Page 3
OMPLIANCES FCC - Class A This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
Page 4
OMPLIANCES CE Mark Declaration of Conformance for EMI and Safety (EEC) This information technology equipment complies with the requirements of the Council Directive 89/336/EEC on the Approximation of the laws of the Member States relating to Electromagnetic Compatibility and 73/23/EEC for electrical equipment used within certain voltage limits and the Amendment Directive 93/68/EEC.
OMPLIANCES Safety Compliance Warning: Fiber Optic Port Safety When using a fiber optic port, never look at the transmit laser while CLASS I it is powered on. Also, never look directly at the fiber TX port and LASER DEVICE fiber cable ends when they are powered on. Avertissment: Ports pour fibres optiques - sécurité...
Page 6
OMPLIANCES Important! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the following: Power Cord Set U.S.A. and Canada The cord set must be UL-approved and CSA certified. The minimum specifications for the flexible cord are: - No.
OMPLIANCES Warnings and Cautionary Messages Warning: This product does not contain any serviceable user parts. Warning: Installation and removal of the unit must be carried out by qualified personnel only. Warning: When connecting this device to a power outlet, connect the field ground lead on the tri-pole power plug to a valid earth ground line to prevent electrical hazards.
OMPLIANCES Purpose This guide details the hardware features of this switch, including Its physical and performance-related characteristics, and how to install the switch. Audience This guide is for system administrators with a working knowledge of network management. You should be familiar with switching and networking concepts. Related Publications As part of the switch firmware, there is an online web-based help that describes all management related features.
13 14 15 16 17 18 19 20 21 22 23 24 1000BASE-T/SFP Ports 10/100/1000 Mbps RJ-45 Ports Port Status Indicators GSW-1676 level GSW-1676 16 Port Gigabit w 4 Port SFP Web Smart Switch 1000 M Shared SFP Port Link/Act o n e 1000 M...
BOUT THE WITCH Switch Architecture The switches employ a wire-speed, non-blocking switching fabric. This permits simultaneous wire-speed transport of multiple packets at low latency on all ports. The switches also feature full-duplex capability on all ports, which effectively doubles the bandwidth of each connection. The switches use store-and-forward switching to ensure maximum data integrity.
The Small Form Factor Pluggable (SFP) transceiver slots are shared with four of the RJ-45 ports (ports 21-24 on the GSW-2476, and ports 13-16 on the GSW-1676). In its default configuration, if an SFP transceiver (purchased separately) is installed in a slot and has a valid link on its port, the associated RJ-45 port is disabled and cannot be used.
BOUT THE WITCH 4 Port SFP Web Smart Switch 10 11 1000 Link/Act 1000 Link/Act 13 14 15 16 17 18 19 20 21 22 23 24 Power Power Status LED Port Status LEDs Figure 1-3 Port LEDs and Power LED Table 1-1 Port Status LEDs Condition Status...
EATURES AND ENEFITS Power Supply Socket The power socket is located on the rear panel of the switch. The standard power socket is for the AC power cord. 100-240V 50-60Hz 0.8A Figure 1-4 Power Supply Socket Features and Benefits Connectivity •...
HAPTER ETWORK LANNING Introduction to Switching A network switch allows simultaneous transmission of multiple packets via non-crossbar switching. This means that it can partition a network more efficiently than bridges or routers. Switches have, therefore, been recognized as one of the most important building blocks for today’s networking technology.
ETWORK LANNING Application Examples The GSW-1676 and GSW-2476 are not only designed to segment your network, but also to provide a wide range of options in setting up network connections. Some typical applications are described below. Collapsed Backbone The GSW-1676 and GSW-2476 are an excellent choice for mixed Ethernet, Fast Ethernet, and Gigabit Ethernet installations where significant growth is expected in the near future.
PPLICATION XAMPLES Central Wiring Closet With 16 or 24 parallel bridging ports (i.e., 16 or 24 distinct collision domains), the switch can collapse a complex network down into a single efficient bridged node, increasing overall bandwidth and throughput. In the figure below, the 1000BASE-T RJ-45 ports on the GSW-2476 are providing 1 Gbps full-duplex connections for up to 24 local segments.
