WELLTECH WPoE-2426 User Manual

26-port l2 poe plus managed switch
Table of Contents

Advertisement

Quick Links

WPoE-2426
26-Port L2 PoE Plus Managed Switch
User's Manual
Release 1.0
 2012 Welltech Technology Co., Ltd. All rights reserved. All brand and product names are trademarks or
registered trademarks of their respective companies

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WPoE-2426 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for WELLTECH WPoE-2426

  • Page 1 WPoE-2426 26-Port L2 PoE Plus Managed Switch User's Manual Release 1.0  2012 Welltech Technology Co., Ltd. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies...
  • Page 2: About This Manual

    Manufacture Technology. Purpose This manual gives specific information on how to operate and use the management functions of the WPOE-2426 Audience The Manual is intended for use by network administrators who are responsible for operating and maintaining network equipment;...
  • Page 3 accordance with the Instruction manual, may cause harmful interference to radio communications. FCC Caution To assure continued compliance (example-use only shielded interface cables when connection to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
  • Page 4: Table Of Contents

    3-3.1.1 Static Trunk ..............................53 3-3.2 LACP ..............................55 3-3.2.1 Configuration ............................... 55 3-3.2.2 System Status ............................... 57 3-3.2.3 Port Status ..............................58 3-3.2.4 Port Statistics ............................... 60 3-4 S ............................61 PANNING Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 5 3-4.1 Bridge Settings ........................... 61 2-4.2 MSTI Mapping ........................... 64 3-4.3 MSTI Priorities ..........................66 3-4.4 CIST Ports ............................67 3-4.5 MSTI Ports ............................69 3-4.6 Bridge Status ............................71 3-4.7 Port Status ............................72 3-4.8 Port Statistics ............................. 73 3-5 IGMP S ............................
  • Page 6 4-7.3 Port Status ............................238 4-8 A ..........................239 CCESS ANAGEMENT 4-8.1 Configuration ........................... 239 4-8.2 Statistics ............................241 4-9 SSH ................................242 4-10 HTTP ..............................243 4-11 A ............................244 ETHOD Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 7 CHAPTER 5. MAINTENANCE ....................245 5-1 R ............................245 ESTART EVICE 5-2 F ..............................246 IRMWARE 5-2.1 Firmware Upgrade .......................... 246 5-2.2 Firmware Selection .......................... 247 5-3 S ............................249 ESTORE 5-3.1 Factory Defaults ..........................249 5-3.2 Save Start ............................249 5-3.3 Save User ............................
  • Page 9: Introduction

    In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the WPoE-2426 through the web by (RJ-45) serial interface and Ethernet ports step-by-step. Many explanations in detail of hardware and software functions are shown as well as the examples of the operation for web-based interface.
  • Page 10: Chapter 1 Operation Of Web-Based Management

    MIBs status, each port activity, Spanning tree status, port aggregation status, multicast traffic, VLAN and priority status, even illegal access record and so on. he default values of the WPoE-2426 are listed in the table below: IP Address 192.168.1.1 Subnet Mask 255.255.255.0...
  • Page 11 As WPoE-2426 the function enable DHCP, so If you do not have DHCP server in your network to provide IP addresses to the switch, the Switch default IP is 192.168.1.1 Figure 1 The login page If you need to configuration the function or parameter then you can refer the detail in the User Guide.
  • Page 12 WPoE-2426 web help function: Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 13: Connecting Network Devices

    The switch was designed to be connected to 10, 100 or CONNECTING 1000Mbps network cards in PCs and servers, as well as NETWORK to other switches, hubs and VoIP devices such as IP Phone, ATA and FXS/FXO Gateway. It may also be DEVICES connected to remote devices using optional SFP...
  • Page 15: Switches

    Step2. If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a modular wall outlet that is connected to the wiring closet. (See the section “Network Wiring Connections.”) Otherwise, attach the other end to an available port on the switch.
  • Page 16: Chapter 2 System Configuration

    2. Specify the contact information for the system administrator as well as the name and location of the switch. Also indicate the local time zone by configuring the appropriate offset. 3. Click Refresh Figure 2-1.1: System Information (WPoE-2426 for example, others model the same) Publication date: August, 2012 Revision 1.0...
  • Page 17: Firmware Version

    Parameter description: Model name:  The model name of this device. System description:  This information tells what this device is. Here, it is “20 port 10/100/1000 Base-T + 4-Port TP/(100/1G) SFP Combo +2(100/1G) SFP L2 Plus Managed Switch”. Location: ...
  • Page 18 To display the device’s maximum frame size information. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 19: 2-1.2 Configuration

    1. Click System, System Information, Configuration. 2. Write System Contact, System Name, System Location information in this page. 3. Click Save Figure 2-1.2: System Information configuration WPoE-2426 Parameter description: System Contact :  The textual identification of the contact person for this managed node, together with information on how to contact this person.
  • Page 20: 2-1.3 Cpu Load

    2-1.3 CPU Load This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format.
  • Page 21: Time

    Figure 2-2.1: The time configuration Parameter description: Clock Source:  To click what clock source for the WPoE-2426. You can select “Use local Settings” or “Use NTP Server” for WPoE-2426 time clock source. Local Time:  Show the current time of the system.
  • Page 22 To configure when Daylight saving end date and time, the format is “YYYY-MM- DD HH:MM”. The under “from” and “to” was displayed what you set on the “From” and “To” field information. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 23: 2-2.2 Ntp

    2-2.2 NTP NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If the NTP mode was used and select a built-in NTP time server or manually specify an user-defined NTP server as well as Time Zone, the switch will sync the time in a short after pressing <Apply>...
  • Page 24: Account

    2-3 Account In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password.
  • Page 25 Privilege Level :  The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully control of the device. But others value need to refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group.
  • Page 26: 2-3.2 Privilege Level

    SNMP Security Spanning Tree System Trap Event VCL VLANs Voice VLAN Privilege Levels from 1 to 15 . Web Interface To configure Privilege Level in the web interface: 1. Click SYSTEM, Account, Privilege Level. 2. Specify the Privilege parameter. 3. Click Save. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 27 Figure2- 3.2: The Privilege Level configuration Parameter description: Group Name  The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contains more than one. The following description defines these privilege level groups in details: System: Contact, Name, Location, Time zone and Log.
  • Page 28 (e.g. for clearing of statistics). User Privilege should be same or greater than the authorization Privilege level to have the access to that group. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 29: 2-4.1 Ipv4

    2-4 IP IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a "best effort" system, which means that no packet of information sent over is assured to reach its destination in the same condition it was sent. Each device connected to a Local Area Network (LAN) or Wide Area Network (WAN) is given an Internet Protocol address, and this IP address is used to identify the device uniquely among all other devices connected to the extended network.
  • Page 30 When DNS proxy is enabled, DUT will relay DNS requests to the current configured DNS server on DUT, and reply as a DNS resolver to the client device on the network. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 31: 2-4.2 Ipv6

    2-4.2 IPV6 This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or change the IPv6 configuration. And the Current column is used to show the active IPv6 configuration. Configure the switch-managed IPv6 information on this page. The Configured column is used to view or change the IPv6 configuration.
  • Page 32: Syslog

