Linksys Table of Contents Table of Contents Chapter 1: Getting Started Views Starting the Web-based Configuration Utility Groups Launching the Configuration Utility Users Interface Naming Conventions Communities Window Navigation Notification Filters Configuring with Menu Command line Interface SNMPv1/v2 Notification Recipients...
Page 3
Linksys Table of Contents Feature Configuration Feature Configuration LLDP MED Ports IGMP/MLD Snooping LLDP Local Information Multicast Router Ports LLDP Neighbor Information Forward All LLDP MED Network Policy Unregistered Multicast Chapter 6: VLAN Management . . . . . . . . . . . . . . . . . . .39...
Page 4
Linksys Table of Contents Interface Settings Queue Scheduling Chapter 12: Security CoS/802 1p to Queue Management Security DSCP to Queue User Access & Accounts Bandwidth Control Access Authentication Egress Shaping Access Profile Basic QoS Access Profile Rules QoS Statistics RADIUS...
Linksys Table of Contents CHAPTER 1 Getting Started STEP 2 Enter the IP address of the device you are configuring in the address bar on the browser, and then press Enter NOTE: When the device is using the factory default IP address of 192 168 1 251, its...
Linksys Table of Contents Interface Naming Conventions Apply Click to apply changes to the Running Configuration on the device If the device is rebooted, the Running Within the GUI, interfaces are denoted by linking the following elements: Configuration is lost unless it is saved to the Startup...
Page 7
Linksys Table of Contents Configuring with Menu Command Line Interface To configure the device through the menu CLI, do the following: 1 Log on to the device through telnet The following menu is displayed: 2 Enter your user name and password...
Linksys Table of Contents CHAPTER 2 System Status Firmware Version—Firmware version number • Boot Code Version—Boot version number • Hardware Version —Hardware version number of the device • Serial Number—Serial number • System Status Device Status Fan Status—Applicable only to models that have fans The following •...
Linksys Table of Contents Bytes Received—Number of octets received, including bad packets and Frames of 512 to 1023 Bytes—Number of frames, containing 512-1023 • • FCS octets, but excluding framing bits bytes that were received Drop Events—Number of packets dropped Packets of 1024 and More Bytes—Number of frames, containing...
Linksys Table of Contents STEP 4 Click Apply The entry is added to the History Control Table page, and Jabbers—Total number of received packets that were longer than 2000 • the Running Configuration file is updated octets This number excludes frame bits, but includes FCS octets that had...
Linksys Table of Contents Trap and Event Log—Add a log entry to the Event Log table and send To enter RMON alarms: • a trap to the remote log server when the alarm goes off STEP 1 Click System Status > RMON > Alarms All previously-defined alarms Owner—Enter the device or user that defined the event...
Linksys Table of Contents Falling Event—Select an event to be performed when a falling event Broadcast Packets—Good Broadcast packets transmitted • • is triggered To clear or view statistics counters, do the following: • STEP 4 Click Apply The RMON alarm is saved to the Running Configuration file Click Refresh to refresh the counters on the page •...
Linksys Linksys Table of Contents Table of Contents Chapter 3 Quick Start Quick Start This section describes how to view device statistics To simplify device configuration through quick navigation, the Quick Start page provides links to the most commonly used pages...
Linksys Table of Contents Chapter 4 System Management To set the idle session timeout for various types of sessions: STEP 1 Click Configuration > System Management > Management Session Timeout STEP 2 Select the timeout for the following sessions from the corresponding...
Linksys Table of Contents System Time NOTE: System time can be set manually by the user dynamically from an SNTP server The DHCP server must supply DHCP option 100 in order for dynamic time If an SNTP server is chosen, the manual time settings are overwritten when...
Linksys Table of Contents SNTP—If you enable this, the system time is obtained from an SNTP server Time Set Offset—Enter the number of minutes offset from GMT ranging • • To use this feature, you must also configure a connection to an SNTP server from1—1440 The default is 60...
