Page 2
Ruijie Networks reserves the right to modify the content of the document without any notice or prompt. This manual is designed merely as a user guide. Ruijie Networks has tried its best to ensure the accuracy and reliability of the content when compiling this manual, but it does not guarantee that the content of the manual is completely free of errors or omissions, and all the information in this manual does not constitute any explicit or implicit warranties.
Intended Audience This document is intended for: Network engineers Technical support and servicing engineers Network administrators Technical Support The official website of Ruijie Reyee: https://reyee.ruijie.com Technical Support Website: https://reyee.ruijie.com/en-global/support Case Portal: https://www.ruijienetworks.com/support/caseportal Community: https://community.ruijienetworks.com...
Page 4
Note The manual offers configuration information (including model, description, port type, software interface) for indicative purpose only. In case of any discrepancy or inconsistency between the manual and the actual version, the actual version prevails.
Page 13
12.6.3 Enabling Port IP Source Guard ................187 12.6.4 Configuring Exceptional VLAN Addresses .............. 188 12.7 Configure 802.1x authentication ..................189 12.7.1 Function introduction....................189 12.7.2 Configuration 802.1x ....................190 12.7.3 View the list of wired authentication users ............... 195 12.8 Anti-ARP Spoofing .......................
Page 14
13.4.2 Control VLAN and Data VLAN ................. 209 13.4.3 Basic Model of an Ethernet Ring ................210 13.4.4 RPL and Nodes ......................212 13.4.5 ERPS Packet ......................213 13.4.6 ERPS Timer ......................213 13.4.7 Ring Protection ......................214 13.4.8 Protocols and Standards ..................214 13.4.9 Configuring ERPS ....................
Page 15
14.1 Info Center ........................... 239 14.1.1 Port Info ........................239 14.1.2 VLAN Info ......................... 240 14.1.3 Routing Info ......................240 14.1.4 DHCP Clients ......................241 14.1.5 ARP List ........................241 14.1.6 MAC Address ......................242 14.1.7 DHCP Snooping ....................... 242 14.1.8 IP-MAC Binding .......................
Page 16
15.4 Configuring SNMP ....................... 253 15.4.1 Overview ........................253 15.4.2 Global Configuration ....................254 15.4.3 View/Group/Community/Client Access Control ............255 15.4.4 SNMP Service Typical Configuration Examples ............262 15.4.5 Trap service configuration ..................267 15.4.6 Typical configuration examples of the trap service ..........271 15.5 Configuration Backup and Import ..................
Configuration Guide Change Description Change Description This chapter describes the major changes in software and hardware of different versions and related documentation. For details about hardware changes, see the release notes published with software versions. ReyeeOS 2.280.0.1718;SWITCH_3.0(1)B11P280,Release(11171809) 1.1.1 Hardware Change The following table lists the applicable hardware models of this version.
Configuration Guide Change Description ReyeeOS 2.260 1.3.1 Hardware Change This baseline version has no hardware change. The following table lists the applicable hardware models of this version. Model Hardware Version RG-NBS3100-8GT2SFP 1.0x, 1.1x, 1.2x RG-NBS3100-8GT2SFP-P 1.0x, 1.1x, 1.2x, 1.3x, 1.4x, 1.5x RG-NBS3100-24GT4SFP 1.0x, 1.1x, 1.2x, 2.0x, 2.1x, 2.2x, 3.0x, 3.1x, 3.2x RG-NBS3100-24GT4SFP-P...
Configuration Guide Login Login Configuration Environment Requirements Google Chrome, Internet Explorer 9.0, 10.0, and 11.0, and some Chromium/Internet Explorer kernel-based browsers (such as 360 Extreme Explorer) are supported. Exceptions such as garble characters or format error may occur if an unsupported browser is used. ...
Page 21
Configuration Guide Login You can use the default password admin to log in to the device for the first time. For security purposes, you are advised to change the default password as soon as possible after logging in, and to regularly update your password thereafter.
Configuration Guide Login Layout Configuration 2.2.3 ① ② ⑦ ③ ⑥ ⑤ ④ Table 2-2 Layout Configuration Description Search for frequently used device functions, including network-wide management, egress gateway, and device and system related functionalities. Quick view of device alarms, change the web interface language, and exit the web interface. Device information and device restart button.
Configuration Guide Login Quick Setup 2.3.1 Configuration Preparations Connect the device to the power supply, and connect the device port to an uplink device with an Ethernet cable. 2.3.2 Procedure 1. Change the Web Interface Language Click English in the top right corner of the web interface. Select the desired language from the drop-down list to change the language of the web interface.
Page 24
Configuration Guide Login 3. Creating a Web Project (1) Click Start Setup to configure the Internet connection type. Internet: Configure the Internet connection type according to requirements of the local Internet Service Provider (ISP). ○ PPPoE: Click PPPoE, and enter the username, password, and service name. Click Next. ○...
Page 25
Configuration Guide Login (2) Click Next. On the page that is displayed, set the project name and management password. Project Name: Identifies the network project where the device is located. Management Password: The password is used for logging in to the web interface. Click Finish.
Configuration Guide Login The device can access the Internet now. Bind the device to a Ruijie Cloud account for remote management. Follow the instruction to log in to Ruijie Cloud for further configuration. Note If your device is not connected to the Internet, click Exit to exit the configuration wizard.
Page 27
Configuration Guide Login (1) Connect two switches with cables to form a VCS group. Caution Only one link is required between devices before VCS is configured, for example, connect Port 50 of Device 1 to Port 50 of Device 2, as shown in Figure 2-1.
Page 28
Configuration Guide Login (3) Click Start Setup. (4) Connect the 10GE interfaces of the two switches using a cable (for example, connect Interface 50 of Device 1 to Interface 50 of Device 2, as shown in Figure 2-1). Then, choose Dual-Device Config, and click Next.
Page 29
Configuration Guide Login (5) Select the standby switch. (6) Select another VCS interface (Interface 49 in the following figure), or multiple VCS interfaces. You are advised to select two adjacent interfaces on a switch. Up to four VCS interfaces on a switch can be selected. These VCS interfaces must be 10GE interfaces.
Configuration Guide Login Caution To delete the hot standby configuration, ensure that the network cable connecting the hot standby interfaces is disconnected. Failure to do so may result in a loop that can cause network disconnection. Work Mode The device supports two work modes: Standalone and Self-Organizing Network. It works in Self-Organizing Network mode by default.
Page 31
Configuration Guide Login Figure 2-2 Web Interface in Standalone Mode In SON mode, you can batch set the commonly used functions of all wired and wireless Reyee products on the self-organizing network, including the currently logged-in device, as shown in Figure 2-3.
Configuration Guide Network-Wide Management Network-Wide Management Choose Network-Wide > Workspace > Topology. The Topology page displays the current network topology, real-time uplink and downlink traffic, connection status, and number of clients on the current network. It also provides quick actions for network and device setup. On the current page, you can monitor, configure, and manage the entire network.
Page 33
Configuration Guide Network-Wide Management Click the egress gateway to view real-time traffic information of the device. Click a device in the topology to view the running status and configuration of the device, and to configure functions on the device. The device name is the product model by default. You can click to change the device name.
Configuration Guide Network-Wide Management The update time is displayed in the lower left corner of the topology page. Click Refresh to refresh the topology. It takes some time to refresh the topology. Adding Devices 3.2.1 Adding a Device Through Wired Connection (1) When a new device joins the network through a wired connection, the system displays a prompt that a device not in SON is detected.
Page 35
Configuration Guide Network-Wide Management (2) On the Network List page, click the downward arrow next to Other Network to expand this list. Select the desired device(s) and click Add to My Network. You do not need to enter the password if the device to be added has not been configured before. If a password is required, enter the management password of the device.
Configuration Guide Network-Wide Management 3.2.2 AP Mesh Note This function is only supported on Reyee APs that support AP Mesh function. 1. Overview After being powered on and enabled with the AP Mesh feature, a Mesh-capable new AP can be paired with other Mesh-capable wireless devices on the target network through multiple ways.
Page 37
Configuration Guide Network-Wide Management 3. One-Touch Pairing Caution The uplink device must be an EGW router. The new AP must be in factory-reset configuration. It can be scanned only when the network is enabled with AP Mesh. ...
Page 38
Configuration Guide Network-Wide Management (6) Click View Details next to the icon to obtain information about the uplink device and RSSI. 4. Search-based Pairing Caution The uplink device must be an EGW router. The new AP must be in factory-reset configuration. ...
Page 39
Configuration Guide Network-Wide Management (3) On the AP Mesh page, click Scan to scan devices that are not connected to the network via an Ethernet cable. (4) Select the APs to be added and click Add to My Network. Up to eight APs can be added at a time. Wait until the mesh process finishes.
Page 40
Configuration Guide Network-Wide Management (5) Check the topology on the Physical Topology page to make sure that the new AP has connected to the uplink device in wireless mode. (6) Power off the new AP and install it to the planned location. (7) Log in to the web interface of a device on the target network.
Page 41
Configuration Guide Network-Wide Management 5. Wired Pairing Caution The uplink device can be an AP, EG router, or EGW router. The new AP must be in factory-reset configuration. It can be scanned only when the live network is enabled with AP Mesh. (1) Plug one end of the Ethernet cable to the uplink port of the new AP, and the other end to the downlink port of an AP, EG router, or EGW router on the target network.
Page 42
Configuration Guide Network-Wide Management (5) Click View Details next to the icon to obtain information about the uplink device and RSSI. 6. Enabling WAN Port The WAN port works as the wired uplink port of the AP by default. For the AP added to the target network through Mesh pairing, the WAN port is disabled by default.
Page 43
Configuration Guide Network-Wide Management (2) Choose Config > Advanced > Enable WAN, toggle on Enable, and click Save. 7. Viewing Mesh APs and Mesh Details (1) Log in to the web interface of a device on the target network. (2) View Mesh APs. ...
Configuration Guide Network-Wide Management (3) View Mesh details. In SON mode, choose Devices > AP. Select the target AP, and click View Details in the Relay Information column to view the Mesh details. Configuring VLANs Choose Network-Wide > Workspace > Network Planning. 3.3.1 Configuring a Wired VLAN Choose Network-Wide...
Page 45
Configuration Guide Network-Wide Management Alternatively, you can select an existing wired VLAN and click Setup to edit the VLAN. (1) Configure the VLAN ID, address pool server, and DHCP pool. The gateway is configured as the address pool server by default to assign IP addresses to clients. If an access switch exists on the network, you can select the access switch as the address pool server.