    Syslog Level :  Indicates what kind of message will send to syslog server. Possible modes are: Info: Send informations, warnings and errors. Warning: Send warnings and errors. Error: Send errors. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 33: 2-5.2 Log

    2-5.2 Log This section describes the display of the system log information on the switch. Web Interface To display the log configuration in the web interface: 1. Click Syslog, Log. 2. Display the log information. Figure2- 5.2: The System Log configuration Parameter description: Auto-refresh ...
  • Page 34: 2-5.3 Detailed Log

    The detailed message of the system log entry. Upper right icon (Refresh, clear,….)  You can click them for refresh the system log or clear them by manual, others for next/up page or entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 35: Snmp

    2-6 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
  • Page 36: 2-6.2 Communities

    Indicates the SNMP access source address. A particular range of source addresses can be used to restrict source subnet when combined with source mask. Source Mask  Indicates the SNMP access source address mask. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 37: 2-6.3 Users

    2-6.3 Users The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check <Add new user> button, and enter the user information then check <Save>. Max Group Number: 10. Web Interface To display the configure SNMP Users in the web interface: 1.
  • Page 38 Privacy Password  A string identifying the privacy password phrase. The allowed string length is 8 to 32, and the allowed content is ASCII characters from 33 to 126. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 39: 2-6.4 Groups

    2-6.4 Groups The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group account, please check <Add new group> button, and enter the group information then check <Save>. Max Group Number : v1: 2, v2: 2, v3:10. Web Interface To display the configure SNMP Groups in the web interface: 1.
  • Page 40: 2-6.5 Views

    In general, if a view entry's view type is 'excluded', there should be another view entry existing with view type as 'included' and it's OID subtree should overstep the 'excluded' view entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 41 OID Subtree  The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The allowed string content is digital number or asterisk(*). Save  To click the Save icon to save the configuration to ROM.
  • Page 42: 2-6.6 Access

    Indicates the security model that this entry should belong to. Possible security models are: any: Any security model accepted(v1|v2c|usm). v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM). Security Level  Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 43 Indicates the security model that this entry should belong to. Possible security models are: NoAuth, NoPriv: No authentication and no privacy. Auth, NoPriv: Authentication and no privacy. Auth, Priv: Authentication and privacy. Read View Name  The name of the MIB view defining the MIB objects for which this request may request the current values.
  • Page 44: 2-6.7 Trap

    You may choose v1, v2c or v3 trap. Server IP:  To assign the SNMP Host IP address. UDP Port:  To assign Port number. Default: 162 Community / Security Name:  Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 45 The length of “Community / Security Name” string is restricted to 1-32. Security Level:  Indicates what kind of message will send to Security Level. Possible modes are: Info: Send information, warnings and errors. Warning: Send warnings and errors. Error: Send errors. Security Level: ...
  • Page 46: Chapter 3. Configuration

    1. Click Configuration, Port, then Configuration 2. Specify the Speed Configured, Flow Control , Maximum Frame size, Excessive Collision mode and Power Control. 3. Click Save. Figure 3-1.1: The Port Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 47 Parameter description: Port :  This is the logical port number for this row. Link :  The current link state is displayed graphically. Green indicates the link is up and red that it is down. Current Link Speed : ...
  • Page 48: 3-1.2 Port Description

    Description of device ports can not include “ # % & ‘ + \. Buttons  Apply – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 49: 3-1.3 Traffic Overview

    3-1.3 Traffic Overview The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports. Web Interface To Display the Port Statistics Overview in the web interface: 1. Click Configuration, Port, then Traffic Overview. 2.
  • Page 50: 3-1.4 Detailed Statistics

    The number of received and transmitted (good and bad) bytes, includes FCS, but excludes framing bits. Rx and Tx Unicast  The number of received and transmitted (good and bad) unicast packets. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 51 Rx and Tx Multicast :  The number of received and transmitted (good and bad) multicast packets. Rx and Tx Broadcast :  The number of received and transmitted (good and bad) broadcast packets. Rx and Tx Pause :  A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation.
  • Page 52: 3-1.5 Qos Statistics

    To evoke the auto-refresh to refresh the Queuing Counters automatically. Upper right icon (Refresh, clear)  You can click them for refresh the Queuing Counters or clear them by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 53: 3-1.6 Sfp Information

    3-1.6 SFP Information This section describes the switch could display the SFP module detail information which you connect it to the switch. The information includes: Connector type, Fiber type, wavelength, baud rate and Vendor OUI and etc. Web Interface To Display the SFP information in the web interface: 1.
  • Page 54 Mon1(Bias) mA:  Show the Bias current of SFP module. Mon2(TX PWR):  Show the transmit power of SFP module. Mon3(RX PWR):  Show the receiver power of SFP module. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 55: 3-1.7 Eee

    3-1.7 EEE The section which allows the user to inspect and configure the current EEE port settings. EEE is a power saving option that reduces the power usage when there is very low traffic utilization (or no traffic). EEE works by powering down circuits when there is no traffic. When a port gets data to be transmitted all circuits are powered up.
  • Page 56 Otherwise the queue will postpone the transmission until 3000 bytes are ready to be transmitted. Buttons  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 57: Acl

    3-2 ACL The WPoE-2426 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way. The ACLs are divided into EtherTypes, IPv4, ARP protocol, MAC and VLAN parameters and etc.
  • Page 58 Reset- Click to undo any changes made locally and revert to previous saved values. Upper right icon (Refresh, clear)  You can click them for refresh the ACL Port Configuration or clear them by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 59: 3-2.2 Rate Limiters

    3-2.2 Rate Limiters The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 that allow user to set rate limiter value and units with pps or kbps. Web Interface To configure ACL Rate Limiter in the web interface: 1.
  • Page 60: 3-2.3 Access Control List

    Specify the relevant criteria to be matched for this rule, and set the actions to take when a rule is matched (such as Rate Limiter, Port Copy, Logging, and Shutdown). Figure 3-2.3: The ACL Rate Limiter Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 61 Parameter description: Ingress Port :  Indicates the ingress port of the ACE. Possible values are: Any: The ACE will match any ingress port. Policy: The ACE will match ingress ports with a specific policy. Port: The ACE will match a specific ingress port. Frame Type : ...
  • Page 62 Upper right icon (Refresh, clear, Remove All)  You can click them for refresh the ACL configuration or clear them by manual. Others remove all to clean up all ACL configurations on the table. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 63: 3-2.4 Acl Status

    3-2.4 ACL Status The section describes how to shows the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations. The maximum number of ACEs is 256 on each switch. Web Interface To display the ACL status in the web interface: 1.
  • Page 64 Auto-refresh:  To evoke the auto-refresh to refresh the information automatically. Upper right icon (Refresh)  You can click them for refresh the ACL status information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 65: Aggregation

    3-3 Aggregation The Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipment’s to build the bandwidth aggregation.
  • Page 66 Buttons  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 67: 3-3.2 Lacp

    3-3.2 LACP Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their unique LACP GroupID to form a logic “trunked port”. The benefit of using LACP is that a port makes an agreement with its peer port before it becomes a ready member of a “trunk group”...
  • Page 68 Passive will wait for a LACP packet from a partner (speak if spoken to). Buttons  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 69: 3-3.2.2 System Status