Page 17
Linksys Table of Contents SNTP Server—Select if the SNTP server is going to be identified by its IP • NOTE: address or if you are going to select a well-known SNTP server by name To specify a Unicast SNTP server by name, you must first configure DNS...
Linksys Table of Contents SNMP SNMPv3 In addition to the functionality provided by SNMPv1 and v2, SNMPv3 applies This section describes the Simple Network Management Protocol (SNMP) access control and new trap mechanisms to SNMPv1 and SNMPv2 PDUs feature that provides a method for managing network devices...
Table of Contents STEP 3 Input the unique community string in the Community String field LGS326P 24-Port Smart Gigabit PoE Switch enterprises(1) linksys(3955) smb(1000) 3 26 2 STEP 4 Optionally, define a notification filter(s) by using the Notification Filter page...
Page 20
Linksys Table of Contents First 4 octets—First bit = 1, the rest is the IANA enterprise number well- known names can be used to specify the root of the desired subtree or • an OID can be entered (see Model OIDs) Fifth octet—Set to 3 to indicate the MAC address that follows...
Page 21
Linksys Table of Contents Groups Authentication Read View—Only authenticated users are allowed to read • the view By default, all users or community of a group can access all the In SNMPv1 and SNMPv2, a community string is sent along with the SNMP •...
Page 22
Linksys Table of Contents Authentication and Privacy—Authenticates SNMP messages, and Engine—User is connected to a different SNMP entity besides the • • encrypts them local device If the remote Engine ID is defined, remote devices receive inform messages, but cannot make requests for information Authorized View—Select the Read, Write and Notify views associated with...
Linksys Table of Contents Communities are only defined in SNMPv1 and v2 because SNMPv3 works with IP Address—Enter the SNMP management station IP address • users instead of communities The users belong to groups that have access Community—Enter the community name used to authenticate the •...
Page 24
Linksys Table of Contents The Notification Filter page contains notification information for each An SNMP notification is a message sent from the device to the SNMP • filter The table is able to filter notification entries by Filter Name management station indicating that a certain event has occurred, such as a...
Page 25
Linksys Table of Contents Community—Select from the pull-down the community string of the trap Notification Type—Select whether to send traps or informs If both are • • manager Community String names are generated from those listed in the required, two recipients must be created Community page User Name—Select from the drop-down list the user to whom SNMP...
Linksys Table of Contents Overview Selecting a severity level to be stored in a log causes all of the higher severity events to be automatically stored in the log Lower severity events are not Each log is a set of messages describing system events...
Linksys Table of Contents Remote Log Servers Description—Enter a server description • Minimum Logging Level—Select the minimum level of system log • The Remote Log Servers page enables defining remote SYSLOG servers where messages to be sent to the server...
Linksys Linksys Table of Contents Table of Contents Chapter 5 Port Management Configure Port Settings To configure port settings: STEP 1 Click Configuration > Port Management > Ports STEP 2 Select Enable to support jumbo packets of up to 10 KB in size If...
Linksys Linksys Table of Contents Table of Contents Port Speed—Configure the speed of the port The port type determines STEP 5 Click Apply The port settings are written to the Running • the available speeds You can designate this field only when port auto-...
Linksys Linksys Table of Contents Table of Contents By IP and MAC Addresses—Based on the destination and source IP 1 Disable LACP on the LAG to make it static Assign up to eight member • addresses for IP packets, and destination and source MAC addresses for...
Linksys Linksys Table of Contents Table of Contents LACP—Select to enable LACP on the selected LAG This makes it a The Green Ethernet feature can reduce overall power usage in the • dynamic LAG This field can only be enabled after moving a port to the...
Page 32
Linksys Linksys Table of Contents Table of Contents Interactions Between Features LLDP is used to select the optimal set of parameters for both devices If LLDP is not supported by the link partner, or is disabled, 802 3 EEE will still be...
