Planet Networking & Communication IGS-6329 Series User Manual

Planet Networking & Communication IGS-6329 Series User Manual

L3 industrial managed ethernet switch
Table of Contents

Advertisement

Quick Links

L3 Industrial Managed
Ethernet Switch
IGS-6329 DIN-rail Series

Advertisement

Table of Contents
loading

Summary of Contents for Planet Networking & Communication IGS-6329 Series

  • Page 1 L3 Industrial Managed Ethernet Switch IGS-6329 DIN-rail Series...
  • Page 2 Trademarks Copyright © PLANET Technology Corp. 2022. Contents are subject to revision without prior notice. PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners. Disclaimer PLANET Technology does not warrant that the hardware will work properly in all environments and applications, and makes no warranty and representation, either implied or expressed, with respect to the quality, performance, merchantability, or fitness for a particular purpose.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS 1. INTRODUCTION ........................11 1.1 Packet Contents ............................11 1.2 Product Description ..........................12 1.3 How to Use This Manual .......................... 19 1.4 Product Features ............................20 1.5 Product Specifications ..........................24 2. INSTALLATION ........................30 2.1 Hardware Description ..........................30 2.1.1 Physical Dimensions ............................
  • Page 4 4.2.1.2 IP Configuration ............................62 4.2.1.3 IP Status ..............................64 4.2.1.4 ARP ................................65 4.2.1.5 Users Configuration ........................... 66 4.2.1.6 Privilege Levels ............................68 4.2.1.7 NTP Configuration ............................. 70 4.2.1.8 Time Configuration ............................ 71 4.2.1.9 Time Configuration ............................ 73 4.2.1.10 UPnP ............................... 74 4.2.1.11 CPU Load ..............................
  • Page 5 4.2.5.4 Statistics ..............................109 4.2.5.5 Binding ..............................111 4.2.5.6 Declined IP .............................. 112 4.2.6 Remote Management ............................112 4.2.6.1 Remote NMS Configuration ........................112 4.3 Switching ..............................114 4.3.1 Port Management ............................114 4.3.1.1 Port Configuration ........................... 114 4.3.1.2 Port Statistics Overview ........................... 116 4.3.1.3 Port Statistics Details..........................
  • Page 6 4.3.7.3 Protocol-based VLAN ..........................158 4.3.7.4 Protocol-based VLAN Membership ......................160 4.3.8 GVRP ................................161 4.3.8.1 GVRP Configuration ..........................162 4.3.8.2 GVRP Port Configuration ........................163 4.3.9 MRP .................................. 164 4.3.9.1 Port Configuration ........................... 164 4.3.9.2 MVRP Global Configuration ........................165 4.3.9.3 MVRP Statistics ............................
  • Page 7 4.3.14.1 Link Layer Discovery Protocol ....................... 212 4.3.14.2 LLDP Configuration ..........................212 4.3.14.3 LLDP Neighbor ............................215 4.3.14.4 LLDP MED Configuration ........................216 4.3.14.5 LLDP-MED Neighbor ..........................223 4.3.14.6 Port Statistics ............................227 4.3.15 MAC Address Table ............................229 4.3.15.1 MAC Table Configuration ........................229 4.3.15.2 MAC Address Table Status ........................
  • Page 8 4.5.1.1 QOS Port Classification ........................... 270 4.5.1.2 Queue Policing ............................272 4.5.1.3 Port Tag Remarking ..........................273 4.5.1.4 WERD ..............................274 4.5.1.5 Statistics ..............................275 4.5.2 Bandwidth Control ............................276 4.5.2.1 Port Policing ............................276 4.5.2.2 Port Schedule ............................277 4.5.2.3 Port Shaping ............................
  • Page 9 4.6.4.3 Port Security Detail ..........................336 4.6.5 Access Control Lists ............................337 4.6.5.1 Access Control List Status ........................337 4.6.5.2 Access Control List Configuration ......................339 4.6.5.3 ACE Configuration ........................... 341 4.6.5.4 ACL Ports Configuration .......................... 351 4.6.5.5 ACL Rate Limiters ............................ 353 4.6.6 DHCP Snooping ...............................
  • Page 10 4.9.1.4 Floor Map ..............................399 4.10 Maintenance ............................400 4.10.1 Web Firmware Upgrade ..........................400 4.10.2 Save Startup Config ............................401 4.10.3 Configuration Download ..........................401 4.10.4 Configuration Upload ............................ 402 4.10.5 Configure Activate ............................403 4.10.6 Configure Delete ............................403 4.10.7 Image Select ..............................
  • Page 11: Introduction

    1. INTRODUCTION Thank you for purchasing PLANET IGS-6329 Industrial Managed Switch series, which comes with multiple Gigabit Ethernet copper ports and SFP/SFP+ fiber optic connectibility, and robust Layer 3 features in an IP30 rugged metal case. “Industrial Managed Switch” is used as an alternative name in this user’s manual. 1.1 Packet Contents Open the box of the Industrial Managed Switch and carefully unpack it.
  • Page 12: Product Description

    802.3bt PoE++ – 90~95-watt Power over 4-pair UTP Solution As the IGS-6329 Series adopts the IEEE 802.bt PoE++ standard and PoH technology, it is capable of sourcing up to 95 watts of power by using all the four pairs of standard Cat5e/6 Ethernet cabling to deliver power and full-speed data to each remote PoE compliant powered device (PD).
  • Page 13 PLANET has newly developed an awesome feature -- ONVIF Support -- which is specifically designed for co-operating with video IP surveillances. From the IGS-6329 Series GUI, clients just need one click to search and show all of the ONVIF devices via network application.
  • Page 14 Scheduled Power Recycling The IGS-6329 Series allows each of the connected PoE IP cameras or PoE wireless access points to reboot at a specified time each week. Therefore, it will reduce the chance of IP camera or AP crash resulting from buffer overflow.
  • Page 15 Modbus TCP Provides Flexible Network Connectivity for Factory Automation With the supported Modbus TCP/IP protocol, the IGS-6329 Series can easily integrate with SCADA systems, HMI systems and other data acquisition systems in factory floors. It enables administrators to remotely monitor the industrial Ethernet switch’s operating information, port information, communication status, and DI and DO status, thus easily achieving enhanced monitoring and maintenance of the entire factory.
  • Page 16 SMTP/SNMP Trap Event Alert The IGS-6329 Series provides event alert function to help to diagnose the abnormal device owing to whether or not there is a break of the network connection, or the rebooting response. Effective Alarm Alert for Better Protection The IGS-6329 Series supports a Fault Alarm feature which can alert the users when there is something wrong with the switches.
  • Page 17 Input to detect and log external device status (such as door intrusion detector), and send event alarm to the administrators. The Digital Output could be used to alarm the administrators if the IGS-6329 Series’ port shows link down, link up or power failure.
  • Page 18 Flexible and Extendable 10Gb Ethernet Solution 10Gbps Ethernet is a big leap in the evolution of Ethernet. Each of the 10G SFP+ slots in the IGS-6329 Series supports multiple speed and 10GBASE-SR/LR, 1000BASE-SX/LX or 2500BASE-X. With different models, two or four ports 10Gbps Ethernet link capability and additional 2-port 1G/2.5Gbps Ethernet link capability, the administrator now can flexibly choose the suitable...
  • Page 19: How To Use This Manual

    1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Industrial Managed Switch and how to physically install the Industrial Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Industrial Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Industrial Managed Switch by Web interface.
  • Page 20: Product Features

    1.4 Product Features  Physical Port  8 10/100/1000BASE-T Gigabit Ethernet RJ45 ports with 802.3bt PoE++ Injector function  2 100/1000/2500BASE-X SFP slots for SFP type auto detection  2/4 10GBASE-SR/LR SFP+ slots, compatible with 1000BASE-X and 2500BASE-X SFP  One RJ45-to-RS232 console interface for basic management and setup ...
  • Page 21  Intelligent PoE features • Temperature threshold control • PoE usage threshold control • PD alive check • PoE schedule  Layer 3 IP Routing Features  IP dynamic routing protocol supports RIPv2, OSPFv2 and OSPFv3  IPv4/IPv6 hardware static routing ...
  • Page 22  Quality of Service  Ingress Shaper and Egress Rate Limit per port bandwidth control  8 priority queues on all switch ports  Traffic classification − IEEE 802.1p CoS − IP TOS/DSCP/IP precedence − IP TCP/UDP port number − Typical network application ...
  • Page 23  Switch Management  IPv4 and IPv6 dual stack management  Switch Management Interfaces − Console and Telnet Command Line Interface − HTTP web switch management − SNMP v1 and v2c switch management − SSHv2, TLSv1.2 and SNMPv3 secure access ...
  • Page 24: Product Specifications

    1.5 Product Specifications Product IGS-6329-8UP2S2X IGS-6329-8UP2S4X Hardware Specifications Copper Ports 8 10/100/1000BASE-T RJ45 auto-MDI/MDI-X ports 2 1000BASE-SX/LX/BX SFP slot interfaces (Port-9 and Port-10) SFP Ports Compatible with 100BASE-FX and 2500BASE-X SFP 2 10GBASE-SR/LR SFP+ slot 4 10GBASE-SR/LR SFP+ slot interfaces (Port-11 to Port-12) interfaces (Port-11 to Port-14) SFP+ Ports Compatible with 1000BASE-X and...
  • Page 25 802.3at/af PoE-in-use x 1 (Amber) Per SFP Interface: 1G/2.5G LNK/ACT (Green) 100 LNK/ACT (Amber) Per SFP+ Port: 10Gbps LNK/ACT (Green) 1Gbps LNK/ACT (Amber) PoE Usage: 90W, 180W, 270W, 360W (Amber) Switching Specifications Switch Architecture Store-and-Forward Switch Fabric 66Gbps/non-blocking 106Gbps/non-blocking Throughput (packet per second) 49.1Mpps@ 64 bytes packet 78.8Mpps@ 64 bytes packet Address Table...
  • Page 26 PoE Power Recycling Yes, daily or predeinded schedule PoE Schedule 4 schedule profiles PoE Extend Mode Yes, max. 160 to 200 meters System PoE Admin control Total PoE power budget control Auto power input and PoE budget control PoE System Management PoE Legacy mode Over-temperature threshold alarm PoE usage threshold alarm...
  • Page 27 Supports ERPS, and complies with ITU-T G.8032 Recovery time < 10ms Ring Supports Major ring and sub-ring IEEE 1588v2 PTP(Precision Time Protocol) Synchronization - Peer-to-peer transparent clock - End-to-end transparent clock Traffic classification based, strict priority and WRR 8-level priority for switching - Port number - 802.1p priority - 802.1Q VLAN tag...
  • Page 28 PLANET CloudViewer app Remote Syslog Event Management System log SMTP ONVIF device discovery ONVIF ONVIF device monitoring Floor Map RFC 1213 MIB-II RFC 1493 Bridge MIB RFC 1643 Ethernet MIB RFC 2863 Interface MIB RFC 2665 Ether-Like MIB RFC 2819 RMON MIB (Group 1, 2, 3 and 9) RFC 2737 Entity MIB RFC 2618 RADIUS Client MIB RFC 2863 IF-MIB...
  • Page 29 IEEE 802.3ah OAM IEEE 802.1ag Connectivity Fault Management (CFM) RFC 768 UDP RFC 793 TFTP RFC 791 IP RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP v1 RFC 2236 IGMP v2 RFC 3376 IGMP v3 RFC 2710 MLD v1 RFC 3810 MLD v2 RFC 2328 OSPF v2 ITU-T G.8032 ERPS Ring...
  • Page 30: Installation

    2. INSTALLATION 2.1 Hardware Description The Industrial Managed Switch provides three different running speeds – 10Mbps, 100Mbps or 10000Mbps and automatically distinguishes the speed of incoming connection. This section describes the hardware features of Industrial Managed Switch. For easier management and control of the Industrial Managed Switch, familiarize yourself with its display indicators and ports.
  • Page 31: Physical Dimensions

    2.1.1 Physical Dimensions  IGS-6329-8UP2S2X  IGS-6329-8UP2S4X...
  • Page 32: Front Panel

    2.1.2 Front Panel The front panel provides a simple interface monitoring the Industrial Managed Switch. Figure 2-1-1 Figure 2-1-3 show the front panels of the Industrial Managed Switches. IGS-6329-8UP2S2X IGS-6329-8UP2S4X Figure 2-1-1 IGS-6329-8UP2S2X and IGS-6329-8UP2S4X Switch Front Panel ■ Gigabit TP Interface 10/100/1000BASE-T Copper, RJ45 twisted-pair: Up to 100 meters.
  • Page 33 ■ 10 Gigabit SFP+ Slot 10GBASE-SR/LR mini-GBIC slot, SFP+ (Small Factor Pluggable Plus) transceiver module supports a distance from 300 meters (multi-mode fiber) to up to 10 kilometers (single mode fiber). ■ Console Port The console port is an RJ45 port connector. It is an interface for connecting a terminal directly. Through the console port, it provides rich diagnostic information including IP address setting, factory reset, port management, link status and system setting.
  • Page 34: Led Indications

    2.1.3 LED Indications The front panel LEDs indicate instant statuses of power and ring, R.O., DI/DO and fault; they help monitor and troubleshoot when needed.  System and Power Color Function R.O.* Green Lights to indicate that Switch has enabled Ring Owner. Ring Green Lights to indicate that the ERPS Ring has been created successfully.
  • Page 35: Switch Upper Panel

     PoE Usage LED Color Function Amber Lights: To indicate the system consumes over 90-watt PoE power budget Amber Lights: To indicate the system consumes over 180-watt PoE power budget Amber Lights: To indicate the system consumes over 270-watt PoE power budget Amber Lights: To indicate the system consumes over 360-watt PoE power budget 2.1.4 Switch Upper Panel...
  • Page 36: Wiring The Dc Power Input

    2.1.5 Wiring the DC Power Input The 6-contact terminal block connector on the front panel of Industrial Managed Switch is used for two DC redundant power inputs. Please follow the steps below to insert the power wire. Insert positive/negative DC power wires into contacts 1 and 2 for DC Power 1, or 5 and 6 for DC Power 2. Figure 2-1-5: Upper Panel Tighten the wire-clamp screws for preventing the wires from loosening.
  • Page 37: Wiring The Fault Alarm Contact