Page 46
Configuration Guide Network-Wide Management (2) Select the target switch in the topology and all member ports in the VLAN, and click Next. (3) Confirm the configurations and click Save. The configurations will take effect in a few minutes.
Configuration Guide Network-Wide Management 3.3.2 Configuring a Wi-Fi VLAN Choose Network-Wide > Workspace > Network Planning. On the Network Planning page, click Add Wi-Fi LAN. Alternatively, you can select an existing wireless VLAN and click Setup to edit the VLAN. (1) Configure the SSID, Wi-Fi password and band.
Page 48
Configuration Guide Network-Wide Management (2) Configure the VLAN ID, address pool server and DHCP pool. The gateway is configured as the address pool server by default to assign IP addresses to clients. If an access switch exists on the network, you can select the access switch as the address pool server.
Configuration Guide Network-Wide Management Network-wide Wireless Management Choose Network-Wide > Workspace > Wireless. The functions supported by Network-wide Wireless Management depend on the APs on the network. Detailed information on the supported functions can be found in the Web-based Configuration Guide of RG-RAP and RG-EAP devices.
Configuration Guide Network-Wide Management Device Management View all devices on the current network. You can configure and manage the devices simply by logging into one device on the network. The methods to access device management are as follows: Method 1: Click the device icon in the top right corner of the Physical Topology to switch to the device list view. Method 2: Choose Network-Wide >...
Configuration Guide Network-Wide Management Online Client Management Choose Network-Wide > Clients. The client list displays wired, wireless, and users not connected on the current network, including the username, connection mode, associated device, IP/MAC address, IP address binding status, rate, and related operations. ...
Page 52
Configuration Guide Network-Wide Management Table 3-1 Online Client Management Configuration Parameters Parameter Description Username Name of the connected client. Indicates the access mode of the client, which can be wireless or wired. The SSID SSID and Band and frequency band is displayed when a client is connected wirelessly. The Wi-Fi signal strength of the client and the associated channel.
Configuration Guide Network-Wide Management User not connected Click the User not connected tab to see details about clients waiting to connect. This list includes clients tagged manually or recognized as devices previously connected to the network but not currently listed in device management or online client lists.
Configuration Guide Network-Wide Management Select the clients to be bound, click Bind IP, and click OK in the pop-up box to bind the selected clients to a static IP address. Unbind an IP address Select the client to be unbound from the list, click Bound, and click OK in the pop-up box. 3.6.2 Configuring Client Access Control Note...
Configuration Guide Network-Wide Management 3.6.3 Blocking Clients Choose Network-Wide > Clients. An unauthorized client may occupy network bandwidth and pose security risks. You can block specified clients to solve the unauthorized access problem. Note Client block is available only for wireless clients. ...
Configuration Guide Network-Wide Management 3.6.4 Configuring Client Rate Limiting Choose Network-Wide > Clients > Wireless. To ensure fair resource allocation, the network administrator can implement wireless rate limiting to prevent some users or devices from occupying a large amount of bandwidth and affecting the network experience of other users.
Configuration Guide Network-Wide Management Click the Wireless tab, click the LimitSpeed column in the table, and click Disable. Firewall Management After a firewall is added to the network, you can manage and configure the firewall on the Web management system. 3.7.1 Viewing Firewall Information You can view the basic information and license of the firewall on the Web management system.
Configuration Guide Network-Wide Management Click Manage Firewall to go to the Web management interface of the firewall. Configure the security policy and license activation for the firewall. For details, see the Web-based configuration guide of the firewall. 3.7.2 Configuring Firewall Port If the firewall is set to transparent mode, the Firewall Port Config page appears.
Page 59
Configuration Guide Network-Wide Management Caution After unfollowing a specified alert type, you will not discover and process all alerts of this type promptly. Therefore, exercise caution when performing this operation. Click View Unfollowed Alert to view the unfollowed alert. You can follow the alert again in the pop-up window.
Configuration Guide Network-Wide Management Smart Device Network Caution Currently, the function is supported by RG-NBS6002 Series, RG-NBS7003 Series and RG-NBS7006 Series devices. 3.9.1 Overview The smart device network is used to quickly plan and set up an isolation network for smart clients, so as to isolate the client network from the normal service network and other types of clients, and improve the stability of the network.
Page 61
Configuration Guide Network-Wide Management (3) Display the identified client and client server information, including IP address, MAC address, SN number of the connected switch and connection port. Click to view the detailed information. If the connection information to the client server is not identified, you need to click Configure and fill in the relevant information manually. After confirming that the client device information is correct, click Isolate Client.
Page 62
Configuration Guide Network-Wide Management (5) After confirming the configuration, click Deliver Config. If you need to modify it, you can click Previous to return to the setting page. (6) The page displays that the configuration has been delivered successfully, indicating that the settings have been completed.
Page 63
Configuration Guide Network-Wide Management (7) After completing the smart device network settings, you can view the client monitoring information on the page, including client online status, connection information, device information, and online and offline time. Select the client entry and click Delete Client to remove the specified client from the current network. Click Batch Edit Hostnames to import a txt file containing client IP and client name (one line for each client, each line contains an IP and a name, and the IP and the name are separated by the Tab key), and modify the client names in batches.
Configuration Guide One-Device Information One-Device Information Basic information about the One-Device Choose Local Device > Home > Basic Info. Basic information includes device name, device model, SN number, software version, management IP, MAC address, networking status, system time, working mode, etc. 1.
Configuration Guide One-Device Information 2. Switching the Work Mode Click the current work mode to change the work mode. 3. Setting MGMT IP Click current management IP address to jump to the management IP configuration page. For more information, Smart Monitoring Caution Only RG-NBS6002 Series, RG-NBS7003 Series and RG-NBS7006 Series devices support displaying this type of information.
Configuration Guide One-Device Information Port Info Choose Local Device > Home > Port Info. The port info page displays the details of all ports currently on the switch. Click Panel View to view the port roles and statuses corresponding to port icons of different colors or shapes. ...
Page 67
Configuration Guide One-Device Information port will be displayed, including the port ID, port status, port rate, uplink and downlink traffic, transmission rate, and optical/electrical attribute of the port. Traffic data is automatically updated every five minutes. You can click Refresh above the port panel to obtain the latest port traffic and status information simultaneously.
Configuration Guide VLAN VLAN VLAN Overview A virtual local area network (VLAN) is a logical network created on a physical network. A VLAN has the same properties as a normal physical network except that it is not limited by its physical location. Each VLAN has an independent broadcast domain.
Configuration Guide VLAN Create a VLAN: Click Add. Enter the VLAN ID and description for the VLAN, and click OK. The VLAN added will be displayed in VLAN List. Note The range of a VLAN ID is from 1 to 4094. ...
Configuration Guide VLAN 5.2.3 Deleting a VLAN Batch delete VLANs: In VLAN List, select the VLAN entries to be deleted and click Delete Selected to delete VLANs in a batch. Delete a VLAN: In VLAN List, click Delete in the Action column to delete the specified VLAN. Note The default VLAN (VLAN 1), management VLAN, native VLAN, and access VLAN cannot be deleted.
Page 71
Configuration Guide VLAN Port List displays the VLAN division of the current port. Create VLANs in VLAN List page (see 3.5.2 Creating VLAN) and then configure the port based on the VLANs. You can configure the port mode and VLAN members for a port to determine VLANs that are allowed to pass through the port and whether packets to be forwarded by the port carry the tag field.
Page 72
Configuration Guide VLAN Port mode Function Tag VLAN carry tags, and the frames forwarded by the hybrid port from an Untagged VLAN do not carry tags. The frames forwarded by the hybrid port from Native VLAN must not carry tags, therefore Native VLAN can only belong to Untagged VLAN List.
Configuration Guide VLAN Note VLAN ID range is from 1 to 4094, among which VLAN 1 is the default VLAN that cannot be deleted. When hardware resources are insufficient, the system displays a VLAN creation failure message. Improper configuration of VLANs on a port (especially uplink port) may cause the failure to log in to the web interface.
Page 74
Configuration Guide VLAN (2) Click Add VLAN to create a VLAN for the selected devices in a batch. If you want to create multiple VLANs, click Batch Add and enter the VLAN ID range, such as 3-5,100. After setting the VLANs, click Next. (3) Configure port attributes for the ports selected in Step 1 in a batch.
Page 75
Configuration Guide VLAN 3. Verifying Configuration View the VLAN and port information of switches to check whether the batch configurations are successfully delivered.
Configuration Guide Monitoring Monitoring Port Flow Choose Local Device > Monitor > Port Flow. This page displays traffic statistics such as the rate of the device port, the number of sent and received packets, and the number of error packets. The rate of the port is updated every five seconds. Other traffic statistics are updated every five minutes.
Configuration Guide Monitoring packet through the interface corresponding to the entry in unicast mode. If the device does not find such an entry, it forwards the packet through all interfaces other than the receiving interface in broadcast mode. MAC address entries are classified into the following types: ...
Configuration Guide Monitoring Note The MAC address entry capacity depends on the product. For example, the MAC address entry capacity of the device shown in the preceding figure is 32000. 6.2.3 Configuring Static MAC Binding The switch forwards data based on the MAC address table. You can set a static MAC address entry to manually bind the MAC address of a downlink network device to the port of the device.
Configuration Guide Monitoring 2. Deleting Static MAC Address Entries Choose Local Device > Monitor > Clients > Static MAC. Batch delete: In MAC List, select the MAC address entries to be deleted and click Delete Selected. In the displayed dialog box, click OK. Delete an entry: In MAC List, select the entry to be deleted, click Delete in the Action column.
Configuration Guide Monitoring Delete dynamic MAC address: Select the clear type (by MAC address, by VLAN, or by port), enter a string for matching the dynamic MAC address entry, and click Clear. The device will clear MAC address entries that meet the conditions.
Page 81
Configuration Guide Monitoring 1. Adding Filtering MAC Address Choose Local Device > Monitor > Clients > MAC Filter. Click Add. In the dialog box that appears, enter the MAC address and VLAN ID, and then click OK. 2. MAC Filter Choose Local Device >...
Configuration Guide Monitoring 6.2.6 Configuring MAC Address Aging Time Set the aging time of dynamic MAC address entries learned by the device. Static MAC address entries and filtering MAC address entries do not age. The device deletes useless dynamic MAC address entries based on the aging time to save entry resources on the device.
