1. Introduction 1.1 Product Introduction This series supports IPv4 / IPv6 double stack platform, and supports a variety of senior management functions, including POE management, MAC Table, VLANs, Port Isolation, Loop Protection, IGMP Snooping, MLD Snooping, ERPS, DHCP client, DHCP Snooping, STP/RSTP/MSTP, 802.1 x, QoS, port mirror, LLDP, static routing and NTP etc., 128 static routing and basic QINQ, to provide users with the perfect solution;...
• IEEE802.1Q VLAN, IEEE802.1ad QINQ • 802.1x authentication to port and MAC • Static routing L3 switching technology • Operation temperature range: -40℃~75℃ • Storage temperature range: -40℃~85℃ 2. Web Configuration Open installed web browser on your PC, input the switch’s IP address like http://xxx.xxx.xxx.xxx, then open that URL to login web management.
2.1 Device Menu Information 2.1.1 Device > Basic After successfully logging in to the page, the web page directly jumps to the system information page, and you can also select the "Device Overview" or "Device → Basic Information" path to view the switch system information.
MAC Address Aging Time Configure the aging time of the dynamic MAC address entries. The default is 300 seconds. 2.1.2 Device > Maintenance Equipment maintenance includes equipment software update, reboot, and fault maintenance. Software Update: Page wizard: Device → Maintenance → Software Update, the page is as shown in the figure below. Upgrade the switch software to the latest version, which will make your device more stable and more functional (click the <Browse...>...
Before restarting the device, please save the current configuration. Otherwise, after restarting, unsaved configuration information will be lost. Fault Maintenance: Page Wizard: Device → Equipment Maintenance → Fault Maintenance, the page is shown below. Select the <Fault Collecting> button, and all fault maintenance information will be backed up to your 2.1.3 Device >...
Page 10
The meaning of the key items on the page is shown in the table below. Operation Explanation Refresh Rate Control the refresh rate of the page through the selection of “Refresh Rate” drop down box Query Item Query the log information you need to follow through the selection of the “Query Item”...
The meaning of the key items on the page is shown in the table below. Operation Explanation Log Enables Open / close the information center. By default, the information center is turned on Send Log Level Only log information no higher than the specified level can be sent to the log host Log Host IP Set the IP address of the log host...
device is automatically restarted, the configuration takes effect) After you have configured all items on the configuration page, be sure to save the configuration, otherwise, the unsaved configuration information will be lost due to restarting and other operations. Restore Default Configuration: During the process of restoring the factory default configuration, please do not perform other operations on the device, otherwise, the device may not work properly The meaning of the key items on the page is shown in the table below.
Page 13
Configure the properties of the specified ports in batches (click the <Batch Configuration> button on the main page to enter the corresponding configuration page). Configure the properties of a single port (click the entry corresponding to the port on the main page to enter the corresponding configuration page).
Page 14
The meaning of the key items on the page is shown in the table below. Operation Explanation Link status The actual working speed and mode of the port, if not connected, it will display as "--". Rate Configure port rate. There are three situations in the duplex mode of the port: •...
temporarily stop sending packets or slow down the rate of sending packets, thereby avoiding the occurrence of packet loss and ensuring. The normal operation of the network business. By default, port flow control is disabled. Through the port isolation feature, you can add the ports that need to be controlled to an isolation group ("open"...
The meaning of the key items on the page is shown in the table below. Operation Explanation Monitoring port Select the monitoring port, "no mirror" indicates that the port mirroring function of the switch is disabled Select the mirrored port, "no mirror" indicates that the port is not mirrored The meaning of the mirroring direction is as follows:...
PoE Setup: Page Wizard: Device → PoE → PoE Setup. Allows you to set the PoE status and priority of single or multiple ports. 2.1.8 Device > Users Page Wizard: Device → Users. On this page, you can configure the user timeout time, turn on/off the WEB authentication function, and turn on/off the WEB verification code function.
