CP Plus CP-ANW-GPM8F2-N12 User Manual

Managed network switch

Advertisement

Quick Links

Managed Network Switch
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CP-ANW-GPM8F2-N12 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for CP Plus CP-ANW-GPM8F2-N12

  • Page 1 Managed Network Switch User Manual...
  • Page 2 Introduction: This manual is provided for CP PLUS manageable network switch, which includes the feature and functions of the switch. Please read this manual before managing the device. Suitable users: This manual is applicable to network administrators of similar IT and network technologies.
  • Page 3: Table Of Contents

    Part 1: Product Introduction ..............................5 1.1 Product characteristic ..............................5 1.2 Specifications ................................5 Part 2: Installation..................................6 2.1 Precautions .................................. 6 2.2 Installation on table or shelf ............................6 2.3 Rack mounting ................................6 2.4 AC power supply ................................. 6 Part 3: Login ....................................
  • Page 4 9.1.3 Basic concept of STP ............................41 9.1.4 Basic principle of STP ............................42 9.2 MSTP Introduction ..............................47 9.2.1 MSTP Background ............................47 9.2.2 Basic Concept of MSTP ........................... 48 9.2.3 Basic principle of MSTP........................... 51 9.2.4 Realization of MSTP on equipment ........................ 51 9.3 Protocol ..................................
  • Page 5: Part 1: Product Introduction

    Part 1: Product Introduction 1.1 Product characteristic ➢ Support link aggregation ➢ 802.1Q VLAN Support IEEE 802.1Q VLAN ➢ Support rate limitation and port statistics ➢ Support port mirroring ➢ Support QoS, provide strict priority and weighted priority ➢ Support MAC address binding ➢...
  • Page 6: Part 2: Installation

    Part 2: Installation 2.1 Precautions Make sure that the surface on which the device will be placed is safe enough to prevent it from becoming unstable. Make sure that the power output is 1.8m away from the device. Make sure that the device is connected to the power supply with AC power cord.
  • Page 7: Computer Configuration

    3.1 Computer Configuration The managed switch can be managed by web page. The flexible and friendly interface can make it easy to manage the switch. Web pages may display differently in different operating systems. 3.1.1 Windows XP Configure your computer as follows: 1.
  • Page 8 Figure 3-1-3 4. Right click on the adapter icon and select “Properties” Figure 3-1-4 5. Double click on “Internet protocol (TCP/IP)” Figure 3-1-5...
  • Page 9 6. Use the following IP address: input IP 192.168.1. *** (1 <*** <255, *** is not 11, because the default IP of the switch is 192.168.1.1), Subnet mask: 255.255.255.0. The default gateway and DNS server are optional, and then click “OK” to close the Internet TCP / IP properties window.
  • Page 10 Figure 3-1-8 2. Click “Network and Internet Connection” Figure 3-1-9 3. Click “Change Adapter settings” Figure 3-1-10...
  • Page 11 4. Right click on the adapter icon and select “Properties” Figure 3-1-11 5. Double click on “Internet protocol (TCP/IP)” Figure 3-1-12 5. Use the following IP address: input IP 192.168.1. *** (1 <*** <255, *** is not 11, because the default IP of the switch is 192.168.2.11), Subnet mask: 255.255.255.0.
  • Page 12: Connection Check

    Figure 3-1-13 6. Click “OK” to close the local connection properties window. Figure 3-1-14 3.2 Connection Check After setting the TCP / IP protocol, you can use the ping command to check whether the PC can communicate with the host computer.
  • Page 13: Login

    Figure 3-2-1 The connection with PC is successful If the connection with PC is broken, the command line window will show the following: Figure 3-2-2 Please make sure the computer network setting is correct and the network connection is normal.. Note: Before entering the above command, please use twisted pair to connect the switch port and the network card of your PC.
  • Page 14: Function Overview

    Figure 3-3-2 Notice: If you successfully log in the switch web page, the page will be refreshed in real time to check port status and other information dynamically. 3.4 Function Overview This switch owns rich features, including status,Network,port,VLAN,STP,Discovery,Multicast,Security, ACL,QoS,Diagnostics,Management setting. The following part will introduce the above functions. Figure 3-4-1...
  • Page 15: Part 4: System

    Part 4: System 4.1 Homepage After logging in to the switch, you will see the home page as shown in the following figure, which includes three parts: Figure 4-1-1 Part I: A list of port Led Indicator is at the top of the page showing virtual port prompts, in which the green and gray indicate that the port is connected and unconnected respectively.
  • Page 16: System Information

