Page 2
About This Document This product includes three documents as the table below. Documents Description How to get it Including product introductions and In the packing box or contact Quick Guide installation steps. your dealer. Web-based Including Web network management Please contact your dealer. Configuration Guide system configuration instructions.
Page 3
Change History Updates between document issues are cumulative. Therefore, the latest document issue contains all updates made in previous issues. Version State Release Date Descriptions V1.0 Released 2018-12-04 Initial commercial release. V2.0 Released 2023-02-22 WEB GUI update to a new version.
Page 4
Content Hardware Requirements ................... 1 Software Requirements .................... 1 Set Static IP for the Management Computer ............2 Confirm the Network Connection by Ping Command ..........4 Web System Overview ..................... 5 Login and Start ......................6 Web System User Interface ..................7 Saving Configuration ....................
Page 5
10.1 IGMP Snooping......................35 11.1 802.1x Authentication ....................36 11.2 Local RADIUS Database ..................38 11.3 AAA ........................... 38 11.4 Static Address Lock ....................39 11.5 MAC Dynamic Aging ....................40 11.6 MAC ACL ........................40 11.7 IP Stand ACL ......................41 11.8 IP Extend ACL......................
Page 6
Configuration Instruction To facilitate configuration and the maintenance of the device, the Web system is provided to users. You can log in to the Web system to configure and maintain devices through the graphic user interface (GUI). The Web-based configuration guide describes the configuration and maintenance of the device through the Web system.
Page 7
Set Up Network Connection Before login the Web system to start configuration, users need to set up the network connection as follow steps. Set the IP of the PC and the switch in the same network segment. The default IP address of the switch is 192.168.1.200, network gate is 255.255.255.0.
Page 8
Select <Internet protocol version 4(TCP/IPv4)>, click <properties> button, enter “Internet Protocol Version 4(TCP/IPv4) Properties” window. Select the option “Use the following IP address”, input IP address (use arbitrary value between 192.168.1.2 ~ 192.168.1.254, besides 192.168.1.200) and the subnet mask (255.255.255.0). Click <OK> to save the configuration. Click <OK>...
Page 9
Confirm the Network Connection by Ping Command Operation Steps as below: Right click <Start> button and select <Run>, type in “cmd” and click <OK> popping out the dialog. Type in "ping 192.168.1.200", and press enter. If there is equipment displaying in the pop out dialog, that means network connection succeed, otherwise please check if the network connection is correct.
Page 10
Login the Web system Web System Overview The Web system provides the functions as below. System State Port Configuration Ethernet Switch IP Service IP Routing IP Multicast Security Configuration Reliability Network Diagnosis ...
Page 11
Login and Start Open the browser, input the switch default address. Press Enter, the user login page will show in front of you as follows. Items Default value Switch default address 192.168.1.200 Subnet mask 255.255.255.0 Administrator’s account admin Administrator’s password admin Input Administrator’s account and password, press Enter, and click <Login in>, the Web system page will be shown as below:...
Page 12
Web System User Interface Interface Layout The layout and style of the Web system client GUI are described as follows. Items Descriptions Navigation tree Your Position Configuration area Operation Field and Buttons The elements that users usually use on the Web system GUI are described as follows. Items Descriptions Input box.
Page 13
Saving Configuration After performing configuration, users need to save the configuration data. If you do not save the configuration data, the configuration that you made will be lost after reboot. To save configurations, please click the <Save> button at the bottom of the page to save the configuration data to memory.
Page 14
System State System Status Users can query the main information of the device, including device name, MAC address, firmware version, hardware version, system time, update time, memory information and CPU information. Traffic Statistics Users can view traffic statistics on interfaces and update the statistics. Procedure Click <Refresh>...
Page 15
Procedure 1) Click the drop down list to select the sort type, including Automatic By MAC Address By VLAN By port 2) Click <Refresh> button to reload the page.