ETWORK LANNING Remote Connections with Fiber Cable Fiber optic technology allows for longer cabling than any other media type. A 1000BASE-SX (MMF) link can connect to a site up to 550 meters away, a 1000BASE-LX (SMF) link up to 10 km, and a 1000BASE-ZX link up to 70 km.
PPLICATION XAMPLES Making VLAN Connections The switch supports VLANs that can be used to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks. This provides a more secure and cleaner network environment.
ETWORK LANNING Application Notes 1. Full-duplex operation only applies to point-to-point access (such as when a switch is attached to a workstation, server or another switch). When the switch is connected to a hub, both devices must operate in half-duplex mode. 2.
HAPTER NSTALLING THE WITCH Selecting a Site The GSW-1676 and GSW-2476 can be mounted in a standard 19-inch equipment rack or on a flat surface. Be sure to follow the guidelines below when choosing a location. • The site should: - be at the center of all the devices you want to link and near a power outlet.
NSTALLING THE WITCH Ethernet Cabling To ensure proper operation when installing the switches into a network, make sure that the current cables are suitable for 10BASE-T, 100BASE-TX or 1000BASE-T operation. Check the following criteria against the current installation of your network: •...
Then, before beginning the installation, be sure you have all other necessary installation equipment. Package Contents • GSW-1676 or GSW-2476 • Four adhesive foot pads • Bracket Mounting Kit containing two brackets and eight screws for attaching the brackets to the switch •...
NSTALLING THE WITCH Mounting The GSW-1676 and GSW-2476 can be mounted in a standard 19-inch equipment rack or on a desktop or shelf. Mounting instructions for each type of site follow. Rack Mounting Before rack mounting the switch, pay particular attention to the following factors: •...
OUNTING To rack-mount devices: 1. Attach the brackets to the device using the screws provided in the Bracket Mounting Kit. S h a r e d S F P P o r t Figure 3-2 Attaching the Brackets 2. Mount the device in the rack, using four rack-mounting screws (not provided).
NSTALLING THE WITCH 3. If installing a single switch only, turn to “Connecting to a Power Source” at the end of this chapter. 4. If installing multiple switches, mount them in the rack, one below the other, in any order. Desktop or Shelf Mounting 1.
SFP T NSTALLING AN RANSCEIVER Installing an SFP Transceiver S h a r e d S F P P o r t Figure 3-5 Inserting an SFP Transceiver into a Slot The switch supports the following optional transceivers: • 1000BASE-SX (SGVT-0300) •...
NSTALLING THE WITCH Connecting to a Power Source To connect a device to a power source: 1. Insert the power cable plug directly into the socket located at the back of the device. 100-240V 50-60Hz 0.8A Figure 3-6 Power Socket 2.
ETWORK ONNECTIONS Connecting Network Devices The GSW-1676 and GSW-2476 are designed to interconnect multiple segments (or collision domains). They can be connected to network cards in PCs and servers, as well as to hubs, switches or routers. They may also be connected to devices using optional SFP transceivers.
AKING ETWORK ONNECTIONS Connecting to PCs, Servers, Hubs and Switches 1. Attach one end of a twisted-pair cable segment to the device’s RJ-45 connector. Figure 4-1 Making Twisted-Pair Connections 2. If the device is a PC card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall outlet that is connected to the wiring closet.
WISTED EVICES Network Wiring Connections Today, the punch-down block is an integral part of many of the newer equipment racks. It is actually part of the patch panel. Instructions for making connections in the wiring closet with this type of equipment follows.
AKING ETWORK ONNECTIONS Fiber Optic SFP Devices An optional Gigabit SFP transceiver (1000BASE-SX, 1000BASE-LX or 1000BASE-ZX) can be used for a backbone connection between switches, or for connecting to a high-speed server. Each single-mode fiber port requires 9/125 micron single-mode fiber optic cable with an LC connector at both ends.
