Linksys MGBLH1 - Gigabit LH Mini-GBIC SFP Transceiver User Manual
Linksys MGBLH1 - Gigabit LH Mini-GBIC SFP Transceiver User Manual

Linksys MGBLH1 - Gigabit LH Mini-GBIC SFP Transceiver User Manual

24-port 10/100/1000 gigabit switch with webview and poe user guide
Hide thumbs Also See for MGBLH1 - Gigabit LH Mini-GBIC SFP Transceiver:
Table of Contents

Advertisement

Quick Links

24-Port 10/100/1000
Gigabit Switch with
Webview and PoE

User Guide

SRW2024P
Model:
BUSINESS SERIES

Advertisement

Table of Contents
loading

Summary of Contents for Linksys MGBLH1 - Gigabit LH Mini-GBIC SFP Transceiver

  • Page 1: User Guide

    24-Port 10/100/1000 Gigabit Switch with Webview and PoE User Guide SRW2024P Model: BUSINESS SERIES...
  • Page 2 Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Getting Started ..... . . 1 How to Use this Guide Document Style Conventions Finding Information in Your PDF Documents Finding Text in a PDF Finding Text in Multiple PDFs Chapter 2: Introduction .
  • Page 4 Table of Contents Identification IP Configuration Setup Tab - Time Set Time Manual Automatic SNTP Servers Port Management Tab - Port Settings Port Setting Port Broadcast Control Port Management Tab - Link Aggregation Port Management Tab - LACP Port Management Tab - PoE Power Settings VLAN Management Tab - Create VLAN Single VLAN VLAN Range...
  • Page 5 Table of Contents QoS Tab - Queue Settings QoS Tab - DSCP Settings QoS Tab - Diffserv Settings Class Map Policy Map QoS Tab - Diffserv Port Binding QoS Tab - Bandwidth Spanning Tree Tab Spanning Tree Tab - STP Status Spanning Tree Tab - Global STP Spanning Tree Tab - STP Port Settings Spanning Tree Tab—RSTP Port Settings...
  • Page 6 Table of Contents Shared Resources Network Neighborhood/My Network Places Appendix C: Downloading with Xmodem ....126 Startup Menu Procedures Appendix D: Glossary ..... . . 129 Appendix E: Warranty Information .
  • Page 7: Chapter 1: Getting Started

    Getting Started How to Use this Guide Getting Started How to Use this Guide This User Guide has been designed to make working with the switch easier than ever. Look for the following items when reading this guide: WARNING: This graphic means there is a Warning and is something that could damage your self, property, or the camera.
  • Page 8: Finding Information In Your Pdf Documents

    Getting Started Finding Information in Your PDF Documents Finding Information in Your PDF Documents The PDF Find/Search tool lets you find information quickly and easily online. You can: • Search an individual PDF • Search multiple PDFs at once (for example, all PDFs in a specific folder or disk drive) •...
  • Page 9: Chapter 2: Introduction

    Introduction Welcome The Linksys WebView Managed Switch allows you to expand your network securely. Configuration of the switch is secured using SSL for web access. User control is secured with 802.1x security using a RADIUS authentication mechanism or MAC-based filtering.
  • Page 10: Chapter 3: Getting To Know The Switch

    LAN port (12 and/or 24) cannot be used. These ports link to a high- speed network peripheral system or clients at speeds of 1000Mbps. Use the Linksys MGBT1, MGBSX1, or MGBLH1 miniGBIC modules with the switch. The MGBSX1 and the MGBLH1 require fiber cabling with LC connectors, while the MGBT1 requires a Category 5e Ethernet cable with an RJ-45 connector.
  • Page 11: The Back Panel

    Getting to Know the Switch The Back Panel The Back Panel The power port is located on the back panel of the switch. Power—The Power port is where you connect the power cord. NOTE: If you need to reset the switch, disconnect the power cord from the back of the switch.
  • Page 12: The Gigabit Expansion Ports

    (for configuration purposes) using the provided serial cable. You can use HyperTerminal to manage the switch through the console port. With this and many other Linksys products, your networking options are limitless. Go to the Linksys website at for more information about products that work with the switch.
  • Page 13: Chapter 4: Connecting The Switch

    Connecting the Switch Overview Connecting the Switch Overview This chapter will explain how to connect network devices to the switch. For an example of a typical network configuration, see the application diagram shown below. When you connect your network devices, make sure you don’t exceed the maximum cabling distances, which are listed in the following table: From Maximum Distance...
  • Page 14: Placement Options

    Connecting the Switch Placement Options Placement Options Before connecting cables to the switch, first you will physically install the switch. Either set the switch on its four rubber feet for desktop placement or mount the switch in a standard-sized, 19-inch wide, 1U high rack for rack-mount placement. Desktop Placement 1.
  • Page 15: Connecting The Switch

    Connecting the Switch Placement Options 4. Use the appropriate screws (not included) to securely attach the brackets to your rack. 5. Proceed with connecting the switch. Connecting the Switch To connect network devices to the switch, follow these instructions: 1. Make sure all the devices you will connect to the switch are powered off. 2.
  • Page 16: Uplinking The Switch

    Connecting the Switch Uplinking the Switch Uplinking the Switch To uplink the switch, connect one end of a Category 5 (or better) Ethernet network cable into one of the 24 gigabit ports, and then connect the other end of the cable into the peripheral device’s uplink port.
  • Page 17: Chapter 5: Using The Console Interface For Configuration

    Using the Console Interface for Configuration Overview Using the Console Interface for Configuration Overview The switch features a menu-driven console interface for basic configuration of the switch and management of your network. The switch can be configured using CLI through the console interface or through a telnet connection.
  • Page 18 Using the Console Interface for Configuration Configuring the HyperTerminal Application 1. Click the Start button. Select Programs and choose Accessories. Select Communications. Select HyperTerminal from the options listed in this menu. 2. On the Connection Description screen, enter a name for this connection. In the example, the name of connection is SRW2024P.
  • Page 19: Connecting To The Switch Through A Telnet Session