    2.1.6 Wiring the Fault Alarm Contact The fault alarm contacts are in the middle (3 & 4) of the terminal block connector as the picture shows below. Inserting the wires, the Industrial Managed Switch will detect the fault status of the power failure, or port link failure (available for managed model). The following illustration shows an application example for wiring the fault alarm contacts Insert the wires into the faulty alarm contacts 1.
  • Page 38: Wiring The Digital Input/Output

    2.1.7 Wiring the Digital Input/Output The 6-contact terminal block connector on the front panel of Industrial Managed Switch is used for Digital Input and Digital Output. Please follow the steps below to insert wire. The Industrial Managed Switch offers two DI and DO groups. 1 and 2 are DI groups, 3 and 4 are DO groups, and 5 and 6 are GND (ground).
  • Page 39 Figure 2-1-8 Wires DI0 and DI1 to Open Detector There are two Digital Output groups for you to sense Industrial Managed Switch port failure or power failure and issue a high or low signal to external device. The following topology shows how to wire DO0 and DO1. Figure 2-1-9 Wires DO0 and DO1 to Open Detector...
  • Page 40: Installing The Industrial Managed Switch

    2.2 Installing the Industrial Managed Switch This section describes how to install your Industrial Managed Switch and make connections to the Industrial Managed Switch. Please read the following topics and perform the procedures in the order being presented. To install your Industrial Managed Switch on a desktop or shelf, simply complete the following steps.
  • Page 41: Din-Rail Mounting

    2.2.2 DIN-rail Mounting This section describes how to install the Industrial Managed Switch. There are two methods to install the Industrial Managed Switch -- DIN-rail mounting and wall-mount plate mounting. Please read the following topics and perform the procedures in the order being presented.
  • Page 42 Step 3: Check whether the DIN-rail bracket is tightly on the track. Please refer to the following procedures to remove the Industrial Managed Switch from the track. Step 4: Lightly remove the unit from the track.
  • Page 43: Wall-Mount Plate Mounting

    2.2.3 Wall-mount Plate Mounting To install the Industrial Managed Switch on the wall, please follow the instructions below. Follow all the DIN-rail installation steps as shown in the example. Step 1: Remove the DIN-rail bracket from the Industrial Managed Switch. Use the screwdriver to loosen the screws to remove the bracket.
  • Page 44: Cabling

    2.3 Cabling  10/100/1000BASE-T and 100BASE-FX/1000BASE-SX/LX All 10/100/1000BASE-T ports come with auto-negotiation capability. They automatically support 1000BASE-T, 100BASE-TX and 10BASE-T networks. Users only need to plug a working network device into one of the 10/100/1000BASE-T ports, and then turn on the Industrial Managed Switch. The port will automatically run at 10Mbps, 20Mbps, 100Mbps or 200Mbps and 1000Mbps or 2000Mbps after negotiating with the connected device.
  • Page 45: Installing The Sfp Transceiver

    2.3.1 Installing the SFP Transceiver The sections describe how to insert an SFP/SFP+ transceiver into an SFP/SFP+ slot. The SFP/SFP+ transceivers are hot-pluggable and hot-swappable. You can plug in and out the transceiver to/from any SFP/SFP+ port without having to power down the Industrial Managed Switch as Figure 2-3-1 appears.
  • Page 46 Fast Ethernet Transceiver (100BASE-BX, Single Fiber Bi-directional SFP) Model Speed (Mbps) Connector Interface Fiber Mode Distance Wavelength (TX/RX) Operating Temp. MFB-FA20 WDM(LC) Single Mode 20km 1310nm/1550nm 0 ~ 60 degrees C MFB-FB20 WDM(LC) Single Mode 20km 1550nm/1310nm 0 ~ 60 degrees C MFB-TFA20 WDM(LC) Single Mode...
  • Page 47 10Gbps SFP+ (10G Ethernet/10GBASE) Connector Model Speed (Mbps) Fiber Mode Distance Wavelength (nm) Operating Temp. Interface MTB-SR Multi Mode Up to 300m 850nm 0 ~ 60 degrees C MTB-LR Single Mode 10km 1310nm 0 ~ 60 degrees C 10Gbps SFP+ (10GBASE-BX, Single Fiber Bi-directional SFP) Connector Model Speed (Mbps)
  • Page 48: Removing The Sfp/Sfp+ Transceiver

    2.3.2 Removing the SFP/SFP+ Transceiver Make sure there is no network activity by consulting or checking with the network administrator. Or through the management interface of the switch/converter (if available) to disable the port in advance. Remove the fiber optic cable gently. Turn the lever of the SFP transceiver to a horizontal position.
  • Page 49: Switch Management

    3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Industrial Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options.
  • Page 50: Management Access Overview

    3.2 Management Access Overview The Industrial Managed Switch gives you the flexibility to access and manage it using any or all of the following methods:  Remote Telnet Interface  Web browser Interface  An external SNMP-based network management application The remote Telnet and Web browser interfaces are embedded in the Industrial Managed Switch software and are available for immediate use.
  • Page 51: Cli Mode Management

    3.3 CLI Mode Management There are two ways for CLI mode management, one is remote telnet and the other operated from console port. Remote telnet is an IP-based protocol and console port is for user to operate the Industrial Managed Switch locally only; however, their operations are the same.
  • Page 52: Logging On To The Console

    3.3.1 Logging on to the Console Once the terminal has been connected to the device, power on the Industrial Managed Switch and the terminal will display “running testing procedures”. Then, the following message asks to log in user name and password. The factory default user name and password are shown as follows as the login screen in Figure 3-1 appears User Name: admin Password: admin...
  • Page 53: Web Management

    3.4 Web Management The Industrial Managed Switch offers management features that allow users to manage the Industrial Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the Industrial Managed Switch, you can access the Industrial Managed Switch’s Web interface applications directly in your Web browser by entering the IP address of the Industrial Managed Switch.
  • Page 54: Snmp-Based Network Management

    3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Industrial Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the Industrial Managed Switch and the SNMP Network Management Station to use the same community string.
  • Page 55 3. Press the “Refresh” button for the currently connected devices in the discovery list as the screen is shown as follows. Figure 3-7: Planet Smart Discovery Utility Screen This utility shows all the necessary information from the devices, such as MAC address, device name, firmware version and device IP subnet address.
  • Page 56: Web Configuration

    4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management from Managed Switch. About Web-based Management The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 8.0.
  • Page 57 Figure 4-1-2: Login Screen Default User name: admin Default Password: admin After entering the username and password, the main screen appears as shown in Figure 4-1-3. Figure 4-1-3: Web Main Page Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web interface.
  • Page 58: Main Web Page

    4.1 Main Web Page The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s Web browser interface to configure and manage it.
  • Page 59: System

    Main Menu Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can set up the Managed Switch by selecting the functions those listed in the Main Function.
  • Page 60 ■ Privilege Levels This page provides an overview of the privilege levels. ■ NTP Configuration Configure NTP server on this page. ■ Time Configuration Configure time parameter on this page. ■ UPnP Configure UPnP on this page. ■ CPU Load This page displays the CPU load, using an SVG graph.
  • Page 61: Management

    4.2.1 Management 4.2.1.1 System Information The System Information page provides information for the current device information. System Information page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1-1 appears. Figure 4-2-1-1: System Information Page Screenshot The page includes the following fields: Object...
  • Page 62: Ip Configuration

    4.2.1.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 128. The screen in Figure 4-2-1-2 appears.
  • Page 63 be able to access the IP interface. This field is only available for input when creating a new interface. IPv4 Enabled Enable the DHCP client by checking this box. DHCP Fallback The number of seconds for trying to obtain a DHCP lease. Current For DHCP interfaces with an active lease, this column shows the Lease...
  • Page 64: Ip Status

    4.2.1.3 IP Status IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbor cache (ARP cache) status. The screen in Figure 4-2-1-3 appears. Figure 4-2-1-3: IP Status Page Screenshot The page includes the following fields: Object Description...
  • Page 65: Arp

    4.2.1.4 ARP This page provides ARP configuration settings. press the “Apply” button to take effect, the screen in Figure 4-2-1-4 appears. Figure 4-2-1-4: Figure 4-2-1-4: ARP Table Configuration Page Screenshot The page includes the following fields: Object Description • Aging Disable Automatic Aging Allow to click to disable the automatic aging.
  • Page 66: Users Configuration

    4.2.1.5 Users Configuration This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser. After setup is completed, press the “Apply” button to take effect. Please login web interface with new user name and password;...
  • Page 67 The page includes the following fields: Object Description • Username A string identifying the user name that this entry should belong to. The allowed string length is 1 to 31. The valid user name is a combination of letters, numbers and underscores.
  • Page 68: Privilege Levels

    4.2.1.6 Privilege Levels This page provides an overview of the privilege levels. After setup is completed, please press the “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-1-6 appears.
  • Page 69 The page includes the following fields: Object Description • Group Name The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contain more than one.
  • Page 70: Ntp Configuration

    4.2.1.7 NTP Configuration Configure NTP on this page. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (data grams) as transport layer. You can specify NTP Servers. The NTP Configuration screen in Figure 4-2-1-7 appears.
  • Page 71: Time Configuration

    4.2.1.8 Time Configuration This page allows you to configure the Time Zone. Time Zone Configuration Object Description • Time Zone Lists various Time Zones world wide. Select appropriate Time Zone from the drop down and click Save to set. The 'Manual Setting' options is used for the specific time zone which is excluded from the options list.
  • Page 72 • Month - Select the starting month. • Hours - Select the starting hour. • Minutes - Select the starting minute. • Week - Select the ending week number. • End time settings • Day - Select the ending day. •...
  • Page 73: Time Configuration

    4.2.1.9 Time Configuration Configure Time Zone on this page. A Time Zone is a region that has a uniform standard time for legal, commercial, and social purposes. It is convenient for areas in close commercial or other communication to keep the same time, so time zones tend to follow the boundaries of countries and their subdivisions.
  • Page 74: Upnp

    'Non-Recurring' and configure the Daylight Saving Time duration for single time configuration. ( Default: Disabled ). • • Week - Select the starting week number. Start Time Settings • Day - Select the starting day. • Month - Select the starting month. •...
  • Page 75 The page includes the following fields: Object Description • Mode Indicates the UPnP operation mode. Possible modes are:  Enabled: Enable UPnP mode operation.  Disabled: Disable UPnP mode operation. When the mode is enabled, two ACEs are added automatically to trap UPnP related packets to CPU.
  • Page 76: Cpu Load

    4.2.1.11 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as average over the last 100ms, 1 sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
  • Page 77: System Log

    4.2.1.12 System Log The Managed Switch system log information is provided here. The System Log screen in Figure 4-2-1-12 appears. Figure 4-2-1-12: System Log Page Screenshot The page includes the following fields: Object Description • ID The ID (>= 1) of the system log entry. •...
  • Page 78: Detailed Log

    : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID. 4.2.1.13 Detailed Log The Managed Switch system detailed log information is provided here.
  • Page 79: Remote Syslog

    4.2.1.14 Remote Syslog Configure remote syslog on this page. The Remote Syslog screen in Figure 4-2-1-14 appears. Figure 4-2-1-14: Remote Syslog Page Screenshot The page includes the following fields: Object Description • Mode Indicates the server mode operation. When the mode operation is enabled, the syslog message will send out to syslog server.
  • Page 80: Smtp Configuration

    4.2.1.15 SMTP Configuration This page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-1-15 appears. Figure 4-2-1-15: SMTP Configuration Page Screenshot The page includes the following fields: Object Description • SMTP Mode Controls whether SMTP is enabled on this switch. •...
  • Page 81: Simple Network Management Protocol

    4.2.2 Simple Network Management Protocol 4.2.2.1 SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
  • Page 82: System Configuration

    Use the SNMP Menu to display or configure the Managed Switch's SNMP function. This section has the following items:  System Configuration Configure SNMP on this page.  System Information The system information is provided here.  SNMP Trap Configuration Configure SNMP trap on this page.
  • Page 83: System Information

    4.2.2.3 System Information The switch system information is provided here. The SNMP System Information screen in Figure 4-2-2-3 appears. Figure 4-2-2-3: System Information Configuration Page Screenshot The page includes the following fields: Object Description • System Contact The textual identification of the contact person for this managed node, together with information on how to contact this person.
  • Page 84: Snmp Trap Configuration

    4.2.2.4 SNMP Trap Configuration Configure SNMP trap on this page. The SNMP Trap Configuration screen in Figure 4-2-2-4 appears. Figure 4-2-2-4-1: SNMP Trap Destination Configuration Page Screenshot Click ‘Add New Entry” and then the SNMP Trap Configuration page appears. Figure 4-2-2-4-2: SNMP Trap Configuration Page Screenshot...
  • Page 85 The page includes the following fields: Object Description • Trap Config Indicates which trap Configuration's name for configuring. The allowed string length is 0 to 255, and the allowed content is ASCII characters from 33 to 126. • Trap Mode Indicates the SNMP trap mode operation.
  • Page 86: Source

     Cold Start: Enable/disable Cold Start trap. • Interface Indicates that the Interface group's traps. Possible traps are:  Link Up: Enable/disable Link up trap.  Link Down: Enable/disable Link down trap.  LLDP: Enable/disable LLDP trap. • AAA Indicates that the AAA group's traps. Possible traps are: Authentication Fail : Enable/disable SNMP trap authentication failure trap.
  • Page 87 Figure 4-2-2-5-2: SNMP Trap Source Configuration Page Screenshot The page includes the following fields: Object Description • Name Indicates the name for the entry. • Type The filter type for the entry. Possible types are: ■ included: An optional flag to indicate a trap is sent for the given trap source is matched.
  • Page 88: Snmpv3 Communities

    4.2.2.6 SNMPv3 Communities Configure SNMPv3 communities table on this page. The entry index key is Community. The SNMPv3 Communities screen in Figure 4-2-2-5 appears. Figure 4-2-2-6: SNMPv3 Communities Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry.
  • Page 89: Snmpv3 Users

    4.2.2.7 SNMPv3 Users Configure SNMPv3 users table on this page. The entry index keys are Engine ID and User Name. The SNMPv3 Users screen in Figure 4-2-2-7 appears. Figure 4-2-2-7: SNMPv3 Users Configuration Page Screenshot The page includes the following fields: Object Description •...
  • Page 90 protocol.  SHA: An optional flag to indicate that this user using SHA authentication protocol. The value of security level cannot be modified if entry already exist. That means must first ensure that the value is set correctly. • Authentication A string identifying the authentication pass phrase.
  • Page 91: Snmpv3 Groups

