Page 3
Federal Communications Commission (FCC) Statement This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the ...
1 Introduction Welcome to MRI‐128‐F4G Rackmount Managed Ethernet Switch User Manual. Following topics are covered in this chapter: 1.1 Overview 1.2 Major Features 1.3 Package Checklist Overview The MRI‐128‐F4G Series, the 19‐inch 24+4G Managed Ethernet Ring Switch, is equipped with 24 10/100 Base‐TX ports plus 4 Gigabit RJ45 / MINI GBIC combo ports. The switch is specially designed for control rooms where high‐port density and performance are required. The Gigabit Combo port allows 10/100/1000 triple speed of copper ports, and the SFP ports accept all types of Gigabit SFP transceivers, including Gigabit SX, LX, LHX, ZX and XD for several connections and distances. ...
The switch supports RSTP,Multiple Super Ring technology,VLAN, IGMP Snooping, LACP for network control, SNMP and LLDP for network management. Secured access is protected by Port Security, 802.1x and flexible Layer 2/4 Access Control List. Major Features • 24‐port 10/100 Base‐TX and 4‐port Gigabit RJ‐45/SFP combo ports (10/100/1000 Base‐TX, 1000Base‐X) • Non‐Blocking Switching Performance, no collision or delay when wire‐speed transmission ...
Package List MRI‐128‐F4G 24+4G Rackmount Managed Ethernet Ring Switch Includes: • The switch (no SFP transceivers) • Rack Mount Kit • Console Cable • Power Cord • Document CD MRI‐128‐F4G/DC 24+4G Rackmount Managed Ethernet Ring Switch with 12‐48VDC input Includes: • The switch (no SFP transceivers) • Rack Mount Kit • Console Cable • Document CD If any of the above items are missing or damaged, please contact your local sales representative. ...
MRI‐128‐F4G/DC MRI‐128‐F4G Panel Layout The front panel includes RS‐232 Console Port, System & Port LEDs, Fast Ethernet Port Interfaces and Gigabit Combo Port Interfaces. The console port chooses RS‐232 DB‐9 types. The pin arrangement is “Pin2: TxD, Pin3: RxD, Pin5:GND”. The console cable is shipped with the switch. In the Rear panel, there are 2 types power input connector applied to the switch and the switch‐DC. The AC variance chooses standard AC plug as power input socket. The DC variance chooses 4‐pin terminal block as power input socket. Follow the V+, V‐ ...
Insert positive and negative wires into V+ and V‐ contacts respectively of the terminal block connector Tighten the wire‐clamp screws to prevent DC wires from being loosened. Power 1 and Power 2 support power redundancy. Positive and negative power system inputs are both accepted, but Power 1 and Power 2 must apply the same mode. Note 1: It is a good practice to turn off input and load ...
Note that crossover cables simply cross‐connect the transmit lines at each end to the received lines at the opposite end. Straight‐through Cabling Schematic Cross‐over Cabling Schematic Note that Ethernet cables use pins 1, 2, 3, and 6 of an 8‐pin RJ‐45 connector. The signals of these pins are converted by the automatic MDI‐X function, as shown in the table below: Pin MDI‐X Signals MDI Signals 1 RD+ TD+ 2 RD‐ TD‐ 3 TD+ RD+ 6 TD‐ RD‐ Connect one side of an Ethernet cable into any switch port and connect the other side to your attached device. The LNK LED will light up when the cable is ...
100Base‐TX and 1000Base‐TX. The switch is also equipped with 4 Gigabit SFP ports combo which supports 1000Base‐SX/LX and is according the standard MINI GBIC SFP transceiver. Wiring RS‐232 Console Cable Westermo attaches one RS‐232 DB‐9 to DB‐9 cable in the box. Connect the DB‐9 connector to the COM port of your PC, open Terminal tool and set up serial settings to 9600, N,8,1. (Baud Rate: 9600 / Parity: None / Data Bit: 8 / Stop Bit: 1) Then you can access the CLI interface using the console cable. Note: If you lost the cable, please contact your local sales office or follow the pin assignment to buy/make a new one. The pin assignment spec is listed in the ...
Page 14
Attach the brackets to the device by using the screws provided in the Rack Mount kit. Mount the device in the 19’ rack by using four rack‐mounting screws. When installing multiple switches, mount them in the rack one below the other. It’s requested to reserve 0.5U‐1U free space for multiple switches installing in high temperature environment. This is important to disperse the heat generated by the switch. ...
Page 15
Notice when installing: Temperature: Check if the temperature conforms to the specified operating temperature range. Mechanical Loading: Do no place any equipment on top of the switch. In high vibration environment, additional rack mounting protection is necessary, like the flat board under/above the switch. Grounding: Rack‐mounted equipment should be properly grounded. ...
Safety Warning 2.2.1 The Equipment intended for installation in a Restricted Access Location. 2.2.2 The warning test is provided in user manual. Below is the information: ”For tilslutning af de ovrige ledere, se medfolgende installationsvejledning”. “Laite on liitettava suojamaadoitus‐koskettimilla varustettuun pistorasiaan” „Apparatet ma tilkoples jordet stikkontakt“ ”Apparaten skall anslutas till jordat uttag” ...
Preparation for Serial Console In the package, there is one RS‐232 DB‐9 to DB‐9 console cable. Please attach RS‐232 DB‐9 connector to your PC COM port, connect the other end to the Console port of the switch. If you lose/lost the cable, please follow the console cable PIN assignment to find a new one, or contact your closest Westermo sales office. (Refer to the appendix). Go to Start ‐> Program ‐> Accessories ‐> Communication ‐> Hyper Terminal Give a name to the new console connection. Choose the COM name Select correct serial settings. The serial settings of the switch are as below: ...
Microsoft Internet Explorer, or Mozilla Firefox, to configure and/or log from the switch from anywhere on the network. Before you attempt to use the embedded web interface to manage switch operation, verify that the switch is properly installed on your network and that the PC on this network can access the switch via the web browser. 1. Verify that your network interface card (NIC) is operational, and that your operating system supports TCP/IP protocol. 2. Wire DC power to the switch and connect your switch to your computer. 3. Make sure that the switch default IP address is 192.168.2.200. 4. Change your computer IP address to 192.168.2.2 or other IP address which is located in the 192.168.2.x (Network Mask: 255.255.255.0) subnet. 5. Switch to DOS command mode and ping 192.168.2.200 to verify a normal response time. Launch the web browser and Login. 6. Launch the web browser (Internet Explorer or Mozilla Firefox) on the PC. 7. Type http://192.168.2.200 (or the IP address of the switch). And then press Enter. 8. The login screen will appear next. Type in the user name and the password. Default user name is admin and password westermo. ...
Page 19
Click on Enter or OK. The welcome page of the web‐based management interface will then appear. Once you enter the web‐based management interface, you can freely change the IP address to fit your network environment. Note 1: Internet Explorer 5.0 or later versions do not allow Java applets to open sockets by default. Users have to directly modify the browser settings to ...
3.2.2 Secured Web Interface Westermo web management page also provides secured management HTTPS login. All the configuration commands will be secured. Launch the web browser and Login. Launch the web browser (Internet Explorer or Mozilla Firefox) on the PC. Type https://192.168.2.200 (or the IP address of the switch). And then press Enter. The popup screen will appear and request you to trust the secured HTTPS connection. Press Yes to trust it. The login screen will appear next. Key in the user name and the password. The default user name is admin and password is westermo. Press Enter or click on OK. The welcome page of the web‐based ...