    Using the Console Interface for Configuration Connecting to the Switch through a Telnet Session 5. Then, click the OK button. Connecting to the Switch through a Telnet Session Open a command line editor and enter telnet 192.168.1.254. Then, press the Enter key. The Login screen appears.
  • Page 20: Switch Main Menu

    Using the Console Interface for Configuration Configuring the Switch through the Console Interface Switch Main Menu The System Main Menu screen displays these choices: 1. System Configuration Information Menu 2. Port Status 3. Port Configuration 4. PoE Configuration 5. Help 6.
  • Page 21 Using the Console Interface for Configuration Configuring the Switch through the Console Interface 8. Back to Main Menu System Information Using this screen, you can check the switch’s firmware versions and general system information. Versions The Versions screen displays the switch’s boot, software, loader, and hardware firmware versions.
  • Page 22 Using the Console Interface for Configuration Configuring the Switch through the Console Interface General Information The General System Information screen displays the switch’s description, System Up Time, System MAC Address, System Contact, System Name, and System Location. Select Edit and press the Enter key to make changes. When your changes are complete, press the Esc key to return to the Action menu.
  • Page 23 Using the Console Interface for Configuration Configuring the Switch through the Console Interface Serial Port Configuration On the Serial Port Configuration screen, the switch’s baud rate is displayed. Select Edit and press the Enter key to make changes. Toggle to the desired speed and when your changes are complete, press the Esc key to return to the Action menu.
  • Page 24 Using the Console Interface for Configuration Configuring the Switch through the Console Interface IP Configuration The IP Configuration screen displays these choices: the switch’s IP Address Settings, HTTP/ HTTPS, SNMP, and Network Diagnostics. IP Address Settings The switch’s IP information is displayed here. IP Address.
  • Page 25 Using the Console Interface for Configuration Configuring the Switch through the Console Interface IP Mode. Choose to have either a user-defined IP address or to have it assigned by DHCP or BOOTP. Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu, and select Save to save your changes.
  • Page 26 Using the Console Interface for Configuration Configuring the Switch through the Console Interface SNMP The SNMP screen allows you to set the switch’s SNMP settings. SNMP Server. Enable or Disable the SNMP function for the switch. SNMP Server Port. Set the TCP port that will be used for sending and receiving SNMP packets. Network Diagnostics The Network Configuration screen allows you to use ping to test network connectivity.
  • Page 27: File Management

    Using the Console Interface for Configuration Configuring the Switch through the Console Interface File Management The File Management screen allows you to upload or download files, such as the startup configuration, boot, or image file, using a TFTP server. Select Edit to change the settings. When your changes are complete, press the Esc key to return to the Action menu, and select Execute to upload or download the designated file.
  • Page 28: Reboot System

    Using the Console Interface for Configuration Configuring the Switch through the Console Interface Reboot System Select Reboot System and press the Enter key if you want to restart the switch. You will be asked if you want to continue. Press the y key to reboot the switch, or press the n key to cancel. After the switch has rebooted, the Switch Main Menu screen appears.
  • Page 29 Using the Console Interface for Configuration Configuring the Switch through the Console Interface Port Status On the Switch Main Menu screen, select Port Status and press the Enter key if you want to view the status information for the switch’s ports. The Port Status screen displays the port numbers, their status, Link status, speed and duplex mode, and status of flow control, which is the flow of packet transmissions.
  • Page 30: Poe Configuration

    Using the Console Interface for Configuration Configuring the Switch through the Console Interface Select Edit and press the Enter key to make changes. When your changes are complete, press the Esc key to return to the Action menu. Select Save and press the Enter key to save your changes.
  • Page 31 Using the Console Interface for Configuration Configuring the Switch through the Console Interface PoE Main Menu The PoE Main Menu screen displays three menu choices: System PoE Configuration, Port PoE Status, and Port PoE Configuration. System PoE Configuration The Power Configuration screen allows you to set the PoE power allocation from the switch to connected devices.
  • Page 32 Using the Console Interface for Configuration Configuring the Switch through the Console Interface Port PoE Status The Power Port Status screen allows you to view the current PoE settings for each port on the switch. Ports can be set to one of three power priority levels: critical, high, or low. To control the power supply within the switch’s budget, ports set at critical or high priority have power enabled in preference to those ports set at low priority.
  • Page 33 Using the Console Interface for Configuration Configuring the Switch through the Console Interface Help Select Help and press the Enter key if you want to view the help information. This screen explains how to navigate the various screens of the console interface. Log Out Select Log Out to log out of the Console Configuration Utility.
  • Page 34: Chapter 6: Using The Web-Based Utility For Configuration

    Using the web-based Utility for Configuration Overview Using the web-based Utility for Configuration Overview This chapter describes the features included in the web-based Utility. All of the features shown in this chapter, unless specifically identified, are included in the all of Fast Ethernet switches. Additional features for specific switches are noted.
  • Page 35 Using the web-based Utility for Configuration Accessing the web-based Utility The first screen that appears is the Setup Summary screen. 13 main tabs are accessible from the web-based Utility: Setup, Port Management, VLAN Management, Statistics, ACL, Security, QoS (Quality of Service), Spanning Tree, Multicast, SNMP, Admin, and Logout. Click one of the main tabs to view additional tabs.
  • Page 36: Setup Tab - Summary

    Using the web-based Utility for Configuration Setup Tab - Summary Setup Tab - Summary The Summary screen provides device and system information about the switch. Device Information System Name—Displays the name for the switch. IP Address—The IP address of the switch. Subnet Mask—The Subnet Mask of the switch.
  • Page 37: Poe Information

    Using the web-based Utility for Configuration Setup Tab - Network Settings Boot Version—This indicates the system boot version currently running on the device. Firmware Version—The Firmware (software) version number is displayed here. System Location—The system name is displayed here. System Contact—The contact person for this switch is displayed here. System Up Time—This field displays the amount of time that has elapsed since the switch was last reset.
  • Page 38: Identification

