Versitron SG72460M User Manual

Web smart 10/100/1000 24-port ethernet switch with sfp support
Hide thumbs Also See for SG72460M:

Advertisement

SG72460M
Web Smart 1 0 / 1 0 0 / 1 0 0 0
24-Port Ethernet Switch
with SFP support
User's Manual
© September 2007
VERSITRON, Inc.
83 Albe Drive / Suite C
Newark, DE 19702
www.versitron.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SG72460M and is the answer not in the manual?

Questions and answers

Summary of Contents for Versitron SG72460M

  • Page 1 SG72460M Web Smart 1 0 / 1 0 0 / 1 0 0 0 24-Port Ethernet Switch with SFP support User’s Manual © September 2007 VERSITRON, Inc. 83 Albe Drive / Suite C Newark, DE 19702 www.versitron.com...
  • Page 2 VERSITRON. We pay the shipping charges to return the repaired unit or a replacement unit to you. Note: This warranty is effective for commercial products as of January 1, 2001.
  • Page 3 The information contained in this document is subject to change without prior notice. Copyright ©. All Rights Reserved. TRADEMARKS Ethernet is a registered trademark of Xerox Corp. W ARNING: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.
  • Page 4: Table Of Contents

    Table of Contents Caution ..........................iv Electronic Emission Notices ....................iv Introduction ........................2 1-1. Overview of 24-Port GbE Web Smart Switch ..............2 1-2. Checklist.........................3 1-3. Features .........................3 1-4. View of 24-Port GbE Web Smart Switch................5 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs).......5 1-4-2.
  • Page 5 5. Maintenace .........................95 5-1. Resolving No Link Condition ..................95 5-2. Q&A..........................95 Appendix A Technical Specifications..................96 Appendix B MIB Specifications....................100...
  • Page 6: Caution

    Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
  • Page 7 About this user’s manual This user’s manual provides instructions on how to install your Web Smart Switch. This guide also covers management options and detailed explanation about hardware and software functions. Overview of this user’s manual Chapter 1 “Introduction” describes the features of 24-Port Gigabit Web Smart Switch Chapter 2 “Installation”...
  • Page 8: Introduction

    1. Introduction 1-1. Overview of 24-Port GbE Web Smart Switch The 24-port Gigabit Web Smart Switch is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch has 24 10/100/1000Mbps TP ports and 4 Gigabit TP/SFP transceiver slots.
  • Page 9: Checklist

    1-2. Checklist Before you start installing the switch, verify that the package contains the following: A 24-Port GbE Web Smart Switch ⎯ Modules (optional) ⎯ Mounting Accessory (for 19” Rack Shelf) ⎯ This User's Manual in CD-ROM ⎯ AC Power Cord ⎯...
  • Page 10 • Supports 802.1Q VLAN • Supports user management and limits one user to login • Maximal packet length can be up to 9600 bytes for jumbo frame application • Supports Broadcasting Suppression to avoid network suspended or crashed • Supports to send the trap event while monitored events happened •...
  • Page 11: View Of 24-Port Gbe Web Smart Switch

    1-4. View of 24-Port GbE Web Smart Switch Fig. 1-1 Full View of 24-PORT GBE WEB SMART SWITCH 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional removable modules on the front panel of the switch.
  • Page 12: User Interfaces On The Rear Panel

    • LED Indicators Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED Lit when connection with remote device is good LINK/ACT Green Blinks when any traffic is present Lit Green when TP link on 1000Mbps speed Green/ Lit Amber when TP link on 100Mbps speed 10/100/1000Mbps...
  • Page 13: View Of The Optional Modules

    1-5. View of the Optional Modules In the switch, Port 21~24 include two types of media --- TP and SFP Fiber (LC, BiDi…); they support 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed connection expansion; nine optional SFP types provided for the switch are listed below: 1000Mbps LC, MM, SFP Fiber transceiver ⎯...
  • Page 14: Installation

    2. Installation 2-1. Starting 24-Port GbE Web Smart Switch Up This section describes how to install the Web Smart Switch and its components, and also includes the following information: Hardware and Cable Installation - Management Station Installation - Software booting and configuration 2-1-1.
  • Page 15: Cabling Requirements