Page 21
3.3.2 SSH (Secure Shell) The switch also support SSH console. You can remotely connect to the switch by command line interface. The SSH connection can secure all the configuration commands you send to the switch. When you wish to establish a SSH connection with the switch, you should download the SSH client tool first. SSH Client There are many free, sharewares, trials or charged SSH clients you can find on the internet. Fox example, PuTTY is a free and popular Telnet/SSH client. We’ll use this tool to demonstrate how to login SSH. Open SSH Client/PuTTY In the Session configuration, enter the Host Name (IP Address of the switch) and Port number (default = 22). Choose the “SSH” protocol. Then click on “Open” to start the SSH session console. ...
Page 22
After few seconds, the SSH connection to the switch is opened. Type the Login Name and its Password. The default Login Name and Password are admin / westermo. All the commands you see in SSH are the same as the CLI commands you see via RS232 console. The next chapter will introduce in detail how to use command line to configure the switch. ...
4 Feature Configuration This chapter explains how to configure the switch software features. There are four ways to access the switch: Serial console, Telnet/SSH, Web browser and SNMP. Following topics are covered in this chapter: Command Line Interface (CLI) Introduction Basic Setting Port Configuration Network Redundancy VLAN Traffic Prioritization Multicast Filtering SNMP Security 4.10 Warning ...
Page 24
Switch> enable Turn on privileged mode command exit Exit current mode and down to previous mode list Print command list ping Send echo messages quit Exit current mode and down to previous mode show Show running system information telnet Open a telnet connection traceroute Trace route to destination ...
Page 25
Switch# configure terminal Switch(config)# access-list Add an access list entry administrator Administrator account setting Set a static ARP entry clock Configure time-of-day clock default Set a command to its defaults End current mode and change to enable mode exit Exit current mode and down to previous mode gvrp GARP VLAN Registration Protocol hostname...
Page 26
Switch(config)# interface fa1 Switch(config-if)# acceptable Configure 802.1Q acceptable frame types of a port. auto-negotiation Enable auto-negotiation state of a given port description Interface specific description duplex Specify duplex mode of operation for a port End current mode and change to enable mode exit Exit current mode and down to previous mode flowcontrol...
Page 27
Summary of the 5 command modes. Command Main Function Enter and Exit Method Prompt Mode User EXEC This is the first level of access. Enter: Login successfully Switch> User can ping, telnet remote Exit: exit to logout. device, and show some basic Next mode: Type enable to information enter privileged EXEC mode. Privileged In this mode, the system allows Enter: Type enable in User Switch# EXEC you to view current EXEC mode. configuration, reset default, Exec: Type disable to exit to reload switch, show system user EXEC mode. information, save Type exit to logout configuration…and enter global Next Mode: Type configure configuration mode. terminal to enter global configuration command. Global In global configuration mode, Enter: Type configure Switch(config)# ...
Page 28
Here are some useful commands to see available commands. It can save your time when typing and avoid errors. ? To see all the available commands in this mode. It helps you to see the next command you can/should type as well. Switch(config)# interface (?) IFNAME Interface's name vlan Select a vlan to configure (Character)? To see all the available commands starts from this character. Switch(config)# a? access-list Add an access list entry administrator Administrator account setting Set a static ARP entry...
Basic Setting The Basic Setting group provides you to configure switch information, IP address and User name/Password of the system. It also allows you to do firmware upgrade, backup and restore configuration, reload factory default and reboot the system. Following commands are included in this chapter: 4.2.1 Switch Setting 4.2.2 Admin Password 4.2.3 IP Configuration 4.2.4 Time Setting 4.2.5 Jumbo Frame 4.2.6 DHCP Server 4.2.7 ...
Page 30
Note: Always remember to select Save to save your settings. Otherwise, the settings you made will be lost when the switch is powered off. 4.2.2 Admin Password You can change the user name and the password here to enhance security. User name: You can type in a new user name here. The default setting is admin. Password: You can type in a new password here. The default setting is westermo. Confirm Password: You need to type the new password again to confirm it. Once you finish configuring the settings, click on Apply to apply your configuration. ...
Page 31
4.2.3 IP Configuration This function allows users to configure the switch’s IP address settings. DHCP Client: You can select to Enable or Disable DHCP Client function. When DHCP Client function is enabled, an IP address will be assigned to the switch from the network’s DHCP server. In this mode, the default IP address will therefore be replaced by the one assigned by DHCP server. If DHCP Client is disabled, then the IP address that you specified will be used instead. IP Address: You can assign the IP address reserved by your network for your switch. If DHCP Client function is enabled, you don’t need to assign an IP address to the switch, as it will be overwritten by DHCP server and shown here. The default IP is 192.168.2.200. ...
Page 32
Manual Setting: User can select “Manual setting” to change time as user wants. User also can click the button “Get Time from PC” to get PC’s time setting for switch. After click the “Get Time from PC” and apply the setting, the System time display the same time as your PC’s time. NTP client: Set the Time Setting Source to NTP client to the NTP client service. NTP client will be automatically enabled if you change Time source to NTP Client. The system will send requests to acquire current time from the configured NTP server. IEEE 1588: With the Precision Time Protocol IEEE 1588 is a high‐precision time protocol for synchronization used in control system on a network. ...
Page 33
05 (GMT‐08:00) Pacific Time (US & Canada) , Tijuana 06 (GMT‐07:00) Arizona 07 (GMT‐07:00) Mountain Time (US & Canada) 08 (GMT‐06:00) Central America 09 (GMT‐06:00) Central Time (US & Canada) 10 (GMT‐06:00) Mexico City 11 (GMT‐06:00) Saskatchewan 12 (GMT‐05:00) Bogota, Lima, Quito ...
Page 34
43 (GMT+04:00) Abu Dhabi, Muscat 44 (GMT+04:00) Baku, Tbilisi, Yerevan 45 (GMT+04:30) Kabul 46 (GMT+05:00) Ekaterinburg 47 (GMT+05:00) Islamabad, Karachi, Tashkent 48 (GMT+05:30) Calcutta, Chennai, Mumbai, New Delhi 49 (GMT+05:45) Kathmandu 50 (GMT+06:00) Almaty, Novosibirsk ...
Page 35
4.2.5 Jumbo Frame What is Jumbo Frame? The typical Ethernet frame is range from 64 to 1518 bytes. This is sufficient for general usages. However, when users want to transmit large files, the files may be divided into many small size packets. While the transmitting speed becomes slow, long ...
Page 36
After selecting to enable DHCP Server function, type in the Network IP address for the DHCP server IP pool, Subnet Mask, Default Gateway address and Lease Time for client. Once you have finished the configuration, click Apply to apply your configuration Excluded Address: You can type a specific address into the IP Address field for the DHCP server reserved IP address. ...
Page 37
DHCP Relay Agent: The DHCP Relay Agent is also known as DHCP Option 82. It can help relay the DHCP Request to remote DHCP server located in different subnet. Note: The DHCP Server cannot work with DHCP Relay Agent at the same time. Relay Agent: Choose Enable or Disable the relay agent. Relay Policy: The Relay Policy is used when the DHCP request is relayed through more than one switch. The switch can drop, keep or replace the MAC address of the DHCP Request packet. ...
Page 38
TFTP Server mode: In this mode, the switch acts as TFTP client. Before you do so, make sure that your TFTP server is ready. Then please type the IP address of TFTP Server and Backup configuration file name. This mode can be used in both CLI and Web UI. TFTP Server IP Address: You need to key in the IP address of your TFTP Server here. Backup/Restore File Name: Please type the correct file name of the configuration file.. ...
Page 39
Note: point to the wrong file will cause the entire configuration missed 4.2.8 Firmware Upgrade In this section, you can update the latest firmware for your switch. Westermo provides the latest firmware in the Web site. The new firmware may include new features, bug fixes or other software changes. We’ll also provide the release notes for the update as well. For technical viewpoint, we suggest you use the ...
