Page 1
BEC V8E2G 8-Port VDSL2 + 2 Gigabit Combo VDSL2 30a CO Switch User Manual...
Page 2
Copyright 2010.All rights were reserved. No Part of the contents of this guide maybe transmitted or reproduced in any form or by any means without the written permission of BEC Technologies, Inc.. The revision date for this guide is Jan. 2010, Version 1.0I...
Contents 1. Introduction....................4 1.1. Package Contents................4 1.2. How to Use this Guide ..............4 2. Installation....................5 2.1. Product Description Overview............5 2.2. Switch Front and Rear Panel ............5 2.3. LED Function ...................6 2.4. Installing the Switch .................6 2.4.1. Pre-Installation Considerations..........7 2.4.2. Desktop or Shelf Mounting ..........7 2.5.
1. Introduction Thank you for choosingVDSL2 Product These products are cost-effective switching solution idea for small business and the network edge. It provides the Quality of Service (QoS) features, like 802.1p, DSCP and Rate Control etc, to ensure the traffic is prioritized properly to deliver real-time applications like voice and video and also have a good control in network bandwidth usage.
2. Installation This chapter describes the function of the VDSL2 switch components and shows how to install it on the desktop or shelf. Basic knowledge of networking is assumed. Read this chapter completely before continuing. 2.1. Product Description Overview The product support VDSL2, supports 802.1Q VLAN, QoS, 802.1d / 1w/ 1s Spanning Tree Protocol, 802.1x, Port Security, Port Mirroring, IGMP Snooping, SNTP, Storm Control, Rate Control, SNMP and RMON, Link Aggregation (IEEE 802.3ad) etc.
2.3. LED Function This section explains the definition of the Switch’s LEDs on the front panel. Group Color Function On : When the power supplied to the system Off : Power off System System Green Blinking: While system Booting /System Self-Test / Firmware upgrade/Error.
2.4.1. Pre-Installation Considerations Gigabit Considerations: If you will use the switch for Gigabit applications, keep in mind that the maximum UTP cabling length of Category 5e cable is 328 feet (100 meters). Positioning the switch: When choosing a location for the switch, observe the following guidelines: Keep enough ventilation space between the switch and the surrounding objects.
Page 8
E) Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given to supply connections other than direct connections to the branch circuit (e.g. use of power strips)." To mount the Switch in any standard-sized, 19-inch wide, 1U high rack, please follow these instructions: Place the Switch on a hard flat surface with the front panel facing you.
3. Configuration 3.1. Login 3.1.1. Power-On Self-Testing The power-on self-testing is running immediately after the switch system is powered up. The self-testing program diagnoses the hardware components of a switch system. After hardware tests are all passed, the system will detect and display the module slot status and start the initializations.
Items Option Default Value User name Max:10, Min:0 characters, case sensitive admin Password Max:10, Min:0 characters, case sensitive NULL 3.2. Web User Interface 3.2.1. Home After user login verification, the homepage of the switch will be shown as below. 3.2.2. Administration There are many management functions can be set or performed if you expand the submenus of Administrator in MENU area.
Page 11
Syslog Setting Firmware Update Configuration Backup 3.2.2.1. IP Address Setting User can see and modify the IP address, subnet mask and default gateway in this page, then clicks “Apply” button to confirm (save) the settings, then the switch reboot must be done to activate the updates. The IP address can be statically set or dynamically be assigned by the DHCP Server.
Page 12
Module Info All information in this field is read only; user can’t modify its contents. It is only to display the module port information. MISC CONFIG This page is to provide miscellaneous settings: MAC Address Age-out Time: Type the number of seconds that an inactive MAC address remains in the switch's address table.
Page 13
3.2.2.3. Console Port Information Console is a standard UART (RS-232) interface to communicate with serial port. User can use windows HyperTerminal program to link the switch .Refer to following information, user can’t modify the contents. -13-...
Page 14
3.2.2.4. Port Configuration Port Controls This webpage is to provide the display and modification for the port settings. Use the dropdown in Port field to select one or multiple ports. The port settings for the selected port(s) will be displayed in web. Use the other control fields in the upper area to modify the port settings for the selected port(s).
Page 15
Port Sniffer The Port Sniffer (mirroring) is a method for monitor traffic in switched networks. Traffic through a port can be monitored by one specific port. That is, traffic goes in or out a monitored port will be duplicated into sniffer port. Sniffer Type: Select a sniffer mode: Disable / Rx / TX / Both.