    • TP Port and Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used.
  • Page 16 2-1-2-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat5 or Cat5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection ⎯ The grade of the cable must be Cat5 or Cat5e with a maximum length of 100 meters. Cat5e is recommended.
  • Page 17 2-1-2-3. Switch Cascading in Topology • Takes the Delay Time into Account Theoretically, the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly. In practice, the network extension (cascading levels & overall diameter) must follow the constraint of the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications, in which the limitations are the timing requirement from physical signals defined by 802.3 series specification of Media Access Control (MAC) and PHY, and timer from some OSI layer 2 protocols...
  • Page 18 Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-2). Fig. 2-2 No VLAN Configuration Diagram If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area.
  • Page 19 Case 2b: Port-based VLAN (See Fig.2-4). Fig. 2-4 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4.
  • Page 20: Configuring The Management Agent Of 24-Port Gbe Web Smart Switch

    2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch In the way of web, user is allowed to startup the switch management function. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures. Section 2-1-3-1: Configuring Management Agent of 24-Port GbE Web Smart Switch through Ethernet Port...
  • Page 21 2-1-3-1. Management through Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. We just introduce the first type of management interface. Web- based UI for the switch is an interface in a highly friendly way. 24-PORT GBE WEB SMART SWITCH Default IP Setting: IP = 192.168.1.1...
  • Page 22: Ip Address Assignment

    Fig. 2-7 the Login Screen for Web 2-1-4. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication. Its address structure looks is shown in the Fig.
  • Page 23 With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24. Each class has its address range described below.
  • Page 24 Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network.
  • Page 25 In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result.
  • Page 26 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as default router.
  • Page 27: Typical Applications

    2-2. Typical Applications The 24-Port GbE Web Smart Switch provides auto MDIX on its TP ports and supports fiber types like: LC and BiDi SFP for removable modules on its four slots. For more details on the specification of the switch, please refer to Appendix A.
  • Page 28 Fig. 2-11 Peer-to-peer Network Connection Fig. 2-12 Office Network Connection...
  • Page 29: Basic Concept And Management

    3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What is the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980.
  • Page 30 IEEE 802.2 LLC Data Link Layer IEEE802.3 CSMA/CD MAC IEEE 802.3 PLS Physical Layer ANSI X3T9.5 PMD IEEE 802.3 Fiber Coaxial/STP/UTP This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model.
  • Page 31 Table 3-1 LLC Format The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address. The SSAP address field identifies the specific services indicated by C/R bit (command or response).
  • Page 32: Media Access Control (Mac)

    Fig. 3-2 SAP Format 3-2. Media Access Control (MAC) MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer.
  • Page 33 Bit 47 bit 0 1st byte 2nd byte 3rd byte 4th byte 5th byte 6th byte OUI code Serial number Table 3-3 Ethernet MAC address The first bit of the first byte in the Destination address (DA) determines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1).
  • Page 34 Destination address (DA) — The DA field is used to identify which network device(s) should receive the packet. It is a unique address. Please see the section of MAC addressing. Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0.
  • Page 35 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to detect error; when transmitting data, it performs frame assembly. 2. Performing Media access control. It prepares the initiation jobs for a frame transmission and makes recovery from transmission failure.
  • Page 36 Ethernet MAC transmits frames in half-duplex and full-duplex ways. In half-duplex operation mode, the MAC can either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with the half-duplex operation exists only in the same collision domain, the carrier signal needs to spend time to travel to reach the targeted device.
  • Page 37 Parameter 10Base 100Base 1000Base value/LAN Max. collision 100 meters for UTP 100 meters for UTP domain DTE to 100 meters 412 meters for fiber 316 meters for fiber Max. collision domain with 2500 meters 205 meters 200 meters repeater Slot time 512 bit times 512 bit times 512 bit times...
  • Page 38: Flow Control