    The system information menu displays some information about the system, such as type, system name, MAC address of the switch, IP address, current time and CPU utilization. 4.3 System information Figure 4-3-1 On this page, you can read the port number of the accessed web page, the running time of the switch system, the current system time of the switch, and the enabled services, such as Telnet, SSH, HTTP, HTTPS and SNMP.
  • Page 17 Figure 4-4-1 Figure 4-4-2 You can also select the number of displayed entries. If you select “all”, it means to display all entries on your selected page. If you select 10, it means to display 10 log information entries on one page, and the remaining entries will be displayed in the following pages.
  • Page 18: Port

    4.5 port This is used for checking counter information of the port. Figure 4-5-1 4.6 Link Aggregation Management Display of Link aggregation: Figure 4-6-1 4.7 MAC Address Table Figure 4-7-1...
  • Page 19: Part 5: Network

    Part 5: Network 5.1 IP Address Figure 5-1-1 In this page, you can modify the IPv4 address, subnet mask, gateway and DNS server of the switch, as well as configure DCHP to obtain IP address. At the same time, the IPv6 address of the switch can also be configured, either automatically or by DHCP acquisition, or static configuration, which can meet user’s requirements.
  • Page 20: System Time

    5.2 System Time Figure 5-2-1 The system time of the switch can be obtained from SNTP, the computer accessing the switch, and by manual configuration. If the time is obtained by SNTP: Figure 5-2-2 You can directly fill in the IPv4 address of the time server and 123 of the default port.
  • Page 21: Part 6: Network

    Part 6: Network 6.1 Port Setting Figure 6-1-1 1. Select the port required for configuration, such as port 8-12. Figure 6-1-2 2. Click “Edit” on the lower left. 3. Set the management state, speed, duplex, and flow control.
  • Page 22: Error Disabled

    Figure 6-1-3 Management state: Enable/Disable. Select “Enable” means that this port can be used normally. Unselect “Enable” means that this port cannot be used normally. Speed: Set auto-negotiation default (5 types), as well as enforcing mode (3 types) Duplex: auto, duplex, and half duplex Flow control: auto-negotiation, enable, and disable.
  • Page 23: Link Aggregation

    Figure 6-2-1 From the list, we can find that common reasons include UDLD, bpduguard, port security and loop. The specific reason for err disable of the current interface can be viewed. The system will attempt to restore the interface which is set as err disable after a period of time, 300 seconds by default. However, if the source of err disable is not solved fundamentally, the interface will be set as err disable again after restoring.
  • Page 24 bandwidth by performing output / input load allocation between member ports. Link aggregation group also allows port redundancy to provide connection reliability. LACP introduction Link aggregation control protocol (LACP) is designed to perform dynamic link aggregation and disaggregation. This protocol is based on IEEE802.3ad and adopts the combination of link aggregation control protocol data units (LACPDUs) and peer-to-peer enabled LACP ports.
  • Page 25: Group

    destination will be forwarded from a same port. And the messages to different destinations may be forwarded from different aggregation ports. Many workstations will connect with the switch which will connect a router through an aggregation port. The link aggregation used on the switch is based on the source load balancing to ensure that the switch can use the router bandwidth effectively and distribute the communication through the physical connection with the workstation.
  • Page 26: Port Setting

    Figure 6-3-2 6.3.2 Port Setting Aggregation ports properties setting: Figure 6-3-3...
  • Page 27: Lacp

    Set the speed, suplex and flow control of the aggregation port. Figure 6-3-4 6.3.3 LACP Set the system priority of LACP and ports. The value has been configured by default, and users can modify it according to their own needs. Figure 6-3-5...
  • Page 28: Eee

    6.4 EEE Energy efficient Ethernet, for short EEE, refers to “energy efficient Ethernet technology” with the function to automatically reduce the power consumption when the network card has no traffic. Only when the network utilization is high, the maximum power consumption can be achieved. Figure 6-4 By default, EEE of the port is off.
  • Page 29: Part 7: Vlan

    more extraordinary significance. Figure 6-5 As long as jumbo frame is turned on, it can support the transmission speed up to 10K. Part 7: VLAN 7.1 VLAN This part is mainly about 802.1Q-VLAN VLAN introduction The traditional Ethernet is a broadcast network. All hosts are in the same broadcast domain and communicate with each other through hub or switch.
  • Page 30: Create Vlan

