Ruijie RG-CS83 Series Configuration Manual

Ruijie RG-CS83 Series Configuration Manual

Hide thumbs Also See for RG-CS83 Series:

Advertisement

Quick Links

Ruijie RG-CS83 Series Switches
Web-based Configuration Guide
Document Version: V1.0
Date: september 25, 2023
Copyright © 2023 Ruijie Networks

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RG-CS83 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for Ruijie RG-CS83 Series

  • Page 1 Ruijie RG-CS83 Series Switches Web-based Configuration Guide Document Version: V1.0 Date: september 25, 2023 Copyright © 2023 Ruijie Networks...
  • Page 2 All rights are reserved in this document and this statement. Any reproduction, excerption, backup, modification, transmission, translation or commercial use of this document or any portion of this document, in any form or by any means, without the prior written consent of Ruijie Networks is prohibited.
  • Page 3 Intended Audience This document is intended for:  Network engineers  Technical support and servicing engineers  Network administrators Technical Support  Official website of Ruijie Reyee: https://www.ruijienetworks.com/products/reyee  Technical Support Website: https://ruijienetworks.com/support  Case Portal: https://caseportal.ruijienetworks.com  Community: https://community.ruijienetworks.com ...
  • Page 4 Specification An alert that contains a description of product or version support. Note The manual offers configuration information (including model, description, port type, software interface) for indicative purpose only. In case of any discrepancy or inconsistency between the manual and the actual version, the actual version prevails.
  • Page 5: Logging In To The Web Page

    Web-based Configuration Guide Login Login Configuration Environment Requirements 1.1.1  Google Chrome, Internet Explorer 9.0, 10.0, and 11.0, and some Chromium/Internet Explorer kernel-based browsers (such as 360 Extreme Explorer) are supported. Exceptions such as garble characters or format error may occur if an unsupported browser is used. ...
  • Page 6 Web-based Configuration Guide Login You can use the default password admin to log in to the device for the first time. For security purposes, you are advised to change the default password as soon as possible after logging in, and to regularly update your password thereafter.
  • Page 7 Web-based Configuration Guide Login Table 1-2 Frequently-Used Controls on the Web Page Control Description Local Device: Allows you to configure all functions of the local device. Network: Allows you to configure common functions of all wired and wireless Reyee products in batches in an ad hoc network.
  • Page 8: Quick Setup

    Web-based Configuration Guide Login Quick Setup 1.3.1 Configuration Preparations Connect the device to the power supply, and connect the device port to an uplink device with a network cable. 1.3.2 Procedure 1. Adding Device to Network By default, users can perform batch settings and centralized management of all devices in the network. Therefore, before starting configuration, you need to check and confirm the number of online devices and network status in the network.
  • Page 9 Web-based Configuration Guide Login whether the IP address can be dynamically obtained. If the IP address is obtained successfully, there is no need to manually set the IP address. ○ Static IP: The user manually enter a specified IP address, subnet mask, gateway IP address, and DNS address.
  • Page 10 Web-based Configuration Guide Login Caution Hot standby is supported only on NBS7006 and NBS7003 series switches. Only two switches are supported to form a hot standby group. When multiple switches are configured, select 10GE interfaces as hot standby interfaces to connect the member switches.
  • Page 11 Web-based Configuration Guide Login (3) Connect both switches using a network cable on their 10GE interfaces. Then, choose Dual-Device Config, and click Next. (4) Select the active switch and click Next. (5) Select the standby switch. (6) Select the hot standby interfaces. You are advised to select two adjacent interfaces on a switch, and can select up to four interfaces on each device for hot standby.
  • Page 12: Work Mode

    Web-based Configuration Guide Login (7) Then, click Next. Use a 10GE cable to connect the hot standby interfaces that you have selected. (The following figure shows an example of connecting Interface 49 of Device 1 to Interface 49 of Device 2.) (8) After the cables are connected, proceed as prompted, and wait for the device to reboot successfully.
  • Page 13 Web-based Configuration Guide Login Self-Organizing Network: After the self-organizing network discovery function is enabled, the device can be discovered in the network and discover other devices in the network. Devices network with each other based on the device status and synchronize global configuration. You can log in to the Web management page of the device to check management information about all devices in the network.
  • Page 14 Web-based Configuration Guide Login Figure 1-1 The Web Page in Networkwide Management Mode Figure 1-2 The Web Page in Network Mode in Local Device Mode...
  • Page 15: Network Management

    Web-based Configuration Guide Network management Network management Overviewing Network Information In network mode, the Overview page displays the current network topology, uplink and downlink real-time traffic, network connection status, and number of users and provides short-cut entries for configuring the network and devices.
  • Page 16 Web-based Configuration Guide Network management  Click a traffic data item to view the real-time total traffic information.  Click a device in the topology to view the running status and configuration of the device and configure device functions. By default, the product model is used as the device name. Click to modify the device name so that the description can distinguish devices from one another.
  • Page 17 Web-based Configuration Guide Network management  The update time is displayed in the lower-left corner of the topology view. Click Refresh to update the topology to the latest state. It takes some time to update the topology data. Please wait patiently.
  • Page 18: Wired Connection

    Web-based Configuration Guide Network management Adding Networking Devices 2.3.1 Wired Connection (1) When a new device connects to an existing device on the network, the system displays the message “A device not in SON is discovered.” and the number of such devices in orange under “Devices” on the upper- left corner of the [Overview] page.
  • Page 19 Web-based Configuration Guide Network management (3) You do not need to enter the password if the device to add is newly delivered from factory. If the device has a password, enter the configuring password of the device. Device addition fails if the password is incorrect.
  • Page 20 Web-based Configuration Guide Network management 2.3.2 AP Mesh If the AP supports the AP Mesh (Reyee Mesh) function, you do not need to connect cables after powering on the AP. The AP can be added to the current network in Reyee Mesh mode, establish a mesh networking with other wireless devices, and automatically synchronize Wi-Fi configuration.
  • Page 21 Web-based Configuration Guide Network management  Click the device SN to configure the specified device separately.
  • Page 22: Configuring The Wired Network

    Web-based Configuration Guide Network management  Check offline devices and click Delete Offline Devices to remove them from the list and networking topology. Configuring the Service Network The wireless and wired network configurations of the current network are displayed in the lower-left of the Overview page.
  • Page 23 Web-based Configuration Guide Network management (2) Configure a VLAN for wired access, specify the address pool server for access clients in this VLAN, and determine whether to create a new DHCP address pool. A switch or gateway device can be selected as the address pool server.
  • Page 24: Configuring The Wireless Network

    Web-based Configuration Guide Network management (4) Confirm that the configuration items to be delivered are correct and then click Save. Wait a moment for the configuration to take effect. 2.5.2 Configuring the Wireless Network (1) Click Add Wi-Fi VLAN to add wireless network configuration, or select an existing Wi-Fi VLAN and click Setup to modify its configuration.
  • Page 25 Web-based Configuration Guide Network management (2) Set the Wi-Fi name, Wi-Fi password, and applicable bands. Click Next. (3) Configure a VLAN for wireless access, specify the address pool server for access clients in this VLAN, and determine whether to create a new DHCP address pool. A switch or gateway device can be selected as the address pool server.
  • Page 26 Web-based Configuration Guide Network management (4) Confirm that the configuration items to be delivered are correct and then click Save. Wait a moment for the configuration to take effect. Processing Alerts Choose Network > Overview. If a network exception occurs, alert message on this exception and the corresponding solution are displayed on the Overview page.
  • Page 27 Web-based Configuration Guide Network management...
  • Page 28 Web-based Configuration Guide Network management Viewing Online Clients The Clients in the upper-left corner of the Overview page displays the total number of online clients in the current network; moving the cursor to the number of users will display the number of current wired users, wireless users in the 2.4GHz band, and wireless users in the 5GHz band.
  • Page 29 Web-based Configuration Guide Network management Field Description IP/MAC The IP address and the MAC address of the client. Current Rate Indicate the uplink and downlink data transmission rates of the client. Wireless network information associated with wireless clients, including channel, Wi-Fi signal strength, online time, negotiation rate, etc.
  • Page 30 Web-based Configuration Guide Network management (2) Click +Client Subnet, enter the client type (which can be selected or customized in the drop-down box), the network segment of the client, the planned number and the corresponding server IP address to identify the client.
  • Page 31 Web-based Configuration Guide Network management (4) Input the name of the VLAN, VLAN ID, gateway address, and subnet mask of the isolated client. Check the target network segment and click Generate Config. (5) After confirming the configuration, click Deliver Config. If you need to modify it, you can click Previous to return to the setting page.
  • Page 32 Web-based Configuration Guide Network management (6) The page displays that the configuration has been delivered successfully, indicating that the settings have been completed. Click the configuration item to view the configuration delivery details. After the configuration is delivered, click View Details to switch to the page that displays monitoring information of the smart device network;...
  • Page 33 Web-based Configuration Guide Network management...
  • Page 34: Basic Management

    Web-based Configuration Guide Basic Management Basic Management Overviewing Switch Information 3.1.1 Basic information about the Device Choose Local Device > Home > Basic Info. Basic information includes device name, device model, SN number, software version, management IP, MAC address, networking status, system time, working mode, etc. 1.
  • Page 35 Web-based Configuration Guide Basic Management 2. Switching the Work Mode Click the current work mode to change the work mode. 3. Setting MGMT IP Click current management IP address to jump to the management IP configuration page. For more information,...
  • Page 36: Hardware Monitor Information

    Web-based Configuration Guide Basic Management 3.1.2 Hardware Monitor Information Caution Only RG-NBS6002 Series, RG-NBS7003 Series and RG-NBS7006 Series devices support displaying this type of information. Choose Local Device > Home > Smart Monitoring. Display the current hardware operating status of the device, such as the device temperature and power supply status, etc.
  • Page 37 Web-based Configuration Guide Basic Management  Move the cursor to the icon of a port (for example, Gi14) on the port panel, and more information about the port will be displayed, including the port ID, port status, port rate, uplink and downlink traffic, transmission rate, and optical/electrical attribute of the port.
  • Page 38 Web-based Configuration Guide Basic Management  Traffic data is automatically updated every five minutes. You can click Refresh above the port panel to obtain the latest port traffic and status information simultaneously. Port Flow Statistics Choose Local Device > Monitor > Port Flow. Display traffic statistics such as the rate of the device port, the number of sent and received packets, and the number of error packets.
  • Page 39: Mac Address Management

    Web-based Configuration Guide Basic Management MAC Address Management 3.3.1 Overview A MAC address table records mappings of MAC addresses and interfaces to virtual local area networks (VLANs). A device queries the MAC address table based on the destination MAC address in a received packet. If the device finds an entry that is consistent with the destination MAC Address in the packet, the device forwards the packet through the interface corresponding to the entry in unicast mode.
  • Page 40 Web-based Configuration Guide Basic Management Querying MAC address entries: Support querying MAC address entries based on MAC address, VLAN ID or port. Select the search type, enter the search string, and click Search. MAC entries that meet the search criteria are displayed in the list.
  • Page 41 Web-based Configuration Guide Basic Management Delete dynamic MAC address: Select the clear type (by MAC address, by VLAN, or by port), enter a string for matching the dynamic MAC address entry, and click Clear. The device will clear MAC address entries that meet the conditions.
  • Page 42 Web-based Configuration Guide Basic Management 1. Adding Static MAC Address Entries Choose Local Device > Monitor > Clients > Static MAC. Click Add, enter the MAC address and VLAN ID, select the port for packet forwarding, and click OK. After the addition is successful, the MAC address table will update the entry data.
  • Page 43: Configuring Mac Address Filtering

    Web-based Configuration Guide Basic Management Delete an entry: In MAC List, find the entry to be deleted, click Delete in the last Action column. In the displayed dialog box, click OK. 3.3.5 Configuring MAC Address Filtering To prohibit a user from sending and receiving packets in certain scenarios, you can add the MAC address of the user to a filtering MAC address entry.
  • Page 44: Configuring Mac Address Aging Time

    Web-based Configuration Guide Basic Management 2. MAC Filter Choose Local Device > Monitor > Clients > MAC Filter. Batch delete: In MAC List, select the MAC address entries to be deleted and click Delete Selected. In the displayed dialog box, click OK. Delete an entry: In MAC List, find the entry to be deleted, click Delete in the last Action column.
  • Page 45 Web-based Configuration Guide Basic Management Displaying ARP Information Choose Local Device > Monitor > Clients > ARP List. When two IP-based devices need to communicate with each other, the sender must know the IP address and MAC address of the peer. With MAC addresses, an IP-based device can encapsulate link-layer frames and then send data frames to the physical network.
  • Page 46: Vlan Overview

