Cerio CS-2424G-24P User Manual

24 port 10/100/1000m gigabit web managed poe+ switch with 4 sfp ports 400watt power

Advertisement

Quick Links

CERIO Corporation
CS-2424G-24P
PoE CS-2000 Series - 24 Port 10/100/1000M Gigabit Web
Managed PoE+ Switch with 4 SFP Ports ( 400Watt Power )
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CS-2424G-24P and is the answer not in the manual?

Questions and answers

Summary of Contents for Cerio CS-2424G-24P

  • Page 1 CERIO Corporation CS-2424G-24P PoE CS-2000 Series - 24 Port 10/100/1000M Gigabit Web Managed PoE+ Switch with 4 SFP Ports ( 400Watt Power ) User Manual...
  • Page 2 FCC Warning This device has been tested and found to comply with limits for a Class A digital device, pursuant to Part 2 and 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiates radio frequency energy and, if not installed and used in accordance with the user’s manual, may cause interference in which case user will be required to correct the interference at his own expense.
  • Page 3: Table Of Contents

    Introduction ............................6 Front Panel ..........................6 Rear Panel Layout ........................7 Software Configuration ........................8 Example of Segment: (Windows 7)..................8 System login username and password information ............. 12 System Status ........................... 13 Device Information ......................... 13 Port Flow Chart ........................14 Traffic Statistics ........................
  • Page 4 Storm Control .......................... 41 Security .............................. 42 Port Grouping .......................... 43 Port Isolation ........................... 43 MAC filter ..........................44 DOS Defense ........................... 45 VLAN Configuration ........................47 802.1Q VLAN ..........................47 VLAN Management ........................ 48 ACL ..............................48 MAC ACL ........................... 48 IP ACL ............................
  • Page 5 12.2 Alarm Log ..........................66 12.3 Security Log ..........................67 12.4 Network Log ..........................67 Specifications ............................... 69...
  • Page 6: Introduction

    802.3af standards. This layer 2 Web Management switch includes a 400watt internal power supply, providing a 350watt PoE power budget, and supports Remote on/off control of PoE power ports. CS-2424G-24P layer 2 functions include Spanning Tree and Rapid Spanning Tree Protocol, IEEE802.1Q Tag/Port Based VLAN functions, IEEE802.1p-based/Port-based QoS bandwidth control, IGMP Snooping, Link Aggregation Control Protocol (LACP), and much more.
  • Page 7: Rear Panel Layout

    Status Explanation 1) Hardware Reset button, press and hold for approximately 10 seconds. Once all the LED lights begin to flash, release the button to reset to default 2) System operational LED light 3) Power LED light. 4) 24 Port PoE LED status light. 1) 24 10/100/1000Mbps Ethernet Ports, 10/100Mbps is Orange and 1000Mbps is Green lights 2) 4 Fiber Ports 1.2 Rear Panel Layout...
  • Page 8: Software Configuration

    CS-2424G-24P can be configured through a PC/NB by using its web browser such as Internet Explorer 6.0 or later. Set the IP segment of the administrator's computer to be in the same range as CS-2424G-24P for accessing the system. Do not duplicate the IP Address used here with IP Address of CS-2424G-24P or any other device within the network.
  • Page 9 Step 3 : In “Change adapter setting” Page, right click on Local LAN then select “Properties”...
  • Page 10 Step 4 : In the “Properties” page, click the “Properties” button to open TCP/IP setting Step 5 : In Properties page for setting IP addresses, find “Internet Protocol Version 4 (TCP/IPv4)” and double click to open TCP/IPv4 Properties window Double click...
  • Page 11 Step 6 : Select “Use the following IP address”, and fix in IP Address to: 192.168.2.X ex. The X is any number from 1 to 253 Subnet mask : 255.255.255.0 And Click "OK" to complete fixing the computer IP settings Step 7 : Open Web Browser Without a valid certificate, users may encounter the following problem in IE7 when they try to...
  • Page 12: System Login Username And Password Information