    3-3. Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device. When the target is not busy and the PAUSE time is expired, it will send another PAUSE frame with zero time-to-wait to source device.
  • Page 39 Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame. When a frame destined for the target device comes, the receiver of the target device begins receiving the bit stream, and looks for the PRE (Preamble) pattern and Start-of-Frame Delimiter (SFD) that indicates the next bit is the starting point of the MAC frame until all bit of the frame is received.
  • Page 40 What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data immediately following the MAC source address. When tagged VLAN is applied, the Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag control information are different in comparison with the basic Ethernet frame.
  • Page 41: How Does A Switch Work

    The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision. 3-4.
  • Page 42 Fig.3-5 Collision Domain Extended Distance Limitations: The diameter of a half-duplex LAN segment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using yellow cable is 2500 meters and 185 meters when using coaxial cable.
  • Page 43 Fig. 3-6 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination port(s). Here we introduce some important features of a switch and how they work. MAC address table When a packet is received on a port of switch, the switch first checks if the packet good or bad and extracts the source MAC address (SA) and destination MAC address (DA) to find 1) if SA is existed in the...
  • Page 44 Mac address aging There is a field in MAC address table used to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA. Usually, the age time is programmable.
  • Page 45: Virtual Lan

    3-5. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different physical network segments bridged by switches or bridges which attach to end stations in the same broadcast domain.
  • Page 46 Fig. 3-8 Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical networks which have their own broadcast domain. The traffic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1 does not flow to VLAN 2 and others.
  • Page 47 There are many types of VLAN applied. Most popular is port-based VLAN, tag-based VLAN and protocol-based VLAN. Port-based VLAN Some physical ports are configured as members of a VLAN. All stations attached on these ports can communicate with each other. Tag-based VLAN It identifies the membership by VLAN ID, no matter where the packet comes from.
  • Page 48 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification with the value of 0 and priority information.
  • Page 49 Ingress Rule: Each packet received by a VLAN-aware bridge will be classified to a VLAN. The classification rule is described as follows. 1. If the VID of the packet is null VID (VID=0) or this packet is an untagged packet: a.
  • Page 50 the same VLAN. If not, drops it. If yes, forwards it to the associated ports. Meanwhile, this VLAN must be applied to the egress port, or the packet will be dropped. If ingress filtering is disabled, VLAN bridge will only check the MAC address table to see if the destination VLAN exists.
  • Page 51: Link Aggregation

    3-6. Link Aggregation Basically, Link Aggregation is to aggregate the bandwidth of more than one port to an assigned logical link. This highly increases total bandwidth to the targeted device. There is more than one Link Aggregation technology in many vendors’ switch products already, which may cause the problem of interoperability.
  • Page 52 Terminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group with a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an independent link.
  • Page 53: Operation Of Web-Based Management

    4. Operation of Web-based Management This chapter would introduce how to manage your Web Smart Switch and how to configure the 10/100/1000Mbps TP Ports and Gigabit TP/SFP Fiber dual media ports on the switch via web user interfaces. Web Smart Switch provides 20 fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports.
  • Page 54: Web Management Home Overview

    Fig. 4-1 4-1. Web Management Home Overview After login, System Information would be displayed as Fig. 4-2 illustrated. This page lists default values and shows you the basic information of the switch, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”. With this information, you will know the software version, MAC address, ports available and so on.
  • Page 55 • The Information of Page Layout On the top part of the information page, it shows the front panel of the switch. Linked ports will be ⎯ displayed in green color, and linked-off ones will be in black. For the optional modules, the slots with no module will only show covered plates, the other slots with installed modules would present modules.
  • Page 56: Configuration

    4-2. Configuration Configuration includes the following functions: System Configuration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuration, Aggregation, LACP, RSTP, 802.1X, IGMP Snooping, Mirror, QoS, Filter, Rate Limit, Storm Control and SNMP. Configuration System Configuration Ports Configuration VLAN Mode Configuration VLAN Group Configuration Aggregation LACP...
  • Page 57: System Configuration

    4-2-1. System Configuration System configuration is one of the most important functions. Without a proper setting, network administrator would not be able to manage the device. The switch supports manual IP address setting. Fig. 4-3 Function name: System Configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, active IP address, active subnet mask, active gateway, DHCP server and Lease time left.
  • Page 58 DHCP Server: Show the IP address of the DHCP server. Default: 0.0.0.0 Lease Time Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 characters are allowed in this parameter. Any alphanumeric character and null are acceptable.
  • Page 59 32 bits Network ID Host ID Network ID Host ID Subnet number Subnet mask is used to set the subnet mask value, which should be the same value as that of the other devices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment”...
  • Page 60: Ports Configuration

