8 port 10/100/1000/2500m multi gigabit switch (2 pages)
Summary of Contents for Cerio CS-2424G-24P
Page 1
CERIO Corporation CS-2424G-24P PoE CS-2000 Series - 24 Port 10/100/1000M Gigabit Web Managed PoE+ Switch with 4 SFP Ports ( 400Watt Power ) User Manual...
Page 2
FCC Warning This device has been tested and found to comply with limits for a Class A digital device, pursuant to Part 2 and 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiates radio frequency energy and, if not installed and used in accordance with the user’s manual, may cause interference in which case user will be required to correct the interference at his own expense.
Introduction ............................6 Front Panel ..........................6 Rear Panel Layout ........................7 Software Configuration ........................8 Example of Segment: (Windows 7)..................8 System login username and password information ............. 12 System Status ........................... 13 Device Information ......................... 13 Port Flow Chart ........................14 Traffic Statistics ........................
Page 4
Storm Control .......................... 41 Security .............................. 42 Port Grouping .......................... 43 Port Isolation ........................... 43 MAC filter ..........................44 DOS Defense ........................... 45 VLAN Configuration ........................47 802.1Q VLAN ..........................47 VLAN Management ........................ 48 ACL ..............................48 MAC ACL ........................... 48 IP ACL ............................
802.3af standards. This layer 2 Web Management switch includes a 400watt internal power supply, providing a 350watt PoE power budget, and supports Remote on/off control of PoE power ports. CS-2424G-24P layer 2 functions include Spanning Tree and Rapid Spanning Tree Protocol, IEEE802.1Q Tag/Port Based VLAN functions, IEEE802.1p-based/Port-based QoS bandwidth control, IGMP Snooping, Link Aggregation Control Protocol (LACP), and much more.
Status Explanation 1) Hardware Reset button, press and hold for approximately 10 seconds. Once all the LED lights begin to flash, release the button to reset to default 2) System operational LED light 3) Power LED light. 4) 24 Port PoE LED status light. 1) 24 10/100/1000Mbps Ethernet Ports, 10/100Mbps is Orange and 1000Mbps is Green lights 2) 4 Fiber Ports 1.2 Rear Panel Layout...
CS-2424G-24P can be configured through a PC/NB by using its web browser such as Internet Explorer 6.0 or later. Set the IP segment of the administrator's computer to be in the same range as CS-2424G-24P for accessing the system. Do not duplicate the IP Address used here with IP Address of CS-2424G-24P or any other device within the network.
Page 9
Step 3 : In “Change adapter setting” Page, right click on Local LAN then select “Properties”...
Page 10
Step 4 : In the “Properties” page, click the “Properties” button to open TCP/IP setting Step 5 : In Properties page for setting IP addresses, find “Internet Protocol Version 4 (TCP/IPv4)” and double click to open TCP/IPv4 Properties window Double click...
Page 11
Step 6 : Select “Use the following IP address”, and fix in IP Address to: 192.168.2.X ex. The X is any number from 1 to 253 Subnet mask : 255.255.255.0 And Click "OK" to complete fixing the computer IP settings Step 7 : Open Web Browser Without a valid certificate, users may encounter the following problem in IE7 when they try to...
2.2 System login username and password information The CS-2424G-24P web switch default IP is 192.168.2.200 Into the management page as follows, please enter Username and password Default IP Address: 192.168.2.200 Default Username and Password Management Account Root Account...
3. System Status Device Information This administrator can check device system information in the “Device Information” tab Host Name: Display host name of the device. Model: Display switch model name. Firmware Version: Display system firmware version. MAC Address: Display MAC address for the device. ...
3.2 Port Flow Chart Administrator can monitor ports through graphical flow charts. View: Administrator can select all or one port to monitor. 3.3 Traffic Statistics Administrator can check the cumulative flow of each port.
3.4 MAC Table The MAC Table page can monitor device MAC information based on the connected port. Administrators can set individual ports to static or dynamic MAC addresses. If dynamic MAC Address is selected, administrators can then set dynamic aging time. Forwarding List: Display MAC address of the devices.
