Eneo IAR-7SE2024MMA User Manual

Gigabit switch, managed, 250w, 24x poe, 4x sfp, 1000mbps, wall-/rack mounting, desktop
Hide thumbs Also See for IAR-7SE2024MMA:

Advertisement

Quick Links

EN
User Manual
Gigabit Switch, Managed, 250W,
24x PoE, 4x SFP, 1000Mbps,
Wall-/Rack mounting, Desktop
IAR-7SE2024MMA

Advertisement

Table of Contents
loading

Summary of Contents for Eneo IAR-7SE2024MMA

  • Page 1 User Manual Gigabit Switch, Managed, 250W, 24x PoE, 4x SFP, 1000Mbps, Wall-/Rack mounting, Desktop IAR-7SE2024MMA...
  • Page 2 About This Document Web-based Configuration Guide, This document including network management system (short for Web system) configuration instructions. It is intended for engineers or anyone who needs to configure the switch by Web system. Announcement The information in this document is subject to change without notice. The document is only used as operation guide, except for other promises.
  • Page 3: Table Of Contents

    Content Configuration Instruction ......................1 Environments Requirements ....................2 Hardware Requirements ....................2 Software Requirements ...................... 2 Set Static IP for the Management Computer ..............3 Confirm the Network Connection by Ping Command ............5 Cancel the Proxy Server ....................5 Login and Start ........................
  • Page 4 12.3 Email Alarm ........................43 12.4 IGMP Snooping ........................44 12.5 DHCP ..........................45 12.6 DHCP Relay ........................47 12.7 DHCPv6 Snooping ......................48 12.8 Telnet Setting ........................49 13.1 Flow Statistics ........................50 13.2 MAC Table .......................... 51 14.1 IP Address .......................... 52 14.2 User Management ......................
  • Page 5: Configuration Instruction

    Configuration Instruction To facilitate configuration and the maintenance of the switch, the Web system is provided to users. You can log in the Web system to configure and maintain devices through the graphic user interface (GUI). The Web-based configuration guide describes the configuration and maintenance of the switch through the Web system.
  • Page 6: Environments Requirements

    Environments Requirements 2.1 Hardware Requirements The management PC recommended as below.  Make sure the management PC has already been with Ethernet port.  Use a network cable to connect the Ethernet port of PC and the Ethernet port of the switch. 2.2 Software Requirements The browser version recommend as below.
  • Page 7: Set Static Ip For The Management Computer

    Set Up Network Connection Before login the Web system to start configuration, users need to set up the network connection as follow steps.  Set the IP of the PC and the switch in the same network segment. The default IP address of the switch is 192.168.1.200, network gate is 255.255.255.0.
  • Page 8  Click <Property> button, enter <Local Area Connection Property> window.  Select <Internet Protocol (TCP/IP)>, click <Property> button, enter <Internet Protocol (TCP/IP) Properties> window. Select the option <Use the following IP address>, input IP address (use arbitrary value between 192.168.1.1~ 192.168.1.254, except 192.168.1.200) and the subnet mask (255.255.255.0).
  • Page 9: Confirm The Network Connection By Ping Command

    3.2 Confirm the Network Connection by Ping Command Operation Steps as below:  Click <Start> button to enter <Start> menu, select <Run>, popping out the dialog.  Input "ping 192.168.1.200", and press enter. If there is equipment response displaying in the pop out dialog, that means network connection succeed, otherwise please check if the network connection is correct.
  • Page 10  Select <Connections> tab in <Internet Options> window, and click <LAN Setting> button.  Check if the <Use a proxy server for your LAN> option is selected. If selected, please deselect the option. Then click <OK> button. Note: · Please follow the steps to check if the switch is installed correctly: ·...
  • Page 11: Login And Start

    Login the Web System 4.1 Login and Start Open the browser, input the switch default address. Press Enter, the user login page will show in front of you as follows. Items Default value Switch default address 192.168.1.200 Subnet mask 255.255.255.0 Administrator’s account admin Administrator’s password...
  • Page 12: Web System User Interface