    4.2.2.8 SNMPv3 Groups Configure SNMPv3 groups table on this page. The entry index keys are Security Model and Security Name. The SNMPv3 Groups screen in Figure 4-2-2-8 appears. Figure 4-2-2-8: SNMPv3 Groups Configuration Page Screenshot The page includes the following fields: Object Description •...
  • Page 92: Snmpv3 Views

    4.2.2.9 SNMPv3 Views Configure SNMPv3 views table on this page. The entry index keys are View Name and OID Subtree. The SNMPv3 Views screen in Figure 4-2-2-9 appears. Figure 4-2-2-9: SNMPv3 Views Configuration Page Screenshot The page includes the following fields: Object Description •...
  • Page 93: Snmpv3 Access

    4.2.2.10 SNMPv3 Access Configure SNMPv3 accesses table on this page. The entry index keys are Group Name, Security Model and Security Level. The SNMPv3 Access screen in Figure 4-2-2-10 appears. Figure 4-2-2-10: SNMPv3 Accesses Configuration Page Screenshot The page includes the following fields: Object Description •...
  • Page 94: Rmon

    4.2.3 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
  • Page 95  InNUcastPkts: The number of broadcast and multi-cast packets delivered to a higher-layer protocol.  InDiscards: The number of inbound packets that are discarded even the packets are normal.  InErrors: The number of inbound packets that contains errors preventing them from being deliverable to a higher-layer protocol.
  • Page 96: Rmon Alarm Status

    4.2.3.2 RMON Alarm Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table.
  • Page 97: Rmon Event Configuration

    4.2.3.3 RMON Event Configuration Configure RMON Event table on this page. The entry index key is ID; screen in Figure 4-2-3-3 appears. Figure 4-2-3-3 RMON Event Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. •...
  • Page 98: Rmon Event Status

    4.2.3.4 RMON Event Status This page provides an overview of RMON Event table entries. Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table.
  • Page 99: Rmon History Configuration

    4.2.3.5 RMON History Configuration Configure RMON History table on this page. The entry index key is ID; screen in Figure 4-2-3-5 appears. Figure 4-2-3-5: RMON History Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. •...
  • Page 100: Rmon Statistics

    4.2.3.6 RMON Statistics Configure RMON Statistics table on this page. The entry index key is ID; screen in Figure 4-2-3-6 appears. Figure 4-2-3-6: RMON Statistics Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. •...
  • Page 101: Dhcpv4 Relay

    4.2.4 DHCPv4 Relay 4.2.4.1 DHCPv4 Relay Configure DHCP Relay on this page. DHCP Relay is used to forward and transfer DHCP messages between the clients and the server when they are not on the same subnet domain. The DHCP option 82 enables a DHCP relay agent to insert specific information into a DHCP request packets when forwarding client DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server DHCP packets to a DHCP client.
  • Page 102 The page includes the following fields: Object Description • Relay Mode Indicates the DHCP relay mode operation. Possible modes are:  Enabled: Enable DHCP relay mode operation. When enabling DHCP relay mode operation, the agent forwards and transfers DHCP messages between the clients and the server when they are not on the same subnet domain.
  • Page 103: Dhcpv4 Relay Statistics

    4.2.4.2 DHCPv4 Relay Statistics This page provides statistics for DHCP relay. The DHCP Relay Statistics screen in Figure 4-2-4-2 appears. Figure 4-2-4-2: DHCP Relay Statistics Page Screenshot The page includes the following fields: Server Statistics Object Description • Transmit to Server The packet number that relayed from client to server.
  • Page 104: Dhcpv6 Relay

    • Keep Agent Option The packet number that kept received packets with relay agent information option. • Drop Agent Option The packet number that dropped received packets with relay agent information option. Buttons Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately.
  • Page 105: Dhcpv6 Relay Statistics

    4.2.4.4 DHCPv6 Relay Statistics Shows current, configured relay agents and their statistics. The displayed settings are: Object Description • Interface Interface identification. The id of the interface that receives client requests. • Relay Interface Interface identification. The id of the interface used for relaying. •...
  • Page 106: Dhcp Server

    4.2.5 DHCP server 4.2.5.1 Mode Configure DHCP server mode on this page. The entry index key is ID.; screen in Figure 4-2-5-1 appears. Figure 4-2-5-1: DHCP server mode Page Screenshot The page includes the following fields: Object Description • Mode Configure the operation mode per system.
  • Page 107: Excluded Ip

    Buttons : Click to add a new VLAN range. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.2.5.2 Excluded IP Configure DHCP server mode on this page. The entry index key is ID.; screen in Figure 4-2-5-2 appears.
  • Page 108: Pool

    4.2.5.3 Pool This page manages DHCP pools. According to the DHCP pool, DHCP server will allocate IP address and deliver configuration parameters to DHCP client. screen in Figure 4-2-5-3 appears. Figure 4-2-5-3: DHCP server pool Page Screenshot The page includes the following fields: Object Description •...
  • Page 109: Statistics

    4.2.5.4 Statistics This page displays the database counters and the number of DHCP messages sent and received by DHCP server. screen in Figure 4-2-5-4 appears. Figure 4-2-5-4: DHCP server Statistics Page Screenshot...
  • Page 110 The page includes the following fields: Database Counters Object Description • Pool Number of pools • Excluded IP Address Number of excluded IP address ranges • Declined IP Address Number of declined IP addresses. Binding Counters Object Description • Automatic Binding Number of bindings with network-type pools •...
  • Page 111: Binding

    4.2.5.5 Binding This page displays bindings generated for DHCP clients. screen in Figure 4-2-5-5 appears. Figure 4-2-5-5: DHCP server Binding IP page Screenshot The page includes the following fields: Object Description • IP Display IP address allocated to DHCP client. •...
  • Page 112: Declined Ip

    4.2.5.6 Declined IP This page displays declined IP addresses. screen in Figure 4-2-5-6 appears. Figure 4-2-5-6: DHCP server Declined IP Page Screenshot The page includes the following fields: Object Description • Delined IP Display List of IP addresses declined. Buttons : Check this box to refresh the page automatically Click to refresh the page immediately.
  • Page 113 The PLANET NMS Controller – LAN Configuration screens in Figure 4-2-6-2 appear. Figure 4-2-6-2: PLANET NMS Controller – LAN Configuration Page Screenshot Object Description • Remote NMS Enable Enable NMS management. • NMS Controller IP address The IP address of NMS Controller. •...
  • Page 114: Switching

    4.3 Switching 4.3.1 Port Management Use the Port Menu to display or configure the Managed Switch's ports. This section has the following items:  Port Configuration Configures port connection settings  Port Statistics Overview Lists Ethernet and RMON port statistics ...
  • Page 115 • Select any available link speed for the given switch port. Draw the menu bar to Configured Link Speed select the mode. Copper interface:  Auto – It is default mode. Set up Auto negotiation.  10Mbps HDX - Force sets 10Mbps/Half-Duplex mode. ...
  • Page 116: Port Statistics Overview

    4.3.1.2 Port Statistics Overview This page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-3-1-2 appears. Figure 4-3-1-2: Port Statistics Overview Page Screenshot The displayed counters are: Object Description • Port The logical port for the settings contained in the same row.
  • Page 117: Port Statistics Details

    4.3.1.3 Port Statistics Details This page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to display. The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit.
  • Page 118 Receive and Transmit Size Counters The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes. Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue. Receive Error Counters Object Description...
  • Page 119: Port Mirror

    4.3.1.4 Port Mirror Configure port Mirroring on this page. This function provides monitoring network traffic that forwards a copy of each incoming or outgoing packet from one port of a network Switch to another port where the packet can be studied. It enables the manager to keep close track of switch performance and alter it if necessary.
  • Page 120 Figure 4-3-1-4-3: Mirror Configuration Page Screenshot The page includes the following fields: Object Description • Session Select session id to configure. • To Enabled/Disabled the mirror or Remote Mirroring function Mode • Type Mirror The switch is running on mirror mode. source port(s) destination port are located on this switch.
  • Page 121 If you shut down the port which is a reflector port, the remote mirror function cannot work • Source VLAN(s) The switch can supports VLAN-based Mirroring. If you want to monitor some VLANs on Configuration the switch, you can set the selected VLANs on this field. •...
  • Page 122: Name Map

    4.3.1.5 Name Map Interface Name to Port Number Map Help er to express an interface, whereas CLI uses interface names. The table on this Many Web pages use a port numb page provides a means to convert from one to the other. 4.3.1.6 DDMI Config ure DDMI on this page.
  • Page 123: Ddmi Over View

    4.3.1.7 DDMI Over View Display DDMI overview information on this page. The displayed settings are: Object Description • Port DDMI port. • Vendor Indicates Vendor name SFP vendor name. • Part Number Indicates Vendor PN Part number provided by SFP vendor. •...
  • Page 124: Ddmi Detailed

    4.3.1.8 DDMI Detailed Display DDMI detailed information on this page. The displayed settings are: Object Description • Vendor Indicates SFP vendor name. • Part Number Indicates part number provided by SFP vendor. • Serial Number Indicates part number provided by SFP vendor. •...
  • Page 125: Link Aggregation

    4.3.2 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
  • Page 126: Common

    The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
  • Page 127 Hash Code Contributors The Common Aggregation Configuration screen in Figure 4-3-2-1 appears. Figure 4-3-2-1 : Common Aggregation Configuration Page Screenshot The page includes the following fields: Object Description • The Source MAC address can be used to calculate the destination port for the Source MAC Address frame.
  • Page 128: Groups

    4.3.2.2 Groups This page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are global. The Aggregation Group Configuration screen in Figure 4-3-2-2 appears. Figure 4-3-2-2: Aggregation Group Configuration Page Screenshot The page includes the following fields: .Object Description •...
  • Page 129: Static Aggregation

    4.3.2.3 Static Aggregation This page is used to see the staus of ports in Aggregation group The displayed settings are: Object Description • Aggr ID The Aggregation ID associated with this aggregation instance. • Name Name of the Aggregation group ID. •...
  • Page 130: Lacp Configuration

    4.3.2.4 LACP Configuration Link Aggregation Control Protocol (LACP) - LACP LAG negotiate Aggregated Port links with other LACP ports located on a different device. LACP allows switches connected to each other to discover automatically whether any ports are member of the same LAG.
  • Page 131 The page includes the following fields: Object Description • Port The switch port number. • LACP Enabled Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are connected to the same partner. •...
  • Page 132: Lacp System Status

    4.3.2.5 LACP System Status This page provides a status overview of all LACP instances. The LACP Status Page display the current LACP aggregation Groups and LACP Port status. The LACP System Status screen in Figure 4-3-2-5 appears. Figure 4-3-2.5: LACP System Status Page Screenshot The page includes the following fields: Object Description...
  • Page 133: Lacp Internal Port Status

    4.3.2.6 LACP Internal Port Status This page provides a status overview for the LACP internal (i.e. local system) status for all ports. Only ports that are part of an LACP group are shown. Figure 4-3-2.6: LACP internal Port Status Page Screenshot Object Description •...
  • Page 134: Lacp Neighbor Port Status

    4.3.2.7 LACP Neighbor Port Status This page provides a status overview for the LACP neighbor status for all ports. Only ports that are part of an LACP group are shown. The displayed settings are: Object Description • Port The switch port number. •...
  • Page 135: Lacp Port Statistics

    4.3.2.8 LACP Port Statistics This page provides an overview for LACP statistics for all ports. The displayed settings are: Object Description • Port The switch port number. • LACP Received Shows how many LACP frames have been received at each port. •...
  • Page 136: Vlans

    4.3.3 VLANs 4.3.3.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN.
  • Page 137: Ieee 802.1Q Vlan

    4.3.3.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks.
  • Page 138 802.1Q VLAN Tags The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to 0x8100, the packet carries the IEEE 802.1Q/802.1p tag.
  • Page 139 ■ Port VLAN ID Packets that are tagged (are carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network device to another with the VLAN information intact. This allows 802.1Q VLAN to span network devices (and indeed, the entire network –...
  • Page 140: Vlan Port Configuration

    ■ VLAN Classification When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the switch assigns the frame to an associated VLAN (based on the default VLAN ID of the receiving port). But if the frame is tagged, the switch uses the tagged VLAN ID to identify the port broadcast domain of the frame.
  • Page 141 ■ IEEE 802.1Q Tunneling (Q-in-Q) IEEE 802.1Q Tunneling (Q-in-Q) is designed for service providers carrying traffic for multiple customers across their networks. Q-in-Q tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs. This is accomplished by inserting Service Provider VLAN (SPVLAN) tags into the customer’s frames when they enter the service provider’s network, and then stripping the tags when the frames leave the network.
  • Page 142 Global VLAN Configuration The Global VLAN Configuration screen in Figure 4-3-3-3-2 appears. Figure 4-3-3-3-2 : Global VLAN Configuration Screenshot The page includes the following fields: Object Description • This field shows the allowed Access VLANs, it only affects ports configured as Allowed Access VLANs Access ports.
  • Page 143 The page includes the following fields: Object Description • Port This is the logical port number for this row. • Mode Access Access ports are normally used to connect to end stations. Dynamic features like Voice VLAN may add the port to more VLANs behind the scenes. Access ports have the following characteristics: •...
  • Page 144 The Port VLAN is called an "Access VLAN" for ports in Access mode and Native VLAN for ports in Trunk or Hybrid mode. • Port Type Ports in hybrid mode allow for changing the port type, that is, whether a frame's VLAN tag is used to classify the frame on ingress to a particular VLAN, and if so, which TPID it reacts on.
  • Page 145 Only untagged frames are accepted on ingress. Tagged frames are discarded. Egress Tagging This option is only available for ports in Hybrid mode. Ports in Trunk and Hybrid mode may control the tagging of frames on egress. ■ Untag Port VLAN Frames classified to the Port VLAN are transmitted untagged.
  • Page 146: Vlan Membership Status

    4.3.3.4 VLAN Membership Status This page provides an overview of membership status for VLAN users. The VLAN Membership Status screen in Figure 4-6-4 appears. Figure 4-3-3-4: VLAN Membership Status for Combined User Page Screenshot The page includes the following fields: Object Description •...
  • Page 147: Vlan Port Status

    • The VLAN Membership Status page shall show the current VLAN port members VLAN Membership for all VLANs configured by a selected VLAN User (selection shall be allowed by a Combo Box). When ALL VLAN Users are selected, it shall show this information for all the VLAN Users, and this is by default.
  • Page 148 The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Port Type Show the VLAN Awareness for the port. If VLAN awareness is enabled, the tag is removed from tagged frames received on the port.
  • Page 149: Svl