    Web-based Configuration Guide Basic Management VLAN 3.5.1 VLAN Overview A virtual local area network (VLAN) is a logical network created on a physical network. A VLAN has the same properties as a normal physical network except that it is not limited by its physical location. Each VLAN has an independent broadcast domain.
  • Page 47 Web-based Configuration Guide Basic Management Create a VLAN: Click Add. Enter the VLAN ID and description for the VLAN, and click OK. The VLAN added will be displayed in VLAN List. Note ● The range of a VLAN ID is from 1 to 4094. ●...
  • Page 48 Web-based Configuration Guide Basic Management Delete a VLAN: In VLAN List, click Delete in the last Action column to delete the specified VLAN. Note The default VLAN (VLAN 1), management VLAN, native VLAN, and access VLAN cannot be deleted. For these VLANs, the Delete button is unavailable in gray.
  • Page 49 Web-based Configuration Guide Basic Management You can configure the port mode and VLAN members for a port to determine VLANs that are allowed to pass through the port and whether packets to be forwarded by the port carry the tag field. Table 3-1 Port Modes Description Port mode...
  • Page 50 Web-based Configuration Guide Basic Management 2. Procedure Choose Local Device > VLAN > Port List. Configure port VLANs in a batch: Click Batch Edit, select the port to be configured on the port panel, and select the port mode. If the port mode is Access port, you need to select Access VLAN; if the port mode is Trunk port, you need to select Native VLAN and enter the allowed VLAN ID range;...
  • Page 51 Web-based Configuration Guide Basic Management Note ● VLAN ID range is from 1 to 4094, among which VLAN 1 is the default VLAN that cannot be deleted. ● When hardware resources are insufficient, the system displays a VLAN creation failure message. ●...
  • Page 52 Web-based Configuration Guide Basic Management (3) Configure port attributes for the ports selected in Step 1 in a batch. Select a port type. If you set Type to Access Port, you need to configure VLAN ID. If you set Type to Trunk Port, you need to configure Native VLAN and Permitted VLAN.
  • Page 53: Verifying Configuration

    Web-based Configuration Guide Basic Management 3.5.5 Verifying Configuration View the VLAN and port information of switches to check whether the batch configurations are successfully delivered.
  • Page 54: Port Management

    Web-based Configuration Guide Port Management Port Management Overview Ports are important components for data exchange on network devices. The port management module allows you to configure basic settings for ports, and configure port aggregation, switched port analyzer (SPAN), port rate limiting, management IP address, etc.
  • Page 55 Web-based Configuration Guide Port Management Table 4-1 Description of Port Type...
  • Page 56 Web-based Configuration Guide Port Management Port Type Note Remarks...
  • Page 57 Web-based Configuration Guide Port Management A switch port consists of a single physical port on the device and provides only the L2 switching function. Switch ports are used to manage physical port and their associated L2 protocols. Described in this Switch Port section...
  • Page 58 Web-based Configuration Guide Port Management Port Type Note Remarks...
  • Page 59 Web-based Configuration Guide Port Management Port Type Note Remarks An Interface binds multiple physical members to form a logical link. For L2 switching, an aggregate port is like a high-bandwidth switch port. It can combine the bandwidths of multiple ports to expand link bandwidth. In addition, for frames sent through an L2 aggregate port, load balancing is performed on member ports of the L2 aggregate port.
  • Page 60 Web-based Configuration Guide Port Management Port Type Note Remarks A switch virtual interface (SVI) serves as the management interface of the device, through which the device can be managed. You can also create an SVI as a gateway interface, which is equivalent to the virtual interface of corresponding VLAN and can be used for inter-VLAN routing on L3 devices.
  • Page 61: Port Configuration

    Web-based Configuration Guide Port Management Port Type Note Remarks An L3 aggregate port is a logical aggregate port group composed of multiple physical member ports, just like an L2 aggregate port. The ports to be aggregated must be L3 ports of the same type.
  • Page 62 Web-based Configuration Guide Port Management Batch configure: Click Batch Edit, select the port to be configured In the displayed dialog box, select the port switch, rate, work mode, and flow control mode, and click OK to deliver the configuration. In batch configuration, optional configuration items are a common collection of selected ports (that is, attributes supported the selected ports).
  • Page 63 Web-based Configuration Guide Port Management Configure one port: In Port List, select a port entry and click Edit in the Action column. In the displayed dialog box, select port status, rate, work mode, and flow control mode, and click OK. Table 4-2 Description of Basic Port Configuration Parameters Parameter...
  • Page 64: Physical Settings

    Web-based Configuration Guide Port Management Parameter Description Default Value port, and the corresponding data processing function will be lost, but the PoE power supply function of the port will not be affected. Set the rate at which the Ethernet physical interface works. Set to Auto means that the port rate is determined by the Rate Auto...
  • Page 65 Web-based Configuration Guide Port Management Batch configure: Click Batch Edit. In the displayed dialog box, select the port to be configured, configure the EEE switch, MTU, enter the port description, and click OK. Note Copper ports and SFP ports cannot be both configured during batch configuration.
  • Page 66 Web-based Configuration Guide Port Management Configure one port: Click Edit in the Action column of the list. In the displayed configuration box, configure the EEE switch, port mode, enter the port description, and click OK. Table 4-3 Description of Physical Configuration Parameters Parameter Description Default Value...
  • Page 67 Web-based Configuration Guide Port Management Note ● Different ports support different attributes and configuration items. ● Only the SFP combo ports support port mode switching. ● SFP ports do not support enabling EEE. Aggregate Ports 4.3.1 Aggregate Port Overview An aggregate port (AP) is a logical link formed by binding multiple physical links. It is used to expand link bandwidth, thereby improving connection reliability.
  • Page 68: Aggregate Port Configuration

    Web-based Configuration Guide Port Management Note Dynamic aggregate ports do not support manual creation and can be deleted after they are automatically generated by the device, but member ports cannot be modified. 3. Load Balancing An AP, based on packet characteristics such as the source MAC address, destination MAC address, source IP address, destination IP address, L4 source port ID, and L4 destination port ID of packets received by an inbound interface, differentiates packet flows according to one or several combined algorithms.
  • Page 69 Web-based Configuration Guide Port Management 2. Modifying Member Ports of a Static Aggregate Port Click an added static aggregate port. Member ports of the aggregate port will become selected. Click a port to deselect it; or select other ports to join the current aggregate port. Click Save to modify the member ports of the aggregate port.
  • Page 70 Web-based Configuration Guide Port Management 3. Deleting an Aggregate Port Move the cursor over an aggregate port icon and click upper-right, or select the aggregate port to be deleted, and click Delete Selected to delete the selected aggregate port. After deleted, the corresponding ports become available on the port panel to set a new aggregate port.
  • Page 71: Port Mirroring

    Web-based Configuration Guide Port Management Select Load Balance Algorithm and click Save. The Device distributes incoming packets among member links by using the specified load balancing algorithm. The packet flow with the consistent feature is transmitted by one member link, whereas different packet flows are evenly distributed to various links. Port Mirroring 4.4.1 Overview...
  • Page 72 Web-based Configuration Guide Port Management Caution ● You can select multiple source traffic monitoring ports but only one destination port. Moreover, the source traffic monitoring ports cannot contain the destination port. ● An aggregate port cannot be used as the destination port. ●...
  • Page 73 Web-based Configuration Guide Port Management Table 4-4 Description of Port Mirroring Parameters Default Parameter Description Value A source port is also called a monitored port. Data flows on the source port are monitored for network analysis or troubleshooting. Src Port Support selecting multiple source ports and mirroring multiple ports to one destination port The destination port is also called the monitoring port, that is, the port...
  • Page 74: Rate Limiting

    Web-based Configuration Guide Port Management Default Parameter Description Value The type of packets (data flow direction) to be monitored by a source port. Both: All packets passing through the port, including incoming and outgoing packets Monitor Direction Both Incoming: All packets received by a source port are copied to the destination port Outcoming: All packets transmitted by a source port are copied to the destination port...
  • Page 75 Web-based Configuration Guide Port Management Table 4-5 Description of Rate Limiting Parameters Parameter Description Default Value Max Rate at which packets are sent from a port to a switch, in Rx Rate Not limited kbps. Max Rate at which packets are sent out of a switch through a Tx Rate Not limited port, in kbps.
  • Page 76 Web-based Configuration Guide Port Management 3. Deleting Rate Limiting Batch configure: Select multiple records in Port List, click Delete Selected and click OK in the confirmation dialog box. Configure one port: In Port List, click Delete on the corresponding port entry, and click OK in the confirmation dialog box.
  • Page 77 Web-based Configuration Guide Port Management The device can be networked in two modes:  DHCP: Uses a temporary IP address dynamically assigned by the upstream DHCP server for Internet access.  Static IP: Uses a static IP address manually configured by users for Internet access. If you select DHCP, the device obtains parameters from the DHCP Server.
  • Page 78 Web-based Configuration Guide Port Management  DHCP: The device dynamically obtains an IPv6 address from the upstream device.  Static IP: You need to manually configure the IPv6 address, length, gateway address, and DNS server. Click Save.
  • Page 79 Web-based Configuration Guide Port Management Out-of-Band IP Configuration Caution Only the RG-NBS6002 Series, RG-NBS7003 Series and RG-NBS7006 Series support this function. Choose Local Device > Ports > Out-of-Band IP. Set the MGMT management port IP of the chassis to centrally manage the modules in multiple slots of the device.
  • Page 80 Web-based Configuration Guide Port Management Note No IP address is configured for the MGMT port by default. Currently, only a static IP address can be configured for the MGMT port but DHCP is not supported.
  • Page 81: Poe Configuration

    Web-based Configuration Guide Port Management PoE Configuration Caution Only PoE switches (The device models are marked with -P) support this function. Choose Local Device > Ports > PoE. The device supplies power to PoE powered devices through ports. Users can view the current power supply status, and set the system power supply and port power supply policies respectively to achieve flexible power distribution.
  • Page 82 Web-based Configuration Guide Port Management and the reserved power will not be used for power supply, so as to ensure that the total power consumed by the current system does not exceed the limit of the PoE device. The size of the reserved power is expressed as a percentage of the total PoE power.
  • Page 83 Web-based Configuration Guide Port Management Table 4-6 Description of Parameters for Power Supply Configuration of Ports Parameter Description Default Value Whether to enable the power supply function on the ports Enable By default, the device only supplies power to PDs that comply with the standard IEEE 802.3af and 802.3at protocols.
  • Page 84 Web-based Configuration Guide Port Management When the PD device connected to the port needs to be restarted, for example, when the AP connected to the port is abnormal, you can click Repower to make the port power off briefly and then power on again to restart the device connected to the power supply port.
  • Page 85 Web-based Configuration Guide Port Management Field Description The classification level of the PD connected to the port is divided into Class PD Class 0~4, based on the IEEE 802.3af/802.3at standard.
  • Page 86: Multicast Overview

    Web-based Configuration Guide L2 Multicast L2 Multicast Multicast Overview IP transmission methods are categorized into unicast, multicast, and broadcast. In IP multicast, an IP packet is sent from a source and forwarded to a specific group of receivers. Compared with unicast and broadcast, IP multicast saves bandwidth and reduces network loads.
  • Page 87: Igmp Snooping

    Web-based Configuration Guide L2 Multicast Table 5-1 Description of Configuration Parameters of Global Multicast Parameter Description Default Value The Internet Group Management Protocol (IGMP) is a TCP/IP protocol that manages members in an IPv4 multicast group and runs on the multicast devices and hosts residing on the stub of the multicast network, creating and maintaining membership of the multicast group between the hosts and Version...
  • Page 88 Web-based Configuration Guide L2 Multicast 5.3.2 Enabling Global IGMP Snooping Choose Local Device > Multicast > IGMP Snooping. Turn on IGMP Snooping and click Save. 5.3.3 Configuring Protocol Packet Processing Parameters By controlling protocol packet processing, an L2 multicast device can establish static or dynamic multicast forwarding entries.
  • Page 89 Web-based Configuration Guide L2 Multicast Table 5-2 Description of VLAN Configuration Parameters of IGMP Snooping Parameter Description Default Value Whether to enable or disable the VLAN multicast function. The multicast function of a VLAN takes effect only when both the Multicast Status Disable global IGMP snooping and VLAN multicast functions are...
  • Page 90: Configuring Mvr

    Web-based Configuration Guide L2 Multicast Parameter Description Default Value The device running IGMP Snooping identifies the ports in the VLAN as router ports or member ports. The router port is the port on the Layer 2 multicast device that is connected to the Layer 3 multicast device, and the member port is the host port Dynamic Learning Enable...
  • Page 91 Web-based Configuration Guide L2 Multicast 5.4.2 Configuring Global MVR Parameters Choose Local Device > L2 Multicast > MVR. Click to enable the MVR, select the MVR VLAN, set the multicast group supported by the VLAN, and click Save. Multiple multicast groups can be specified by entering the start and end multicast IP addresses. Table 5-3 Description of Configuring Global MVR Parameters Parameter...
  • Page 92 Web-based Configuration Guide L2 Multicast Parameter Description Default Value Multicast VLAN VLAN of a multicast source Learned or configured start multicast IP address of an MVR Start IP Address multicast group. Learned or configured end multicast IP address of an MVR End IP Address multicast group.
  • Page 93 Web-based Configuration Guide L2 Multicast Table 5-4 Description of MVR Configuration Parameters of Ports Parameter Description Default Value NONE: Indicates that the MVR function is disabled. SOURCE: Indicates the source port that receives multicast Role NONE data streams. RECEIVER: Indicates the receiver port connected to a client. Configures the fast leave function for a port.
  • Page 94 Web-based Configuration Guide L2 Multicast Table 5-5 Description of Multicast Group Configuration Parameters Parameter Description Default Value VLAN ID VLAN, to which received multicast traffic belongs Multicast IP On-demand multicast IP address Address If the VLAN ID is a multicast VLAN and the multicast address is within the multicast IP address range of the MVR, the Protocol protocol is MVR.
  • Page 95: Configuring A Port Filter

