EnGenius EGS5212FP User Manual
EnGenius EGS5212FP User Manual

EnGenius EGS5212FP User Manual

Neutron series layer 2 managed poe+ switch
Hide thumbs Also See for EGS5212FP:
Table of Contents

Advertisement

User Manual
User Manual
Layer 2 Managed PoE+ Switch
Neutron Series
EGS5212FP
|
EGS7228P
Business Solutions
Business Solutions
|
EGS7228FP
|
EGS7252FP
version 1.0

Advertisement

Table of Contents
loading

Summary of Contents for EnGenius EGS5212FP

  • Page 1 Business Solutions Business Solutions User Manual User Manual EGS5212FP EGS7228P EGS7228FP EGS7252FP version 1.0 Layer 2 Managed PoE+ Switch Neutron Series...
  • Page 2 IMPORTANT To install your Switch please refer to the Quick Installation Guide included in the product packaging.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1 Product Overview..........6 - STP....................39 Introduction/Package Contents..........7 - Global Settings................40 - Spanning Tree Loops..............41 Technical Specifications.............. 8 - Root Bridge................43 Physical Interface................11 Management Interface............. 13 - Port Settings................45 Connecting the Switch to a Network........
  • Page 4 - VLAN Settings................70 - Community List................92 - Group List..................71 - User List..................93 - Router Settings................ 72 -Trap Settings/SNMP Traps............94 - Jumbo Frame ................73 ACL...................... 95 VLAN....................74 - MAC ACL..................96 - 802.1Q.................. 74 - MAC ACE..................
  • Page 5 - Authenticated Host..............114 - Log Table..................136 - Radius Server................115 Diagnostics..................137 - Access..................116 - Cable Diagnostics..............127 - HTTP(S) Settings..............116 - Ping Test..................138 - Telnet Settings................117 - IPv6 Ping Test................ 139 - SSH Settings................118 - Trace Route................140 - Console Settings............... 119 Chapter 3 Maintenance............141 - Port Security................
  • Page 6: Chapter 1 Product Overview

    Chapter 1 Product Overview...
  • Page 7: Introduction/Package Contents

    Features and specifications subject to change without notice. Trademarks and registered trademarks are the property of their respective owners. For United States of America: Copyright ©2013 EnGenius Technologies, Inc. All rights reserved. Compliant with FCC - This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.
  • Page 8: Technical Specifications

    Technical Specifications Standard: EGS5212FP EGS7928P EGS7928FP EGS7252FP Ports Power budget Ports 1 - 8, 30 Watts per Ports 1 - 24, 30 Watts per Ports 1 - 24, 30 Watts Ports 1 - 48, 30 Watts Port Port per Port per 24 Ports Total PoE Budget 130 W 185 W 370 W...
  • Page 9 Port Functions: L2 Features: 8, 24, or 48 10/100/1000Mbps Ports in the front panel 802.3ad compatible Link Aggregation (Depending on model) 802.1D Spanning Tree (STP) 2 or 4 100/1000Mbps SFP Ports (Depending on model) 802.1w Rapid Spanning Tree (RSTP) 1 RJ 45 Port 802.1s Multiple Spanning Tree (MSTP) IGMP Snooping v1/v2/v3 PoE Capability: MLD Snooping PoE Standard: Port 1~8, 24, or 48 Support IEEE 802.3at/af IGMP Fast Leave PoE Capable Ports: Port Trunking Port 1~8, 24, 48 can output up to 30 Watts Port Mirroring: One to one and many to one LED Indicator...
  • Page 10 L2 Features Continued: Web-based support SNMP v1 support SNMP v2c support SNMP v3 support TFTP upgrade Command Line Interface (CLI) SNTP RMONv1 SYSLOG Cable Diagnostics MIB Support RFC1213 RFC1493 RFC1757 RFC2674 PoE Management Power on/off per port Power Class Configuration Power feeding with priority User-defined power limit...
  • Page 11: Physical Interface

    Physical Interface Dimensions Dimensions EGS5212FP EGS7228P & EGS7228FP Width: 13” Length: 9” Height: 1.73” Width: 9.45” Length: 4.13” Height: 1.06” 12 13 EGS5212FP - Front EGS7228P - Front EGS7228P - Back EGS5212FP - Back...
  • Page 12 Dimensions EGS7252FP Width: 17.3” Length: 16.1” Height: 1.7” EGS7252FP -Back EGS7252FP - Front 1 RJ45 Console Port established on the port; Solid Amber Light = A valid 10/100 Mpbs link is established on the port; Solid Green Light = A valid 1000 2 Power LED: Light off = Power off;...
  • Page 13: Management Interface

    Management Interface The EGS Layer 2 PoE+ Switch features an embedded Web interface for the monitoring and management of your device.
  • Page 14: Connecting The Switch To A Network

    Connecting the Switch to a Network Discovery in a Network with a DHCP Server Use this procedure to setup the Switch within a network 5. Open a web browser on your computer. In the address bar of the web browser, enter 192.168.0.239 and click that uses DHCP.
  • Page 15 Discovery on a Network without a DHCP Server 5. If your computer is already on a network, ensure that you have set it to a Static IP Address on the Interface This section describes how to set up the EGS Layer 2 Switch (Example: 192.168.0.10 and the Subnet mask address in a network without a DHCP server.
  • Page 16: Web Access

    Web Access Use this procedure to access the management interface through a Web browser for device configuration. 1. Open a Web browser on your computer and enter the following address (default): http://192.168.0.239. 2. On the login screen, use the following information: Password: password To make access to the web-based management interface more secure, it’s highly reccomended that you change the password to something more unique.
  • Page 17: Chapter 2 Management

    Chapter 2 Management...
  • Page 18: System/Search Bar

    System The navigation pane at the left of the Web browser interface Search Bar contains a System tab that enables you to manage your At the top right corner of the Graphical User Interface (GUI) EGS Layer 2 Switch with features under the following main is the search bar which you can use to find and jump to any menu options: of the L2 management features.
  • Page 19: Summary