    4.3.3.6 SVL This page allows for controlling configuration on the switch.In SVL, one or more VLANs map to a Filter ID (FID). By default, there is a one-to-one mapping from VLAN to FID, in which case the switch acts as an bridge, but with SVL multiple VLANs may share the same MAC address table entries.
  • Page 150: Vlan Translation

    4.3.4 VLAN Translation 4.3.4.1 Port to Group Configuration This page allows you to configure switch Ports to use a given VLAN Translation Mapping Group. This will enable all VLAN Translation mappings of that group (if any) on the selected switch port.
  • Page 151: Vlan Translation Mappings

    The displayed settings are: Object Description • Port The Port column shows the list of ports for which you can configure the VLAN Translation Mapping Group. SVL is in effect.No two rows in the table can have the same FID and the FID must be a number between 1 and 4095. •...
  • Page 152 The displayed settings are: Object Description • Group ID The VLAN Translation mappings are organized into Groups, identified by the Group ID. This way a port is configured to use a number of VLAN Translation mappings easily by simply configuring it to use a given group. Then number of possible groups in a switch is equal to the number of ports present in this switch.
  • Page 153: Private Vlans

    4.3.6 Private VLANs 4.3.6.1 Private VLAN Configuration The Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be added or deleted here. Port members of each Private VLAN can be added or removed here. Private VLANs are based on the source port mask, and there are no connections to VLANs.
  • Page 154: Port Isolation

    The Private VLAN is enabled when you click "Save". The button can be used to undo the addition of new Private VLANs. Buttons Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Auto-refresh Click to refresh the page immediately. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 155 For private VLANs to be applied, the switch must first be configured for standard VLAN operation When this is in place, one or more of the configured VLANs can be configured as private VLANs. Ports in a private VLAN fall into one of these two groups: ...
  • Page 156: Vcl

    4.3.7 VCL 4.3.7.1 MAC-based VLAN The MAC-based VLAN entries can be configured here. This page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This page shows only static entries. The MAC-based VLAN screen in Figure 4-3-7-1 appears.
  • Page 157: Ip Subnet-Based Vlan

    Buttons : Click to add a new MAC-based VLAN entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the page immediately.
  • Page 158: Protocol-Based Vlan

    • Adding a New IP Click to add a new IP subnet to VLAN ID mapping entry. An empty row is added subnet-based VLAN to the table, and the mapping can be configured as needed. Any IP address/mask can be configured for the mapping. Legal values for the VLAN ID are 1 to 4095.
  • Page 159 vary depending on the new frame type you selected. • Value Valid value that can be entered in this text field depends on the option selected from the preceding Frame Type selection menu. Below is the criteria for three different Frame Types: For Ethernet: Values in the text field when Ethernet is selected as a Frame Type is called etype.
  • Page 160: Protocol-Based Vlan Membership

    4.3.7.4 Protocol-based VLAN Membership This page allows you to map a already configured Group Name to a VLAN for the switch. The Group Name to VLAN Mapping Table screen in Figure 4-3-7-4 appears. Figure 4-3-7-4: Group Name to VLAN Mapping Table Page Screenshot The page includes the following fields: Object Description...
  • Page 161: Gvrp

    4.3.8 GVRP GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network. It defines a way for switches to exchange VLAN information in order to register VLAN members on ports across the network.
  • Page 162: Gvrp Configuration

    4.3.8.1 GVRP Configuration This page allows you to configure the global GVRP configuration settings that are commonly applied to all GVRP enabled ports. as well. as screen in Figure 4-3-8-1 appears. Figure 4-3-8-1: GVRP Configuration Page Screenshot The page includes the following fields: General Settings Object Description...
  • Page 163: Gvrp Port Configuration

    4.3.8.2 GVRP Port Configuration This configuration can be performed either before or after GVRP is configured globally - the protocol operation will be the same. as well. as screen in Figure 4-3-8-2 appears. Figure 4-3-8-2: GVRP Port Configuration Page Screenshot The page includes the following fields: General Settings Object...
  • Page 164: Mrp

    4.3.9 MRP 4.3.9.1 Port Configuration This page allows you to configure the MRP generic settings for all switch ports. The displayed settings are: The displayed settings are: Object Description • Port The port number for which the following configuration applies. •...
  • Page 165: Mvrp Global Configuration

    4.3.9.2 MVRP Global Configuration This page allows you to configure the MVRP global and per port settings altogether. The page is divided into a global section and a per-port configuration section. The displayed settings are: Object Description • Global State Enable or disable the MVRP protocol globally.
  • Page 166: Mvrp Statistics

    Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. Auto-refresh Click to refresh the page immediately. 4.3.9.3 MVRP Statistics This page provides statistics for the MVRP protocol for all switch ports.
  • Page 167: Spanning Tree

    4.3.10 Spanning Tree 4.3.10.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 168 The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission. The communication between switches via BPDUs results in the following: ...
  • Page 169 Figure 4-3-10-1-1: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
  • Page 170 The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value Bridge Identifier(Not user A combination of the User-set priority and 32768 + MAC configurable the switch’s MAC address. except by setting priority The Bridge Identifier consists of two parts: below) a 16-bit priority and a 48-bit Ethernet MAC address 32768 + MAC...
  • Page 171 User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority –...
  • Page 172 Figure 4-3-10-1-2: Before Applying the STA Rules In this example, only the default STP values are used. Figure 4-3-10-1-3: After Applying the STA Rules The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C.
  • Page 173: System Configuration

    4.3.10.2 System Configuration This page allows you to configure STP system settings. The settings are used by all STP Bridge instances in the Switch. The Managed Switch support the following Spanning Tree protocols: ‧ Compatiable -- Spanning Tree Protocol (STP):Provides a single path between end stations, avoiding and eliminating loops.
  • Page 174 • Bridge Priority Controls the bridge priority. Lower numeric values have better priority. The bridge priority plus the MSTI instance number, concatenated with the 6-byte MAC address of the switch forms a Bridge Identifier. For MSTP operation, this is the priority of the CIST. Otherwise, this is the priority of the STP/RSTP bridge.
  • Page 175: Bridge Status

    The Managed Switch implements the Rapid Spanning Protocol as the default spanning tree protocol. When selecting “Compatibles” mode, the system uses the RSTP (802.1w) to be compatible and to co-work with another STP (802.1D)’s BPDU control packet. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 176: Cist Port Configuration

    4.3.10.4 CIST Port Configuration This page allows the user to inspect the current STP CIST port configurations, and possibly change them as well. The CIST Port Configuration screen in Figure 4-3-10-4-1 appears. Figure 4-3-10-4-1: STP CIST Port Configuration Page Screenshot The page includes the following fields: Object Description...
  • Page 177 • AutoEdge Controls whether the bridge should enable automatic edge detection on the bridge port. This allows operEdge to be derived from whether BPDU's are received on the port or not. • Restricted Role If enabled, causes the port not to be selected as Root Port for the CIST or any MSTI, even if it has the best spanning tree priority vector.
  • Page 178 By default, the system automatically detects the speed and duplex mode used on each port, and configures the path cost according to the values shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set to 65,535.
  • Page 179: Msti Priorities

    4.3.10.5 MSTI Priorities This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-3-10-5 appears. Figure 4-3-10-5: MSTI Priority Page Screenshot The page includes the following fields: Object Description •...
  • Page 180: Msti Configuration

    4.3.10.6 MSTI Configuration This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-3-10-6 appears. Figure 4-3-10-6: MSTI Configuration Page Screenshot The page includes the following fields: Configuration Identification Object Description...
  • Page 181: Msti Ports Configuration

    MSTI Mapping Object Description • MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. • VLANs Mapped The list of VLAN's mapped to the MSTI. The VLANs must be separated with comma and/or space.
  • Page 182 Figure 4-3-10-7-2: MST1 MSTI Port Configuration Page Screenshot The page includes the following fields: MSTx MSTI Port Configuration Object Description • Port The switch port number of the corresponding STP CIST (and MSTI) port. • Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values.
  • Page 183: Port Status

    4.3.10.8 Port Status This page displays the STP CIST port status for port physical ports in the currently selected switch. The STP Port Status screen in Figure 4-3-10-8 appears. Figure 4-3-10-8: STP Port Status Page Screenshot The page includes the following fields: Object Description •...
  • Page 184: Port Statistics

    4.3.10.9 Port Statistics This page displays the STP port statistics counters for port physical ports in the currently selected switch. The STP Port Statistics screen in Figure 4-3-10-9 appears. Figure 4-3-10-9: STP Statistics Page Screenshot The page includes the following fields: Object Description •...
  • Page 185: Igmp Snooping

    4.3.11 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member of the multicast group.
  • Page 186 Multicast Flooding IGMP Snooping Multicast Stream Control...
  • Page 187 IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
  • Page 188: Profile Table

    IGMP State Transitions  IGMP Querier A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
  • Page 189 The page includes the following fields: Object Description • Global Profile Mode Enable/Disable the Global IPMC Profile. System starts to do filtering based on profile settings only when the global profile mode is enabled. • Delete Check to delete the entry. The designated entry will be deleted during the next save.
  • Page 190: Address Entry

    4.3.11.2 Address Entry This page provides address range settings used in . The address entry is used to specify the address IPMC profile range that will be associated with Profile. It is allowed to create at maximum 128 address entries in the IPMC system.
  • Page 191: Igmp Snooping Configuration

    4.3.11.3 IGMP Snooping Configuration This page provides IGMP Snooping related configuration. The IGMP Snooping Configuration screen in Figure 4-3-11-3 appears. Figure 4-3-11-3: IGMP Snooping Configuration Page Screenshot The page includes the following fields: Object Description • Enable the Global IGMP Snooping. Snooping Enabled •...
  • Page 192 The Switch forwards IGMP join or leave packets to an IGMP router port.  Auto: Select “Auto” to have the Managed Switch automatically uses the port as IGMP Router port if the port receives IGMP query packets.  Fix: The Managed Switch always uses the specified port as an IGMP Router port.
  • Page 193: Igmp Snooping Vlan Configuration

    4.3.11.4 IGMP Snooping VLAN Configuration Each page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table.
  • Page 194 The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0 • RV Robustness Variable. The Robustness Variable allows tuning for the expected packet loss on a network. The allowed range is 1 to 255, default robustness variable value is 2. •...
  • Page 195: Igmp Snooping Port Group Filtering

    4.3.11.5 IGMP Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service based on a specific subscription plan. The IGMP filtering feature fulfills this requirement by restricting access to specified multicast services on a switch port, and IGMP throttling limits the number of simultaneous multicast groups a port can join.
  • Page 196: Igmp Snooping Status

    4.3.11.6 IGMP Snooping Status This page provides IGMP Snooping status. The IGMP Snooping Status screen in Figure 4-3-11-6 appears. Figure 4-3-11-6: IGMP Snooping Status Page Screenshot The page includes the following fields: Object Description • VLAN ID The VLAN ID of the entry. •...
  • Page 197: Igmp Group Information

    Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.3.11.7 IGMP Group Information Entries in the IGMP Group Table are shown on this Page. The IGMP Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per page"...
  • Page 198: Igmpv3 Sfm Information

    4.3.11.8 IGMPv3 SFM Information Entries in the IGMP SSM Information Table are shown on this page. The IGMP SSM Information Table is sorted first by VLAN ID, then by group, and then by Port No. Diffrent source addresses belong to the same group are treated as single entry. Each page shows up to 99 entries from the IGMP SSM (Source Specific Multicast) Information table, default being 20, selected through the "entries per page"...
  • Page 199: Mld Snooping

    4.3.12 MLD Snooping 4.3.12.1 MLD Snooping Configuration This page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-3-12-1 appears. Figure 4-3-12-1: MLD Snooping Configuration Page Screenshot The page includes the following fields: Object Description • Snooping Enabled Enable the Global MLD Snooping.
  • Page 200: Mld Snooping Vlan Configuration

    join and leave messages to the router side. • Router Port Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier. If an aggregation member port is selected as a router port, the whole aggregation will act as a router port.
  • Page 201 • Querier Election Enable to join MLD Querier election in the VLAN. Disable to act as a MLD Non-Querier. • Compatibility Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD operating on hosts and routers within a network.
  • Page 202: Mld Snooping Port Group Filtering

    4.3.12.3 MLD Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service based on a specific subscription plan. The MLD filtering feature fulfills this requirement by restricting access to specified multicast services on a switch port, and MLD throttling limits the number of simultaneous multicast groups a port can join.
  • Page 203: Mld Snooping Status

    4.3.12.4 MLD Snooping Status This page provides MLD Snooping status. The IGMP Snooping Status screen in Figure 4-3-12-4 appears. Figure 4-3-12-4: MLD Snooping Status Page Screenshot The page includes the following fields: Object Description • The VLAN ID of the entry. VLAN ID •...
  • Page 204: Mld Group Information

    Buttons : Click to refresh the page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.3.12.5 MLD Group Information Entries in the MLD Group Table are shown on this page. The MLD Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the MLD Group table, default being 20, selected through the "entries per page"...
  • Page 205: Mldv2 Information

    4.3.12.6 MLDv2 Information Entries in the MLD SFM Information Table are shown on this page. The MLD SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port.
  • Page 206: Mvr (Multicast Vlan Registration)

    4.3.13 MVR (Multicast VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. ■ In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.
  • Page 207: Mvr Configuratio

    4.3.13.1 MVR Configuratio Figure 4-3-13-1: MVR Configuration Page Screenshot The page includes the following fields: Object Description • MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full.
  • Page 208 VLAN. Maximum length of the MVR VLAN Name string is 16. MVR VLAN Name can only contain alphabets or numbers. When the optional MVR VLAN name is given, it should contain at least one alphabet. MVR VLAN name can be edited for the existing MVR VLAN entries or it can be added to the new entries.
  • Page 209: Mvr Status

    I indicates Inactive; S indicates Source; R indicates Receiver The default Role is Inactive. • Immediate Leave Enable the fast leave on the port. Buttons : Click to add new MVR VLAN. Specify the VID and configure the new entry. Click "Save" : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
  • Page 210: Mvr Groups Information

    4.3.13.3 MVR Groups Information Entries in the MVR Group Table are shown on this page. The MVR Group Table is sorted first by VLAN ID, and then by group. Each page shows up to 99 entries from the MVR Group table, default being 20, selected through the "entries per page" input field.
  • Page 211: Mvr Sfm Information