    Web-based Configuration Guide L2 Multicast Note Static multicast groups cannot learn other dynamic forwarding ports. Configuring a Port Filter Choose Local Device > L2 Multicast > IGMP Filter. Generally, the device running ports can join any multicast group. A port filter can configure a range of multicast groups that permit or deny user access, you can customize the multicast service scope for users to guarantee the interest of operators and prevent invalid multicast traffic.
  • Page 96 Web-based Configuration Guide L2 Multicast Table 5-6 Description of Profile Configuration Parameters Parameter Description Default Value Profile ID Profile ID DENY: Forbids demanding multicast IP addresses in a specified range. Behavior PERMIT: Only allows demanding multicast IP addresses in a specified range.
  • Page 97 Web-based Configuration Guide L2 Multicast Table 5-7 Description of Port Filter Configuration Parameters Parameter Description Default Value Profile that takes effect on a port. If it is not set, no profile rule Profile ID is bound to the port. Maximum number of multicast groups that a port can join. If too much multicast traffic is requested concurrently, the Max Multicast multicast device will be severely burdened.
  • Page 98 Web-based Configuration Guide L2 Multicast Setting an IGMP Querier 5.7.1 Overview In a three-layer multicast network, the L3 multicast device serves as the querier and runs IGMP to maintain group membership. L2 multicast devices only need to listen to IGMP packets to establish and maintain forwarding entries and implement L2 multicasting.
  • Page 99 Web-based Configuration Guide L2 Multicast Table 5-8 Description of Querier Configuration Parameters Parameter Description Default Value Querier Status Whether to enable or disable the VLAN querier function. Disable IGMP Protocol version of query packets sent by the querier. It can Version IGMPv2 be set to IGMPv2 or IGMPv3.
  • Page 100 Web-based Configuration Guide L3 Management L3 Management Caution This section is applicable only to NBS Series Switches that support L3 functions. Products that do not support L3 functions such as RG-NBS3100 Series Switches, RG-NBS3200 Series Switches, do not support the functions mentioned in this section.
  • Page 101 Web-based Configuration Guide L3 Management Table 6-1 Description of Configuration Parameters of L3 Interfaces Parameter Description The type of a created L3 interface. It can be an SVI, routed port, or L3 aggregate port. For details, Port Type Table 4-1 Networking Specifies DHCP or static mode for a port to obtain the IP address.
  • Page 102 Web-based Configuration Guide L3 Management Parameter Description Excluded IP When the device acts as a DHCP server, set the IP address in the address pool that is not used Address (Range) for assignment Note ● VLAN 1 is the default SVI of the device. It can be neither modified nor deleted. ●...
  • Page 103 Web-based Configuration Guide L3 Management Caution ● Add an IPv4 L3 interface first. Then, select the interface on the IPv6 L3 interface configuration page, and click Edit. ● If the IPv4 address of an interface is set to DHCP and no IPv4 address is obtained, the IPv6 address of this interface will not take effect.
  • Page 104 Web-based Configuration Guide L3 Management  If no upstream DHCPv6 server is available to assign the IP address, configure the IPv6 information as follows:...
  • Page 105 Web-based Configuration Guide L3 Management Table 6-2 IPv6 Address Configuration Parameters of the L3 Interface Parameter Description If no upstream DHCPv6 server is available, do not select Auto Obtained IP. Obtain an IPv6 address via DHCPv6 Instead, manually add the IPv6 address. Configure the IPv6 address and prefix length.
  • Page 106 Web-based Configuration Guide L3 Management Parameter Description Click Advanced Settings to configure the link local address, subnet prefix Advanced Settings name, subnet prefix length, and subnet ID. The link local address is used to number hosts on a single network link. The first Link-local Address 10 bits of link address in binary notation must be '1111111010'.
  • Page 107 Web-based Configuration Guide L3 Management Table 6-3 Description of DHCP Server Configuration Parameters Parameter Description DHCP Mode To choose DHCP server The DHCP server assigns the Start IP address automatically, which is the Start IP address of the DHCP address pool. A client obtains an IP address Start from the address pool.
  • Page 108 Web-based Configuration Guide L3 Management 6.3.2 Viewing the DHCP Client Choose Local Device > L3 Interfaces > DHCP Clients. View the addresses automatically allocated to downlink clients after the L3 Interfaces enable DHCP services. You can find the client information based on the MAC address, IP address, or username. Find the target client and click Convert to Static IP in the Status column, or select desired clients and click Batch Convert.
  • Page 109 Web-based Configuration Guide L3 Management To delete a static address, select the static entry to be deleted in Static IP Address List, and click Delete Selected; or click Delete in the last Action column of the corresponding entry. 6.3.4 Configuring the DHCP Server Options Choose Local Device >...
  • Page 110: Configuring The Dhcpv6 Server

    Web-based Configuration Guide L3 Management Parameter Description When the AC (wireless controller) and the AP are not in the same LAN, the AP cannot discover the AC through broadcast after obtaining an IP address from the Option 43 DHCP server. To enable the AP to discover the AC, you need to configure Option 43 carried in the DHCP response packet on the DHCP server.
  • Page 111 Web-based Configuration Guide L3 Management...
  • Page 112 Web-based Configuration Guide L3 Management Table 6-5 IPv6 Address Configuration Parameters of the L3 Interface Parameter Description L3 Interfaces Select the L3 interface for which the DHCPv6 server needs to be added. If this parameter is set to Auto, both DHCPv6 and SLAAC are used to assign IPv6 Assignment IPv6 addresses.
  • Page 113 Web-based Configuration Guide L3 Management Note Each server or client has only one DUID for identification. 6.4.2 Configuring the Static DHCPv6 Address Configure the IPv6 address statically bound to the DUID of a client so that the client can obtain the specified address each time.
  • Page 114 Web-based Configuration Guide L3 Management You can view the DHCPv6 clients information on this page.
  • Page 115 Web-based Configuration Guide L3 Management...
  • Page 116 Web-based Configuration Guide L3 Management Configuring the IPv6 Neighbor List In IPv6, Neighbor Discovery Protocol (NDP) is an important basic protocol. NDP replaces the ARP and ICMP route discovery protocols of IPv4, and supports the following functions: address resolution, neighbor status tracking, duplicate address detection, router discovery, and redirection.
  • Page 117: Configuring A Static Arp Entry

    Web-based Configuration Guide L3 Management Configuring a Static ARP Entry Choose Local Device > L3 Interfaces > ARP List. The device learns the IP address and MAC address of the network devices connected to its interfaces and generates the corresponding ARP entries. Supports binding ARP mappings or manually specifying the IP address and MAC address mapping to prevent devices from learning wrong ARP entries and improve network security.
  • Page 118 Web-based Configuration Guide L3 Management ARP List, and click Bind to complete the binding.  To manually configure a static ARP entry: Click Add, enter the IP address and MAC address to be bound, and click OK. To remove the binding between a static IP address and a MAC address, click Delete in the Action column.
  • Page 119: Configuring Static Routes

    Web-based Configuration Guide Configuring Route Configuring Route Configuring Static Routes Choose Local Device > L3 Interfaces > Static Routing. Static routes are manually configured by the user. When a data packet matches a static route, the packet will be forwarded according to the specified forwarding mode. Caution Static routes cannot automatically adapt to changes of the network topology.
  • Page 120 Web-based Configuration Guide Configuring Route Table 7-1 Description of Static Routes Configuration Parameters Parameter Description Specify the destination network to which the data packet Dest IP Address is to be sent. The device matches the data packet based on the destination address and subnet mask. Specify the subnet mask of the destination network.
  • Page 121 Web-based Configuration Guide Configuring Route...
  • Page 122: Configuring Rip Basic Functions

    Web-based Configuration Guide Configuring Route Table 7-2 IPv6 Static Route Configuration Parameters Parameter Description Destination network of the packet. The destination IPv6 Address/Prefix Length address of the packet is matched according to the IPv6 address and prefix length. Outbound Interface Interface that forwards the packet.
  • Page 123 Web-based Configuration Guide Configuring Route...
  • Page 124 Web-based Configuration Guide Configuring Route...
  • Page 125 Web-based Configuration Guide Configuring Route Table 7-3 RIP Configuration Parameters Parameter Description Network Segment: Enable RIP in the specified network segment. The IP addresses of this network segment are added to the RIP routing table. The device and its RIP- enabled neighbor devices learn the routing table from each other.
  • Page 126 Web-based Configuration Guide Configuring Route Table 7-4 Configuration Parameters in the Port List Parameter Description Port Name Name of the port where RIP is enabled. Rx Status RIP version of packets currently received. Tx Status RIP version of packets currently transmitted. After the port learns the route, the route overhead is set to 16 (indicating that the route is unreachable), Poison Reverse...
  • Page 127 Web-based Configuration Guide Configuring Route protocol packets in the form of plain text. Enter the authentication key to authenticate protocol Auth Key packets when Auth Mode is set to Encrypted Text or Plain Text. Action Click Edit to modify RIP settings of the port. 7.3.3 Configuring the RIP Global Configuration Choose Local Device >...
  • Page 128 Web-based Configuration Guide Configuring Route...
  • Page 129 Web-based Configuration Guide Configuring Route Table 7-5 RIP Global Configuration Parameters Parameter Description Default: Select RIPv2 for sending packets and RIPv1/v2 for receiving packets. RIP Version V1: Select RIPv1 for sending and receiving packets. V2: Select RIPv2 for sending and receiving packets. After route advertisement is enabled, the current Route Advertisement device generates a default route and sends it to the...
  • Page 130 Web-based Configuration Guide Configuring Route Parameter Description default value is 180 seconds. If no update is received before the flush timer of an invalid route expires, the route is completely deleted Flush Timer from the RIP routing table. The default value is 120 seconds.
  • Page 131 Web-based Configuration Guide Configuring Route Table 7-6 RIP Route Redistribution Parameters Parameter Description Direct Routing Type OSPF Routing Static Routing A smaller administrative distance indicates a higher priority. The default value is 0. The value ranges from Administrative Distance 0 to 16. Select the instance ID of OSPF that needs to be Instance ID redistributed.
  • Page 132 Web-based Configuration Guide Configuring Route Parameter Description local device. 7.3.5 Configuring the Passive Interface If an interface is configured as a passive interface, it will suppress RIP update packets. If the connected peer device does not run RIP, you are advised to enable the passive interface. Choose Local Device >...
  • Page 133 Web-based Configuration Guide Configuring Route...
  • Page 134 Web-based Configuration Guide Configuring Route 7.3.6 Configuring the Neighbor Route When the router cannot process broadcast packets, another router can be designated as the neighbor to establish a RIP direct link. Choose Local Device > Routing > RIP Settings > Advanced, click Add, and enter the IP address of the neighbor router.
  • Page 135 Web-based Configuration Guide Configuring Route...
  • Page 136: Configuring Ripng Basic Functions