Page 33
Linksys Linksys Table of Contents Table of Contents Port LEDs—Select to disable port LEDs When disabled, ports do not • NOTE: display link status, activity, etc The window displays the Short Reach, Energy Detect and EEE settings for Short Reach—Select to globally enable Short Reach mode •...
Page 34
Linksys Linksys Table of Contents Table of Contents See Device Models for information concerning PoE support on various Class Limit—Power is limited based on the class of the connected PD For • models PoE provides the following features: these settings to be active, the system must be in PoE Class Limit mode...
Linksys Linksys Table of Contents Table of Contents If at any time during the connectivity an attached PD requires more power STEP 3 Click Apply to save the PoE properties from the device than the configured allocation allows (no matter if the device...
Page 36
Linksys Linksys Table of Contents Table of Contents LLDP Power Priority Level—Port priority is low, high, or critical, for use when • the power supply is low For example, if the power supply is running at 99% usage and port 1 is prioritized as high, but port 3 is prioritized as low,...
Page 37
Linksys Linksys Table of Contents Table of Contents If LLDP is globally disabled, the device can be configured to discard, guidelines on LLDP configuration LLDP configuration pages are accessible • VLAN-aware flooding, or VLAN-unaware flooding of all incoming under the Configuration > Port Management > Discovery LLDP menu...
Linksys Linksys Table of Contents Table of Contents power value—Port power value 802 3 MAC-PHY—Duplex and bit rate capability and the current duplex • • and bit rate settings of the sending device It also indicates whether the STEP 2 Enter the following fields current settings are due to auto-negotiation or manual configuration LLDP Status—Select to enable LLDP on the device (enabled by default)
Linksys Linksys Table of Contents Table of Contents Inventory—Whether Inventory TLV is transmitted STEP 2 Select the desired port from the Port list • STEP 2 The message at the top of the page indicates whether the generation This page displays the following groups of fields (the actual fields displayed...
Linksys Linksys Table of Contents Table of Contents Device Class—LLDP-MED endpoint device class The possible device Untagged—Indicates the network policy is defined for • • classes are: untagged VLANs Endpoint Class 1—Generic endpoint class, offering basic LLDP services User Priority—Network policy user priority •...
Linksys Linksys Table of Contents Table of Contents Supported System Capabilities—Primary functions of the device The Model Name—Device model name • • capabilities are indicated by two octets Bits 0 through 7 indicate Other, Asset ID—Asset ID • Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and...
Page 42
Linksys Linksys Table of Contents Table of Contents Setting LLDP MED Network Policy Layer 2 Priority—Select the traffic priority applied to traffic defined by • this network policy This is the CoS value An LLDP-MED network policy is a related set of configuration settings for DSCP Value—Select the DSCP value to associate with application data...
Linksys Linksys Table of Contents Table of Contents Chapter 6 VLAN Management When a frame enters a VLAN-aware device, it is classified as belonging to a VLAN, based on the four-byte VLAN tag in the frame If there is no VLAN tag in the frame or the frame is priority-tagged only,...
Page 44
Linksys Linksys Table of Contents Table of Contents Guest VLAN—For more information refer to Security: Network Access It is distinct, non-static/non-dynamic, and all ports are untagged • • Control members by default Default VLAN—For more information refer to VLANs It cannot be deleted •...
Page 45
Linksys Linksys Table of Contents Table of Contents Interfaces VLANs - Creating VLANs You can create a VLAN, but this has no effect until the VLAN is attached to at The Interface Settings page displays and enables configuration of VLAN-...
Page 46
Linksys Linksys Table of Contents Table of Contents Admit Tagged Only—The interface accepts only tagged frames Trunk—The interface is an untagged member of one VLAN at most, • • and is a tagged member of zero or more VLANs A port configured in Admit Untagged Only—The interface accepts only untagged and...