    4.3.13.4 MVR SFM Information Entries in the MVR SFM Information Table are shown on this page. The MVR SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port.
  • Page 212: Lldp

    4.3.14 LLDP 4.3.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
  • Page 213 The page includes the following fields: LLDP Parameters Object Description • Tx Interval The switch is periodically transmitting LLDP frames to its neighbors for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds. Default: 30 seconds This attribute must comply with the following rule: (Transmission Interval * Hold Time Multiplier) ≤65536, and Transmission Interval >= (4...
  • Page 214 information received from neighbors. • CDP Aware Select CDP awareness. The CDP operation is restricted to decoding incoming CDP frames (The switch doesn't transmit CDP frames). CDP frames are only decoded if LLDP on the port is enabled. Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbours' table are decoded.
  • Page 215: Lldp Neighbor

    4.3.14.3 LLDP Neighbor This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbor is detected. The LLDP Neighbor Information screen in Figure 4-3-14-3 appears. Figure 4-3-14-3: LLDP Neighbor Information Page Screenshot The page includes the following fields: Object Description...
  • Page 216: Lldp Med Configuration

    4.3.14.4 LLDP MED Configuration This page allows you to configure the LLDP-MED. The LLDPMED Configuration screen in Figure 4-3-14-4 appears. Figure 4-3-14-4: LLDPMED Configuration Page Screenshot The page includes the following fields: Fast start repeat count Object Description • Rapid startup and Emergency Call Service Location Identification Discovery of Fast start repeat count endpoints is a critically important aspect of VoIP systems in general.
  • Page 217 network policy to permitted voice-capable devices), both in order to conserve the limited LLDPU space and to reduce security and system integrity issues that can come with inappropriate knowledge of the network policy. With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction between the protocol and the application layers on top of the protocol, in order to achieve these related properties.
  • Page 218 A Network Connectivity Device is a LLDP-MED Device that provides access to the IEEE 802 based LAN infrastructure for LLDP-MED Endpoint Devices An LLDP-MED Network Connectivity Device is a LAN access device based on any of the following technologies : 1.
  • Page 219 building, 0.0 represents the floor level associated with ground level at the main entrance. • Map Datum The Map Datum used for the coordinates given in this Option  WGS84: (Geographical 3D) - World Geodesic System 1984, CRS Code 4327, Prime Meridian Name: Greenwich. ...
  • Page 220 • Floor Floor - Example: 4 • Room no. Room number - Example: 450F • Place type Place type - Example: Office • Postal community Postal community name - Example: Leonia name • P.O. Box Post office box (P.O. BOX) - Example: 12345 •...
  • Page 221 A large network may support multiple VoIP policies across the entire organization, and different policies per application type. LLDP-MED allows multiple policies to be advertised per port, each corresponding to a different application type. Different ports on the same Network Connectivity Device may advertise different sets of policies, based on the authenticated user identity or port configuration.
  • Page 222  Streaming Video - for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment. Video applications relying on TCP with buffering would not be an intended use of this application type.
  • Page 223: Lldp-Med Neighbor

    Object Description • Port The port number for which the configuration applies. • Policy ID The set of policies that shall apply for a given port. The set of policies is selected by checkmarking the checkboxes that corresponds to the policies Buttons : Click to apply changes Click to undo any changes made locally and revert to previously saved values.
  • Page 224 2. IEEE 802.1 Bridge 3. IEEE 802.3 Repeater (included for historical reasons) 4. IEEE 802.11 Wireless Access Point 5. Any device that supports the IEEE 802.1AB and MED extensions defined by TIA-1057 and can relay IEEE 802 frames via any method. LLDP-MED Endpoint Device Definition Within the LLDP-MED Endpoint Device category, the LLDP-MED scheme is broken into further Endpoint Device Classes, as defined in the following.
  • Page 225 expected to adhere to this class include (but are not limited to) end user communication appliances, such as IP Phones, PC-based softphones, or other communication appliances that directly support the end user. Discovery services defined in this class include provision of location identifier (including ECS / E911 information), embedded L2 switch support, inventory management •...
  • Page 226 policy for the video signaling than for the video media. • Policy Policy indicates that an Endpoint Device wants to explicitly advertise that the policy is required by the device. Can be either Defined or Unknown  Unknown: The network policy for the specified application type is currently unknown.
  • Page 227: Port Statistics

    4.3.14.6 Port Statistics This page provides an overview of all LLDP traffic. Two types of counters are shown. Global counters are counters that refer to the whole switch, while local counters refers to counters for the currently selected switch. The LLDP Statistics screen in Figure 4-3-14-6 appears.
  • Page 228 LLDP Statistics Local Counters The displayed table contains a row for each port. The columns hold the following information: Object Description • Local Port The port on which LLDP frames are received or transmitted. • Tx Frames The number of LLDP frames transmitted on the port. •...
  • Page 229: Mac Address Table

    4.3.15 MAC Address Table Switching of frames is based upon the DMAC address contained in the frame. The Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ). This table contains both static and dynamic entries.
  • Page 230 The page includes the following fields: Aging Configuration By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description • Disable Automatic Enables/disables the automatic aging of dynamic entries Aging •...
  • Page 231: Mac Address Table Status

    4.3.15.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. The MAC Address Table screen in Figure 4-3-15-2 appears.
  • Page 232 The page includes the following fields: Object Description • Type Indicates whether the entry is a static or dynamic entry. • VLAN The VLAN ID of the entry. • MAC Address The MAC address of the entry. • The ports that are members of the entry. Port Members Buttons Auto-refresh...
  • Page 233: Loop Protection

    4.3.16 Loop Protection This chapter describes enabling loop protection function that provides loop protection to prevent broadcast loops in Managed Switch. 4.3.16.1 Configuration This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well as screen in Figure 4-3-16-1 appears.
  • Page 234: Loop Protection Status

    Port Configuration Object Description • Port The switch port number of the port. • Enable Controls whether loop protection is enabled on this switch port. • Action Configures the action performed when a loop is detected on a port. Valid values are Shutdown Port, Shutdown Port and Log or Log Only.
  • Page 235: Udld

    4.3.17 UDLD Unidirectional Link Detection (UDLD) is a data link layer protocol from Cisco Systems to monitor the physical configuration of the cables and detect unidirectional links. UDLD complements the Spanning Tree Protocol which is used to eliminate switching loops.. 4.3.17.1 UDLD Port Configuration This page allows the user to inspect the current UDLDconfigurations, and possibly change them as well.
  • Page 236 The page includes the following fields: General Settings Object Description • Port Port number of the switch. • UDLD Mode Configures the UDLD mode on a port. Valid values are Disable, Normal and Aggressive. Default mode is Disable. Disable: In disabled mode, UDLD functionality doesn't exists on port.. Normal: In normal mode, if the link state of the port was determined to be unidirectional, it will not affect the port state.
  • Page 237: Udld Status

    4.3.17.2 UDLD Status This page displays the UDLD status of the ports as well. as screen in Figure 4-3-17-2 appears. Figure 4-3-17-2: UDLD status Page Screenshot The page includes the following fields: UDLD port status Object Description • UDLD Admin State The current port state of the logical port, Enabled if any of state(Normal,Aggressive) is Enabled.
  • Page 238: Link Oam

    4.3.18 Link OAM 4.3.18.1 Statistics This page provides detailed OAM traffic statistics for a specific switch port. Use the port select box to select which switch port details to display.The displayed counters represent the total number of OAM frames received and transmitted for the selected port.
  • Page 239 A duplicate Event Notification OAMPDU is indicated as an Event Notification OAMPDU with a Sequence Number field that is identical to the previously transmitted Event Notification OAMPDU Sequence Number. • Rx and Tx Loopback A count of the number of Loopback Control OAMPDUs received and transmitted Control on this interface.
  • Page 240: Port Status

    4.3.18.2 Port Status This page provides Link OAM configuration operational status. The displayed fields shows the active configuration status for the selected port. as well. as screen in Figure 4-3-18-2 appears. Figure 4-3-18-2: Port Status Page Screenshot The page includes the following fields: General Settings Object Description...
  • Page 241 • Unidirectional This feature is not available to be configured by the user. The status of this Operation Support configuration is retrieved from the PHY. • Remote Loopback If status is enabled, DTE is capable of OAM remote loopback mode. Support •...
  • Page 242: Event Status

    4.3.18.3 Event Status This page allows the user to inspect the current Link OAM Link Event configurations, and change them as well. as screen in Figure 4-3-18-3 appears. Figure 4-3-18-3: Link OAM Statistic Page Screenshot The page includes the following fields: General Settings Object Description...
  • Page 243 • Frame errors This four-octet field indicates the number of detected errored frames in the period. • Total frame errors This eight-octet field indicates the sum of errored frames that have been detected since the OAM sublayer was reset. • Total frame error This four-octet field indicates the number of Errored Frame Event TLVs that have events been generated since the OAM sublayer was reset.
  • Page 244: Port Settings

    • Total Error Frame This four-octet field indicates the sum of errored frame seconds that have been Seconds Summary detected since the OAM sublayer was reset. Errors • Total Error Frame This four-octet field indicates the number of Errored Frame Seconds Summary Seconds Summary Event TLVs that have been generated since the OAM sublayer was reset, Events...
  • Page 245 The page includes the following fields: General Settings Object Description • Port The switch port number. • OAM Enabled Controls whether Link OAM is enabled on this switch port. Enabling Link OAM provides the network operators the ability to monitor the health of the network and quickly determine the location of failing links or fault conditions.
  • Page 246: Event Settings

    4.3.18.5 Event Settings This page allows the user to inspect the current Link OAM Link Event configurations, and change them as well, as screen in Figure 4-3-18-5 appears. Figure 4-3-18-5: Event Settings Page Screenshot The page includes the following fields: General Settings Object Description...
  • Page 247: Mib Retrieval

    • Seconds Summary The Errored Frame Seconds Summary Event TLV counts the number of errored Event frame seconds that occurred during the specified period. The period is specified by a time interval. This event is generated if the number of errored frame seconds is equal to or greater than the specified threshold for that period.
  • Page 248: Routing

    4.4 Routing 4.4.1 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 128. The screen in Figure 4-4-1 appears.
  • Page 249 Specify from which DHCPv6-enabled interface a provided domain name should be preferred. When DNS proxy is enabled, system will relay DNS requests to the DNS Proxy currently configured DNS server, and reply as a DNS resolver to the client devices on the network. •...
  • Page 250 The VLAN ID (VID) of the specific IPv6 interface associated with the Next Hop VLAN gateway. Buttons : Click to add a new IP interface. A maximum of 128 interfaces are supported. : Click to add a new IP route. A maximum of 32 routes are supported. : Click to apply changes.
  • Page 251: Ip Status

    4.4.2 IP Status IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbor cache (ARP cache) status. The screen in Figure 4-4-2 appears. Figure 4-4-2: IP Status Page Screenshot The page includes the following fields: Object Description...
  • Page 252: Routing Information Base

    4.4.3 Routing Information Base This is IPv4 route entry table. It is used to provide the route entries status information. The screen in Figure 4-4-3 appears. Figure 4-4-3: IP Status Page Screenshot The page includes the following fields: Object Description Protocol The protocol of the route.
  • Page 253: Ospf

    4.4.4 OSPF Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). To implement OSPF for a large network, you must first organize the network into logical areas to limit the number of OSPF routers that actively exchange Link State Advertisements (LSAs).
  • Page 254: Global Configuration

    4.4.4.1 Global Configuration This is OSPF router configuration table. It is a general group to configure the OSPF common router parameters. The screen in Figure 4-4-4-1 appears. Figure 4-4-4-1: OSPF Global Configuration Page Screenshot The page includes the following fields: Object Description OSPF Router Mode...
  • Page 255 Default Passive Mode Configure all interfaces as passive-interface by default.When an interface is configured as a passive-interface, the OSFP routing updates sending is suppressed, therefore the interface does not establish adjacencies (No OSPF Hellos). The subnet of all interfaces (both passive and active) is advertised by the OSPF router.
  • Page 256: Network Area

    4.4.4.2 Network Area OSPF protocol broadcast messages (i.e., Link State Advertisements) are restricted by area to limit their impact on network performance. Before assigning an Area ID to a specific OSPF interface, you must first specify the Area ID in this table. Each entry in this table identifies a logical group of OSPF routers that actively exchange Link State Advertisements (LSAs) to ensure that they share an identical view of the network topology.
  • Page 257: Passive Interface

    The page includes the following fields: Object Description Network Address IPv4 network address. Mask Length IPv4 network mask length. Area ID The OSPF area ID. Buttons Click to add new entry. Click to save changes. Click to undo any changes made locally and revert to previously saved values. 4.4.4.3 Passive Interface This is OSPF router interface configuration table.
  • Page 258: Stub Area

    4.4.4.4 Stub Area This is OSPF stub area configuration table. The configuration is used to reduce the link-state database size and therefore the memory and CPU requirement by forbidding some LSAs. The screen in Figure 4-4-4-4 appears. Figure 4-4-4-4: Stub Area Page Screenshot The page includes the following fields: Object Description...
  • Page 259: Area Authentication

    4.4.4.5 Area Authentication This is OSPF area authentication configuration table. It is used to applied the authentication to all the interfaces belong to the area. The screen in Figure 4-4-4-5 appears. Figure 4-4-4-5: Area Authentication Page Screenshot The page includes the following fields: Object Description Area ID...
  • Page 260: Area Range

    4.4.4.6 Area Range This is OSPF area range configuration table. It is used to summarize the intra area paths from a specific address range in one summary-LSA(Type-3) and advertised to other areas or configure the address range status as 'DoNotAdvertise' which the summary-LSA(Type-3) is suppressed.
  • Page 261: Interface Configuration

    4.4.4.7 Interface Configuration This is interface configuration parameter table. The screen in Figure 4-4-4-7 appears. Figure 4-4-4-7: Interface Configuration Page Screenshot The page includes the following fields: Object Description Interface Interface identification. Priority User specified router priority for the interface. The allowed range is 0 to 255 and the default value is 1.
  • Page 262 Dead Interval The time interval (in seconds) between hello packets. The allowed range is 1 to 65535 and the default value is 40 (seconds). Retransmit Interval The time interval (in seconds) between link-state advertisement(LSA) retransmissions for adjacencies. The allowed range is 1 to 65535 and the default value is 5 (seconds). Auth.
  • Page 263: Virtual Link