    Summary Device Name: Displays the model name of the Switch FW version: Displays the installed firmware version of the The Summary screen contains general device information Switch. about the Switch, including the device name, Firmware Serial Number: Displays the serial number of the Switch. version, MAC address, IP address, Gateway, and System Base MAC address: Displays the MAC address of the device.
  • Page 20: Ip Settings

    IP Settings IPv4 The IP Setting screen contains fields for assigning IP Select whether to you wish to enable Static or DHCP for addresses. IP addresses are either defined as static or are Auto-Configuration. Next, enter the information for the IP retrieved using the Dynamic Host Configuration Protocol address, gateway, and DNS servers. (DHCP). DHCP assigns dynamic IP addresses to devices on a network.
  • Page 21 Dynamic IP Address (DHCP): Enables the IP address to be configured Gateway: Enter an IP address that determines automatically by the DHCP server. where packets with a destination Select this option if you have a DHCP address outside the current subnet server that can assign the Switch an IP should be sent.
  • Page 22: Ipv6

    IPv6 IPv6 State: Select whether you wish to enable Auto Configuration, DHCPv6 Client, or Static for the IPv6 address. IPv6 is a an upgraded version to IPv4, providing more Auto Configuration: Use this option to set the IPv6 address for the IPv6 network interface in Auto Con- available IP addresses as well as other benefits. To ac- figuration. The Switch will automatically cess the switch over an IPv6 network you must first con-...
  • Page 23: System Time

    System Time Current time: Displays the current time. Enable SNTP: Select whether to Enable or Use the System Time screen to view and adjust date and Disable the SNTP server. The system time is set via an SNTP time settings. sever. Time Zone: Select the difference between The Switch supports Simple Network Time Protocol Greenwich Mean Time (GMT) and local time.
  • Page 24 To configure date/time through SNMP: To configure date/time manually: 1. Next to the Enable SNTP, select Enable. 1. Next to the Enable SNTP, select Disable. 2. In the Time Zone Offset list, select by country or by 2. In the Manual Time field, use the drop-down boxes to the Coordinated Universal Time (UTC/GMT) time zone in manually select the date and time you wish to set.
  • Page 25: Port Settings

    Port Settings Port: Displays the port number. Link Status: Indicates whether the link is up or down. Use this screen to view and configure Switch port settings. Mode: Select the speed and the duplex mode of the The Port Settings feature lets you change the configuration Ethernet connection on this port. of the ports on the Switch in order to find the best balance Selecting Auto (Auto-Negotiation) allows one of speed and flow control according to your preferences.
  • Page 26 Flow Control: A concentration of traffic on a port decreases port bandwidth and overflows buffer memory causing packet discards and frame losses. Flow Control is used to regulate transmission of signals to match the bandwidth of the receiving port. The Switch uses IEEE802.3x flow control in full duplex mode and backpressure flow control in half duplex mode.
  • Page 27: Poe/Power Budget

    Total Power Budget: Enter the amount of power the Switch can provide to all ports. Power Budget Current Power Used: Shows the total amount of power currently being delivered to all ports. The PoE Management screen contains system PoE information for monitoring the current power usage and assigns the total amount of power the Switch can provide to all of its PoE ports. Ports 1~8,24, or 48 on the Switch are IEEE802.3at/af compliant ports. Each port is capable of...
  • Page 28: Poe Port Settings

    99% usage, and port 1 is prioritized as high, but port 6 is prioritized as low, port 1 is prioritized to receive power and port 6 may be denied power. The possible field values are: 4. EGS5212FP: Ports 1-8 supports both IEEE802.3 af and at. The maximum power budget is 130 Watts. • Low – Sets the PoE priority level as low.
  • Page 29 Class(Auto): Shows the classification of the powered device. The class Status: Shows the port’s PoE status. The possible field values are: defines the maximum power that can be provided to the • Delivering Power – The device is enabled to deliver power via the port. powered device. The possible field values are: • Disabled – The device is disabled for delivering power via • Class 0 – The maximum power level at the Power Sourcing. the port.
  • Page 30 Apply: Click APPLY to update the the system settings.
  • Page 31: Eee

    EEE Status: Enable or Disable EEE for the specified port. there is no traffic. Click APPLY to update the system settings. Network administrators have long focused on the energy efficiency of their infrastructure, and the EnGenius Layer 2 Switch complies with the IEEE’s Energy-Efficient Ethernet (EEE) standard to give you even more control. The EEE- compliant Switch offers users the ability to utilize power that Ethernet links use only during data transmission.
  • Page 32: L2 Features

    L2 Features Link Aggregation A Link Aggregation Group (LAG) optimizes port usage by linking a group of ports together to form a single, logical, The L2 Feature tab exhibits complete standard-based higher-bandwidth link. Aggregating ports multiplies the Layer 2 switching capabilities, including: Link Aggregation, bandwidth and increases port flexibility for the Switch.
  • Page 33 When you aggregate ports, the ports and LAG must fulfill •Ports can be configured as LACP ports only if the the following conditions: ports are not part of a previously configured LAG. • All ports within a LAG must be the same media/ LACP is a dynamic protocol which helps to automate format type. the configuration and maintenance of LAG’s. The main purpose of LACP is to automatically configure individual • A VLAN is not configured on the port. links to an aggregate bundle, while adding new links and helping to recover from link failures if the need arises.
  • Page 34: Port Trunking

    Port Trunking Group: Displays the number of the given trunk group. You can utilize up to 8 link aggregation groups and Port Trunking allows you to assign physical links to one each group consisting up to 8 ports on the Switch. logical link that functions as a single, higher-speed link, Active Ports: Displays the active participating members of the providing dramatically increased bandwidth.
  • Page 35: Lacp Settings

    LACP Settings Assign a system priority to run with Link Aggregation Control Protocol (LACP) and is become for a backup link if a link goes down. The lowest system priority is al- lowed to make decisions about which ports it is actively participating in in case a link goes down.
  • Page 36: Lacp Timout

    LACP Timeout Timeout: Select the administrative LACP timeout. • Long – Long timeout value. Link Aggregation Control Protocol (LACP) allows the exchange of information with regard to the link • Short – Short timeout value. aggregation between two members of aggregation. The Long: The LACP PDU will be sent for every 30 seconds, and LACP Time Out value is measured in a periodic interval.
  • Page 37: Mirror Settings