    4.2 Web System User Interface Interface Layout The layout and style of the Web system client GUI are described as follows. Items Descriptions Language setting area Navigation tree Your Position Configuration area Operation Field and Buttons The elements that users usually use on the Web system GUI are described as follows. Items Descriptions Input box.
  • Page 13: Saving Configuration

    Refresh button. Click to reload the page. 4.3 Saving Configuration After performing configuration, users need to save the configuration data. If you do not save the configuration data, the configuration that you made will be lost after reboot. To save configurations, please click the <Save> button at the bottom of the page to save the configuration data to memory.
  • Page 14 System Status This chapter describes system status configuration. Users can configure system status and view the configuration information. By default the switch supports local time setting. Procedure Choose <System Management> <Time> in the navigation tree to open the page.  Local time.
  • Page 15: Port Setting

    Port Setting This chapter describes Ethernet interface configurations. Users can configure the interfaces and view configuration information. The switch provides Ethernet interfaces, Gigabit Ethernet interfaces. Configure these interfaces as required. 6.1 Port Setting Procedure Choose <Port Setting> <Port Setting> in the navigation tree to open the page. ...
  • Page 16: Storm

    · 10 Gbits/s (please refer to the actual switch) When the port rate is auto negotiation, the port can automatically and directly connected the device on the other side to negotiate the port speed. Duplex Mode Indicates the duplex mode of the interface, including Auto Negotiation ·...
  • Page 17: Speed Limit

    Procedure Choose <Port Setting> <Storm> in the navigation tree to open the page.  Configure the interfaces. Set the parameters as required. Items Descriptions Default value Port Range Select the ports that need to be set. Multiple interfaces Null can be selected. Broadcast Configure the broadcast storm control.
  • Page 18 Procedure Choose <Port Setting> <Speed Limit> in the navigation tree to open the page.  Enable the function.  Configure the interfaces. Items Descriptions Default value Port Range Select the ports that need to be set. Multiple interfaces Null can be selected. Input Speed The max input rate of port.
  • Page 19: Power Control

    This chapter describes PoE (Power-over-Ethernet) configurations. Users can configure the output power of the switch and the interfaces. This chapter only applies to the switches that support PoE function. 7.1 Power Control Currently, the network devices are deployed flexibly; therefore, the cabling of power supply is complicated.
  • Page 20 Overload Limit The limit percentage that allows over the preset <Power Provided> value. The value is less than 10%. This parameter is optional. Reserved Rate Input the reserved rate from the preset <Power Provided> value. The value ranges from 0 to 100%. The switch supports reserved power function for reliability.
  • Page 21: Schedule

    7.2 Schedule The PoE function of each interface can be set to restart and work regularly. The function is disable by default. Procedure Choose <PoE> <Schedule> in the navigation tree to open the page.  Enable the function. Configure the restarting and working schedule type of the switch and Set the parameters as required.
  • Page 22 Enable/disable Choose enable to enable the function. Disable Week Select on which day of the week the PoE function of Null selected interfaces restart. Multiple days can be selected. Time Set the restart time, the format is as 13:00, the function Null will restart at 13:00:59.
  • Page 23: Port Vlan

    VLAN This chapter describes how to configure and query VLANs. A local area network (LAN) can be divided into several logical LANs. Each logical LAN is a broadcast domain, which is called a virtual LAN (VLAN). To put it simply, devices on a LAN are logically grouped into different LAN segments, regardless of their physical locations.
  • Page 24: Vlan Forward

    · Trunk: ports belonging to multiple VLAN, can receive and send multiple VLAN packets. Default VLAN Input the default VLAN ID of the interface. Null The value ranges from 1 to 4094. Note: If the VLAN ID of the port changes, the VLAN ID of the switch connecting with this port must be changed to the same.
  • Page 25: Mac-Based Vlan