    4.4.4.8 Virtual Link All OSPF areas must connect to the backbone. If an area does not have a direct physical connection to the backbone, you can configure a virtual link that provides a logical path to the backbone. To connect an isolated area to the backbone, the logical path can cross a single nonbackbone area to reach the backbone.
  • Page 264 Dead Interval The number of seconds to wait until the neighbour is decalred to be dead. The allowed range is 1 to 65535 and the default value is 40 (seconds). Retransmit Interval The time interval (in seconds) between link-state advertisement(LSA) retransmissions for adjacencies.
  • Page 265: Global Status

    4.4.4.9 Global Status This is OSPF router status table. It is used to provide the OSPF router status information. The screen in Figure 4-4-4-9 appears. Figure 4-4-4-9: Virtual Link Page Screenshot The page includes the following fields: Object Description Router ID OSPF router ID.
  • Page 266: Area Status

    4.4.4.10 Area Status This is OSPF network area status table. It is used to provide the OSPF network area status information. The screen in Figure 4-4-4-10 appears. Figure 4-4-4-10: Area Status Page Screenshot The page includes the following fields: Object Description Area ID The Area ID.
  • Page 267: Neighbor Status

    4.4.4.11 Neighbor Status This is OSPF IPv4 neighbor status table. It is used to provide the OSPF neighbor status information. The screen in Figure 4-4-4-11 appears. Figure 4-4-4-11: Neighbor Status Page Screenshot The page includes the following fields: Object Description Neighbor ID The Neighbor ID.
  • Page 268: Interface Status

    4.4.4.12 Interface Status This is OSPF interface status table. It is used to provide the OSPF interface status information. The screen in Figure 4-4-4-12 appears. Figure 4-4-4-12: Interface Status Page Screenshot The page includes the following fields: Object Description Interface Interface identification.
  • Page 269: Quality Of Service

    4.5 Quality of Service 4.5.1 General Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic.
  • Page 270: Qos Port Classification

    4.5.1.1 QOS Port Classification This page allows you to configure the basic QoS Classification settings for all switch ports. The Port classification screen in Figure 4-5-1-1 appears. Figure 4-5-1-1: QoS Ingress Port Policers Page Screenshot The page includes the following fields: Object Description •...
  • Page 271 All frames are classified to a PCP value. If the port is VLAN aware and the frame is tagged, then the frame is classified to the PCP value in the tag. Otherwise the frame is classified to the default PCP value.
  • Page 272: Queue Policing

    4.5.1.2 Queue Policing This page allows you to configure the Queue Policer settings for all switch ports.. The Queue Policing screen in Figure 4-5-1-2 appears. Figure 4-5-1-2 : QoS Ingress Port Classification Page Screenshot The page includes the following fields: Object Description •...
  • Page 273: Port Tag Remarking

    4.5.1.3 Port Tag Remarking This page provides an overview of Egress Port Tag Remarking for all switch ports. The Port tag remarking screen in Figure 4-5-1-3 appears. Figure 4-5-1-3: Port Tag Remarking Page Screenshot The page includes the following fields: Object Description •...
  • Page 274: Werd

    4.5.1.4 WERD This page allows you to configure the Random Early Detection (RED) settings.. The Port Shaper screen in Figure 4-5-1-4 appears. Figure 4-5-1-4: QoS Egress Port Shapers Page Screenshot The page includes the following fields: Object Description • Group The WRED group number for which the configuration below applies.
  • Page 275: Statistics

    4.5.1.5 Statistics This page provides statistics for the different queues for all switch ports. The statistice screen in Figure 4-5-1-5 appears. Figure 4-5-1-5: QoS statistics Page Screenshot The page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. •...
  • Page 276: Bandwidth Control

    4.5.2 Bandwidth Control 4.5.2.1 Port Policing This page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-5-2-1 appears. Figure 4-5-2-1: QoS Ingress Port Policers Page Screenshot The page includes the following fields: Object Description •...
  • Page 277: Port Schedule

    4.5.2.2 Port Schedule The Port Scheduler and Shapers for a specific port are configured on this page. The QoS Egress Port Schedule and Shaper screen in Figure 4-5-2-2 appears. Figure 4-5-2-2: QoS Egress Port Schedule and Shapers Page Screenshot...
  • Page 278 The page includes the following fields: Object Description • Schedule Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. • Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port. •...
  • Page 279: Port Shaping

    4.5.2.3 Port Shaping This page provides an overview of QoS Egress Port Shapers for all switch ports.. The Port shaping screen in Figure 4-5-2-3 appears. Figure 4-5-2-3: QoS Egress Port Schedule and Shapers Page Screenshot...
  • Page 280 The page includes the following fields: Object Description • Schedule Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port. • Queue Shaper Enable Controls whether the queue shaper is enabled for this queue on this switch port. •...
  • Page 281: Storm Control

    4.5.3 Storm Control 4.5.3.1 Storm Control Configuration Storm control for the switch is configured on this page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
  • Page 282: Differentiated Service

    4.5.4 Differentiated Service 4.5.4.1 Port DSCP This page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-5-4-1 appears. Figure 4-5-4-1: QoS Port DSCP Configuration Page Screenshot The page includes the following fields: Object Description •...
  • Page 283  Remap DP Unaware: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value. The remapped DSCP value is always taken from the 'DSCP Translation->Egress Remap DP0' table.  Remap DP Aware: DSCP from analyzer is remapped and frame is remarked with remapped DSCP value.
  • Page 284: Dscp-Based Qos

    4.5.4.2 DSCP-based QoS This page allows you to configure the basic QoS DSCP-based QoS Ingress Classification settings for all switches. The DSCP-based QoS screen in Figure 4-5-4-2 appears. Figure 4-5-4-2: DSCP-based QoS Ingress Classification Page Screenshot The page includes the following fields: Object Description •...
  • Page 285: Dscp Translation

    4.5.4.3 DSCP Translation This page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. The DSCP Translation screen in Figure 4-4-4-3 appears. Figure 4-5-4-3: DSCP Translation Page Screenshot The page includes the following fields: Object Description...
  • Page 286: Dscp Classification

    4.5.4.4 DSCP Classification This page allows you to map DSCP value to a QoS Class and DPL value. The DSCP Classification screen in Figure 4-5-4-4 appears. Figure 4-5-4-4: DSCP Classification Page Screenshot The page includes the following fields: Object Description •...
  • Page 287: Qcl

    4.5.5 QCL 4.5.5.1 QoS Control List This page shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list. The QoS Control List screen in Figure 4-5-5-1 appears.
  • Page 288: Qos Control Entry Configuration

    ■ Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. ■ LLC: Only (LLC) frames are allowed. ■ SNAP: Only (SNAP) frames are allowed. ■ IPv4: The QCE will match only IPV4 frames. ■ IPv6: The QCE will match only IPV6 frames. •...
  • Page 289 The page includes the following fields: Object Description • Port Members Check the checkbox button in case you what to make any port member of the QCL entry. By default all ports will be checked • Key Parameters Key configuration are described as below: ■...
  • Page 290 zero DSCP Diffserv Code Point value(DSCP): It can be specific value, range of value or 'Any'. DSCP values are in the range 0-63 including BE, CS1-CS7, EF or AF11-AF43 ■ IP Fragment IPv4 frame fragmented option: yes|no|any ■ Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP ■...
  • Page 291: Qcl Status

    4.5.5.3 QCL Status This page shows the QCL status by different QCL users. Each row describes the QCE that is defined. It is a conflict if a specific QCE is not applied to the hardware due to hardware limitations. The maximum number of QCEs is 256 on each switch. The QoS Control List Status screen in Figure 4-5-5-3 appears.
  • Page 292: Voice Vlan Configuration

    available, in that case it shows conflict status as 'Yes', otherwise it is always 'No'. Please note that conflict can be resolved by releasing the H/W resources required to add QCL entry on pressing 'Resolve Conflict' button. Buttons : Select the QCL status from this drop down list. Auto-refresh : Check this box to refresh the page automatically.
  • Page 293 Figure 4-5-5-4: Voice VLAN Configuration Page Screenshot The page includes the following fields: Object Description • Mode Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Possible modes are: ■...
  • Page 294: Voice Vlan Oui Table

    4.5.5.5 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-5-5-6 appears. Figure 4-5-5-6: Voice VLAN OUI Table Page Screenshot The page includes the following fields: Object...
  • Page 295: Security

    4.6 Security 4.6.1 Access Security 4.6.1.1 Access Management Configure access management table on this page. The maximum entry number is 16. If the application's type match any one of the access management entries, it will allow access to the switch. The Access Management Configuration screen in Figure 4-6-1-1 appears.
  • Page 296: Access Management Statistics

    Buttons : Click to add a new access management entry. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.6.1.2 Access Management Statistics This page provides statistics for access management. The Access Management Statistics screen in Figure 4-6-1-2 appears.
  • Page 297: Ssh

    4.6.1.3 SSH Configure SSH on this page. This page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
  • Page 298: Https

    4.6.1.4 HTTPs Configure HTTPS on this page. The HTTPS Configuration screen in Figure 4-6-1-4 appears. Figure 4-6-1-4: HTTPS Configuration Screen Page Screenshot The page includes the following fields: Object Description • Mode Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection.
  • Page 299 • Certificate Upload Upload a certificate PEM file into the switch. The file should contain the certificate and private key together. If you have two separated files for saving certificate and private key. Use the Linux cat command to combine them into a single PEM file. For example, cat my.cert my.key >...
  • Page 300: Aaa

    4.6.2 AAA This section is to control the access to the Managed Switch, including the user access and management control. The Authentication section contains links to the following main topics:  User Authentication  IEEE 802.1X Port-based Network Access Control ...
  • Page 301 The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide. Overview of User Authentication It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local or remote authentication methods, such as telnet and Web browser. This Managed Switch provides secure network management access using the following options: ...
  • Page 302 Figure 4-5-2  Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) ...
  • Page 303  Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
  • Page 304  Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to flow normally.
  • Page 305: Authentication Configuration

    4.6.2.1 Authentication Configuration This page allows you to configure how a user is authenticated when he logs into the switch via one of the management client interfaces. The Authentication Method Configuration screen in Figure 4-6-2-1 appears. Figure 4-6-2-1: Authentication Method Configuration Page Screenshot...
  • Page 306 The page includes the following fields: Authentication Method Configuration The authentication section allows you to configure how a user is authenticated when he logs into theswitch via one of the management client interfaces. The table has one row for each client type and a number of columns, which are: Object Description •...
  • Page 307 Accounting Method Configuration The accounting section allows you to configure command and exec (login) accounting. The table has one row for each client type and a number of columns, which are: Object Description • Client The management client for which the configuration below applies. •...
  • Page 308: Radius

    4.6.2.2 RADIUS This page allows you to configure the RADIUS Servers. The RADIUS Configuration screen in Figure 4-6-2-2 appears. Figure 4-6-2-2: RADIUS Server Configuration Page Screenshot The page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description •...
  • Page 309 • NAS-IP-Address The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used. • NAS-IPv6-Address The IPv6 address to be used as attribute 95 in RADIUS Access-Request packets.
  • Page 310: Tacacs

    4.6.2.3 TACACS+ This page allows you to configure the TACACS+ Servers. The TACACS+ Configuration screen in Figure 4-6-2-3 appears. Figure 4-6-2-3: TACACS+ Server Configuration Page Screenshot The page includes the following fields: Global Configuration These setting are common for all of the TACACS+ Servers. Object Description •...
  • Page 311: Radius Overview

    Server Configuration The table has one row for each TACACS+ server and a number of columns, which are: Object Description • Delete To delete a TACACS+ server entry, check this box. The entry will be deleted during the next Save. •...
  • Page 312 The page includes the following fields: RADIUS Authentication Server Status Overview Object Description • # The RADIUS server number. Click to navigate to detailed statistics for this server. • IP Address The IP address and UDP port number (in <IP Address>:<UDP Port> notation) of this server. •...
  • Page 313: Radius Details

    4.6.2.5 RADIUS Details This page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen in Figure 4-6-2-5 appears. Figure 4-6-2-5: RADIUS Authentication/Accounting for Server Overview Screenshot...
  • Page 314 The page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB. Use the server select box to switch between the backend servers to show details for. Object Description •...
  • Page 315 Unknown radiusAuthClientExtU The number of RADIUS Types nknownTypes packets that were received from the server on the authentication port and dropped for some other reason. Packets radiusAuthClientExtP The number of RADIUS Dropped acketsDropped packets that were received from the server on the authentication port and dropped for some other reason.
  • Page 316 counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout. • Other Info This section contains information about the state of the server and the latest round-trip time. Name RFC4668 Name Description...
  • Page 317 RADIUS Accounting Statistics The statistics map closely to those specified in RFC4670 - RADIUS Accounting Client MIB. Use the server select box to switch between the backend servers to show details for. Object Description • Packet Counters RADIUS accounting server packet counter. There are five receive and four transmit counters.
  • Page 318 Retransmissions packets retransmitted to the RADIUS accounting server. Pending radiusAccClientExt The number of RADIUS Requests PendingRequests packets destined for the server that have not yet timed out or received a response. This variable is incremented when a Request is sent and decremented due to receipt of a Response, timeout, or retransmission.
  • Page 319 The server has temporarily been disabled, but will get re-enabled when the dead-time expires. The number of seconds left before this occurs is displayed in parentheses. This state is only reachable when more than one server is enabled.  Round-Trip radiusAccClientExtRo The time interval (measured in Time...
  • Page 320: Port Authentication

    4.6.3 Port Authentication 4.6.3.1 Network Access Server Configuration This page allows you to configure the IEEE 802.1X and MAC-based authentication system and port settings. The IEEE 802.1X standard defines a port-based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication.
  • Page 321 The page includes the following fields: System Configuration Object Description • Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. • Reauthentication If checked, successfully authenticated supplicants/clients are reauthenticated Enabled after the interval specified by the Reauthentication Period.
  • Page 322 the client is still attached or not, and the only way to free any resources is to age the entry. • Hold Time This setting applies to the following modes, i.e. modes using the Port Security functionality to secure MAC addresses: ■...
  • Page 323: Network Access Overview

    timeout. The switch follows a set of rules for entering and leaving the Guest VLAN as listed below. The "Guest VLAN Enabled" checkbox provides a quick way to globally enable/disable Guest VLAN functionality. When checked, the individual ports' ditto setting determines whether the port can be moved into Guest VLAN. When unchecked, the ability to move to the Guest VLAN is disabled for all ports.
  • Page 324 The page includes the following fields: Object Description • Port The switch port number. Click to navigate to detailed NAS statistics for this port. • Admin State The port's current administrative state. Refer to NAS Admin State for a description of possible values. •...
  • Page 325: Network Access Statistics