Page 40
There are two modes for users to backup/restore the configuration file, Local File mode and TFTP Server mode. Local File mode: In this mode, the switch acts as the file server. Users can browse the target folder and then type the file name to backup the configuration. Users also can browse the target folder and select the existed configuration file to restore the configuration back to the switch. This mode is only provided by Web UI while CLI is not supported. TFTP Server mode: In this mode, the switch acts as the TFTP client. Before you do so, make sure that your TFTP server is ready. And then please type the IP address of TFTP Server IP address. This mode can be used in both CLI and Web UI. TFTP Server IP Address: You need to key in the IP address of your TFTP Server here. Firmware File Name: The file name of the new firmware. ...
Page 41
4.2.9 Factory Default In this section, you can reset all the configurations of the switch to default setting. Click on Reset the system will then reset all configurations to default setting. The system will show you popup message window after finishing this command. Default setting will work after rebooting the switch. Popup alert screen to confirm the command. Click on Yes to start it. Click on OK to close the screen. Then please go to Reboot page to reboot the switch. ...
Page 42
WORD Network name of this system Switch(config)# hostname SWITCH SWITCH(config)# System SWITCH(config)# snmp-server location Sweden Location System Contact SWITCH(config)# snmp-server contact support@westermo.se Display SWITCH# show snmp-server name SWITCH SWITCH# show snmp-server location Sweden SWITCH# show snmp-server contact support@westermo.se Switch> show version Loader Version : 1.0.0.3...
Page 43
Admin Password User Name and SWITCH(config)# administrator Password NAME Administrator account name SWITCH(config)# administrator orwell PASSWORD Administrator account password SWITCH(config)# administrator orwell orwell Change administrator account orwell and password orwell success. Display SWITCH# show administrator Administrator account information name: orwell password: orwell IP Configuration SWITCH(config)# int vlan 1...
Page 44
ip address 192.168.2.8/24 no shutdown ip route 0.0.0.0/0 192.168.2.254/24 Time Setting NTP Server SWITCH(config)# ntp peer enable disable primary secondary SWITCH(config)# ntp peer primary IPADDR SWITCH(config)# ntp peer primary 192.168.2.200 Time Zone SWITCH(config)# clock timezone 26 Sun Jan 1 04:13:24 2006 (GMT) Greenwich Mean Time: Dublin, Edinburgh, Lisbon, London Note: By typing clock timezone ?, you can see the timezone list.
Page 45
Dublin, Edinburgh, Lisbon, London Switch# show ptpd PTPd is enabled Mode: Slave Jumbo Frame Jumbo Frame Type the maximum MTU to enable Jumbo Frame: SWITCH(config)# system mtu <64-9216> bytes (with VLAN tag) Switch(config)# system mtu 9216 Disable Jumbo Frame: SWITCH(config)# no system mtu Display SWITCH# show system mtu System MTU size is 9216 bytes...
Page 46
DHCP Server IP Switch(config-dhcp)# network Pool A.B.C.D/M network/mask ex. 10.10.1.0/24 (Network/Mask) Switch(config-dhcp)# network 192.168.2.0/24 DHCP Server – Switch(config-dhcp)# default-router Default A.B.C.D address Gateway Switch(config-dhcp)# default-router 192.168.2.254 DHCP Server – Switch(config-dhcp)# lease lease time TIME second Switch(config-dhcp)# lease 1000 (1000 second) DHCP Server –...
Page 47
<cr> DHCP Relay – IP Switch(config-dhcp)# ip dhcp helper-address Helper Address A.B.C.D Switch(config-dhcp)# ip dhcp helper-address 192.168.2.200 Reset DHCP Switch(config-dhcp)# ip dhcp reset Settings <cr> DHCP Server Switch# show ip dhcp server statistics Information DHCP Server ON Address Pool 1 network:192.168.2.0/24 default-router:192.168.2.254 lease time:604800...
Page 48
DHCP Relay Switch# show ip dhcp relay Information DHCP Relay Agent ON ---------------------------------------- IP helper-address : 192.168.2.200 Re-forwarding policy: Replace Backup and Restore Backup Switch# copy startup-config tftp: Startup 192.168.2.33/default.conf Configuration Writing Configuration [OK] file Note 1: To backup the latest startup configuration file, you should save current settings to flash first.
Port Configuration Port Configuration group enables you to enable/disable port state, or configure port auto‐negotiation, speed, and duplex, flow control, rate limit control and port aggregation settings. It also allows you to view port status and aggregation information. Following commands are included in this chapter: 4.3.1 Port Control 4.3.2 Port Status 4.3.3 Rate Control 4.3.4 Storm Control 4.3.5 ...
Page 51
Fast Ethernet Port 1~24 (fa1~fa24): AutoNegotiation, 10M Full Duplex(10 Full), 10M Half Duplex(10 Half), 100M Full Duplex(100 Full) and 100M Half Duplex(100 Half). Gigabit Ethernet Combo Port 25~28: (gi25~gi28): AutoNegotiation, 10M Full Duplex(10 Full), 10M Half Duplex(10 Half), 100M Full Duplex(100 Full), 100M Half Duplex(100 Half), 1000M Full Duplex(1000 Full), 1000M Half Duplex(1000 Half). The default mode is Auto Negotiation mode. Note: The on board Gigabit SFP port (SFP 25, 26, 27 and 28) in the switch support 1000M Full mode. ...
Page 52
SFP Vendor: Vendor name of the SFP transceiver you plugged. Apply to fiber port. Wavelength: The wave length of the SFP transceiver you plugged. Apply to fiber port. Distance: The transmission distance of the SFP transceiver you plugged. Apply to fiber port. Note: Most of the SFP transceivers provide vendor information which allows your switch to read it. The User Interface can display vendor name, wave length and distance of all Westermo SFP transceiver family. If you see Unknown info, it may mean that the vendor doesn’t provide their information or that the information of their transceiver can’t be read.. 4.3.3 Rate Control Rate limiting is a form of flow control used to enforce a strict bandwidth limit at a port. You can program separate transmit (Egress Rule) and receive (Ingress Rule) rate limits at each port, and even apply the limit to certain packet types as ...
Page 53
4.3.4 Storm Control The Storm Control is similar to Rate Control. Rate Control filters all the traffic over the threshold you input by User Interface. Storm Control allows user to define the rate for specific Packet Types. ...
Page 54
Packet type: You can assign the Rate for specific packet types based on packet number per second. The packet types of the Ingress Rule listed here include Broadcast, DLF (Destination Lookup Failure) and Multicast. Choose Enable/Disable to enable or disable the storm control of specific port. Rate: This column allows you to manually assign the limit rate of the port. The unit is packets per second. The limit range is from 1 to 262143 packet/sec, zero ...
Page 55
Aggregation Setting Trunk Size: The switch can support up to 8 trunk groups. Each trunk group can support up to 8 member ports. Since the member ports should use same speed/duplex, the maximum trunk size is decided by the port volume. Group ID: Group ID is the ID for the port trunking group. Ports with same group ID are in the same group. Click None, you can select the Trunk ID from Trunk 1 to Trunk 8. Trunk Type: Static and 802.3ad LACP: Each Trunk Group can only support Static or 802.3ad LACP. Choose the type you need here. Extended setting in CLI: Port Priority: The command allows you to change the port priority setting on a specific ...
Page 56
Aggregation Status This page shows the status of port aggregation. Once the aggregation ports are established, you will see following status. Group ID: Display Trunk 1 to Trunk 8 set up in Aggregation Setting. Type: Static or LACP set up in Aggregation Setting. Aggregated: When the LACP links is up, you can see the member ports in Aggregated column. Individual: When LACP is enabled, member ports of LACP group which are not connected ...