    The above settings may cause the following network problems ⚫ A large number of broadcast packets or unknown unicast packets may exist in the network, which will waste network resources. ⚫ A host will receive many messages that are not intended for the host itself, will will lead to serious potential security problems.
  • Page 31 Figure 7-1-1 The total number of VLAN is 1-4094. Select the VLAN number in the left box and add it in the right one to join in and create VLAN 1 by default. Figure 7-1-2 As above figure, add VLAN 2-7 in this way.
  • Page 32: Vlan Configuration

    7.1.2 VLAN Configuration Configure 802.1Q_VLAN for the switch. Figure 7-1-3 Default: default means VLAN 1. It is clear that all ports belong to VLAN 1 and they are untagged, PVID=1. Figure 7-1-4...
  • Page 33: Membership

    If VLAN 2 is selected for VLAN, there is no member by default, so it can be set manually. As shown in the above figure, port 2-3 is added to the tagged member of VLAN 2, and port 4-5 is added to the untagged member of VLAN 2.
  • Page 34: Port Setting

    7.1.4 Port Setting Configure the port mode, entrance detection function and TPID function. There are three VLAN modes: Acess, Trunk, Hybird Access: connect to terminal devices (such as PC, camera, set top box, etc.) and set PVID directly. Trunk: the port connected between switches. Generally it needs to set many VLANs to perform tagged. Hybrid: mixed mode.
  • Page 35: Part 8: Mac Address Table

    When setting PVID value, VLAN must be added before setting. Vlan2-7 has been added in Chapter 7.1.1, so you can set 5. But if the value is set as 9, the system will report an error and the setting will be unsuccessful. In normal conditions, the entrance detection filtering will not set, neither the TPID.
  • Page 36: Dynamic Address

    Classification and features of MAC address table entries. According to their own features and configuration methods, MAC address table entries can be divided into three categories: ⚫ Static MAC address table entry: also known as "permanent address", which is added and deleted manually by user and will not age with time.
  • Page 37 According to the actual condition, the administrator can add, modify or delete the entries in the MAC address forwarding table manually. He can delete all MAC address table entries related to a certain port, or choose to delete certain types of MAC address table entries, such as dynamic table entries and static table entries.
  • Page 38 Figure 8-2-2 After the adding process, the page is shown as the following figure: Figure 8-2-3 The results of binding configuration are as follows: 1. This MAC address can only communicate on port GE 9. If this MAC is connected to other port, it can not receive any...
  • Page 39: Mac Address Filtering

    message in which the destination address is this MAC. If the destination address received by this switch is the bound MAC address, this switch will only forward to this bound port. 2. After configuring the static MAC address, the address table entry that originally existed in the dynamic MAC is deleted. 8.3 MAC address filtering If the MAC address filtering table entry is set in this switch, if the message with this MAC address whether in source MAC or destination MAC, it will be discarded as long as the switch receives it.
  • Page 40: Part 9: Spanning Tree

    device may save many outdated MAC address table entries, thus exhaust the MAC address table resources, which will cause the device unable to update MAC address table according to the changes of the network. If the aging time configured by user is too short, the device may delete the effective MAC address table entries, which may cause the device to broadcast a large number of data packets and affect its operation performance.
  • Page 41: Basic Concept Of Stp

    topology changes to related equipment. 9.1.3 Basic concept of STP (1) Root bridge: The tree network structure must have root, so STP introduces the concept of Root Bridge. There is only one root bridge in the whole network, and the root bridge will change with the network topology, so the root bridge is not fixed.
  • Page 42: Basic Principle Of Stp