Port: Select linked port for the device. Dynamic Address settings: Administrator can set aging Time for Dynamic MAC address. Aging Time: Administrator can set a time for aging time. (Range 10~630 min) 3.5 System Load System Load function to display the usage status of the memory and the CPU/ Memory of switch via the data graph.
System Load The Page can display the usage status of the memory and the CPU/ Memory of switch via the data graph. 3.6 Network Detection Administrators can diagnose network connectivity via the PING or TRACERT Detection Address: Enter detection IP address. ...
4. Network 4.1 IP Address Administrator can set IP address for the system. The IP address support IPv4 & IPv6 protocol, if switch device must want to internet, administrator can set gateway IP address in the page. List of the Default: Administrator can select default used IP address. ...
4.2 MAC Address Administrator can view and modify the MAC address in the system. 4.3 DNS Settings Administrator can set IP Address for the DNS Server. Primary DNS Server: Enter IP address for Primary DNS Server. Secondary DNS server: Enter IP address for Secondary DNS server. ...
4.4 DHCP Protect (snooping) Administrator can set Dynamic Host Configuration Protocol (DHCP) snooping, preventing interference from other DHCP server. Service: Administrator can select Enable or Disable for the DHCP Protect function. IP Version: Administrator must select IP protocol of the Version 4 or 6. ...
4.5 DHCP Option82 The DHCP Relay Agent Information Option passes along port and agent information to a central DHCP server. It is useful in statistical analysis, as well as, indicating where an assigned IP address physically connects to the network. It may also be used to make DHCP decisions based on where the request is coming from or even which user is making the request.
DHCP Host Information: To Client Port: Display port number of the client send request. To Server Port: Display port number for the DHCP server response. Client IP: Display IP address for client. Server IP: Display IP address for DHCP Server. ...
Page 23
IGMP Snooping: Administrator can select enable or disable for the service. Version: Administrator can select v2 or v3 for the IGMP version. Unknown Multicast: Administrator can forward or drop Unknown Multicast. Router Port: Set router port. Port Fast Leave: In Port Fast Leave mode, when the switch receives IGMP leave ...
4.7 Multicast VLAN In multicast VLAN networks, subscribers to a multicast group can exist in VLAN. Administrator can set multicast VLAN ID, multicast VLAN by its VLAN ID in the range of 1 to 4094. Service: Administrator can select enable or disable the Service ...
Page 25
Service: Administrator can select enable or disable the Service Voice VLAN: Administrator can set VLAN ID in the range of 1 to 4094. Voice VLAN Port: Administrator can select ports for the voice VLAN. Organizationally Unique Identifiers (OUI) is the first three bytes of a MAC Address, while the last three bytes contain a unique station ID.
4.9 MAC VLAN A MAC VLAN takes a single Network interface and creates multiple virtual ones with different MAC addresses (many to one). MAC VLAN: Administrator can enable or disable the service. Administrator can click button to create MAC VLAN. 4.10 802.1x When client uses a RJ-45 link to switch port, the switch port will request 802.1x authentication of the client.
Page 27
802.1x Configuration Service: Administrator can enable or disable the 802.1x authentication service. Auth Method: Administrator can select authentication method for 802.1x. Administrator can click button in the Operating list to modify authentication function. Port: Display Port number. Status: Administrator can select enable or disable the service.
Page 28
Server Configuration Auth Key: Enter RADIUS Server Key. Num Of Retry: Enter re-check frequency. Primary Server: Administrator can set RADIUS Server information for Primary. Backup Server: Administrator can set RADIUS Server information for Backup. User Info: Administrator can monitor user authentication information.
4.11 LLDP The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP information is sent by devices from each of their interfaces at a fixed interval, in the form of an Ethernet frame.