Page 57
Control – Switch(config-if)# auto-negotiation Auto Auto-negotiation of port 1 is enabled! Negotiation Port Switch(config-if)# speed 100 Control – set the speed mode ok! Force Speed/Duplex Switch(config-if)# duplex full set the duplex mode ok! Port Switch(config-if)# flowcontrol on Control – Flowcontrol on for port 1 set ok! Flow Control Switch(config-if)# flowcontrol off Flowcontrol off for port 1 set ok!
Page 58
Port Status Port Status Switch# show interface fa1 Interface fastethernet1 Administrative Status : Enable Operating Status : Connected Duplex : Full Speed : 100 MTU: 1518 Flow Control :off Default Port VLAN ID: 1 Ingress Filtering : Disabled Acceptable Frame Type : All Port Security : Disabled Auto Negotiation : Disable Loopback Mode : None...
Page 59
Rate Control Rate Switch(config-if)# rate-limit Control – egress Outgoing packets Ingress or ingress Incoming packets Egress Note: To enable rate control, you should select the Ingress or Egress rule first; then assign the packet type and bandwidth. Rate Control Switch(config-if)# rate-limit ingress bandwidth - Bandwidth <0-1000000>...
Page 60
<cr> SWITCH(config-if)# storm-control broadcast Enables rate limit for Broadcast packets for Port 1. (Continue apply to other ports) Display – SWITCH# show storm-control Rate Storm-control rate limit: Configuratio DLF:1000(Kbytes/sec) n and port Multicast:1000(Kbytes/sec) status Broadcast:1000(Kbytes/sec) ----------------------------------------- Port 1: Enable Broadcast Enable Multicast Enable Port 2: Enable...
Page 61
short specifies a short timeout value SWITCH(config-if)# lacp timeout short Set lacp port timeout ok. Static Trunk Switch(config)# trunk group 2 fa6-7 Trunk group 2 enable ok! Failure to configure due to the group ID is existed. SWITCH(config)# trunk group 1 fa11-12 Can't set trunk group 1 enable! The group 1 is a lacp enabled group! SWITCH(config)# trunk group 2 fa11-12...
Page 62
----- ----------- -------- -------- ------- 0x45 0x45 0x45 LACP group 2 is inactive LACP group 3 is inactive LACP group 4 is inactive Display - Switch# show trunk group 1 Trunk FLAGS: I -> Individual P -> In channel D -> Port Down Trunk Group GroupID Protocol Ports --------+---------+--------------------------------...
Network Redundancy The switch firmware supports standard RSTP, Multiple Super Ring, Rapid Dual Homing. Multiple Super Ring (MSR) technology, 0 milliseconds for restore and less than 300 milliseconds for failover. Advanced Rapid Dual Homing (RDH) technology also facilitates the switch to connect with a core managed switch easily and conveniently. With RDH technology, you can also group several Rapid Super Rings or RSTP cloud together, ...
Page 64
RSTP Mode: You must first enable STP/RSTP mode, before configuring any related parameters. Parameter settings required for both STP and RSTP are the same. Note that 802.1d refers to STP mode, while 802.1w refers to faster RSTP mode. Bridge Configuration Priority (0‐61440): RSTP uses bridge ID to determine the root bridge, the bridge with the highest bridge ID becomes the root bridge. The bridge ID is composed of bridge priority and bridge MAC address. So that the bridge with the highest priority becomes the highest bridge ID. If all the bridge ID has the same priority, the bridge with the lowest MAC address will then become the root bridge. Note: The bridge priority value must be in multiples of 4096. A device with a lower number has a higher bridge priority. Ex: 4096 is higher than 32768. ...
Page 65
recognized as a root bridge, the devices will renegotiate to set up a new spanning tree topology. The MAX Age value affects the maximum volume of the RSTP loop. In the RSTP BPDU packet, there is one field, message age which start from 0, add 1 after passed one hop in the RSTP loop. When the message age is larger than MAX Age, the BPDU would be ignored and the lower switches are separated to different RSTP domain. The switches in other RSTP domain can’t be managed through upper switch. ...
Page 66
Priority: Enter a value between 0 and 240, using multiples of 16. This is the value that decides which port should be blocked by priority in a LAN. Admin P2P: Some of the rapid state transitions that are possible within RSTP depend upon whether the port of concern can only be connected to another bridge (i.e. it is served by a point‐to‐point LAN segment), or if it can be connected to two or more bridges (i.e. it is served by a shared‐medium LAN segment). This function allows P2P status of the link to be manipulated administratively. “Auto” means to auto select P2P or Share mode. “P2P” means P2P is enabled, while “Share” means P2P is disabled. ...
Page 67
Cost and the Max Age, Hello Time and Forward Delay of BPDU sent from the root switch. Port Information: You can see port Role, Port State, Path Cost, Port Priority, Oper P2P mode, Oper edge port mode and Aggregated(ID/Type). 4.4.3 Multiple Super Ring (MSR) The most common industrial network redundancy is to form a ring or loop. Typically, the managed switches are connected in series and the last switch is connected back to the first one. The Multiple Super Ring has enhanced Ring Master selection and faster recovery time. It is also enhanced for more complex ring application. Multiple Super Ring (MSR) technology have a fast restore and failover time in the world, 0 ms for restore and less than 300 ms for failover. Advanced Rapid Dual Homing (RDH) technology also facilitates Switch Managed Switch to connect with a core managed switch easily and conveniently. With RDH ...
Page 68
Ring Configuration ID: Once a Ring is created, it appears and cannot be changed. In multiple rings’ environment, the traffic can only be forwarded under the same ring ID. Name: This field will show the name of the Ring. If it is not filled in when creating, it will be automatically named by the rule “RingID”. Version: The version of Ring can be changed here. There are three modes to choose: Rapid Super Ring as default. Device Priority: The switch with highest priority (highest value) will be automatically ...
Page 69
In Rapid Dual Homing, you don’t need to configure specific port to connect to other protocol. The Rapid Dual Homing will smartly choose the fastest link for primary link and block all the other links to avoid loop. If the primary link failed, Rapid Dual Homing will automatically forward the secondary link for network redundancy. If there are more connections, they will be standby links and recover one of them if both primary and secondary links are down. ...
Page 70
4.4.5 Command Lines: Feature Command Line RSTP Enable Switch(config)# spanning-tree enable Disable Switch (config)# spanning-tree disable RSTP mode Switch(config)# spanning-tree mode rapid-stp SpanningTree Mode change to be RSTP(802.1w) . STP mode Switch(config)# spanning-tree mode stp SpanningTree Mode change to be STP(802.1d) . Priority Switch(config)# spanning-tree priority <0-61440>...
Page 71
RSTP Info Active status Switch# show spanning-tree active Rapid Spanning-Tree feature Enabled Spanning-Tree BPDU transmission-limit Root Address 0012.7701.0386 Priority 4096 Root Path Cost : 200000 Root Port : 7 Root Times : max-age 20 sec, hello-time 2 sec, forward-delay 15 sec Bridge Address 0012.77ff.0102 Priority 4096...
Page 72
Port 128.6 as Disabled Role is in Disabled State Port Path Cost 200000, Port Identifier 128.6 RSTP Port Admin Link-Type is Auto, Oper Link-Type is Point-to-Point RSTP Port Admin Edge-Port is Enabled, Oper Edge-Port is Edge Designated root has priority 32768, address 0007.7c00.0112 Designated bridge has priority 32768, address 0007.7c60.1aec...