    (4) Path cost Path cost is the reference value of STP protocol for link selection. STP calculates the path cost to select the stronger link and block the redundant link, so as to prune the network into a tree network structure without loop. 9.1.4 Basic principle of STP STP can determine the network topology by transmitting BPDU between devices.
  • Page 43 After receiving the configuration message, the process of each port is as follows: ⚫ When the priority of the configuration message received by the port is lower than that of the port configuration message, the device will discard the received configuration message without any processing.
  • Page 44 Figure 1-2 Networking diagram of algorithm calculation process Table 1-4 Initial status of all devices Device Port name Port configuration message {0,0,0,AP1} Device A {0,0,0,AP2} {1,0,1,BP1} Device B {1,0,1,BP2} {2,0,2,CP1} Device C {2,0,2,CP2} ⚫ Comparison process and results of all devices Shown in table 1-5.
  • Page 45 will update the configuration message of port BP1. BP2} ⚫ Port BP2 receives the configuration message {2, 0, 2, CP2} from device C. Device B finds that the configuration message {1, 0, 1, bp2} of this port is superior than the received configuration one, so it will discard the received configuration message.
  • Page 46 configuration message of port CP2 is selected as the optimal one, and port CP2 is set as the root port without any change of its configuration message. ⚫ After comparing the configuration message of port CP1 with the calculated configuration message of the designated port, port CP1 is blocked without any change of its port configuration message, and will not receive the data forwarded from device A until a new condition triggers the calculation of spanning tree, such as that the...
  • Page 47: Mstp Introduction

    In STP calculation, there are three important time parameters to be used: Forward Delay, Hello Time and Max Age. ⚫ Forward delay refers to the delay time of device state migration. Link failure will cause the network to recalculate the spanning tree, and its structure will change accordingly.
  • Page 48: Basic Concept Of Mstp

    packets in the loop network. At the same time, it will also provide many redundant paths for data forwarding to realize VLAN data load sharing in the process of data forwarding. ⚫ MSTP is compatible with STP and RSTP. 9.2.2 Basic Concept of MSTP Each device is running MSTP in Figure 4.
  • Page 49 MSTP configuration commands. (2) WLAN mapping table VLAN mapping table is an attribute of MST region, which is used to describe the mapping relationship between VLAN and spanning tree instance. For example, in Figure 1-4, the VLAN mapping table of region A0 is: VLAN 1 is mapped to spanning tree instance 1, VLAN 2 is mapped to spanning tree instance 2, and other VLANs are mapped to CIST.
  • Page 50 (10) Port role In MSTP calculation process, port roles mainly include root port, designated port, Master port, Alternate port, Backup port and so on. ⚫ Root port: forwarding data to the root bridge. ⚫ Designated port: forwarding data to downstream network segments or devices. ⚫...
  • Page 51: Basic Principle Of Mstp

    ⚫ Discarding status: Neither learning MAC address nor forwarding user’s traffic. There is no necessary connection between the port status and its role. Table 1-6 shows the port status of various port roles (“√” means that this port role can have this status; “--” means that this port role cannot have this status). Table 1-6 Port status of various port roles Port role Root port/Master port...
  • Page 52: Protocol

    ⚫ Root bridge backup; ⚫ Root protection function; ⚫ BPDU protection function; ⚫ Loop protection function; ⚫ Anti-attack function from TC-BPDU message. 9.3 Protocol Relevant protocols: ⚫ IEEE 802.1D:Spanning Tree Protocol ⚫ IEEE 802.1w:Rapid Spanning Tree Protocol ⚫ IEEE 802.1s:Multiple Spanning Tree Protocol 9.4 Property State: enable (complete switch spanning tree configuration, ticked for enabling, not ticked for...
  • Page 53: Port Setting

    TX hold count: configure the maximum number of BPDUs transmitted per second. The default value is 3. 9.5 Port Setting State: Enable (As the spanning tree configuration of the switch port, ticked for enabling, not ticked for dis-enabling) Path cost: Long/Short (the value range is short integer (short: 1-65535) (long: 1-200000000)) Priority: configure the priority of the switch port, ranging from 0 to 240.
  • Page 54 By default, the member ports of VLAN1 member ports can manage switches.` Figure 12-4-1 According to the user's demands, you can choose any VLAN to manage the switch system. But the premise is that the selected VLAN should be established first. For example: 1.
  • Page 55: Management Service

    12.4.2 Management Service Figure 12-4-2 Management service: according to the users demands, you can select switches to support. Session Timeout: for example, after logging in the web page, if no operation for 10 seconds, the system will automatically exit the web page. The user should re-enter his name and password to manage the switch. Password Retry Count: if the times of inputting wrong password exceeds the set value, the user will wait for some time and re-enter the password to prevent brute force.
  • Page 56 Figure 15-1-1 State: logging information, on/off Aggregation: merge or display the entries of log information, on/off Aging time: time of upgrading the log information. The default time is 300 seconds. Console logging: display the log information on the serial port RAM logging: display the log information on RAM Flash logging: display the log information on Flash Minimum severity: log level, including 8 types: emergency, alert, critical, error, warning, notice, informational, debug...
  • Page 57: Mirroring