Linksys Linksys Table of Contents Table of Contents are to send and receive untagged packets to and from the VLAN Otherwise, STEP 3 Click Apply The settings are modified and written to the Running traffic might leak from one VLAN to another...
Linksys Table of Contents Workflow STEP 2 Click Add STEP 3 Enter the values for the following fields: To define a MAC-based VLAN group: Interface—Enter a general interface (port/LAG) through which traffic is • 1 Assign a MAC address to a VLAN group ID (using the MAC-Based...
Page 49
Linksys Table of Contents Ethernet MAC address For more information about Telephony OUI, see and optionally remark the 802 1p of the voice streams by specifying the desired Telephony OUI CoS/802 1p values and using the remarking option under Telephony OUI...
Page 50
Linksys Table of Contents Aging Time—Enter the time delay to remove a port from the voice VLAN Telephony Source MAC Address (SRC)—The QoS values configured for • • after all of the MAC addresses of the phones detected on the ports have...
Linksys Linksys Table of Contents Table of Contents Chapter 7 Spanning Tree Rapid STP (RSTP) – Detects network topologies to provide faster • convergence of the spanning tree This is most effective when the network topology is naturally tree-structured, and therefore faster...
Linksys Linksys Table of Contents Table of Contents Maximum Age—Set the interval (in seconds) that the device can wait Use Global Settings—Select to use the settings defined in the • • without receiving a configuration message, before attempting to redefine...
Linksys Linksys Table of Contents Table of Contents RSTP Interfaces • Point to Point Status—Displays the point-to-point operational status if the Point to Point Administrative Status is set to Auto Rapid Spanning Tree Protocol (RSTP) enables a faster STP convergence •...
Page 54
Linksys Linksys Table of Contents Table of Contents 1 Set the STP Operation Mode to MSTP as described in the Spanning switches from another MST region If they are separated, the region becomes Tree page two separate regions 2 Define MSTP instances Each MSTP instance calculates and builds a...
Linksys Table of Contents Bridge Priority—Set the priority of this bridge for the selected STEP 1 Click Configuration > Spanning Tree Management > MSTP Instance • MST instance Interface Action—Select either add VLAN or remove VLAN STEP 2 Enter the parameters •...
Page 56
Linksys Table of Contents Alternate—The interface provides an alternate path to the root • device from the root interface Backup—The interface provides a backup path to the designated • port path toward the Spanning Tree leaves Backup ports occur when two ports are connected in a loop by a point-to-point link...
Linksys Table of Contents Chapter 8 MAC Address To prevent this table from overflowing, and to make room for new MAC addresses, an address is deleted if no corresponding traffic is received for a certain period This period of time is the aging interval...
Linksys Table of Contents MAC Address—Enter the interface MAC address Bridge—Forward the packet to all VLAN members • • Interface—Select an interface (unit/slot, port, or LAG) for the entry Discard—Drop the packet • • STEP 4 Click Apply A new MAC address is reserved Status—Select how the entry is treated The options are:...
Linksys Table of Contents Chapter 9 Multicast Typical Multicast Setup While Multicast routers route Multicast packets between IP subnets, • Multicastcapable Layer 2 switches forward Multicast packets to registered nodes within a LAN or VLAN A typical setup involves a router that forwards the Multicast streams between...
Page 60
Linksys Table of Contents Multicast registration is the process of listening and responding to Multicast If filtering is enabled, Multicast frames are forwarded to a subset of the ports in registration protocols The available protocols are IGMP for IPv4 the relevant VLAN as defined in the Multicast Forwarding Data Base Multicast...
Linksys Table of Contents By IPv4 Group Address—Select to enable the IPv4 group address • Which ports are connected to Multicast routers (Mrouters) that are • method for forwarding Multicast packets generating IGMP/MLD queries By Source Specific IPv4 Group Address—Select to enable the source- •...