    4-2-2. Port Configuration Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports on the switch. By this function, you can set or reset the values for Mode and Flow Control. Parameter description: Enable Jumbo Frames: This function support jumbo frames of up to 9600 bytes, Just tick the check box ( ) to enable Default: disable Link:...
  • Page 61: Vlan Mode Configuration

    Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration Web Smart Switch supports Port-based VLAN and Tag-based VLAN (802.1q). Its VLAN mode supports 24 active VLANs and the available VLAN ID range is from 1~4094. VLAN configuration is used to divide a LAN into smaller ones. With proper configuration, you can gain not only improved security and increased performance, but also save a lot of VLAN management effort.
  • Page 62: Vlan Group Configuration

    Double-tag: Double-tag mode belongs to the tag-based mode; however, it would treat all frames as the untagged ones, which means that tag with PVID will be added into all packets. Then, these packets will be forwarded as Tag-based VLAN. So, the incoming packets with tag will become the double-tag ones.
  • Page 63 ID (Group ID): When you want to edit a VLAN group, you must select the Group ID field. Then, you will enter Tag Base VLAN Group Setting or Port Base VLAN Group Setting page, which depends on your VLAN mode selection. VID: VLAN identifier.
  • Page 64 Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the check box ( beside the ID, then press the <Delete> button to delete the group. Fig. 4-9 Port-Based VLAN Configuration...
  • Page 65: Aggregation

    4-2-5. Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle ports by same speed, MAC, and full duplex to be a single logical port, thus the logical port can aggregate the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
  • Page 66: Lacp

    4-2-6. LACP Smart Web Switch supports link aggregation IEEE802.3ad standard. The standard describes Link Aggregate Control Protocol (LACP) which dynamically creates and manages trunk groups. When you enable LACP link aggregation on a port, the port can automatically negotiate with the ports at the remote end of a link to establish trunk groups.
  • Page 67: Rstp

    4-2-7. RSTP RSTP detects and resolves network loops, and provides backup links between switches, bridges and routers. The protocol allows a switch to communicate with other RSTP compliant switches, and to ensure only one path existing between two stations in your network environment. The switch allows you to create multiple STP configurations and assign ports to a specific tree.
  • Page 68 Just tick the check box ( beside the port x to enable edge function. Path Cost: Path cost is the cost of transmitting a frame on to a LAN through that port. It is assigned according to the speed of the bridge. The slower the media, the higher the cost, user can select auto or set the rage from 1 to 200000000.
  • Page 69 4-2-8. 802.1X 802.1 x port-based network access controls provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through an 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1 x controls, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from an 802.1x-enabled port.
  • Page 70 Fig. 4-13 In the Fig. 4-14, this is the typical configuration, a single supplicant, an authenticator and an authentication server. B and C is in the internal network, D is Authentication server running RADIUS, switch at the central location acts Authenticator connecting to PC A and A is a PC outside the controlled port, running Supplicant PAE.
  • Page 71 authenticator will embed the user ID into Radius-Access-Request command and send it to the authentication server for confirming its identity. After receiving the Radius-Access-Request, the authentication server sends Radius- Access-Challenge to the supplicant for asking for inputting user password via the authenticator PAE.
  • Page 72 Authorized means MAC entry is authorized. Port Mode Port Control Authentication Port Status Disable Don’t Care Don’t Care Port Uncontrolled Enabled Auto Successful Port Authorized Enabled Auto Failure Port Unauthorized Enabled ForceUnauthorized Don’t Care Port Unauthorized Enabled ForceAuthorized Don’t Care Port Authorized Function name: 802.1X Configuration...
  • Page 73 Re-authenticate for all ports in at once. Force Reinitialize: Force the subscriber has to reinitialize connected to the port. Force Reinitialize All: Force Reinitialize for all ports in at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration Statistics: Choose the port which you want to show of 802.1X statistics, the screen include Authenticator counters, backend Authenticator counters, dot1x MIB counters and Other statistics.
  • Page 74 Fig. 4-17 802.1X Statistics Function name: 802.1x Parameters Function description: In here, user can enable or disable Reauthentication function and specify how often a client has to re-enter his or her username and password to stay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authentication will take place in this port.
  • Page 75: Igmp Snooping