Page 73
IFLIST Interface list, ex: fa1,fa3-5,gi8-10 cost path cost Switch(config-multiple-super-ring)# port fa1,fa2 Ring Port Cost Switch(config-multiple-super-ring)# port cost <0-255> valid range is 0 or 255 default set default (128)valid range is 0 or 255 Switch(config-multiple-super-ring)# port cost 100 <0-255> valid range is 0 or 255 default set default (128)valid range is 0 or 255 Switch(config-super-ring-plus)# port cost 100 200 Set path cost success.
Page 74
Ring Port : fa1, fa2 Path Cost : 100, 200 Dual-Homing II : Disabled Statistics : Watchdog sent 0, received 0, missed Link Up sent 0, received Link Down sent 0, received Role Transition count 0 Ring State Transition count 1 Ring ID is optional.
VLAN A Virtual LAN (VLAN) is a “logical” grouping of nodes for the purpose of limiting a broadcast domain to specific members of a group without physically grouping the members together. That means, VLAN allows you to isolate network traffic so that only members of VLAN could receive traffic from the same VLAN members. Basically, creating a VLAN from a switch is the logical equivalent of physically reconnecting a group of network devices to another Layer 2 switch, without actually disconnecting these devices from their original switches. ...
Page 76
PVID: The abbreviation of the Port VLAN ID. Enter port the VLAN ID. PVID allows the switches to identify which port belongs to which VLAN. To keep things simple, it is recommended that PVID is equivalent to VLAN IDs. The values of PVIDs are from 0 to 4095. But, 0 and 4095 are reserved. You can’t input these two PVIDs and 1 is the default value and 2 to 4094 are valid and available. Accept Frame Type: This column defines the accepted frame type of the port. There are two modes you can select, Admit All and Tag Only. Admit All mode means that the port can accept both tagged and untagged packets. Tag Only mode means that the port can only accept tagged packets. ...
Page 77
Management VLAN ID: The switch supports management VLAN. The management VLAN ID is the VLAN ID of the CPU interface so that only member ports of the management VLAN can access the switch. The default management VLAN ID is 1. Static VLAN: You can assign a VLAN ID and VLAN Name for new VLAN here. VLAN ID is used by the switch to identify different VLANs. Valid VLAN ID is between 1 and 4094 and VLAN 1 is the default VLAN. VLAN Name is a reference for network administrator to identify different VLANs. The available character is 12 for you to input. If you don’t input VLAN name, the system will automatically assign VLAN name for the VLAN. The rule is VLAN (VLAN ID). ...
Page 78
port of the management VLAN; otherwise the administrator can’t access the switch via the network. Note: Currently the switch supports max 256 group VLAN. Static VLAN Configuration You can see the created VLANs and specify the egress (outgoing) port rule to be Untagged or Tagged. Static VLAN Configuration table. You can see that new VLAN 3 is created. VLAN name is test. Egress rules of the ports are not configured now. ‐‐ : Not available U: Untag: Indicates that egress/outgoing frames are not VLAN tagged. T : Tag: Indicates that egress/outgoing frames are to be VLAN tagged. Steps to configure Egress rules: Select the VLAN ID. Entry of the selected VLAN turns to light blue. Assign Egress rule of the ports to U or T. Press Apply to apply the setting. If you want to remove one VLAN, select the VLAN entry. Then press Remove button. ...
Page 79
GVRP Protocol: Allow user to enable/disable GVRP globally. State: After enable GVRP globally, here still can enable/disable GVRP by port. Join Timer: Controls the interval of sending the GVRP Join BPDU. An instance of this timer is required on a per‐Port, per‐GARP Participant basis. Leave Timer: Control the time to release the GVRP reservation after received the GVRP Leave BPDU. An instance of the timer is required for each state machine that is in the LV state. Leave All Timer: Controls the period to initiate the garbage collection of registered VLAN. The timer is required on a per‐Port, per‐GARP Participant basis. 4.5.4 VLAN Table This table shows you current settings of your VLAN table, including VLAN ID, Name, Status, and Egress rule of the ports. ...
Page 80
VLAN ID: ID of the VLAN. Name: Name of the VLAN. Status: Static shows this is a manually configured static VLAN. Unused means this VLAN is created by UI/CLI and has no member ports. This VLAN is not workable yet. Dynamic means this VLAN is learnt by GVRP. After created the VLAN, the status of this VLAN will remain in Unused status until you add ports to the VLAN. ...
Page 81
4.5.5 CLI Commands of the VLAN Command Lines of the VLAN port configuration, VLAN configuration and VLAN table display Feature Command Line VLAN Port Configuration VLAN Port PVID Switch(config-if)# switchport trunk native vlan 2 Set port default vlan id to 2 success Port Accept Frame Switch(config)# inter fa1 Type Switch(config-if)# acceptable frame type all...
Page 82
STP Status: disabled Default CoS Value for untagged packets is 0. Mdix mode is Auto. Medium mode is Copper. Display – Port Switch# show running-config Egress Rule …… (Egress rule, IP address, status) interface fastethernet1 switchport access vlan 1 switchport access vlan 3 switchport trunk native vlan 2 …….
Page 83
Note: Use no name to change the name to default name, VLAN VID. VLAN description Switch(config)# interface vlan 2 Switch(config-if)# Switch(config-if)# description this is the VLAN Switch(config-if)# no description ->Delete the description. IP address of the Switch(config)# interface vlan 2 VLAN Switch(config-if)# Switch(config-if)# ip address 192.168.2.200/24...
Page 85
Management VLAN Management VLAN Switch(config)# int vlan 1 (Go to management VLAN) Switch(config-if)# no shutdown Display Switch# show running-config …. interface vlan1 ip address 192.168.2.200/24 ip igmp no shutdown …. ...
Traffic Prioritization Quality of Service (QoS) provides traffic prioritization mechanism and can also help to alleviate congestion problems and ensure high‐priority traffic is delivered first. This section allows you to configure Traffic Prioritization settings for each port with regard to setting priorities. The switch QOS supports four physical queues, weighted fair queuing (WRR) and Strict Priority scheme, which follows 802.1p COS tag and IPv4 TOS/DiffServ information to prioritize the traffic of your industrial network. Following commands are included in this chapter: ...
Page 87
Queue Scheduling You can select the Queue Scheduling rule as follows: Use a strict priority scheme. Packets with higher priority in the queue will always be processed first, except that there is no packet with higher priority. Use Weighted Round Robin scheme. This scheme allows users to assign new weight ratio for each class. The 10 is the highest ratio. The ratio of each class is as below: Wx / W0 + W1 + W2 + W3 (Total volume of Queue 0‐3) 4.6.2 Port‐based Queue Mapping Choose the Queue value of each port, the port then has its default priority. The Queue 3 is the highest port‐based queue, 0 is the lowest queue. The traffic injected to the port follows the queue level to be forwarded, but the outgoing traffic doesn’t bring the queue level to next switch. ...
Page 88
Users can freely assign the mapping table or follow the suggestion of the 802.1p standard. The switch uses 802.p suggestion as default values. You can find CoS values 1 and 2 are mapped to physical Queue 0, the lowest queue. CoS values 0 and 3 are mapped to physical Queue 1, the low/normal physical queue. CoS values 4 and 5 are mapped to physical Queue 2, the middle physical queue. CoS values 6 and 7 are mapped to physical Queue 3, the high physical queue. After configuration, press Apply to enable the settings. 4.6.4 DSCP‐Queue Mapping This page is to change DSCP values to Physical Queue mapping table. Since the switch fabric of Switch only supports four physical queues, Lowest, Low, Middle ...