    3-3.2.2 System Status This section describes that when you complete to set LACP function on the switch then it provides a status overview for all LACP instances Web Interface To display the LACP System status in the web interface: 1. Click Configuration, LACP, System Status. 2.
  • Page 70: 3-3.2.3 Port Status

    The Aggregation ID assigned to this aggregation group. IDs 1 and 2 are GLAGs while IDs 3-14 are LLAGs. Partner System ID :  The partner's System ID (MAC address). Partner Port :  The partner's port number connected to this port. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 71 Auto-refresh:  To evoke the auto-refresh to refresh the information automatically. Upper right icon (Refresh) :  You can click them for refresh the LACP port status information by manual.
  • Page 72: 3-3.2.4 Port Statistics

    To evoke the auto-refresh to refresh the information automatically. Upper right icon (Refresh, Clear)  You can click them for refresh the LACP port statistics information or clear by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 73: Spanning Tree

    3-4 Spanning Tree The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
  • Page 74 BPDU will be delayed. Valid values are in the range 1 to 10 BPDU's per second. Advanced Settings Edge Port BPDU Filtering :  Control whether a port explicitly configured as Edge will transmit and receive Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 75 BPDUs. Edge Port BPDU Guard:  Control whether a port explicitly configured as Edge will disable itself upon reception of a BPDU. The port will enter the error-disabled state, and will be removed from the active topology. Port Error Recovery : ...
  • Page 76: 2-4.2 Msti Mapping

    MSTI's (Intra-region). The name is at most 32 characters. Configuration Revision :  The revision of the MSTI configuration named above. This must be an integer between 0 and 65535. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 77 MSTI Mapping MSTI :  The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. VLANs Mapped :  The list of VLANs mapped to the MSTI. The VLANs must be separated with comma and/or space.
  • Page 78: 3-4.3 Msti Priorities

    MAC address of the switch forms a Bridge Identifier. Buttons  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 79: 3-4.4 Cist Ports

    3-4.4 CIST Ports When you implement an Spanning Tree protocol on the switch that the bridge instance. You need to configure the CIST Ports. The section describes it allows the user to inspect the current STP CIST port configurations, and possibly change as well. Web Interface To configure the Spanning Tree CIST Ports parameters in the web interface: 1.
  • Page 80 Transition to the forwarding state is faster for point-to-point LANs than for shared media. Buttons  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 81: 3-4.5 Msti Ports

    3-4.5 MSTI Ports The section describes it allows the user to inspect the current STP MSTI port configurations, and possibly change them as well. An MSTI port is a virtual port, which is instantiated separately for each active CIST (physical) port for each MSTI instance configured on and applicable to the port.
  • Page 82 Controls the port priority. This can be used to control priority of ports having identical port cost. (See above). Buttons  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 83: 3-4.6 Bridge Status

    3-4.6 Bridge Status After you complete the MSTI Port configuration, you can ask the switch to display the Bridge Status. The Section provides a status overview of all STP bridge instances. The displayed table contains a row for each STP bridge instance, where the column displays the following information: Web Interface To display the STP Bridges status in the web interface:...
  • Page 84: 3-4.7 Port Status

    The time since the bridge port was last initialized. Auto-refresh:  To evoke the auto-refresh to refresh the information automatically. Upper right icon (Refresh)  You can click them for refresh the STP Port status information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 85: 3-4.8 Port Statistics

    3-4.8 Port Statistics After you complete the STP configuration, you can let the switch display the STP Statistics. The Section provides you to ask switch to display the STP Statistics detail counters of bridge ports in the current selected switch. Web Interface To display the STP Port status in the web interface: 1.
  • Page 86: Igmp Snooping

    5. Click the save to save the setting. 6. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values. Figure 3-5.1: The IGMP Snooping Configuration. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 87 Parameter description: Snooping Enabled:  Enable the Global IGMP Snooping. Unregistered IPMCv4 Flooding enabled :  Enable unregistered IPMCv4 traffic flooding. IGMP SSM Range :  SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range. Format: (IP address/ sub mask) Proxy Enabled : ...
  • Page 88: 3-5.2 Vlan Configuration

    The allowed range is 1 to 255; default robustness variable value is 2. QI :  Query Interval. The Query Interval is the interval between General Queries sent by the Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 89 Querier. The allowed range is 1 to 31744 seconds; default query interval is 125 seconds. QRI :  Query Response Interval. The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries. The allowed range is 0 to 31744 in tenths of seconds;...
  • Page 90: 3-5.3 Port Group Filtering

    Figure 3-5.3: The IGMP Snooping Port Group Filtering Configuration. Parameter description: Delete :  Check to delete the entry. It will be deleted during the next save. Port :  Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 91 To evoke the port enable the IGMP Snooping Port Group Filtering function. Filtering Groups :  The IP Multicast Group will be filtered. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values.
  • Page 92: 3-5.4 Status

    Working Querier Version currently. Host Version :  Working Host Version currently. Querier Status :  Shows the Querier status is "ACTIVE" or "IDLE". Queries Transmitted :  The number of Transmitted Queries. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 93 Queries Received :  The number of Received Queries. V1 Reports Received :  The number of Received V1 Reports. V2 Reports Received :  The number of Received V2 Reports. V3 Reports Received :  The number of Received V3 Reports. V2 Leaves Received : ...
  • Page 94: 3-5.5 Group Information

    To evoke the auto-refresh icon then the device will refresh the log automatically. Upper right icon (Refresh, <<, >> )  You can click them for refresh the IGMP Group Status by manual, others for next/up page or entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 95: 3-5.6 Ipv4 Ssm Information

    3-5.6 IPv4 SSM information Source Specific Multicast (SSM) is a datagram delivery model that best supports one-to-many applications, also known as broadcast applications. SSM is a core network technology of IP multicast targeted for audio and video broadcast application environments. For the SSM delivery mode, an IP multicast receiver host must use IGMP Version 3 (IGMPv3) to subscribe to channel (S, G).
  • Page 96 To evoke the auto-refresh icon then the device will refresh the log automatically. Upper right icon (Refresh, <<, >> )  You can click them for refresh the IGMP Group Status by manual, others for next/up page or entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 97: Mld Snooping

    3-6 MLD Snooping Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snooping—it just provides multicast traffic, and MLD doesn’t interact with it. (Note, however, that in an application like desktop conferencing a network node may act as both a source and an MLD host;...
  • Page 98 Enable MLD Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the router side. Port:  The Port index what you enable or disable the MLD Snooping function. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 99: Router Port

    Fast Leave :  To evoke to enable the fast leave on the port. Router Port :  Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or MLD querier. If an aggregation member port is selected as a router port, the whole aggregation will act as a router port.
  • Page 100: 3-6.2 Vlan Configuration

    Querier. The allowed range is 1 to 31744 seconds; default query interval is 125 seconds. QRI :  Query Response Interval. The Maximum Response Delay used to calculate the Maximum Response Code inserted into the periodic General Queries. The allowed range is 0 to Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 101 31744 in tenths of seconds; default query response interval is 100 in tenths of seconds (10 seconds). . LLQI (LMQI for IGMP) :  Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to calculate the Maximum Response Code inserted into Multicast Address Specific Queries sent in response to Version 1 Multicast Listener Done messages.
  • Page 102: 3-6.3 Port Group Filtering

    The IP Multicast Group that will be filtered. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 103: 3-6.4 Status