    Web-based Configuration Guide Configuring Route Configuring RIPng 7.4.1 Configuring RIPng Basic Functions RIP Next Generation (RIPng) provides the routing function for IPv6 networks. RIPng uses UDP port 512 to exchange the routing information. Choose Local Device > Routing > RIPng Settings. Click Add, set Type to Network Segment or Port, and specify the network segment or port accordingly.
  • Page 137 Web-based Configuration Guide Configuring Route rip.protong RIPng (Routing Information Protocol next generation) is a unicast routing protocol applied to IPv6 networks. Network Segment/Port List Enable RIPng in the specified network segment or on the specified port.
  • Page 138 Web-based Configuration Guide Configuring Route If the address length is between 48 and 64, the address will be used as a prefix. Alternatively, enable RIPng on a specified port:...
  • Page 139 Web-based Configuration Guide Configuring Route Table 7-7 RIPng Configuration Parameters Parameter Description Network Segment: Enable RIP in the specified network segment. The IP addresses of this network segment are added to the RIP routing table, and the device and its RIP-enabled neighbor devices learn the routing table from each other.
  • Page 140 Web-based Configuration Guide Configuring Route 7.4.2 Configuring the RIPng Port RIPng poison reverse: After the port learns the route, the route overhead is set to 16 (indicating that the route is unreachable), and the route is sent back to the neighbor from the original port to avoid a loop. Choose Local Device >...
  • Page 141 Web-based Configuration Guide Configuring Route...
  • Page 142 Web-based Configuration Guide Configuring Route Table 7-8 RIPng Global Configuration Parameters Parameter Description After route advertisement is enabled, the current Route Advertisement device generates a default route and sends it to the neighbor. Redistribute routes of other protocols to the RIP Administrative Distance domain so that RIP can interwork with other routing domains.
  • Page 143 Web-based Configuration Guide Configuring Route Parameter Description default value is 180 seconds. If no update is received before the flush timer of an invalid route expires, the route is completely deleted Flush Timer from the RIP routing table. The default value is 120 seconds.
  • Page 144 Web-based Configuration Guide Configuring Route Table 7-9 RIP Route Redistribution Parameters Parameter Description Direct Routing Type OSPF Routing Static Routing Value range: 0-16. The default value is 0. Administrative Distance 7.4.5 Configuring the RIPng Passive Interface If an interface is configured as a passive interface, it will suppress RIPng update packets. If the connected peer device does not run RIP, you are advised to enable the passive interface.
  • Page 145 Web-based Configuration Guide Configuring Route...
  • Page 146 Web-based Configuration Guide Configuring Route 7.4.6 Configuring the IPv6 Aggregate Route Choose Local Device > Routing > RIP Settings > Advanced, click Add, and enter the IPv6 address and prefix length (value range: 0–128).
  • Page 147 Web-based Configuration Guide Configuring Route OSPFv2 Open Shortest Path First (OSPF) can be applied to large-scale networks. IPv4 uses OSPFv2, and IPv6 uses OSPFv3. OSPF is a typical link-state routing protocol, which can solve the problems of slow route update, inaccurate measurement, and poor scalability in large networks.
  • Page 148 Web-based Configuration Guide Configuring Route (1) Configure an instance.
  • Page 149 Web-based Configuration Guide Configuring Route Table 7-10 Instance Configuration Parameters Parameter Description Create an OSPF instance based on the service type. Instance ID The instance only takes effect locally, and does not affect packet exchange with other devices. It identifies a router in an OSPF domain. Caution Router ID Router IDs within the same domain must be...
  • Page 150 Web-based Configuration Guide Configuring Route Parameter Description Generate a default route and send it to the neighbor. After this function is enabled, you need to enter the metric and select a type. The default metric is 1. Advertise Default Route Type 1: The metrics displayed on different routers vary.
  • Page 151 Web-based Configuration Guide Configuring Route Table 7-11 Parameters in the Instance Detailed Configuration Parameter Description It is used for protocol selection. By default, the intra- Distance area, inter-area, and external distances are all 110. Frequent network changes and route flapping may occupy too much network bandwidth and device resources.
  • Page 152 Web-based Configuration Guide Configuring Route Parameter Description When the link state database (LSDB) changes, OSPF recalculates the shortest path, and sets the interval to prevent frequent network changes from occupying a large number of resources Waiting Interval: When the state changes, the timer is triggered.
  • Page 153 Web-based Configuration Guide Configuring Route Table 7-12 Interface Configuration Parameters Parameter Description Interface Select the OSPF-enabled L3 interface. Area Configure the area ID. Value range: 0-4294967295 If Stub Area is enabled, you need to configure the area type and inter-area route isolation. Stub area: Routers at the edge of the area do not advertise routes outside the area, and the routing table in the area is small.
  • Page 154 Web-based Configuration Guide Configuring Route Table 7-13 Parameters in the Interface Detailed Configuration Parameter Description Priority It is 1 by default. Broadcast Network Type Unicast...
  • Page 155 Web-based Configuration Guide Configuring Route Parameter Description Multicast Non-Broadcast Multiple Access Interval for periodic transmission, which is used to Hello Packets discover and maintain OSPF neighbor relationship. The default value is 10 seconds. Time after which the neighbor becomes invalid. The Dead Interval default value is 40 seconds.
  • Page 156 Web-based Configuration Guide Configuring Route 7.5.2 Adding an OSPFv2 Interface Choose Local Device > Routing > OSPFv2, click More in the Action column, and select V2 Interface.
  • Page 157 Web-based Configuration Guide Configuring Route...
  • Page 158 Web-based Configuration Guide Configuring Route 7.5.3 Redistributing OSPFv2 Instance Routes Choose Local Device > Routing > OSPFv2, click More in the Action column, and select V2 Instance Route Redistribution.
  • Page 159 Web-based Configuration Guide Configuring Route 7.5.4 Managing OSPFv2 Stub Areas Choose Local Device > Routing > OSPFv2, click More in the Action column, and select V2 Stub Area Management.
  • Page 160 Web-based Configuration Guide Configuring Route 7.5.5 Managing OSPFv2 Neighbors Choose Local Device > Routing > OSPFv2, click More in the Action column, and select V2 Neighbor Management.
  • Page 161 Web-based Configuration Guide Configuring Route 7.5.6 Viewing OSPFv2 Neighbor Information Choose Local Device > Routing > OSPFv2, and click Neighbor Info in the Action column.
  • Page 162 Web-based Configuration Guide Configuring Route OSPFv3 Open Shortest Path First (OSPF) can be applied to large-scale networks. IPv4 uses OSPFv2, and IPv6 uses OSPFv3. 7.6.1 Configuring OSPFv3 Basic Parameters Choose Local Device > Routing > OSPFv3, click Start Setup, and then configure an instance and an interface respectively.
  • Page 163 Web-based Configuration Guide Configuring Route OSPF OSPF is a typical link-state routing protocol. To satisfy users’ increasing requirements for network reliability and heterogeneity on a large network, OSPF solves the problems such as slow convergence, unscientific metric values, and poor scalability. Highlights Achieves fast convergence.
  • Page 164 Web-based Configuration Guide Configuring Route Table 7-14 Instance Configuration Parameters Parameter Description Create an OSPF instance based on the service type. Instance ID The instance only takes effect locally, and does not affect packet exchange with other devices. It identifies a router in an OSPF domain. Caution Router ID Router IDs within the same domain must be...
  • Page 165 Web-based Configuration Guide Configuring Route Parameter Description Generate a default route and send it to the neighbor. After this function is enabled, you need to enter the metric and select a type. The default metric is 1. Advertise Default Route Type 1: The metrics displayed on different routers vary.
  • Page 166 Web-based Configuration Guide Configuring Route...
  • Page 167 Web-based Configuration Guide Configuring Route Table 7-15 Parameters in the Instance Detailed Configuration Parameter Description It is used for protocol selection. By default, the intra- Distance area, inter-area, and external distances are all 110. Frequent network changes and route flapping may occupy too much network bandwidth and device resources.
  • Page 168 Web-based Configuration Guide Configuring Route Parameter Description prevent frequent network changes from occupying a large number of resources Waiting Interval: When the state changes, the timer is triggered. The delay is calculated for the first time after the timer expires. The default value is 0 ms. Min Interval: As the number of changes increases, the time of each interval will increase according to the algorithm, and the default value is 50 ms.
  • Page 169 Web-based Configuration Guide Configuring Route 2. Configure an interface. Table 7-16 Interface Configuration Parameters Parameter Description Interface Select the OSPF-enabled L3 interface. Area Configure the area ID. Value range: 0-4294967295 If Stub Area is enabled, you need to configure the area type and inter-area route isolation.
  • Page 170 Web-based Configuration Guide Configuring Route Parameter Description Not-So-Stubby Area (NSSA): A few external routes can be imported. Details Expand the detailed configuration.
  • Page 171 Web-based Configuration Guide Configuring Route...
  • Page 172 Web-based Configuration Guide Configuring Route Table 7-17 Parameters in the Interface Detailed Configuration Parameter Description Priority It is 1 by default. Broadcast Unicast Network Type Multicast Non-Broadcast Multiple Access Hello Packets Interval for periodic transmission, which is used to...
  • Page 173 Web-based Configuration Guide Configuring Route Parameter Description discover and maintain OSPF neighbor relationship. The default value is 10 seconds. Time after which the neighbor becomes invalid. The Dead Interval default value is 40 seconds. LSA transmission delay of the interface. The default LSA Transmission Delay value is 1 second.
  • Page 174 Web-based Configuration Guide Configuring Route 3. Complete the configuration. After completing the configuration, you can choose Local Device > Routing > OSPFv3 and view the instance list. 7.6.2 Adding an OSPFv3 Interface Choose Local Device > Routing > OSPFv3, click More in the Action column, and select V3 Interface.
  • Page 175 Web-based Configuration Guide Configuring Route...
  • Page 176 Web-based Configuration Guide Configuring Route 7.6.3 Managing OSPFv3 Stub Areas Choose Local Device > Routing > OSPFv3, click More in the Action column, and select V3 Stub Area Management.
  • Page 177 Web-based Configuration Guide Configuring Route 7.6.4 Viewing OSPFv3 Neighbor Information Choose Local Device > Routing > OSPFv3, and click Neighbor Info in the Action column.
  • Page 178 Web-based Configuration Guide Configuring Route...
  • Page 179 Web-based Configuration Guide Configuring Route Routing Table Info...
  • Page 180: Firewall Management

    Web-based Configuration Guide Firewall Management Firewall Management After a firewall is added to the network, you can manage and configure the firewall on the Web management system. Viewing Firewall Information You can view the basic information and license of the firewall on the Web management system. Choose Network >...
  • Page 181 Web-based Configuration Guide Firewall Management Configuring Firewall Port If the firewall is set to transparent mode, the Firewall Port Config page appears. You can select the WAN port connected to the gateway or the LAN port connected to the switch and enable Security Guard.
  • Page 182: Dhcp Snooping

    Web-based Configuration Guide Security Security DHCP Snooping 9.1.1 Overview The Dynamic Host Configuration Protocol (DHCP) snooping function allows a device to snoop DHCP packets exchanged between clients and a server to record and monitor the IP address usage and filter out invalid DHCP packets, including request packets from the clients and response packets from the server.
  • Page 183 Web-based Configuration Guide Security Enabling DHCP Snooping on network switches can ensure that users can only obtain network configuration parameters from the DHCP server within the control range, and avoid the occurrence of “the Internet terminal in the original network obtains the IP address assigned by the privately accessed router”, to guarantee the stability of the network.
  • Page 184 Web-based Configuration Guide Security (3) After the configuration is delivered, if you need to modify the effective range of the anti-private connection function, click Configure to reselect the switch that enables the anti-private connection in the topology. After the configuration is delivered, if you want to modify the effective range of the DHCP Snooping function, click Configure to select desired switches in the topology again.
  • Page 185: Storm Control

    Web-based Configuration Guide Security Storm Control 9.2.1 Overview When a local area network (LAN) has excess broadcast, multicast, or unknown unicast data flows, the network speed will slow down and packet transmission will have an increased timeout probability. This is called LAN storm, which may be caused by topology protocol execution errors or incorrect network configuration.
  • Page 186 Web-based Configuration Guide Security  Storm control based on kilobytes per second: If the rate of data flows received over a device port exceeds the configured kilobytes-per-second threshold, excess data flows are discarded until the rate falls within the threshold. 9.3.1 Overview An access control list (ACL) is commonly referred to as packet filter in some documents.
  • Page 187: Creating Acl Rules

    Web-based Configuration Guide Security 9.3.2 Creating ACL Rules Choose Local Device > Security > ACL > ACL List. (1) Click Add to set the ACL control type, enter an ACL name, and click OK. Based on MAC address: To control the L2 packets entering/leaving the port, and deny or permit specific L2 packets destined to a network.
  • Page 188 Web-based Configuration Guide Security Table 9-1 Description of ACL Rule Configuration Parameters Parameter Description Configuring ACL Rules Action Block: If packets match this rule, the packets are denied. Allow: If packets match this rule, the packets are permitted. Match IP protocol number The value ranges from 0 to 255. Check All to IP Protocol Number match all IP protocols.
  • Page 189 Web-based Configuration Guide Security Parameter Description match all protocol type numbers. Match the MAC address of the source host. Check All to match all source Src Mac MAC addresses Match the MAC address of the destination host. Check All to match all Dest MAC destination MAC addresses Note...
  • Page 190: Port Protection

    Web-based Configuration Guide Security After an ACL is applied to a port, you can click Unbind in the Action column, or check the port entry and click Delete Selected to unbind the ACL from the port. Port Protection Choose Local Device > Security > Port Protection. In some scenarios, it is required that communication be disabled between some ports on the device.
  • Page 191: Ip-Mac Binding

    Web-based Configuration Guide Security IP-MAC Binding 9.5.1 Overview After IP-MAC binding is configured on a port, to improve security, the device checks whether the source IP addresses and source MAC addresses of IP packets are those configured for the device, filters out IP packets not matching the binding, and strictly control the validity of input sources.
  • Page 192 Web-based Configuration Guide Security 2. Searching Binding Entries The search box in the upper-right corner supports finding binding entries based on IP addresses, MAC addresses or ports. Select the search type, enter the search string, and click Search. Entries that meet the search criteria are displayed in the list.
  • Page 193: Ip Source Guard

    Web-based Configuration Guide Security IP Source Guard 9.6.1 Overview After the IP Source Guard function is enabled, the device checks IP packets from DHCP non-trusted ports. You can configure the device to check only the IP field or IP+MAC field to filter out IP packets not matching the binding list.
  • Page 194 Web-based Configuration Guide Security 9.6.3 Enabling Port IP Source Guard Choose Local Device > Security > IP Source Guard > Basic Settings. In Port List, click Edit in the Action column. Select Enabled and select the match rule, and click OK. There are two match rules: ...
  • Page 195 Web-based Configuration Guide Security 9.6.4 Configuring Exceptional VLAN Addresses Choose Local Device > Security > IP Source Guard > Excluded VLAN. When IP Source Guard is enabled on an interface, it is effective to all the virtual local area networks (VLANs) under the interface by default.
  • Page 196: Configure 802.1X Authentication