    2.2 System login username and password information The CS-2424G-24P web switch default IP is 192.168.2.200 Into the management page as follows, please enter Username and password Default IP Address: 192.168.2.200  Default Username and Password  Management Account Root Account...
  • Page 13: System Status

    3. System Status Device Information This administrator can check device system information in the “Device Information” tab Host Name: Display host name of the device.  Model: Display switch model name.  Firmware Version: Display system firmware version.  MAC Address: Display MAC address for the device. ...
  • Page 14: Port Flow Chart

    3.2 Port Flow Chart Administrator can monitor ports through graphical flow charts. View: Administrator can select all or one port to monitor.  3.3 Traffic Statistics Administrator can check the cumulative flow of each port.
  • Page 15: Mac Table

    3.4 MAC Table The MAC Table page can monitor device MAC information based on the connected port. Administrators can set individual ports to static or dynamic MAC addresses. If dynamic MAC Address is selected, administrators can then set dynamic aging time. Forwarding List: Display MAC address of the devices.
  • Page 16: System Load

    Port: Select linked port for the device.  Dynamic Address settings: Administrator can set aging Time for Dynamic MAC  address. Aging Time: Administrator can set a time for aging time. (Range 10~630 min)  3.5 System Load System Load function to display the usage status of the memory and the CPU/ Memory of switch via the data graph.
  • Page 17: Network Detection

    System Load The Page can display the usage status of the memory and the CPU/ Memory of switch via the data graph. 3.6 Network Detection Administrators can diagnose network connectivity via the PING or TRACERT  Detection Address: Enter detection IP address. ...
  • Page 18: Network

    4. Network 4.1 IP Address Administrator can set IP address for the system. The IP address support IPv4 & IPv6 protocol, if switch device must want to internet, administrator can set gateway IP address in the page. List of the Default: Administrator can select default used IP address. ...
  • Page 19: Mac Address

    4.2 MAC Address Administrator can view and modify the MAC address in the system. 4.3 DNS Settings Administrator can set IP Address for the DNS Server. Primary DNS Server: Enter IP address for Primary DNS Server.  Secondary DNS server: Enter IP address for Secondary DNS server. ...
  • Page 20: Dhcp Protect (Snooping)

    4.4 DHCP Protect (snooping) Administrator can set Dynamic Host Configuration Protocol (DHCP) snooping, preventing interference from other DHCP server. Service: Administrator can select Enable or Disable for the DHCP Protect function.  IP Version: Administrator must select IP protocol of the Version 4 or 6. ...
  • Page 21: Dhcp Option82

    4.5 DHCP Option82 The DHCP Relay Agent Information Option passes along port and agent information to a central DHCP server. It is useful in statistical analysis, as well as, indicating where an assigned IP address physically connects to the network. It may also be used to make DHCP decisions based on where the request is coming from or even which user is making the request.
  • Page 22: Igmp Snooping

    DHCP Host Information:  To Client Port: Display port number of the client send request.  To Server Port: Display port number for the DHCP server response.  Client IP: Display IP address for client.  Server IP: Display IP address for DHCP Server. ...
  • Page 23 IGMP Snooping: Administrator can select enable or disable for the service.  Version: Administrator can select v2 or v3 for the IGMP version.  Unknown Multicast: Administrator can forward or drop Unknown Multicast.  Router Port: Set router port.  Port Fast Leave: In Port Fast Leave mode, when the switch receives IGMP leave ...
  • Page 24: Multicast Vlan

    4.7 Multicast VLAN In multicast VLAN networks, subscribers to a multicast group can exist in VLAN. Administrator can set multicast VLAN ID, multicast VLAN by its VLAN ID in the range of 1 to 4094. Service: Administrator can select enable or disable the Service ...
  • Page 25 Service: Administrator can select enable or disable the Service  Voice VLAN: Administrator can set VLAN ID in the range of 1 to 4094.  Voice VLAN Port: Administrator can select ports for the voice VLAN.  Organizationally Unique Identifiers (OUI) is the first three bytes of a MAC Address, while the last three bytes contain a unique station ID.
  • Page 26: Mac Vlan