Page 18
Steps to add a local user: Click the <New> button on the main page, set the new user-related information on the "Add Local User" page, and click the <OK> button to take effect. Steps to modify local users: Click on the local user entry to be modified on the main page to enter the "Modify Local User" page for modification.
when logging in Turn on/off the WEB login verification code function. After opening, you need to enter the WEB login verification code verification code when logging in to WEB Username Set the local username to be added Confirm password Set local user password State Set the status of local users Rank...
have a short circuit. • When the cable status is "normal", the length of the connecting cable is not reflected in the displayed information. • When the cable status is "short circuit or open circuit", the length in the Length displayed information refers to the length from the port to the abnormal position.
Page 21
The meaning of the key items on the page is shown in the table below. Operation Explanation You can select the refresh rate to automatically Refresh rate update the statistics of the current page regularly. Statistics reset You can click this button to clear the statistics of the current page.
Page 22
frame length less than 64 bytes. Giants error package Number of packets with correct CRC and data frame length greater than 1518 bytes. Number of packets with CRC error and data CRC error packet frame length between 64 and 1518 bytes. The length of the data frame is between 64 and 1518 bytes, and the number of FCS (Frame Frame error packet...
Page 23
Aborts error package The total number of packets that failed to send, that is, the packets have been sent, but due to various reasons (such as conflict). Number of packets delayed by the first Deferred error packet transmission request due to a busy network. Number of conflicting packets generated by the Collisions error package port during packet transmission.
Page 24
The flow monitoring histogram page can realize the following functions: • Monitoring port traffic through rate histogram. • Select the upper limit of the histogram in the drop-down box of “Traffic Upper Limit”, you can observe the proportion of each port's receive/send rate relative to the upper limit. When the proportion exceeds 95%, the histogram border will have a red warning.
The flow monitoring line chart page can realize the following functions: • Monitor port traffic through rate line chart. • Click the port number in the histogram or select the specified port in the "Port Number" drop- down box, you can observe the rate change of the port in real-time. •...
2.1.12 Device > SNMP Setup: Page Wizard: Device → SNMP → Setup. On this page you can configure SNMP agent enable, SNMP version, local engine ID, physical location information, contact information. Community: Page Wizard: Device → SNMP → Community. On this page you can display or create a new SNMP community.
Page 27
Group: Page Wizard: Device → SNMP → Group. On this page you can display or create a new SNMP group. Click "New" to enter the new SNMP group page, the user can configure the group name, security level and view permissions of the newly created group. User: Page Wizard: Device →...
Trap: Page Wizard: Device → SNMP → Trap. On this page you can configure to turn on/off the SNMP trap function, display trap host information, and create a new trap host. Click "New" to enter the new Trap host page, the user can configure the IP address, security name, UDP port, security model, the security level of the new Trap host.
Page 29
to take effect), and create a new Access port (Click on the main page Select the port to be added to the VLAN, and click the <OK> button to take effect). Trunk: Page Wizard: Network → VLAN → Trunk. Displays the current port information. Steps to create a new trunk port: Click the <New>...
Page 30
Steps to create a new Hybrid port: Click the <New> button on the main page to enter the corresponding page. Specify the Hybrid port, and configure the PVID and port to pass through the VLAN. Click the <OK> button to take effect. Steps to modify Hybrid port: Click the entry corresponding to the port on the main page to enter the corresponding page.
• PVID: number, the value range is 1-4094. • Tagged VLAN: number, the value range is 1-4094, you can enter multiple values, separated by commas. A short line can be used to indicate a range. • Untagged VLAN: number, the value range is 1-4094, you can enter multiple values, separated by commas.
Modify: Page Wizard: Network → VLAN Interface → Modify. The user can modify the three-layer VLAN interface through this page and can modify the IP address of the interface. If it is a static IP acquisition method, the interface address information can also be modified. Remove: Page Wizard: Network →...
Page 33
Click the <New> button on the protocol VLAN display page to create a protocol VLAN: The meaning of the key items on the page is shown in the table below. Operation Explanation VLAN ID VLAN ID of the newly created protocol VLAN Template ID Template ID of the protocol VLAN Protocol type...