Configuration Guide Monitoring send data frames to the physical network. The process of obtaining MAC addresses based on IP addresses is called address resolution. The Address Resolution Protocol (ARP) is used to resolve IP addresses into MAC addresses. ARP can obtain the MAC address associated with an IP address.
Configuration Guide Ports Ports Overview Ports are important components for data exchange on network devices. The port management module allows you to configure basic settings for ports, and configure port aggregation, switched port analyzer (SPAN), port rate limiting, management IP address, etc. Table 7-1 Description of Port Type Port Type...
Configuration Guide Ports Port Type Note Remarks An L3 aggregate port is a logical aggregate port group composed of multiple physical member ports, just like an L2 aggregate port. The ports to be aggregated must be L3 ports of the same type. An aggregate port serves as the gateway interface of L3 switching.
Page 87
Configuration Guide Ports Batch configure: Click Batch Edit, select the port to be configured In the displayed dialog box, select the port switch, rate, work mode, and flow control mode, and click OK to deliver the configuration. In batch configuration, optional configuration items are a common collection of selected ports (that is, attributes supported the selected ports).
Page 88
Configuration Guide Ports Configure one port: In Port List, select a port entry and click Edit in the Action column. In the displayed dialog box, select port status, rate, work mode, and flow control mode, and click OK. Table 7-2 Description of Basic Port Configuration Parameters Parameter Description...
Configuration Guide Ports Parameter Description Default Value lost, but the PoE power supply function of the port will not be affected. Set the rate at which the Ethernet physical interface works. Set to Auto means that the port rate is determined by the Rate Auto auto-negotiation between the local and peer devices.
Page 90
Configuration Guide Ports Batch configure: Click Batch Edit. In the displayed dialog box, select the port to be configured, configure the EEE switch, MTU, enter the port description, and click OK. Note Copper ports and SFP ports cannot be both configured during batch configuration.
Page 91
Configuration Guide Ports Configure one port: Click Edit in the Action column of the list. In the displayed configuration box, configure the EEE switch, port mode, enter the port description, and click OK. Table 7-3 Description of Physical Configuration Parameters Parameter Description Default Value...
Configuration Guide Ports Parameter Description Default Value standard IEEE 802.3az protocol. When enabled, EEE saves energy by making the interface enter LPI (Low Power Idle) mode when the Ethernet connection is idle. Value: Disable/Enable The port attribute indicates whether the port is a copper port or an SFP port.
Configuration Guide Ports 7.3.2 Overview 1. Static AP Address In static AP mode, you can manually add a physical interface to an aggregate port. An aggregate port in static AP mode is called a static aggregate port and the member ports are called member ports of the static aggregate port.
Configuration Guide Ports 4. LACP Link Aggregation Control Protocol (LACP) is a standardized protocol for dynamically aggregating multiple physical links into a single logical link to enhance network bandwidth and reliability. LACP defines the negotiation process and parameters of link aggregation, which enables the exchange of link aggregation information and the negotiation of link aggregation parameters among network devices and ensures the reliability and stability of the link aggregation.
Page 95
Configuration Guide Ports 2. Modifying Member Ports of a Static Aggregate Port Click an added static aggregate port. Member ports of the aggregate port will become selected. Click a port to deselect it; or select other ports to join the current aggregate port. Click Save to modify the member ports of the aggregate port.
Configuration Guide Ports 7.3.4 Configuring a Load Balancing Mode Choose Local Device > Ports > Aggregate Port > Global Settings. Select Load Balance Algorithm and click Save. The Device distributes incoming packets among member links by using the specified load balancing algorithm. The packet flow with the consistent feature is transmitted by one member link, whereas different packet flows are evenly distributed to various links.
Page 97
Configuration Guide Ports You can select a specific port and click Edit, or select multiple ports and click Batch Edit to modify the port priority, mode, and timeout mode in the pop-up window. Then, click OK to confirm and apply the changes. Table 7-4 Description of LACP Port List Configuration Parameters Default...
Configuration Guide Ports Default Parameter Description Value The purpose of the timeout mode is to determine the timeout period and mechanism for LACP link aggregation. When no LACP frames are received from the peer device within the specified timeout duration, it is assumed that the peer device has experienced a failure.
Configuration Guide Ports Figure 7-1 Port Mirroring Principles Figure The SPAN function not only realizes the data traffic analysis of suspicious network nodes or device ports, but also does not affect the data forwarding of the monitored device. It is mainly used in network monitoring and troubleshooting scenarios.
Page 100
Configuration Guide Ports Table 7-5 Description of Port Mirroring Parameters Default Parameter Description Value A source port is also called a monitored port. Data flows on the source port are monitored for network analysis or troubleshooting. Src Port Support selecting multiple source ports and mirroring multiple ports to one destination port The destination port is also called the monitoring port, that is, the port Dest Port...
Configuration Guide Ports Default Parameter Description Value The type of packets (data flow direction) to be monitored by a source port. Both: All packets passing through the port, including incoming and outgoing packets Monitor Direction Both Incoming: All packets received by a source port are copied to the destination port Outgoing: All packets transmitted by a source port are copied to the destination port...
Page 102
Configuration Guide Ports 1. Rate Limiting Configuration Click Batch Edit. In the displayed dialog box, select ports and enter the rate limits, and click OK. You must configure at least the ingress rate or egress rate. After the configuration is completed, it will be displayed in the list of port rate limiting rules.
Configuration Guide Ports 3. Deleting Rate Limiting Batch configure: Select multiple records in Port List, click Delete Selected and click OK in the confirmation dialog box. Configure one port: In Port List, click Delete on the corresponding port entry, and click OK in the confirmation dialog box.
Configuration Guide Ports The device can be networked in two modes: DHCP: Uses a temporary IP address dynamically assigned by the upstream DHCP server for Internet access. Static IP: Uses a static IP address manually configured by users for Internet access. If you select DHCP, the device obtains parameters from the DHCP Server.
Configuration Guide Ports Click Save. Out-of-Band IP Configuration Caution Only the RG-NBS6002 Series, RG-NBS7003 Series and RG-NBS7006 Series support this function. Choose Local Device > Ports > Out-of-Band IP. Set the MGMT management port IP of the chassis to centrally manage the modules in multiple slots of the device.
Configuration Guide Ports Note No IP address is configured for the MGMT port by default. Currently, only a static IP address can be configured for the MGMT port but DHCP is not supported. PoE Configuration Caution Only PoE switches (model name containing –P, -LP, -HP, and -UP) support this function. Choose Local Device >...
Configuration Guide Ports 7.9.1 PoE Global Settings Choose Local Device > Ports > PoE > PoE Settings. PoE Transmit Power Mode refers to the way that a device allocates power to a connected PD (Powered Device). It supports Auto mode and Energy-saving mode. In Auto mode, the system allocates power based on the classes of PDs detected on ports.
Configuration Guide Ports PoE watchdog: This feature is mainly applicable to security surveillance scenarios. After this feature is enabled, when a PoE port of the device suddenly stops receiving packets during the ping interval, the powered device (PD) will be restarted after the ping interval expires to restore normal operation. Table 7-7 PoE Watchdog Configuration Description Packet Receiving Status...
Page 109
Configuration Guide Ports Table 7-8 Description of Parameters for Power Supply Configuration of Ports Parameter Description Default Value Whether to enable the power supply function on the ports Enable By default, the device only supplies power to PDs that comply with the standard IEEE 802.3af and 802.3at protocols.
Configuration Guide Ports Parameter Description Default Value The maximum power that the port can transmit, ranging Max Transmit Power Not limit from 0 to 30, in watts (W). A blank value indicates no limit 7.9.3 Displaying Global PoE Information Choose Local Device > Ports > PoE > PoE Overview. Displays the global power supply information of the PoE function, including the total system power, used power, reserved power, remaining available power, peak maximum power, and the number of ports currently powered.
Page 111
Configuration Guide Ports Field Description The power supply priority of the port is divided into three levels: High, Medium, Priority and Low. Current Transmit Power Indicates the power output by the current port, in watts (W). Non-Standard Indicates whether the non-standard compatibility mode is enabled. Work Status Current work status of PoE ports.
Configuration Guide L2 Multicast L2 Multicast Multicast Overview IP transmission methods are categorized into unicast, multicast, and broadcast. In IP multicast, an IP packet is sent from a source and forwarded to a specific group of receivers. Compared with unicast and broadcast, IP multicast saves bandwidth and reduces network loads.
Configuration Guide L2 Multicast Parameter Description Default Value After this function is enabled, to reduce the number of packets on the network, save network bandwidth and ensure the IGMP Report performance of the IGMP multicast device, the switch forwards Disable Suppression only one report packet to the multicast router if multiple downlink clients connected to the switch simultaneously send...
Configuration Guide L2 Multicast 8.3.3 Configuring Protocol Packet Processing Parameters By controlling protocol packet processing, an L2 multicast device can establish static or dynamic multicast forwarding entries. In addition, the device can adjust parameters to refresh dynamic multicast forwarding entries and IGMP snooping membership quickly.
Page 115
Configuration Guide L2 Multicast Table 8-2 Description of VLAN Configuration Parameters of IGMP Snooping Parameter Description Default Value Whether to enable or disable the VLAN multicast function. The multicast function of a VLAN takes effect only when both the Multicast Status Disable global IGMP snooping and VLAN multicast functions are enabled.
Configuration Guide L2 Multicast Parameter Description Default Value After it is enabled, when the port receives the Leave packets, it will immediately delete the port from the multicast group without waiting for the aging timeout. After that, when the device receives the corresponding specific group query packets and multicast data packets, the device will no longer Fast Leave Disable...
Configuration Guide L2 Multicast 8.4.2 Configuring Global MVR Parameters Choose Local Device > L2 Multicast > MVR. Click to enable the MVR, select the MVR VLAN, set the multicast group supported by the VLAN, and click Save. Multiple multicast groups can be specified by entering the start and end multicast IP addresses. Table 8-3 Description of Configuring Global MVR Parameters Parameter...
Page 118
Configuration Guide L2 Multicast Configure one port: Click the drop-down list box to select the MVR role type of the port. Click the switch in the Fast Leave column to set whether the port enables the fast leave function. Table 8-4 Description of MVR Configuration Parameters of Ports Parameter Description...
