN - Protocol to Group This page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the selected stack switch unit.
  • Page 186 Chapter 3: Web Management VCL - Port-based VLAN - Protocol to Group OUI for a particular organization, the protocol ID is a value assigned by that organization to the protocol running on top of SNAP. In other words, if value of OUI field is 00-00-00 then value of PID will be etype (0x0600- 0xffff) and if value of OUI is other than 00-00-00 then valid value of PID will be any value from 0x0000 to 0xffff.
  • Page 187: Vcl - Port-Based Vlan - Group To Vlan

    Chapter 3: Web Management VCL - Port-based VLAN - Group to VLAN 3.1.17.2.2. VCL - Port-based VLAN - Group to VLAN This page allows you to map an already configured Group Name to a VLAN for the selected stack switch unit. Delete To delete a Group Name to VLAN map entry, check this box.
  • Page 188: Vcl - Ip Subnet-Based Vlan

    Chapter 3: Web Management VCL - IP Subnet-based VLAN 3.1.17.3. VCL - IP Subnet-based VLAN The IP subnet-based VLAN entries can be configured here. This page allows for adding, updating and deleting IP subnet-based VLAN entries and assigning the entries to different ports.
  • Page 189 Chapter 3: Web Management VCL - IP Subnet-based VLAN Buttons  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values.  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
  • Page 190: Configuration - Voice Vlan

    Chapter 3: Web Management Voice VLAN - Configuration 3.1.18. Configuration - Voice VLAN 3.1.18.1. Voice VLAN - Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic. It is recommended that there be two VLANs on a port - one for voice, one for data.
  • Page 191 Chapter 3: Web Management Voice VLAN - Configuration Port Mode Indicates the Voice VLAN port mode. Possible port modes are:  Disabled: Disjoin from Voice VLAN.  Auto: Enable auto detect mode. It detects whether there is VoIP phone attached to the specific port and configures the Voice VLAN members automatically.
  • Page 192: Voice Vlan - Oui

    Chapter 3: Web Management Voice VLAN - OUI 3.1.18.2. Voice VLAN - OUI Configure VOICE VLAN OUI table on this page. The maximum number of entries is 16. Modifying the OUI table will restart auto detection of OUI process. Delete Check to delete the entry.
  • Page 193: Configuration - Qos

    Chapter 3: Web Management QoS - Port Classification 3.1.19. Configuration - QoS 3.1.19.1. QoS - Port Classification This page allows you to configure the basic QoS Ingress Classification settings for all switch ports. Port The port number for which the configuration below applies. Controls the default class of service.
  • Page 194 Chapter 3: Web Management QoS - Port Classification If the port is VLAN aware and the frame is tagged, then the frame is classified to the PCP value in the tag. Otherwise the frame is classified to the default PCP value. Controls the default DEI value.
  • Page 195 Chapter 3: Web Management QoS - Port Classification QoS Ingress Port Tag Classification for Specific Port The classification mode for tagged frames are configured on this page. Tag Classification Controls the classification mode for tagged frames on this port.  Disabled: Use default QoS class and Drop Precedence Level for tagged frames.
  • Page 196: Qos - Port Policing

    Chapter 3: Web Management QoS - Port Policing 3.1.19.2. QoS - Port Policing This page allows you to configure the Policer settings for all switch ports. The settings relate to the currently selected stack unit, as reflected by the page header. Port The port number for which the configuration below applies.
  • Page 197: Qos - Port Scheduler

    Chapter 3: Web Management QoS - Port Scheduler 3.1.19.3. QoS - Port Scheduler This page provides an overview of QoS Egress Port Schedulers for all switch ports. The ports belong to the currently selected stack unit, as reflected by the page header. Port The logical port for the settings contained in the same row.
  • Page 198 Chapter 3: Web Management QoS - Port Scheduler Scheduler Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port. Queue Shaper Rate Controls the rate for the queue shaper.
  • Page 199 Chapter 3: Web Management QoS - Port Scheduler This page allows you to configure the Scheduler and Shapers for a specific port. The settings relate to the currently selected stack unit, as reflected by the page header. Scheduler Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port.
  • Page 200 Chapter 3: Web Management QoS - Port Scheduler Queue Scheduler Percent Shows the weight in percent for this queue. This parameter is only shown if "Scheduler Mode" is set to "Weighted". Port Shaper Enable Controls whether the port shaper is enabled for this switch port. Port Shaper Rate Controls the rate for the port shaper.
  • Page 201: Qos - Port Shaping

    Chapter 3: Web Management QoS - Port Shaping 3.1.19.4. QoS - Port Shaping This page provides an overview of QoS Egress Port Shapers for all switch ports. The ports belong to the currently selected stack unit, as reflected by the page header. Port The logical port for the settings contained in the same row.
  • Page 202 Chapter 3: Web Management QoS - Port Shaping Scheduler Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port. Queue Shaper Rate Controls the rate for the queue shaper.
  • Page 203 Chapter 3: Web Management QoS - Port Shaping This page allows you to configure the Scheduler and Shapers for a specific port. The settings relate to the currently selected stack unit, as reflected by the page header. Scheduler Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port.
  • Page 204 Chapter 3: Web Management QoS - Port Shaping Queue Scheduler Percent Shows the weight in percent for this queue. This parameter is only shown if "Scheduler Mode" is set to "Weighted". Port Shaper Enable Controls whether the port shaper is enabled for this switch port. Port Shaper Rate Controls the rate for the port shaper.
  • Page 205: Qos - Port Tag Remarking