SFP D IBER PTIC EVICES 3. Connect one end of the cable to the LC port on the switch and the other end to the LC port on the other device. Since LC connectors are keyed, the cable can be attached in only one orientation. S h a r e d S F P P...
AKING ETWORK ONNECTIONS Connectivity Rules When adding hubs (repeaters) to your network, please follow the connectivity rules listed in the manuals for these products. However, note that because switches break up the path for connected devices into separate collision domains, you should not include the switch or connected cabling in your calculations for cascade length involving other devices.
AKING ETWORK ONNECTIONS Cable Labeling and Connection Records When planning a network installation, it is essential to label the opposing ends of cables and to record where each cable is connected. Doing so will enable you to easily locate inter-connected devices, isolate faults and change your topology without need for unnecessary time consumption.
HAPTER NITIAL ONFIGURATION To make use of the management features of your switch, you must first configure it with an IP address that is compatible with the network it is being installed in. This should be done before you permanently install the switch in the network.
Note: The web interface examples in this guide are based on the GSW-2476. Other than the number of ports, there are no other differences between the GSW-2476 and GSW-1676. 5. Enter the default password “admin” and click on the Login button.
PC’ IP A HANGING A DDRESS Figure 5-2 LAN Settings Page No other configuration changes are required at this stage, but it is recommended that you change the administrator’s password before logging out. To change the password, click SYSTEM, Password, and then fill in all the fields on the Password Settings page before clicking on the APPLY button.
Page 48
NITIAL ONFIGURATION 4. In the Internet Protocol (TCP/IP) Properties dialog box, click to select Use the following IP address. Then type your intended IP address, Subnet mask, and Default gateway in the provided text boxes. 5. Click OK to save the changes. To change the IP address of a Windows XP PC: 1.
HAPTER ONFIGURING THE WITCH Using the Web Interface This switch provides an embedded HTTP Web agent. Using a Web browser you can configure the switch and view statistics to monitor network activity. The Web agent can be accessed by any computer on the network using a standard Web browser (Internet Explorer 5.0 or above, or Firefox v1.5 or above).
ONFIGURING THE WITCH Navigating the Web Browser Interface To access the web-browser interface you must first enter a password. The administrator has read/write access to all configuration parameters and statistics. The default password for the administrator is “admin.” Note:If user input is not detected within five minutes, the current session is terminated.
AVIGATING THE ROWSER NTERFACE Figure 6-1 Home Page Note: The web interface examples in this guide are based on the GSW-2476. Other than the number of ports, there are no other differences between the GSW-2476 and GSW-1676.
ONFIGURING THE WITCH Configuration Options Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the Apply button to confirm the new setting. The following table summarizes the web page configuration buttons.
Forces the switch to perform a power reset and 6-18 Defaults restores the original factory settings. Upgrade Firmware Upgrades the switch system firmware using a file 6-19 provided by LevelOne. Upload/Download Uploads or downloads the configuration file. 6-19 Configuration Restart Restarts the switch.
Page 54
ONFIGURING THE WITCH Main Menu (Continued) Menu Description Page Rate Limiting Sets the rate limiting parameters for ports. 6-25 Storm Control Sets the broadcast storm control parameters. 6-27 Port Mirroring Sets up the port mirroring features of the switch to 6-28 enable traffic monitoring.
Page 55
Main Menu (Continued) Menu Description Page Management Access Sets up management access filter. 6-69 Filter IGMP Snooping 6-71 Settings Sets up IGMP Snooping configuration. 6-73 Status Shows IGMP Snooping status. 6-73 SNMP 6-75 Settings Configures community strings and related trap 6-75 functions.
ONFIGURING THE WITCH Basic Information Displaying System Information You can easily identify the system by displaying the device name, location and contact information. Field Attributes System Information • System Name – Name assigned to the switch system. • Number of Ports – Number of built-in ports. •...