2.2.4 Network > DHCP Snooping DHCP Snooping technology is a DHCP security feature. Untrusted DHCP information is filtered by establishing and maintaining a DHCP Snooping binding table. This information refers to DHCP information from untrusted areas. The DHCP Snooping binding table contains information such as the MAC address, IP address, lease period, and VLAN-ID interface of users in the untrusted zone.
Page 35
DHCP Snooping Port: Page Wizard: Network → DHCP Snooping Port. 1. Configure a single port: Click the corresponding entry in the port trust status bar on the page. Enter the corresponding configuration page and select the trust status of the port. 2.
In the Select Port column, you can select ports in batches. DHCP Snooping User: Page Wizard: Network → DHCP Snooping User. On this page, you can view the user MAC address, IP address, VLAN-ID interface, and other information of the untrusted zone in the DHCP Snooping binding table.
Page 37
Steps to add a new MAC address entry: Click the <Add> button on the main page, configure the relevant parameters of the MAC address entry on the page that is jumped to, and click the <OK> button to take effect. Modify static or blackhole MAC address entries (click the corresponding MAC address entry on the main page to modify the entry), dynamic MAC address entries cannot be modified.
Page 38
The meaning of the key items on the page is shown in the table below. Operation Explanation MAC address query You can enter MAC and VLAN ID for query and display, in which MAC address must be entered. Display the MAC address and its corresponding VLAN in the switch.
Page 39
• Bind the unbound MAC address entries under the port (select the corresponding port number, and select the unbound MAC address entries under the port, click the <Binding> button to take effect). Port MAC Filtering: Page Wizard: Network → MAC Filter → Port MAC Filtering. Displays the status of the MAC address filter function of each port.
Page 40
2. Add the static MAC address entry of the specified port, click the entry corresponding to the port on the main page, enter the corresponding parameters in the "MAC address" and "VLAN" text boxes, and click the <Add> button to take effect. MAC Attack Prevention: Page Wizard: Network →...
Batch configure the number of MAC addresses that can be learned by the specified port. Click the <Batch Configuration> button on the main page to enter the corresponding page. 2.2.6 Network > Link Aggregation Page Wizard: Network → Link Aggregation. You can view the current link aggregation status and configure the aggregation algorithm on this page.
Page 42
The meaning of the key items on the page is shown in the table below. Operation Explanation Select the aggregation algorithm of the switch: Based on source MAC address: indicates that each member port in the aggregation group performs load sharing based on the source MAC address Based on destination MAC address: indicates that each member port in the aggregation group...
• Ports configured with MAC address learning limit 2.2.7 Network > LACP Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high-speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network.
2.2.8 Network > LLDP Global Summary: Page Wizard: Network → LLDP → Global Summary. On this page, you can view added neighbor devices, deleted neighbor devices, dropped LLDP packets, and aged neighbor devices. Port Summary: Page Wizard: Network → LLDP → Port Summary. On this page, you can select a port such as port 2 and the LLDP packet statistics of port 2 will be displayed in the Summary column.
Page 45
The meaning of the key items on the page is shown in the table below. Operation Explanation Select disabled in the drop-down box to turn off LLDP the LLDP function, select enabled even if the LLDP function is enabled. Transmit LLDP packet transmission interval.
Page 46
The meaning of the key items on the page is shown in the table below. Operation Explanation LLDP Select disabled in the drop-down box to turn off the LLDP function, select enabled even if the LLDP function is enabled. Port LLDP working mode: •...
and status control. All LLDP-MED Check to select all options under LLDP MED, including performance, network strategy, power over Ethernet, and equipment MED asset information. After configuring the above information, select the <Apply> button to apply. 2.2.9 Network > IGMP Snooping The Layer 2 device running IGMP Snooping analyzes the received IGMP messages to establish a mapping relationship between the port and the MAC multicast address, and forwards the multicast data based on this mapping relationship.
Advanced: Page Wizard: Network → IGMP Snooping → Advanced. Single port configuration: click the entry corresponding to the port on the main page to enter the corresponding page, open/close the port and leave quickly, and configure the maximum number of multicast groups (the maximum number of multicast groups is 256).
multicast VLAN containing the aggregation interface list to the list of optional aggregation interfaces. Remove from multicast VLAN. • The specified VLAN must exist, otherwise the multicast VLAN cannot be created. • Only the aggregated interfaces that have been created can become optional aggregation interfaces.