Page 89
After configuration, press Apply to enable the settings. 4.6.5 CLI Commands of the Traffic Prioritization Command Lines of the Traffic Prioritization configuration Feature Command Line QoS Setting Queue Scheduling – Switch(config)# qos queue-sched Strict Priority Strict Priority wrr Weighted Round Robin Switch(config)# qos queue-sched sp The queue scheduling scheme is setting to Strict Priority. Queue Scheduling - Switch(config)# qos queue-sched wrr <1-10>...
Page 90
The queue scheduling scheme is setting to Weighted Round Robin. Assign the ratio for the 4 classes of service. Port Setting – CoS Switch(config)# interface fa1 (Default Port Switch(config-if)# qos priority Priority) <0-3> Assign a priority queue Switch(config-if)# qos priority 3 The priority queue is set 3 ok.
Page 91
……….. CoS-Queue Mapping Format Switch(config)# qos cos-map PRIORITY Assign an priority (7 highest) Switch(config)# qos cos-map 1 QUEUE Assign an queue (0-3) Note: Format: qos cos-map priority_value queue_value Map CoS 0 to Queue Switch(config)# qos cos-map 0 1 The CoS to queue mapping is set ok. Map CoS 1 to Queue Switch(config)# qos cos-map 1 0 The CoS to queue mapping is set ok.
Page 92
DSCP-Queue Mapping Format Switch(config)# qos dscp-map <0-63> Assign an priority (63 highest) Switch(config)# qos dscp-map 0 <0-3> Assign an queue (0-3) Format: qos dscp-map priority_value queue_value Map DSCP 0 to Queue Switch(config)# qos dscp-map 0 1 The TOS/DSCP to queue mapping is set ok. Display –...
Multicast Filtering For multicast filtering, the switch uses IGMP Snooping technology. IGMP (Internet Group Management Protocol) is an Internet Protocol that provides a way for internet device to report its multicast group membership to adjacent routers. Multicasting allows one computer on the internet to send data to a multitude of other computers that have identified themselves as being interested ...
Page 94
Following commands are included in this section: 4.7.1 IGMP Snooping 4.7.2 IGMP Query 4.7.3 Unknown multicast 4.7.4 CLI Commands of the Multicast Filtering 4.7.1 IGMP Snooping This page is to enable IGMP Snooping feature, assign IGMP Snooping for specific VLAN, and view IGMP Snooping table from dynamic learnt or static manual key‐in. The switch support IGMP snooping V1/V2/V3 automatically and IGMP query V1/V2. IGMP Snooping, you can select Enable or Disable here. After enabling IGMP Snooping, you can then enable IGMP Snooping for specific VLAN. You can enable ...
Page 95
IGMP Snooping Table: In the table, you can see multicast group IP address, VLAN ID it belongs to, and member ports of the multicast group. The switch supports 256 multicast groups. Click on Reload to refresh the table. 4.7.2 IGMP Query This page allows users to configure IGMP Query feature. Since the switch can only be configured by member ports of the management VLAN, IGMP Query can only be enabled on the management VLAN. If you want to run IGMP Snooping feature in several VLANs, you should notice that whether each VLAN has its own IGMP Querier first. The ...
Page 96
Query Interval(s): The period of query sent by querier. Query Maximum Response Time: The span querier detect to confirm there are no more directly connected group members on a LAN. Once you finish configuring the settings, click on Apply to apply your configuration. 4.7.3 Unknown Multicast This page allows you to decide how to forward the unknown multicast traffic. After enabled IGMP Snooping, the known multicast can be filtered by IGMP Snooping mechanism and forwarded to the member ports of the known multicast ...
Page 97
Discard: The unknown multicast will be discarded. Non‐member ports will not receive the unknown multicast streams. Once you finish configuring the settings, click on Apply to apply your configuration. 4.7.4 CLI Commands of the Multicast Filtering Command Lines of the multicast filtering configuration Feature Command Line IGMP Snooping IGMP Snooping - Switch(config)# ip igmp snooping Global IGMP snooping is enabled globally.
Page 98
Switch# sh ip igmp snooping IGMP snooping is globally enabled Vlan1 is IGMP snooping enabled immediate-leave is disabled last-member-query-interval is 100 centiseconds Vlan2 is IGMP snooping enabled immediate-leave is disabled last-member-query-interval is 100 centiseconds Vlan3 is IGMP snooping disabled immediate-leave is disabled last-member-query-interval is 100 centiseconds Display –...
Page 99
version: IGMPv2 query-interval: 125s query-max-response-time: 10s Switch# show running-config …. interface vlan1 ip address 192.168.2.200/24 ip igmp no shutdown ……. Unknown Multicast Unknown Multicast Switch(config)# mac-address-table multicast filtering Enable Force Filtering unknown multicast addresses ok! filtering (Send to Switch(config)# no mac-address-table multicast All Ports) filtering Flooding unknown multicast addresses ok!
SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices and is a member of the TCP/IP protocol suite. The switch support SNMP v1 and v2c and V3. An SNMP managed network consists of two main components: agents and a manager. An agent is a management software module that resides in a managed switch. An agent translates the local management information from the managed device into a SNMP compatible format. The manager is the console through the network. Following commands are included in this chapter: 4.8.1 SNMP Configuration 4.8.2 SNMPv3 Profile 4.8.3 SNMP Traps 4.8.4 ...
Page 101
4.8.2 SNMP V3 Profile SNMP V3 can provide more security functions when the user performs remote management through SNMP protocol. It delivers SNMP information to the administrator with user authentication; all of data between the switch and the administrator are encrypted to ensure secure communication. ...
Page 102
SNMP Trap is the notification feature defined by SNMP protocol. All the SNMP management applications can understand such trap information. So you don’t need to install new application to read the notification information. This page allows users to Enable SNMP Trap, configure the SNMP Trap server IP, Community name, and trap Version V1 or V2. After configuration, you can see the change of the SNMP pre‐defined standard traps and Westermo pre‐defined traps. The pre‐defined traps can be found in Westermo private MIB. ...
Page 103
4.8.4 CLI Commands of the SNMP Command Lines of the SNMP configuration Feature Command Line SNMP Community Read Only Switch(config)# snmp-server community public ro Community community string add ok Read Write Switch(config)# snmp-server community private Community community string add ok SNMP Trap Enable Trap Switch(config)# snmp-server enable trap Set SNMP trap enable ok. SNMP Trap Server IP Switch(config)# snmp-server host 192.168.2.33 without specific...
Security The switch provides several security features for you to secure your connection. The Filter Set is also known as Access Control List. The ACL feature includes traditional Port Security and IP Security. Following commands are included in this section: 4.9.1 Filter Set (Access Control List) 4.9.2 IEEE 802.1x 4.9.3 CLI Commands of the Security 4.9.1 Filter Set (Access Control List) The Filter Set is known as Access Control List feature. There are two major types, one is MAC Filter and the one is IP Filter. ACE is short of Access Control Entry, user defines the Permit or Deny rule for specific IP/MAC address or IP groups by network mask in each ACE. One ACL may ...
Page 105
MAC Filter (Port Security): The MAC Filter allows user to define the Access Control List for specific MAC address or a group of MAC addresses. Filter ID/Name: The name for this MAC Filter entry. Action: Permit to permit traffic from specified sources. Deny to deny traffic from those sources. Source/Destination Address: Type the MAC address you want configure, the format is “AABB.CCDD.EEFF”. Example: “Source to Destination” is “0007.7c00.0000 to 0007.7c00.0002”. ...
Page 106
Egress Port: Bind the MAC Filter rule to specific front port. Once you finish configuring the ACE settings, click on Add to apply your configuration. You can see below screen is shown. Example of the below Entry: Permit Source MAC “0007.7c00.0000” to Destination MAC “0007.7c00.0002”. The Permit rule is egress rule and it is bind to Gigabit Ethernet Port 25. Once you finish configuring the settings, click on Apply to apply your configuration. ...