Page 57
ASIC NFORMATION 10hdx: 10 Mbps half duplex. 10fdx: 10 Mbps full duplex. 100hdx: 100 Mbps half duplex. 100fdx: 100 Mbps full duplex. 1000fdx: 1000 Mbps full duplex. • Flow Control Status – Indicates whether flow control is enabled or disabled. (IEEE 802.3x, or Back-Pressure) •...
ASIC NFORMATION Showing Port Statistics You can display statistics on network traffic from the ports. These statistics can be used to identify potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed have been accumulated since the last system reboot, but can be reset to zero by clicking the CLEAR button.
Page 60
ONFIGURING THE WITCH Port Statistics (Continued) Parameter Description Received Multicast Packets The number of packets, delivered by this sub-layer to a higher (sub-)layer, which were addressed to a multicast address at this sub-layer. Received Broadcast Packets The number of packets, delivered by this sub-layer to a higher (sub-)layer, which were addressed to a broadcast address at this sub-layer.
Page 61
ASIC NFORMATION Port Statistics (Continued) Parameter Description Collisions The best estimate of the total number of collisions on this Ethernet segment. Received Bytes Total number of bytes of data received on the network. This statistic can be used as a reasonable indication of Ethernet utilization.
’ IP A ETTING THE WITCH DDRESS Displaying the System Name You can identify the system by displaying the device name. Field Attributes • Switch Name – A name assigned to the switch system. Web – Click System, Name. Figure 6-5 System Name Setting the Switch’s IP Address This section describes how to configure an IP interface for management access over the network.
ONFIGURING THE WITCH • Gateway IP Address – IP address of the gateway router between this device and management stations that exist on other network segments. (Default: 0.0.0.0) • Management VLAN – ID of the configured VLAN (1-4093, no leading zeroes). By default, all ports on the switch are members of VLAN 1.
ONFIGURING THE OGON ASSWORD Configuring the Logon Password The administrator has write access for all parameters governing the onboard agent. You should therefore assign a new administrator password as soon as possible, and store it in a safe place. Field Attributes •...
ONFIGURING THE WITCH Tools On the Tools page, you can restore the switch to its default settings, upgrade the firmware of the switch, or restart the switch. Restore to Factory Defaults Forces the switch to restore the original factory settings. To reset the switch, select “Reset to Factory Defaults”...
“Browse” button to select the firmware file. Click the APPLY button to upgrade the selected switch firmware file. You can download firmware files for your switch from the Support section of the LevelOne web site at www.level1.com. Web – Click System, Tools, Reset to Factory Defaults.
ONFIGURING THE WITCH Browse button to choose a file location on the web management station, or to find a saved configuration file. Figure 6-10 Upload/Download Configuration Restart Switch Web – Click SYSTEM, Tools, Restart Switch. To restart the switch, click APPLY.
TATIC Static MAC Switches store the MAC addresses for all known devices in the attached network. This information is used to forward traffic directly between the inbound and outbound ports. All the MAC addresses learned by monitoring traffic are stored in a dynamic address table, which removes (ages out) any addresses that are not “seen”...
ONFIGURING THE WITCH Web – Click System, Static MAC. Enter the MAC address, VLAN ID, and click ADD to add a new static MAC address. Then mark the port to which this MAC address is bound, and click Apply. Figure 6-12 Static MAC Address Configuration Counter Configuration This page allows specific statistics to be selected for monitoring.
ONFIGURING THE WITCH Port Configuration Ports Settings You can use the Port Configuration page to manually set the speed, duplex mode, and flow control. Field Attributes • Enable Jumbo Frames – This switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames on Gigabit Ethernet ports up to 9216 bytes.
ONFIGURATION Figure 6-14 Port Configuration Configuring Rate Limits This function allows the network manager to control the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the switch.
ONFIGURING THE WITCH option from this list, click APPLY, and then view the options in the Input/Output Bandwidth Limit drop-down box for any of the ports. (Options: 128 kbps, 1 Mbps, 10 Mbps, 30 Mbps, 100 Mbps) • Enable Rate Limiting – Enables input or output rate limiting for the selected interface.
ONFIGURATION Storm Control Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to complete halt.