Configuration Guide L2 Multicast Configuring Multicast Group Choose Local Device > L2 Multicast > Multicast Group. A multicast group consists of the destination ports, to which multicast packets are to be sent. Multicast packets are sent to all ports in the multicast group. You can view the Multicast List on the current page.
Configuration Guide L2 Multicast Parameter Description Default Value Multicast IP On-demand multicast IP address Address If the VLAN ID is a multicast VLAN and the multicast address is within the multicast IP address range of the MVR, the Protocol protocol is MVR. In other cases, the protocol is IGMP snooping.
Configuration Guide L2 Multicast 8.6.1 Configuring Profile Choose Local Device > L2 Multicast > IGMP Filter > Profile List. Click Add to create a Profile. A profile is used to define a range of multicast groups that permit or deny user access for reference by other functions.
Configuration Guide L2 Multicast Parameter Description Default Value DENY: Forbids demanding multicast IP addresses in a specified range. Behavior PERMIT: Only allows demanding multicast IP addresses in a specified range. Start Multicast IP address of the range of multicast group Start IP Address addresses End Multicast IP address of the range of multicast group...
Configuration Guide L2 Multicast Table 8-7 Description of Port Filter Configuration Parameters Parameter Description Default Value Profile that takes effect on a port. If it is not set, no profile rule Profile ID is bound to the port. Maximum number of multicast groups that a port can join. If too much multicast traffic is requested concurrently, the Max Multicast multicast device will be severely burdened.
Configuration Guide L2 Multicast 8.7.2 Procedure Choose Local Device > L2 Multicast > Querier. One querier is set for each VLAN. The number of queriers is the same as that of device VLANs. In Querier List, click Edit in the Action column. In the displayed dialog box, select whether to enable the querier, set the querier version, querier source IP address, and packet query interval, and click OK.
Page 125
Configuration Guide L2 Multicast Parameter Description Default Value Query Interval Packet transmission interval, of which the value range is from 30 to 60 seconds (Sec) 18000, in seconds. Note The querier version cannot be higher than the global IGMP version. When the global IGMP version is lowered, the querier version is lowered accordingly.
Configuration Guide L3 Multicast L3 Multicast Caution This section is applicable only to NBS Series Switches that support L3 functions. Products that do not support L3 functions such as RG-NBS3100 Series Switches, RG-NBS3200 Series Switches, do not support the functions mentioned in this section. Overview Layer 3 multicast is a communication method that uses multicast addressing at the network layer for sending data.
Configuration Guide L3 Multicast Parameter Description Default Value Incoming Interface receiving the multicast packets Interface When the router receives a multicast packet, it forwards the Outgoing multicast packet to the appropriate outgoing interface according to Interface the value in the Outgoing Interface field in the routing table. The TTL value is the duration for which a routing table entry remains valid.
Configuration Guide L3 Multicast 9.3.3 Viewing PIM Neighbor Table In the PIM protocol, routers discover neighboring routers and establish neighbor relationships through the exchange of Hello messages. Once a neighbor relationship is established between two PIM-enabled routers, they can exchange multicast information, including multicast group memberships and multicast forwarding states. By continuously updating and maintaining the PIM neighbor table, PIM-enabled routers are able to efficiently forward and process multicast packets based on the neighbor information, thereby achieving effective multicast communication.
Configuration Guide L3 Multicast Configuring RP 9.4.1 Overview The Rendezvous Point (RP) is a crucial concept in the PIM protocol. In multicast communication, when a sender sends a multicast data packet, it needs to identify a specific point as the rendezvous point, from which multiple receivers can receive the multicast packet.
Configuration Guide L3 Multicast Table 9-3 Description of Candidate RP Configuration Parameters Parameter Description Default Value The priority determines which candidate RP will become the RP during the election process. The priority value ranges from 0 to 255, Priority where a smaller value indicates a higher priority. A candidate RP with a higher priority has a greater chance of being elected as the A candidate RP announces its presence and availability by sending PIM messages.
Configuration Guide L3 Multicast BSR serves as the management core of the PIM-SM domain, responsible for collecting and advertising RP information within the domain. BSR is elected by candidate BSRs. Note A PIM-SM domain can have only one BSR, but can have multiple candidate BSRs. 9.5.2 Configuring BSR >>Choose Local Device >...
Configuration Guide L3 Multicast 9.6.2 Enabling IGMP >>Choose Local Device > L3 Multicast > IGMP > IGMP-enabled Interface List. The IGMP-enabled Interface List page displays basic information of IGMP-enabled interfaces, including the interface and the IGMP version. Add: Click Add. The Select Interfaces pop-up window is displayed. On the pop-up window, select an interface on which IGMP will be enabled.
Configuration Guide L3 Management L3 Management Caution This section is applicable only to NBS Series Switches that support L3 functions. Products that do not support L3 functions such as RG-NBS3100 Series Switches, RG-NBS3200 Series Switches, do not support the functions mentioned in this section. 10.1 Setting an L3 Interface Choose Local Device >...
Configuration Guide L3 Management Table 10-1 Description of Configuration Parameters of L3 Interfaces Parameter Description The type of a created L3 interface. It can be an SVI, routed port, or L3 aggregate port. For details, Port Type Table 4-1 Networking Specifies DHCP or static mode for a port to obtain the IP address.
Page 136
Configuration Guide L3 Management inside and outside the gateway. In addition, you need to add a mapping to enable access to the intranet devices from the Internet. Design defect: IP addresses cannot be formed using network topology mapping, and a large-scale routing table is needed. ...
Page 137
Configuration Guide L3 Management If no upstream DHCPv6 server is available to assign the IP address, configure the IPv6 information as follows: Table 10-2 IPv6 Address Configuration Parameters of the L3 Interface Parameter Description Obtain an IPv6 address If no upstream DHCPv6 server is available, do not select Auto Obtained IP. via DHCPv6 Instead, manually add the IPv6 address.
Configuration Guide L3 Management Parameter Description Length IPv6 addresses. If the primary IP address is empty, the configured secondary IP address is invalid. For manual configuration, the prefix length ranges from 1 to 128. For auto configuration, the prefix length ranges from 1 to 64. If the IPv6 prefix length of the L3 interface is between 48 and 64, this address can be assigned.
Page 139
Configuration Guide L3 Management Table 10-3 Description of DHCP Server Configuration Parameters Parameter Description DHCP Mode To choose DHCP server The DHCP server assigns the Start IP address automatically, which is the Start IP address of the DHCP address pool. A client obtains an IP address Start from the address pool.
Configuration Guide L3 Management Parameter Description inputting a single IP address or IP network segment, and add up to 20 address segments. The lease of the address, in minutes. Lease Time(Min): When a downlink client is connected, the leased IP address is automatically renewed. If a leased IP address is not renewed due to client disconnection or network Lease Time(Min) instability, the IP address will be reclaimed after the lease term expires.
Configuration Guide L3 Management Click Add. In the displayed static IP address binding dialog box, enter the MAC address and IP address of the client to be bound, and click OK. After a static IP address is bound, the bound IP address will be obtained each time the corresponding downlink client connects to the network.
Configuration Guide L3 Management Table 10-4 Description of the DHCP Server Options Configuration Parameters Parameter Description DNS server address provided by an ISP. Multiple IP addresses can be entered and DNS Server separated by spaces. When the AC (wireless controller) and the AP are not in the same LAN, the AP cannot discover the AC through broadcast after obtaining an IP address from the Option 43 DHCP server.
Page 143
Configuration Guide L3 Management Compared with other IPv6 address assignment methods (such as manual configuration and stateless address autoconfiguration), DHCPv6 provides the functions of address assignment, Prefix Delegation (PD), and configuration parameter assignment. DHCPv6 is both a stateful address autoconfiguration protocol and a stateless address configuration protocol. It supports flexible addition and reuse of network addresses, and can record the assigned addresses, thus enhancing network management.
Configuration Guide L3 Management Table 10-5 IPv6 Address Configuration Parameters of the L3 Interface Parameter Description L3 Interfaces Select the L3 interface for which the DHCPv6 server needs to be added. If this parameter is set to Auto, both DHCPv6 and SLAAC are used to assign IPv6 Assignment IPv6 addresses.
Page 145
Configuration Guide L3 Management You can view the DHCPv6 client information on this page.
Configuration Guide L3 Management 10.5 Configuring the IPv6 Neighbor List In IPv6, Neighbor Discovery Protocol (NDP) is an important basic protocol. NDP replaces the ARP and ICMP route discovery protocols of IPv4, and supports the following functions: address resolution, neighbor status tracking, duplicate address detection, router discovery, and redirection.
Configuration Guide L3 Management 10.6 Configuring a Static ARP Entry Choose Local Device > L3 Interfaces > ARP List. The device learns the IP address and MAC address of the network devices connected to its interfaces and generates the corresponding ARP entries. Supports binding ARP mappings or manually specifying the IP address and MAC address mapping to prevent devices from learning wrong ARP entries and improve network security.
Page 148
Configuration Guide L3 Management To remove the binding between a static IP address and a MAC address, click Delete in the Action column.
Configuration Guide Configuring Route Configuring Route Caution This section is applicable only to NBS Series Switches that support L3 functions. Products that do not support L3 functions such as RG-NBS3100 Series Switches, RG-NBS3200 Series Switches, do not support the functions mentioned in this section. 11.1 Configuring Static Routes Choose Local Device >...
Page 150
Configuration Guide Configuring Route Table 11-1 Description of Static Routes Configuration Parameters Parameter Description Specify the destination network to which the data packet Dest IP Address is to be sent. The device matches the data packet based on the destination address and subnet mask. Specify the subnet mask of the destination network.
Configuration Guide Configuring Route 11.2 Configuring the IPv6 Static Route Choose Local Device > Routing > IPv6 Static Routing. You need to manually configure an IPv6 static route. When the packet matches the static route, the packet will be forwarded according to the specified forwarding method. Caution The static route cannot automatically adapt to changes on the network topology.
Configuration Guide Configuring Route Parameter Description address and prefix length. Outbound Interface Interface that forwards the packet. IP address of the next routing node to which the packet Next Hop is sent. 11.3 Configuring RIP Routing Information Protocol (RIP) is applicable to small and medium-sized networks and is a dynamic routing protocol that is easy to configure.