    Chapter 3: Web Management QoS - Port Tag Remarking 3.1.19.5. QoS - Port Tag Remarking This page provides an overview of QoS Egress Port Tag Remarking for all switch ports. The ports belong to the currently selected stack unit, as reflected by the page header. Port The logical port for the settings contained in the same row.
  • Page 206 Chapter 3: Web Management QoS - Port Tag Remarking The QoS Egress Port Tag Remarking for a specific port are configured on this page. Mode Controls the tag remarking mode for this port.  Classified: Use classified PCP/DEI values.  Default: Use default PCP/DEI values.
  • Page 207 Chapter 3: Web Management QoS - Port Tag Remarking DP level Configuration Controls the Drop Precedence level translation table when the mode is set to Mapped. The purpose of this table is to reduce the 2 bit classified DP level to a 1 bit DP level used in the (QoS class, DP level) to (PCP, DEI) mapping process.
  • Page 208: Qos - Port Dscp

    Chapter 3: Web Management QoS - Port DSCP 3.1.19.6. QoS - Port DSCP This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The settings relate to the currently selected stack unit, as reflected by the page header. Port The Port column shows the list of ports for which you can configure dscp ingress and egress settings.
  • Page 209 Chapter 3: Web Management QoS - Port DSCP Egress Port Egress Rewriting can be one of -  Disable: No Egress rewrite.  Enable: Rewrite enabled without remapping.  Remap: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value.
  • Page 210: Qos - Dscp-Based Qos

    Chapter 3: Web Management QoS - DSCP-Based QoS 3.1.19.7. QoS - DSCP-Based QoS This page allows you to configure the basic QoS DSCP based QoS Ingress Classification settings for all switches. DSCP Maximum number of supported DSCP values are 64. Trust Controls whether a specific DSCP value is trusted.
  • Page 211: Qos - Dscp Translation

    Chapter 3: Web Management QoS - DSCP Translation 3.1.19.8. QoS - DSCP Translation This page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. DSCP Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to Ingress Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map.
  • Page 212 Chapter 3: Web Management QoS - DSCP Translation 2. Remap DP1 Select the DSCP value from select menu to which you want to remap. DSCP value ranges form 0 to 63. Buttons  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values. User Manual.NGSME16T2H 212...
  • Page 213: Qos - Dscp Classification

    Chapter 3: Web Management QoS - QoS Control List 3.1.19.9. QoS - DSCP Classification This page allows you to configure the mapping of QoS class to DSCP value. The settings relate to the currently selected stack unit, as reflected by the page header. QoS Class Actual QoS class.
  • Page 214: Qos - Qos Control List

    Chapter 3: Web Management QoS - QoS Control List 3.1.19.10. QoS - QoS Control List QoS Control List Configuration This page shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list.
  • Page 215 Chapter 3: Web Management QoS - QoS Control List Tag Type Indicates tag type. Possible values are:  Any: Match tagged and untagged frames. This is the default setting.  Untagged: Match untagged frames.  Tagged: Match tagged frames. Indicates (VLAN ID), either a specific VID or range of VIDs. VID can be in the range 1-4095 or 'Any' Priority Code Point: Valid values of PCP are specific(0, 1, 2, 3, 4, 5, 6, 7) or range(0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any'.
  • Page 216: Qos - Storm Control

    Chapter 3: Web Management QoS - Storm Control 3.1.19.11. QoS - Storm Control This page allows you to configure the storm control settings for all switch ports. There is a storm rate control for unicast frames, broadcast frames and unknown (flooded) frames.
  • Page 217: Configuration - Mirroring

    Chapter 3: Web Management Configuration - Mirroring 3.1.20. Configuration - Mirroring Configure port Mirroring on this page. To debug network problems, selected traffic can be copied, or mirrored, on a mirror port where a frame analyzer can be attached to analyze the frame flow. The traffic to be copied on the mirror port is selected as follows: ...
  • Page 218 Chapter 3: Web Management Configuration - Mirroring Note: For a given port, a frame is only transmitted once. It is therefore not possible to mirror mirror port Tx frames. Because of this, mode for the selected mirror port is limited to Disabled or Rx only.
  • Page 219: Configuration - Upnp

    Chapter 3: Web Management GVRP - Global Config 3.1.21. Configuration - UPnP Configure UPnP on this page. Mode Indicates the UPnP operation mode. Possible modes are:  Enabled: Enable UPnP mode operation.  Disabled: Disable UPnP mode operation. When the mode is enabled, two ACEs are added automatically to trap UPNP related packets to CPU.
  • Page 220: Configuration - Gvrp

    Chapter 3: Web Management GVRP - Global Config 3.1.22. Configuration - GVRP 3.1.22.1. GVRP - Global Config This page allows you to configure the basic GVRP Configuration settings for all switch ports. Enable GVRP globally The GVRP feature is enabled by setting the check mark in the checkbox named Enable GVRP.
  • Page 221: Gvrp - Port Config

    Chapter 3: Web Management GVRP - Port Config 3.1.22.2. GVRP - Port Config This page allows you to enable a port for GVRP. Button  Save: Click to save changes.  Reset: Click to undo any changes made locally and revert to previously saved values. User Manual.NGSME16T2H 221...
  • Page 222: Configuration - Sflow

    Chapter 3: Web Management Configuration - sFlow 3.1.23. Configuration - sFlow This page allows for configuring sFlow. The configuration is divided into two parts: Configuration of the sFlow receiver (a.k.a. sFlow collector) and configuration of per-port flow and counter samplers. sFlow configuration is not persisted to non-volatile memory, which means that a reboot or master change will disable sFlow sampling.
  • Page 223 Chapter 3: Web Management Configuration - sFlow Receiver Configuration Owner Basically, sFlow can be configured in two ways: Through local management using the Web or CLI interface or through SNMP. This read-only field shows the owner of the current sFlow configuration and assumes values as follows: ...
  • Page 224 Chapter 3: Web Management Configuration - sFlow Flow Sampler Enabled Enables/disables flow sampling on this port. Flow Sampler Sampling Rate The statistical sampling rate for packet sampling. Set to N to sample on average 1/Nth of the packets transmitted/received on the port. Not all sampling rates are achievable.
  • Page 225: Web Management - Monitor