    Mirror Settings Mirror ID: A number identifying the mirror session. This Switch only supports up to 4 mirror sessions. Mirrors network traffic by forwarding copies of incoming Port: Displays the session ID for port mirroring. and outgoing packets from specific ports to a monitoring Destination Select the port for traffic purposes from source ports mirrored to this port. Port: port. The packet that is copied to the monitoring port will be the same format as the original packet.
  • Page 38 NOTE: You cannot mirror a faster port onto a slower port. For example, if you try to mirror the traffic from a 100 Mbps port onto a 10 Mbps port, this can cause through- put problems. The port you are copying frames from should always support an equal or lower speed than the port to which you are sending the copies.
  • Page 39: Stp

    The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between Switches. This allows the Switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 40: Global Settings

    Global Settings Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on Switches. Spanning Tree Protocol (STP) allows you to ensure that you do not create loops when you have redundant paths in the network. STP provides a single active path between two devices on a network in order to prevents loops from being formed when the Switch is interconnected via multiple paths.
  • Page 41: Spanning Tree Loops

    Spanning Tree Loops Multiple Spanning Tree Protocol (MSTP) defined in IEEE 802.1s, enables multiple VLANs to be mapped to redu- Loops occur when alternate routes exist between hosts. cethe number of spanning-tree instances needed to sup- Loops in an extended network can cause the Switch port a large number of VLANs. If there is only one VLAN to forward traffic indefinitely, resulting in increased in the network, a single STP works appropriately.
  • Page 42 RSTP on the other hand is much faster than STP. It can complete a convergence in seconds, so it greatly dimin- ishes the possible impact the process can have on your network compared to STP. RSTP reduces the number of state changes before active ports start learning, pre- defining an alternate route that can be used when a node or port fails and retain the forwarding database for...
  • Page 43: Root Bridge

    Root Bridge The Root Bridge serves as an administrative point for all Spanning Tree calculations to determine which redundant links to block in order to prevent network loops. From here, you can view all the information regarding the Root Bridge within the STP. All other decisions in a spanning tree network, such as ports being blocked and ports being put in a forwarding mode, are made regarding a root bridge.
  • Page 44 Root Address: Displays the Root Bridge MAC address. Root in Root Bridge refers to the base of the span- ning tree, which the Switch could be config- ured for. Priority: Displays the priority for the bridge. When Switches are running STP, each is assigned a priority. After exchanging BPDUs, the Switch with the lowest priority value becomes the root bridge.
  • Page 45: Port Settings

    Port Settings Edge Port: Indicate whether the port is Enabled or Disabled. STP and RSTP help guard against the formation of loops •Yes – Designates the port as an edge port. in an Ethernet network topology. A loop occurs when nodes transmit packets to each other over more than •...
  • Page 46 Edge Ports An edge port changes its initial STP port state from a blocking state to a forwarding state immediately without going through listening and learning states right after the port is configured as an edge port or when its link status changes. Edge Ports are not connected to LANs that have span¬ning tree devices, so Edge Ports do not receive Bridge Protocol Data Units (BPDUs).
  • Page 47: Cist Instance Settings

    CIST Instance Settings The Common Instance Spanning Tree (CIST) protocol is formed by the spanning-tree algorithm running among bridges that support the IEEE 802.1w, IEEE 802.1s, and IEEE 802.1D standard. A Common and Internal Spanning Tree (CIST) represents the connectivity of the entire network and it is equivalent to a spanning tree in an STP/ RSTP.
  • Page 48 Enter the information to set up CIST for the Switch: Maximum Age: The Max Age may be set to ensure that old information does not endlessly circulate through redundant paths in the network, preventing the effective propagation of new information. Set by the Root Bridge, this Priority: Select from the list to specify the priority value will aid in determining that the Switch...
  • Page 49: Cist Port Settings

    CIST Port Settings MST ID: Select the MST ID from the list. Port: Port or trunked port identifier. Use the CIST Ports Settings page to configure and view Priority: Defines the priority used for this STA attributes for interfaces when the spanning tree port in the Spanning Tree Algorithm. mode is set to STP or RSTP. You may use a different If the path cost for all ports on a Switch are the same, the port with priority or path cost for ports of the same media type to...
  • Page 50 Apply: Click APPLY to update the the system settings. Designated Root Bridge: Displays the Root Bridge for the CST. It is comprised using the bridge priority and the base MAC address of the bridge. Internal Root Cost: This is the cost to the CIST regional root in a region.
  • Page 51: Mst Instance Setting

    VLANs. MSTP maintains contact with the global network MST Instance Settings because each instance is treated as an RSTP node in the Multiple Spanning Tree Protocol, or MSTP enables the Common Spanning Tree (CST). grouping of multiple VLANs with the same topology Click the Edit button to configure the MST settings. Next, requirements into one Multiple Spanning Tree Instance enter information for the VLAN List and choose the...
  • Page 52 MST ID: Displays the ID of the MST group that is Configuration This value, along with the Configuration created. A maximum of 15 groups can be set Reversion: Name, identifies the MSTP region configured for the Switch. on the Switch. Devices must have the same revision number to belong to the same region. VLAN List: Enter the VLAN ID range from for the configured VLANs to associate with the MST...
  • Page 53: Mst Port Settings

    MST Port Settings MST ID: Displays the ID of the MST group that is created. A maximum of 15 This page displays the current MSTI configuration groups can be set for the Switch. Port: Displays port or trunked port ID. information for the Switch. From here you can update Priority: Select the bridge priority value for the port configuration for an MSTI ID. If a loop occurs,...
  • Page 54 Internal Root Cost: Displays the path cost to the designated Port State: Indicates the current STP state of a port. If en- root for the selected MST instance. abled, the Port State determines what forwarding action is taken regarding traffic. The possible port Designated Bridge: Displays the Bridge Identifier of the states are: bridge for the Designated Port.
  • Page 55: Mac Address Table