    Using the web-based Utility for Configuration Setup Tab - Time Identification System Name—This field allows you to assign a system name. System Location—This field is used to enter a description of where the switch is located, such as 3rd floor. System Contact—Enter the administrative contact person in this field.
  • Page 39: Set Time

    Using the web-based Utility for Configuration Setup Tab - Time configure up to two time server IP addresses. The switch attempts to poll each server in the sequence. Set Time Set the system time manually—When this option is selected, the local hardware clock is utilized.
  • Page 40: Sntp Servers

    Using the web-based Utility for Configuration Setup Tab - Time Daylight Savings—Select Daylight Savings to enable it on the switch. If the switch should use US daylight savings, then select USA. If the switch should use EU daylight savings, then select European.
  • Page 41: Port Management Tab - Port Settings

    Using the web-based Utility for Configuration Port Management Tab - Port Settings Port Management Tab - Port Settings The Port Management - Port Settings screen shows you the settings for each of the switch’s ports. Port—The number of the port. To use an SFP module, click on the Detail button of the appropriate port (g1, g2).
  • Page 42: Port Setting

    Using the web-based Utility for Configuration Port Management Tab - Port Settings Flow Control—This is the flow control status of the port. It is active when the port uses Full Duplex Mode. Type—Displays the port type. LAG—This indicates if the port is part of a LAG. Detail—The Detail button will open the Port Setting screen.
  • Page 43: Port Broadcast Control

    Using the web-based Utility for Configuration Port Management Tab - Port Settings • 1000half—Supports 1000 Mbps half-duplex operation • 1000full—Supports 1000 Mbps full-duplex operation • Sym (Gigabit only)—Check this box to transmit and receive pause frames, or uncheck the box to auto-negotiate the sender and receiver for asymmetric pause frames. (The current switch chip supports only symmetric pause frames.) Flow Control—Enables flow control.
  • Page 44: Port Management Tab - Link Aggregation

    Using the web-based Utility for Configuration Port Management Tab - Link Aggregation Port Management Tab - Link Aggregation LAG—This indicates if the port is part of a LAG. Description—Description for this LAG. Administrative Status—The admin status of the LAG. Up indicates that the LAG is available. Down indicates that administrator has taken the port offline.
  • Page 45: Port Management Tab - Lacp

    Using the web-based Utility for Configuration Port Management Tab - LACP Create—To create a new LAG, click the Create button in the Create column, then add members to the LAG by clicking on the Select Member button. The Select Member screen for the Link Aggregation opens.
  • Page 46 Using the web-based Utility for Configuration Port Management Tab - LACP eight LAGs. For example, a LAG consisting of two 1000 Mbps ports can support an aggregate bandwidth of 4 Gbps when operating at full duplex. To avoid creating a loop in the network, be sure you enable LACP before connecting the ports, and also disconnect the ports before disabling LACP.
  • Page 47: Port Management Tab - Poe Power Settings

    Using the web-based Utility for Configuration Port Management Tab - PoE Power Settings Port Management Tab - PoE Power Settings If a device is connected to a switch port and the switch detects that it requires more than the power budget of the port, no power is supplied to the device (that is, port power remains off ). If the power demand from devices connected to switch ports exceeds the power budget set for the switch, the port power priority settings are used to control the supplied power.
  • Page 48: Vlan Management Tab - Create Vlan

    Using the web-based Utility for Configuration VLAN Management Tab - Create VLAN VLAN Management Tab - Create VLAN The Create VLAN screen provides information and global parameters for configuring and working with VLANs. Single VLAN VLAN ID (2-4094)—Indicates the ID number of the VLAN being configured. Up to 256 VLANs can be created.
  • Page 49: Vlan Management Tab - Port Settings

    Using the web-based Utility for Configuration VLAN Management Tab - Port Settings VLAN Management Tab - Port Settings The VLAN Port Settings screen provides parameters for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Settings screen. All untagged packets arriving to the device are tagged by the ports PVID.
  • Page 50: Vlan Management Tab - Ports To Vlan

    Using the web-based Utility for Configuration VLAN Management Tab - Ports to VLAN Ingress Filtering—Enables or disables Ingress filtering on the port. Ingress filtering discards packets which do not include an ingress port. LAG—Indicates the LAG to which the VLAN is defined. VLAN Management Tab - Ports to VLAN Use the Port to VLAN screen to configure port members for the selected VLAN index.
  • Page 51: Membership

    Using the web-based Utility for Configuration VLAN Management Tab - VLAN to Ports Membership Select VLAN membership for each interface by marking the appropriate radio button for a port or LAG, possible values are: Excluded—Excludes the interface from the VLAN. However, the interface can be added to the VLAN through GVRP.
  • Page 52: Vlan Management Tab-Gvrp

    Using the web-based Utility for Configuration VLAN Management Tab - VLAN to Ports • Trunk—Indicates the port belongs to VLANs in which all ports are tagged, except for one port that can be untagged. Join VLAN—Defines the VLANs to which the interface is joined. Select the VLAN ID, then click Apply.
  • Page 53 Using the web-based Utility for Configuration VLAN Management Tab - VLAN to Ports LAG—Indicates if the port is a member of a LAG. If it is a member of a LAG, GVRP cannot be configured on it. SRW2024P User Guide...
  • Page 54: Statistics Tab - Rmon Statistics

    Using the web-based Utility for Configuration Statistics Tab - RMON Statistics Statistics Tab - RMON Statistics The RMON Statistics screen contains fields for viewing information about device utilization and errors that occurred on the device. To view the interface statistics for a port, select the required interface from the drop-down list and click Query.
  • Page 55 Using the web-based Utility for Configuration Statistics Tab - RMON Statistics Received Bytes (Octets)—Displays the number of octets received on the interface since the device was last refreshed. This number includes bad packets and FCS octets, but excludes framing bits. Received Packets—Displays the number of packets received on the interface, including bad packets, multicast and broadcast packets, since the device was last refreshed.
  • Page 56: Statistics Tab - Rmon History