Page 16
Port Configuration Port Setting Users can view the basic attributes of Ethernet interfaces, and configure the Ethernet interfaces as required. Procedure Choose <Port Configuration> <Port Setting> in the navigation tree to open the page. 1) Configure the interfaces. Set the parameters as required. Items Descriptions Default value...
Page 17
interface. To disable an interface from sending and receiving packets at the same time, enable the half duplex mode on the interface. A Gigabit Ethernet electrical interface can work in full duplex, half duplex, or auto-negotiation mode. However, if the speed is set to 1000 Mbit/s, the duplex mode must be full duplex or auto-negotiation.
Page 18
Items Descriptions Default value Speed Limit Choose <Enable> to enable the function. Disable Port Range Input the ports numbers that need to be set. Multiple Null interfaces can be selected. The value ranges from 1~X(X is the maximum number of ports on the switch). Format as “2”...
Page 19
Broadcast Configure the broadcast storm control. Null Storm The value ranges from 1~1000. Multicast Configure the multicast storm control. Null Storm The value ranges from 1~1000. Unicast Configure the unicast storm control. Null Storm The value ranges from 1~1000. Click <Modify> to change the configuration. ...
Page 20
Click <Save>. 2) View the isolation modes of the ports. Click the <Refresh> button to reload the page. View the information. LLDP Configuration The switch supports the Link Layer Discovery Protocol (LLDP) that conforms to IEEE 802.1ab. LLDP is a link layer protocol used for interconnected devices to obtain the connection information of each other.
Page 21
Interval Time Interval between sending LLDP packets When the LLDP status of the device keeps unchanged or the device does not discover new neighbors, the device sends LLDP packets to the neighbors at a certain interval. Port LDP configuration. Items Descriptions Default value...
Page 22
Procedure Choose <Port Configuration> <PoE Setting> in the navigation tree to open the page. 1) Set global PoE parameters. Set the parameters as required. Items Descriptions Default value Power Input the maximum provided power of the device. Depends on Provided the model Overload...
Page 23
Items Descriptions Power Status Consumed The total actual output power of all the interfaces. Remaining The actual remained input power of the device, not including the reserved power. Reserved The actual reserved power of the device. The value is equal to the value of <Power Provided> minus <Remaining>.
Page 24
Ethernet Switch Link Aggregation Link aggregation is a technology that bundles a group of physical interfaces into a logical interface to increase link bandwidth. As the network scale expands increasingly, users propose increasingly higher requirements on the bandwidth and reliability of backbone links. Traditional technologies often use high-speed cards or devices supporting high-speed interface cards to increase the bandwidth.
Page 25
Click <Save>. 2) Delete trunk. Choose the trunk that need to be deleted. Click <Delete>. Click <Save>. 802.1Q VLAN The VLAN technology enables a physical LAN to be divided into multiple broadcast domains, each of which is called a VLAN. The Ethernet technology is used to share communication media and data based on the Carrier Sense Multiple Access/Collision Detection (CSMA/CD).
Page 26
1) Configure the link-type of interfaces. Set the parameters as required. Items Descriptions Default value Port Range Input the ports numbers that need to be set. Multiple Null interfaces can be selected. The value ranges from 1~X(X is the maximum number of ports on the switch). Format as “2”...
Page 27
Procedure Choose <Ethernet Switch> <802.1p QoS> in the navigation tree to open the page. 1) Configure the QoS of the device. Set the parameters as required. Items Descriptions Default value QoS Setting Choose <Enable> to enable the QoS function. Disable QoS Priority Choose the mode of QoS priority, including...
Page 28
DSCP QoS Configure DSCP to maps DSCP priorities of packets to new DSCP priorities so that it can provide differentiated services. The function is disable by default. Procedure Choose <QoS> <DSCP> in the navigation tree to open the page. 1) Enable the DSCP Priority Mapping function. 2) Set the DSCP function.