    4.9 MAC VLAN A MAC VLAN takes a single Network interface and creates multiple virtual ones with different MAC addresses (many to one). MAC VLAN: Administrator can enable or disable the service.  Administrator can click button to create MAC VLAN. 4.10 802.1x When client uses a RJ-45 link to switch port, the switch port will request 802.1x authentication of the client.
  • Page 27 802.1x Configuration Service: Administrator can enable or disable the 802.1x authentication service.  Auth Method: Administrator can select authentication method for 802.1x.  Administrator can click button in the Operating list to modify authentication function. Port: Display Port number.  Status: Administrator can select enable or disable the service.
  • Page 28 Server Configuration Auth Key: Enter RADIUS Server Key.  Num Of Retry: Enter re-check frequency.  Primary Server: Administrator can set RADIUS Server information for Primary.  Backup Server: Administrator can set RADIUS Server information for Backup.  User Info: Administrator can monitor user authentication information.
  • Page 29: Lldp

    4.11 LLDP The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP information is sent by devices from each of their interfaces at a fixed interval, in the form of an Ethernet frame.
  • Page 30 Service: Administrator can select enable or disable the STP service.  Bridge Priority: The default Bridge Priority (Switch Priority) value of 32,768. Bridge  Priority (Switch Priority) value decides which Switch can become Root Bridge (Root Switch). HelloTime: Set HelloTime (value range 1-10) for STP. ...
  • Page 31 STP Port Configuration Administrator can click Operating list button to set STP service. STP Port Information Display STP information for all Port...
  • Page 32: Loop Detection

    4.13 Loop Detection Loop detection can be used in an MCT topology to detect Layer 2 loops that occur due to misconfigurations, for example, on the client side when MCT links are not configured as trunk links on the MCT-unaware client. Administrator can click Operating list button to set Action for Port shutdown or Port Blocking.
  • Page 33: Jumbo Frame

    4.14 Jumbo Frame A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes. Jumbo frames are used on local area networks that support at least 1 Gbps and can be as large as 9,000 bytes. Administrator can select enable or disable the service.
  • Page 34: Port Configuration

    4.16 SNMP Using SNMP, you can monitor network performance, audit network usage, detect network faults or inappropriate access, and in some cases configure remote devices. SNMP is designed to be deployed on the largest possible number of network devices, to have minimal impact on the managed nodes, to have minimal transport requirements, and to continue working when most other network applications fail.
  • Page 35: Mdix Configuration

    Administrator can click Operating list button to modify port Operation. 5.2 MDIX Configuration A medium dependent interface (MDI) describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to...
  • Page 36: Port Mirroring

    carry the transmission. Ethernet over twisted pair also defines a medium dependent interface crossover (MDI-X) interface. Auto MDI-X ports on newer network interfaces detect if the connection would require a crossover, and automatically chooses the MDI or MDI-X configuration to properly match the other end of the link. 5.3 Port Mirroring Port mirroring function can mirror Rx/Tx traffic, Packet can mirror to Destination port and for analysis.
  • Page 37: Port Aggregation

    addresses that can be learned on a single Layer 2 access interface or on all the Layer 2 access interfaces on the switch, or on a specific VLAN. Administrator can click Operating list button to set MAC Limit. 5.5 Port Aggregation Port Aggregation is also referred to as link aggregation, teaming port, and port trunking for 802.3ad (LACP, Link Aggregation Control Protocol), The Port Aggregation can aggregate...
  • Page 38 multiple Ethernet ports together to form a logical aggregation group. To upper layer entities, all the physical links in an aggregation group are a single logical link. Basic Configuration Administrator can set Source IP/MAC or Destination IP/ MAC for the policy. The LACP service can select enable or disable and also set Aggregation group.
  • Page 39: Port-Ip-Mac-Binding