    MAC Address Table The MAC address table contains address information that the Switch uses to forward traffic between the inbound and outbound ports. All MAC addresses in the address table are associated with one or more ports. When the Switch receives traffic on a port, it searches the Ethernet switching table for the MAC address of the destination. If the MAC address is not found, the traffic is flooded out all of the other ports associated with the VLAN.
  • Page 56: Dynamic Mac Address

    Dynamic MAC Address Index: Displays the index for the Dynamic MAC Address table. Port: Select the port to which the entry refers. The Switch will automatically learn the device’s MAC VID: Displays the VLAN ID for the specified MAC address address and store it to the Dynamic MAC address table. MAC Address: Displays the MAC addresses that the Switch If there is no packet received from the device within the...
  • Page 57: Lldp

    LLDP Link Layer Discovery Protocol (LLDP) is the IEEE 802.1AB standard for Switches to advertise their identity, major capabilities, and neighbors on the 802 LAN. LLDP allows users to views the discovered information to identify system topology and detect faulty configurations on the LAN. LLDP is essentially a neighbor discovery protocol that uses Ethernet connectivity to advertise information to devices on the same LAN and store information about the network. The information transmitted in LLDP advertisements flow in one direction only; from one device to its neighbors.
  • Page 58: Global Settings

    Global Settings State: Select Enabled or Disabled to activate LLDP for the Switch. Select whether to Enable or Disable the LLDP feature Transmission Interval: Enter the interval at which LLDP advertisement updates are sent. The on the Switch. Next, enter the Transmission interval, default value is 30.
  • Page 59: Local Device

    ID, system description, and system capability System Description: Describes the device. advertisements. Here, you can view detailed LLDP Capabilities Supported: Describes the device functions. information for the EnGenius Switch. Capabilities Enabled: Describes the device functions. Port ID Subtype: Displays the port ID type.
  • Page 60: Remote Device

    Remote Device Port: Displays the port. Chassis ID Subtype: Displays the chassis ID type. LLDP devices must support chassis and port ID Chassis ID: Displays the chassis ID advertisement, as well as the system name, system of the device that is ID, system description, and system capability transmitting the LLDP advertisements.
  • Page 61 Mode: Aggregated links can be set up manually or Click the Apply button to accept the changes or the automatically. Select Static or LACP for the Link Cancel button to discard them. Aggregation type. • Static – The Link Aggregation is configured manually for the specified trunk group. • LACP – The Link Aggregation is configured dynamically for the specified trunk group.
  • Page 62: Igmp Snooping

    IGMP Snooping can also limit flooding of traffic to IGMP designated ports. This improves network performance by restricting the multicast packets only to Switch ports where host nodes Internet Group Management Protocol (IGMP) Snooping are located. IGMP Snooping significantly reduces overall Multicast traffic passing through your Switch. Without IGMP allows a Switch to forward multicast traffic intelligently. Multicasting is used to support real-time applications such Snooping, Multicast traffic is treated in the same manner as a Broadcast transmission, which forwards packets to all...
  • Page 63: Global Settings

    Global Settings Status: Select to Enable or Disable IGMP Snooping on the Switch. The switch snoops all IGMP packets it receives to determine which segments should receive packets directed Click to Enable or Disable the IGMP Snooping feature for to the group address when enabled. the Switch.
  • Page 64: Vlan Settings

    VLAN Settings VLAN ID: Displays the VLAN ID. IGMP Snooping Status: Enables or Disables the IGMP snooping Use the IGMP Snooping VLAN Settings to configure IGMP feature for the specified VLAN ID. Snooping settings for VLANs on the system. The Switch Fast Leave: Enables or Disables the IGMP snooping performs IGMP Snooping on VLANs that send IGMP Fast Leave for the specified VLAN ID.
  • Page 65: Querier Settings

    Querier Settings VLAN ID: Displays the VLAN ID. Querier State: Select whether to Enable or Disable IGMP snooping requires that one central Switch to pe- the IGMP querier state for the spec- ified VLAN ID. riodically query all end devices on the network to an- A querier can periodically ask their nounce their Multicast memberships and this central hosts if they wish to receive mul-...
  • Page 66 Oper Interval: Displays the IGMP Interval of the operational querier. Max Response Enter the maximum response Interval: time used in the queries that are sent by the snooping querier. The default is 10 seconds. Oper Max Response Display the maximum response Interval: time which used in the queries that are sent by the snooping...
  • Page 67: Group List

    Group List The Group List displays VLAN ID, Group IP Address, and Members Port in the IGMP Snooping List.
  • Page 68: Router Settings

    Router Settings VLAN ID: Displays the VLAN ID. Router Ports Auto-Learned: The Switch will auto detect the prescence of a multicast router and forward IGMP pacets accordingly. The Router Settings shows the learned multicast router Dynamic Port List: Displays router ports that have attached port if the port is active and a member of the been dynamically configured.
  • Page 69: Mld Snooping

    MLD Snooping Global Settings Multicast Listener Discovery (MLD) Snooping operates on the IPv6 traffic level for discovering multicast listeners MLD Snooping Status: Select to Enable or Disable MLD on a directly attached port and performs a similar Snooping on the Switch. The Switch function to IGMP Snooping for IPv4. MLD snooping snoops all MLD packets it receives to determine which segments should allows the Switch to examine MLD packets and make...
  • Page 70: Vlan Settings

    VLAN Settings Fast Leave can improve bandwidth usage for a network which frequently experiences many MLD host add and If the Fast Leave feature is not used, a multicast querier leave requests. will send a GS-query message when an MLD group leave message is received. The querier stops forwarding traffic VLAN ID: Displays the VLAN ID.
  • Page 71: Group List

    Group List The Group List displays VLAN ID, IPv6 Address, and Mem- bers Port in the MLD Snooping List.
  • Page 72: Router Settings

    Router Settings VLAN ID: Displays the VLAN ID. Router Ports Au- The Switch will automatically detect The Router Settings feature shows the learned multicast to-Learned: the presence of a multicast router and forward MLD packets accordingly. router attached port if the port is active and a member of Dynamic Port List: Displays router ports that have been the VLAN. Select the VLAN ID you would like to configure...
  • Page 73: Jumbo Frame