    Using the web-based Utility for Configuration Statistics Tab - RMON History Statistics Tab - RMON History The RMON History screen allows you to monitor your network for common errors and overall traffic rates. The History Control Table allows you to add, edit and delete collection entries, or to select a specific index entry and then view the historical data in table form.
  • Page 57: Statistics Tab - Rmon Alarm

    Using the web-based Utility for Configuration Statistics Tab - RMON Alarm Sampling Interval—Indicates (in seconds) the time that samplings are taken from the ports. The field range is 1-3600. The default is 1800 seconds (30 minutes). Sampling Requested—Indicates the number of samples to save. (Range:1-65535) Owner—The name of the person who created this entry in the Control Table.
  • Page 58 Using the web-based Utility for Configuration Statistics Tab - RMON Alarm Alarms can be set to test data over any specified time interval and can monitor absolute or changing values, such as a statistical counter reaching a specific value, or a statistic changing by a certain amount over a set interval.
  • Page 59 Using the web-based Utility for Configuration Statistics Tab - RMON Alarm Both—Indicates that both the Log and Trap mechanisms are used to report alarms. Falling Event—The index of the Event that will be used if a falling alarm is triggered. If there is no corresponding entry in the Event Control Table, or if this number is zero, then no event will be generated.
  • Page 60: Statistics Tab - Rmon Events

    Using the web-based Utility for Configuration Statistics Tab - RMON Events Statistics Tab - RMON Events The RMON Events screen contains fields for defining RMON events. An RMON Event determines the action to take when an alarm is triggered. The response to an alarm can include logging the alarm or sending an SNMP trap message.
  • Page 61: Statistics Tab - Port Utilization

    Using the web-based Utility for Configuration Statistics Tab - Port Utilization To display each time an event was triggered by an alarm, first highlight an entry in the Event Control Table and then click on the View Log Table button. The Log Table shows the log index number, the time of an event, and the description of the event that activated the entry.
  • Page 62: Statistics Tab - 802.1X Statistics

    Using the web-based Utility for Configuration Statistics Tab - 802.1x Statistics Refresh Rate—Indicates the amount of time that passes before the port utilization statistics are refreshed. The possible field values are: • No Refresh—Indicates that the statistics are not refreshed. •...
  • Page 63: Acl Tab - Ip Based Acl

    Using the web-based Utility for Configuration ACL Tab - IP Based ACL Interface—Indicates the port, which is polled for statistics. Name—Displays the measured 802.1x statistic. Description—Describes the measured 802.1x statistic. Packet—Displays the amount of packets measured for the particular 802.1x statistic. ACL Tab - IP Based ACL The IP Based ACL (Access Control List) screen contains information for defining IP Based ACLs.
  • Page 64 Using the web-based Utility for Configuration ACL Tab - IP Based ACL administrator, or a packet assigned rate limiting restrictions for forwarding. The options are as follows: • Permit—Forwards packets which meet the ACL criteria. • Deny—Drops packets which meet the ACL criteria. •...
  • Page 65: Acl Tab-Ipv6 Based Acl

    Using the web-based Utility for Configuration ACL Tab - IP Based ACL Psh—Indicates the packet is pushed. Rst—Indicates the connection is dropped. Syn—Indicates request to start a session. Fin—Indicates request to close a session. Source Port—Defines the TCP/UDP source port to which the ACE is matched. This field is active only if 800/6-TCP or 800/17-UDP are selected in the Select from List drop-down list.
  • Page 66 Using the web-based Utility for Configuration ACL Tab - IP Based ACL Action—Indicates the ACL forwarding action. Possible field values are: Permit—Forwards packets which meet the ACL criteria. Deny—Drops packets which meet the ACL criteria. DSCP—Matches the packet DSCP value to the ACE. The possible field range is 0-63. The Add to List button adds the configured IP Based ACLs to the IP Based ACL Table at the bottom of the screen.
  • Page 67: Acl Tab - Mac Based Acl

    Using the web-based Utility for Configuration ACL Tab - MAC Based ACL ACL Tab - MAC Based ACL The MAC Based ACL screen allows a MAC based ACL to be defined. ACEs can be added only if the ACL is not bound to an interface. Target—Select the New ACL Name radio button and enter an ACL name in the text field provided (with up to 16 characters).
  • Page 68: Acl Tab-Tcam Utilization

    Using the web-based Utility for Configuration ACL Tab - MAC Based ACL source IP address 149.36.184.198 and the wildcard mask is 255.36.184.00, the first eight bits of the IP address are ignored, while the last eight bits are used. Destination MAC Address—Matches the destination MAC address to which packets are addressed to the ACE.
  • Page 69: Security Tab - Acl Binding

    Using the web-based Utility for Configuration Security Tab - ACL Binding Security Tab - ACL Binding After configuring Access Control Lists (ACL), you should bind them to the ports that need to filter traffic. You can assign one IP or MAC access list to any port. You must configure a mask for an ACL rule before you can bind it to a port.
  • Page 70: Security Tab - Authentication Servers

    Using the web-based Utility for Configuration Security Tab - Authentication Servers Security Tab - Authentication Servers Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized authentication method for web access. This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol messages with the client, and a remote RADIUS authentication server to verify user identity and access rights.
  • Page 71: Tacacs Server Setting

    Using the web-based Utility for Configuration Security Tab - 802.1x Settings Secret Key String—Enter the secret key string as defined on the RADIUS server. The secret key string is used for authenticating and encrypting communications between the device and the RADIUS server.
  • Page 72 Using the web-based Utility for Configuration Security Tab - 802.1x Settings Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). The IEEE 802.1X (dot1X) standard defines a port-based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication.
  • Page 73 Using the web-based Utility for Configuration Security Tab - 802.1x Settings To enable 802.1X System Authentication Control, select Radius. When 802.1X is enabled, you need to configure the parameters for the authentication process that runs between the client and the switch (that is, authenticator), as well as the client identity lookup process that runs between the switch and authentication server.
  • Page 74 Using the web-based Utility for Configuration Security Tab - 802.1x Settings Modify the parameters required using the drop-down lists and fields provided for each port, then click Detail to configure the 802.1X settings for that port. The 802.1x Port Settings screen allows configuration of the following parameters: Reauthentication—To reauthenticate a client, select Enabled.
  • Page 75: Security Tab - Port Security