    The function with the lower system priority value determines which links between LACP partner devices are active and which are in standby for each LACP group. The device on the controlling end of the link uses port priorities to determine which ports are bundled into the aggregated bundle and which ports are put in standby mode.
  • Page 40: Rate Limit

    network. It monitors the information among the ARP, DHCP or IPv4/v6 ARP ND packets to make sure they are all from legal sources help to quarantine illegal device or hackers intend to fake the IP or MAC address on legal devices at the edge of network. IP Version: The function support IPv4/v6, administrator can select IP address by v4/v6 ...
  • Page 41: Storm Control

    interface. Administrator can click button in Operating list. 5.8 Storm Control Traffic storm control (also called traffic suppression) allows you to monitor the levels of the...
  • Page 42: Security

    incoming broadcast, multicast, and unicast traffic over a 1-second interval. During this interval, the traffic level, which is a percentage of the total available bandwidth of the port, is compared with the traffic storm control level that you configured. When the ingress traffic reaches the traffic storm control level that is configured on the port, traffic storm control drops the traffic until the interval ends.
  • Page 43: Port Grouping

    6.1 Port Grouping Administrator can create own grouping of devices and ports to efficiently update and manage devices. Administrator can click button to modify or create Port Grouping in the Operating list. 6.2 Port Isolation...
  • Page 44: Mac Filter

    When administrators use the port isolation feature, the selected ports will no longer be able to communicate with each other. 6.3 MAC filter MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on the list will denies network access to specific devices the use for the blacklists.
  • Page 45: Dos Defense

    6.4 DOS Defense The Switch function support DoS(denial-of-service) defense. Denial-of-service (DoS) is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Administrator can click button to enable the security in Operating list.
  • Page 46: Web Access Control

    6.5 Web Access Control Administrator can set source IP address in list. When this function is enabled, the source IP address can be used to login to the management page of the switch. Other IP addresses can no longer be used to login.
  • Page 47: Vlan Configuration

    7. VLAN Configuration 7.1 802.1Q VLAN The VLAN function can set Tag Based VLAN. None: No changes to egress packets.  Tagged: Insert port's tag for egress packets.  UnTagged: Remove tag ID. ...
  • Page 48: Vlan Management

    7.2 VLAN Management The Page administrator can set PVID protocol. 8. ACL 8.1 MAC ACL ACL is Access Control List, MAC ACLs are Layer 2 ACLs. Administrator can configure the Source/Destination MAC address and MAC mask rules to Permit or deny for the packet.
  • Page 49: Ip Acl

    8.2 IP ACL Administrator can configure the Source IP address and IP mask rules to Permit or deny for the packet.
  • Page 50 Name:Administrator can enter the rule name.  Privilege:Administrator can select Permit or Deny for the rule.  SIP: If administrator want to deny an IP address, administrator can setting source IP  address for deny. SIP Mask:Administrator must to enter source IP Mask. example: block a IP address, the ...
  • Page 51: Qos

    9. QoS Quality of Service (QoS) prioritizes network traffic and manages available bandwidth so that the most important traffic goes first. QoS is implemented as rules or policies that prioritize packets, optionally change information in the packet header, and assign them to outbound port queues based on their priority.
  • Page 52: Queue Algorithm

    9.3 Queue Algorithm WFQ: Each Queue can set a weight by QoS. The QoS function will be based on weights  to allocate bandwidth to ensure basic.
  • Page 53: Default Priority

    WRR: Weight Round Robin Scheduling is like waiting in line, Packets in all the queues are  sent in order based on the weight value for each queue. WRR+SP: Weight Round Robin + Strict Priority, Queues in SP are scheduled strictly ...
  • Page 54: Qos Trust

    CoS: Class of Service is data frame in the level 2. When the port priority is specified, the data will  be classified into the egress queue based on the CoS value of the ingress port and the mapping relation between the CoS in cos mapping. ...
  • Page 55: Power Priority

    PSE Total Power: Administrator can set PSE total Power total limit.  Power Guard Band: The power guard band can provide protection when there is a  sudden spike in the consumed power of PDs that could potentially impact other PoE enabled ports.
  • Page 56: Power Supply