    Web-based Configuration Guide Security Configure 802.1x authentication 9.7.1 Function introduction IEEE802.1x ( Port-Based Network Access Control ) is a port-based network access control standard that provides secure access services for LANs . IEEE 802 LAN , as long as users can connect to network devices, they can directly access network resources without authentication and authorization.
  • Page 197 Web-based Configuration Guide Security  The client is generally a user terminal device, and the user can initiate 802.1X authentication by starting the client software. The client must support the Extensible Authentication Protocol over LANs (EAPoL).  AP or switching device ) that supports the 802.1x protocol . It provides a port for the client to access the LAN.
  • Page 198 Web-based Configuration Guide Security parameter illustrate If the server disconnection is detected, all users will be allowed to access Server Escape the Internet Require clients to re-authenticate at certain intervals to ensure network Re-authentication security Guest VLAN Provide a VLAN for unauthenticated clients to restrict their access Define the number of times the EAP request message will be EAP-Request Packet retransmitted when no response is received, default and recommended...
  • Page 199 Web-based Configuration Guide Security parameter illustrate Define the time interval between sending EAP request messages to EAP-Request Packet Interval control the rate of the authentication process, default and recommended value is 15, value range: 1-65535 seconds (1) add server Before configuration, please confirm : ...
  • Page 200 Web-based Configuration Guide Security parameter illustrate Server group name. Multiple servers can be added to each group. If the server with higher priority does not respond, it will switch to other servers in matching Server group order. name This function needs to open the server detection function, see9.7.2 (3) Set up the server and click <Save>...
  • Page 201 Web-based Configuration Guide Security reference - do parameter illustrate not translate Configure the MAC address format for RADIUS attributes 30 (Called-Station-ID) and 31 (Calling-Station-ID). MAC Address The following formats are supported: M AC address format Dotted hexadecimal format, such as Format 00d0.f8aa.bbcc IETF format, such as 00-D0-F8-AA-BB-...
  • Page 202 Web-based Configuration Guide Security parameter illustrate disable : Turn off the authentication method , which has the same effect as turning off the 802.1x authentication switch force-auth : Mandatory authentication , the client can directly access the Internet without a password Auth Method force-unauth : force no authentication, the client cannot authenticate and cannot access the Internet...
  • Page 203: Anti-Arp Spoofing

    Web-based Configuration Guide Security Click <Refresh> to get the latest user list information. If you want to disconnect a certain user from the network, you can select the user and click <Offline> in the "Operation" column ; you can also select multiple users and click <Batch Offline>. Anti-ARP Spoofing 9.8.1 Overview...
  • Page 204: Advanced Configuration

    Web-based Configuration Guide Advanced Configuration 2. Disabling Anti-ARP Spoofing Batch disable: Select an entry to be deleted in the list and click Delete Selected. Disable one port: click Delete in the last Action column of the corresponding entry. Advanced Configuration 10.1 STP (Spanning Tree Protocol) is an L2 management protocol that eliminates L2 loops by selectively blocking redundant links in the network.
  • Page 205: Stp Global Settings

    Web-based Configuration Guide Advanced Configuration 10.1.1 STP Global Settings Choose Local Device > Advanced > STP > STP. (1) Click to enable the STP function, and click OK in the displayed box. The STP function is disabled by default. Caution Enabling the STP or changing the STP mode will initiate a new session.
  • Page 206 Web-based Configuration Guide Advanced Configuration Table 10-1 Description of STP Global Configuration Parameters Default Parameter Description Value Whether to enable the STP function. It takes effect globally. STP attributes Disable can be configured only after STP is enabled. Bridge priority. The device compares the bridge priority first during root Priority 32768 bridge selection.
  • Page 207 Web-based Configuration Guide Advanced Configuration Table 10-2 Description of STP Configuration Parameters of Ports Default Parameter Description Value Root: A port with the shortest path to the root Alternate: A backup port of a root port. Once the root port fails, the alternate port becomes the root port immediately.
  • Page 208 Web-based Configuration Guide Advanced Configuration Default Parameter Description Value Disable: The port is closed manually or due to a fault, does not participate in spanning tree and does not forward data, and can be turned into a blocking state after initialization or opening. Blocking: A port in the blocking state cannot forward data packets or learn addresses, but can send or receive configuration BPDUs and send them to the CPU.
  • Page 209: Lldp Global Settings

    Web-based Configuration Guide Advanced Configuration Note ● It is recommended to enable Port Fast on the port connected to a PC. ● A port switches to the forwarding state after STP is enabled more than 30 seconds. Therefore transient disconnection may occur and packets cannot be forwarded. 10.2 LLDP 10.2.1...
  • Page 210 Web-based Configuration Guide Advanced Configuration Parameter Description Default Value TTL multiplier of LLDP In LLDP packets, TTL TLV indicates the TTL of local information on a neighbor. The value of TTL TLV is calculated using the following Hold Multiplier formula: TTL TLV = TTL multiplier × Packet transmission interval + 1. The TTL TLV value can be modified by configuring the TTL multiplier and LLDP packet transmission interval.
  • Page 211: Displaying Lldp Information

    Web-based Configuration Guide Advanced Configuration Send LLDPDU: After Send LLDPDU is enabled on a port, the port can send LLDPDUs. Receive LLDPDU: After Receive LLDPDU is enabled on a port, the port can receive LLDPDUs. LLDPMED: After LLDPMED is enabled, the device is capable of discovering neighbors when its peer endpoint supports LLDP-MED (the Link Layer Discovery Protocol-Media Endpoint Discovery).
  • Page 212 Web-based Configuration Guide Advanced Configuration port rate, duplex mode, an error will be prompted if the configurations do not match those on the connected neighbor. 10.3 RLDP 10.3.1 Overview The Rapid Link Detection Protocol (RLDP) is an Ethernet link failure detection protocol, which is used to rapidly detect unidirectional link failures, bidirectional link failures, and downlink loop failures.
  • Page 213 Web-based Configuration Guide Advanced Configuration RLDP automatically shuts down relevant ports or asks users to manually shut down the ports according to the configured failure handling methods, to avoid wrong forwarding of traffic or Ethernet L2 loops. Supports enabling the RLDP function of the access switches in the network in a batch. By default, the switch ports will be automatically shut down when a loop occurs.
  • Page 214 Web-based Configuration Guide Advanced Configuration 2. Applying RLDP to a Port Choose Local Device > Advanced > RLDP > RLDP Management. In Port List, click Edit in the Action column or click Batch Edit, select the desired port, configure whether to enable loop detection on the port and the handling method after a fault is detected, and click OK.
  • Page 215 Web-based Configuration Guide Advanced Configuration You can view the detection status, failure handling methods, and ports that connect the neighbor device to the local device. You can click Reset to restore the faulty RLDP status triggered by a port to the normal state. 10.3.3 Batch Configuring Network Switches Choose Network >...
  • Page 216 Web-based Configuration Guide Advanced Configuration (2) In the networking topology, you can select the access switches on which you want to enable RLDP in either recommended or custom mode. If you select the recommended mode, all access switches in the network are selected automatically.
  • Page 217 Web-based Configuration Guide Advanced Configuration 10.4 Configuring the Local DNS The local DNS server is optional. The device obtains the DNS server address from the connected uplink device by default. Choose Local Device > Advanced > Local DNS. Enter the DNS server address used by the local device. If multiple addresses exist, separate them with spaces. Click Save.
  • Page 218: Voice Vlan

    Web-based Configuration Guide Advanced Configuration 10.5 Voice VLAN Caution The Voice VLAN function is supported by RG-NBS3100 Series, RG-NBS3200 Series, RG-NBS5100 Series and RG-NBS5200 Series Switches. 10.5.1 Overview A voice virtual local area network (VLAN) is a VLAN dedicated to voice traffic of users. By creating a voice VLAN and adding ports connected to voice devices to the voice VLAN, you can have voice data transmitted in the voice VLAN and deliver specified policy of the quality of service (QoS) for voice streams, to improve the transmission priority of voice traffic and ensure the call quality.
  • Page 219 Web-based Configuration Guide Advanced Configuration Parameter Description Default Value Aging time of voice VLAN, in minutes. In automatic mode, after the MAC address in a voice packet ages, if the port does not receive any Max Age 1440 minutes more voice packets within the aging time, the device removes this port from the voice VLAN The L2 Priority of voice stream packets in a Voice VLAN.
  • Page 220 Web-based Configuration Guide Advanced Configuration 10.5.4 Configuring the Voice VLAN Function on a Port Choose Local Device > Advanced > Voice VLAN > Port Settings. Click Edit in the port entry or click Batch Edit on the upper -right corner. In the displayed dialog box, select whether to enable the voice VLAN function on the port, voice VLAN mode to be applied, and whether to enable the security mode, and Click OK.
  • Page 221 Web-based Configuration Guide Advanced Configuration Table 10-6 Description of the Voice VLAN Configuration Parameters on a Port Parameter Description Default Value Based on different ways the Voice VLAN function is enabled on the port, the Voice VLAN Mode can be Auto Mode or Manual Mode: Auto Mode: In this mode, the device checks whether the permit VLANs of a port contain the voice VLAN after the voice VLAN function is enabled on the port.
  • Page 222 Web-based Configuration Guide Advanced Configuration ● After the voice VLAN function is enabled on a port, do not switch the L2 mode (trunk or access mode) of the port to ensure normal operation of the function. If you need to switch the L2 mode of the port, disable the voice VLAN function on the port first.
  • Page 223 Web-based Configuration Guide Advanced Configuration 10.6 Configuring Smart Hot Standby (VCS) Smart hot standby enables multiple switches to act as a hot standby device for each other, ensuring uninterrupted data forwarding in the event of a single point failure. 10.6.1 Configuring Hot Standby View or modify selected hot standby interfaces, device IDs and priorities.
  • Page 224: Info Center

    Web-based Configuration Guide Diagnostics 10.6.3 Active/Standby Switchover Active/Standby Switchover allow manual switching between the active and standby supervisor engines. Clicking the Switch button will restart the supervisor engine. Please exercise caution. Diagnostics 11.1 Info Center Choose Local Device > Diagnostics > Info Center.
  • Page 225 Web-based Configuration Guide Diagnostics In Info Center, you can view port traffic, VLAN information, routing information, client list, ARP list, MAC address, DHCP snooping , IP-MAC binding, IP Source Guard, and CPP statistics of the device and relevant configurations. 11.1.1 Port Info Choose Local Device >...
  • Page 226: Routing Info

    Web-based Configuration Guide Diagnostics 11.1.2 VLAN Info Choose Local Device > Diagnostics > Info Center > VLAN Info. Display SVI port and routed port information, including the port information included in the VLAN, the port IP address, and whether the DHCP address pool is enabled. Note ●...
  • Page 227: Dhcp Clients

    Web-based Configuration Guide Diagnostics 11.1.4 DHCP Clients Caution If the device does not support L3 functions (such as RG-NBS3100 Series and RG-NBS3200 Series Switches), this type of information is not displayed. Choose Local Device > Diagnostics > Info Center > DHCP Clients. Displays the IP address information assigned to endpoints by the device as a DHCP server.
  • Page 228: Mac Address

    Web-based Configuration Guide Diagnostics 11.1.6 MAC Address Choose Local Device > Diagnostics > Info Center > MAC. Displays the MAC address information of the device, including the static MAC address manually configured by the user, the filtering MAC address, and the dynamic MAC address automatically learned by the device. Note To configure and manage the MAC address, see 3.3.
  • Page 229: Ip-Mac Binding

    Web-based Configuration Guide Diagnostics Note To modify DHCP Snooping related configuration, see 7.1. 11.1.8 IP-MAC Binding Choose Local Device > Diagnostics > Info Center > IP-MAC Binding. Displays the configured IP-MAC binding entries. The device checks whether the source IP addresses and source MAC addresses of IP packets match those configured for the device and filters out IP packets not matching the binding.
  • Page 230: Network Tools

    Web-based Configuration Guide Diagnostics Displays the binding list of the IP Source Guard function. The IP Source Guard function will check the IP packets from non-DHCP trusted ports according to the list, and filter out the IP packets that are not in the binding list. Note To configure IP Source Guard function, see 7.6.
  • Page 231 Web-based Configuration Guide Diagnostics 11.2.1 Ping Choose Local Device > Diagnostics > Network Tools. The Ping command is used to detect the network connectivity. Select Ping as the diagnosis mode, enter the destination IP address or website address, configure the ping count and packet size, and click Start to test the network connectivity between the device and the IP address or website.
  • Page 232: Dns Lookup