Page 16
Protected Port There are two protected port groups. Ports in different groups can't communicate each other. In the same group, protected ports can't communicate each other, but can communicate with unprotected ports. Unprotected ports can communicate with any ports, including protected ports. In default, all ports are in Group1 and not protected.
Page 17
Agent. SNMP packets with community names that do not pass the authentication on the device are simply discarded. SNMPv2c SNMPv2c also uses community name for authentication. Compatible with SNMPv1, it extends the functions of SNMPv1. SNMPv2c provides more operation modes such as GetBulk; it supports more data types such as Counter32;...
Page 18
Trap Manager Trap Manager is a management station that receives traps, the system alerts generated by the switch. If no trap manager is defined, no traps are issued. Create a trap manager by entering the IP address of the station and a community string.
Page 19
SNMPv3 Access SNMPv3 Access control users’ access to management information. Only a user with access rights can manage the objects. When a user accesses the management information, he can access only the objects defined by the corresponding MIB view. SNMPv3 USM-User USM introduces the concepts of username and group.
Page 20
3.2.2.6. Syslog This system supports syslog sent to a remote syslog server. Currently system will do syslog for 3 events: cold start, warm start And link change. In this page, user needs to setup the following parameters to activate the syslog: Syslog server IP: The IP address of remote syslog server .Log level: None: never send syslog message to syslog server, and Max Age parameters of the root bridge, regardless of how it is configured.
Page 21
image file. Then press Apply button to start the firmware update process. The firmware image will first update to the RAM area in system. Hit the Update Firmware button to confirm to write to the system’s flash memory. When the whole process is completed, system needs to be rebooted by pressing the reboot button to activate the new firmware.
Page 22
TFTP Backup Configuration Use this page to assign a TFTP server IP address and a filename to be stored. Then press Apply button to start the backup process. HTTP Restore Configuration Press “browse” button to select the destination file, then press “submit” button to restore your configuration.
3.2.3. L2 Features This switch provides the following L2 features: VLAN Configuration Trunking (Port Aggregation) Forwarding & Filtering Spanning Tree (STP) IGMP Snooping Spanning Tree DHCP Relay & Option 82 LLDP (optional) 3.2.3.1. VLAN Configuration A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain.
Page 24
802.1Q VLAN In this page, user can create 802.1Q (tag-based) VLAN. There are up to 512 VLAN groups to provide configuration. While VLAN Operation Mode is changed to 802.1Q VLAN, all ports on the switch belong to default VLAN group which VID is 1.
Page 25
VLAN Filters Port NO.: Port number(s) to be assigned to see or configure the settings. Port VID (PVID): Port VLAN ID will be assigned to untagged traffic on a given port. This feature is useful for accommodating devices that you want to participate in the VLAN but that don’t support tagging.
Page 26
GVRP Table In GVRP table the VLAN group(s) dynamically created by GVRP can be displayed with VID and port member(s). QinQ VLAN QinQ Port Setting Business customers of service providers often have specific requirements for VLAN IDs and the number of VLANs to be supported. The VLAN ranges required by different customers in the same service-provider network might overlap, and traffic of customers through the infrastructure might be mixed.
Page 27
VLAN. Using QinQ expands VLAN space by using a VLAN-in-VLAN hierarchy and retagging the tagged packets. A port configured to support QinQ is called a QinQ user-port. A port configured to support QinQ Uplink is called a QinQ uplink-port. To enable QinQ function, the global QinQ option, QinQ Tpid and specified port-based QinQ User or Uplink port option need to be configured.
Page 28
Note: Only the ports (user port, uplink port) not belong to any VLAN can be added to the same tunnel Following figure is an example of QinQ VLAN application Refer to the figure of QinQ application in previous page, a QinQ tunnel using VLAN100 wants to be created for Sales VLAN10 across the public network.
Page 29
qinq uplinkport enable 2 qinq tunnel add 1 10 1, 2 3.2.3.2. Trunking The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems on a link to allow their Link Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs, move the link to that Link Aggregation Group, and enable its transmission and reception functions in an orderly manner.
Page 30
In aggregator information: The static LACP static trunk group will be displayed as follows: In State Activity: Active (select): The port automatically sends LACP protocol packets. N/A (no select): The port does not automatically sends LACP protocol packets, and responds only if it receives LACP protocol packets from the opposite device.