    Chapter 3: Web Management System - Information 3.2. Web Management - Monitor You can monitor and view system status here. Also, all the settings you’ve made in the Configuration section of the management web page can be viewed here as well. 3.2.1.
  • Page 226 Chapter 3: Web Management System - Information Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Click to refresh the page. User Manual.NGSME16T2H 226...
  • Page 227: System - Cpu Load

    Chapter 3: Web Management System - CPU Load 3.2.1.2. System - CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
  • Page 228: System - Ip Status

    Chapter 3: Web Management System - IP Status 3.2.1.3. System - IP Status This page displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour cache (ARP cache) status. IP Interfaces Interface The name of the interface.
  • Page 229 Chapter 3: Web Management System - IP Status Buttons  Refresh: Click to refresh the page immediately.  Auto-refresh: Check this box to refresh the page automatically. User Manual.NGSME16T2H 229...
  • Page 230: System - Log

    Chapter 3: Web Management System - Log 3.2.1.4. System - Log The switch system log information is provided here. The ID (>= 1) of the system log entry. Level The level of the system log entry. The following level types are supported: ...
  • Page 231: System - Detailed Log

    Chapter 3: Web Management System - Detailed Log 3.2.1.5. System - Detailed Log The switch system detailed log information is provided here. The ID (>= 1) of the system log entry. Message The detailed message of the system log entry. Buttons ...
  • Page 232: Monitor - Green Ethernet

    Chapter 3: Web Management Green Ethernet - Port Power Savings Status 3.2.3. Monitor - Green Ethernet 3.2.3.1. Green Ethernet - Port Power Savings Status This page provides the current status for EEE. Local Port This is the logical port number for this row. Link Shows if the link is up for the port (green = link up, red = link down).
  • Page 233: Monitor - Ports

    Chapter 3: Web Management Ports - Traffic Overview 3.2.4. Monitor - Ports 3.2.4.1. Ports - Traffic Overview This page provides an overview of general traffic statistics for all switch ports. The ports belong to the currently selected stack unit, as reflected by the page header. Port The logical port for the settings contained in the same row.
  • Page 234: Ports - Qos Statistics

    Chapter 3: Web Management Ports - QoS Statistics 3.2.4.2. Ports - QoS Statistics This page provides statistics for the different queues for all switch ports. The ports belong to the currently selected stack unit, as reflected by the page header. Port The logical port for the settings contained in the same row.
  • Page 235: Ports - Qcl Status

    Chapter 3: Web Management Ports - QCL Status 3.2.4.3. Ports - QCL Status This page shows the QCL status by different QCL users. Each row describes the QCE that is defined. It is a conflict if a specific QCE is not applied to the hardware due to hardware limitations.
  • Page 236 Chapter 3: Web Management Ports - QCL Status Buttons  : Select the QCL status from this drop down list.  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Resolve Conflict: Click to release the resources required to add QCL entry, in case the conflict status for any QCL entry is 'yes'.
  • Page 237: Ports - Detailed Statistics

    Chapter 3: Web Management DHCP - Server - Statistics 3.2.4.4. Ports - Detailed Statistics This page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The selected port belongs to the currently selected stack unit, as reflected by the page header.
  • Page 238 Chapter 3: Web Management DHCP - Server - Statistics Rx and Tx Pause A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation. Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes.
  • Page 239 Chapter 3: Web Management DHCP - Server - Statistics Buttons  Refresh: Click to refresh the page immediately.  Clear: Clears the counters for the selected port.  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Note: The port select box determines which port is affected by clicking the buttons.
  • Page 240: Monitor - Dhcp

    Chapter 3: Web Management DHCP - Server - Statistics 3.2.5. Monitor - DHCP 3.2.5.1. DHCP - Server 3.2.5.1.1. DHCP - Server - Statistics This page displays the database counters and the number of DHCP messages sent and received by DHCP server. Database Counters Display counters of various databases.
  • Page 241 Chapter 3: Web Management DHCP - Server - Statistics DHCP Message Received Counters Display counters of DHCP messages received by DHCP server. DISCOVER Number of DHCP DISCOVER messages received. REQUEST Number of DHCP REQUEST messages received. DECLINE Number of DHCP DECLINE messages received. RELEASE Number of DHCP RELEASE messages received.
  • Page 242: Dhcp - Server - Binding

    Chapter 3: Web Management DHCP - Server - Binding 3.2.5.1.2. DHCP - Server - Binding This page displays bindings generated for DHCP clients. Binding IP Address Display all bindings. IP address allocated to DHCP client. Type Type of binding. Possible types are Automatic, Manual, Expired. State State of binding.
  • Page 243: Dhcp - Server - Declined Ip

    Chapter 3: Web Management DHCP - Server - Declined IP 3.2.5.1.3. DHCP - Server - Declined IP This page displays declined IP addresses. Declined IP Addresses Display IP addresses declined by DHCP clients. Declined IP List of IP addresses declined. Buttons ...
  • Page 244: Dhcp - Snooping Table

    Chapter 3: Web Management DHCP - Snooping Table 3.2.5.2. DHCP - Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses.
  • Page 245 Chapter 3: Web Management DHCP - Snooping Table Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Refreshes the displayed table starting from the input fields.  Clear: Flushes all dynamic entries. ...
  • Page 246: Dhcp - Relay Statistics