    Web-based Configuration Guide Diagnostics 11.2.3 DNS Lookup Choose Local Device > Diagnostics > Network Tools. DNS Lookup is used to query the information of network domain name or diagnose DNS server problems. If the device can ping through the IP address of the Internet from your web page but the browser cannot open the web page, you can use the DNS lookup function to check whether domain name resolution is normal.
  • Page 233: Cable Diagnostics

    Web-based Configuration Guide Diagnostics 11.3 Fault Collection Choose Local Device > Diagnostics > Fault Collection. When an unknown fault occurs on the device, you can collect fault information by one click on this page. Click Start. The configuration files of the device will be packed into a compressed file. Download the compressed file locally and provide it to R&D personnel for fault locating.
  • Page 234: System Logs

    Web-based Configuration Guide Diagnostics Caution ● The SPF port does not support the function. ● If a detected port contains an uplink port, the network may be intermittently disconnected. Exercise caution when performing this operation. 11.5 System Logs Choose Local Device > Diagnostics > System Logs. System logs record device operations, operation time, and operation modules.
  • Page 235 Web-based Configuration Guide Diagnostics Displays possible problems on the network environment to facilitate fault prevention and troubleshooting. You can view the alert occurrence time, port, alert impact, and handling suggestions, and rectify device faults according to handling suggestions. All types of alerts are concerned by default. You can click Unfollow to unfollow this type of alert. The system will no longer display this type of alert.
  • Page 236 Web-based Configuration Guide Diagnostics Alert Type Description Support Description The number of L2 MAC address entries is The MAC address about to reach the hardware capacity limit of table is full of entries. the product. The ARP table is full of The number of ARP entries on the network ARP entries.
  • Page 237: System Configuration

    Web-based Configuration Guide System Configuration System Configuration 12.1 Setting the System Time Choose System > System Time. You can view the current system time. If the time is incorrect, check and select the local time zone. If the time zone is correct but time is still incorrect, click Edit to manually set the time. In addition, the device supports Network Time Protocol (NTP) servers.
  • Page 238 Web-based Configuration Guide System Configuration 12.2 Setting the Web Login Password Choose System > Login > Login Password. Enter the old password and new password. After saving the configuration, use the new password to log in. Caution When self-organizing network discovery is enabled, the login password of all devices in the network will be changed synchronously.
  • Page 239: Configuring Snmp