    3-6.4 Status The section describes when you complete the MLD Snooping and how to display the MLD Snooping Status and detail information. It will help you to find out the detail information of MLD Snooping status. Web Interface To display the MLD Snooping Status in the web interface: 1.
  • Page 104 To evoke the auto-refresh icon then the device will refresh the log automatically. Upper right icon (Refresh, <<, >> )  You can click them for refresh the IGMP Group Status by manual, others for next/up page or entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 105: 3-6.5 Group Information

    3-6.5 Group Information The section describes user could set the MLD Snooping Groups Information. The "Start from VLAN", and "group" input fields allow the user to select the starting point in the MLD Group Table. Each page shows up to 99 entries from the MLD Group table, default being 20, selected through the "entries per page"...
  • Page 106 To evoke the auto-refresh icon, then the device will refresh the log automatically. Upper right icon (Refresh, <<, >> ):  You can click them for refresh the IGMP Group Status by manual, others for next/up page or entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 107: 3-6.6 Ipv6 Ssm Information

    3-6.6 IPv6 SSM Information The section describes the user to configure the Entries in the MLDv2 Information Table are shown on this page. The MLDv2 Information Table is sorted first by VLAN ID, then by group, and then by Port No. Different source addresses belong to the same group are treated as single entry.
  • Page 108: Mvr

    3. Click the save to save the setting. 4. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values Figure 3-7.1: The MVR Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 109 Parameter description: MVR Mode :  Enable/Disable the Global MVR. VLAN ID :  Specify the Multicast VLAN ID. Mode :  Enable MVR on the port. Type :  Specify the MVR port type on the port. Immediate Leave : ...
  • Page 110: 3-7.2 Groups Information

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh, <<, >> ):  You can click them for refresh the MVR Group information by manual, others for next/up page or entry. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 111: 3-7.3 Statistics

    3-7.3 Statistics The section describes the switch to display the MVR detail Statistics after you had configured MVR on the switch. It provides the detail MVR Statistics Information. Web Interface To display the MVR Statistics Information in the web interface: 1.
  • Page 112: Lldp

    2.Modify LLDP timing parameters. 3.Set the required mode for transmitting or receiving LLDP messages. 4.Specify the information to include in the TLV field of advertised messages. 5.Click Save. Figure 3-8.1: The LLDP Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 113 Parameter description: LLDP Parameters Tx Interval :  The switch periodically transmits LLDP frames to its neighbors for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 - 32768 seconds. Tx Hold : ...
  • Page 114 Optional TLV: When checked the "management address" is included in LLDP information transmitted. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 115: 3-8.2 Lldp Neighbors

    3-8.2 LLDP Neighbors This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP neighbour is detected. The columns hold the following information: Web Interface To show LLDP neighbours: 1.
  • Page 116: System Description

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the LLDP Neighbours information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 117: 3-8.3 Lldp-Med Configuration

    3-8.3 LLDP-MED Configuration Media Endpoint Discovery is an enhancement of LLDP, known as LLDP-MED, that provides the following facilities: Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv) settings) enabling plug and play networking. Device location discovery to allow creation of location databases and, in the case of Voice over Internet Protocol (VoIP), Enhanced 911 services.
  • Page 118 Greenwich; The associated vertical datum is the North American Vertical Datum of 1988 (NAVD88). This datum pair is to be used when referencing locations on land, not near tidal water (which would use Datum = NAD83/MLLW). Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 119 NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name: Greenwich; The associated vertical datum is Mean Lower Low Water (MLLW). This datum pair is to be used when referencing locations on water/sea/ocean. Civic Address Location IETF Geopriv Civic Address based Location Configuration Information (Civic Address LCI). Country code : ...
  • Page 120 It should be noted that LLDP-MED is not intended to run on links other than between Network Connectivity Devices and Endpoints, and therefore does not need to advertise the multitude of network policies that frequently run on an aggregated link interior to the LAN. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 121 Delete :  Check to delete the policy. It will be deleted during the next save. Policy ID :  ID for the policy. This is auto generated and shall be used when selecting the polices that shall be mapped to the specific ports. Application Type : ...
  • Page 122 Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 123: 3-8.4 Lldp-Med Neighbours

    3-8.4 LLDP-MED Neighbours This page provides a status overview of all LLDP-MED neighbours. The displayed table contains a row for each port on which an LLDP neighbour is detected. This function applies to VoIP devices which support LLDP-MED. The columns hold the following information: Web Interface To show LLDP-MED neighbor: 1.Click LLDP-MED Neighbor.
  • Page 124 IP Telephony handsets and other similar appliances supporting interactive voice services. 4. Guest Voice Signalling - for use in network topologies that require a different policy for the guest voice signalling than for the guest voice media. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 125 5. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops. 6. Video Conferencing - for use by dedicated Video Conferencing equipment and other similar appliances supporting real-time interactive video/audio services. 7. Streaming Video - for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment.
  • Page 126: 3-8.5 Eee

    MIB, then the local link partner infers that the remote link partners request was based on stale information. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 127 Echo Rx Tw :  The link partner's Echo Rx Tw value. Resolved Tx Tw :  The resolved Tx Tw for this link. Note : NOT the link partner The resolved value that is the actual "tx wakeup time " used for this link (based on EEE information exchanged via LLDP).
  • Page 128: 3-8.6 Port Statistics

    Shows the number of LLDP frames dropped due to the entry table being full. Total Neighbours Entries Aged Out :  Shows the number of entries deleted due to Time-To-Live expiring. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 129 Local Counters The displayed table contains a row for each port. The columns hold the following information: Local Port :  The port on which LLDP frames are received or transmitted. Tx Frames :  The number of LLDP frames transmitted on the port. Rx Frames : ...
  • Page 130: Poe

    1. Click configuration.. 2. Specify the Reserved Power determined and Power Management ode. Specify the PoE or PoE++ and Priority. 3. Click Save. Figure 3-9.1: The PoE Configuration Parameter description: Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 131: Maximum Power

    Power Supply Configuration Primary Power Supply [W] :  The switch can have PoE power supplies. It is used as power source, being able to determine the amount of power the PD has used. It must be defined what amount of power the sources can deliver.
  • Page 132: 3-9.2 Status

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the PoE Port information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 133: Filtering Data Base

    3- 10 Filtering Data Base Filtering Data Base Configuration gathers many functions, including MAC Table Information, Static MAC Learning, which cannot be categorized to some function type. MAC table Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame).
  • Page 134 Click "Save". Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 135: 3- 10.2 Dynamic Mac Table

    3- 10.2 Dynamic MAC Table Entries in the MAC Table are shown on this page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. Web Interface To Display MAC Address Table in the web interface: 1.
  • Page 136 33-33-FF-73-01-29 : Destination MAC (for IPv6 Neighbor Solicitation) (reference IPv6 DAD.JPG) 33-33-FF-A8-01-01: your switch MAC address (for IPv6 global IP) FF-FF-FF-FF-FF-FF : for Broadcast . Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 137: Vlan

    3-11 VLAN To assign a specific VLAN for management purpose, the management VLAN is used to establish an IP connection to the switch from a workstation connected to a port in the VLAN. This connection supports a VSM, SNMP, and Telnet session. By default, the active management VLAN is VLAN 1, but you can designate any VLAN as the management VLAN using the Management VLAN window.
  • Page 138 You can click them for refresh the VLAN entries by manual. Or press clear to clean up the VLAN table. Others press |<< or >> to upper or down page of the table. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 139: 3-11.2 Ports