ONFIGURING THE WITCH Figure 6-16 Port Broadcast Control Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
ONFIGURATION Note: If the total ingress bandwidth exceeds the mirror port’s egress bandwidth, packets will eventually be dropped on ingress to the switch, which means they will not reach the mirror port or their intended destination port. Input rate-limiting in conjunction with port flow-control should be used to ensure that the total ingress bandwidth never exceeds the egress bandwidth.
ONFIGURING THE WITCH Cable Diagnostics You can perform cable diagnostics for all ports or selected ports to diagnose any cable faults (short, open, etc.) and feedback a distance to the fault. Field Attributes • Cable Diagnostics – Cable diagnostics is performed on a per-port basis.
ONFIGURATION Trunk Membership You can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist, as well as providing a fault-tolerant link between two devices. This page allows you to create a maximum of eight trunks of up to eight ports each.
ONFIGURING THE WITCH Web – Click TRUNKS, Membership. To assign a port to a trunk, click the required trunk number, then click APPLY. Figure 6-19 Trunk Membership 6-32...
ONFIGURATION Trunk Configuration This page allows you to configure the speed, duplex mode, and flow control for a trunk. Field Attributes • Trunk – Indicates trunk identifier. • Speed/Duplex – Allows you to manually set the port speed and duplex mode for all ports in the trunk.
ONFIGURING THE WITCH • Trunk – Indicates trunk identifier. • Trunk Speed – Indicates the trunk speed. • Enable Input/Output Rate Limiting - Mark the box to enable Input/ Output Rate Limiting. • Input/Output Limit – Sets the threshold for trunk bandwidth measured in number of frames per second.
ONFIGURATION LACP Setup This page allows you to enable 802.3ad Link Aggregation Control Protocol (LACP) for the selected port. You can configure any number of ports on the switch to use LACP. If ports on another device are also configured for LACP, the switch and the other device will negotiate a trunk link between them.
ONFIGURING THE WITCH Web – Click TRUNKS, LACP Setup. Enable LACP on each port to be configured as a member of an LAG. Leave the administrative key set to a null value to allow the switch to automatically configure this attribute, or set it a specific value to maintain more precise control over the ports which will be connected to another device.
ONFIGURATION Aggregation Information • Aggregation Group – Identifier for a local link aggregation group. • Partner MAC Address – Physical address of device at other end of link. • Local Ports Aggregated – Local ports participating in this LAG. • Seconds Since Last Change – Time since the last LACP packet was received.
ONFIGURING THE WITCH Configuring VLAN Groups The 802.1Q VLAN Configuration page allows you to create and delete VLANs (Virtual LANs), and set up or modify VLAN group members. Introduction to VLANs VLANs are logical partitions of the physical LAN. You can use VLANs to increase network performance or improve internal network security.
Page 87
VLAN G ONFIGURING ROUPS different customers use the same internal VLAN IDs. This is accomplished by inserting Service Provider VLAN (SPVLAN) tags into the customer’s frames when they enter the service provider’s network, and then stripping the tags when the frames leave the network. QinQ tunneling expands VLAN space by using this VLAN-in-VLAN hierarchy, preserving the customer’s original tagged packets, and adding SPVLAN tags to each frame (also called double tagging).
VLAN G ONFIGURING ROUPS Web – After creating a new VLAN, the following screen displays. Assign the ports and trunks associated with the VLAN, and click Apply. Figure 6-25 VLAN Group Settings 6-41...
ONFIGURING THE WITCH Configuring VLAN Interfaces You can configure VLAN behavior for specific interfaces, including the default VLAN identifier (PVID) and accepted frame types. The 802.1Q Per Port Configuration page allows you to change the VLAN parameters for individual ports. Each row of the table corresponds to one port or static trunk;...
Page 91
VLAN G ONFIGURING ROUPS and untagged packets. Any received packets that are untagged are assigned to the default VLAN. Any tagged packets will be dropped unless the port is a member of the VLAN identified by the VLAN tag in the packet.