    8.3 MAC-based VLAN The switch supports to divide VLAN based on MAC address of the devices. Dividing VLAN based on MAC address. In this way, the security of users can be further improved (the VLAN configuration will not be easily changed illegally). The function is disable by default.
  • Page 26    RARP  IPv6  PPPoE  MPLS  IS-IS  LACP  802.1x Procedure Choose <VLAN> <Protocol-based VLAN> in the navigation tree to open the page.  Enable the function.  Create a VLAN. Items Descriptions Default value Ethernet Choose the protocol.
  • Page 27: Qinq

     Delete a VLAN. Select the VLAN that need to be deleted. Click <Delete>. Click <Save>. 8.5 QinQ The switch supports QinQ function. 802.1Q-in-802.1Q (QinQ) technology improves VLAN utilization by adding another 802.1Q tag to a frame with an 802.1Q tag. In this case, frames from private VLAN tags can be transparently transmitted on the public network.
  • Page 28: Pvlan

    · Customer: user’s VLAN Click <Setting>. Click <Save>. 8.6 PVLAN The switch supports to divide PVLAN (private VLAN). Two kinds of VLAN of PVLAN:  Primary VLAN: Transmit traffic from the promiscuous port to the isolation, community, and other main promiscuous ports within the same VLAN. ...
  • Page 29  Add a primary VLAN. Items Descriptions Default value Primary VLAN Setting Input the VLAN ID of primary VLAN. Null The value ranges from 1 to 4094. Select the port range of the promiscuous VLAN. Belonging to "Primary VLAN", a promiscuous port can Promiscuous communicate with all interfaces, including isolated and Null...
  • Page 30: Qos Setting

    This chapter describes QoS (Quality of Service) and DSCP (Differentiated Services Code Point) configuration. 9.1 QoS Setting QoS is a common concept in various occasions where there is a relationship between supply and demand of services. It evaluates the ability of service providers to meet customer needs. In Internet, QoS evaluates the service capability of network forwarding packet.
  • Page 31: Dscp

    9.2 DSCP Configure DSCP to maps DSCP priorities of packets to new DSCP priorities so that it can provide differentiated services. The function is disable by default. CAUTION This function does not supports setting when the QoS setting and 802.1p Priority Mapping function are disable.
  • Page 32: Trunk

    LACP 10.1 TRUNK Link aggregation is a technology that bundles multiple Ethernet links into a logical link to increase bandwidth, improve reliability, and load balance traffic. The switch supports manual LACP and static LACP trunk mode. Users can create link aggregation group, configure load pattern mode, working mode and members of link aggregation group, and delete the group.
  • Page 33: Rstp

     Delete trunk. Choose the trunk that need to be deleted. Click <Delete>. Click <Save>. 10.2 RSTP The switch supports STP and RSTP. The Spanning Tree Protocol (STP) trims a ring network into a loop-free tree network. It prevents replication and circular propagation of packets. The Rapid Spanning Tree Protocol (RSTP) was developed based on STP to implement faster convergence.
  • Page 34 Procedure Choose <LACP> <RSTP> in the navigation tree to open the page.  Enable the function.
  • Page 35  Configure global parameters. Items Descriptions Default value STP Version Choose the STP version, including two types: Disable · STP · RSTP Device Choose the priority of the switch. The lager number takes 32768 Priority lower priority. Step length: 4096. Sending Input the interval time to send message.
  • Page 36: Loopback

    · Auto Detect Edge Port Choose <Yes> to enable the edge port. Choose <No> to disable the edge port. Port Range Select the ports that need to be set. Multiple interfaces Null can be selected. Click <Modify>. Click <Save>. 10.3 Loopback The switch supports loopback protection function.
  • Page 37: Fast Ring

     Configure the loopback function. Items Descriptions Default value Auto Choose <Enable> to enable the protection automatic Disable Recovery recovery function. The ports will be recovered automatically. Disable Time Indicate the disable loop protect time. The port will be recovered automatically, if the port detection no loopback packet after the time range, when <Protect Automatic Recovery>...
  • Page 38 Procedure Choose <LACP> <Fast Ring> in the navigation tree to open the page.  Enable the function.  Configure the Fast Ring. Items Descriptions Default value Fast Ring Network Group 1 Ring Network Indicates the number of main ring network the switch accesses.
  • Page 39: Ccm