Page 31
Dynamic MAC Table Static MAC Table MAC Filtering Dynamic MAC Table The switch will dynamically learn the device’s MAC address when it corresponding with the switch. MAC address will be stored in MAC address table. Dynamic MAC Table shows the MAC addresses learned by the switch. The table will be shown by pages if larger than 500 MAC Addresses.
Page 32
Port number: Switch port number to associate with the MAC address in a MAC entry VLAN ID: If tag-based (IEEE 802.1Q) VLANs are enabled, static MAC address can be associated with individual VLANs. Type the VID in this field to associate with the MAC address.
Page 33
3.2.3.4 IGMP Snooping This switch supports multicast IP, one can enable IGMP protocol on web management’s switch setting advanced page, then display the IGMP snooping information in this page, you can view difference multicast group, VID and member port in here, IP multicast addresses range from 224.0.0.0 through 239.255.255.255.
Page 34
IGMP protocol: Enable/disable IGMP snooping. IGMP fast leave: Enable/disable IGMP snooping fast leave. If enable, switch will fast delete member who send leave report, else wait one second. IGMP Querier: Enable/disable IGMP snooping querier. If select disable, the switch can’t send query report. 3.2.3.5 Spanning Tree STP provides tree topology for any arrangement of bridges and it also provides a unique path between end stations on a network.
Page 35
VLANs, each instance is associated with the L2 domain on which it performs loop detection/mitigation. This enables a port to be stopped in one instance (for example, in the above example, traffic from VLAN A) while traffic can remain active in another domain where no loop was seen (in VLAN B in the above example).
Page 36
to the Learning or Forwarding State, respectively. It is also the value used for the ageing time of dynamic entries in the Filtering Database, while received BPDU indicate a topology change. Value range <4- 30>. Default value is 15. You can view STP information about the Root Bridge. Such as following screen PerPort configuration 3.2.3.5.2...
Page 37
Parameter Description The contribution of the path through this port, when the port is the Path Cost root port, to the total cost of the path to the root for this bridge. Value range <1-65535>. You can make it more or less likely to become the root port, the Priority lowest number has the highest priority.
Page 38
value is 32768. Status —You can choose the value of Enable if you want the Instance to be enable. Value range is Disable or Enable. Default value is Instance 0 Enable, Other Disable. VLAN Range — Displays the VLANs mapped to the selected instance. Each VLAN belongs to a single instance.
Page 39
forward traffic, however it can learn new MAC addresses. Forwarding — Port on this instance is in Forwarding mode. The port can forward traffic and learn new MAC addresses. Port Role — Displays the port role, per port per instance, assigned by the MSTP algorithm in order to provide STP paths.
Page 40
is exchanged between directly connected devices. Information in LLDP PDUs received is restored in its MIB. A LLDP-enabled device operating in the TxRx mode or Tx mode sends LLDP PDUs to its directly connected devices periodically. It also sends LLDP PDUs when the local configuration changes to inform the neighboring devices of the change timely.
PerPort Configuration Port Number: specify the port(s) to be configured in the switch. Port Status: specify one of four port mode to operate LLDP for specified port(s) Tx only: LLDP transmit the packet of the port only Rx only: LLDP receive the packet of the port only. Tx and Rx: LLDP transmit and receive the packets of the port.
Page 42
3.2.4.1. IPv4 The IPv4 related parameters are shown in the following table Items Option Default value Group ID 1 ~ 220 (max. 220 ACL groups) NULL Permit / Deny. Action Permit: Permit packet cross switch. Permit Deny: Drop packet. Any / VID. VLAN Any: Any VLAN ID VID: 1~4094.
Page 43
Any / IP and Mask Any: Any IP address. IP: A certain IP address. Mask: *** *** *** *** * is represent a digit from 0~9, *** is range from 0 to 255 (Set this field if Packet Type is IPv4, else ignore.) IP Fragment Uncheck / Check...
Page 44
3.2.4.2. Non-IPv4 The related parameters are shown in the following table: Items Option Default value Group ID 1 ~ 220 (max. 220 ACL group) NULL Permit / Deny. Action Permit: Permit packet cross switch. Permit Deny: Drop packet. Any / VID. VLAN Any: Any VLAN ID.
Page 45
***.***.***.*** IP Address 0.0.0.0 *** is range from 0 to 255 Port ID Source port id from 1~10 Current List Create ACL and binding groups NULL 3.2.4.4. QoS VoIP QoS VoIP option in Action field is to provide ingress VoIP packets can be forwarded out with higher priority through the ACL function.