    Using the web-based Utility for Configuration Security Tab - Port Security • Force-Unauthorized—The controlled port state is set to Force-Unauthorized (discard traffic). Enable Periodic Reauthentication—Permits immediate port reauthentication. The Setting Timer button opens the Setting Timer screen to configure ports for 802.1x functionality.
  • Page 76: Security Tab - Https Settings

    Using the web-based Utility for Configuration Security Tab - HTTPS Settings Interface—Displays the port or LAG name. Lock Interface—Selecting this option locks the specified interface. Learning Mode—Defines the locked port type. The Learning Mode field is enabled only if Locked is selected in the Interface Status field. The possible field values are: •...
  • Page 77: Security Tab - Management Acl

    Using the web-based Utility for Configuration Security Tab - Management ACL Security Tab - Management ACL Management ACL You can create a list of up to 16 IP addresses or IP address groups that are allowed access to the switch through the web interface, SNMP, or Telnet. The management interfaces are open to all IP addresses by default.
  • Page 78: Security Tab-Network Access Mac Address

    Using the web-based Utility for Configuration Security Tab - Management ACL The VLAN settings specified by the first 802.1x authenticated user are implemented for a port. Other 802.1X authenticated users on the port must have the same VLAN configuration, or they are treated as authentication failures.
  • Page 79 Using the web-based Utility for Configuration Security Tab - Management ACL MAC Address – The authenticated MAC address. RADIUS Server – The IP address of the RADIUS server that authenticated the MAC address. Time – The time when the MAC address was last authenticated. Attribute –...
  • Page 80: Security Tab - Ssh Settings

    Using the web-based Utility for Configuration Security Tab - SSH Settings Security Tab - SSH Settings The Secure Shell (SSH) includes server/client applications that can provide remote management access to the switch and act as a secure replacement for Telnet. When the client contacts the switch through the SSH protocol, the switch generates a public- key that the client uses along with a local user name and password for access authentication.
  • Page 81: Ssh Host-Key Settings

    Using the web-based Utility for Configuration SSH Host-Key Settings SSH Server-Key Size—Specifies the SSH server key size. The server key is a private key that is never shared outside the switch.The host key is shared with the SSH client, and is fixed at 1024 bits.
  • Page 82: Qos Tab

    Using the web-based Utility for Configuration QoS Tab Generate—This button is used to generate the host key pair. Note that you must first generate the host key pair before you can enable the SSH server. Clear—This button clears the host key from both volatile memory (RAM) and non-volatile memory (Flash).
  • Page 83: Qos Tab - Cos Settings

    Using the web-based Utility for Configuration QoS Tab - CoS Settings QoS Tab - CoS Settings Class of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. The switch supports CoS with four priority queues for each port.
  • Page 84: Cos To Queue

    Using the web-based Utility for Configuration QoS Tab - Queue Settings CoS to Queue Assign priorities to the traffic classes (output queues) for the selected interface. Class of Service—CoS value. (Range: 0-7, where 7 is the highest priority queue) Queue (0-3)—The output priority queue. (Range: 0-3, where 3 is the highest CoS priority queue) Port to CoS Modify the default priority for any interface using the text field provided.
  • Page 85: Qos Tab - Dscp Settings

    Using the web-based Utility for Configuration QoS Tab - DSCP Settings Strict Priority—Indicates that traffic scheduling for the selected queue is based strictly on the queue priority. WRR—Indicates that traffic scheduling for the selected queue is based strictly on the WRR. WRR Weight—Displays the WRR weights to queues.
  • Page 86: Qos Tab - Diffserv Settings

    Using the web-based Utility for Configuration QoS Tab - Diffserv Settings Click Save Settings to save the changes. QoS Tab - Diffserv Settings The commands described in this section are used to configure Quality of Service (QoS) classification criteria and service policies. Differentiated Services (DiffServ) provides policy- based management mechanisms used for prioritizing network resources to meet the requirements of specific traffic types on a per hop basis.
  • Page 87: Class Map

    Using the web-based Utility for Configuration QoS Tab - Diffserv Settings Class Map A class map is used for matching packets to a specified class. The class map uses the Access Control List filtering engine, so you must also set an ACL to enable filtering for the criteria specified in the class map.
  • Page 88: Policy Map

    Using the web-based Utility for Configuration QoS Tab - Diffserv Settings Add—Adds the specified criteria to the class. Only one entry is permitted per class. Remove—Deletes the selected criteria from the class. Policy Map A policy map can contain multiple class statements that can be applied to the same interface with the Service Policy Settings.
  • Page 89: Qos Tab - Diffserv Port Binding

    Using the web-based Utility for Configuration QoS Tab - Diffserv Port Binding • Rate (kbps)—Rate in kilobits per second. (Range: 1-100000 kbps or maximum port speed, whichever is lower) • Burst (byte)—Burst in bytes. (Range: 64-1522) • Exceed Action—Specifies whether to drop the traffic that exceeds the specified rate or burst or to reduce the DSCP service level.
  • Page 90: Qos Tab - Bandwidth

    Using the web-based Utility for Configuration QoS Tab - Bandwidth Click Save Settings to save the changes. QoS Tab - Bandwidth This function allows the network manager to control the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic coming out of the switch.
  • Page 91: Spanning Tree Tab

    Using the web-based Utility for Configuration Spanning Tree Tab Spanning Tree Tab The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This algorithm allows the switch to interact with other bridging devices (that is, an STA-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 92: Spanning Tree Tab - Global Stp