Configuration Guide Configuring Route Table 11-3 RIP Configuration Parameters Parameter Description Network Segment: Enable RIP in the specified network segment. The IP addresses of this network segment are added to the RIP routing table. The device and its RIP- enabled neighbor devices learn the routing table from each other. Type Port: Enable RIP on the specified port.
Page 155
Configuration Guide Configuring Route Table 11-4 Configuration Parameters in the Port List Parameter Description Port Name Name of the port where RIP is enabled. Rx Status RIP version of packets currently received. Tx Status RIP version of packets currently transmitted. After the port learns the route, the route overhead is set to 16 (indicating that Poison Reverse the route is unreachable), and the route is sent back to the neighbor from the...
Configuration Guide Configuring Route Table 11-5 RIP Global Configuration Parameters Parameter Description Default: Select RIPv2 for sending packets and RIPv1/v2 for receiving packets. RIP Version V1: Select RIPv1 for sending and receiving packets. V2: Select RIPv2 for sending and receiving packets. After route advertisement is enabled, the current device generates a default Route Advertisement route and sends it to the neighbor.
Page 158
Configuration Guide Configuring Route Table 11-6 RIP Route Redistribution Parameters Parameter Description Direct Routing Type OSPF Routing Static Routing A smaller administrative distance indicates a higher priority. The default value Administrative Distance is 0. The value ranges from 0 to 16. Select the instance ID of OSPF that needs to be redistributed.
Configuration Guide Configuring Route 11.3.5 Configuring the Passive Interface If an interface is configured as a passive interface, it will suppress RIP update packets. If the connected peer device does not run RIP, you are advised to enable the passive interface. Choose Local Device >...
Configuration Guide Configuring Route 11.3.6 Configuring the Neighbor Route When the router cannot process broadcast packets, another router can be designated as the neighbor to establish a RIP direct link. Choose Local Device > Routing > RIP Settings > Advanced > Neighbor Route, click Add, and enter the IP address of the neighbor router.
Configuration Guide Configuring Route 11.4 Configuring RIPng 11.4.1 Configuring RIPng Basic Functions RIP Next Generation (RIPng) provides the routing function for IPv6 networks. RIPng uses UDP port 512 to exchange the routing information. Choose Local Device > Routing > RIPng Settings. Click Add, set Type to Network Segment or Port, and specify the network segment or port accordingly.
Page 162
Configuration Guide Configuring Route RIPng (Routing Information Protocol next generation) is a unicast routing protocol applied to IPv6 networks. Network Segment/Port List Enable RIPng in the specified network segment or on the specified port. If the address length is between 48 and 64, the address will be used as a prefix. Alternatively, enable RIPng on a specified port:...
Configuration Guide Configuring Route Table 11-7 RIPng Configuration Parameters Parameter Description Network Segment: Enable RIP in the specified network segment. The IP addresses of this network segment are added to the RIP routing table, and the device and its RIP- enabled neighbor devices learn the routing table from each other.
Configuration Guide Configuring Route Table 11-8 RIPng Global Configuration Parameters Parameter Description After route advertisement is enabled, the current device generates a default Route Advertisement route and sends it to the neighbor. Redistribute routes of other protocols to the RIP domain so that RIP can Administrative Distance interwork with other routing domains.
Configuration Guide Configuring Route Table 11-9 RIP Route Redistribution Parameters Parameter Description Direct Routing Type OSPF Routing Static Routing Value range: 0-16. The default value is 0. Administrative Distance 11.4.5 Configuring the RIPng Passive Interface If an interface is configured as a passive interface, it will suppress RIPng update packets. If the connected peer device does not run RIP, you are advised to enable the passive interface.
Configuration Guide Configuring Route 11.4.6 Configuring the RIPng Aggregate Route Choose Local Device > Routing > RIP Settings > Advanced > RIPng Aggregate Route, click Add, and enter the IPv6 address and prefix length (value range: 0–128). 11.5 OSPFv2 Open Shortest Path First (OSPF) can be applied to large-scale networks. IPv4 uses OSPFv2, and IPv6 uses OSPFv3.
Page 169
Configuration Guide Configuring Route (1) Configure an instance.
Page 170
Configuration Guide Configuring Route Table 11-10 Instance Configuration Parameters Parameter Description Create an OSPF instance based on the service type. Instance ID The instance only takes effect locally, and does not affect packet exchange with other devices. It identifies a router in an OSPF domain. Caution Router ID Router IDs within the same domain must be unique.
Page 171
Configuration Guide Configuring Route Parameter Description Redistribute routes of other protocols to the OSPF domain to interwork with other routing domains. If Static Route Redistribution is selected, enter the metric, which is 20 by default. Import External Route If Direct Route Redistribution is selected, enter the metric, which is 20 by default.
Page 172
Configuration Guide Configuring Route Table 11-11 Parameters in the Instance Detailed Configuration Parameter Description It is used for protocol selection. By default, the intra-area, inter-area, and external Distance distances are all 110. Frequent network changes and route flapping may occupy too much network bandwidth and device resources.
Page 173
Configuration Guide Configuring Route Table 11-12 Interface Configuration Parameters Parameter Description Interface Select the OSPF-enabled L3 interface. Area Configure the area ID. Value range: 0-4294967295 If Stub Area is enabled, you need to configure the area type and inter-area route isolation.
Page 174
Configuration Guide Configuring Route Table 11-13 Parameters in the Interface Detailed Configuration Parameter Description Priority It is 1 by default. Broadcast Unicast Network Type Multicast Non-Broadcast Multiple Access...
Configuration Guide Configuring Route Parameter Description Interval for periodic transmission, which is used to discover and maintain Hello Packets OSPF neighbor relationship. The default value is 10 seconds. Time after which the neighbor becomes invalid. The default value is 40 Dead Interval seconds.
Configuration Guide Configuring Route 11.5.4 Managing OSPFv2 Stub Areas Choose Local Device > Routing > OSPFv2, click More in the Action column, and select V2 Stub Area Management.
Configuration Guide Configuring Route 11.5.5 Managing OSPFv2 Neighbors Choose Local Device > Routing > OSPFv2, click More in the Action column, and select V2 Neighbor Management. 11.5.6 Viewing OSPFv2 Neighbor Information Choose Local Device > Routing > OSPFv2, and click Neighbor Info in the Action column.
Configuration Guide Configuring Route 11.6 OSPFv3 Open Shortest Path First (OSPF) can be applied to large-scale networks. IPv4 uses OSPFv2, and IPv6 uses OSPFv3. 11.6.1 Configuring OSPFv3 Basic Parameters Choose Local Device > Routing > OSPFv3, click Start Setup, and then configure an instance and an interface respectively.
Page 181
Configuration Guide Configuring Route Table 11-14 Instance Configuration Parameters Parameter Description Create an OSPF instance based on the service type. Instance ID The instance only takes effect locally, and does not affect packet exchange with other devices. It identifies a router in an OSPF domain. Caution Router ID Router IDs within the same domain must be unique.
Page 182
Configuration Guide Configuring Route Parameter Description default. If RIP Redistribution is selected, enter the metric, which is 20 by default. Details Expand the detailed configuration.
Page 183
Configuration Guide Configuring Route Table 11-15 Parameters in the Instance Detailed Configuration Parameter Description It is used for protocol selection. By default, the intra-area, inter-area, and external Distance distances are all 110. Frequent network changes and route flapping may occupy too much network bandwidth and device resources.
Page 184
Configuration Guide Configuring Route Parameter Description Max Interval: When the calculated interval reaches the maximum interval, the subsequent interval is always equal to the maximum interval. If the time from the last calculation exceeds the maximum interval and the LSDB is not updated, the timer is disabled.
Page 185
Configuration Guide Configuring Route Table 11-16 Interface Configuration Parameters Parameter Description Interface Select the OSPF-enabled L3 interface. Area Configure the area ID. Value range: 0-4294967295 If Stub Area is enabled, you need to configure the area type and inter-area route isolation. Stub area: Routers at the edge of the area do not Stub Area advertise routes outside the area, and the routing...
Page 187
Configuration Guide Configuring Route Table 11-17 Parameters in the Interface Detailed Configuration Parameter Description Priority It is 1 by default. Broadcast Unicast Network Type Multicast Non-Broadcast Multiple Access Interval for periodic transmission, which is used to discover and Hello Packets maintain OSPF neighbor relationship.
Page 188
Configuration Guide Configuring Route Parameter Description key is encrypted through MD5 and transmitted together with the protocol message. SHA1 auth: Verifies the protocol message. The authentication secret key is encrypted through SHA1 and transmitted together with the protocol message. SHA256 auth: Verifies the protocol message. The authentication secret key is encrypted through SHA256 and transmitted together with the protocol message.
Configuration Guide Configuring Route 3. Complete the configuration. After completing the configuration, you can choose Local Device > Routing > OSPFv3 and view the instance list. 11.6.2 Adding an OSPFv3 Interface Choose Local Device > Routing > OSPFv3, click More in the Action column, and select V3 Interface.
Configuration Guide Configuring Route 11.6.3 Managing OSPFv3 Stub Areas Choose Local Device > Routing > OSPFv3, click More in the Action column, and select V3 Stub Area Management.
Configuration Guide Configuring Route 11.6.4 Viewing OSPFv3 Neighbor Information Choose Local Device > Routing > OSPFv3, and click Neighbor Info in the Action column. 11.7 Routing Table Info...
Configuration Guide Security Security 12.1 DHCP Snooping 12.1.1 Overview The Dynamic Host Configuration Protocol (DHCP) snooping function allows a device to snoop DHCP packets exchanged between clients and a server to record and monitor the IP address usage and filter out invalid DHCP packets, including request packets from the clients and response packets from the server.
Page 193
Configuration Guide Security Enabling DHCP Snooping on network switches can ensure that users can only obtain network configuration parameters from the DHCP server within the control range, and avoid a host on the original network obtaining an IP address assigned by an unauthorized router, so as to guarantee the stability of the network. (1) Click Enable to access the DHCP Snooping Config page.
Page 194
Configuration Guide Security (3) After the configuration is delivered, if you need to modify the effective range of the anti-private connection function, click Configure to reselect the switch that enables the anti-private connection in the topology. After the configuration is delivered, if you want to modify the effective range of the DHCP Snooping function, click Configure to select desired switches in the topology again.
Configuration Guide Security 12.2 Storm Control 12.2.1 Overview When a local area network (LAN) has excess broadcast, multicast, or unknown unicast data flows, the network speed will slow down and packet transmission will have an increased timeout probability. This is called LAN storm, which may be caused by topology protocol execution errors or incorrect network configuration.