Page 29
Weighted round robin (WRR) scheduling ensures that packets in all the queues are scheduled in turn. By default, eight queues are configured on the switch. Each queue is set with a weight value, namely, Queue 1, Queue 2, Queue 3, Queue 4, Queue 5, Queue 6, Queue 7, and Queue 8. The weight represents the percentage of obtaining resources.
Page 30
Procedure Choose <Ethernet Switch> <Voice VLAN> in the navigation tree to open the page. 1) Create a Voice VLAN. Items Descriptions Default value Voice VLAN Choose <Enable> to enable the function. Disable Setting Mode Choose the mode: Manual · Manual ·...
Page 31
IP Service Interface IP The Internet Protocol (IP) is the core protocol in the TCP/IP protocol suite. Data of TCP, UDP, ICMP and IGMP protocols is transmitted in IP packets. Devices on different network segments communicate with each other using network-layer address, that is, IP addresses. An IP address is a 32-bit address used on the Internet.
Page 32
Click <Modify>. Click <Save>. 3) Delete the IP address Select the IP Address that need to be deleted. Click <Delete>. Click <Save>. DHCP Server DHCP is a technology used to dynamically manage and configure clients in a concentrated manner. The client applies to the server for configurations such as the IP address, subnet mask, and default gateway, and the server replies with corresponding configurations according to policies.
Page 33
Client Lease Indicates the lease of dynamic IP addresses. The 86400 Time default lease is 86400s (1 day). The value ranges from 3600 to 86400 s. Preferred Indicates the main IP address of a DNS server. 192.168.1.1 DNS Address Backup DNS Indicates the backup IP address of a DNS server.
Page 34
DHCP Snooping Configure the trust port of IPv4. Procedure Choose <IP Service> <DHCP Snooping> in the navigation tree to open the page. 1) Enable DHCP Snooping. Set the trust port. Items Descriptions Default value Port Trust Select to trust the port or not. No Trust Port Range Input the port number.
Page 35
Procedure Choose <IP Service> <DHCP Relay> in the navigation tree to open the page. 1) Enable DHCP Relay. 2) Input the DHCP Server Address. Items Descriptions Default value DHCP Server IP address of the DHCP server to be relayed. Null Address DHCP VLAN VLAN of the DHCP server to be relayed.
Page 36
1) Add the Static ARP. Items Descriptions Default value IP Address IP address of the unicast. Null MAC Address MAC address mapped to the IP address. Null Network VLAN ID of the interface. Interface(VID) This parameter is not able to be set. Physical Interface The physical port number mapped to the parameter.
Page 37
IP Routing RIP is a simple Interior Gateway Protocol (IGP) used in small-scale networks, such as campus networks and regional networks with simple structure. Users can configure RIP, delete the network segment as required and view the configuration. Procedure Choose <IP Routing> <RIP> in the navigation tree to open the page. 1) Create the RIP routing ...
Page 38
OSPF By building OSPF networks, users can enable OSPF to discover and calculate routes in Autonomous Systems. OSPF is applicable to a large-scale network that consists of hundreds of devices. Users can configure the OSPF network, delete the network segment as required and view the configuration.
Page 39
Routing Table A router forwards packets by using a routing table. Each router saves a routing table. Each entry in the routing table contains a physical interface of the router, and the router sends packets to the physical interfaces. Users can configure the static routing tables and view the information of the routing table. Procedure Choose <IP Routing>...
Page 40
IP Multicast IGMP Snooping 10.1 Internet Group Management Protocol Snooping (IGMP-Snooping) is a Layer 2 IPv4 multicast protocol. The IGMP-Snooping protocol maintains information about the outgoing interfaces of multicast packets by snooping multicast protocol packets exchanged between the Layer 3 multicast device and user hosts.
Page 41
VLAN ID Enter the VLAN ID of the interfaces. The value is an Null integer ranging from 1 to 4094. Port Range Select the interfaces or input the ports numbers that Null need to be set. Multiple interfaces can be selected. The value ranges from 1~X(X is the maximum number of ports on the switch).