    If you intend to leave the local area network at high speeds, the dynamics of TCP will require you to use large frame sizes. The EnGenius Layer 2 Switch supports a Jumbo Frame size of up to 9216 bytes. Jumbo frames need to be configured to work on the ingress and egress port of each device along the end-to-end transmission path.
  • Page 74: Vlan

    VLAN A Virtual LAN (VLAN) is a group of ports that form a logical 802.1Q Ethernet segment on a Layer 2 Switch which provides better Each VLAN in a network has an associated VLAN ID, which administration, security, and management of multicast appears in the IEEE 802.1Q tag in the Layer 2 header traffic. A VLAN is a network topology configured according of packets transmitted on a VLAN. The IEEE802.1Q...
  • Page 75 Enabled: Enables 802.1Q VLANs. This feature is enabled by default. VID: Displays the VLAN ID for which the network policy is defined. The range of the VLAN ID is from 1-494. Name: Enter the VLAN name. You can use up to 32 alphanumeric characters.
  • Page 76 Adding, Editing, and Deleting Items in the List 5. Click the Untagged Ports text box to show the untagged ports dialog box. 6. Click a radio button in the Untagged Ports row to select To add an item to the 802.1Q list, follow these steps: a port. 1. Click the Add button 7.
  • Page 77: Pvid

    PVID When an Untagged packet enters a Switch port, the PVID (Port VLAN ID) will be attached to the untagged packet and forward frames to a VLAN specified VID part of the PVID. A packet received on a given port would be assigned that port’s PVID and then be forwarded to the port that corresponded to the packet’s destination address.
  • Page 78 Port: Displays the VLAN ID to which the PVID tag is assigned. Configure the PVID to assign untagged or tagged frames received on the selected port. PVID: Enter the PVID value. The range is from 1-4094. Accept Type: Select Tagged Only and Untagged Only from the list. •...
  • Page 79: Management Vlan

    Management VLAN Management VLAN ID: Select the VLAN ID for allows user to transfer the authority of the Switch. The Management VLAN allows users to transfer the authority of the Switch from the default VLAN to other VLAN IDs. By default, the active management VLAN ID Apply: Click Apply to update the system settings.
  • Page 80: Voice Vlan

    Voice VLAN Voice VLAN State: Select Enabled or Disabled for Voice VLAN on the Switch. Enhance your Voice over IP (VoIP) service by configuring Voice VLAN ID: Sets the Voice VLAN ID for the network. ports to carry IP voice traffic from IP phones on a specific Only one Voice VLAN is supported on the VLAN. Voice VLAN provides QoS to VoIP, ensuring that the Switch.
  • Page 81: Oui Settings

    OUI Settings Port: Enter the OUI to the Voice VLAN. The following OUI are enabled by default. The Switches determines whether a received packet is The following OUI are enabled by default. a voice packet by checking its source MAC address. VoIP •...
  • Page 82: Port Settings

    Port Settings Port: Displays the port to which the Voice VLAN settings are applied. Enhance VoIP service by configuring ports to carry IP voice State: Select Enabled to enhance VoIP quality on traffic from IP phones on a specific VLAN. Voice VLAN the selected port. The default is Disabled. provides QoS to VoIP, ensuring that the quality of voice CoS Mode: Select Src or All from the list.
  • Page 83: Management

    Management System Name: Enter the name you wish to use to identify the Switch. You can use up to 32 alphanumeric characters. The factory System Information default name is the name of the Swicth. System Location: Enter the location of the Switch. You can The System Information screen contains general device use up to 32 alphanumeric characters.
  • Page 84: User Management

    User Management From here, you can add or edit user accounts for the Switch. Click the Add button to add an account or the Edit button to edit an existing account. Important: Note that Admin users have full access rights to the Switch when determining the authority of the user account.
  • Page 85: File Management

    File Management Configuration Manager Backup Download the configuration file from the Switch to TFTP server on the network. Next, download the configuration file from the Switch to your local drive by using an HTTP session. Upgrade Upgrade/Backup: Select Upgrade or Backup from the list. Method: Two methods can be selected; HTTP or First, upload the configuration file from a TFTP server to TFTP. the Switch. Next, upload the configuration file from your File: Click Browse to select file to Upgrade or local drive to the Switch by using an HTTP session. Backup.
  • Page 86: Dual Image

    Dual Image Active: Selects the partition you wish to be active. Flash Partition: Displays the number of the partition. The Switch maintains two versions of the Switch image Status: Displays the partition which is currently in its permanent storage. One image is the active image, active on the Switch.
  • Page 87: Snmp

    SNMP The manager is the console through which network ad- ministrators perform network management functions. Simple Network Management Protocol (SNMP) is an Application Layer protocol designed specifically for Several versions of SNMP are supported. They are v1, managing and monitoring network devices. Simple v2c, and v3. SNMPv1, which is defined in RFC 1157 “A Network Management Protocol (SNMP) is a popular Simple Network Management Protocol (SNMP)”, is a stan- protocol for network management.
  • Page 88 In SNMPv3, User-based Security Model (USM) authenti- In SNMPv1 and SNMPv2c, user authentication is ac- cation is implemented along with encryption, allowing complished using types of passwords called Communi- you to configure a secure SNMP environment. The SN- ty Strings, which are transmitted in clear text and not MPv3 protocol uses different terminology than SNMPv1 supported by authentication.
  • Page 89: Global Settings

    Global Settings Simple Network Management Protocol (SNMP) is an OSI Layer 7 (Application Layer) protocol designed specifically for managing and monitoring network devices. The SNMP agents maintain a list of variables that are used to manage the device. The variables are defined in the Management Information Base (MIB), which provides a standard presentation of the information controlled by the on-board SNMP agent.
  • Page 90: View List

    View List View Name: Enter the view name. The view name can con- tain up to 30 alphanumeric characters. The Switch supports SNMP notification filters based Subtree OID: Enter the Object Identifier (OID) Subtree for on Object IDs (OIDs). OIDs are used by the system to the view. The OID identifies an object tree (MIB tree) that will be included or excluded from manage device features. This feature’s access is granted access by an SNMP manager.
  • Page 91: Group List