Page 107
IP Filter: Type ID/Name when select IP Filter. The ID for IP access list is listed as below of the field. You can also type ACL name in this field, it goes to IP Extended mode setting and support both IP Standard and IP Extended mode depend on the setting. Click Add to add the rule. Click Edit to edit the content for the rule. After configured, click Apply to apply all the rules. Reload to reload setting. Remove to remove one of the entries. Example: IP Standard Access List: This kind of ACL allows user to define filter rules according to the source IP address. IP Extended Access List: This kind of ACL allows user to define filter rules according to the source IP address, destination IP address, Source TCP/UDP port, ...
Page 108
Filter ID/Name: The ID or the name for this IP Filter entry. Action: Permit to permit traffic from specified sources. Deny to deny traffic from those sources. Source/Destination Address: Type the source/destination IP address you want configure. Source/Destination Wildcard: This command allows user to define single host or a group of hosts based on the wildcard. Some of the allowance examples are as below: ...
Page 109
Wildcard Bit Number of Note allowance Any 11111111.11111111. All All IP addresses. 11111111.11111111 Or a mask: 255.255.255.255 Host 0.0.0.0 1 Only the Source or Destination host. 0.0.0.3 0.0.0.(00000011) 3 0.0.0.7 0.0.0.(00000111) 7 0.0.0.15 0.0.0.(11111111) 15 …. Note: The mask is a wildcard mask: the high‐order bits of the mask that are binary zeros determine how many corresponding high‐order bits in the IP address ...
Page 110
After configured the ACL filter rules, remember associate this filter with the physical ports. Then the port has the capability to filter traffic/attach based on the packets lost. 4.9.2 IEEE 802.1x 802.1X configuration IEEE 802.1X is the protocol that performing authentication to obtain access to IEEE 802 LANs. It is port‐base network access control and the switch could control which connection should be available or not. ...
Page 111
System AuthControl: To enable or disable the 802.1x authentication. Authentication Method: Radius is an authentication server that provides key for authentication, with this method, user must connect the switch to the Radius server. If the user select Local for the authentication method, the switch will use the local user data base which can be create in this page for authentication. Radius Server IP: The IP address of the Radius server Shared Key: The password between the switch and the Radius Server. Server Port: UDP port of the Radius server. Accounting Port: Port for packets that contain the information of account login or logout. Secondary Radius Server IP: Secondary Radius Server could be set in case of the primary radius server down. Local Radius User: The user can add Account/Password for local authentication. Local Radius User List: This list shows the account information; user also can remove selected account. 802.1x Port Configuration ...
Page 112
Once you finish configuring the settings, click on Apply to apply your configuration. Port control: Force Authorized means this port is authorized; the data is free to in/out. Force unauthorized just opposite, the port is blocked. If users want to control this port with Radius Server, please select Auto for port control. Reauthentication: If enable this field, switch will ask client to re‐authenticate. The default time interval is 3600 seconds. ...
Page 113
Quiet Period: When authentication failed, Switch will wait for a period and try to communicate with radius server again. Tx period: The time interval of authentication request. Supplicant Timeout: the timeout for the client authenticating Sever Timeout: The timeout for server response for authenticating. Click Initialize Selected to set the authorize state of selected port to initialize status. Click Reauthenticate Selected to send EAP Request to supplicant to request reauthentication. Click Default Selected to reset the configurable 802.1x parameters of selected port to the default values. ...
Page 114
4.9.3 CLI Commands of the Security Command Lines of the Security configuration Feature Command Line Port Security Add MAC access list Switch(config)# mac access-list extended NAME access-list name Switch(config)# mac access-list extended server1 Switch(config-ext-macl)# permit Specify packets to forward deny Specify packets to reject End current mode and change to enable mode exit Exit current mode and down to previous...
Page 115
quit Exit current mode and down to previous mode remark Access list entry comment Add IP Extended Switch(config)# ip access-list extended access list <100-199> Extended IP access-list number <2000-2699> Extended IP access-list number (expanded range) WORD access-list name Switch(config)# ip access-list extended 100 Switch(config-ext-acl)# deny Specify packets to reject...
Page 116
0007.7c11.2233 host 0007.7c11.2234 [IFNAME] Egress interface name Switch(config-ext-macl)#permit host 0007.7c11.2233 host 0007.7c11.2234 gi25 Note: MAC Rule: Permit/Deny wildcard Source_MAC wildcard Dest_MAC Egress_Interface Example 1: Edit IP Switch(config)# ip access-list extended 100 Extended access list Switch(config-ext-acl)#permit Any Internet Protocol Transmission Control Protocol User Datagram Protocol icmp Internet Control Message Protocol Switch(config-ext-acl)#permit ip...
Page 117
Egress_Interface UDP Rule: Permit/Deny udp Source_IP wildcard Dest_IP wildcard eq Given_Port_Number Egress_Interface ICMP Rule: Permit/Deny icmp Source_IP wildcard Dest_IP wildcard ICMP_Message_Type ICMP_Message_Code Egress_Interface Add MAC Switch(config)# mac-address-table static 0007.7701.0101 vlan 1 interface fa1 mac-address-table unicast static set ok! Port Security Switch(config)# interface fa1 Switch(config-if)# switchport port-security Disables new MAC addresses learning and aging...
Page 118
authentication Switch(config)# dot1x authentic-method radius Switch(config)# radius server-ip Switch(config)# dot1x radius Switch(config)# dot1x radius server-ip 192.168.2.200 key 1234 RADIUS Server Port number NOT given. (default=1812) RADIUS Accounting Port number NOT given. (default=1813) RADIUS Server IP : 192.168.2.200 RADIUS Server Key : 1234 RADIUS Server Port : 1812 RADIUS Accounting Port : 1813 Switch(config)#...
Page 119
Secondary RADIUS Server Port : 1812 Secondary RADIUS Accounting Port : 1813 User name/password Switch(config)# dot1x username Westermo passwd for authentication Westermo vlan 1 Display Switch# show dot1x <cr> Show Dot1x information for all interface authentic-method Dot1x authentic-method interface Interface name...
Page 120
operControlledDirections : Both adminControlledDirections : Both Switch# show dot1x radius RADIUS Server IP : 192.168.2.200 RADIUS Server Key : radius-key RADIUS Server Port : 1812 RADIUS Accounting Port : 1813 Secondary RADIUS Server IP : N/A Secondary RADIUS Server Key : N/A Secondary RADIUS Server Port : N/A Secondary RADIUS Accounting Port : N/A Switch# show dot1x username...
4.10 Warning The switch provides several types of Warning features for you to remote monitor the status of end devices or the change of your network. The features include System Log and SMTP E‐mail Alert. Following commands are included in this chapter: 4.10.1 Event Selection 4.10.2 Syslog Configuration 4.10.3 SMTP Configuration 4.10.4 CLI Commands 4.10.1 Event Selection Event Types can be divided into two basic groups: System Events and Port Events. ...
Page 122
Once you finish configuring the settings, click on Apply to apply your configuration. 4.10.2 SysLog Configuration System Log is useful to provide system administrator locally or remotely monitor switch events history. There are two System Log modes provided by the switch, local mode and remote mode. Local Mode: In this mode, the switch will print the occurred events selected in the Event Selection page to System Log table of the switch. You can monitor the system logs in [Monitor and Diag] / [Event Log] page. Remote Mode: The remote mode is also known as Server mode. In this mode, you should assign the IP address of the System Log server. The switch will send ...