Page 30
Service: Administrator can select enable or disable the STP service. Bridge Priority: The default Bridge Priority (Switch Priority) value of 32,768. Bridge Priority (Switch Priority) value decides which Switch can become Root Bridge (Root Switch). HelloTime: Set HelloTime (value range 1-10) for STP. ...
Page 31
STP Port Configuration Administrator can click Operating list button to set STP service. STP Port Information Display STP information for all Port...
4.13 Loop Detection Loop detection can be used in an MCT topology to detect Layer 2 loops that occur due to misconfigurations, for example, on the client side when MCT links are not configured as trunk links on the MCT-unaware client. Administrator can click Operating list button to set Action for Port shutdown or Port Blocking.
4.14 Jumbo Frame A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes. Jumbo frames are used on local area networks that support at least 1 Gbps and can be as large as 9,000 bytes. Administrator can select enable or disable the service.
4.16 SNMP Using SNMP, you can monitor network performance, audit network usage, detect network faults or inappropriate access, and in some cases configure remote devices. SNMP is designed to be deployed on the largest possible number of network devices, to have minimal impact on the managed nodes, to have minimal transport requirements, and to continue working when most other network applications fail.
Administrator can click Operating list button to modify port Operation. 5.2 MDIX Configuration A medium dependent interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to...
carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDI-X) interface. Auto MDI-X ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDI-X configuration to properly match the other end of the link. 5.3 Port Mirroring Port mirroring function can mirror Rx/Tx traffic, Packet can mirror to Destination port and for analysis.
addresses that can be learned on a single Layer 2 access interface or on all the Layer 2 access interfaces on the switch, or on a specific VLAN. Administrator can click Operating list button to set MAC Limit. 5.5 Port Aggregation Port Aggregation is also referred to as link aggregation, teaming port, and port trunking for 802.3ad (LACP, Link Aggregation Control Protocol), The Port Aggregation can aggregate...
Page 38
multiple Ethernet ports together to form a logical aggregation group. To upper layer entities, all the physical links in an aggregation group are a single logical link. Basic Configuration Administrator can set Source IP/MAC or Destination IP/ MAC for the policy. The LACP service can select enable or disable and also set Aggregation group.
The function with the lower system priority value determines which links between LACP partner devices are active and which are in standby for each LACP group. The device on the controlling end of the link uses port priorities to determine which ports are bundled into the aggregated bundle and which ports are put in standby mode.
network. It monitors the information among the ARP, DHCP or IPv4/v6 ARP ND packets to make sure they are all from legal sources help to quarantine illegal device or hackers intend to fake the IP or MAC address on legal devices at the edge of network. IP Version: The function support IPv4/v6, administrator can select IP address by v4/v6 ...
interface. Administrator can click button in Operating list. 5.8 Storm Control Traffic storm control (also called traffic suppression) allows you to monitor the levels of the...
incoming broadcast, multicast, and unicast traffic over a 1-second interval. During this interval, the traffic level, which is a percentage of the total available bandwidth of the port, is compared with the traffic storm control level that you configured. When the ingress traffic reaches the traffic storm control level that is configured on the port, traffic storm control drops the traffic until the interval ends.
6.1 Port Grouping Administrator can create own grouping of devices and ports to efficiently update and manage devices. Administrator can click button to modify or create Port Grouping in the Operating list. 6.2 Port Isolation...
When administrators use the port isolation feature, the selected ports will no longer be able to communicate with each other. 6.3 MAC filter MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on the list will denies network access to specific devices the use for the blacklists.
6.4 DOS Defense The Switch function support DoS(denial-of-service) defense. Denial-of-service (DoS) is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Administrator can click button to enable the security in Operating list.
6.5 Web Access Control Administrator can set source IP address in list. When this function is enabled, the source IP address can be used to login to the management page of the switch. Other IP addresses can no longer be used to login.
7. VLAN Configuration 7.1 802.1Q VLAN The VLAN function can set Tag Based VLAN. None: No changes to egress packets. Tagged: Insert port's tag for egress packets. UnTagged: Remove tag ID. ...