    3-11.2 Ports The function in VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User also can choose ingress filtering rules to each port. There are two ingress filtering rules which can be applied to the switch. The Ingress Filtering Rule 1 is “forward only packets with VID matching this port’s configured VID”.
  • Page 140: Ingress Filtering

    The port must be a member of the same VLAN as the Port VLAN ID. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 141: 3-11.3 Switch Status

    3-11.3 Switch Status The function Switch Status gathers the information of all VLAN status and reports it by the order of Static NAS MVRP MVP Voice VLAN MSTP GVRP Combined. Web Interface To Display VLAN membership status and the web interface: 1.
  • Page 142: 3-11.4 Port Status

    VLAN ingress processing. If the port only accepts tagged frames, untagged frames received on that port are discarded. Tx Tag :  Shows egress filtering frame status whether tagged or untagged. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 143 UVID :  Shows UVID (untagged VLAN ID). Port's UVID determines the packet's behavior at the egress side. Conflicts :  Shows status of Conflicts whether exists or not. When a Volatile VLAN User requests to set VLAN membership or VLAN port configuration, the following conflicts can occur: Functional Conflicts between features.
  • Page 144: 3-11.5 Private Vlans

    Click to add a new private VLAN ID. An empty row is added to the table, and the private VLAN can be configured as needed. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 145: 3-11.5.2 Port Isolation

    3-11.5.2 Port Isolation Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair.
  • Page 146: 3-11.6 Mac-Based Vlan

    To configure MAC address-based VLAN configuration in the web interface: 1. Click MAC address-based VLAN configuration and add new entry. 2. Specify the MAC address and VLAN ID. 3. Click Save. Figure 3-11.6.1: The MAC-based VLAN Membership Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 147 Parameter description: Delete :  To delete a MAC-based VLAN entry, check this box and press save. The entry will be deleted on the selected switch. MAC Address :  Indicates the MAC address. VLAN ID :  Indicates the VLAN ID. Port Members : ...
  • Page 148: 3-11.6.2 Status

    To evoke the auto-refresh icon, then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the MAC-based VLAN membership information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 149: 3-11.7 Protocol -Based Vlan

    3-11.7 Protocol -based VLAN This section describe Protocol -based VLAN. The Switch support Protocol include Ethernet LLC SNAP Protocol. The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven- layer OSI reference model.
  • Page 150 Reset- Click to undo any changes made locally and revert to previous saved values. Upper right icon (Refresh):  You can click them for refresh the Protocol Group Mapping information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 151: 3-11.7.2 Group To Vlan

    3-11.7.2 Group to VLAN This section allows you to map a already configured Group Name to a VLAN for the selected switch. Web Interface To Display Group Name to VLAN mapping table configured in the web interface: 1. Click Group Name VLAN configuration and add new entry. 2.
  • Page 152 To evoke the auto-refresh icon, then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the Protocol Group Mapping information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 153: Voice Vlan

    3-12 Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can perform QoS-related configuration for voice data, ensuring the transmission priority of voice traffic and voice quality. 3-12.1 Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic.
  • Page 154 LLDP: Detect telephony device by LLDP. Both: Both OUI and LLDP. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 155: 3-12.2 Oui

    3-12.2 OUI The section describes to Configure VOICE VLAN OUI table . The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. Web Interface To configure Voice VLAN OUI Table in the web interface: 1.
  • Page 156: Garp

    To configure GARP Port Configuration in the web interface: 1. Click GARP to configure. 2. Specify GARP Configuration Parameters. 3. Click Save. Figure 3-13.1: The GARP Port Configuration Parameter description: Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 157 Port :  The Port column shows the list of ports for which you can configure GARP settings. There are 2 types of configuration settings which can be configured on per port bases. • Timer Values • Application • Attribute Type •...
  • Page 158: 3-13.2 Statistics

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the GARP Port Statistics information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 159: Gvrp

    3-14 GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations.
  • Page 160 You can click them for refresh the GVRP Global configuration information by manual. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 161: 3-14.2 Statistics

    3-14.2 Statistics The section describes to shows the basic GVRP Port statistics for all switch ports. The statistics relate to the current selected unit, as reflected by the page header. Web Interface To display GVRP Port statistics in the web interface: 1.
  • Page 162: Mrp

     The Port column shows the list of ports for which you can configure MRP settings. There are 2 types configuration settings which can be configured on per port bases. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 163 • Timer Values • Applicantion • Attribute Type • MRP Applicant • Periodic Tx Timer Values : • To set the MRP join timer, leave timer and .leave all timers, units is Micro-second. Three different timers can be configured on this page: Join Timer :The default value for Join timer is 200ms.
  • Page 164: 3-15.2 Statistics

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the MRP Port configuration information by manual Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 165: Mvrp

    3-16 MVRP The Multiple VLAN Registration Protocol (MVRP) defines an MRP application that provides the VLAN registrations service. MVRP provides a mechanism for dynamic maintenance of the contents of Dynamic VLAN Registration Entries for each VLAN, and for propagating the information they contain to other Bridges.
  • Page 166 To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the MVRP Port configuration information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 167: 3-16.2 Statistics

    3-16.2 Statistics This page shows the basic MVRP Port statistics for all switch ports. The statistics relate to the current selected unit, as reflected by the page header. Web Interface To display MVRP Port statistics in the web interface: 1. Click MVRP statistics. 2.
  • Page 168: Qos

    3. Click the save to save the setting. 4. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values Figure 3-17.1: The QoS Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 169 Parameter description: Port :  The port number for which the configuration below applies. QoS class :  Controls the default QoS class, i.e., the QoS class for frames not classified in any other way. There is a one to one mapping between QoS class, queue and priority. A QoS class of 0 (zero) has the lowest priority.
  • Page 170: 3-17.2 Port Policing

    Figure 3-17.2: The QoS Ingress Port Policers Configuration Parameter description: Port :  The logical port for the settings contained in the same row. Click on the port number in order to configure the schedulers. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 171: Flow Control

    Enabled :  To evoke which Port you need to enable the QoS Ingress Port Policers function. Rate :  To set the Rate limit value for this port, the default is 500. Unit :  To scroll to select what unit of rate includes kbps, Mbps, fps and kfps. The default is kbps. Flow Control : ...
  • Page 172: 3-17.3 Port Scheduler

    1. Click Configuration, QoS, Port Schedulers 2. Display the QoS Egress Port Schedulers Figure 3-17.3: The QoS Egress Port Schedules Click the Port index to set the QoS Egress Port Schedulers Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 173 If you select the scheduler mode with wighted then the screen will change as the figure. Parameter description: Port :  The logical port for the settings contained in the same row. Click on the port number in order to configure the schedulers. Mode : ...
  • Page 174 Controls the unit of measure for the port shaper rate as "kbps" or "Mbps". The default value is "kbps". . Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 175: 3-17.4 Port Shaping