    Chapter 3: Web Management DHCP - Relay Statistics 3.2.5.3. DHCP - Relay Statistics This page provides statistics for DHCP relay. Server Statistics Transmit to Server The number of packets that are relayed from client to server. Transmit Error The number of packets that resulted in errors while being sent to clients. Receive from Server The number of packets received from server.
  • Page 247 Chapter 3: Web Management DHCP - Relay Statistics Receive Agent Option The number of received packets with relay agent information option. Replace Agent Option The number of packets which were replaced with relay agent information option. Keep Agent Option The number of packets whose relay agent information was retained. Drop Agent Option The number of packets that were dropped which were received with relay agent information.
  • Page 248: Dhcp - Detailed Statistics

    Chapter 3: Web Management Ports - Detailed Statistics 3.2.5.4. DHCP - Detailed Statistics This page provides statistics for DHCP snooping. Notice that the normal forward per-port TX statistics isn't increased if the incoming DHCP packet is done by L3 forwarding mechanism. And clear the statistics on specific port may not take effect on global statistics since it gathers the different layer overview.
  • Page 249 Chapter 3: Web Management Ports - Detailed Statistics Rx and Tx Lease Unassigned The number of lease unassigned (option 53 with value 11) packets received and transmitted. Rx and Tx Lease Unknown The number of lease unknown (option 53 with value 12) packets received and transmitted. Rx and Tx Lease Active The number of lease active (option 53 with value 13) packets received and transmitted.
  • Page 250: Monitor - Security

    Chapter 3: Web Management Security - Access Management Statistics 3.2.6. Monitor - Security 3.2.6.1. Security - Access Management Statistics This page provides statistics for access management. Interface The interface type through which the remote host can access the switch. Received Packets Number of received packets from the interface when access management mode is enabled.
  • Page 251: Security - Network

    Chapter 3: Web Management Security - Network - Port Security - Switch 3.2.6.2. Security - Network 3.2.6.2.1. Security - Network - Port Security - Switch This page shows the Port Security status. Port Security is a module with no direct configuration.
  • Page 252 Chapter 3: Web Management Security - Network - Port Security - Switch Port The port number for which the status applies. Click the port number to see the status for this particular port. Users Each of the user modules has a column that shows whether that module has enabled Port Security or not.
  • Page 253: Security - Network - Port Security - Port

    Chapter 3: Web Management Security - Network - Port Security - Port 3.2.6.2.2. Security - Network - Port Security - Port This page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules.
  • Page 254: Security - Network - Nas - Switch

    Chapter 3: Web Management Security - Network - NAS - Switch 3.2.6.2.3. Security - Network - NAS - Switch This page provides an overview of the current NAS port states for the selected switch. Port The switch port number. Click to navigate to detailed NAS statistics for this port. Admin State The port's current administrative state.
  • Page 255 Chapter 3: Web Management Security - Network - NAS - Switch QoS Class QoS Class assigned to the port by the RADIUS server if enabled. Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS.
  • Page 256: Security - Network - Nas - Port

    Chapter 3: Web Management Security - Network - NAS - Port 3.2.6.2.5. Security - Network - NAS - Port This page provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics only.
  • Page 257 Chapter 3: Web Management Security - Network - NAS - Port Port Counters EAPOL Counters These supplicant frame counters are available for the following administrative states:  Force Authorized  Force Unauthorized  Port-based 802.1X  Single 802.1X  Multi 802.1X User Manual.NGSME16T2H 257...
  • Page 258 Chapter 3: Web Management Security - Network - NAS - Port Backend Server Counters These backend (RADIUS) frame counters are available for the following administrative states:  Port-based 802.1X  Single 802.1X  Multi 802.1X  MAC-based Auth. User Manual.NGSME16T2H 258...
  • Page 259 Chapter 3: Web Management Security - Network - NAS - Port Last Supplicant/Client Info Information about the last supplicant/client that attempted to authenticate. This information is available for the following administrative states:  Port-based 802.1X  Single 802.1X  Multi 802.1X ...
  • Page 260 Chapter 3: Web Management Security - Network - NAS - Port MAC Address For Multi 802.1X, this column holds the MAC address of the attached supplicant. For MAC-based Auth., this column holds the MAC address of the attached client. Clicking the link causes the client's Backend Server counters to be shown in the Selected Counters table.
  • Page 261: Security - Network - Acl Status

    Chapter 3: Web Management Security - Network - ACL Status 3.2.6.2.6. Security - Network - ACL Status This page shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations.
  • Page 262 Chapter 3: Web Management Security - Network - ACL Status Forward packet that matched the specific ACE to CPU. Counter The counter indicates the number of times the ACE was hit by a frame. Conflict Indicates the hardware status of the specific ACE. The specific ACE is not applied to the hardware due to hardware limitations.
  • Page 263: Security - Network - Arp Inspection

    Chapter 3: Web Management Security - Network - ARP Inspection 3.2.6.2.7. Security - Network - ARP Inspection Entries in the Dynamic ARP Inspection Table are shown on this page. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address.
  • Page 264 Chapter 3: Web Management Security - Network - ARP Inspection Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Refreshes the displayed table starting from the input fields.  Clear: Flushes all dynamic entries. ...
  • Page 265: Security - Network - Ip Source Guard

    Chapter 3: Web Management Security - Network - ARP Inspection 3.2.6.2.8. Security - Network - IP Source Guard Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by MAC address.
  • Page 266 Chapter 3: Web Management Security - Network - ARP Inspection  Refresh: Refreshes the displayed table starting from the input fields.  Clear: Flushes all dynamic entries.  << : Updates the table starting from the first entry in the Dynamic IP Source Guard Table.
  • Page 267 Chapter 3: Web Management Security - Network - IP Source Guard 3.2.6.2.10. Security - Network - IP Source Guard Entries in the Dynamic IP Source Guard Table are shown on this page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by MAC address.
  • Page 268 Chapter 3: Web Management Security - Network - IP Source Guard  Clear: Flushes all dynamic entries.  |<<: Updates the table starting from the first entry in the Dynamic IP Source Guard Table.  >>: Updates the table, starting with the entry after the last entry currently displayed. User Manual.NGSME16T2H 268...
  • Page 269: Security - Aaa