7.2 VLAN Management The Page administrator can set PVID protocol. 8. ACL 8.1 MAC ACL ACL is Access Control List, MAC ACLs are Layer 2 ACLs. Administrator can configure the Source/Destination MAC address and MAC mask rules to Permit or deny for the packet.
8.2 IP ACL Administrator can configure the Source IP address and IP mask rules to Permit or deny for the packet.
Page 50
Name:Administrator can enter the rule name. Privilege:Administrator can select Permit or Deny for the rule. SIP: If administrator want to deny an IP address, administrator can setting source IP address for deny. SIP Mask:Administrator must to enter source IP Mask. example: block a IP address, the ...
9. QoS Quality of Service (QoS) prioritizes network traffic and manages available bandwidth so that the most important traffic goes first. QoS is implemented as rules or policies that prioritize packets, optionally change information in the packet header, and assign them to outbound port queues based on their priority.
WRR: Weight Round Robin Scheduling is like waiting in line, Packets in all the queues are sent in order based on the weight value for each queue. WRR+SP: Weight Round Robin + Strict Priority, Queues in SP are scheduled strictly ...
CoS: Class of Service is data frame in the level 2. When the port priority is specified, the data will be classified into the egress queue based on the CoS value of the ingress port and the mapping relation between the CoS in cos mapping. ...
PSE Total Power: Administrator can set PSE total Power total limit. Power Guard Band: The power guard band can provide protection when there is a sudden spike in the consumed power of PDs that could potentially impact other PoE enabled ports.
10.4 PoE Timing Reboot Administrator can control PoE output power on/off by schedule in the page. Please click “PoE Timing Reboot” and click button to create new schedule. No.: Administrator can select number 1-24 for identifiable item. Status Operation: Administrator can select Enable or Disable the schedule. ...
10.5 Power Limitation If “Power Manage Mode” is set to “Static” in the POE Global setting page, the Power limitation function will be able to set output power for single PoE ports Please click “PoE Configuration” “Power Limitation” to set single PoE Max output Power.
V * mA = mW mW * 0.001 = W 10.7 Device Manager Administrators can set a minimum PoE power output. The PoE output for each port cannot fall below the set minimum PoE wattage. Please click “PoE Configuration” “Device Manage” to set minimum manager...
Administrator can select enable or disable for the service. 11. System Setting 11.1 Quick Settings This function allows administrator to quickly make setting changes to hostname, IP address, Netmask, DNS and gateway. Host Name: Administrator can set system name for the switch. ...
11.2 Web Management The page administrator can change login service and login timeout time. 11.3 Administrator Administrator can change login password or create new account / password for the system login, the account can be set to Ordinary or Administrator Permissions.
11.4 System Config This function can restore the system to default settings, and also backup or restore the device using preconfigured profile settings. Restore Factory: Administrator can click the "Restore" button to reset back to default settings. This will restore factory configuration and all user configurations will be deleted.
11.5 Firmware Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations. Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 2 minutes to upgrade due to complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade button to upgrade.
11.7 Reboot This function allows administrator to reboot system or click “Timing Restart” function set auto reboot for the time schedule. Click Reboot button to proceed and take around one minute to complete.
Page 65
Timing Restart Status Operation: Administrator can choose Enable or Disable for the service. Cycle: Administrator can choose auto reboot by One Time or Every day or Custom. One Time: Administrator can specify a time to reboot system. Everyday: Administrator can set every day to reboot system.
System Log 12.1 Event Log The Event log displays system events when system is up and running. Also, it becomes very useful as a troubleshooting tool when issues are experienced in system. 12.2 Alarm Log When system is up and running, the Alarm Log page can display system Alarm information.
12.3 Security Log When system is up and running, the security Log page can display system security information. 12.4 Network Log When system is up and running, the Network Log page can display system Network information.
Page 68
12.5 Protocol Log When system is up and running, the Protocol Log page can display Protocol information.
Need help?
Do you have a question about the CS-2424G-24P and is the answer not in the manual?
Questions and answers