    4-2-9 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch to constrain multicast traffic by listening to Internet Group Management Protocol (IGMP). After finishing the settings, please press <Apply> button to start up the function. Parameter description: IGMP Enabled: Just tick the check box (...
  • Page 76: Mirror Configuration

    4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is provided to monitor the traffic in the network. This switch supports one-port mirror multi-ports. For example, we assume that Port A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the traffic passing through Port A and Port B will be copied to Port C for monitor purpose.
  • Page 77: Qos(Quality Of Service) Configuration

    4-2-11. QoS (Quality of Service) Configuration offers powerful QoS function. This function supports VLAN-tagged priority that can switch make precedence of 8 priorities, and DSCP (Differentiated Services Code Point) on Layer 3 of network framework. Fig. 4-21 QoS Configuration...
  • Page 78 Function name: QoS Configuration Function description: While setting QoS function, please select QoS Mode in drop-down menu at first. Then you can use 802.1p Priority and DSCP Priority functions. In this function, you can enable/disable QoS Mode and set Priority Control, such as: 802.1p and DSCP. The switch only supports Strict Priority. High priority queue is always passed first.
  • Page 79 Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused. DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet.
  • Page 80: Filter

    4-2-12 Filter Function name: Filter Configuration Function description: This function lets administrators easily set management source IP addresses to the ports on the switch. After completing the settings, please press <Apply> button to make this function take effect. Parameter description: Source IP Filter: Mode: There are three types of mode in this drop-down menu.
  • Page 81: Rate Limit

    4-2-13 Rate Limit Function name: Ingress and Egress Bandwidth Setting Function description: Ingress and Egress Bandwidth Setting function are used to set up the limit of Ingress or Egress bandwidth for each port. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field.
  • Page 82: Storm Control

    4-2-14 Storm Control Function name: Storm Control Function description: Storm Control is used to block unnecessary multicast and broadcast frames that reduce switch’s performance. When the function is enabled and Storm Control rate settings are detected as exceeded, the unnecessary frames would be dropped. Fig.4-26 Storm Control Configuration Parameter description: ICMP Rate:...
  • Page 83: Snmp

    4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
  • Page 84 Fig. 4-27 SNMP Configuration...
  • Page 85: Monitoring

    4-3. Monitoring There are six functions contained in the monitoring function. Monitoring Statistics Overview Detailed Statistics LACP Status RSTP Status IGMP Status Ping 4-3-1. Statistics Overview The function of Statistics Overview collects any information and provides the counting summary about the traffic of the port, no matter the packet is good or bad. In the Fig.
  • Page 86 Fig. 4-28 Statistics Overview for all ports...
  • Page 87: Detailed Statistics

    4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. In the Fig. 4-26, the window can show all counter information each port at one time. Parameter description: Rx Packets: The counting number of the packet received. RX Octets: Total received bytes.
  • Page 88 Rx 64 Bytes: Number of 64-byte frames in good and bad packets received. Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and bad packets received. Rx 256-511 Bytes: Number of 256 ~ 511-byte frames in good and bad packets received.
  • Page 89 Tx Overflow: Number of frames dropped due to the lack of transmitting buffer. Fig. 4-29 Detailed Statistics for each port...
  • Page 90: Lacp Status

    4-3-3. LACP Status Function name: LACP Status Function description: Display LACP status. Fig. 4-30 illustrates that LACP Status window can show LACP information and status for all ports in the same time. Parameter description: LACP Aggregation Overview: Show the group/port status. Default will set to red sign for port link down, user can check legend table below for all reference.
  • Page 91: Rstp Status