ONFIGURING THE WITCH Web – Click VLANS, VLAN Port Configuration. Fill in the required settings for each interface, and click Apply. Figure 6-26 VLAN Settings 6-44...
ETTINGS QoS Settings QoS (Quality of Service) is a mechanism which is used to prioritize certain traffic as it is forwarded through the switch. Both the queue service mode (strict or weighted round robin), and the method of classifying the priority of ingress traffic can be configured on this page.
Page 94
ONFIGURING THE WITCH to a Class of Service value by the switch, and the traffic then sent to the corresponding output queue. If the QoS mode is set to 802.1p, and the ingress packet type is IPv4, then priority processing will be based on the 802.1p value in the ingress packet. For an untagged packet, the default port priority is used for priority processing (i.e., CoS value 0, which maps to the Normal Queue).
Page 95
ETTINGS Custom if you want to set each value individually. Note that end-stations, like PCs, are not usually VLAN aware, so they do not create VLAN-tagged frames. As a result, 802.1p is not an ideal method to use when there are a lot of PCs connected to the switch. •...
ONFIGURING THE WITCH Figure 6-27 QoS Settings When the QoS Mode is set to 802.1p, the 802.p Configuration table is displayed as shown below. Figure 6-28 802.1p Configuration 6-48...
ONFIGURING THE WITCH RSTP The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STA-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
RSTP alternate route that can be used when a node or port fails, and retaining the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs. Configuring RSTP Use the RSTP Configuration page to specify global or port-specific parameters for the Rapid Spanning Tree Protocol.
Page 100
ONFIGURING THE WITCH This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state; otherwise, temporary data loops might result.
Page 101
RSTP during reconfiguration events, does not cause the spanning tree to initiate reconfiguration when the interface changes state, and also overcomes other STA-related timeout problems. However, remember that Edge Port should only be enabled for ports connected to an end-node device. (Default: Enabled) •...
ONFIGURING THE WITCH Web – Click RSTP, Settings. Set any required system or port-specific attributes for RSTP, and click APPLY. Figure 6-30 RSTP Configuration 6-54...
RSTP Displaying RSTP Status Use the RSTP Status page to display global and port-specific status and attribute settings for the Rapid Spanning Tree Protocol. Field Attributes RSTP Bridge Overview • Hello Time – Interval (in seconds) at which the root device transmits a configuration message.
Page 104
ONFIGURING THE WITCH to this port, the manual setting for Edge Port will be overridden, and the port will instead function as a point-to-point connection. • P2P Port – Shows if this port is functioning as a Point-to-Point connection to exactly one other bridge. The switch can automatically determine if the interface is attached to a point-to-point link or to shared media.
802.1X Web – Click RSTP, Status. Figure 6-31 RSTP Status Overview 802.1X Network switches can provide open and easy access to network resources by simply attaching a client PC. Although this automatic configuration and access is a desirable feature, it also allows unauthorized personnel to easily intrude and possibly gain access to sensitive network data.
Page 106
ONFIGURING THE WITCH This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol messages with the client, and a remote RADIUS authentication server to verify user identity and access rights. When a client (i.e., Supplicant) connects to a switch port, the switch (i.e., Authenticator) responds with an EAPOL identity request.
802.1X Configuring 802.1X Use the 802.1X Configuration page to specify global or port-specific parameters for the IEEE 802.1X Port Authentication Protocol. Field Attributes System Settings • Mode - Enables or disables 802.1X globally for all ports on the switch. The 802.1X protocol must be enabled globally for the switch before the port settings are active.
Page 108
ONFIGURING THE WITCH either 802.1X-aware or otherwise. (This is the default setting.) Force-Unauthorized - Forces the port to deny access to all clients, either 802.1X-aware or otherwise. • Port State - Administrative state for port access control. • Reset - The two available options include: Re-Authenticate - Schedules a re-authentication to whenever the quiet-period of the port runs out.
ONFIGURING THE WITCH 802.1X Statistics Use the 802.1X Statistics page to display statistics for dot1x protocol exchanges for any port. Field Attributes • Port Statistics - Statistics can be viewed on a per-port basis. Select the port that you want to view here. Authenticator Counters •...