    Figure 15-1-2 The above configuration can cover the display of logs completely, which can be taken as reference. 15.2 Mirroring Support 4 mirroring sessions. Setting of traffic capturing: Capturing status: set the status of port mirroring, on/off Capturing port: select a capturing port, that is, mirror the captured port message to this port Captured port: capture ingress messages, egress messages or all of them.
  • Page 58 Figure 15-2-1 Select a mirroring session and click “Edit” Figure 15-2-2 State: tick Enable Monitor port: select some ports messages to mirror on this port.
  • Page 59: Ping

    Note: tick “Send or Receive Normal Packet” to control the switch by the PC connected with this port after configuration. If not, this port cannot be accessed to control the switch. Ingress port: messages sending in this port Progress port: messages sending out of this port As shown in the above example: Mirror the ingress message of GE2 port to GE15 port Mirror the egress message of GE3 port to GE15 port...
  • Page 60: Traceroute

    Figure 15-3-1 Address Type: Hostname,IPv4,IPv6 Service address: this requires to input the destination address for PING. Count: the number of messages for PING continuously. The default is 4. You can also manually input the number of messages for PING. Ping Result Status: pass or failure Transmit packet: how many ping messages have been sent Receive packet: how many ping messages have been received...
  • Page 61: Copper Test

    Figure 15-4-1 15.5 Copper Test This is the function of VCT. VCT is the abbreviation of Virtual Cable Test which is a common function in network communication equipment. VCT uses TDR (Time Domain Reflectometry) to detect the physical state of network cables. TDR detection principle is like radar.
  • Page 62: Part 16: Management

    Figure 15-5-1 Select a port and click “copper test” button. When the network cable is disconnected, there will be a test result showing Length, which indicates how many meters it is disconnected from. Its error is about 1 meter, so this function can be used to check the network cable fault. Part 16: Management 16.1 User Account Figure 16-1-1...
  • Page 63 Click “Add” to add new user. Figure 16-1-2 Input user name and password, and then confirm the password. There are two levels: Admin and User. Admin is able to manage all functions of the switch system User can only manage several functions of the switch,as shown in the following: Figure 16-1-3...
  • Page 64: Firmware

    16.2 Firmware 16.2.1 Upgrade/Backup The software system can be upgraded and backed up by TFTP or HTTP. If you want to upgrade, you can select Upgrade or HTTP, and then select the system upgrade file, finally click Apply. Figure 16-2-1 After the upgrade, pop up the following information.
  • Page 65: Configuration

    Figure 16-2-3 After the upgrade, you can find out that the upgrade file “vmlinux-oem_24+4_en-poe.bix” we just used is corresponding to the upgraded image0. So now you need to select image0 on the Active Image option, and then click Apply to complete the upgrade, finally click Reboot button.
  • Page 66 Figure 16-3-1 Action:Upgrade/ Backup Upgrade: upgrade parameters Backup: back up parameters Method:TFTP/HTTP Configuration: Running Configuration:Parameters that the system is running Startup Configuration:Parameters loaded when the system starts Backup Configuration:Parameters that have been backed up Note: When importing parameters, select Startup configuration. Then click restart to complete the parameter import. When exporting parameters, select Running configuration.
  • Page 67: Save Configuration

    16.3.2 Save Configuration Figure 16-3-2 Copy the source file to the destination file to save the parameters, which is troublesome. The simplest way is to select Save button on the top right. At the same time, there is also a button to restore the default parameters: “restore factory default” Click this button, pop up the following interface: Figure 16-3-3 Click “OK”, and then click Reboot to restore the default parameters.
  • Page 68: Part 17:Faq

    Part 17: FAQ 17.1 Abnormal display of connection status indicator (connection error) Check whether the link end is connected to PC network card or another Ethernet interface; Check whether the link access point is rusty or damaged. Utilize WEB to check this port connection configuration (duplex and speed) and make sure that its configuration is same as the other end of the link.
  • Page 69: Power Supply Failure

    Check the power indicator. If the indicator is not on, the power connection may be damaged. Please ensure that the power supply is normal, and check whether the connection between the switch and its power supply is stable and reliable. Thank You for Choosing CP Plus! Website: - www.cpplusworld.com...

This manual is also suitable for:

Cp-anw-gpm24g4f4-n40

Table of Contents