Page 42
Procedure Choose <Security Configuration> <802.1x Authentication> in the navigation tree to open the page. 1) Enable the function. 2) Configure the global parameters. Items Descriptions Default value Input the authentication timer, the value Timing Update Authentication 3600s ranges from 60~40,000,000s. Choose the radius server, including two types: Radius Server...
Page 43
Port Control Support <Mac Based> only. Mac Based Mode Maximum Input the maximum user quantity, the Null User Number value ranges from 1 to 4096. Select the interfaces or input the ports Null Port Range numbers that need to be set. ...
Page 44
Static Address Lock 11.4 A MAC address table records the MAC address, interface number, and VLAN ID of the device connected to the device. Each device maintains a MAC address table. A MAC address table records the MAC address, interface number, and VLAN ID of the connected devices. When forwarding a data frame, the device searches the MAC table for the outbound interface according to the destination MAC address in the frame.
Page 45
2) Delete the static MAC table. Choose the record that need to be deleted. Click <Delete>. Click <Save>. 3) View the static MAC table. Click <Refresh> to reload the page. View the information. MAC Dynamic Aging 11.5 After the aging time of dynamic MAC address entries is set, the device can delete unneeded MAC address entries to prevent sharp increase of MAC address entries.
Page 46
Procedure Choose <Security Configuration> <MAC ACL> in the navigation tree to open the page. 1) Create MAC ACL Rule Items Descriptions Default value Access Name Indicate the MAC ACL. Null · Source MAC Any: allow all the MAC address access. Null ·...
Page 47
Action Indicate whether permit or deny or rate-limit the packets. Deny Click <Add>. Click <Save>. 2) Delete IP standard ACL Rule Select the rule that need to be deleted in the list. Click <Delete> and click <Save> button. IP Extend ACL 11.8 Users can create or delete IP extend ACL rule.
Page 48
“2” or “1-5” or “5,1-3”. Action Indicate whether permit or deny or rate-limit the packets. Deny Click <Add>. Click <Save>. 2) Delete IP standard ACL Rule Select the rule that need to be deleted in the list. Click <Delete> and click <Save> button.
Page 49
Reliability Rapid Spanning Tree 12.1 RSTP is the abbreviation of Rapid Spanning Tree Protocol. This protocol provides the same function as STP, and is completely backward compatible with 802.1D STP. Relative to the STP, the most important feature is "fast", if a LAN within the bridge are supported RSTP protocol, and the administrator configured properly, once the network topology changes, and to regenerate the topology tree only need not more than 1 second time (traditional STP takes about 50 seconds).
Page 50
functions as a root bridge. Low-performance devices at lower network layers are not fit to serve as a root bridge. Therefore, set low priorities for these devices. A smaller value of the priority indicates a higher priority of the switching device. The switching device with a higher priority is more likely to be elected as the root bridge.
Page 51
Items Descriptions Default value Path Cost Indicates the path cost of local port and target port. The value ranges from 0 to 200,000,000. 0 means auto detect. A path cost is port-specific and is used by STP/RSTP to select a link. If a network has loops, it is recommended that you set a relatively large path cost for ports with low link rates.
Page 52
Procedure Choose <Reliability> <Fast-Ring Protect> in the navigation tree to open the page. 1) Configure the Fast-Ring protect. Set the parameters as required. Items Descriptions Default value Fast-Ring Choose <Enable> to enable the function. Disable Network Fast-Ring Network Group 1 Ring Network Indicates the number of main ring network the device accesses.
Page 53
accesses. The value ranges from 0 to 255. Ring Port 1: Indicates the port number that access the ring network. The value ranges from 1 to 28. Ring Port 2: Indicates the port number that access the ring network. The port number can’t be the same if it is used in other ring network.