Create: Page Wizard: Network → IPv4 Routing → Create. Users can create static routes via this page. After inputting the information, click on apply to save the settings. Remove: Page Wizard: Network → IPv4 Routing → Remove. Users can remove configured static route information via this page.
Page 51
Global: Page Wizard: Network → MSTP → Global. This page can be set to turn on/off the MSTP function and related parameters. Port Setup: Page Wizard: Network → MSTP → Port Setup. this page can be configured to open/close the port MSTP function and related attributes of MSTP under the port, as shown in the following figure: 51 | P a g e...
Page 52
Instance Info: Page Wizard: Network → MSTP → Instance Info. This page can display MSTP instance information. Domain: Page Wizard: Network → MSTP → Domain. this page can display MSTP domain configuration effective information. Click the <Modify> button to modify the domain configuration information, and the modified domain configuration information will take effect immediately.
2.2.13 Network > DHCP DHCP Settings: Page Wizard: Network → DHCP → DHCP Settings. This page can globally turn on/off the DHCP server function, and display address pool information. Click the <New> button on the page to create a new DHCP server address pool. Click the corresponding address pool entry on the DHCP setting page to enter the corresponding address pool modification page.
DHCP Static Table: Page Wizard: Network → DHCP → DHCP Static Table. This page can display the currently configured DHCP client static table entries, or click the <New> button to add a DHCP client static list. DHCP Customer List: Page Wizard: Network → DHCP → DHCP Customer List. This page can display the list of currently online DHCP clients.
Page 55
Page Wizard: Network → Telnet → VTY configuration. In the VTY configuration page, you can select Telnet authentication mode, which is none, password, and scheme. You can set and change the password when you select a password or scheme mode. •...
2.3 Authentication Menu Information 2.3.1 Authen > 802.1x 802.1x Port Setting: Page Wizard: Authen → 802.1x → Port Setting. This page shows the global on/off status of 802.1x and the configuration information of 802.1x under the port. Click the corresponding port entry to configure the 802.1x function of a single port, and click the <Batch Configuration>...
802.1x Global Setting: Page Wizard: Authen → 802.1x → Global Setting. This page can configure 802.1x global function. 2.3.2 Authen > AAA AAA is short for Authentication, Authorization, and Accounting (authentication, authorization, and accounting). It is a management mechanism for network security and provides three security functions: authentication, authorization, and accounting.
Local User Settings: Page Wizard: Authen → AAA → Local User Settings. This page is mainly used to configure local users (Lan-access users or login users) when using the local authentication scheme. After clicking <Local User Settings>, they actually jump to the "Device -> User Management" page for configuration. For details, please refer to the "Device ->...
Domain Configuration: Page Wizard: Authen → Radius → Domain Configuration. This page is mainly used to configure the domain in the Radius scheme. Click the <New> button on the page to create a new domain. 2.4 Security Menu Information Enable the IP filter function on the port connected to the user side of the device, which can filter the packets received on the port to prevent illegal packets from passing through the port, thereby limiting the illegal use of network resources (such as illegal hosts spoofing legitimate users IP access network), which improves port security.
Page 60
The meaning of the key items in the TLV setting page is shown in the table below. Operation Explanation Available types are • Source IP address: just enter the IP address and port number. • Source MAC address: just enter the MAC address and port number.
Port Filter: Page Wizard: Security → IP Filter → Port Filter. On this page, you can choose to turn on/off the port IP filtering function and select off/on in the drop-down box of IP filtering. You can select <All On> or <All Off>...
Page 62
Port Setup: Page Wizard: Security → ARP Defense → Port Setup. On this page, you can configure whether the port is a trusted port for ARP packets. User Rules: Page Wizard: Security → ARP Defense → User Rules. On this page, you can view and add ARP inspection user rules.
The meaning of the key items in the TLV setting page is shown in the table below. Operation Explanation User rule ID, value range 0~255 Behavior Rule behavior, the action to be performed when the rule is matched Source IP address Source IP address of ARP protocol Source MAC address Source MAC address of ARP protocol...