    10.5 CCM CC monitors connectivity of links between MEPs. A MEP periodically sends multicast continuity check messages (CCMs) to an RMEP in the same MA. If an RMEP does not receive a CCM within a period three times the timeout interval at which CCMs are sent, the RMEP considers the path between itself and the MEP faulty.
  • Page 40: Static Address Lock

    Port Security 11.1 Static Address Lock The switch supports to set the static MAC table. A MAC address table records the MAC address, interface number, and VLAN ID of the device connected to the device. Each device maintains a MAC address table. A MAC address table records the MAC address, interface number, and VLAN ID of the connected devices.
  • Page 41: 802.1X Authentication

    11.2 802.1x Authentication IEEE802.1x Authentication system adopted the "controllable ports" and "uncontrolled ports" logic functions. It can realize the separation of business and certification. After passing certification, the business flow and the certification flow separation, it has no special requirement for the following subsequent packets.
  • Page 42 Procedure Choose <Port Security> <802.1x Authentication> in the navigation tree to open the page.  Enable the function.  Configure the global parameters. Set the parameters as required. Items Descriptions Default value Timing Input the authentication timer, the value ranges from 3600s Update 60~40,000,000s.
  • Page 43: Radius Database

    11.3 RADIUS Database The switch supports to add or delete user name and password for local 802.1x authentication. Procedure Choose <Port Security> <RADIUS Database> in the navigation tree to open the page.  Create an account. Items Descriptions Default value User Login Input the user name.
  • Page 44: Snmp

    Network Management 12.1 SNMP The switch supports SNMP. As a network management standard protocol used on TCP/IP networks, SNMP uses a central computer (NMS) that runs network management software to manage network elements. In a large network, it is very difficult for network administrator to detect, locate and rectify the fault as the switch does not report the fault.
  • Page 45  Configure SNMP community permission. Items Descriptions Default value SNMP Input the IP address of the server. Null Gateway SNMP Choose the SNMP version, by default the value is SNMP SNMP V1/V2 Version V1/V2. Read-only Indicate the name of SNMP community for read-only public Community permission.
  • Page 46: Port Mirror

    12.2 Port Mirror The switch supports monitoring the ports data transferring. Packet mirroring copies the packets on a mirrored port (source port) to an observing port (destination port). During network maintenance, maintenance personnel need to capture and analyze packets (for example, when there are suspicious attack packets).
  • Page 47: Email Alarm

    12.3 Email Alarm When the device is running an event supervision, the supervision sends an alert message to defined mail recipients when something wrong about defining time and some abnormal event occurs. Supervision also periodically send all log messages to predefined recipients. The function is disable by default.
  • Page 48: Igmp Snooping

    12.4 IGMP Snooping Internet Group Management Protocol Snooping (IGMP-Snooping) is a Layer 2 IPv4 multicast protocol. The IGMP-Snooping protocol maintains information about the outgoing interfaces of multicast packets by snooping multicast protocol packets exchanged between the Layer 3 multicast device and user hosts. The IGMP-Snooping protocol manages and controls the forwarding of multicast packets at the data link layer.
  • Page 49: Dhcp

    Items Descriptions Default value Static Input the static multicast MAC address Null Multicast MAC Address VLAN ID Indicate the survival time of group members. Null The value ranges from 120~5000 s. Port Range Select the ports that need to be set. Multiple interfaces Null can be selected.
  • Page 50 Items Descriptions Default value Client Lease Indicates the lease of dynamic IP addresses. The default 14400 Time lease is one day (86400s). The value ranges from 3600 to 86400 s. Preferred Indicates the main IP address of a DNS server. Null DNS Address Backup DNS...
  • Page 51: Dhcp Relay