Configuration Guide Security the configured kilobytes-per-second threshold, excess data flows are discarded until the rate falls within the threshold. 12.3 12.3.1 Overview An access control list (ACL) is commonly referred to as packet filter in some documents. An ACL defines a series of permit or deny rules and applies these rules to device interfaces to control packets sent to and from the interfaces, so as to enhance security of the network device.
Page 197
Configuration Guide Security Based on MAC address: To control the L2 packets entering/leaving the port, and deny or permit specific L2 packets destined to a network. Based on IP address: To control the Ipv4 packets entering/leaving a port, and deny or permit specific Ipv4 packets destined to a network.
Page 198
Configuration Guide Security Table 12-1 Description of ACL Rule Configuration Parameters Parameter Description Configuring ACL Rules Action Block: If packets match this rule, the packets are denied. Allow: If packets match this rule, the packets are permitted. Match IP protocol number The value ranges from 0 to 255. Check All to match all IP IP Protocol Number protocols.
Configuration Guide Security 12.3.3 Applying ACL Rules Choose Local Device > Security > ACL > ACL List. Click Batch Add or Edit in the Action column, select the desired MAC ACL and IP ACL for ports, and click OK. Note Currently, ACLs can be applied only in the inbound direction of ports, that is, to filter incoming packets.
Configuration Guide Security 12.4 Port Protection Choose Local Device > Security > Port Protection. In some scenarios, it is required that communication be disabled between some ports on the device. For this purpose, you can configure some ports as protected ports. Ports that enable port protection (protected ports) cannot communicate with each other, users on different ports are L2-isolated.
Configuration Guide Security 12.5.2 Procedure Choose Local Device > Security > IP-MAC Binding. 1. Adding an IP-MAC Binding Entry Click Add, select the desired port, enter the IP address and MAC address to be bound, and click OK. At least one of the IP address and MAC address needs to be entered.
Configuration Guide Security 3. Deleting an IP-MAC Binding Entry Batch Configure: In IP-MAC Binding List, select an entry to be deleted and click Delete Selected. In the displayed dialog box, click OK. Delete one binding entry: click Delete in the Action column of the entry in the list. In the displayed dialog box, click OK.
Configuration Guide Security The search box in the upper-right corner supports finding the specified entry in Binding List based on IP addresses, MAC addresses, VLANs or ports. Click the drop-down list box to select the search type, enter the search string, and click Search. 12.6.3 Enabling Port IP Source Guard Choose Local Device >...
Configuration Guide Security 12.6.4 Configuring Exceptional VLAN Addresses Choose Local Device > Security > IP Source Guard > Excluded VLAN. When IP Source Guard is enabled on an interface, it is effective to all the virtual local area networks (VLANs) under the interface by default.
Configuration Guide Security 12.7 Configure 802.1x authentication 12.7.1 Function introduction IEEE802.1x (Port-Based Network Access Control) is a port-based network access control standard that provides secure access services for LANs. IEEE 802 LAN, as long as users can connect to network devices, they can directly access network resources without authentication and authorization.
Configuration Guide Security The client is generally a user terminal device, and the user can initiate 802.1X authentication by starting the client software. The client must support the Extensible Authentication Protocol over LANs (EAPoL). AP or switching device) that supports the 802.1x protocol. It provides a port for the client to access the LAN.
Page 207
Configuration Guide Security parameter Description If the server disconnection is detected, all users will be allowed to access Server Escape the Internet Require clients to re-authenticate at certain intervals to ensure network Re-authentication security Guest VLAN Provide a VLAN for unauthenticated clients to restrict their access EAP-Request Packet Define the number of times the EAP request message will be Retransmission Count...
Page 208
Configuration Guide Security Reference without parameter Description translation Server group name Server group name Server IP server address Radius server address. The port number used for accessing user Auth Port authentication port authentication on the Radius server. The port number used to access the accounting Accounting Port billing port process on the Radius server.
Page 209
Configuration Guide Security Parameter Description Configure the interval for the device to send request packets before Packet Retransmission Interval confirming that there is no response from RADIUS Configure the number of times the device sends request packets Packet Retransmission Count before confirming that there is no response from RADIUS If this function is enabled, you need to set "Server Detection Period", "Server Detection Times"...
Page 210
Configuration Guide Security parameter Description 802.1x Authentication When enabled, the selected interface will enable 8.02.1x authentication. disable: Turn off the authentication method, which has the same effect as turning off the 802.1x authentication switch force-auth: Mandatory authentication, the client can directly access the Internet without a password Auth Method force-unauth: force no authentication, the client cannot authenticate and...
Configuration Guide Security parameter Description Product Difference Description The value range of NBS3100 series switches is 1-256, and other switches are 1-1000 12.7.3 View the list of wired authentication users 8.02.1x function is configured on the entire network and a terminal is authenticated and connected to the network, you can view the list of authenticated users.
Page 212
Configuration Guide Security 2. Disabling Anti-ARP Spoofing Batch disable: Select an entry to be deleted in the list and click Delete Selected. Disable one port: click Delete in the Action column of the corresponding entry.
Configuration Guide Advanced Configuration Advanced Configuration 13.1 STP (Spanning Tree Protocol) is an L2 management protocol that eliminates L2 loops by selectively blocking redundant links on the network. It also provides the link backup function. 13.1.1 STP Global Settings Choose Local Device > Advanced > STP > STP. (1) Click to enable the STP function, and click OK in the displayed box.
Configuration Guide Advanced Configuration Table 13-1 Description of STP Global Configuration Parameters Default Parameter Description Value Whether to enable the STP function. It takes effect globally. STP attributes Disable can be configured only after STP is enabled. Bridge priority. The device compares the bridge priority first during root Priority 32768 bridge selection.
Page 215
Configuration Guide Advanced Configuration Table 13-2 Description of STP Configuration Parameters of Ports Default Parameter Description Value Root: A port with the shortest path to the root Alternate: A backup port of a root port. Once the root port fails, the alternate port becomes the root port immediately.
Page 216
Configuration Guide Advanced Configuration Default Parameter Description Value Disable: The port is closed manually or due to a fault, does not participate in spanning tree and does not forward data, and can be turned into a blocking state after initialization or opening. Blocking: A port in the blocking state cannot forward data packets or learn addresses, but can send or receive configuration BPDUs and send them to the CPU.
Configuration Guide Advanced Configuration Note It is recommended to enable Port Fast on the port connected to a PC. A port switches to the forwarding state after STP is enabled more than 30 seconds. Therefore transient disconnection may occur and packets cannot be forwarded. 13.2 LLDP 13.2.1...
Configuration Guide Advanced Configuration Parameter Description Default Value TTL multiplier of LLDP In LLDP packets, TTL TLV indicates the TTL of local information on a neighbor. The value of TTL TLV is calculated using the following Hold Multiplier formula: TTL TLV = TTL multiplier x Packet transmission interval + 1. The TTL TLV value can be modified by configuring the TTL multiplier and LLDP packet transmission interval.
Configuration Guide Advanced Configuration Send LLDPDU: After Send LLDPDU is enabled on a port, the port can send LLDPDUs. Receive LLDPDU: After Receive LLDPDU is enabled on a port, the port can receive LLDPDUs. LLDPMED: After LLDPMED is enabled, the device is capable of discovering neighbors when its peer endpoint supports LLDP-MED (the Link Layer Discovery Protocol-Media Endpoint Discovery).
Configuration Guide Advanced Configuration 13.3 RLDP 13.3.1 Overview The Rapid Link Detection Protocol (RLDP) is an Ethernet link failure detection protocol, which is used to rapidly detect unidirectional link failures, bidirectional link failures, and downlink loop failures. When a failure is found, RLDP automatically shuts down relevant ports or asks users to manually shut down the ports according to the configured failure handling methods, to avoid wrong forwarding of traffic or Ethernet L2 loops.
Configuration Guide Advanced Configuration 13.3.2 Standalone Device Configuration 1. RLDP Global Settings Choose Local Device > Advanced > RLDP > RLDP Settings. (1) Enable the RLDP function and click OK in the displayed dialog box. The RLDP function is disabled by default. (2) Configure RLDP global parameters and click Save.
Page 222
Configuration Guide Advanced Configuration Block: After alerting the fault, set the faulty port not to forward the received packets Shutdown port: After alerting the fault, shutdown the port. Caution When RLDP is applied to an aggregate port, the Action can only be set to Warning and Shutdown. ...
Configuration Guide Advanced Configuration 13.3.3 Batch Configuring Network Switches Choose Network-Wide > Workspace > Wired > RLDP (1) Click Enable to access the RLDP Config page. (2) On the networking topology, you can select the access switches on which you want to enable RLDP in either recommended or custom mode.
Page 224
Configuration Guide Advanced Configuration (3) After the configuration is delivered, if you want to modify the effective range of the RLDP function, click Configure to select desired switches in the topology again. Turn off RLDP to disable RLDP on all the switches with one click.
Configuration Guide Advanced Configuration 13.4 ERPS Note RG-NIS3100, RG-NBS3100, RG-NBS3200, RG-NBS5100, RG-NBS5200, and RG-NBS5300 series switches running ReyeeOS 2.280.0.1621 or later support ERPS. RG-NBS6000 and RG-NBS7000 series switches running ReyeeOS 2.280.0.1718 or later support ERPS. 13.4.1 Overview Ethernet Ring Protection Switching (ERPS), also known as G.8032, is a ring protection protocol developed by the International Telecommunication Union (ITU).
Configuration Guide Advanced Configuration Control VLAN: Also known as the Ring Auto Protection Switching VLAN (R-APS VLAN) for transmitting ERPS protocol packets. On a device, the ports connecting to an ERPS ring belong to a control VLAN, and only such ports can be added to a control VLAN.
Page 227
Configuration Guide Advanced Configuration In practice, a network is a combination of multiple basic topologies, with multiple major rings and multiple subrings. 3. Node According to the different topological relationships between nodes and Ethernet rings, nodes are classified into single-ring nodes, tangent nodes, and intersecting nodes by role. ...
Configuration Guide Advanced Configuration 13.4.4 RPL and Nodes An Ethernet ring can be in either of the following two states regardless of whether it is a major ring or subring: Idle state: The physical links in the entire ring network are connected. ...