    4.6.3.3 Network Access Statistics This page provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. For MAC-based ports, it shows selected backend server (RADIUS Authentication Server) statistics, only. Use the port select box to select which port details to be displayed. The Network Access Statistics screen in Figure 4-6-3-3 appears.
  • Page 326 Port Counters Object Description • EAPOL Counters These supplicant frame counters are available for the following administrative states: ■ Force Authorized ■ Force Unauthorized ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X Direction Name IEEE Name Description Total dot1xAuthEapolFrames The number of valid EAPOL frames of any type that have been received by the switch.
  • Page 327 Length field is invalid. Total dot1xAuthEapolFrames The number of EAPOL frames of any type that have been transmitted by the switch. Request ID dot1xAuthEapolReqIdFr The number of EAPOL amesTx Request Identity frames that have been transmitted by the switch. Requests dot1xAuthEapolReqFra The number of valid EAPOL mesTx...
  • Page 328 Requests RequestsToSupplicant Counts the number of times that the switch sends an EAP Request packet following the first to the supplicant. Indicates that the backend server chose an EAP-method. MAC-based: Not applicable. Auth. dot1xAuthBackendAuth 802.1X- and MAC-based: Successes Successes Counts the number of times that the switch receives a success indication.
  • Page 329 table). Possible retransmissions are not counted. • Last Supplicant/Client Information about the last supplicant/client that attempted to authenticate. This Info information is available for the following administrative states: ■ Port-based 802.1X ■ Single 802.1X ■ Multi 802.1X ■ MAC-based Auth. Name IEEE Name Description...
  • Page 330: Port Security

    4.6.4 Port Security 4.6.4.1 Port Limit Control This page allows you to configure the Port Security global and per-port settings. Port Security allows for limiting the number of users on a given port. A user is identified by a MAC address and VLAN ID. If Port Security is enabled on a port, the limit specifies the maximum number of users on the port.
  • Page 331 The page includes the following fields: System Configuration Object Description • Aging Enabled If checked, secured MAC addresses are subject to aging as discussed under Aging Period • Aging Period If Aging Enabled is checked, then the aging period is controlled with this input. If other modules are using the underlying port security for securing MAC addresses, they may have other requirements to the aging period.
  • Page 332 Port Configuration The table has one row for each port and a number of columns, which are: Object Description • Port The port number for which the configuration below applies. • Mode Controls whether Limit Control is enabled on this port. Both this and the Global Mode must be set to Enabled for Limit Control to be in effect.
  • Page 333: Port Security Status

    of view. The state takes one of four values:  Disabled: Limit Control is either globally disabled or disabled on the port.  Ready: The limit is not yet reached. This can be shown for all actions.  Limit Reached: Indicates that the limit is reached on this port. This state can only be shown if Action is set to None or Trap.
  • Page 334 Figure 4-6-4-2: Port Security Status Screen Page Screenshot The page includes the following fields: User Module Legend The legend shows all user modules that may request Port Security services. Object Description • User Module Name The full name of a module that may request Port Security services. •...
  • Page 335 Port Status The table has one row for each port on the selected switch in the switch and a number of columns, which are: Object Description • Clear Click to remove all MAC addresses on all VLANs on this port. The button is only clickable if number of secured MAC addresses is non-zero.
  • Page 336: Port Security Detail

    4.6.4.3 Port Security Detail This page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
  • Page 337: Access Control Lists

    4.6.5 Access Control Lists ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL.
  • Page 338 The page includes the following fields: Object Description • User Indicates the ACL user. • ACE Indicates the ACE ID on local switch. • Frame Type Indicates the frame type of the ACE. Possible values are: ■ Any: The ACE will match any frame type. ■...
  • Page 339: Access Control List Configuration

    4.6.5.2 Access Control List Configuration This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list.
  • Page 340 • Rate Limiter Indicates the rate limiter number of the ACE. The allowed range is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled. • Port Redirect Indicates the port redirect operation of the ACE. Frames matching the ACE are redirected to the port number.
  • Page 341: Ace Configuration

    4.6.5.3 ACE Configuration Configure an ACE (Access Control Entry) on this page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected.
  • Page 342 than or equal to 1536 decimal (equal to 0600 hexadecimal). ■ ARP: Only ARP frames can match this ACE. Notice the ARP frames won't match the ACE with Ethernet type. ■ IPv4: Only IPv4 frames can match this ACE. Notice the IPv4 frames won't match the ACE with Ethernet type.
  • Page 343  MAC Parameters Object Description • SMAC Filter (Only displayed when the frame type is Ethernet Type or ARP.) Specify the source MAC filter for this ACE. ■ Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ■ Specific: If you want to filter a specific source MAC address with this ACE, choose this value.
  • Page 344  ARP Parameters The ARP parameters can be configured when Frame Type "ARP" is selected. Object Description • ARP/RARP Specify the available ARP/RARP opcode (OP) flag for this ACE. ■ Any: No ARP/RARP OP flag is specified. (OP is "don't-care".) ■...
  • Page 345 ■ 0: RARP frames where THA is not equal to the SMAC address. ■ 1: RARP frames where THA is equal to the SMAC address. ■ Any: Any value is allowed ("don't-care"). • IP/Ethernet Length Specify whether frames can hit the action according to their ARP/RARP hardware address length (HLN) and protocol address length (PLN) settings.
  • Page 346 • IP Fragment Specify the fragment offset settings for this ACE. This involves the settings for the More Fragments (MF) bit and the Fragment Offset (FRAG OFFSET) field for an IPv4 frame. ■ No: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not be able to match this entry.
  • Page 347  IPv6 Parameters Object Description • Next Header Filter Specify the IPv6 next header filter for this ACE. ■ Any: No IPv6 next header filter is specified ("don't-care"). ■ Specific: If you want to filter a specific IPv6 next header filter with this ACE, choose this value.
  • Page 348  ICMP Parameters Object Description • ICMP Type Filter Specify the ICMP filter for this ACE. ■ Any: No ICMP filter is specified (ICMP filter status is "don't-care"). ■ Specific: If you want to filter a specific ICMP filter with this ACE, you can enter a specific ICMP value.
  • Page 349 ■ Filter Any: No TCP/UDP destination filter is specified (TCP/UDP destination filter status is "don't-care"). ■ Specific: If you want to filter a specific TCP/UDP destination filter with this ACE, you can enter a specific TCP/UDP destination value. A field for entering a TCP/UDP destination value appears.
  • Page 350 ■ 0: TCP frames where the URG field is set must not be able to match this entry. ■ 1: TCP frames where the URG field is set must be able to match this entry. ■ Any: Any value is allowed ("don't-care"). ...
  • Page 351: Acl Ports Configuration

    4.6.5.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The ACL Ports Configuration screen in Figure 4-6-5-4 appears. Figure 4-6-5-4: ACL Ports Configuration Page Screenshot The page includes the following fields: Object Description...
  • Page 352 • Shutdown Specify the port shut down operation of this port. The allowed values are: ■ Enabled: If a frame is received on the port, the port will be disabled. ■ Disabled: Port shut down is disabled. The default value is "Disabled". •...
  • Page 353: Acl Rate Limiters

    4.6.5.5 ACL Rate Limiters Configure the rate limiter for the ACL of the switch. The ACL Rate Limiter Configuration screen in Figure 4-6-5-5 appears. Figure 4-6-5-5: ACL Rate Limiter Configuration Page Screenshot The page includes the following fields: Object Description •...
  • Page 354: Dhcp Snooping

    4.6.6 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. Configure DHCP Snooping on this page. The DHCP Snooping Configuration screen in Figure 4-6-6 appears.
  • Page 355: Dhcp Snooping Configuration

    4.6.6.1 DHCP Snooping Configuration Configure DHCP Snooping on this page. Figure 4-6-6-1 appears. Figure 4-6-6-1: DHCP Snooping Configuration Screen Page Screenshot The page includes the following fields: Object Description • Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are: ...
  • Page 356: Snooping Table

    4.6.6.2 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses.
  • Page 357: Ip Source Guard

    4.6.7 IP Source Guard 4.6.7.1 IP Source Guard Configuration IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
  • Page 358: Static Ip Source Guard Table

    Buttons : Click to translate all dynamic entries to static entries. : Click to apply changes Click to undo any changes made locally and revert to previously saved values. 4.6.7.2 Static IP Source Guard Table This page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-6-7-2 appears.
  • Page 359: Dynamic Ip Source Guard Table

    4.6.7.3 Dynamic IP Source Guard Table This page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-6-7-3 appears. Figure 4-6-7-3: Static IP Source Guard Table Screen Page Screenshot The page includes the following fields: Object Description •...
  • Page 360: Arp Inspection

    4.6.8 ARP Inspection 4.6.8.1 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT.
  • Page 361 If you want to inspect the VLAN configuration, you have to enable the setting of "Check VLAN". The default setting of "Check VLAN" is disabled. When the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting.
  • Page 362: Arp Inspection Static Table

    4.6.8.2 ARP Inspection Static Table This page provides Static ARP Inspection Table. The Static ARP Inspection Table screen in Figure 4-6-8-2 appears. Figure 4-6-8-2: Static ARP Inspection Table Screen Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry.
  • Page 363: Dynamic Arp Inspection Table

    4.6.8.3 Dynamic ARP Inspection Table Entries in the Dynamic ARP Inspection Table are shown on this page. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address. The Dynamic ARP Inspection Table screen in Figure 4-6-8-3 appears.
  • Page 364: Power Over Ethernet

    4.7 Power over Ethernet The PoE function is only for IGS-6329-Series Switch. 4.7.1 PoE Switch Introduction Providing IEEE 802.3at PoE+ or IEEE 802.3bt PoE++ in-line power interfaces, the IGS-6329-Series Switch can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, these cameras/APs can be easily installed around the corners of the company for surveillance demands or a wireless roaming environment in the office can be built.
  • Page 365: Power Over Ethernet Powered Device

    4.7.2 Power over Ethernet Powered Device In a power over Ethernet system, operating power is applied from a power source (PSU or -power supply unit) over the LAN infrastructure to powered devices (PDs), which are connected to ports. Voice over IP phones Enterprises can install PoE VoIP phones, ATA sand other Ethernet/non-Ethernet end-devices in the center where UPS is installed for 3~5 watts...
  • Page 366: Poe System Configuration

    A PD will return to Class 0 to 8 in accordance with the maximum power draw as specified by Table 4-7-2-1. Class Usage Range of maximum power used by the PD Class Description Default 0.44 to 12.95 watts Classification unimplement Optional 0.44 to 3.84 watts Very low power...
  • Page 367 This section allows the user to inspect and configure the current PoE configuration settings, as Figure 4-7-3 appears. Figure 4-7-3: PoE Configuration Screenshot The page includes the following fields: Object Description • System PoE Admin Allows user to enable or disable PoE function. It will causes all of PoE ports to Mode supply or not supply power.
  • Page 368: Port Configuration

    4.7.4 Port Configuration This section allows the user to inspect and configure the current PoE port settings as Figure 4-7-4 shows.  – PoE Port Configuration IGS-6329-Series Switch 802.3bt PoE++ and Advanced PoE Power Output Mode Management To meet the demand of various powered devices consuming stable PoE power, the IGS-6329-Series Switch provides five different PoE power output modes for selection.
  • Page 369 • PoE Inline Mode It allows user to select IEEE802.3at/802.3bt/Ultra PoE compatibility mode to meet all PoE PD types for various PoE applications. Setting the Right Power Inline Mode for Each Application:  Midspan: Set inline mode to IEEE 802.3at PoE+ Mid-span PSE. Pins 4-5 (pair #1 in both T568A and T568B) form one side of the DC supply and pins 7-8 (pair #4 in both T568A and T568B) provide the return.
  • Page 370 In the Extend operation mode, the PoE port operates at 10Mbps duplex operation but can support PoE power output over a distance of up to 160 meters overcoming the 100m limit on Ethernet UTP cable. • Priority The Priority represents PoE ports priority. There are three levels of power priority named Low, High and Critical.
  • Page 371: Poe Status

    4.7.5 PoE Status This page allows the user to inspect the total power consumption, total power reserved and current status for all PoE ports. The screen in Figure 4-7-5 appears. Figure 4-7-5:PoE Status Screenshot...
  • Page 372 The page includes the following fields: Object Description • Sequential Power On Displays the current sequential power on mode. • PoE Voltage Displays the current PoE voltage. • System Power Budget Displays the maximum PoE power budget. • Operation Mode Displays the current PoE operation mode.
  • Page 373: Port Sequential

    4.7.6 Port Sequential This page allows the user to configure the PoE Ports started up interval time. The PoE Port will start up one by one as Figure 4-7-6 shows. Figure 4-7-6: PoE Port Sequential Power Up Interval Configuration Screenshot The PoE port will start up after the whole system program has finished running.
  • Page 374: Poe Schedule

    4.7.7 PoE Schedule This page allows the user to define PoE schedule and schedule power recycle. PoE Schedule Besides being used as an IP Surveillance, the Managed PoE switch is certainly applicable to constructing any PoE network including VoIP and Wireless LAN. Under the trend of energy saving worldwide and contributing to the environmental protection on the Earth, the Managed PoE switch can effectively control the power supply besides its capability of giving high watts power.
  • Page 375 Figure 4-7-7: PoE Schedule Screenshot Please press the Add New Rule button to start setting PoE Schedule function. You have to set PoE schedule to profile and then go back to PoE Port Configuration, and select “Schedule” mode from per port “PoE Mode” option. You can then indicate which schedule profile could be applied to the PoE port.
  • Page 376 The page includes the following fields: Object Description • Profile Set the schedule profile mode. Possible profiles are: Profile1 Profile2 Profile3 Profile4 • Week Day Allows user to set week day for defining PoE function should be enabled on the day. •...
  • Page 377: Poe Alive Check Configuration

    4.7.8 PoE Alive Check Configuration The IGS-6329-Series switch can be configured to monitor connected PD’s status in real-time via ping action. Once the PD stops working and without response, IGS-6329-Series switch is going to restart PoE port port power, and bring the PD back to work. It will greatly enhance the reliability and reduces administrator management burden.
  • Page 378 The page includes the following fields: Object Description • Mode Allows user to enable or disable per port PD Alive Check function. As default value all ports are disabled. • Ping PD IP Address This coulumn allows user to set PoE device IP address here for system making ping to the PoE device.
  • Page 379: Lldp Poe Neighbors