    12.6 DHCP Relay Through DHCP Relay, it can achieve the processing and forwarding for DHCP information between different subnets and physical network segments. If the DHCP client and DHCP server are in the same physical network segment, the DHCP client can correctly get the dynamically assigned IP address. If they are not in the same physical network segment, the DHCP Relay Agent is required, with which the information could be forwarded to DHCP client and DHCP sever in different physical subnets instead of requiring to set DHCP server in every physical segment.
  • Page 52: Dhcpv6 Snooping

    12.7 DHCPv6 Snooping In order to ensure DHCP clients to obtain IP addresses through legal DHCP servers, it should set the device ports, which are directly or indirectly connected with DHCP severs trusted by administrators, as the trust ports, and set other ports as untrusted ports. There into the trust ports could normally forward the received DHCP response message, and the untrusted ports would discard the DHCP Ack, DHCP Nak, DHCP Offer, and DHCP Decline packets from DHCP server.
  • Page 53: Telnet Setting

    Procedure Choose <Network Management> <DHCP Snooping> in the navigation tree to open the page.  Enable DHCPv6 Snooping and set the ports to trust. Items Descriptions Default value Port Trust Set to trust the port or not. Port Range Input the port number. Multiple interfaces can be selected. Null The value ranges from 1 to the max port number.
  • Page 54: Flow Statistics

    Network Information 13.1 Flow Statistics View packets received and sent by the ports. Choose <Network Information> <Flow Statistics> in the navigation tree to open the page.
  • Page 55: Mac Table

    13.2 MAC Table Query and view the MAC table of the interfaces. Choose <Network Information> <MAC Table> in the navigation tree to open the page. Procedure  Query MAC table Set the query conditions, Click <Inquiry>. By default, all the MAC table are displayed. CAUTION Multicast MAC address table is displayed in IGMP snooping table, all these address tables are unicast addresses.
  • Page 56: Ip Address

    System Management 14.1 IP Address User can view and modify the Manage VLAN, IPv4 address, IPv6 address, default gateway and DNS address. Procedure Choose < System Management> <IP Address> in the navigation tree to open the page.  Configure the parameters. Items Descriptions Default value...
  • Page 57: User Management

    14.2 User Management The Web system manages users at levels. User levels are marked by numbers from 1 to 15, in ascending order. The access privilege of user is determined by the level of this user. Procedure Choose <System Management> <User Setting> in the navigation tree to open the page. ...
  • Page 58: Log Information

    14.3 Log Information Users can view, download and clear the system log, including:  System restart  Port link down/up  Power supply status  login information  Broadcast storm  System action and operation record  NTP time synchronization information ...
  • Page 59: File Management

     Clear the system log records. Click <Delete> to delete the displayed log.  Download the system log records. Click <Download> to download the displayed log. WARNNING The system log can’t be recovered after clear operation! 14.4 File Management Users can restore the factory value, reboot the system, download the actual configuration file, upload configuration file, and upgrade the software version.
  • Page 60 · To upgrade the software version, please contact the seller to get the software package. · After software upgrade, please press the <Init> key on the front panel for 5s, to make sure the new version software will work normally. ...
  • Page 61: Web Access Control

    14.5 Web Access Control The switch supports Web system management through http or https. The mode can be switched here. By default it is http. Choose <System Management> <Web Access Control> in the navigation tree to open the page.  Enable http setting.
  • Page 62 Procedure Login the Web system or choose <System Management> <One Key Smart> in the navigation tree to open the page.  View the main configuration. Items Descriptions Model The model of the switch. IP Address The IP address of the switch. It can be configured on <System Management>...
  • Page 63 VIDEOR E. Hartig GmbH Exclusive distribution through specialised trade channels only. VIDEOR E. Hartig GmbH Carl-Zeiss-Straße 8 63322 Rödermark/Germany Tel. +49 (0) 6074 / 888-0 Technical changes reserved Fax +49 (0) 6074 / 888-100 www.videor.com...

Table of Contents