Page 64
Port Detection: Page Wizard: Security → Loopback Detection → Port Detection. This page is used to configure the port open/close loop detection function in batches. VLAN Detection: Page Wizard: Security → Loopback Detection → VLAN Detection. This page can configure the port opening/closing by VLAN detection function in batches.
has a loop and the current status of the port through the port with the loop. 2.5 QoS Menu Information 2.5.1 QoS > ACL IPv4 ACL (Access Control List, access control list) is a collection of one or more rules used to identify the packet flow.
Page 66
creating it. Once the ACL is created, users are not allowed to set names, modify or delete their original names. After the ACL is created, the user can specify the ACL by specifying the number or name in order to operate it. Advanced Configuration: Page Wizard: QoS →...
Page 67
does not have any By default, there are no rule [ rule-id ] { deny | permit }{gre| rules in the IPv4 icmp| igmp| ip| ipinip| ospf| tcp| advanced ACL udp} { {destination { dest-addr dest wildcard }|dscpdscp|precedencepr Create a rule ecedence|sourcesour-addr sour- wildcard | source-portoperator port1 [ port2 ] | destination-portoperator...
2.5.2 QoS > ACL IPv6 ACL Display: Page Wizard: QoS → ACL IPV6 → ACL Display. On this page, users are able to select the access control list to view their details. Create ACL: Page Wizard: QoS → ACL IPV6 → Create ACL. When creating an ACL, the user must assign a number to it.
Page 69
codes, etc.) to formulate rules to match IPv6 packets. Users can use IPv6 advanced ACL to formulate more accurate, rich, and flexible rules than IPv6 basic ACL. Operation Command Explanation Enter superuser view super ----- Create an IPv6 advanced Aclipv6 number num-adv-v6 [match- Required, by default, no ACL and enter IPv6 order {auto | config}]...
selecting the desired one through the drop-down menu. 2.5.3 QoS > ACL Policy Display Port ACL Binding: Page Wizard: QoS → ACL Policy → Display Port ACL Binding. View the ACL IPv4 and IPv6 policies for each port in detail. Create Port ACL Binding: Page Wizard: QoS →...
Page Wizard: QoS → ACL Policy → Delete Port ACL Binding. Select individual or multiple bind ports, and delete the ACL binding via this page. 2.5.4 QoS > ACL Resource Page Wizard: QoS → ACL Resources. View the type, total, reserved, used, and remaining ACL resources via this page.
token bucket. When a token is stored in the token bucket, the packet can be sent according to the token; otherwise, the packet will enter the port cache for congestion management. In this way, you can control the packet flow through the port. Configure the inbound/outbound port speed limit of a single port: click the entry corresponding to the port on the main page to enter the corresponding page.
Page 73
The meaning of the key items on the page is shown in the table below. Operation Explanation Choose the priority mode you want to trust: • COS: Put the packet into the port output queue of the corresponding priority according to the 802.1p priority. •...
implement WRR scheduling for the remaining 3 queues. Weights Configure the priority weight of each queue. 3. Appendix 1. Why can’t the bandwidth be increased after trunking is configured? A: Please check if the information of trunking set port is as same, including rate, duplex mode, and VLAN etc.
and Labor (1) Year”, which starts with the date of original purchase (“Limited Warranty period”), at its option either (a) repair your product with new or refurbished parts, or (b) replace it with a new or a refurbished product. The decision to repair or replace will be made by the warrantor. During the “Labor”...
Page 76
The items listed are not exclusive, but are for illustration only.) PARTS AND SERVICE, WHICH ARE NOT COVERED BY THIS LIMITED WARRANTY, ARE YOUR RESPONSIBILITY. 76 | P a g e...
Page 77
WWW.JTECHDIGITAL.COM PUBLISHED BY J-TECH DIGITAL INC. 9807 EMILY LANE STAFFORD, TX 77477 TEL: 1-888-610-2818 E-MAIL: SUPPORT@JTECHDIGITAL.COM 77 | P a g e...
Need help?
Do you have a question about the JTD-2887 and is the answer not in the manual?
Questions and answers