3.2.5. Security 3.2.5.1. Security Manager In this page, user can change user name and password with the following parameters. User Name: Type the new user name. The maximum length is 10 characters. Assign/Change password: Type the new password. Reconfirm password: Retype the new password. Click Apply to activate the setting.
Page 47
3.2.5.3. 802.1x Configuration 802.1x makes use of the physical access characteristics of IEEE 802 LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails.
Page 48
3.2.5.3.3 Misc Configuration In this page, you can change the default configuration for the 802.1x standard: Quiet Period: Used to define periods of time during which it will not attempt to acquire a supplicant (default time: 60 seconds). Tx Period: Used to determine when an EAPOL PDU is to be transmitted (Default value is 30 seconds).
3.2.6. QoS This switch provides quality of service (QoS) to prioritize the packet forwarding when traffic congestion happens. This switch supports port-based (4-level output queue) and 802.1p (8-level priority to 4-level queue mapping)QoS functions. Strict and weight round robin (WRR) QoS mode are supported. 3.2.6.1.
3.2.7. Monitoring 3.2.7.1. Port Status This page provides current status of every port that depends on user’s setting and the negotiation result. State: Display port statuses: disable or enable. “Unlink” will be treated as “off”. Link Status: Down means “No Link”; Up means “Link up”. Auto Negotiation: Display the auto negotiation mode: auto/force/nway-force.
3.2.7.3. Vdsl Port Statistics This page provides current status of VDSL port’s downstream rate: Upstream rate, US, DS and VDSL firmware version. 3.2.8. Profile configuration VDSL2 Profile ITU-T G.993.2 VDSL2 standard defines a wide range of settings for various parameters that could potentially be supported by a VDSL2 transceiver. Profiles are specified to allow transceivers to support a subset of the allowed settings and still be compliant with this Recommendation.
Page 52
In profile web user can select or create a profile model with the setting of SNR, INP (Impulse noise protection) and max delay -52-...
3.2.9. Reset System The page to reset the switch to default configuration is shown as below. 3.2.10. Reboot The page to reboot (warm restart) the switch is shown as below. -53-...
4. Specifications 4.1. Cable specifications The related cables specification shown in the following table Cable Type Cable Requirements Maximum Length 1000BASE-T Category 5e or better, UTP or STP 328 ft (100M) 100Mbps@984ft RJ11 6P4C (six position, four conductor), (300M) Twisted-pair cabling comes in various grades, or categories. Category 5 is required for Fast Ethernet, and is also the most reliable and most commonly used category.
Page 55
Cables Figure 4-1: Diagram of Straight Through Cables Figure 4-2: Diagram of Crossover Cables Figure 4-3: RJ11 Cable Diagram -55-...
4.2. Technical Specifications 4.2.1. Software Specification Supports 802.1D bridge self-learning, storing up to 8K+ 256unicast or multicast addresses Supports automatic age-out period between 1 to 1,000,000 seconds Broadcast storm filtering based on ingress port bandwidth HOL blocking prevention Deadlock relief 9K+ jumbo packets supported on per port and per VLAN basis Supports layer 2 source filtering Supports 802.1D Spanning Tree Algorithm and Protocol, and 802.1w Rapid...
Supports Layer 2/3/4 (Layer 2+) classification: Standard-length IPv4 packets can use layer 2 VLAN-tag ID, IP protocol, Source IP, Destination IP, TCP/UDP Destination Port and Source Port, and TCP SYN field for classification Non-standard or non-IPv4 packets use part of layer 2/3 header for classification Up to 256 different classification rules supported Each classification rule is associated with an action code...
Support for Strict Priority, Weighted Round-Robin (WRR) scheduling policies. Support 802.1d, 802.1w, 802.1s Spanning Tree protocol. Support IGMP multicast snooping. Support 802.1x Port-Based Authentication Traffic classification based on Port#, VLAN priority in VLAN tagging packet, DS/TOS field in IP packet. Supports Ingress and Egress Rate Limiting control.
We reserve the right to revise or update its products, software, or documentation without obligation to notify any individual or entity. 6. Product Support & Contact If you come across any problems please contact the dealer from where you purchased your product. Contact BEC Technologies, Inc. Worldwide: http://www.bectechnologies.com -59-...
Need help?
Do you have a question about the V8E2G and is the answer not in the manual?
Questions and answers