    10.3 Power Supply In the Power Supply function, administrator can manually control PoE Power on / off by port...
  • Page 57: Poe Timing Reboot

    10.4 PoE Timing Reboot Administrator can control PoE output power on/off by schedule in the page. Please click “PoE Timing Reboot” and click button to create new schedule. No.: Administrator can select number 1-24 for identifiable item.  Status Operation: Administrator can select Enable or Disable the schedule. ...
  • Page 58: Power Limitation

    10.5 Power Limitation If “Power Manage Mode” is set to “Static” in the POE Global setting page, the Power limitation function will be able to set output power for single PoE ports Please click “PoE Configuration”  “Power Limitation” to set single PoE Max output Power.
  • Page 59: Device Manager

    V * mA = mW mW * 0.001 = W 10.7 Device Manager Administrators can set a minimum PoE power output. The PoE output for each port cannot fall below the set minimum PoE wattage. Please click “PoE Configuration”  “Device Manage” to set minimum manager...
  • Page 60: System Setting

    Administrator can select enable or disable for the service. 11. System Setting 11.1 Quick Settings This function allows administrator to quickly make setting changes to hostname, IP address, Netmask, DNS and gateway. Host Name: Administrator can set system name for the switch. ...
  • Page 61: Web Management

    11.2 Web Management The page administrator can change login service and login timeout time. 11.3 Administrator Administrator can change login password or create new account / password for the system login, the account can be set to Ordinary or Administrator Permissions.
  • Page 62: System Config

    11.4 System Config This function can restore the system to default settings, and also backup or restore the device using preconfigured profile settings. Restore Factory: Administrator can click the "Restore" button to reset back to default settings. This will restore factory configuration and all user configurations will be deleted.
  • Page 63: Firmware Upgrade

    11.5 Firmware Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations. Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 2 minutes to upgrade due to complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade button to upgrade.
  • Page 64: Reboot

    11.7 Reboot This function allows administrator to reboot system or click “Timing Restart” function set auto reboot for the time schedule. Click Reboot button to proceed and take around one minute to complete.
  • Page 65 Timing Restart Status Operation: Administrator can choose Enable or Disable for the service.  Cycle: Administrator can choose auto reboot by One Time or Every day or Custom.  One Time: Administrator can specify a time to reboot system.  Everyday: Administrator can set every day to reboot system.
  • Page 66: System Log

    System Log 12.1 Event Log The Event log displays system events when system is up and running. Also, it becomes very useful as a troubleshooting tool when issues are experienced in system. 12.2 Alarm Log When system is up and running, the Alarm Log page can display system Alarm information.
  • Page 67: Security Log

    12.3 Security Log When system is up and running, the security Log page can display system security information. 12.4 Network Log When system is up and running, the Network Log page can display system Network information.
  • Page 68 12.5 Protocol Log When system is up and running, the Protocol Log page can display Protocol information.
  • Page 69: Specifications

    Specifications Standards & Hardware Specifications IEEE 802.3 10Base-T IEEE 802.3u 100Base-TX, IEEE 802.3ab 1000Base-T, IEEE 802.3z 1000Base-SX/LX IEEE 802.3x Flow Control Standards Conformance IEEE 802.1p QoS IEEE 802.1Q VLAN Tag IEEE 802.3ad Link Aggregation IEEE 802.3af Power over Ethernet ( 15.4 Watt PoE+ ) IEEE 802.3at Power over Ethernet Plus ( 30 Watt PoE+ ) 24 ports RJ-45 connectors for 10/100/1000 BASE-T and PSE/ PoE function...
  • Page 70 Switch Specifications Link Aggregation IEEE802.3ad LACP Link Aggregation Supported Port Mirror Supported Quality of Service (QoS) Supports IEEE 802.1p QoS, Port-based QoS Bandwidth Control Supported Spanning Tree(STP) Supported Rapid Spanning Tree(RSTP) Supported IGMP Snooping v1, v2, v3 MAC Filter Supported DHCP Snooping Supported VLAN...

This manual is also suitable for:

Cs-2000 series

Table of Contents