    Web-based Configuration Guide System Configuration 12.4 Configuring SNMP 12.4.1 Overview SNMP (Simple Network Management Protocol) is a protocol used for managing network devices. It is based on the client/server model and can remotely monitor and control network devices. SNMP consists of a management station and agents, with the management station communicating with agents through the SNMP protocol to obtain information such as device status, configuration information, performance data, etc., while also being able to configure and manage devices.
  • Page 240 Web-based Configuration Guide System Configuration When first opened, the system prompts to enable SNMPv3 by default. Click <OK>. (1) Set global configuration parameters for SNMP service. Global Configuration Description Table Table 4-1 Parameter Parameter SNMP Service Whether the SNMP service is enabled or not. SNMP protocol version number includes v1 version, v2c version, and v3 SNMP Protocol Version version.
  • Page 241 Web-based Configuration Guide System Configuration Parameter Parameter Local Port [1, 65535] Cannot contain Chinese characters, full-width characters, Device Location question marks and spaces. Character length: 1-64. Cannot contain Chinese characters, full-width characters, Contact Information question marks and spaces. Character length: 1-64. Click <Save>.
  • Page 242 Web-based Configuration Guide System Configuration Table 4-1 View Configuration Information Description Table parameter illustrate The name used to identify the view. View Name The length is 1 to 32 characters, and cannot contain Chinese and full-width characters. Define the range of OIDs included in the view, which can be OIDs a single OID or a subtree of OIDs Divided into inclusion rules and exclusion rules...
  • Page 243 Web-based Configuration Guide System Configuration Notice For the created view, add at least one OID rule , otherwise a warning message will appear . (2) Click <OK> . v1 /v2c user configuration  Introduction  When the SNMP protocol version is set to v1/v2c, user configuration needs to be completed. instruction ●...
  • Page 244 Web-based Configuration Guide System Configuration Table 4-1 v1 / v2c user information description table parameter illustrate at least 8 characters Contains three types of uppercase letters, lowercase letters, numbers, and special characters Community Name Does not contain admin/public/private Do not contain question marks, spaces and Chinese Access rights of the community name (read-only , read-write) Read &...
  • Page 245 Web-based Configuration Guide System Configuration configured, each group can have its own security policy and access control settings, and each group can also have one or more users.  prerequisite When the SNMP protocol version is set to v3 , the v3 group configuration needs to be completed. illustrate Select the SNMP protocol version, click <Save>, and the corresponding configuration options will appear on the view/group/group/user access control interface.
  • Page 246 Web-based Configuration Guide System Configuration Table 4-1 V3 group configuration parameters parameter illustrate rule group name 1-32 characters, a single Chinese accounted for three characters Group Name Cannot contain Chinese, full-width characters, question marks and spaces The minimum security level of the rule group ( Auth &...
  • Page 247 Web-based Configuration Guide System Configuration v 3 user configuration  Introduction  prerequisite When the SNMP protocol version is set to v3 , the v3 group configuration needs to be completed. illustrate Select the SNMP protocol version, click <Save>, and the corresponding configuration options will appear on the view/group/group/user access control interface.
  • Page 248 Web-based Configuration Guide System Configuration Table 4-1 v3 user configuration parameters parameter illustrate username at least 8 characters Contains three types of uppercase letters, lowercase letters, numbers, Username and special characters Does not contain admin/public/private Do not contain question marks, spaces and Chinese Group Name user's group User security level (authentication and encryption, authentication without...
  • Page 249 Web-based Configuration Guide System Configuration parameter illustrate Encrypted Password Chinese, full-width characters, question marks and spaces format, containing at least 3 types of uppercase and lowercase letters, numbers, or special characters. Note: When the "Security Level" is "Authentication and Encryption", this parameter needs to be set.
  • Page 250 Web-based Configuration Guide System Configuration (2) On the view/group/group/user access control interface, click <Add> in the view list, fill in the view name and O ID in the pop-up window and click <Add inclusion rule>, and click <OK> after the operation is complete .
  • Page 251 Web-based Configuration Guide System Configuration (3) view /group/group/user access control interface, click <Add> in the SNMP v1/v2c community name list , fill in the community name, access mode and view in the pop-up window, and click <OK> after the operation is completed.
  • Page 252 Web-based Configuration Guide System Configuration v 3 version SNMP service configuration  scenes to be used Users need to monitor and control the equipment, and use the v3 version of the third-party software to monitor and send data to the public node (1.3.6.1.2.1) node. The security level of the v3 version adopts authentication and encryption.
  • Page 253 Web-based Configuration Guide System Configuration (2) On the view/group/group/user access control interface, click <Add> in the view list, fill in the view name and OID in the pop-up window, click <Add Inclusion Rule>, and click <OK> after the operation is complete.
  • Page 254 Web-based Configuration Guide System Configuration (3) Click <Add> in the SNMP v3 group list, fill in the group name and security level in the pop-up window, the user has read and write permissions, select "public _view" for the readable view and read and write view, and set the notification view to none , click <...
  • Page 255 Web-based Configuration Guide System Configuration (4) Click <Add> in the SNMP v3 user list , fill in the user name and group name in the pop-up window, the user security level adopts authentication and encryption mode, fill in the corresponding authentication protocol, authentication password, encryption protocol, and encryption password, and click <...
  • Page 256 Web-based Configuration Guide System Configuration 12.4.5 trap service configuration trap is a notification mechanism of SNMP ( Simple Network Management Protocol ) protocol, which is used to report the status and events of network devices to managers, including device status reports, fault reports, performance reports, configuration reports and security management.
  • Page 257 Web-based Configuration Guide System Configuration (2) Set the trap version. The trap protocol version number includes v1 version, v2c version, and v3 version. (3) Click <OK>. After the trap service is enabled, you need to click <Save>, and the configuration of the trap protocol version number will take effect.
  • Page 258 Web-based Configuration Guide System Configuration Table 4-1 t rap v1/v2c user information description table parameter illustrate destination ip Trap peer device IP, support IPv4 / IPv6 address version number Trap version number, including v1|v2c The port number trap peer device port [1, 65535] The community name of the trap user at least 8 characters Contains three types of uppercase letters, lowercase letters, numbers,...
  • Page 259 Web-based Configuration Guide System Configuration Trap v3 is a network management mechanism based on SNMP protocol, which is used to send alarm notifications to management personnel. Unlike previous versions, trap v3 provides more secure and flexible configuration options, including authentication and encryption. Trap v3 can be customized to choose the conditions and methods to send alerts, as well as who receives alerts and how to be notified.
  • Page 260 Web-based Configuration Guide System Configuration parameter illustrate Does not contain admin/public/private Do not contain question marks, spaces and Chinese Trap user security level, including three levels of authentication and Security Level encryption, authentication and encryption, and authentication and no encryption Authentication protocols include: MD5/SHA/SHA224/SHA256/SHA384/SHA512 Authentication password: 8~ 31 characters in length, cannot contain...
  • Page 261 Web-based Configuration Guide System Configuration description item illustrate use version number Select v2 version Group Name / User Name Trap_public  configuration steps (3) Select the v2c version on the trap setting interface , click <Save> , (2) Click <Add> in the " trap v1 / v2c user list " . (3) Fill in the target host IP, version number, port number, user name and other information, and click <OK>...
  • Page 262 Web-based Configuration Guide System Configuration V3 version trap configuration  scenes to be used When the user is monitoring the device, if the device is suddenly interrupted or abnormal, the third-party monitoring software cannot detect and deal with the abnormal situation in time, so configure the device with the destination ip 1 92.
  • Page 263 Web-based Configuration Guide System Configuration (2) Click <Add> in the trap v3 user list . (3) Fill in the target host IP , port number, user name and other information, and click <OK> after the configuration is complete. 12.5 Configure 802.1x authentication 12.5.1 Function introduction IEEE802.1x ( Port-Based Network Access Control ) is a port-based network access control standard that...
  • Page 264 Web-based Configuration Guide System Configuration 802.1x can be deployed in a network that controls access users to implement authentication and authorization services for access users. 802.1x system is a typical Client/Server structure, including three entities: client, access device and authentication server. A typical architecture diagram is shown in the figure. ...
  • Page 265 Web-based Configuration Guide System Configuration parameter illustrate If the server disconnection is detected, all users will be allowed to access Server Escape the Internet Require clients to re-authenticate at certain intervals to ensure network Re-authentication security Guest VLAN Provide a VLAN for unauthenticated clients to restrict their access EAP-Request Packet Define the number of times the EAP request message will be Retransmission Count...
  • Page 266 Web-based Configuration Guide System Configuration  The Radius server is fully built and configured as follows. ○ Add username and password for client login. ○ Close the firewall, otherwise the authentication message may be intercepted, resulting in authentication failure. ○ a trusted IP on the Radius server.
  • Page 267 Web-based Configuration Guide System Configuration Reference without parameter illustrate translation The system supports adding up to 5 Radius Match Order matching order servers. The higher the matching order value is, the higher the priority is. (1) Set up the server and click <Save> . reference - do parameter illustrate...
  • Page 268 Web-based Configuration Guide System Configuration reference - do not parameter illustrate translate When enabled, the selected interface will enable 802.1x 802.1x Authentication 802.1x certification authentication . disable : Turn off the authentication method , which has the same effect as turning off the 802.1x authentication switch force- auth : Mandatory authentication , the client can directly access the Internet without a password...
  • Page 269 Web-based Configuration Guide System Configuration reference - do not parameter illustrate translate multi- auth : supports multiple devices using the same port for authentication, but each device needs to be authenticated independently multi-host : Multiple devices are allowed to share the same port.
  • Page 270 Web-based Configuration Guide System Configuration Click <Refresh> to get the latest user list information. If you want to disconnect a certain user from the network, you can select the user and click <Offline> in the "Operation" column ; you can also select multiple users and click <Batch Offline>. 12.6 Anti-ARP Spoofing 12.6.1...
  • Page 271 Web-based Configuration Guide Advanced Configuration 2. Disabling Anti-ARP Spoofing Batch disable: Select an entry to be deleted in the list and click Delete Selected . Disable one port: click Delete in the last Action column of the corresponding entry. Advanced Configuration 13.1 STP (Spanning Tree Protocol) is an L2 management protocol that eliminates L2 loops by selectively blocking redundant links in the network.
  • Page 272 Web-based Configuration Guide Advanced Configuration 13.1.1 STP Global Settings Choose Local Device > Advanced > STP > STP . (1) Click to enable the STP function, and click OK in the displayed box. The STP function is disabled by default. Caution Enabling the STP or changing the STP mode will initiate a new session.
  • Page 273 Web-based Configuration Guide Advanced Configuration Table 10-7 Description of STP Global Configuration Parameters Default Parameter Description Value Whether to enable the STP function. It takes effect globally. STP attributes Disable can be configured only after STP is enabled. Bridge priority. The device compares the bridge priority first during root priority 32768 bridge selection.
  • Page 274 Web-based Configuration Guide Advanced Configuration Table 10-8 Description of STP Configuration Parameters of Ports Default Parameter Description Value Root: A port with the shortest path to the root Alternate: A backup port of a root port. Once the root port fails, the alternate port becomes the root port immediately.
  • Page 275 Web-based Configuration Guide Advanced Configuration Default Parameter Description Value Disable: The port is closed manually or due to a fault, does not participate in spanning tree and does not forward data, and can be turned into a blocking state after initialization or opening. Blocking: A port in the blocking state cannot forward data packets or learn addresses, but can send or receive configuration BPDUs and send them to the CPU.
  • Page 276 Web-based Configuration Guide Advanced Configuration note ● It is recommended to enable Port Fast on the port connected to a PC. ● A port switches to the forwarding state after STP is enabled more than 30 seconds. Therefore transient disconnection may occur and packets cannot be forwarded. 13.2 LLDP 13.2.1...
  • Page 277 Web-based Configuration Guide Advanced Configuration Parameter Description Default Value TTL multiplier of LLDP In LLDP packets, TTL TLV indicates the TTL of local information on a neighbor. The value of TTL TLV is calculated using the following Hold Multiplier formula: TTL TLV = TTL multiplier × Packet transmission interval + 1. The TTL TLV value can be modified by configuring the TTL multiplier and LLDP packet transmission interval.
  • Page 278 Web-based Configuration Guide Advanced Configuration Send LLDPDU : After Send LLDPDU is enabled on a port, the port can send LLDPDUs. Receive LLDPDU : After Receive LLDPDU is enabled on a port, the port can receive LLDPDUs. LLDPMED : After LLDPMED is enabled, the device is capable of discovering neighbors when its peer endpoint supports LLDP-MED (the Link Layer Discovery Protocol-Media Endpoint Discovery).
  • Page 279 Web-based Configuration Guide Advanced Configuration administrator configures the VLAN, port rate, duplex mode, an error will be prompted ted If the configurations do not match those on the connected neighbor. 13.3 RLDP 13.3.1 Overview The Rapid Link Detection Protocol ( RLDP) is an Ethernet link failure detection protocol, which is used to rapidly detect unidirectional link failures, bidirectional link failures, and downlink loop failures.
  • Page 280 Web-based Configuration Guide Advanced Configuration shut down the ports according to the configured failure handling methods, to avoid wrong forwarding of traffic or Ethernet L2 loops. Supports enabling the RLDP function of the access switches in the network in a batch. By default, the switch ports will be automatically shut down when a loop occurs.
  • Page 281 Web-based Configuration Guide Advanced Configuration 2. Applying RLDP to a Port Choose Local Device > Advanced > RLDP > RLDP Management . In Port List, click Edit in the Action column or click Batch Edit , select the desired port, configure whether to enable loop detection on the port and the handling method after a fault is detected, and click OK .
  • Page 282 Web-based Configuration Guide Advanced Configuration 3. Displaying RLDP information Choose Local Device > Advanced > RLDP > RLDP Info . You can view the detection status, failure handling methods, and ports that connect the neighbor device to the local device. You can click Reset to restore the faulty RLDP status triggered by a port to the normal state.
  • Page 283 Web-based Configuration Guide Advanced Configuration (2) In the networking topology, you can select the access switches on which you want to enable RLDP in either recommended or custom mode. If you select the recommended mode, all access switches in the network are selected automatically.
  • Page 284 Web-based Configuration Guide Advanced Configuration (3) After the configuration is delivered, if you want to modify the effective range of the RLDP function, click Configure to select desired switches in the topology again. Turn off RLDP to disable RLDP on all the switches with one click.
  • Page 285 Web-based Configuration Guide Advanced Configuration 13.4 Configuring the Local DNS The local DNS server is optional. The device obtains the DNS server address from the connected uplink device by default. Choose Local Device > Advanced > Local DNS . Enter the DNS server address used by the local device. If multiple addresses exist, separate them with spaces.
  • Page 286 Web-based Configuration Guide Advanced Configuration 13.5 Voice VLAN Caution The Voice VLAN function is supported by RG-NBS3100 Series, RG-NBS3200 Series, RG-NBS5100 Series and RG-NBS5200 Series Switches. 13.5.1 Overview A voice virtual local area network (VLAN) is a VLAN dedicated to voice traffic of users. By creating a voice VLAN and adding ports connected to voice devices to the voice VLAN, you can have voice data transmitted in the voice VLAN and deliver specified policy of the quality of service ( QoS ) for voice streams, to improve the transmission priority of voice traffic and ensure the call quality.
  • Page 287 Web-based Configuration Guide Advanced Configuration Parameter Description Default Value Aging time of voice VLAN, in minutes. In automatic mode, after the MAC address in a voice packet ages, if the port does not receive any Max Age 1440 minutes more voice packets within the aging time, the device removes this port from the voice VLAN The L2 Priority of voice stream packets in a Voice VLAN.
  • Page 288 Web-based Configuration Guide Advanced Configuration 13.5.4 Configuring the Voice VLAN Function on a Port Choose Local Device > Advanced > Voice VLAN > Port Settings . Click Edit in the port entry or click Batch Edit on the upper -right corner. In the displayed dialog box, select whether to enable the voice VLAN function on the port, voice VLAN mode to be applied, and whether to enable the security mode, and Click OK .
  • Page 289 Web-based Configuration Guide Advanced Configuration Table 10-12 Description of the Voice VLAN Configuration Parameters on a Port Parameter Description Default Value Based on different ways the Voice VLAN function is enabled on the port, the Voice VLAN Mode can be Auto Mode or Manual Mode: Auto Mode : In this mode, the device checks whether the permit VLANs of a port contain the voice VLAN after the voice VLAN function is enabled on the port.
  • Page 290 Web-based Configuration Guide Advanced Configuration ● After the voice VLAN function is enabled on a port, do not switch the L2 mode (trunk or access mode) of the port to ensure normal operation of the function. If you need to switch the L2 mode of the port, disable the voice VLAN function on the port first.
  • Page 291 Web-based Configuration Guide Advanced Configuration 13.6 Configuring Smart Hot Standby (VCS) Smart hot standby enables multiple switches to act as a hot standby device for each other, ensuring uninterrupted data forwarding in the event of a single point failure. 13.6.1 Configuring Hot Standby View or modify selected hot standby interfaces, device IDs and priorities.
  • Page 292 Web-based Configuration Guide Diagnostics 13.6.3 Active/Standby Switchover Active/Standby Switchover allow manual switching between the active and standby supervisor engines. Clicking the Switch button will restart the supervisor engine. Please exercise caution. Diagnostics 14.1 Info Center Choose Local Device > Diagnostics > Info Center .
  • Page 293 Web-based Configuration Guide Diagnostics In Info Center , you can view port traffic, VLAN information, routing information, client list, ARP list, MAC address, DHCP snooping, IP-MAC binding, IP Source Guard, and CPP statistics of the device and relevant configurations. 14.1.1 Port Info Choose Local Device >...
  • Page 294 Web-based Configuration Guide Diagnostics 14.1.2 VLAN Info Choose Local Device > Diagnostics > Info Center > VLAN Info . Display SVI port and routed port information, including the port information included in the VLAN, the port IP address, and whether the DHCP address pool is enabled. note ●...
  • Page 295 Web-based Configuration Guide Diagnostics 14.1.4 DHCP Clients Caution If the device does not support L3 functions (such as RG-NBS3100 Series and RG-NBS3200 Series Switches), this type of information is not displayed. Choose Local Device > Diagnostics > Info Center > DHCP Clients . Displays the IP address information assigned to endpoints by the device as a DHCP server.
  • Page 296 Web-based Configuration Guide Diagnostics 14.1.6 MAC Address Choose Local Device > Diagnostics > Info Center > MAC . Displays the MAC address information of the device, including the static MAC address manually configured by the user, the filtering MAC address, and the dynamic MAC address automatically learned by the device.
  • Page 297 Web-based Configuration Guide Diagnostics Displays the current configuration of the DHCP snooping function and the user information dynamically learned by the trust port. note To modify DHCP Snooping related configuration, see 14.1.8 IP-MAC Binding Choose Local Device > Diagnostics > Info Center > IP-MAC Binding . Displays the configured IP-MAC binding entries.
  • Page 298 Web-based Configuration Guide Diagnostics 14.1.9 IP Source Guard Choose Local Device > Diagnostics > Info Center > Source Guard . Displays the binding list of the IP Source Guard function. The IP Source Guard function will check the IP packets from non-DHCP trusted ports according to the list, and filter out the IP packets that are not in the binding list.
  • Page 299 Web-based Configuration Guide Diagnostics 14.2 Network Tools The Network Tools page provides three tools to detect the network status: Ping , Traceroute , and DNS Lookup . 14.2.1 Ping Choose Local Device > Diagnostics > Network Tools . The Ping command is used to detect the network connectivity. Select Ping as the diagnosis mode, enter the destination IP address or website address, configure the ping count and packet size, and click Start to test the network connectivity between the device and the IP address or website.
  • Page 300 Web-based Configuration Guide Diagnostics The traceroute function can be used to judge the transmission path of data packets during communication. Select Traceroute as the diagnosis mode, enter a destination IP address or the maximum TTL value used by the URL and traceroute , and click Start . 14.2.3 DNS Lookup Choose Local Device >...
  • Page 301 Web-based Configuration Guide Diagnostics 14.3 Fault Collection Choose Local Device > Diagnostics > Fault Collection. When an unknown fault occurs on the device, you can collect fault information by one click on this page. Click Start . The configuration files of the device will be packed into a compressed file. Download the compressed file locally and provide it to R&D personnel for fault locating.
  • Page 302 Web-based Configuration Guide Diagnostics Caution ● The SPF port does not support the function. ● If a detected port contains an uplink port, the network may be intermittently disconnected. Exercise caution when performing this operation. 14.5 System Logs Choose Local Device > Diagnostics > System Logs . System logs record device operations, operation time, and operation modules.
  • Page 303 Web-based Configuration Guide Diagnostics note Choose Network > Alerts to view the alert information of other devices in the network. Displays possible problems on the network environment to facilitate fault prevention and troubleshooting. You can view the alert occurrence time, port, alert impact, and handling suggestions, and rectify device faults according to handling suggestions.
  • Page 304 Web-based Configuration Guide Diagnostics Alert Type Description Support Description devices connected to occurs on one or more devices. the device. The number of L2 MAC address entries is The MAC address about to reach the hardware capacity limit of table is full of entries. the product.
  • Page 305 Web-based Configuration Guide System Configuration System Configuration 15.1 Setting the System Time Choose System > System Time . You can view the current system time. If the time is incorrect, check and select the local time zone. If the time zone is correct but time is still incorrect, click Edit to manually set the time. In addition, the device supports Network Time Protocol (NTP) servers.
  • Page 306 Web-based Configuration Guide System Configuration 15.2 Setting the Web Login Password Choose System > Login > Login Password . Enter the old password and new password. After saving the configuration, use the new password to log in. Caution When self-organizing network discovery is enabled, the login password of all devices in the network will be changed synchronously.
  • Page 307 Web-based Configuration Guide System Configuration 15.4 Configuring SNMP 15.4.1 Overview SNMP (Simple Network Management Protocol) is a protocol used for managing network devices. It is based on the client/server model and can remotely monitor and control network devices. SNMP consists of a management station and agents, with the management station communicating with agents through the SNMP protocol to obtain information such as device status, configuration information, performance data, etc., while also being able to configure and manage devices.
  • Page 308 Web-based Configuration Guide System Configuration When first opened, the system prompts to enable SNMPv3 by default. Click < OK >. (1) Set global configuration parameters for SNMP service. Global Configuration Description Table Table 4-1 Parameter Parameter SNMP Service Whether the SNMP service is enabled or not. SNMP protocol version number includes v1 version, v2c version, and v3 SNMP Protocol Version version.
  • Page 309 Web-based Configuration Guide System Configuration Parameter Parameter Local Port [1, 65535] Cannot contain Chinese characters, full-width characters, Device Location question marks and spaces. Character length: 1-64. Cannot contain Chinese characters, full-width characters, Contact Information question marks and spaces. Character length: 1-64. Click <Save>.
  • Page 310 Web-based Configuration Guide System Configuration (2) Configure the basic information of the view . Table 4-2 View configuration information description table parameter illustrate The name used to identify the view. View Name The length is 1 to 32 characters, and cannot contain Chinese and full-width characters.
  • Page 311 Web-based Configuration Guide System Configuration parameter illustrate OID range . Click <Add Exclusion Rule> to set up this type of view. Notice For the created view, add at least one OID rule , otherwise a warning message will appear . (3) Click <OK>...
  • Page 312 Web-based Configuration Guide System Configuration (2) Create v1/v2c users. Table 4-1 v1 / v2c user information description table parameter illustrate at least 8 characters Contains three types of uppercase letters, lowercase letters, numbers, and special characters Community Name Does not contain admin/public/private Do not contain question marks, spaces and Chinese Access rights of the community name (read-only , read-write) Read &...
  • Page 313 Web-based Configuration Guide System Configuration parameter illustrate The options in the drop-down box are configured views (default views MIB View all , none ) Notice Among v1/v2c users, the community name cannot be repeated . Click <Add View> to add a view . v3 group configuration ...
  • Page 314 Web-based Configuration Guide System Configuration Table 4-1 V3 group configuration parameters parameter illustrate rule group name 1-32 characters, a single Chinese accounted for three characters Group Name Cannot contain Chinese, full-width characters, question marks and spaces The minimum security level of the rule group ( Auth &...
  • Page 315 Web-based Configuration Guide System Configuration parameter illustrate The options in the drop-down box are configured views (default views Notification View all , none ) Notice Groups limit the minimum security level, read and write permissions and scope of users in the group. The group name cannot be repeated .
  • Page 316 Web-based Configuration Guide System Configuration (2) Set v3 user related parameters. Table 4-1 v3 user configuration parameters parameter illustrate username at least 8 characters Contains three types of uppercase letters, lowercase letters, numbers, Username and special characters Does not contain admin/public/private Does not contain question marks, spaces and Chinese Group Name user's group...
  • Page 317 Web-based Configuration Guide System Configuration parameter illustrate Authentication protocols include: MD5/SHA/SHA224/SHA256/SHA384/SHA512 Authentication password: 8~31 characters in length, cannot contain Auth Protocol Auth Chinese characters, full-width characters, question marks, and spaces , Password and must contain at least 3 types of uppercase and lowercase letters, numbers, or special characters .
  • Page 318 Web-based Configuration Guide System Configuration  configuration steps (5) On the global configuration interface, select the v2c version, and leave other settings as default. After the operation is complete, click <Save> . (2) On the view/group/group/user access control interface, click <Add> in the view list, fill in the view name and O ID in the pop-up window and click <Add inclusion rule>, and click <OK>...
  • Page 319 Web-based Configuration Guide System Configuration (3) view /group/group/user access control interface, click <Add> in the SNMP v1/v2c community name list , fill in the community name, access mode and view in the pop-up window , and click <OK> after the operation is completed.
  • Page 320 Web-based Configuration Guide System Configuration v 3 version SNMP service configuration  scenes to be used Users need to monitor and control the equipment, and use the v3 version of the third-party software to monitor and send data to the public node (1.3.6.1.2.1) node. The security level of the v3 version adopts authentication and encryption.
  • Page 321 Web-based Configuration Guide System Configuration (2) On the view/group/group/user access control interface, click <Add> in the view list, fill in the view name and OID in the pop-up window, click <Add Inclusion Rule>, and click <OK> after the operation is complete.
  • Page 322 Web-based Configuration Guide System Configuration (3) Click <Add> in the SNMP v3 group list, fill in the group name and security level in the pop-up window , the user has read and write permissions, select " public _view " for the readable view and read and write view , and set the notification view to none.
  • Page 323 Web-based Configuration Guide System Configuration (4) Click <Add> in the SNMP v3 user list , fill in the user name and group name in the pop-up window , the user security level adopts authentication and encryption mode, fill in the corresponding authentication protocol, authentication password, encryption protocol, and encryption password, and click <...
  • Page 324 Web-based Configuration Guide System Configuration 15.4.5 trap service configuration trap is a notification mechanism of the SNMP ( Simple Network Management Protocol ) protocol, which is used to report the status and events of network devices to managers, including device status reports, fault reports, performance reports, configuration reports and security management.
  • Page 325 Web-based Configuration Guide System Configuration (2) Set the trap version. The trap protocol version number includes v1 version, v2c version, and v3 version. (3) Click <OK>. After the trap service is enabled, you need to click <Save>, and the configuration of the trap protocol version number will take effect.
  • Page 326 Web-based Configuration Guide System Configuration Table 4-1 t rap v1/v2c user information description table parameter illustrate destination ip Trap peer device IP, support IPv4 / IPv6 address version number Trap version number, including v1|v2c The port number trap peer device port [1, 65535] The community name of the trap user at least 8 characters Contains three types of uppercase letters, lowercase letters, numbers,...
  • Page 327 Web-based Configuration Guide System Configuration Trap v3 is a network management mechanism based on SNMP protocol, which is used to send alarm notifications to management personnel. Unlike previous versions, trap v3 provides more secure and flexible configuration options, including authentication and encryption. Trap v3 can be customized to choose the conditions and methods to send alerts, as well as who receives alerts and how to be notified.
  • Page 328 Web-based Configuration Guide System Configuration parameter illustrate Contains three types of uppercase letters, lowercase letters, numbers, and special characters Does not contain admin/public/private Do not contain question marks, spaces and Chinese Trap user security level, including three levels of authentication and Security Level encryption, authentication and encryption, and authentication and no encryption...
  • Page 329 Web-based Configuration Guide System Configuration Table 4-1 User Requirements Description Form description item illustrate IP and port number The target host IP is "192.168.110.85" , and the port number is "166" . use version number Select v2 version Group Name / User Name Trap_public ...
  • Page 330 Web-based Configuration Guide System Configuration V3 version trap configuration  scenes to be used When the user is monitoring the device, if the device is suddenly interrupted or abnormal, the third- party monitoring software cannot detect and deal with the abnormal situation in time, and the device with the destination ip of 1 92.1 68.110.87 and the port number of 1 67 is configured , and use the more secure v3 version to send traps.
  • Page 331 Web-based Configuration Guide System Configuration (2) Click <Add> in the trap v3 user list . (3) Fill in the target host IP , port number, user name and other information, and click <OK> after the configuration is complete. 15.5 Configuration Backup and Import Choose System >...
  • Page 332 Web-based Configuration Guide System Configuration 15.6 Reset 15.6.1 Resetting the Device Choose Local Device > System > Management > Reset. Click Reset, and click OK to restore factory settings. Caution Resetting the device will clear current settings and reboot the device. If a useful configuration exists in the current system, you can export the current configuration (see 10.4) before restoring the factory settings.
  • Page 333: Rebooting The Device