    Chapter 3: Web Management Security - AAA - RADIUS Overview 3.2.6.3. Security - AAA 3.2.6.3.1. Security - AAA - RADIUS Overview This page provides an overview of the status of the RADIUS servers configurable on the Authentication configuration page. RADIUS Authentication Servers The RADIUS server number.
  • Page 270 Chapter 3: Web Management Security - AAA - RADIUS Overview RADIUS Accounting Servers The RADIUS server number. Click to navigate to detailed statistics for this server. IP Address The IP address and UDP port number (in <IP Address>:<UDP Port> notation) of this server.
  • Page 271: Security - Aaa - Radius Details

    Chapter 3: Web Management Security - AAA - RADIUS Details 3.2.6.3.2. Security - AAA - RADIUS Details This page provides detailed statistics for a particular RADIUS server. RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
  • Page 272 Chapter 3: Web Management Security - AAA - RADIUS Details User Manual.NGSME16T2H 272...
  • Page 273 Chapter 3: Web Management Security - AAA - RADIUS Details Other Info This section contains information about the state of the server and the latest round-trip time. RADIUS Accounting Statistics The statistics map closely to those specified in RFC4670 - RADIUS Accounting Client MIB. Use the server select box to switch between the backend servers to show details for.
  • Page 274 Chapter 3: Web Management Security - AAA - RADIUS Details Other Info This section contains information about the state of the server and the latest round-trip time. Buttons The server select box determines which server is affected by clicking the buttons. ...
  • Page 275: Security - Switch - Rmon

    Chapter 3: Web Management Security - Switch - RMON - Statistics 3.2.6.4. Security - Switch - RMON 3.2.6.4.1. Security - Switch - RMON - Statistics This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page"...
  • Page 276 Chapter 3: Web Management Security - Switch - RMON - Statistics CRC Errors The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
  • Page 277 Chapter 3: Web Management Security - Switch - RMON - Statistics Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Click to refresh the page immediately.  |<<: Updates the table starting from the first entry in the Statistics table, i.e. the entry with the lowest ID.
  • Page 278: Security - Switch - Rmon - History

    Chapter 3: Web Management Security - Switch - RMON - History 3.2.6.4.2. Security - Switch - RMON - History This page provides an overview of RMON History entries. Each page shows up to 99 entries from the History table, default being 20, selected through the "entries per page" input field.
  • Page 279 Chapter 3: Web Management Security - Switch - RMON - History Multicast The total number of good packets received that were directed to a multicast address. CRCErrors The total number of packets received that had a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error).
  • Page 280: Security - Switch - Rmon - Alarm

    Chapter 3: Web Management Security - Switch - RMON - Alarm 3.2.6.4.3. Security - Switch - RMON - Alarm This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field.
  • Page 281 Chapter 3: Web Management Security - Switch - RMON - Alarm Rising Index Rising event index. Falling Threshold Falling threshold value. Falling Index Falling event index. Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. ...
  • Page 282: Security - Switch - Rmon - Events

    Chapter 3: Web Management Security - Switch - RMON - Events 3.2.6.4.4. Security - Switch - RMON - Events This page provides an overview of RMON Event table entries.Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field.
  • Page 283: Monitor - Lacp

    Chapter 3: Web Management LACP - System Status 3.2.7. Monitor - LACP 3.2.7.1. LACP - System Status This page provides a status overview for all LACP instances. Aggr ID The Aggregation ID associated with this aggregation instance. For LLAG the id is shown as 'isid:aggr-id' and for GLAGs as 'aggr-id' Partner System ID The system ID (MAC address) of the aggregation partner.
  • Page 284: Lacp - Port Status

    Chapter 3: Web Management LACP - Port Status 3.2.7.2. LACP - Port Status This page provides a status overview for LACP status for all ports. Port The switch port number. LACP 'Yes' means that LACP is enabled and the port link is up. 'No' means that LACP is not enabled or that the port link is down.
  • Page 285: Lacp - Port Statistics

    Chapter 3: Web Management LACP - Port Statistics 3.2.7.3. LACP - Port Statistics This page provides an overview for LACP statistics for all ports. Port The switch port number. LACP Received Shows how many LACP frames have been received at each port. LACP Transmitted Shows how many LACP frames have been sent from each port.
  • Page 286: Monitor - Loop Protection

    Chapter 3: Web Management Monitor - Loop Protection 3.2.8. Monitor - Loop Protection This page displays the loop protection port status the ports of the currently selected switch. Port The switch port number of the logical port. Action The currently configured port action. Transmit The currently configured port transmit mode.
  • Page 287: Monitor - Spanning Tree

    Chapter 3: Web Management Spanning Tree - Bridge Status 3.2.9. Monitor - Spanning Tree 3.2.9.1. Spanning Tree - Bridge Status This page provides a status overview of all STP bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: MSTI The Bridge Instance.
  • Page 288: Spanning Tree - Port Status

    Chapter 3: Web Management Spanning Tree - Port Status 3.2.9.2. Spanning Tree - Port Status This page displays the STP CIST port status for physical ports of the switch. Port The switch port number of the logical STP port. CIST Role The current STP port role of the CIST port.
  • Page 289: Spanning Tree - Port Statistics

    Chapter 3: Web Management Spanning Tree - Port Statistics 3.2.9.3. Spanning Tree - Port Statistics This page displays the STP port statistics counters of bridge ports in the currently selected switch. Port The switch port number of the logical STP port. MSTP The number of MSTP BPDU's received/transmitted on the port.
  • Page 290: Monitor - Mvr