    4.7.9 LLDP PoE Neighbors This page provides a status overview for all LLDP PoE neighbors. The displayed table contains a row for each port on which an LLDP PoE neighbor is detected. The columns hold the following information: The screen in Figure 4-7-9 appears.
  • Page 380: Port Power Consumption

    4.7.10 Port Power Consumption This page allows user to see the usage of individual PoE Port. The screen in Figure 4-7-10 appears. Figure 4-7-10: PoE Power Consumption Screenshot : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Refreshes the Web page and the current configuration if user doesn’t save it.
  • Page 381: Ring

    4.8 Ring ITU-T G.8032 Ethernet Ring protection switching (ERPS) is a link layer protocol applied on Ethernet loop protection to provide sub-50ms protection and recovery switching for Ethernet traffic in a ring topology. ERPS provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same.
  • Page 382: Mep Configuration

    4.8.1 MEP Configuration The Maintenance Entity Point instances are configured here; screen in Figure 4-8-1 appears. Figure 4-8-1: MEP configuration page screenshot The page includes the following fields: Object Description • Delete This box is used to mark a MEP for deletion in next Save operation. •...
  • Page 383: Detailed Mep Configuration

    Buttons : Click to add a new MEP entry : Click to refresh the page immediately. : Click to save changes. Click to undo any changes made locally and revert to previously saved values. 4.8.2 Detailed MEP Configuration This page allows the user to inspect and configure the current MEP Instance.; screen in Figure 4-8-2 appears.
  • Page 384 Instance Configuration: Object Description • Level See help on MEP create WEB. • Format This is the configuration of the two possible Maintenance Association Identifier formats. ITU ICC: This is defined by ITU. 'ICC' can be max. 6 char. 'MEG id' can be max. 7 char.
  • Page 385 • cRDI Fault Cause indicating that a CCM is received with Remote Defect Indication - from this peer MEP. • cPeriod Fault Cause indicating that a CCM is received with a period different what is configured for this MEP - from this peer MEP. •...
  • Page 386: Ethernet Ring Protection Switching

    APS Protocol: Object Description • Enable Automatic Protection Switching protocol information transportation based on transmitting/receiving R-APS/L-APS PDU can be enabled/disabled. Must be enabled to support ERPS/ELPS implementing APS. This is only valid with one Peer MEP configured. • Priority The priority to be inserted as PCP bits in TAG (if any). •...
  • Page 387 The page includes the following fields: Object Description • Delete This box is used to mark an ERPS for deletion in next Save operation. • Port 0 This will create a Port 0 of the switch in the ring. • Port 1 This will create "Port 1"...
  • Page 388: Ethernet Ring Protection Switch Configuration

    4.8.4 Ethernet Ring Protection Switch Configuration This page allows the user to inspect and configure the current ERPS Instance; screen in Figure 4-8-4 appears. Figure 4-8-4: Ethernet Ring Protocol Switch Configuration page screenshot The page includes the following fields: Instance Data: Object Description •...
  • Page 389 Instance Configuration: Object Description • Configuration Red: This ERPS is only created and has not yet been configured - is not active. Green: This ERPS is configured - is active. • Guard Time Guard timeout value to be used to prevent ring nodes from receiving outdated R-APS messages.
  • Page 390 Instance State: Object Description • Protection State ERPS state according to State Transition Tables in G.8032. • Port 0 OK: State of East port is ok SF: State of East port is Signal Fail • Port 1 OK: State of West port is ok SF: State of West port is Signal Fail •...
  • Page 391: Ring Wizard

    4.8.5 Ring Wizard This page allows the user to configure the ERPS by wizard; screen in Figure 4-8-5 appears. Figure 4-8-5: Ring Wizard page screenshot The page includes the following fields: Object Description • All Switch Numbers Set all the switch numbers for the ring group. The default number is 3 and maximum number is 30.
  • Page 392: Ring Wizard Example

    4.8.6 Ring Wizard Example: Figure 4-8-6-1: Ring Example Diagram The above topology often occurs on using ERPS protocol. The multi switch constitutes a single ERPS ring; all of the switches only are configured as an ERPS in VLAN 3001, thereby constituting a single MRPP ring. Switch ID Port MEP ID...
  • Page 393 Setup steps Set ERPS Configuration on Switch 1 Connect PC to switch 1 directly; don’t connect to port 1 & 2 Logging on the Switch 1 and click “Ring > Ring Wizard” Set “All Switch Number” = 3 and “Number ID” = 1; click “Next” button to set the ERPS configuration for Switch 1. Set “MEP1”...
  • Page 394 Set ERPS Configuration on Switch 3 Connect PC to switch 3 directly; don’t connect to port 1 & 2 Logging on the Switch 3 and click “Ring > Ring Wizard” Set “All Switch Number” = 3 and “Number ID” = 3; click “Next” button to set the ERPS configuration for Switch 3. Set “MEP5”...
  • Page 395: Onvif

    ONVIF 4.9.1 ONVIF ONVIF (Open Network Video Interface Forum) is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products – or, in other words, to create a standard for how IP products within video surveillance and other physical security areas can communicate with each other.
  • Page 396: Onvif Device List

    The page includes the following fields: Object Description • Port This is the logical port number for this row. • Device Type The ONVIF Device’s Type of the entry. • Device Name The ONVIF Device’s Name of the entry. • Manufacturer The ONVIF Device’s Manufacturer of the entry.
  • Page 397 The page includes the following fields: Object Description • Login(Optional) Allows for filling one set of User name and Password. • Port This is the logical port number for this row. • Status Red: The ONVIF device is not active. Green: The ONVIF device is active.The ONVIF Device’s Type of the entry.
  • Page 398: Map Upload / Edit

    4.9.1.3 MAP Upload / Edit This page allows the clients for uploading e-MAP, the file size can not over 151k; screen in Figure 4-9-1-3 appears. Figure 4-9-1-3: Map Upload / Edit Page Screenshot The page includes the following fields: Object Description •...
  • Page 399: Floor Map

    4.9.1.4 Floor Map This page allows the clients for planning the ONVIF devices with the uploaded e-Map. It can select the ONVIF devices from Device List and it also can modify the e-Map’s Zoom and Scale; screen in Figure 4-9-1-4 appears.
  • Page 400: Maintenance

    4.10 Maintenance 4.10.1 Web Firmware Upgrade This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-10-1-1 appears. Figure 4-10-1-1: Web Firmware Upgrade Page Screenshot To open Firmware Upgrade screen, perform the following: Click Maintenance ->...
  • Page 401: Save Startup Config

    4.10.2 Save Startup Config This function allows to save the current configuration, thereby ensuring that the current active configuration can be used at the next reboot as the screen in Figure 4-10-2-1 appears. After saving the configuration, the screen in Figure 4-10-2-2 will appear.
  • Page 402: Configuration Upload

    4.10.4 Configuration Upload Configuration Upload page allows the upload the running-config and startup-config on the switch. Please refer to the Figure 4-10-4 shown below. Figure 4-10-4: Configuration Upload Page Screenshot If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: •...
  • Page 403: Configure Activate

    4.10.5 Configure Activate Thje Configure Activate page allows to activate the startup-config and default-config files present on the switch. Please refer to the Figure 4-10-5 shown below. Figure 4-10-5: Configuration Activate Page Screenshot It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration.
  • Page 404: Image Select

    4.10.7 Image Select This page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image. The web page displays two tables with information about the active and alternate firmware images. The Image Select screen in Figure 4-10-7 appears.
  • Page 405: Factory Default

    4.10.8 Factory Default You can reset the configuration of the Managed Switch on this page. Only the IP configuration is retained. The new configuration is available immediately, which means that no restart is necessary. The Factory Default screen in Figure 4-10-8 appears.
  • Page 406: Ping

    4.10.10 Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-10-10 appears.
  • Page 407: Ipv6 Ping

    4.10.11 IPv6 Ping This page allows you to issue ICMPv6 PING packets to troubleshoot IPv6 connectivity issues. After you press “Start”, 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMPv6 Ping screen in Figure 4-10-11 appears.
  • Page 408: Remote Ip Ping

    4.10.12 Remote IP Ping This page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues on special port. After you press “Test”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply.
  • Page 409: Cable Diagnostics

    4.10.13 Cable Diagnostics This page is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table.
  • Page 410 The page includes the following fields: Object Description • Port The port where you are requesting Cable Diagnostics. • Description Display per port description. • Cable Status Port: Port number. Pair: The status of the cable pair. OK - Correctly terminated pair Open - Open pair Short - Shorted pair Short A - Cross-pair short to pair A...
  • Page 411: Switch Operation

    5. SWITCH OPERATION 5.1 Address Table The Managed Switch is implemented with an address table. This address table is composed of many entries. Each entry is used to store the address information of some nodes in the network, including MAC address, port no, etc. This information comes from the learning process of Managed Switch.
  • Page 412: Store-And-Forward

    5.4 Store-and-Forward Store-and-Forward is one type of packet-forwarding techniques. A Store-and-Forward Managed Switch stores the incoming frame in an internal buffer and do the complete error checking before transmission. Therefore, no error packets occur; it is the best choice when a network needs efficiency and stability. The Managed Switch scans the destination address from the packet-header, searches the routing table provided for the incoming port and forwards the packet, only if required.
  • Page 413: Troubleshooting

    6. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Managed Switch is not functioning properly, make sure the Managed Switch was set up according to instructions in this manual. ■ The Link LED is not lit. Solution: Check the cable connection and remove duplex mode of the Managed Switch.
  • Page 414: Appendix A: Networking Connection

    APPENDIX A: Networking Connection A.1 Switch's Data RJ45 Pin Assignments - 1000Mbps, 1000BASE-T PIN NO MDI-X BI_DA+ BI_DB+ BI_DA- BI_DB- BI_DB+ BI_DA+ BI_DC+ BI_DD+ BI_DC- BI_DD- BI_DB- BI_DA- BI_DD+ BI_DC+ BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard.
  • Page 415 The standard cable, RJ45 pin assignment The standard RJ45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pin allocation and color of straight-through cable and crossover cable connection: Straight Cable SIDE 1 SIDE 2 1 = White / Amber...
  • Page 416: Appendix B : Glossary

    APPENDIX B : GLOSSARY ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
  • Page 417 ACL|Rate Limiters: On this page, you can configure the rate limiters. There can be 15 different rate limiters, each ranging from 1 to 1024K packets per second. Under "Ports" and "Access Control List", you can assign a Rate Limiter ID to the ACE(s) or ingress port(s). AES is an acronym for Advanced Encryption Standard.
  • Page 418 CC is an acronym for Continuity Check. It is a MEP functionality that is able to detect loss of continuity in a network by transmitting CCM frames to a peer MEP. CCM is an acronym for Continuity Check Message. It is a OAM frame transmitted from a MEP to its peer MEP and used to implement CC functionality.
  • Page 419 Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. DHCP Relay DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
  • Page 420 DSCP DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet classification purposes. EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in the Ethernet MAC header, defined by the Ethernet networking standard.
  • Page 421 Any Web server machine contains, in addition to the web page files it can serve, an HTTP daemon, a program that is designed to wait for HTTP requests and handle them when they arrive. The Web browser is an HTTP client, sending requests to server machines.
  • Page 422 IMAP IMAP is an acronym for Internet Message Access Protocol. It is a protocol for email clients to retrieve email messages from a mail server. IMAP is the protocol that IMAP clients use to communicate with the servers, and SMTP is the protocol used to transport mail to an IMAP server.
  • Page 423 LLDP LLDP is an IEEE 802.1ab standard protocol. The Link Layer Discovery Protocol(LLDP) specified in this standard allows stations attached to an IEEE 802 LAN to advertise, to other stations attached to the same IEEE 802 LAN, the major capabilities provided by the system incorporating that station, the management address or addresses of the entity or entities that provide management of those capabilities, and the identification of the stations point of attachment to the IEEE 802 LAN required by those management entities.
  • Page 424 MLD is an acronym for Multicast Listener Discovery for IPv6. MLD is used by IPv6 routers to discover multicast listeners on a directly attached link, much as IGMP is used in IPv4. The protocol is embedded in ICMPv6 instead of using a separate protocol.
  • Page 425 OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier Ethernet functionality. MEP functionality like CC and RDI is based on this. Optional TLVs. An LLDP frame contains multiple TLVs. For some TLVs it is configurable if the switch includes the TLV in the LLDP frame.
  • Page 426 Policer A policer can limit the bandwidth of received frames. It is located in front of the ingress queue. POP3 POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve email messages from a mail server.
  • Page 427 QCL is an acronym for QoS Control List. It is the list table of QCEs, containing QoS control entries that classify to a specific QoS class on specific traffic objects. Each accessible traffic object contains an identifier to its QCL. The privileges determine specific traffic object to specific QoS class.
  • Page 428 Router Port A router port is a port on the Ethernet switch that leads switch towards the Layer 3 multicast device. RSTP In 1998, the IEEE with document 802.1w introduced an evolution of STP: the Rapid Spanning Tree Protocol, which provides for faster spanning tree convergence after a topology change.
  • Page 429 SNMP SNMP is an acronym for Simple Network Management Protocol. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol for network management. SNMP allow diverse network objects to participate in a network management architecture. It enables network management systems to learn network problems by receiving traps or change notices from network devices implementing SNMP.
  • Page 430 TACACS+ TACACS+ is an acronym for Terminal Access Controller Access Control System Plus. It is a networking protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. TACACS+ provides separate authentication, authorization and accounting services. Tag Priority Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame.
  • Page 431 Toss Toss is an acronym for Type of Service. It is implemented as the IPv4 Toss priority control. It is fully decoded to determine the priority from the 6-bit Toss field in the IP header. The most significant 6 bits of the Toss field are fully decoded into 64 possibilities, and the singular code that results is compared against the corresponding bit in the IPv4 ToS priority control bit (0~63).
  • Page 432 VLAN A method to restrict communication between switch ports. VLANs can be used for the following applications: VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not remove or insert VLAN tags.
  • Page 433 WPA is an acronym for Wi-Fi Protected Access. It was created in response to several serious weaknesses researchers had found in the previous system , Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. WPA is specifically designed to also work with pre-WPA wireless network interface cards (through firmware upgrades), but not necessarily with first generation wireless access points.

This manual is also suitable for:

Igs-6329-8up2s2xIgs-6329-8up2s4x

Table of Contents