    3-17.4 Port Shaping This section provides an overview of QoS Egress Port Shaping for all switch ports. Others the user could get all detail information ot the ports belong to the current selected unit, as reflected by the page header. Web Interface To display the QoS Port Shapers in the web interface: 1.
  • Page 176 Controls the unit of measure for the queue shaper rate as "kbps" or "Mbps". The default value is "kbps". Queue Shaper Excess :  Controls whether the queue is allowed to use excess bandwidth. Queue Scheduler Weight :  Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 177 Controls the weight for this queue. The default value is "17". This value is restricted to 1- 100. This parameter is only shown if "Scheduler Mode" is set to "Weighted". Queue Scheduler Percent :  Shows the weight in percent for this queue. This parameter is only shown if "Scheduler Mode"...
  • Page 178: 3-17.5 Port Tag Remarking

    Mapped: Use mapped versions of QoS class and DP level. Tag Remarking Mode :  To scroll to select the tag remarking mode for this port. Classified: Use classified PCP/DEI values. Default: Use default PCP/DEI values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 179 Mapped: Use mapped versions of QoS class and DP level. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Cancel – Click to cancel the changes.
  • Page 180: 3-17.6 Port Dscp

    The Port column shows the list of ports for which you can configure dscp ingress and egress settings. Ingress :  In Ingress settings you can change ingress translation and classification settings for Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 181 individual ports. There are two configuration parameters available in Ingress: 1. Translate : To Enable the Ingress Translation click the checkbox 2. Classify: Classification for a port have 4 different values • Disable: No Ingress DSCP Classification. • DSCP=0: Classify if incoming (or translated if enabled) DSCP is 0. •...
  • Page 182: 3-17.7 Dscp-Based Qos

    5. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values Figure 3-17.7: The DSCP-Based QoS Ingress Classification Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 183 Parameter description: DSCP : • Maximum number of support ed DSCP values are 64. Trust : • Click to check if the DSCP value is trusted. QoS Class : • QoS Class value can be any of (0-7) DPL : •...
  • Page 184: 3-17.8 Dscp Translation

    4. Click the save to save the setting 5. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values Figure 3-17.8: The DSCP Translation Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 185 Parameter description: DSCP :  Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63. Ingress :  Ingress side DSCP can be first translated to new DSCP before using the DSCP for QoS class and DPL map.
  • Page 186: 3-17.9 Dscp Classification

    Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS Class and DPL value Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 187: 3-17.10 Qos Control List Configuration

    3-17.10 QoS Control List Configuration The section shows the QoS Control List(QCL), which is made up of the QCEs. Each row describes a QCE that is defined. The maximum number of QCEs is 256 on each switch. Click on the lowest plus sign to add a new QCE to the list. Web Interface To configure the QoS Control List parameters in the web interface: 1.
  • Page 188: Key Parameters

    Tag Value of Tag field can be 'Any', 'Untag' or 'Tag' VID Valid value of VLAN ID can be any value in the range 1-4095 or 'Any'; user can enter either a specific value or a range of VIDs Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 189 PCP Priority Code Point: Valid value PCP are specific(0, 1, 2, 3, 4, 5, 6, 7) or range (0-1, 2- 3, 4-5, 6-7, 0-3, 4-7) or 'Any'. DEI Drop Eligible Indicator: Valid value of DEI can be any of values between 0, 1 or 'Any' . SMAC Source MAC address: 24 MS bits (OUI) or 'Any'.
  • Page 190 Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 191: 3-17.11 Qcl Status

    3-17.11 QCL Status The section will let you know how to configure and shows the QCL status by different QCL users. Each row describes the QCE that is defined. It is a conflict if a specific QCE is not applied to the hardware due to hardware limitations. The maximum number of QCEs is 256 on each switch.
  • Page 192 To evoke the auto-refresh icon then the device will refresh the information automatically. Resolve Conflict :  Click it to resolve the conflict issue. Upper right icon (Refresh):  You can click them for refresh the QCL information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 193: 3-17.12 Storm Control

    3-17.12 Storm Control The section allows user to configure the Storm control for the switch. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table.
  • Page 194: Thermal Protection

    4. Click the save to save the setting. 5. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values. Figure 3-18.1: The Thermal Protection Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 195 Parameter description: Temperature settings for priority groups The temperature at the ports with the corresponding priority will be turned off. Priority :  The criteria index for thermal protect trigger temperature, The index from 0 to 3. Temperature :  To set the temperature criterion to trigger the thermal protect.
  • Page 196: 3-18.2 Status

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the port current temperature information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 197: S-Flow Agent

    3-19 s-Flow Agent The sFlow Collector configuration for the switch can be monitored and modified here. Up to 1 Collector is supported. This page allows for configuring sFlow collector IP type, sFlow collector IP Address, Port Number, for each sFlow Collector. 3-19.1 Collector The "Current "...
  • Page 198 200-1500 bytes. The default is 1400 bytes. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 199: 3-19.2 Sampler

    3-19.2 Sampler The section display the sFlow sampler what you set or you can edit it for your requirement. That will help user based on a defined sampling rate, an average of 1 out of N packets/operations is randomly sampled. This type of sampling does not provide a 100% accurate result, but it does provide a result with quantifiable accuracy.
  • Page 200 To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the sFlow Sampler information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 201: Easy Port

    3-20 Easy Port Easy Port provides a convenient way to save and share common configurations. You can use it to enable features and settings based on the location of a switch in the network and for mass configuration deployments across the network. You could easy to implement included Voice IP phone, Wireless Access Point and IP Camera…etc.
  • Page 202 To scroll to enable or disable the Spanning Tree BPDU Guard function on the Easy Port. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 203: Mirroring

    3-21 Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. Mirror Configuration is to monitor the traffic of the network.
  • Page 204 Because of this, mode for the selected mirror port is limited to Disabled or Rx only. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 205: Trap Event Severity

    3-22 Trap Event Severity The function, is used to set an Alarm trap and get the Event log. The Trap Events onfiguration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. Web Interface To configure the Trap Event Severity Configuration in the web interface: 1.
  • Page 206: Smtp Configuration

    Email address that would like to receive the alarm message. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 207: Upnp

    3-24 UPnP UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components.
  • Page 208: Loop Detection

    6. If you want to cancel the setting then you need to click the Reset button. It will revert to previous saved values. Figure 3-25.1: The Loop Detection Configuration. Parameter description: Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 209 Port No:  Display the port number. The number is 1 – 10. State :  When Port No is chosen, and enable port’s Loop detection, the port can detect loop happens. When Port-No is chosen, enable port’s Loop detection, and the port detects loop happen, port will be locked.
  • Page 210: Chapter 4. Security

    3. Select Maximum Dynamic Clients (0, 1, 2, Unlimited) of the specific port in the Mode of Port Mode Configuration. 4. Click Save. Figure 4-1.1: The IP Source Guard Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 211 Parameter description: Mode of IP Source Guard Configuration :  Enable the Global IP Source Guard or disable the Global IP Source Guard. All configured ACEs will be lost when the mode is enabled. Port Mode Configuration :  Specify IP Source Guard is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, IP Source Guard is enabled on this given port.
  • Page 212: 4-1.2 Static Table

    IP Mask for the new entry. Click "Save". Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 213: 4-1.3 Dynamic Table

    4-1.3 Dynamic Table The section describes to configure the Dynamic IP Source Guard Table parameters of the switch. You could use the Dynamic IP Source Guard Table configure to manage the entries. Web Interface To configure a Dynamic IP Source Guard Table Configuration in the web interface: 1.
  • Page 214: Arp Inspection