Page 123
Once you finish configuring the settings, click on Apply to apply your configuration. Note: When enabling Local or Both mode, you can monitor the system logs in [Monitor and Diag] / [Event Log] page. 4.10.3 SMTP Configuration The switch supports E‐mail Warning feature. The switch will send the occurred events ...
Page 124
Field Description SMTP Server IP Address Enter the IP address of the email Server Authentication Click on check box to enable password User Name Enter email Account name (Max.40 characters) Password Enter the password of the email account Confirm Password Re‐type the password of the email account You can set up to 4 email addresses to receive email alarm from Switch Rcpt E‐mail Address 1 The first email address to receive email alert from Switch (Max. 40 characters) Rcpt E‐mail Address 2 The second email address to receive email alert from Switch (Max. 40 characters) Rcpt E‐mail Address 3 The third email address to receive email alert from Switch (Max. 40 characters) Rcpt E‐mail Address 4 The fourth email address to receive email alert from Switch (Max. 40 characters) ...
Page 125
Switch(config)# smtp-server server 192.168.2.200 ACCOUNT SMTP server mail account, ex: support@westermo.se Switch(config)# smtp-server server 192.168.2.200 support@westermo.se SMTP Email Alert set Server: 192.168.2.200, Account: support@westermo.se ok. Receiver mail Switch(config)# smtp-server receipt 1 korecare@Westermo.com SMTP Email Alert set receipt 1: support@westermo.se ok. Authentication...
4.11 Monitor and Diag The switch provides several types of features for you to monitor the status of the switch or diagnostic for you to check the problem when encountering problems related to the switch. The features include MAC Address Table, Port Statistics, Port Mirror, Event Log and Ping. Following commands are included in this group: 4.11.1 MAC Address Table 4.11.2 Port Statistics 4.11.3 Port Mirror 4.11.4 Event Log 4.11.5 Topology Discovery (LLDP) 4.11.6 Ping 4.11.7 CLI Commands of the Monitor and Diag 4.11.1 MAC Address Table The switch provides 8K entries in MAC Address Table. In this page, users can change ...
Page 128
Dynamic Unicast MAC is MAC address learnt by the switch Fabric. Static Multicast can be added by CLI and can be deleted by Web and CLI. Dynamic Multicast will appear after you enabled IGMP and the switch learnt IGMP report. Click on Remove to remove the static Unicast/Multicast MAC address. Click on Reload ...
Page 129
4.11.3 Port Mirroring Port mirroring (also called port spanning) is a tool that allows you to mirror the traffic from one or more ports onto another port, without disrupting the flow of traffic on the original port. Any traffic that goes in or out of the Source Port(s) will be duplicated at the Destination Port. This traffic can then be analyzed on the Destination port using a monitoring device or application. A network administrator will typically utilize this tool for diagnostics, debugging, or fending off attacks. Port Mirror Mode: Select Enable/Disable to enable/disable Port Mirror. Source Port: This is also known as Monitor Port. These are the ports you want to monitor and the traffic of all source/monitor ports will be copied to destination/analysis ...
Page 130
Once you finish configuring the settings, click on Apply to apply the settings. 4.11.4 Event Log When System Log Local mode is selected, the switch will record occurred events in local log table. This page shows this log table. The entry includes the index, occurred data and time and content of the events. Click on Clear to clear the entries. Click on Reload to refresh the table. ...
Page 131
4.11.5 Topology Discovery (LLDP) The switch supports 802.1AB Link Layer Discovery Protocol, thus the 5428G can be discovered by the Network Management System which support LLDP discovery. With LLDP supported, the NMS can easier maintain the topology map, display port ID, port description, system description, VLAN ID… Once the link failure, the topology change events can be updated to the NMS as well. The LLDP Port State can display the neighbor ID and IP leant from the connected devices. LLDP: Enable/Disable the LLDP topology discovery information. LLDP Configuration: To configure the related timer of LLDP. LLDP timer: The LLDPDP interval, the LLDP information is send per LLDP timer. The default value is 30 seconds. ...
Page 132
4.11.6 Ping Utility This page provides Ping Utility for users to ping remote device and check whether the device is alive or not. Type Target IP address of the target device and click on Start to start the ping. After few seconds, you can see the result in the Result field. 4.11.7 CLI Commands of the Monitor and Diag Command Lines of the Monitor and Diag configuration Feature Command Line MAC Address Table Ageing Time...
Page 133
Add Multicast MAC Switch(config)# mac-address-table multicast address 0100.5e01.0101 vlan 1 interface fa6-7 Adds an entry in the multicast table ok! Note: rule: mac-address-table multicast MAC_address VLAN VID interface_list interface_name/range Show MAC Address Switch# show mac-address-table Table – All types ***** UNICAST MAC ADDRESS ***** Destination Address Address Type Vlan Destination Port...
Page 134
0100.5e7f.fffa fa4,fa6-7 Show MAC Address Switch# show mac-address-table static Table – Static MAC Destination Address Address Type Vlan addresses Destination Port ------------------- --------------- ------- ------------------------ 0007.7c10.0101 Static 0007.7c10.0102 Static Show Aging timeout Switch# show mac-address-table aging-time time the mac-address-table aging-time is 300 sec. Port Statistics Port Statistics Switch# show rmon statistics fa4 (select...
Page 135
Select Source Port Switch(config)# mirror source fa1-2 both Received and transmitted traffic Received traffic Transmitted traffic Switch(config)# mirror source fa1-2 both Mirror source fa1-2 both set ok. Note: Select source port list and TX/RX/Both mode. Select Destination Switch(config)# mirror destination fa6 both Port Mirror destination fa6 both set ok Display...
Page 136
Ping Ping IP Switch# ping 192.168.2.33 PING 192.168.2.33 (192.168.2.33): 56 data bytes 64 bytes from 192.168.2.33: icmp_seq=0 ttl=128 time=0.0 ms 64 bytes from 192.168.2.33: icmp_seq=1 ttl=128 time=0.0 ms 64 bytes from 192.168.2.33: icmp_seq=2 ttl=128 time=0.0 ms 64 bytes from 192.168.2.33: icmp_seq=3 ttl=128 time=0.0 ms 64 bytes from 192.168.2.33: icmp_seq=4 ttl=128 time=0.0 ms...
4.12 Device Front Panel Device Front Panel allows you to see LED status on the switch. You can see LED and link status of the Power, DO, DI, R.M. and Ports. Feature On / Link UP Off / Link Down Note Power Green Black R.M. (Ring Master) Green Black Port Link LED Green Black Port Active LED Green Black Port Link State Green Black Green: The port is connected. Black: Not connected. SFP Link State Green Black Gray: Plugged but not link up yet. The switch Front Panel ...
4.13 Save to Flash Save Configuration allows you to save any configuration you just made to the Flash. Powering off the switch without clicking on Save Configuration will cause loss of the new settings. After selecting Save Configuration, click on Save to Flash to save your new configuration. Command Lines: Feature Command Line Save SWITCH# write Building Configuration… [OK] Switch# copy running-config startup-config Building Configuration... [OK]...
4.14 Logout The switch provides two logout methods. The web connection will be logged out if you don’t input any command after 30 seconds. The Logout command allows you to manually logout the web connection. Click on Yes to logout, No to go back the configuration page. Command Lines: Feature Command Line Logout SWITCH> exit SWITCH# exit ...
Private MIB The private MIB can be found in product CD. Compile the private MIB file by your SNMP tool. The private MIB tree is the same as the web tree. This is easier to understand and use. If you are not familiar with standard MIB, you can directly use private MIB to manage/monitor the switch, no need to learn or find where the OIDs of the commands are. ...
Need help?
Do you have a question about the MRI-128-F4G Series and is the answer not in the manual?
Questions and answers