Configuration Guide Advanced Configuration device detects that a link failure is cleared, it sends link recovery packets and starts the Guard timer. Before the timer expires, all packets except Flush packets indicating a subring topology change will be discarded. WTR timer: The timer is effective only for RPL owner nodes.
Page 231
Configuration Guide Advanced Configuration Figure 13-4 Adding an ERPS Ring Table 13-6 Parameter Description Default Parameter Description Value Specifies the ID of an ERPS instance. Control VLAN It is used to forward ERPS protocol packets. Indicates the type of the ERPS ring. The ring can be a major ring or Type a sub ring.
Page 232
Configuration Guide Advanced Configuration The values of a port role include: NORMAL: Indicates a normal node. RPL OWNER: Indicates an RPL owner node. RPL NEIGHBOR: Indicates an RPL neighbor node. Sub Ring VLAN Specifies the control VLAN of a sub ring. WTR Timer Specifies the interval of the WTR timer.
Configuration Guide Advanced Configuration Figure 13-6 Link Switch Table 13-7 Parameter Description Parameter Description Default Value Specifies the ID of an ERPS instance. Specifies the port in the ERPS ring. The values include West Port Port and East Port. Specifies the link state of the selected port. The values include Clear and Block.
Page 234
Configuration Guide Advanced Configuration Topology 3. Notes To prevent loops, configure ERPS before performing cable connections. For an ERPS ring, only one interface can be the RPL Owner, and its peer interface must be the RPL Neighbor. 4. Procedure (1) Choose Network-Wide > Workspace > Wired > ERPS Ring to access the ERPS Ring configuration page. (2) Click +Add on the page to add an ERPS ring.
Page 235
Configuration Guide Advanced Configuration (3) As shown in the following figure, set the ERPS ring parameters (only ID and Control VLAN are mandatory, and should be configured according to the user's network setup. Other parameters can be left at their default values).
Page 236
Configuration Guide Advanced Configuration (4) As shown in the following figure, select a device for the ERPS ring, set the Gi5 to RPL OWNER, and Gi6 to NORMAL. Click Next. (5) As shown in the following figure, click Save to save the configuration. (6) As shown in the following figure, choose Network-Wide >...
Page 237
Configuration Guide Advanced Configuration (7) As shown in the following figure, click Next to access the ERPS Ring Configuration page. (8) As shown in the following figure, add the remaining devices on the ERPS Ring Configuration page. Select the optical ports on the devices and configure the interfaces connected to the RPL OWNER as RPL NEIGHBOR, following the example of Gi52 in the figure below.
Page 238
Configuration Guide Advanced Configuration (9) As shown in the following figure, click Save to apply all configurations.
Configuration Guide Advanced Configuration (10) As shown in the figure below, after all cables are connected according to the topology, the devices will automatically form an ERPS ring. 13.5 Note RG-NIS3100, RG-NBS3100, RG-NBS3200, RG-NBS5100, RG-NBS5200, and RG-NBS5300 series switches running ReyeeOS 2.280.0.1621 or later support QoS. ...
Configuration Guide Advanced Configuration 13.5.2 Principles 1. Basic Concepts DiffServ model The differentiated services (DiffServ) model classifies all packets transmitted on a network into different types. The classification information related to QoS priority marking is recorded in some fields of L2 or L3 packets, for example, the PRI field of IEEE 802.1Q frames, type of service (ToS) field of IPv4 packets, traffic class (TC) field of IPv6 packets, and the MPLS experimental bits (EXP) field of multiprotocol label switching (MPLS) packets.
Page 241
Configuration Guide Advanced Configuration IPv4 packets use the ToS field in the IP header to indicate the priority of the packets, as shown in Figure 13-9. Figure 13-9 ToS Field in the IP Header 6 bits DSCP Precedence 8 bits Header Version Type of Service...
Page 242
Configuration Guide Advanced Configuration Table 13-8 Interface Trust Mode and Priority Mapping Trust Mode Priority Mapping The device does not trust any priority information carr ed in the packet. A packet received by the interface is assigned to a queue based on the 802.1p-queue mapping table using the 802.1p value (interface priority) configured for the interface.
Configuration Guide Advanced Configuration SP scheduling policy In strict-priority (SP) scheduling, packets are scheduled strictly based on their queue priorities from high to low (a larger queue ID indicates a higher priority). Before sending a packet, check whether there is a packet to be sent in a high-priority queue.
Page 244
Configuration Guide Advanced Configuration Table 13-9 Global Configuration Parameter Description Default Parameter Description Value Priority designations of an inbound packet: Untrusted Mode: The device does not trust any priority information carried in the packet, and uses the interface priority as the 802.1p value of the packet.
Page 245
Configuration Guide Advanced Configuration Default Parameter Description Value An output queue mapping table, which contains the mappings between the queue ID and the DSCP value. The DSCP value of packets in the output As shown Queue-DSCP queue is re-marked based on the mapping. For example, if the queue ID is inTable Mapping Table 0, and the mapped DSCP value is 8, then the DSCP value of packets in...
Page 246
Configuration Guide Advanced Configuration DSCP Value Queue ID 56–63 Table 13-12 Default Queue–802.1p Mapping Table of the Device Queue ID 802.1p Value After Remarking Table 13-13 Default Queue-DSCP Mapping Table of the Device Queue ID DSCP Value After Re-marking Port Settings In local device mode, choose Advanced >...
Page 247
Configuration Guide Advanced Configuration Table 13-14 Port Configuration Parameter Description Default Parameter Description Value Interface priority. When the device is in untrusted mode, packets are Priority assigned to a queue based on this priority, which is equivalent to the 802.1p value of a packet. Priority designations of an inbound packet: Disable: The device does not trust any priority information carried in the packet, and uses the interface priority as the 802.1p value of the packet.
Configuration Guide Advanced Configuration Enable: The 802.1p value of packets in the queue is re-marked based on the Queue-802.1p Mapping Table. 802.1p Remarking Enable Disable: The device does not re-mark the 802.1p value of packets in the queue based on the Queue-802.1p Mapping Table, and marks the priority of the outgoing packets based on the priority of the input queue.
Configuration Guide Advanced Configuration 13.7 Voice VLAN 13.7.1 Overview A voice virtual local area network (VLAN) is a VLAN dedicated to voice traffic of users. By creating a voice VLAN and adding ports connected to voice devices to the voice VLAN, you can have voice data transmitted in the voice VLAN and deliver specified policy of the quality of service (QoS) for voice streams, to improve the transmission priority of voice traffic and ensure the call quality.
Configuration Guide Advanced Configuration Table 13-16 Description of VLAN Global Configuration Parameters Parameter Description Default Value Voice VLAN Whether to enable the Voice VLAN function Disable VLAN VLAN ID as Voice VLAN Aging time of voice VLAN, in minutes. In automatic mode, after the MAC address in a voice packet ages, if the port does not receive any Max Age 1440 minutes...
Configuration Guide Advanced Configuration 13.7.4 Configuring the Voice VLAN Function on a Port Choose Local Device > Advanced > Voice VLAN > Port Settings. Click Edit in the port entry or click Batch Edit on the upper -right corner. In the displayed dialog box, select whether to enable the voice VLAN function on the port, voice VLAN mode to be applied, and whether to enable the security mode, and Click OK.
Page 252
Configuration Guide Advanced Configuration Table 13-17 Description of the Voice VLAN Configuration Parameters on a Port Parameter Description Default Value Based on different ways the Voice VLAN function is enabled on the port, the Voice VLAN Mode can be Auto Mode or Manual Mode: Auto Mode: In this mode, the device checks whether the permit VLANs of a port contain the voice VLAN after the voice VLAN function is enabled on the port.
Configuration Guide Advanced Configuration After the voice VLAN function is enabled on a port, do not switch the L2 mode (trunk or access mode) of the port to ensure normal operation of the function. If you need to switch the L2 mode of the port, disable the voice VLAN function on the port first.
Configuration Guide Advanced Configuration 13.8.3 Active/Standby Switchover Active/Standby Switchover allow manual switching between the active and standby supervisor engines. Clicking the Switch button will restart the supervisor engine. Please exercise caution.
Configuration Guide Diagnostics Diagnostics 14.1 Info Center Choose Local Device > Diagnostics > Info Center. In Info Center, you can view port traffic, VLAN information, routing information, client list, ARP list, MAC address, DHCP snooping, IP-MAC binding, IP Source Guard, and CPP statistics of the device and relevant configurations. 14.1.1 Port Info Choose Local Device >...
Configuration Guide Diagnostics 14.1.2 VLAN Info Choose Local Device > Diagnostics > Info Center > VLAN Info. Display SVI port and routed port information, including the port information included in the VLAN, the port IP address, and whether the DHCP address pool is enabled. Note ...
Configuration Guide Diagnostics Note To set up static routes, see 6.3. 14.1.4 DHCP Clients Caution If the device does not support L3 functions (such as RG-NBS3100 Series and RG-NBS3200 Series Switches), this type of information is not displayed. Choose Local Device > Diagnostics > Info Center > DHCP Clients. Displays the IP address information assigned to endpoints by the device as a DHCP server.
Configuration Guide Diagnostics 14.1.6 MAC Address Choose Local Device > Diagnostics > Info Center > MAC. Displays the MAC address information of the device, including the static MAC address manually configured by the user, the filtering MAC address, and the dynamic MAC address automatically learned by the device. Note To configure and manage the MAC address, see 3.3.
Configuration Guide Diagnostics 14.1.8 IP-MAC Binding Choose Local Device > Diagnostics > Info Center > IP-MAC Binding. Displays the configured IP-MAC binding entries. The device checks whether the source IP addresses and source MAC addresses of IP packets match those configured for the device and filters out IP packets not matching the binding.
Configuration Guide Diagnostics 14.1.10 Caution Only PoE switches (model name containing –P, -LP, -HP, and -UP) support this function. Choose Local Device > Diagnostics > Info Center > PoE. 14.1.11 CPP Info Choose Local Device > Diagnostics > Info Center > CPP. Displays the current total CPU bandwidth and statistics of various packet types, including the bandwidth, current rate, and total number of packets.
Configuration Guide Diagnostics 14.2 Network Tools The Network Tools page provides three tools to detect the network status: Ping, Traceroute, and DNS Lookup. 14.2.1 Ping Choose Local Device > Diagnostics > Network Tools. The Ping command is used to detect the network connectivity. Select Ping as the diagnosis mode, enter the destination IP address or website address, configure the ping count and packet size, and click Start to test the network connectivity between the device and the IP address or website.