    Chapter 3: Web Management MVR - Statistics 3.2.10. Monitor - MVR 3.2.10.1. MVR - Statistics This page provides MVR Statistics information. The statistics is related to the currently selecting stack unit, as reflected by the page header. VLAN ID The Multicast VLAN ID. IGMP/MLD Queries Received The number of Received Queries for IGMP and MLD, respectively.
  • Page 291: Mvr - Mvr Channel Groups

    Chapter 3: Web Management MVR - MVR Channel Groups 3.2.10.2. MVR - MVR Channel Groups Entries in the MVR Channels (Groups) Information Table are shown on this page. The MVR Channels (Groups) Information Table is sorted first by VLAN ID, and then by group. Navigating the MVR Channels (Groups) Information Table Each page shows up to 99 entries from the MVR Group table, default being 20, selected through the "entries per page"...
  • Page 292: Mvr - Mvr Sfm Information

    Chapter 3: Web Management MVR - MVR SFM Information 3.2.10.3. MVR - MVR SFM Information Entries in the MVR SFM Information Table are shown on this page. The MVR SFM (Source- Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information.
  • Page 293 Chapter 3: Web Management MVR - MVR SFM Information for filtering to be 128. When there is no any source filtering address, the text "None" is shown in the Source Address field. Type Indicates the Type. It can be either Allow or Deny. Hardware Filter/Switch Indicates whether data plane destined to the specific group address from the source IPv4/IPv6 address could be handled by chip or not.
  • Page 294: Monitor - Ipmc

    Chapter 3: Web Management IPMC - IGMP Snooping - Status 3.2.11. Monitor - IPMC 3.2.11.1. IPMC - IGMP Snooping 3.2.11.1.1. IPMC - IGMP Snooping - Status This page provides IGMP Snooping status. The status related to the currently selected stack unit, as reflected by the page header. VLAN ID The VLAN ID of the entry.
  • Page 295 Chapter 3: Web Management IPMC - IGMP Snooping - Status Router Port Display which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier. Static denotes the specific port is configured to be a router port.
  • Page 296: Ipmc - Igmp Snooping - Groups Information

    Chapter 3: Web Management IPMC - IGMP Snooping - Groups Information 3.2.11.1.2. IPMC - IGMP Snooping - Groups Information Entries in the IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. Navigating the IGMP Group Table Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per page"...
  • Page 297: Ipmc - Igmp Snooping - Ipv4 Sfm Information

    Chapter 3: Web Management IPMC - IGMP Snooping - IPv4 SFM Information 3.2.11.1.3. IPMC - IGMP Snooping - IPv4 SFM Information Entries in the IGMP SFM Information Table are shown on this page. The IGMP SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information.
  • Page 298 Chapter 3: Web Management IPMC - IGMP Snooping - IPv4 SFM Information Type Indicates the Type. It can be either Allow or Deny. Hardware Filter/Switch Indicates whether data plane destined to the specific group address from the source IPv4 address could be handled by chip or not. Buttons ...
  • Page 299: Ipmc - Mld Snooping

    Chapter 3: Web Management IPMC - MLD Snooping - Status 3.2.11.2. IPMC - MLD Snooping 3.2.11.2.1. IPMC - MLD Snooping - Status This page provides MLD Snooping status. The status related to the currently selected stack unit, as reflected by the page header. VLAN ID The VLAN ID of the entry.
  • Page 300 Chapter 3: Web Management IPMC - MLD Snooping - Status Static denotes the specific port is configured to be a router port. Dynamic denotes the specific port is learnt to be a router port. Both denote the specific port is configured or learnt to be a router port. Port Switch port number.
  • Page 301: Ipmc - Mld Snooping - Groups Information

    Chapter 3: Web Management IPMC - MLD Snooping - Groups Information 3.2.11.2.2. IPMC - MLD Snooping - Groups Information Entries in the MLD Group Table are shown on this page. The MLD Group Table is sorted first by VLAN ID, and then by group. Navigating the MLD Group Table Each page shows up to 99 entries from the MLD Group table, default being 20, selected through the "entries per page"...
  • Page 302: Ipmc - Mld Snooping - Ipv6 Sfm Information

    Chapter 3: Web Management IPMC - MLD Snooping - IPv6 Group Information 3.2.11.2.3. IPMC - MLD Snooping - IPv6 SFM Information Entries in the MLD SFM Information Table are shown on this page. The MLD SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information.
  • Page 303 Chapter 3: Web Management IPMC - MLD Snooping - IPv6 Group Information Source Address IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128. Type Indicates the Type. It can be either Allow or Deny. Hardware Filter/Switch Indicates whether data plane destined to the specific group address from the source IPv6 address could be handled by chip or not.
  • Page 304: Monitor - Lldp

    Chapter 3: Web Management LLDP - Neighbours 3.2.12. Monitor - LLDP 3.2.12.1. LLDP - Neighbours This page provides a status overview for all LLDP neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. The columns hold the following information: Local Port The port on which the LLDP frame was received.
  • Page 305 Chapter 3: Web Management LLDP - Neighbours Management Address Management Address is the neighbour unit's address that is used for higher layer entities to assist discovery by the network management. This could for instance hold the neighbour's IP address. Buttons ...
  • Page 306: Lldp - Lldp-Med Neighbours