    1. Select “Enabled” in the Mode of ARP Inspection Configuration. 2. Select “Enabled” of the specific port in the Mode of Port Mode Configuration. 3. Click Save. Figure 4-2.1: The ARP Inspection Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 215 Parameter description: Mode of ARP Inspection Configuration :  Enable the Global ARP Inspection or disable the Global ARP Inspection. Port Mode Configuration :  Specify ARP Inspection is enabled on which ports. Only when both Global Mode and Port Mode on a given port are enabled, ARP Inspection is enabled on this given port.
  • Page 216: 4-2.2 Static Table

    MAC address, and IP address for the new entry. Click "Save". Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 217: 4-2.3 Dynamic Table

    4-2.3 Dynamic Table The section describes to configure the Dynamic ARP Inspection Table parameters of the switch. The Dynamic ARP Inspection Table contains up to 1024 entries, and is sorted first by port, then by VLAN ID, then by MAC address, and then by IP address. Web Interface To configure a Dynamic ARP Inspection Table Configuration in the web interface: 1.
  • Page 218: Dhcp Snooping

    Enabled: Enable DHCP snooping mode operation. When DHCP snooping mode operation is enabled, the DHCP requests messages will be forwarded to trust ports and only allow reply packets from trusted ports. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 219 Disabled: Disable DHCP snooping mode operation. Port Mode :  Indicates the DHCP snooping port mode. Possible port modes are: Trusted: Configures the port as trusted source of the DHCP messages. Untrusted: Configures the port as untrusted source of the DHCP messages. Buttons: ...
  • Page 220: 4-3.2 Statistics

    The number of lease query (option 53 with value 10) packets received and transmitted. Rx and Tx Lease Unassigned :  The number of lease unassigned (option 53 with value 11) packets received and transmitted. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 221 Rx and Tx Lease Unknown :  The number of lease unknown (option 53 with value 12) packets received and transmitted. Rx and Tx Lease Active :  The number of lease active (option 53 with value 13) packets received and transmitted. Auto-refresh : ...
  • Page 222: Dhcp Relay

    (option 82) into a DHCP message when forwarding to DHCP server and removes it from a DHCP message when transferring to DHCP client. It only works when DHCP relay operation mode is enabled. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 223 Disabled: Disable DHCP relay information mode operation. Relay Information Policy :  Indicates the DHCP relay information option policy. When DHCP relay information mode operation is enabled, if agent receives a DHCP message that already contains relay agent information it will enforce the policy. And it only works under DHCP if relay information operation mode is enabled.
  • Page 224: 4-4.2 Statistics

    The number of relayed packets from server to client. Transmit Error :  The number of packets that resulted in error while being sent to servers. Receive from Client :  The number of received packets from server. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 225 Receive Agent Option :  The number of received packets with relay agent information option. Replace Agent Option :  The number of packets which were replaced with relay agent information option. Keep Agent Option :  The number of packets whose relay agent information was retained. Drop Agent Option : ...
  • Page 226: Nas

    9. Checked Guest VLAN Enabled. 10. Specify Guest VLAN ID. 11. Specify Max. Reauth. Count. 12. Checked Allow Guest VLAN if EAPOL Seen. 13. Click Save. Figure 4-5.1: The Network Access Server Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 227 Parameter description: Mode :  Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. Re-authentication Enabled :  If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Re-authentication Period. Re-authentication for 802.1X-enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached.
  • Page 228: Port Configuration

    The table has one row for each port on the selected switch and a number of columns, which are: Port :  The port number for which the configuration below applies. Admin State :  Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 229 If NAS is globally enabled, this selection controls the port's authentication mode. The following modes are available: Force Authorized :  In this mode, the switch will send one EAPOL Success frame when the port link comes up, and any client on the port will be allowed network access without authentication. Force Unauthorized : ...
  • Page 230 QoS Class or it's invalid, or the supplicant is otherwise no longer present on the port, the port's QoS Class is immediately reverted to the original QoS Class (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned). Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 231 This option is only available for single-client modes, i.e. • Port-based 802.1X • Single 802.1X RADIUS attributes used in identifying a QoS Class: Refer to the written documentation for a description of the RADIUS attributes needed in order to successfully identify a QoS Class. The User-Priority-Table attribute defined in RFC4675 forms the basis for identifying the QoS Class in an Access-Accept packet.
  • Page 232 Reset- Click to undo any changes made locally and revert to previous saved values. Upper right icon (Refresh):  You can click them for refresh the NAS Configuration by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 233: 4-5.2 Switch Status

    4-5.2 Switch Status The section describes to show the each port NAS status information of the switch. The status includes Admin State Port State, Last Source, Last ID, QoS Class, and Port VLAN ID. Web Interface To configure a NAS Switch Status Configuration in the web interface: 1.Checked “Auto-reflash”.
  • Page 234 To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the NAS Switch Status by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 235: 4-5.3 Port Status

    4-5.3 Port Status The section describes to provides detailed NAS statistics for a specific switch port running EAPOL-based IEEE 802.1X authentication. Web Interface To configure a NAS Port Status Configuration in the web interface: 1. Specify Port which want to check. 2.
  • Page 236 As long as the backend server hasn't successfully authenticated the client, it is unauthenticated. If an authentication fails for one or the other reason, the client will remain Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 237 in the unauthenticated state for Hold Time seconds. Last Authentication :  Shows the date and time of the last authentication of the client (successful as well as unsuccessful). Auto-refresh :  To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh, Clear): ...
  • Page 238: Aaa

    2. Specify IP address or Hostname for TACACS+ Server. 3. Specify Authentication Port for TACACS+ Server (Default is 49). 4. Specify the Secret with TACACS+ Server. Figure 4-5.3.1: The Common Server Configuration Figure 4-5.3.2: The TACACS+ Accounting Configuration Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 239 Figure 4-5.3.3: The RADIUS Configuration Figure 4-5.3.4: The RADIUS Accounting Configuration Figure 4-5.3.4: The TACACS+ Authentication Configuration Parameter description: Timeout :  The Timeout, which can be set to a number between 3 and 3600 seconds, is the maximum time to wait for a reply from a server. If the server does not reply within this timeframe, we will consider it to be dead and continue with the next enabled server (if any).
  • Page 240 The table has one row for each TACACS+ Authentication Server and a number of columns, which are:  The TACACS+ Authentication Server number for which the configuration below applies. Enabled :  Enable the TACACS+ Authentication Server by checking this box. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 241 IP Address/Hostname :  The IP address or hostname of the TACACS+ Authentication Server. IP address is expressed in dotted decimal notation. Port :  The TCP port to use on the TACACS+ Authentication Server. If the port is set to 0 (zero), the default port (49) is used on the TACACS+ Authentication Server.
  • Page 242: 4-6.2 Radius Overview

    The IP address and UDP port number (in <IP Address>:<UDP Port> notation) of this server. State :  The current state of the server. This field takes one of the following values: Disabled: The server is disabled. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 243 Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept accounting attempts. Dead (X seconds left): Accounting attempts were made to this server, but it did not reply within the configured timeout.
  • Page 244: 4-6.3 Radius Details