    Group List Group Name: Enter the group name that access control rules are applied to. The group name can con- Groups allow IT managers to assign access rights to tain up to 30 alphanumeric characters. specific device features. Security Mode: Selects the SNMP version (v1, v2c, v3) asso- ciated with the group.
  • Page 92: Community List

    Community List Community Name: Enter the name of SNMP community string. Access rights are managed by defining communities. Community Mode: Selected Basic or Advance from the list. Select the Advance attached to the SNMP Click Add to add a community list to the Switch. Next, group. name the community and choose the level of access that Group Name: Select the SNMP group from a list.
  • Page 93: User List

    User List Privilege Mode: Select No Auth, Auth, or Priv se- curity level from the list. • No auth – No authentica- From here, you can configure the details pertaining to tion are assigned to the group. specific user accounts. Click Add to add a new user. • Auth – Authenticates SNMP messages. •...
  • Page 94: Trap Settings/Snmp Traps

    Trap Settings Server IP/Hostname: Enter the Server IP or Hostname. The Hostname can contain up to 128 alpha- numeric characters. SNMP Traps SNMP Version: Select the SNMP version from the list. Notify Type: Select the type of notification to be sent. A trap is a type of SNMP message. The Switch can send traps to an SNMP manager when an event occurs.
  • Page 95: Acl

    Access Control List (ACL) allows you to define classi- fi¬cation rules or establish criteria to provide security to your network by blocking unauthorized users and allowing authorized us¬ers to access specific areas or resources. ACLs can provide basic security for access to the network by controling whether packets are forward- ed or blocked at the Switch ports. Access Control Lists (ACLs) are filters that allow you to classify data packets according to a particular content in the packet header, such as the source address, destination address, source port number, destination port number, and more.
  • Page 96: Mac Acl

    MAC ACL Allows an MAC Based Access Control Lists (ACLs) to be defined. Enter the name of the MAC based ACL name in the index box. You can type up to 32 alphanumeric char- acters. Index: Displays the current number of ACLs. Name: Enter the MAC based ACL name. You can use up to 32 alphanumeric characters.
  • Page 97: Mac Ace

    Mac-Based ACE ACL Name: Select the ACL from the list. Sequence: Enter the sequence number which signifies the order of the specified ACL Allows Mac-Based Access Control Entry (ACE) to be de- relative to other ACLs assigned to the fined within a configured ACL. selected interface. The valid range is from 1-2147483646, 1 being pro- cessed first.
  • Page 98: Ipv4 Acl

    IPv4 ACL Index: Displays the current number of ACLs. Name: Enter the IP based ACL name. You can use up to 32 alphanumeric characters. Allows the IP Based ACL to be defined. Click the Apply button to accept the changes or the Cancel button to discard them.
  • Page 99: Ipv4 Ace

    IPv4-Based ACE ACL Name: Select the ACL from the list. Sequence: Enter the sequence number which signifies Allows IP Based Access Control Entry (ACE) to be defined the order of the specified ACL relative to other ACLs assigned to the selected inter- within a configured ACL. face. The valid range is from 1-2147483646, 1 being processed first. Action: Select what action to take if a packet matches the criteria. • Permit – Forwards packets that meet the ACL criteria.
  • Page 100 Click Apply to save the changes to the system. Source IP Wildcard Enter the mask of the new source IP Mask: address. VLAN ID: Enter the VLAN ID to which the IP ad- dress is attached in IPv4-Based ACE. The range is from 1-4094.
  • Page 101: Ipv6 Acl

    IPv6 ACL Index: Displays the current number of ACLs. Name: Enter the IPv6 based ACL name. You can use up to 32 Allows an IPv6 Based ACL to be defined. alphanumeric characters. Click the Apply button to accept the changes or the Cancel button to discard them.
  • Page 102: Ipv6 Ace

    IPv6 Based ACE ACL Name: Select the ACL from the list. Sequence: Enter the sequence number which signifies the order of the specified Allows IPv6 Based Access Control Entry (ACE) to be de- ACL relative to other ACLs assigned fined within a configured ACL. to the selected interface. The valid range is from 1-2147483646, 1 being processed first.
  • Page 103 Click Apply to save the changes to the system. VLAN ID: Enter the VLAN ID to which the IP address is attached in IPv4-Based ACE. The range is from 1-4094. 802.1p Value: Enter the 802.1p value. The range is from from 0-7. Ethertype Value: Enter the Ethertype value. The range is from 05DD-FFFF.
  • Page 104: Acl Binding

    ACL Binding Port: Select the port for which the ACLs are bound to. MAC ACL: The ACL is MAC address based. ACL Binding is a configuration setting that allows a user IPv4 ACL: The ACL is IP address based. to choose a particular ACL for an ACL check. An ACL IPv6 ACL: The ACL is IP address based.
  • Page 105: Qos

    State: Select whether QoS is enabled or disabled on the switch. Scheduling Method: Quality of Service (QoS) provides the ability to implement Selects the Strict Priority or WRR to specify priority queuing within a network. QoS enables traffic to be the traffic scheduling method. prioritized, while excessive broadcast and multicast traffic • Strict Priority – Specifies traffic to be avoided. Traffics such as Voice and Video streaming scheduling based strictly on the queue which requires a minimal delay can be assigned to a high priority.
  • Page 106: Cos Mapping

    CoS Mapping CoS (Class of Service): Displays the CoS priority tag values, where 0 is the lowest and 7 is the highest. Queue: Check the CoS priority tag box and select Use the Class of Service (CoS) Mapping feature to specify the Queue values for each CoS value in which internal traffic class to map to the corresponding the provided fields. Eight traffic priority...
  • Page 107: Dscp Mapping

    DSCP Mapping DSCP (Differentiated Displays the packet’s DSCPvalues, Services Code Point): where 0 is the lowest and 10 is the Use Differentiated Services Code Point (DSCP) Mapping highest. Queue: Check the CoS priority tag box and feature to specify which internal traffic class to map to select the Queue values for each DSCP the corresponding DSCP values.
  • Page 108: Port Settings