    Web-based Configuration Guide System Configuration 15.6.2 Resetting the Devices in the Network Choose Network > System > Management > Reset. Select All Devices and choose whether to Unbind Account, click Reset All Devices and all devices in the current network will be restored to their factory settings. Caution Resetting the network will clear current settings of all devices in the network and reboot the devices.
  • Page 334 Web-based Configuration Guide System Configuration 15.7.2 Rebooting the Devices in the Network Choose Network > System > Reboot > Reboot. Select All Devices, and click Reboot All Device to reboot all devices in the current network. Caution It will take some time for the network to reboot, please be patient. The network operation will affect the entire network.
  • Page 335 Web-based Configuration Guide System Configuration 15.8 Configuring Scheduled Reboot Confirm that the system time is accurate. For details about how to configure the system time, see 12.1 . To avoid network interruption caused by device reboot at wrong time. Choose Self-Organizing Mode > Network > System> Scheduled Reboot. Choose Standalone Mode >...
  • Page 336: Online Upgrade

    Web-based Configuration Guide System Configuration 15.9 Upgrade Caution ● It is recommended to backup the configuration before software upgrade. ● Version upgrade will restart the device. Do not refresh or close the browser during the upgrade process. 15.9.1 Online Upgrade Choose Local Device >...
  • Page 337: Local Upgrade

    Web-based Configuration Guide System Configuration 15.9.2 Local Upgrade Choose Local Device > System > Upgrade > Local Upgrade. Displays the device model and current software version. You can choose whether to keep the configuration upgrade or not. Click Browse to select the local software installation package, click Upload to upload the installation package and upgrade.
  • Page 338 Web-based Configuration Guide System Configuration 15.11 Switching the System Language Click in the upper-right corner of the Web page. Click a required language to switch the system language.
  • Page 339: Wi-Fi Network Setup

    Web-based Configuration Guide Wi-Fi Network Setup Wi-Fi Network Setup Note ● To manage other devices in the self-organizing network, enable the self-organizing network discovery function. (See Switching the Work Mode)The wireless settings are synchronized to all wireless devices in the network by default. You can configure groups to limit the device scope under wireless management. For details, see 16.1 ●...
  • Page 340 Web-based Configuration Guide Wi-Fi Network Setup name or click to delete the group. You cannot modify the name of the default group or delete the default group. (3) Click a group name in the left. All APs in the group are displayed. One AP can belong to only one group. By default, all APs belong to the default group.
  • Page 341 Web-based Configuration Guide Wi-Fi Network Setup 16.2 Configuring Wi-Fi Choose Network > Wi-Fi > Wi-Fi Settings. Enter the Wi-Fi name and Wi-Fi password, select the frequency band used by the Wi-Fi signal, and click Save. Click Advanced Settings to configure more Wi-Fi parameters. Caution Modification will cause restart of the wireless configuration, resulting in logout of connected clients.
  • Page 342 Web-based Configuration Guide Wi-Fi Network Setup Parameter Description Chinese, this item will be displayed. You can select UTF-8 or GBK. Set the band used by the Wi-Fi signal. The options are 2.4 GHz and 5 GHz. The 5 GHz band provides faster network transmission rate and less interference than the 2.4 GHz band, but is inferior to the 2.4 GHz band in terms of signal coverage range Band and wall penetration performance.
  • Page 343 Web-based Configuration Guide Wi-Fi Network Setup Parameter Description support 802.11ax to experience high-speed network access empowered by Wi-Fi 6. If clients do not support Wi-Fi 6, disable this function. 16.3 Configuring Guest Wi-Fi Choose Network > Wi-Fi > Guest Wi-Fi. Guest Wi-Fi is a wireless network provided for guests, and is disabled by default.
  • Page 344 Web-based Configuration Guide Wi-Fi Network Setup 16.4 Adding a Wi-Fi Choose Network > Wi-Fi > Wi-Fi List. Click Add, enter the Wi-Fi name and password, and click OK to create a Wi-Fi. Click Expand to configure more Wi-Fi parameters. For details, see 16.2 .
  • Page 345 Web-based Configuration Guide Wi-Fi Network Setup 16.5 Healthy Mode Choose Network > Wi-Fi > Healthy Mode. Turn on healthy mode and select a wireless schedule for the mode. After the healthy mode is enabled, the RF transmit power and Wi-Fi coverage range of the wireless device are reduced in the schedule.
  • Page 346 Web-based Configuration Guide Wi-Fi Network Setup The wireless device can detect the surrounding wireless environment upon power-on and select proper configuration. However, network freezing caused by wireless environment changes cannot be prevented. You can analyze the wireless environment around the APs and routers and manually select proper parameters. Caution Modification will cause restart of the wireless configuration, resulting in logout of connected clients.
  • Page 347 Web-based Configuration Guide Wi-Fi Network Setup Parameter Description If a large number of users access the AP or router, the wireless network performance of the AP or router may be degraded, affecting users' Internet access experience. After you set this parameter, new user Client Count Limit access is prohibited when the number of access users reaches the specified value.
  • Page 348 Web-based Configuration Guide Wi-Fi Network Setup Select the blacklist or whitelist mode and click Add to configure a blacklist or whitelist client. In the Add window, enter the MAC address and remark of the target client and click OK. If a client is already associated with the access point, its MAC address will pop up automatically.
  • Page 349 Web-based Configuration Guide Wi-Fi Network Setup 16.7.3 Configuring an SSID-based Blacklist/Whitelist Choose Clients > Blacklist/Whitelist > SSID-Based Blacklist/Whitelist. Select a target Wi-Fi network from the left column, select the blacklist or whitelist mode, and click Add to configure a blacklist or whitelist client. The SSID-based blacklist and whitelist will restrict the client access to the specified Wi-Fi.
  • Page 350 Web-based Configuration Guide Wi-Fi Network Setup Caution Clients may be kicked offline during optimization and the configuration cannot be rolled back after optimization starts. Exercise caution when performing this operation. After optimization starts, please wait patiently until optimization is complete. After optimization ends, click Cancel Optimization to restore optimized RF parameters to default values.
  • Page 351 Web-based Configuration Guide Wi-Fi Network Setup 16.9 Enabling the Reyee Mesh Function Choose Network > Reyee Mesh. After the Reyee Mesh function is enabled, the devices that support EasyLink can be paired to form a mesh network. Devices can automatically search for new routers around them and pair with each other via the Mesh button, or log in to the router management page to search and select a new router for pairing.
  • Page 352 Web-based Configuration Guide Wi-Fi Network Setup Choose Network > LAN Ports. Enter the VLAN ID and click Save to configure the VLAN, to which the AP wired ports belong. If the VLAN ID is null, the wired ports and WAN port belong to the same VLAN. In self-organizing network mode, the AP wired port configuration applies to all APs having wired LAN ports on the current network.
  • Page 353 Web-based Configuration Guide FAQs FAQs 17.1 Failing to log in to the Eweb Management System (1) Confirm that the network cable is correctly connected to the port of the device, and the corresponding indicator is flashing or steady on. (2) Before accessing the Web management system, it is recommended to set the PC to use a static IP address and set the IP of the computer to be in the same network segment as the IP of the device (the default IP of the device is 10.44.77.200 and the subnet mask is 255.255.255.0) For example, set the IP address of the computer to10.44.77.100 and the subnet mask to 255.255.255.0.

Table of Contents