Page 111
802.1X AUTHENTICATED, as a result of the Backend Authentication state machine indicating successful authentication of the Supplicant. • AuthFailWhileAuthenticating – The number of times that the state machine transitions from AUTHENTICATING to HELD, as a result of the Backend Authentication state machine indicating authentication failure.
Page 112
ONFIGURING THE WITCH • backendAuthSuccesses – The number of times that the state machine receives an EAP-Success message from the Authentication Server. Indicates that the Supplicant has successfully authenticated to the Authentication Server. Dot1x MIB Counters • EapolFramesRx – The number of valid EAPOL frames of any type that have been received by this Authenticator.
ONFIGURING THE WITCH Security IP Filter On this page, you can set up a source IP Filter on all or some ports. It is used to block unwanted access and provide access to the network for either a specific source IP address or a specific subnet. Field Attributes •...
ECURITY Figure 6-34 IP Filter Configuration Port Security Port security is a feature that allows you to configure a port with one or more MAC addresses that are authorized to access the network through that port. When port security is enabled on a port, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number.
Page 116
ONFIGURING THE WITCH Field Attributes • Port - The number of the port. • Allowed Number of Learned MAC Addresses - Set the maximum of MAC addresses that can be learned by this port. The options are shown below. No Limit - No limit is set on the number of dynamically learned MAC address.
ECURITY Web – Click Security, Port Security. Set the number of allowed MAC addresses and the response to a detected intrusion, then click APPLY. Figure 6-35 Port Security Management Access Filter This page enables you to set up a management access filter on the switch. With the Management Access Filter Configuration table, you can create a list of up to 8 IP addresses or IP address groups that are allowed management access to the switch through the web interface or SNMP.
ONFIGURING THE WITCH Web – Click Security, Management Access Filter. Enter a specific IP address or an address range, and click APPLY. Figure 6-36 Management Access Filter Configuration 6-70...
IGMP S NOOPING IGMP Snooping The switch can use Internet Group Management Protocol (IGMP) to filter multicast traffic. IGMP Snooping monitors IGMP service requests passing between multicast clients and servers, and dynamically configures the ports which need to receive the multicast traffic. You can configure the switch to forward multicast traffic intelligently.
Page 120
ONFIGURING THE WITCH Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Therefore, if the IGMP querier is a known multicast router/ switch connected over the network to a port on this switch, you can manually configure the port (and a specified VLAN) to join all the current multicast groups supported by the attached router.
IGMP S NOOPING Web – Click IGMP Snoop, Settings. Modify the required global or VLAN-specific attributes, and click APPLY. Figure 6-37 IGMP Snooping Configuration Displaying IGMP Statistics Use the IGMP Snooping Statistics page to show IGMP Snooping statistics for each VLAN. Field Attributes •...
ONFIGURING THE WITCH • v2 Reports - The number of received v2 Report packets. • v3 Reports - The number of received v3 Report packets. • v3 Leave - The number of v3 leave packets received. Web – Click IGMP Snoop, Status. Figure 6-38 IGMP Snooping Status 6-74...
SNMP SNMP Use the SNMP Settings page to configure the Simple Network Management Protocol (SNMP), including enabling the local SNMP agent on this switch, specifying a trap manager, and setting the access strings. Simple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing devices on a network.
ONFIGURING THE WITCH • SNMP Trap Community - Community string sent with the notification operation. Web – Click SNMP, Settings. Set the local SNMP agent status, specify a trap manager, set the community access stings, and click APPLY. Figure 6-39 SNMP Configuration 6-76...
Check connections between the switch, the power cord, and the wall outlet. • Contact your dealer for assistance. • Contact LevelOne Technical Support. Link LED is Off • Verify that the switch and attached device are powered • Be sure the cable is plugged into both the switch and corresponding device.