    Using the web-based Utility for Configuration Spanning Tree Tab - Global STP Root Maximum Age—Indicates the amount of time in seconds a bridge waits before sending configuration messages. The default max age is 20 seconds. The range is 6 to 40 seconds. Root Hello Time—Indicates the number of seconds a root bridge waits between configuration messages.
  • Page 93 Using the web-based Utility for Configuration Spanning Tree Tab - Global STP • RSTP—Rapid Spanning Tree Protocol (IEEE 802.1w); RSTP is the default. Priority—Specifies the bridge priority value. When switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the device with the lowest priority value becomes the Root Bridge.
  • Page 94: Spanning Tree Tab - Stp Port Settings

    Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings Spanning Tree Tab - STP Port Settings The Port Information and LAG Information screens display the current status of ports and LAGs in the Spanning Tree. State—Shows if Spanning Tree has been enabled on this interface. Status—Displays current state of this port within the Spanning Tree: •...
  • Page 95 Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings LAG—Indicates if ports are members of a LAG. To configure STP port settings for LAGs, go to the table entry for the LAG number, which is listed after port g24 at the end of the table. Click Detail to configure STP Port Settings for an interface.
  • Page 96: Spanning Tree Tab-Rstp Port Settings

    Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings Administrative Link Type—The link type attached to this interface. • Point-to-Point—A connection to exactly one other bridge. • Shared—A connection to two or more bridges. • Auto—The switch automatically determines if the interface is attached to a point-to- point link or to shared media.
  • Page 97 Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings fail or are removed. The role is set to disabled (i.e., disabled port) if a port has no role within the spanning tree. Forward Transitions—The number of times this port has transitioned from the Learning state to the Forwarding state.
  • Page 98: Spanning Tree Tab-Mstp Properties

    Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings Spanning Tree Tab—MSTP Properties This screen includes configuration settings for the Multiple Spanning Tree Protocol. Region Name—The name for this MSTI. (Maximum length: 32 characters) Revision—The revision for this MSTI. (Range: 0-65535; Default: 0) Max Hops—The maximum number of hops allowed in the MST region before a BPDU is discarded.
  • Page 99: Spanning Tree Tab-Mstp Interface Settings

    Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings Included VLAN—VLANs assigned to this instance. Bridge Priority—Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest priority becomes the STA root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device.
  • Page 100 Using the web-based Utility for Configuration Spanning Tree Tab - STP Port Settings State—Shows if Spanning Tree has been enabled on this interface. Status—Displays current state of this port within the Spanning Tree. Discarding—Port receives STA configuration messages, but does not forward packets. Learning—Port has transmitted configuration messages for an interval set by the Forward Delay parameter without receiving contradictory information.
  • Page 101: Multicast Tab - Global Settings

    Using the web-based Utility for Configuration Multicast Tab - Global Settings Range—Ethernet: 200,000-20,000,000 Fast Ethernet—20,000-2,000,000 Gigabit Ethernet—2,000-200,000 Default—Ethernet – Half duplex: 2,000,000; full duplex: 1,000,000; LAG: 500,000 Fast Ethernet—Half duplex: 200,000; full duplex: 100,000; LAG: 50,000 Gigabit Ethernet—Full duplex: 10,000; LAG: 5,000 Interface Priority—Defines the priority used for this port in the Spanning Tree Protocol.
  • Page 102 Using the web-based Utility for Configuration Multicast Tab - Global Settings This setting prevents the switch from broadcasting the traffic to all ports and possibly disrupting network performance. IGMP Version (1,2,3) IGMP Snooping Status—When enabled, the switch will monitor network traffic to determine which hosts want to receive multicast traffic.
  • Page 103: Multicast Tab - Static Member Ports

    Using the web-based Utility for Configuration Multicast Tab - Static Member Ports Click Save Settings to save the changes. Multicast Tab - Static Member Ports Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query messages. For certain applications that require tighter control, you may need to statically configure a multicast service on the switch.
  • Page 104 Using the web-based Utility for Configuration Multicast Tab - Static Router Ports attached router. This can ensure that multicast traffic is passed to all the appropriate interfaces within the switch. Specify the interfaces attached to a multicast router, indicate the VLAN which will forward all the corresponding multicast traffic, and then click Add.
  • Page 105: Multicast Tab - Member Ports Query

    Using the web-based Utility for Configuration Multicast Tab - Member Ports Query Multicast Tab - Member Ports Query You can use the Member Port Query screen to display the ports on the switch attached to a neighboring multicast router/switch for each VLAN and multicast IP address. Select a VLAN ID and the IP address for a multicast service from the drop-down lists.
  • Page 106: Multicast Tab - Router Ports Query

    Using the web-based Utility for Configuration Multicast Tab - Router Ports Query Multicast Tab - Router Ports Query Multicast routers that are connected to the switch use information obtained from IGMP to support IP multicasting across the Internet. These routers may be dynamically discovered by the switch or statically assigned to an interface on the switch.
  • Page 107: Snmp Tab-Global Parameters

    Using the web-based Utility for Configuration SNMP Tab community string for authentication. Access to the switch from clients using SNMPv3 provides additional security features that cover message integrity, authentication, and encryption; as well as controlling user access to specific areas of the MIB tree. This tab provides global parameters, views, group profile, group membership, communities and notification recipient functions for the switch system.
  • Page 108 Using the web-based Utility for Configuration SNMP Tab Notifications Enable Authentication Traps—Issues a notification message to specified IP trap managers whenever an invalid community string is submitted during the SNMP access authentication process. (Default: Enabled) Enable Link-up and Link-down Traps—Issues a notification message whenever a port link is established or broken.
  • Page 109: Snmp Tab-Views

    Using the web-based Utility for Configuration SNMP Tab SNMP Tab—Views The Views screen includes configuration settings used to restrict user access to specified portions of the MIB tree. View Name—Select a existing name from the scroll-down list to show the currently configured object identifiers of branches within the MIB tree that define the SNMP view.
  • Page 110: Snmp Tab-Group Profile