Page 54
Protect Choose <Enable> to enable the protection automatic Disable Automatic recovery function. Recovery The ports will be recovered automatically. Disable Loop Indicate the disable loop protect time. Port Time The port will be recovered automatically, if the port detection no loopback packet after the time range, when <Protect Automatic Recovery>...
Page 55
1) Configure CCM. Items Descriptions Default value MD Name Indicate the Maintenance Domain. Null MA Name Indicate the Maintenance Association. Null Main Domain Level of an MD. The value ranges from 0 to 7. A greater Level value indicates a higher level. MEP ID Maintenance association End Point ID.
Page 56
you configure other related functions. Procedure Choose <Reliability> <ERPS Ring> in the navigation tree to open the page. 1) Create an ERPS Ring. Items Descriptions Default value Ring Number Input the number of ERPS Ring. Null The value ranges from 1 to 16. East Interface Select the interface that in the ERPS Ring.
Page 57
The RAPS VLAN specified here must be a VLAN that has not been created or used. Owner Choose the owner interface of the ERPS Ring. None Interface The link where the RPL Owner port resides is a ring protection link. An ERPS ring has only one RPL Owner interface.
Page 58
Priority Input the priority of a VRRP router. The virtual router selects the master and backup devices based on the priority. The value ranges from 1 to 254. Preemption Choose the preemption mode, including Election Mode · Election · No Election Preemption Input the time of preemption delay.
Page 59
System Management Port mirroring 13.1 Packet mirroring copies the packets on a mirrored port (source port) to an observing port (destination port).During network maintenance, maintenance personnel need to capture and analyze packets (for example, when there are suspicious attack packets). However, these operations always affect packet forwarding.
Page 60
SNMP 13.2 As a network management standard protocol used on TCP/IP networks, SNMP uses a central computer (NMS) that runs network management software to manage network elements. In a large network, it is very difficult for network administrator to detect, locate and rectify the fault as the devices does not report the fault.
Page 61
Click <Save>. 2) Configure SNMP V3 Set the parameters as required. Items Descriptions Default value User name Indicates the user name. Null The value supports 31 stings Read and Choose the read and write mode, including Read-only Write Mode ·...
Page 62
Time 13.5 Users can set time of the device by choosing local time or NTP server. By default the device supports local time setting. Procedure Choose <System Management> <Time> in the navigation tree to open the page. 1) Local time. ...
Page 63
Set the parameters as required. Items Descriptions Default value NTP Server Input the IP address of NTP server. Null Click <Save>. Syslog 13.6 Users can view, download and clear the system log, including Operation information Network link ...
Page 64
Management 13.7 Users can restore the factory value, reboot the system, download the actual configuration file, upload configuration file, and upgrade the software version. Procedure Choose <System Management> <Management> in the navigation tree to open the page. 1) Restore factory value. ...
Page 65
3) Manage the configuration file. Click <Download> under <Configuration File>. The configuration file will be downloaded. 4) Upload configuration file. Note: · The actual configuration will be covered after uploading configuration file operation. Please download your configuration file before uploading, or the latest configuration can’t be recovered.
Page 66
Items Descriptions Default value Access Choose the user level, from 1 ~ 15. Privilege · With lower than 3 level, the users are only allowed the read permission. · With 3 and higher than 3 lever, the users are allowed the read, create and delete permission.
Page 67
restart at setting time on setting day every week. The restarting time is format as “HH:MM”. For example, set “15:00”, the switch will restart at “15:00:59”. Every month Enable the function. Null Choose the restarting date and time. The switch will restart at setting time on setting day every month.
Page 68
Switch the following mode of switch. Items Descriptions Default value CCTV Mode Switch to this mode, downlink ports are isolated while Disable communication; optimize flow control for more fluent video. Device Lock Lock the authentication port device to prevent illegal Disable access to equipment and make system more secure.
Need help?
Do you have a question about the B0C53HLS6N and is the answer not in the manual?
Questions and answers