Linksys Table of Contents • IGMP Querier Version—Select the IGMP version used if the device MLD Snooping Status—Select to enable MLD snooping globally on all • becomes the elected querier Select IGMPv3 if there are switches and/or interfaces Multicast routers in the VLAN that perform source-specific IP Multicast Auto-Learn MRouter Ports—Select to enable Auto Learn of the...
Linksys Table of Contents Dynamic—(Display only) The port is dynamically configured as a Multicast STEP 5 Click Apply. The Running Configuration file is updated. • router port by a IGMP/MLD query. To enable the dynamic learning of Unregistered Multicast Multicast router ports, go to the IGMP Snooping page.
Linksys Table of Contents There might be a difference between information on this page and, for The MAC Group Address FDB page has the following functions: example, information displayed in the MAC Group Address FDB page Assuming Query and view information from the MFDB, relating to a specific VLAN ID •...
Linksys Table of Contents STEP 5 Enter the parameters STEP 7 Click Search to display the port or LAG membership STEP 8 Select the way that each interface is associated with the VLAN ID—Defines the VLAN ID of the group to be added •...
Linksys Table of Contents Chapter 10 IP Interface IP address collisions occur when the same IP address is used in the same IP subnet by more than one device Address collisions require administrative actions on the DHCP server and/or the devices that collide with the device...
Page 67
Linksys Table of Contents Dynamic (DHCP)—Discover the IP address using DHCP from the STEP 2 Enter the parameters • management VLAN ARP Entry Aging Time (1-40000000)—Enter the number of seconds that • Static IP Address—Manually define a static IP address dynamic addresses can remain in the ARP table A dynamic address ages •...
Linksys Table of Contents Overview NOTE: The device does not support stateful address autoconfiguration from a The Internet Protocol version 6 (IPv6) is a network-layer protocol for DHCPv6 server packetswitched Internet works IPv6 was designed to replace IPv4, the predominantly deployed Internet protocol Send ICMPv6 Messages—Select to enable generating unreachable...
Linksys Linksys Table of Contents Table of Contents IPv6 Address—In Layer 2, the device supports a singleIPv6 interface Static—The default router was manually added to this table through the • • In addition to the default link local and Multicast addresses, the device...
Linksys Table of Contents Only one link local address is supported If a link local address exists on the State—Specifies the IPv6 neighbor status The values are: • interface, this entry replaces the address in the configuration Incomplete—Address resolution is working The neighbor has not •...
Linksys Linksys Table of Contents Table of Contents Chapter 11 IP Network IP Interface—Interface connected to DNS server • Preference—Each server has a preference value, a lower value means a • Operations higher chance of being used Configuration Source—Source of the server’s IP address (static or DHCPv4 •...
Page 72
Linksys Linksys Table of Contents Table of Contents Overview Option 82 DHCP Relay VLAN with IP DHCP Relay VLAN without IP Insertion Address Address DHCP snooping provides a security mechanism to prevent receiving false DHCP Disabled response packets and to log DHCP addresses It does this by treating ports on...
Page 73
Linksys Linksys Table of Contents Table of Contents DHCP Trusted Packet Handling DHCPREQUEST Forward to trusted Forward to trusted interfaces only interfaces only DHCPACK Filter Same as DHCPOFFER and an entry is added to the DHCP Snooping Binding database DHCPNAK...
Linksys Linksys Table of Contents Table of Contents DHCP Default Options • Verify MAC Address—Select to verify that the source MAC address of the Layer 2 header matches the client hardware address as appears in the Option Default State DHCP Header (part of the payload) on DHCP untrusted ports...
Linksys Linksys Table of Contents Table of Contents • When DHCP Snooping is disabled for a VLAN, the binding entries that were collected for that VLAN are removed. • If the database is full, DHCP Snooping continues to forward packets, but new entries are not created.
Linksys Table of Contents Chapter 12 Security After adding a user (as described below), the default user is removed from the system NOTE: It is not permitted to delete all users If all users are selected, the Delete button is disabled...