    Chapter 3: Web Management LLDP - LLDP-MED Neighbours 3.2.12.2. LLDP - LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. This function applies to VoIP devices which support LLDP-MED.
  • Page 307 Chapter 3: Web Management LLDP - LLDP-MED Neighbours LLDP-MED Generic Endpoint (Class I) The LLDP-MED Generic Endpoint (Class I) definition is applicable to all endpoint products that require the base LLDP discovery services defined in TIA-1057, however do not support IP media or act as an end-user communication appliance.
  • Page 308 Chapter 3: Web Management LLDP - LLDP-MED Neighbours 5. Extended Power via MDI - PD 6. Inventory 7. Reserved Application Type Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device. The possible application types are shown below.
  • Page 309 Chapter 3: Web Management LLDP - LLDP-MED Neighbours TAG is indicative of whether the specified application type is using a tagged or an untagged VLAN. Can be Tagged or Untagged.  Untagged: The device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802.1Q-2003.
  • Page 310: Lldp - Poe

    Chapter 3: Web Management LLDP - PoE 3.2.12.3. LLDP - PoE This page provides a status overview for all LLDP PoE neighbours. The displayed table contains a row for each port on which an LLDP PoE neighbour is detected. The columns hold the following information: Local Port The port for this switch on which the LLDP frame was received.
  • Page 311 Chapter 3: Web Management LLDP - PoE is represented as "reserved" Buttons  Auto-refresh: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.  Refresh: Click to refresh the page. User Manual.NGSME16T2H 311...
  • Page 312: Lldp - Eee

    Chapter 3: Web Management LLDP - EEE 3.2.12.4. LLDP - EEE By using EEE power savings can be achieved at the expense of traffic latency. This latency occurs due to that the circuits EEE turn off to save power, need time to boot up before sending traffic over the link.
  • Page 313 Chapter 3: Web Management LLDP - EEE Echo Rx Tw The link partner's Echo Rx Tw value. Resolved Tx Tw The resolved Tx Tw for this link. Note : NOT the link partner The resolved value that is the actual "tx wakeup time " used for this link (based on EEE information exchanged via LLDP).
  • Page 314: Lldp - Port Statistics

    Chapter 3: Web Management LLDP - Port Statistic 3.2.12.5. LLDP - Port Statistics This page provides an overview of all LLDP traffic. Two types of counters are shown. Global counters are counters that refer to the whole stack, while local counters refer to per port counters for the currently selected switch. Global Counters Neighbour entries were last changed Shows the time when the last entry was last deleted or added.
  • Page 315 Chapter 3: Web Management LLDP - Port Statistic Frames Discarded If an LLDP frame is received on a port, and the switch's internal table has run full, the LLDP frame is counted and discarded. This situation is known as "Too Many Neighbours" in the LLDP standard.
  • Page 316: Monitor - Poe

    Chapter 3: Web Management Monitor - PoE 3.2.13. Monitor - PoE This page allows the user to inspect the current status for all PoE ports. Local Port This is the logical port number for this row. PD Class Each PD is classified according to a class that defines the maximum power the PD will use. The PD Class shows the PDs class.
  • Page 317 Chapter 3: Web Management Monitor - PoE PDs exceeds the maximum power the Power Supply can deliver, and port(s) with the lowest priority is/are powered down.  No PD detected - No PD detected for the port.  PoE turned OFF - PD overload - The PD has requested or used more power than the port can deliver, and is powered down.
  • Page 318: Monitor - Mac Table

    Chapter 3: Web Management Monitor - MAC Table 3.2.14. Monitor - MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Navigating the MAC Table Each page shows up to 999 entries from the MAC table, default being 20, selected through the "entries per page"...
  • Page 319 Chapter 3: Web Management Monitor - MAC Table Port Members The ports that are members of the entry. Buttons  Auto-refresh: Automatic refresh occurs every 3 seconds.  Refresh: Refreshes the displayed table starting from the "Start from MAC address" and "VLAN"...
  • Page 320: Monitor - Vlans

    Chapter 3: Web Management VLANs - VLAN Membership 3.2.15. Monitor - VLANs 3.2.15.1. VLANs - VLAN Membership This page provides an overview of membership status of VLAN users. VLAN User Various internal software modules may use VLAN services to configure VLAN memberships on the fly.
  • Page 321 Chapter 3: Web Management VLANs - VLAN Membership The “>>” button will use the last entry of the currently displayed VLAN entry as a basis for the next lookup. When the end is reached, the text "No data exists for the selected user" is shown in the table.
  • Page 322: Vlans - Vlan Ports

    Chapter 3: Web Management VLANs - VLAN Ports 3.2.15.2. VLANs - VLAN Ports This page provides VLAN Port Status. VLAN User Various internal software modules may use VLAN services to configure VLAN port configuration on the fly. The drop-down list on the right allows for selecting between showing VLAN memberships as configured by an administrator (Admin) or as configured by one of these internal software modules.
  • Page 323 Chapter 3: Web Management VLANs - VLAN Ports Shows the Port VLAN ID (PVID) that a given user wants the port to have. The field is empty if not overridden by the selected user. Tx Tag Shows the Tx Tag requirements (Tag All, Tag PVID, Tag UVID, Untag All, Untag PVID, Untag UVID) that a given user has on a port.
  • Page 324: Monitor - Sflow

    Chapter 3: Web Management Monitor - sFlow 3.2.16. Monitor - sFlow This page shows receiver and per-port sFlow statistics. Receiver Statistics Owner This field shows the current owner of the sFlow configuration. It assumes one of three values as follows: ...
  • Page 325 Chapter 3: Web Management Monitor - sFlow The total number of flow samples sent to the sFlow receiver. Counter Samples The total number of counter samples sent to the sFlow receiver. Port Statistics Port The port number for which the following statistics applies. Rx and Tx Flow Samples The number of flow samples sent to the sFlow receiver originating from this port.
  • Page 326: Web Management - Diagnostics