    Using the web-based Utility for Configuration SNMP Tab SNMP Tab—Group Profile The Group Profile screen is used to set the access policy for a group of users, restricting them to specific read, write and notify views. Group Name—The name of the SNMP group to which the user is assigned. (Range: 1-32 characters) Security Model—The user security model;...
  • Page 111 Using the web-based Utility for Configuration SNMP Tab level and assigned to a group. The SNMPv3 group restricts users to a specific read, write, and notify view. User Name—The name of user connecting to the SNMP agent. (Range: 1-32 characters) Local—Indicates a user accessing information only on the local switch.
  • Page 112: Snmp Tab-Communities

    Using the web-based Utility for Configuration SNMP Tab User Authentication Authentication Protocol—The method used for user authentication. (Options: MD5, SHA; Default: MD5) Authentication Password—A minimum of eight plain text characters is required. Data Privacy Privacy Protocol—The encryption algorithm use for data privacy; only 56-bit DES is currently available.
  • Page 113: Snmp Tab-Notification Recipient

    Using the web-based Utility for Configuration SNMP Tab Read/Write—Authorized management stations are able to both retrieve and modify MIB objects. After configuring each community string, click Add. SNMP Tab—Notification Recipient The Notification Recipient screen is used to configure the trap managers that will receive SNMP notifications or trap messages, and the community strings by which these devices are authorized management access.
  • Page 114 Using the web-based Utility for Configuration SNMP Tab Notification Version—Specifies whether to send notifications using SNMP v1 or SNMP v2c. (Default: Version 1) SNMP v3 User Name—The name of user connecting to the SNMP agent. (Range: 1-32 characters) Security Level—The security level used for the user. noAuthNoPriv—There is no authentication or encryption used in SNMP communications.
  • Page 115: Admin Tab - User Authentication

    Using the web-based Utility for Configuration Admin Tab - User Authentication Admin Tab - User Authentication The switch supports up to five user names and passwords for management access (console and web interfaces). The default user name is “admin” with no password. You should therefore assign a new password for the “admin”...
  • Page 116: Admin Tab - Forwarding Database

    Using the web-based Utility for Configuration Admin Tab - Forwarding Database • Local—Authenticates the user at the device level. The device checks the user name and password for authentication. • RADIUS—Authenticates the user at the RADIUS server. • TACACS+—Authenticates the user at the TACACS+ server. Admin Tab - Forwarding Database Switches store the addresses for all known devices in a forwarding database.
  • Page 117: Static Address Setting

    Using the web-based Utility for Configuration Admin Tab - Forwarding Database Static Address Setting A static address can be assigned to a specific interface on the switch. Static addresses are bound to the assigned interface and will not be reassigned. When a static address is detected on another interface, the address will be ignored and will not be written to the address table.
  • Page 118: Admin Tab - Log

    Using the web-based Utility for Configuration Admin Tab - Log Check the Interface, MAC Address, or VLAN checkbox to specify the search type. Then select the method of sorting the displayed addresses. Finally, click Query. The dynamic addresses that conform to the search criteria are listed in the text box. To delete a MAC address from the forwarding database, select the entry in the displayed list, then click Remove.
  • Page 119 Using the web-based Utility for Configuration Admin Tab - Log Level* Severity Name Description Notice Normal but significant condition, such as a cold start Warning Warning conditions, such as return false or unexpected return Error Error conditions, such as invalid input or default used Critical Critical conditions, such as memory...
  • Page 120: Syslog

    Using the web-based Utility for Configuration Admin Tab - Log View Memory Logging—Click the button to display log messages stored in the switch’s RAM memory. Enable the System Log Status, set the level of event messages to be logged to RAM and flash memory, then click Save Settings.
  • Page 121: Admin Tab - Port Mirroring

    Using the web-based Utility for Configuration Admin Tab - Port Mirroring Severity—Sets the Syslog severity threshold level used to trigger alert messages. All events at this level or higher are sent to the configured email recipients. For example, using Level 6 will report all events from level6 to level 0.
  • Page 122: Admin Tab - Cable Test

    Using the web-based Utility for Configuration Admin Tab - Cable Test Type—Indicates the port mode configuration for port mirroring. The possible field values are: • Receive—Defines the port mirroring on receiving ports. This is the default value. • Transmit—Defines the port mirroring on transmitting ports. •...
  • Page 123: Admin Tab - Ping

    Using the web-based Utility for Configuration Admin Tab - Ping Admin Tab - Ping You can use a ping to see if another site on the network can be reached. Ping sends ICMP echo request packets to another node on the network. Enter the IP address or host name of the device you want to ping, then click Go.
  • Page 124: Admin Tab - Save Configuration

    Using the web-based Utility for Configuration Admin Tab - Save Configuration Admin Tab - Save Configuration Downloads or uploads switch configuration files from a TFTP server. The switch allows the start- up configuration to be saved or restored from a TFTP server. You must specify “Upgrade” to download a new configuration file or “Backup”...
  • Page 125: Admin Tab - Firmware Upgrade

    Using the web-based Utility for Configuration Admin Tab - Firmware Upgrade jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields. To use jumbo frames, both the source and destination end nodes (such as a computer or server) must support this feature.
  • Page 126 Using the web-based Utility for Configuration Admin Tab - Firmware Upgrade Image or Boot Code. Enter the IP address of the TFTP server, specify the file name of the software on the server, and then click Save Settings. SRW2024P User Guide...
  • Page 127: Admin Tab - Http Upgrade

    Using the web-based Utility for Configuration Admin Tab - HTTP Upgrade Admin Tab - HTTP Upgrade Download new switch runtime software from the local web management PC. Enter the file name of the software or use the Browse button to locate the file on the PC, then click Save Settings.
  • Page 128: Admin Tab - Reboot

    Using the web-based Utility for Configuration Admin Tab - Reboot Admin Tab - Reboot The Reboot screen resets the device. The device configuration is automatically saved before the device is rebooted. SRW2024P User Guide...
  • Page 129: Admin Tab - Factory Default