    4-3-4. RSTP Status Function name: RSTP Status Function description: Display RSTP status. Fig. 4-28 shows you that RSTP window can present VLAN bridge information and the status of all ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id. Bridge Id: Show this switch’s current bridge priority setting and bridge ID which stands for the MAC address of this switch.
  • Page 92: Igmp Status

    4-3-5. IGMP Status Function name: IGMP Status Function description: Display IGMP status. In Fig. 4-29, the window shows VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted.
  • Page 93: Ping Status

    Fig. 4-32 IGMP Status 4-3-6. Ping Status Function name: Ping Status Function description: To set up target IP address for ping function and display ping status. In Fig. 4-30, the window shows the ping information. Parameter description: Ping Parameters: Target IP address: Set up a Target IP address to ping.
  • Page 94 Show the received replies number of times. Request timeouts: Show the timeout of request. Average Response times (In ms): Show the average response time in milliseconds. Fig. 4-33 Ping...
  • Page 95: Maintenance

    4-4. Maintenance There are five functions contained in the maintenance function. Maintenance Warm Restart Factory Default Software Upgrade Configuration File Transfer Logout...
  • Page 96: Warm Restart

    4-4-1. Warm Restart Web Smart Switch offers many approaches to reboot your switch, such as: power up, hardware reset and software reset. You can press RESET button in the front panel of your switch to reset the device and to retrieve default settings. After upgrading software, you have to reboot the device to have new configuration take effect.
  • Page 97: Factory Default

    4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and replace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed. If you want to restore all configurations including the IP address setting to the factory default, please press the “RESET”...
  • Page 98: Software Upgrade

    4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can just click Browse button to retrieve the file you want in your system to upgrade your switch. Fig. 4-36 Software Upgrade...
  • Page 99: Configuration File Transfer

    4-4-4. Configuration File Transfer Function name: Configuration File Transfer Function description: You can backup your switch’s configuration file into your computer folder in case accident happens. In addition, uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes.
  • Page 100: Logout

    4-4-5. Logout In addition to auto logout function we just mentioned in system configuration section, the switch also allows administrators to logout manually by Logout function. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission.
  • Page 101: Maintenace

    5. Maintenance 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5-2.
  • Page 102: Appendix A Technical Specifications

    Appendix A Technical Specifications Features • 24 (10/100/1000Mbps) Gigabit Ethernet (TP) switching ports are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward shared-memory Web-Smart switched. •...
  • Page 103 Hardware Specifications Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x Network Interface: Configuration Mode Connector Port 10/100/1000Mbps Gigabit TP 1 - 24 NWay TP (RJ-45) 21,22,23,24 1000 FDX *SFP 1000Base-SX Gigabit Fiber (Option) 21,22,23,24 1000 FDX *SFP 1000Base-LX Gigabit Fiber (Option) 21,22,23,24 1000Base-LX Single Fiber WDM (BiDi) 1000 FDX...
  • Page 104 Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT, 10/100/1000Mbps 1000M SFP Fiber Port 21,22,23,24 : SFP(LINK/ACT) Power Requirement AC Line Voltage 100∼240 V Frequency 50∼60 Hz Consumption Ambient Temperature 0° to 50°C Humidity 5% to 90% 44(H) ×...
  • Page 105: Management Software Specifications

    Management Software Specifications Auto-negotiation support on 10/100Base-TX ports, Web browser can set transmission speed (10/100Mbps) and operation mode (Full/Half System Configuration duplex) on each port, enable/disable any port, set VLAN group, set Trunk Connection. Port-Base / 802.1Q-Tagged, allowed up to 24 VLAN Function active VLANs in one switch.
  • Page 106: Appendix Bmib Specifications

    Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below. PRIVATE-GESM-SW24L-MIB DEFINITIONS ::= BEGIN IMPORTS mib-2, DisplayString,ifIndex FROM RFC1213-MIB enterprises,Counter, TimeTicks, Gauge,IpAddress FROM RFC1155-SMI OBJECT-TYPE FROM RFC-1212 TRAP-TYPE FROM RFC-1215; privatetech OBJECT IDENTIFIER ::= { enterprises 5205 } switch OBJECT IDENTIFIER ::= { privatetech 2 } GESM-SW24LProductId...

Table of Contents