    Chapter 3: Web Management Diagnostics - Ping 3.3. Web Management - Diagnostics This section of the management web page provides you tools for diagnosing your network. 3.3.1. Diagnostics - Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press the “Start”...
  • Page 327 Chapter 3: Web Management Diagnostics - Ping Buttons  Start: Click to start transmitting ICMP packets.  New Ping: Click to re-start diagnostics with PING. User Manual.NGSME16T2H 327...
  • Page 328: Diagnostics - Ping6

    Chapter 3: Web Management Diagnostics - Ping6 3.3.2. Diagnostics - Ping6 This page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. After you press the “Start” button, ICMPv6 packets are transmitted, and the sequence number and round trip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs.
  • Page 329 Chapter 3: Web Management Diagnostics - Ping6 Egress Interface (Only for IPv6) The VLAN ID (VID) of the specific egress IPv6 interface which ICMP packet goes. The given VID ranges from 1 to 4094 and will be effective only when the corresponding IPv6 interface is valid.
  • Page 330: Diagnostics - Veriphy

    Chapter 3: Web Management Diagnostics - VeriPHY 3.3.3. Diagnostics - VeriPHY This page is used for running the VeriPHY Cable Diagnostics for 10/100 and 1G copper ports. Press the “Start” button to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds.
  • Page 331 Chapter 3: Web Management Diagnostics - VeriPHY  Cross D - Abnormal cross-pair coupling with pair D Length:  The length (in meters) of the cable pair. The resolution is 3 meters User Manual.NGSME16T2H 331...
  • Page 332: Web Management - Maintenance

    Chapter 3: Web Management Maintenance - Restart Device 3.4. Web Management - Maintenance Here you can make system maintenance such rebooting the PoE switch, reset all settings (except Switch’s IP address) back to default value, updating switch firmware, or upload/download all system settings. 3.4.1.
  • Page 333: Maintenance - Factory Defaults

    Chapter 3: Web Management Maintenance - Factory Defaults 3.4.2. Maintenance - Factory Defaults You can reset the configuration of the stack on this page. Only the IP configuration is retained. The new configuration is available immediately, which means that no restart is necessary. Buttons ...
  • Page 334: Maintenance - Software

    Chapter 3: Web Management Maintenance - Software - Image Select 3.4.3. Maintenance - Software 3.4.3.1. Software - Upload You can update the switch’s firmware here. Buttons  Choose File: Click this button to choose the firmware file.  Update: Click this button to start upload the firmware. The system will inform you when the new firmware is uploaded to the switch.
  • Page 335: Software - Image Select

    Chapter 3: Web Management Maintenance - Software - Image Select 3.4.3.2. Software - Image Select This page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web page displays two tables with information about the active and alternate firmware images.
  • Page 336: Maintenance - Configuration

    Chapter 3: Web Management Configuration - Save Startup-config 3.4.4. Maintenance - Configuration You can manage the system configuration files here in this section. The switch stores its system settings in a number of text files in CLI format. There are three system files: ...
  • Page 337: Configuration - Download

    Chapter 3: Web Management Configuration - Download 3.4.4.2. Configuration - Download File Name Here you can choose the configuration file you would like to save to your PC, including:  Running-config  Startup-config  Default-config Buttons  Download Configuration: Click this button to save the configuration you chose. User Manual.NGSME16T2H 337...
  • Page 338: Configuration - Upload

    Chapter 3: Web Management Configuration - Upload 3.4.4.3. Configuration - Upload You can upload a configuration file here and replace it with all other configuration files saved on the switch (except default-config, which is read-only). File to Upload To select the configuration file you would like to upload to the switch from your PC, please press the Choose File button and choose the configuration file.
  • Page 339: Configuration - Activate

    Chapter 3: Web Management Configuration - Activate 3.4.4.4. Configuration - Activate Here you can choose the configuration file that will be activated immediately. Please note that although the configuration file you choose here will be activated and run as the current configuration setting, it will not be saved as the startup-config automatically.
  • Page 340: Configuration - Delete

    Chapter 3: Web Management Configuration - Load 3.4.4.5. Configuration - Delete Here you can delete the configuration files saved on the switch. File Name Choose the configuration file that you would like to delete here. Buttons  Delete Configuration File: Click this button to delete the configuration you chose. User Manual.NGSME16T2H 340...
  • Page 341: Appendix A: Product Safety

    Appendix A: Product Safety Appendix A: Product Safety This appendix describes safety issues regarding to this product. To use this product safely, it is highly recommended to read this appendix before installing and using this product. Failure to follow these precautions and warnings might cause product malfunction, electrical shock, or even fire.
  • Page 342: Appendix B: Ip Configuration For Your Pc

    Appendix B: IP Configuration for Your PC Appendix B: IP Configuration for Your PC This appendix describes how to set the IP address of your PC so you can connect to product configuration webpage. The configuration webpage allows you to set system variables or monitor system status.
  • Page 343 Appendix B: IP Configuration for Your PC An Ethernet Status window will pop up. Please click on the Properties button as shown in the figure down below. An Ethernet Properties window will pop up. Please double click on the Internet Protocol Version 4 (TCP/IPv4).
  • Page 344 Appendix B: IP Configuration for Your PC An Internet Protocol Version 4 (TCP/IPv4) Properties window will pop up. Please set your PC’s IP address and subnet mask as shown in the figure down below. By default, your product’s IP address should be 192.168.2.1.You can set any IP address as long as it’s not the same with your product’s IP address and is in the same network segment with your product’s IP address.
  • Page 345: Revision History

    Revision History Revision History Version Firmware Ver. Date Remark Ver 1.0 V150226 2016/04/22 First version. 1. Page 15, change specification regarding to trunk Ver 2.1 V160830 2017/06/24 group number and IGMP group number. 2. Remove VCL chapter from Monitor section. 1.

This manual is also suitable for:

Ngsme16t2h

Table of Contents