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh, Clear):  You can click them for refresh the RADIUS Statistics information by manual. Others you can click the clear to clean up all entries. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 245: Port Security

    4-7 Port Security This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses. 4-7.1 Limit Control This section shows you to to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses.
  • Page 246 MAC addresses will be removed from the port, and no new address will be learned. Even if the link is physically disconnected and reconnected on the port (by Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 247 disconnecting the cable), the port will remain shut down. There are three ways to re-open the port: 1) Boot the switch, 2) Disable and re-enable Limit Control on the port or the switch, 3) Click the Reopen button. Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port, both the "Trap" and the "Shutdown"...
  • Page 248: 4-7.2 Switch Status

    The full name of a module that may request Port Security services. Abbr :  A one-letter abbreviation of the user module. This is used in the Users column in the port status table. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 249 Port Status :  The table has one row for each port on the selected switch and a number of columns, which are: Port :  The port number for which the status applies. Click the port number to see the status for this particular port.
  • Page 250: 4-7.3 Port Status

    To evoke the auto-refresh icon then the device will refresh the information automatically. Upper right icon (Refresh):  You can click them for refresh the Port Security Port Status information by manual. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 251: Access Management

    4-8 Access Management This section shows you to configure access management table of the Switch including HTTP/HTTPS, SNMP, and TELNET/SSH. You can manage the Switch over an Ethernet LAN, or over the Internet. 4-8.1 Configuration This section shows you how to configure access management table of the Switch. The maximum entry number is 16.
  • Page 252 IP address range provided in the entry. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 253: 4-8.2 Statistics

    4-8.2 Statistics This section shows you a detailed statistics of the Access Management including HTTP, HTTPS, SSH. TELNET, and SSH. Web Interface To configure an Assess Management Statistics in the web interface: 1. Checked “Auto-refresh”. Figure 4-8.2: The Access Management Statistics Parameter description: Interface : ...
  • Page 254: Ssh

    Enabled: Enable SSH mode operation. Disabled: Disable SSH mode operation. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 255: Https

    4-10 HTTPs This section shows you how to use HTTPS to securely access the Switch. HTTPS is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication via the browser. Web Interface To configure a HTTPS Configuration in the web interface: 1.
  • Page 256: Auth Method

    This is only possible if the Authentication Method is set to a value other than 'none' or 'local'. Buttons:  Save – Click to save changes. Reset- Click to undo any changes made locally and revert to previous saved values. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 257: Chapter 5. Maintenance

    Maintenance Chapter 5. This chapter describes all of the switch Maintenance configuration tasks to enhance the performance of local network including Restart Device, Firmware upgrade, Save/Restore, Import/Export, and Diagnostics. 5-1 Restart Device This section describes how to restart switch for any maintenance needs. Any configuration files or scripts that you saved in the switch should still be available afterwards.
  • Page 258: Firmware

    10 Hz while the firmware update is in progress. Do not restart or power off the device at this time or the switch may fail to function afterwards. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 259: 5-2.2 Firmware Selection

    5-2.2 Firmware Selection Due to the switch supports Dual image for firmware redundancy purpose. You can select what firmware image for your device start firmware or operating firmware. This page provides information about the active and alternate (backup) firmware images in the device, and allows you to revert to the alternate image.
  • Page 260 3. The firmware version and date information may be empty for older firmware releases. This does not constitute an error. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 261: Save / Restore

    5-3 Save / Restore This section describes how to save and restore the Switch configuration including reset to Factory Defaults, Save Start, Save Users, Restore Users for any maintenance needs. 5-3.1 Factory Defaults This section describes how to reset the Switch configuration to Factory Defaults. Any configuration files or scripts will recover to factory default values.
  • Page 262: 5-3.3 Save User

    1. Chick Restore User. 2. Click Yes. Figure 5-3.4: The Restore the Backup Configuration Parameter description: Buttons:  Save – Click the “Save” button to restore the Backup Configuration to the switch. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 263: Export / Import

    5-4 Export / Import This section describes how to export and import the Switch configuration. Any current configuration files will be exported as XML format. 5-4.1 Export Config This section describes to export the Switch Configuration for maintenance needs. Any current configuration files will be exported as XML format.
  • Page 264: 5-4.2 Import Config

    Click the “Browse...” button to search the Configuration URL and filename. Upload:  Click the “Upload” button then the switch will start to upload the configuration from configuration stored location PC or Server. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 265: Diagnostics

    5-5 Diagnostics This section provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed. The basic system check includes ICMP Ping, ICMPv6, and VeriPHY Cable Diagnostics 5-5.1 Ping This section allows you to issue ICMP PING packets to troubleshoot IPv6 connectivity issues.
  • Page 266: 5-5.2 Ping6

    64 bytes from 10.10.132.20: icmp_seq=3, time=0ms 64 bytes from 10.10.132.20: icmp_seq=4, time=0ms Sent 5 packets, received 5 OK, 0 bad You can configure the following properties of the issued ICMP packets: Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 267: 5-5.3 Veriphy

    5-5.3 VeriPHY This section is used for running the VeriPHY Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds. If all ports are selected, this can take approximately 15 seconds. When completed, the page refreshes automatically, and you can view the cable diagnostics results in the cable status table.
  • Page 268: Glossary Of Web-Based Management

    A. Glossary of Web-based Management ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.
  • Page 269 (Also Port Aggregation, Link Aggregation). ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP address into a physical address, such as an Ethernet address. ARP allows a host to communicate with other hosts when only the Internet address of its neighbors is known. Before using IP, the host sends a broadcast ARP request containing the Internet address of the desired destination system.
  • Page 270 An IPv4 dotted decimal address has the form x.y.z.w, where x, y, z, and w are decimal numbers between 0 and 255. DSCP DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet classification purposes. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 271 EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in the Ethernet MAC header, defined by the Ethernet networking standard.
  • Page 272: Igmp Querier

    However, IPv4 is still the protocol of choice for most of the Internet. IPMC IPMC is an acronym for IP MultiCast. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 273: Mac Table

    IP Source Guard IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
  • Page 274 NFS allows the system administrator to store resources in a central location on the network, providing authorized users continuous access to them, which means NFS supports sharing of files, printers, and other resources as persistent storage over a Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 275 computer network. NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (datagrams) as transport layer. OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier ethernet functionality. MEP functionality like CC and RDI is based on this Optional TLVs.
  • Page 276 A communications network transports a multitude of applications and data, including high- quality video and delay-sensitive data such as real-time voice. Networks must provide secure, predictable, measurable, and sometimes guaranteed services. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 277 Achieving the required QoS becomes the secret to a successful end-to-end business solution. Therefore, QoS is the set of techniques to manage network resources. RARP RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, such as an Ethernet address.
  • Page 278 Common network applications that use TCP include the World Wide Web (WWW), e-mail, and File Transfer Protocol (FTP). Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.
  • Page 279 TELNET TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TFTP TFTP is an acronym for Trivial File Transfer Protocol. It is transfer protocol that uses the User Datagram Protocol (UDP) and provides file writing and reading, but it does not provide directory service and security features.
  • Page 280 Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can perform QoS-related configuration for voice data, ensuring the transmission priority of voice traffic and voice quality. Publication date: August, 2012 Revision 1.0 Welltech Technology Co., Ltd.

Table of Contents