    Port Settings Port: Displays the ports for which the CoS parameters are defined. From here, you can configure the QoS port settings for CoS (Class of Service) Select the CoS priority tag values, Value: where 0 is the lowest and 7 is the high- the Switch. Select a port you wish to set and choose est.
  • Page 109: Bandwidth Control

    Bandwidth Control Port: Displays the ports for which the bandwidth settings are displayed. Ingress: Select to Enable or Disable ingress on the The Bandwidth Control feature allows users to define interface. the bandwidth settings for a specified port’s Ingress Ingress Rate: Enter the ingress rate in kilobits per second. The Gigabit Ethernet ports have a maximum Rate Limit and Egress Rate.
  • Page 110: Storm Control

    Storm Control Port: Displays the ports for which the Storm Control information is displayed. Status: Select whether Storm Control is Enabled or Disabled ingress on the interface. Storm Control limits the amount of Broadcast, Unknown Broadcast: Enter the broadcast rate in kilobits per Multicast, and Unknown Unicast frames accepted and second.
  • Page 111: Security

    Security Authenticators: Specifies the port that is authenticated. Supplicants: Specifies the host (Client Device) connected to the authenticated port. 802.1X performs the authentication on behalf of the authenticator and indicates whether the user is authorized to access system services. The IEEE-802.1X port-based authentication provides a security standard for network access control with RADIUS servers and holds a network port disconnected until authentication is completed. With 802.1X port- based authentication, the supplicant provides credentials,...
  • Page 112: Global Settings

    Global Settings State: Select whether authentication is Enabled or Disabled on the Switch. From here, you can select whether to Enable or Disable Guest VLAN: Select whether Guest VLAN is Enabled or Disabled on the Switch. The default is 802.1X for the Switch. If enabled, next choose whether Disabled.
  • Page 113: Port Settings

    Port Settings Port: Displays the ports for which the 802.1X information is displayed. From here, you can configure the port settings as they Mode: Select the Auto or Force_UnAuthorized or Force_Authorized mode from the list. relate to 802.1X. First, select the mode from the drop- Re-authentication: Select whether port reauthenticati-on is down box. Next, choose whether to Enable or Disable Enabled or Disabled. reauthentification for the port. Enter the amount of time Re-authentication Enter the time span in which the selected span that you wish to elapse for the Re-authentification...
  • Page 114: Authenticated Host

    Authenticated Host The Authenticated Host section displays the authenticated User Name, Port, Session Time, Authenticated Method, and Mac Address.
  • Page 115: Radius Server

    Radius Server Index: Displays the index for which RADIUS Server is displayed. RADIUS (Remote Authorization Dial-In User Service) Server IP: Enter the Radius Server IP address. servers provide security for networks. Radius servers Authorized Port: Enter the authorized port number. The default port is 1812.
  • Page 116: Access

    Access Http(s) Settings The EnGenius Layer 2 PoE+ Switch provides a built-in browser interface that enables you to configure and manage the Switch via Hypertext Transfer Protocol (Http) and Hypertext Transfer Protocol Secure (Https) requests selectivly to help prevent security breaches on the network. You can manage your HTTP and HHTPs settings for the Switch further by choosing the length of session timeouts for HTTP and HTTPs requests.
  • Page 117: Telnet Settings

    Telnet Settings Telnet Service: Select whether the Telnet Service is Enabled or Disabled. It is enabled by default. From here, you can configure and manage the Switch’s Session Timeout: Enter the amount of time that elapses Telnet protocol settings. The Telnet protocol is a before the Telnet Service is timed out. The default is 5 minutes.
  • Page 118: Ssh Settings

    SSH Settings SSH Service: Select whether SSH is Enabled or Disabled. This is disabled by default. Session Timeout: Enter the amount of time that elapses Secure Shell (SSH) is a cryptographic network protocol before the SSH Service is timed out. The for secure data communication network services.
  • Page 119: Console Settings

    Console Settings Session Timeout: Enter the amount of time that elapses before Console Service is timed out. The default is 5 minutes. The range is from From here, you can configure the Console Service 0-65535 minutes. settings for the Switch. History Count: Enter the entry number for History of Console Service. The default is 128. The range is from 0-256.
  • Page 120: Port Security

    Port Security Max MAC Address: Enter the maximum number of MAC Addresses that can be learned on the port. The range is from 1-256. Port: Displays the port for which the port Network security can be increased by limiting access on security is defined.
  • Page 121: Dos

    DMAC = SMAC: Select Enabled or Disabled from the list. Land: Select Enabled or Disabled from the list. DoS (Denial of Service) is used for classifying and UDP Blat: Select Enabled or Disabled from the list. blocking specific types of DoS attacks. From here, you TCP Blat: Select the Enabled or Disabled from the list.
  • Page 122 DMAC = SMAC: Select Enabled or Disabled from the list. Land: Select Enabled or Disabled from the list. UDP Blat: Select Enabled or Disabled from the list. TCP Blat: Select the Enabled or Disabled from the list. POD: Select the Enabled or Disable from the list.
  • Page 123: Port Settings

    Port Settings Port: Displays the port for which the DoS protection is defined. From here you can configure the Port Settings for DoS DoS Protection: Select Enabled or Disabled for the DoS Protection feature for the selected port. for the Switch. Select from the drop down list whether you wish to Enable or Disable DoS Protection for the SWitch.
  • Page 124: Monitoring

    Monitoring Port: Displays the port for which statistics are dis- played. RXByte: Displays the number of all packets received on the Port Statistics port. RXUcast: Displays the number of Unicast packets received on the port. The Port Statistics section displays a summary of all port RXNUcast: Displays the number of Unicast packets received traffic statistics regarding the monitoring features on...
  • Page 125: Rmon

    RMON Index: Enter the entry number for Event. Event Type: Select the event type. • Log – The event is a log entry. Remote Network Monitoring, or RMON is used for sup- • SNMP Trap – The event is a trap. port monitoring and protocol analysis of LANS by en- •...
  • Page 126: Event Log Table

    Event Log Table: Select the index of the Event Log from the Event Log Table list. From here, you can view specific Event logs for the Click the Apply button to accept the changes or the Switch. Choose an Event log you wish to view fromt he Cancel button to discard them.
  • Page 127: Alarm List