ROUBLESHOOTING Power and Cooling Problems If the power indicator does not turn on when the power cord is plugged in, you may have a problem with the power outlet, power cord, or internal power supply. However, if the unit powers off after running for a while, check for loose power connections, power losses or surges at the power outlet, and verify that the fans on the unit are unobstructed and running prior to shutdown.
ESET THE WITCH Reset the Switch As situation requires, you might want to reset the switch and to restore to the default settings. To reset the switch: 1. Unplug the power cord from the power socket. 2. Unplug all cables from the ports. 3.
PPENDIX ABLES Twisted-Pair Cable and Pin Assignments For 10BASE-T/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. For 1000BASE-T connections the twisted-pair cable must have four pairs of wires. Each wire pair is identified by two different colors. For example, one wire might be green and the other, green with white stripes.
ABLES 10BASE-T/100BASE-TX Pin Assignments Use unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-ohm Category 3 or better cable for 10 Mbps connections, or 100-ohm Category 5 or better cable for 100 Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
WISTED ABLE AND SSIGNMENTS Straight-Through Wiring If the twisted-pair cable is to join two ports and only one of the ports has an internal crossover (MDI-X), the two pairs of wires must be straight-through. (When auto-negotiation is enabled for any RJ-45 port on the switch, you can use either straight-through or crossover cable to connect to any device type.) You must connect all four wire pairs as shown in the following diagram to...
ABLES Crossover Wiring If the twisted-pair cable is to join two ports and either both ports are labeled with an “X” (indicating MDI-X) or neither port is labeled with an “X” (which indicates MDI), a crossover must be implemented in the wiring.
WISTED ABLE AND SSIGNMENTS 1000BASE-T Pin Assignments All 1000BASE-T ports support automatic MDI/MDI-X operation, so you can use straight-through cables for all network connections to PCs or servers, or to other switches or hubs. The table below shows the 1000BASE-T MDI and MDI-X port pinouts. These ports require that all four pairs of wires be connected.
ABLES Note that when testing your cable installation, be sure to include all patch cables between switches and end devices. Adjusting Existing Category 5 Cabling to Run 1000BASE-T If your existing Category 5 installation does not meet one of the test parameters for 1000BASE-T, there are basically three measures that can be applied to try and correct the problem: 1.
PECIFICATIONS Weight 3.72 kg (8.44 lbs) Size 44.0 x 17.1 x 4.3 cm (17.0 x 6.7 x 1.7 in.) Temperature Operating: 0 to 40 °C (32 to 104 °F) Storage: -40 to 70 °C (-40 to 158 °F) Humidity Operating: 10% to 90% (non-condensing) AC Input 100 to 240 V, 50-60 Hz, 0.8 A Power Supply...
LOSSARY 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. 1000BASE-LX IEEE 802.3z specification for Gigabit Ethernet over two strands of 50/125, 62.5/125 or 9/125 micron core fiber cable.
Page 140
LOSSARY Bandwidth The difference between the highest and lowest frequencies available for network signals. Also synonymous with wire speed, the actual speed of the data transmission along the cable. Collision A condition in which packets transmitted over the cable interfere with each other.
Page 141
LOSSARY Full Duplex Transmission method that allows two network devices to transmit and receive concurrently, effectively doubling the bandwidth of that link. Gigabit Ethernet A 1000 Mbps network communication system based on Ethernet and the CSMA/CD access method. IEEE Institute of Electrical and Electronic Engineers. IEEE 802.3 Defines carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications.
LOSSARY Layer 2 Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses. Light emitting diode used for monitoring a device or network condition. Link Segment Length of twisted-pair or fiber cable joining a pair of repeaters or a repeater and a PC.
Page 143
LOSSARY Redundant Power Supply (RPS) A backup power supply unit that automatically takes over in case the primary power supply should fail. RJ-45 Connector A connector for twisted-pair wiring. Switched Ports Ports that are on separate collision domains or LAN segments. Telecommunications Industry Association Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol suite that includes TCP as the primary transport protocol, and IP...
Need help?
Do you have a question about the GSW-1676 and is the answer not in the manual?
Questions and answers