    Using the web-based Utility for Configuration Admin Tab - Factory Default Admin Tab - Factory Default The Factory Reset screen restores the switch’s factory default settings. Click the Reset to Factory Default Configuration button, then click OK to confirm and restart the switch.
  • Page 130: Appendix A: About Gigabit Ethernet And Fiber Optic Cabling

    In Europe, the round ST connector is more prevalent. You must use the Linksys MGBT1, MGBSX1, or MGBLH1 mini-GBIC modules with the Linksys Gigabit Switches. The MGBSX1 and the MGBLH1 require fiber cabling with LC connectors, and the MGBT1 requires a Category 5e Ethernet cable with an RJ-45 connector.
  • Page 131: Appendix B: Windows Help

    Windows Help Almost all networking products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 132: Startup Menu Procedures

    Startup Menu Procedures Downloading with Xmodem Startup Menu Procedures The Startup menu can be entered when booting the device. There is a two-second window of time to enter the Startup Menu immediately after the POST test. The menu can be accessed directly from a terminal connected to the console port.
  • Page 133 Note: The download file must be a valid binary software file from Linksys for the target switch. 8. After the file has been downloaded, you are prompted with Update Image File: to specify the type of code file.
  • Page 134 Startup Menu Procedures 10. To set the new downloaded file as the startup file, use the [S]et Startup File menu option. 11. Press Q to quit the firmware-download mode and boot the switch. After quitting, the device reboots automatically. SRW2024P User Guide...
  • Page 135: Appendix D: Glossary

    Glossary This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary Access Mode - Specifies the method by which user access is granted to the system.
  • Page 136 Best Effort - Indicates that traffic is assigned to the lowest priority queue, and packet delivery is not guaranteed. Bit - A binary digit. Boot - To start a device and cause it to start executing instructions. Browser - An application program that provides a way to look at and interact with all the information on the World Wide web.
  • Page 137 DHCP (Dynamic Host Configuration Protocol) - A networking protocol that allows administrators to assign temporary IP addresses to network computers by “leasing” an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. DHCP Clients - An Internet host using DHCP to obtain configuration parameters, such as a network address.
  • Page 138 Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide web. HTTPS (HyperText Transport Protocol Secure) - An extension to the standard HTTP protocol that provides confidentiality by encrypting the traffic from the website.
  • Page 139 Multicast - Transmits copies of a single packet to multiple ports. Network - A series of computers or devices connected for the purpose of data sharing, storage, and/or transmission between users. NMS (Network Management System) - An interface that provides a method of managing a system.
  • Page 140 SSH - Secure Shell. A utility that uses strong authentication and secure communications to log in to another computer over a network. SSL (Secure Socket Layer) - Encryption technology for the Internet used to provide secure transactions, such as the transmission of credit card numbers for e-commerce. Static IP Address - A fixed address assigned to a computer or device that is connected to a network.
  • Page 141 VLAN (Virtual Local Area Networks) - Logical subgroups that constitute a Local Area Network (LAN). This is done in software rather than defining a hardware solution. WAN (Wide Area Network) - Networks that cover a large geographical area. Wildcard Mask - Specifies which IP address bits are used, and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important.
  • Page 142: Appendix E: Warranty Information

    The internet URL address and the web pages referred to herein may be updated by Linksys from time to time; the version in effect at the date of purchase shall apply. This limited warranty is non-transferable and extends only to the original end-user purchaser.
  • Page 143: Obtaining Warranty Service

    Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected.
  • Page 144: Fcc Statement

    FCC Statement Regulatory Information FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 145 FCC Statement American National Standards Institute (ANSI) / Institute of Electrical and Electronic Engineers / IEEE C 95.1 (92) International Commission on Non Ionizing Radiation Protection (ICNIRP) 98 Ministry of Health (Canada) Safety Code 6. Limits on Human Exposure to Radio Frequency Fields in the range from 3kHz to 300 GHz Australia Radiation Protection Standard To ensure compliance with various national and international Electromagnetic Field (EMF)
  • Page 146: Explosive Environment, Medical And Faa Device Information

    Safety Notices This system has been evaluated for RF exposure for Humans in reference to the ICNIRP (International Commission on Non-Ionizing Radiation Protection) limits. The minimum separation distance from the antenna to the user is 20cm (7.9 inches). Explosive Environment, Medical and FAA Device Information Use on Board Aircraft The use of wireless on board aircraft is restricted by certain regulations and airline policy.
  • Page 147: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Dispose of used batteries according to the instructions. This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: SRW2024P User Guide...
  • Page 148 Safety Notices SRW2024P User Guide...
  • Page 149 Safety Notices SRW2024P User Guide...
  • Page 150 Safety Notices SRW2024P User Guide...
  • Page 151 Safety Notices SRW2024P User Guide...
  • Page 152 Safety Notices SRW2024P User Guide...
  • Page 153 Safety Notices SRW2024P User Guide...
  • Page 154 Safety Notices For more information, visit www.linksys.com SRW2024P User Guide...
  • Page 155: Appendix G: Specifications

    Specifications SRW2024 Specifications Model SRW2024 Ports 24 RJ-45 connectors for 10BASE-T, 100BASE-TX and 1000BASE-T with 4 shared SFP slots Cabling Type UTP CAT 5 or better for 10BASE-T/100BASE-TX, UTP CAT 5e or better for 1000BASE-T LEDs System, Link/Act, PoE Switching Capacity 48 Gbps, non-blocking Web User Interface Built-in web UI for easy browser-based configuration (HTTP/HTTPS)
  • Page 156 SRW2024 Specifications Storm Control Broadcast, Multicast, and Unknown Unicast Spanning Tree EEE 802.1d Spanning Tree, IEEE 802.1w Rapid Spanning Tree IGMP Snooping IGMP (v1/v2) snooping provides for fast client joins and leaves of multicast streams and limits bandwidth-intensive video traffic to only the requestors Priority Levels 4 Hardware queues...

This manual is also suitable for:

Srw2024p

Table of Contents