    Alarm List Index: Enter the entry number for the History Log Table. Sample Port: Select the port from which the You can configure Network alarms to occur when a net- alarm samples were taken. work problem is detected. Choose your preferences for Sample Variable: Select the variable of samples for the speci- the alarm from the drop-down boxes.
  • Page 128: History List

    History List Index: Enter the entry number for the History Log Table. The RMON History List screen contains information Sample Port: Select the port from which the history sam- ples were taken. about samples of data taken from the ports. Bucket Requested: Enter the number of samples to be saved.
  • Page 129: History Log Table

    History Log Table History Log Table: Select the index for the History Log from the list. From here, you can view the History Index for History Logs on the Switch. Select a History Index to view from the drop-down box.
  • Page 130: Statistics

    Statistics Broadcast Pkts: Displays the number of good broadcast packets received on the port. This number does not include Multicast packets. The Statistics page displays general information about Multicast Pkts: Displays the number of good Multicast the Switch in terms of its ports and packet transmis- packets received on the port.
  • Page 131: Log

    Code Severity Description General Description The Syslog Protocol allows devices to send event Emergency System is unusable A emergency condition usu- notification messages in response to events, faults, or ally affecting multiple apps/ errors occurring on the platform as well as changes in servers/sites. Direct Attention is required. configuration or other occurrences across an IP network Alert Actions must be...
  • Page 132: Global Settings

    Global Settings From here, you can Enable or Disable the Log settings for the Switch. Logging Use the radio buttons to enable or disable the Service: system log. Global Logs: Select whether to Enable or Disable the Switch’s global logs for Cache, File, and Server Log.
  • Page 133: Local Logging

    Local Logging: Target: Select Yes or No from the list. If the device is not functioning properly, an emergency log mes- From here, you can discover the paths that a packet sage is saved to the specified logging location. takes to a destination. EMERG: Select Yes or No from the list. If the Switch is not functioning properly, an emergency log mes- The Switch supports log output to two directions: Flash sage is saved to the specified logging location.
  • Page 134 Click the Apply button to accept the changes or the Cancel button to discard them.
  • Page 135: Remote Logging

    Remote Logging: IP/Hostname: Specify the IP address or host name of the host configured for the Syslog. From here, you can discover the paths that a packet Server Port: Specify the port on the host to which Syslog takes to a destination. Remote logging enables the messages are sent.
  • Page 136: Log Table

    Log Table: No.: A counter incremented whenever an entry to the Switch’s history log is From here, users can view and delete the history log. made. It displays the last entry (highest sequence number) first. Select the Log Target you wish to view from the drop- Timestamp: Displays the time of the log entry.
  • Page 137: Diagnostics

    Diagnostics Port: Select the port to which the cable is connected. Pair (A, B, C, and D): Displays the cable test results. Cable Diagnostics • Open – A cable is not connected to the port. • OK – A cable is connected to the port. Cable Diagnostics helps you to detect whether your cable Cable Length (A, B, Displays the approximate cable length.
  • Page 138: Ping Test

    Ping Test Ping Test Settings The Packet INternet Groper (Ping)Test allows you to You can vary the test parameters by entering the data in verify connectivity to remote hosts. The Ping test the appropraite boxes. To verify accuracy of the test, it operates by sending Internet Control Message Protocol is reccomended that you run multiple tests in case of a (ICMP) request packets to the tested host and waits...
  • Page 139: Ipv6 Ping Test

    IPv6 Ping Test You can vary the test parameters by entering the data in the appropraite boxes. To verify accuracy of the test, it is reccomended that you run multiple tests in case of a Send a ping request to a specified IPv6 address. Check test fault or user error.
  • Page 140: Trace Route

    Trace Route IP address: Enter the IP address or the host name of the sta- tion you wish the Switch to ping to. The traceroute feature is used to discover the routes that Max Hop: Enter the maximum number of hops. The range is from 2–255 and the default is 30.
  • Page 141: Chapter 3 Maintenance

    Chapter 3 Maintenance...
  • Page 142: Maintenance

    Maintenance Maintenance functions are available from the maintenance Saving Configurations bar. Maintenance functions include: saving configuration settings, upgrading firmware, resetting the configuration to factory default standards, rebooting the device, and Important: You must save any setting changes logging out of the interface. before rebooting.
  • Page 143: Upgrading/Resetting

    Upgrading Resetting WARNING! Backup your configuration information WARNING! The Reset function will delete all before upgrading to prevent loss of settings information. configuration information from the current device. Backup your information before starting this procedure. Follow this procedure to upgrade the Firmware. Follow this procedure to reset the Switch back to factory 1.
  • Page 144: Rebooting/Logging Out

    Rebooting Logging Out Follow this procedure to reboot the Switch. Follow this procedure to log out the current profile from the user interface. 1. Click to start the reboot process. 1. Click to log out of the menu. 2. When a prompt displays, click OK to confirm the reboot process or Cancel to quit the procedure.
  • Page 145: Appendix

    Appendix...
  • Page 146: Quick Reference Guide

    Quick Reference Guide Hardware Specifications Model EGS5212FP EGS7228P EGS7228FP EGS7252FP Connectors Gigabit RJ45 Ports Gigabit SFP Ports Console Port PoE Features Standard IEEE802.3af/at (max 30w per port) PoE Ports Total PoE Budget 130 W 185 W 370 W 740 W Power Supply 100-240 VAC, 50/60 Hz Environent Operating Temperature: 32°...
  • Page 147: Fcc Interference Statement

    Appendix A Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 148: Ic Interference Statement

    Appendix B - IC Interference Statement Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 149: Ce Interference Statement

    Appendix C - CE Interference Statement Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: •...
  • Page 150 This device is a 5GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries, except in France and Italy where restrictive use applies. In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services.
  • Page 151 Français [French] Par la présente [nom du fabricant] déclare que l’appareil [type d’appareil] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Italiano [Italian] Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio] è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.

This manual is also suitable for:

Egs7228pEgs7228fpEgs7252fp

Table of Contents