Configuration Guide Diagnostics 14.2.2 Traceroute Choose Local Device > Diagnostics > Network Tools. The Traceroute function is used to identify the network path from one device to another. On a simple network, the network path may pass through only one routing node or none at all. On a complex network, packets may pass through dozens of routing nodes before reaching their destination.
Configuration Guide Diagnostics 14.2.3 DNS Lookup Choose Local Device > Diagnostics > Network Tools. DNS Lookup is used to query the information of network domain name or diagnose DNS server problems. If the device can ping through the IP address of the Internet from your web page but the browser cannot open the web page, you can use the DNS lookup function to check whether domain name resolution is normal.
Configuration Guide Diagnostics 14.3 Fault Collection Choose Local Device > Diagnostics > Fault Collection. When an unknown fault occurs on the device, you can collect fault information by one click on this page. Click Start. The configuration files of the device will be packed into a compressed file. Download the compressed file locally and provide it to R&D personnel for fault locating.
Configuration Guide Diagnostics Caution The SPF port does not support the function. If a detected port contains an uplink port, the network may be intermittently disconnected. Exercise caution when performing this operation. 14.5 System Logs Choose Local Device > Diagnostics > System Logs. System logs record device operations, operation time, and operation modules.
Page 266
Configuration Guide Diagnostics Displays possible problems on the network environment to facilitate fault prevention and troubleshooting. You can view the alert occurrence time, port, alert impact, and handling suggestions, and rectify device faults according to handling suggestions. All types of alerts are concerned by default. You can click Unfollow to unfollow this type of alert. The system will no longer display this type of alert.
Page 267
Configuration Guide Diagnostics Alert Type Description Support Description function. (The device models are marked with "-P".) It is applicable only to NBS Series Switches that support the PoE The total PoE power of the device is The total PoE power is function.
Configuration Guide System Configuration System Configuration 15.1 Setting the System Time Choose Local Device > System > System Time. You can view the current system time. If the time is incorrect, check and select the local time zone. If the time zone is correct but time is still incorrect, click Edit to manually set the time.
Configuration Guide System Configuration Enter the old password and new password. After saving the configuration, use the new password to log in. Caution When self-organizing network discovery is enabled, the login password of all devices on the network will be changed synchronously.
Configuration Guide System Configuration 15.4.2 Global Configuration 1. Overview The purpose of global configuration is to enable the SNMP service and make the SNMP protocol version (v1/v2c/v3) take effect, so as to achieve basic configuration of local port, device location, and contact information. SNMP v1: As the earliest version of SNMP, SNMP v1 has poor security, and only supports simple community string authentication.
Configuration Guide System Configuration Table 15-1 Global Configuration Parameters Parameter Description SNMP Server Indicates whether SNMP service is enabled. SNMP Version Indicates the SNMP protocol version, including v1, v2c, and v3 versions. Local Port The port range is 1 to 65535. 1-64 characters.
Page 272
Configuration Guide System Configuration A view can have multiple subtrees. The management system can only access MIB nodes in these subtrees, and cannot access other unauthorized MIB nodes. This can prevent unauthorized system administrators from accessing sensitive MIB nodes, thereby protecting the security of network devices. Moreover, views can also improve the efficiency of network management and speed up the response from the management system.
Page 273
Configuration Guide System Configuration Parameter Description Excluded rules allow access to all OIDs except those in the OID range. Click Add Excluded Rule to configure this type of view. Note At least one OID rule must be configured for a view. Otherwise, an alarm message will appear. (1) Click OK.
Page 274
Configuration Guide System Configuration (2) Add a v1/v2c user. Table 15-3 v1/v2c User Configuration Parameters Parameter Description At least 8 characters. It must contain at least three character categories, including uppercase and lowercase letters, digits, and special characters. Community Name Admin, public or private community names are not allowed.
Page 275
Configuration Guide System Configuration 3. Configuring v3 Groups Overview SNMP v3 introduces the concept of grouping to achieve better security and access control. A group is a group of SNMP users with the same security policies and access control settings. With SNMP v3, multiple groups can be configured, each with its own security policies and access control settings.
Page 276
Configuration Guide System Configuration Table 15-4 v3 Group Configuration Parameters Parameter Description Indicates the name of the group. 1-32 characters. Group Name Chinese characters, full-width characters, question marks, and spaces are not allowed. Indicates the minimum security level (authentication and encryption, Security Level authentication but no encryption, no authentication and encryption) of the group.
Page 277
Configuration Guide System Configuration Note Select the SNMP protocol version, and click Save. The corresponding configuration options will appear on the View/Group/Community/User Access Control page. Configuration Steps Choose Local Device > System > SNMP > View/Group/Community/Client Access Control (2) Click Add in the SNMP v3 Client List pane to add a v3 user. (3) Configure v3 user parameters.
Configuration Guide System Configuration Parameter Description Group Name Indicates the group to which the user belongs. Indicates the security level (authentication and encryption, authentication Security Level but no encryption, and no authentication and encryption) of the user. Authentication protocols supported: MD5/SHA/SHA224/SHA256/SHA384/SHA512.
Page 279
Configuration Guide System Configuration Item Description "system". For SNMP v2c, the custom community name is "public", and the default Version port number is 161. Read & write permission Read-only permission. Configuration Steps (1) Choose Local Device > System > SNMP > Global Config, select v2c and set other settings as default. Then, click Save.
Page 280
Configuration Guide System Configuration (2) Click Add in the SNMP v1/v2c community name list, fill in the community name, access mode and view in the pop-up window, and click OK after the operation is completed. 2. v3 version SNMP service configuration ...
Page 281
Configuration Guide System Configuration According to the user's application scenario, the requirements are shown in the following table: Table 15-7 User Requirements Description Form Item Description Included rule: the OID is .1.3.6.1.2.1, and the custom view name is View range "public_view".
Page 282
Configuration Guide System Configuration Click Add in the View List pane. Enter the view name and OID in the pop-up window, and click Add Included Rule. Click OK. (3) Click Add in the SNMP v3 group list, fill in the group name and security level in the pop-up window, the user has read and write permissions, select "public _view"...
Configuration Guide System Configuration (4) Click Add in the SNMP v3 user list, fill in the user name and group name in the pop-up window, the user security level adopts authentication and encryption mode, fill in the corresponding authentication protocol, authentication password, encryption protocol, and encryption password, and click OK.
Page 284
Configuration Guide System Configuration performance reports, configuration reports and security management. Trap can provide real-time network monitoring and fault diagnosis to help administrators find and solve network problems in time. 1. Trap open settings Enable the trap service and select the effective trap protocol version, including v1, v2c, and v3. Choose Local Device >...
Page 285
Configuration Guide System Configuration Prerequisites When the trap service version selects v1 or v2c, a trap v1v2c user needs to be created. Configuration Steps Choose Local Device > System > SNMP > Trap setting. (1) Click Add in the Trap v1v2c User list to create a trap v1v2c user. (2) Configure trap v1v2c user-related parameters.
Page 286
Configuration Guide System Configuration Parameter Description Question marks, spaces, and Chinese characters are not allowed. Note The destination host IP address of trap v1/ v1/v2c users cannot be the same. Community names of trap v1/ v1/v2c users cannot be the same. (3) Click OK.
Configuration Guide System Configuration Table 15-9 trap v3 user information description table Parameter Description Dest Host IP IP address of the trap peer device. An IPv4 or IPv6 address is supported. Port ID The port range of the trap peer device is 1 to 65535. Name of the trap v3 user.
Page 288
Configuration Guide System Configuration destination ip 1 92.1 68.110.85 and port number 1 66, so that the device sends a trap of the v2c version in case of an exception. Configuration Specification According to the analysis of the user's usage scenario, the requirements are shown in the table: Table 15-10 User Requirements Description Form Item...
Page 289
Configuration Guide System Configuration 2. V3 version trap configuration Application Scenarios When the user is monitoring the device, if the device is suddenly interrupted or abnormal, the third-party monitoring software cannot detect and deal with the abnormal situation in time, and the device with the destination ip of 1 92.1 68.110.87 and the port number of 1 67 is configured, and use the more secure v3 version to send traps.
Configuration Guide System Configuration (2) Click Add in the trap v3 user list. (3) Fill in the target host IP, port number, user name and other information, and click OK after the configuration is complete. 15.5 Configuration Backup and Import Choose Local Device >...
Configuration Guide System Configuration 15.6 Reset 15.6.1 Resetting the Device Choose Local Device > System > Management > Reset. Click Reset, and click OK to restore factory settings. Caution Resetting the device will clear current settings and reboot the device. If a useful configuration exists in the current system, you can export the current configuration (see 10.4) before restoring the factory settings.
Configuration Guide System Configuration Caution Resetting the network will clear current settings of all devices on the network and reboot the devices. Exercise caution when performing this operation. 15.7 Rebooting the Device 15.7.1 Rebooting the Device Choose Self-Organizing Mode > Network > System > Management > Reset. Choose Standalone Mode >...
Configuration Guide System Configuration Caution It will take some time for the network to reboot, please be patient. The network operation will affect the entire network. Therefore, exercise caution when performing this operation. 15.7.3 Rebooting Specified Devices on the Network Choose Network >...
Configuration Guide System Configuration Choose Self-Organizing Mode > Network > System> Scheduled Reboot. Choose Standalone Mode > System > Scheduled Reboot. Click Enable, and select the date and time of scheduled reboot every week. Click Save. When the system time matches the scheduled reboot time, the device will restart.
Additionally, it also offers various components such as real-name authentication, dedicated Wi-Fi, and passenger flow analysis, allowing for flexible expansion of network services. By configuring Cloud Service, you can conveniently mange networks through Ruijie Cloud or the Ruijie Reyee app.
If the device is not currently associated with a cloud account, simply follow the on-screen instructions to add it to the network. Open up the Ruijie Reyee app, click the scan icon at the upper left corner on the Project page, and enter the device's management password.
Configuration Guide System Configuration To change the Cloud Service configurations, select the cloud server from the Cloud Server drop-down list, enter the domain name and IP address, and click Save. Note If the server selected is not Other Cloud, the system automatically fills in the domain name and IP address of the cloud server.
Need help?
Do you have a question about the Reyee RG-NBS Series and is the answer not in the manual?
Questions and answers