Linksys Table of Contents If an authentication method fails or the user has insufficient privilege Access Methods—Methods for accessing and managing the device: The • level, the user is denied access to the device If authentication fails at an authentication method for the selected access method is specified in authentication method, the device stops the authentication attempt;...
Linksys Table of Contents STEP 2 To change the active access profile, select a profile from the Active VLAN—Rule applies to VLANs • Access Profile drop down menu and click Apply This makes the Source IP Address—Select the type of source IP address to which the access...
Page 79
Linksys Table of Contents The selected access profile appears in the Profile Rule Table User Defined—Applies to only those types of IP addresses defined in • the fields STEP 3 Click Add to add a rule IP Version—Select the supported IP version of the source address: IPv6 •...
Page 80
Linksys Linksys Table of Contents Table of Contents The user-configurable, TCP port used for RADIUS server accounting is the same This overrides the default key string if one has been defined TCP port that is used for RADIUS server authentication and authorization...
Linksys Table of Contents Key String—Enter the key string used for authenticating and encrypting This is described in the figure below: • communication between the device and the RADIUS server This key must match the key configured on the RADIUS server If Use Default is selected,...
Linksys Table of Contents MAC-based—Supported in all authentication modes • Multi-Host Mode • In 802 1x-based authentication, the authenticator extracts the EAP • A port is authorized if there is at least one authorized client messages from the 802 1x messages (EAPOL frames) and passes them to...
Linksys Table of Contents When an authentication method finishes successfully for a client authenticated by a method with a lower priority, the attributes of the new method are applied When the new method fails, the client is left authorized with the old method 802.1x-Based Authentication...
Page 84
Linksys Table of Contents When a port is in multi-session mode and RADIUS-Assigned VLAN is enabled, STEP 11 Click Apply, and the Running Configuration file is updated the device automatically adds the port as an untagged member of the VLAN...
Linksys Table of Contents • Guest VLAN—Enable the use of a guest VLAN for unauthorized ports If Multiple Host (802 1x)—Supports port-based authentication with • a guest VLAN is enabled, all unauthorized ports automatically join the multiple clients per port VLAN selected in the Guest VLAN ID field If a port is later authorized, it is Multiple Sessions—Supports client-based authentication with...
Page 86
Linksys Table of Contents • Port—Number of the port • VLAN ID—VLAN where the host is learned or assigned • Session Time – Amount of time that the supplicant was logged on the port • Authentication Method—Method by which the last session was...
Page 87
Linksys Linksys Table of Contents Table of Contents Mode Behavior The following table describes how authenticated and non-authenticated traffic is handled in various situations Unauthenticated Traffic Authenticated Traffic With Guest VLAN Without Guest VLAN With Radius VLAN Without Radius VLAN...
Linksys Table of Contents Port Security Classic Lock—Locks the port immediately, regardless of the number • of addresses that have already been learned. Network security can be increased by limiting access on a port to users Limited Dynamic Lock—Locks the port by deleting the current •...
Page 89
Linksys Table of Contents • Port—Select the port for which storm control is enabled • Storm Control—Select to enable Storm Control • Storm Control Mode—Select one of the modes: Unknown Unicast, Multicast & Broadcast—Counts unknown Unicast, • Broadcast, and Multicast traffic towards the bandwidth threshold Multicast &...
Page 90
Linksys Linksys Table of Contents Table of Contents Chapter 13 Access Control List NOTE: If no match is found to any ACE in all relevant ACLs, the packet is dropped (as a default action) Because of this default drop action you must explicitly...
Linksys Linksys Table of Contents Table of Contents 1 Create one or more of the following types of ACLs: STEP 2 Click Add MAC-based ACL by using the MAC Based ACL page and the MAC STEP 3 Enter the name of the new ACL in the ACL Name field ACL names are...
Linksys Linksys Table of Contents Table of Contents NOTE: NOTE: Given a mask of 0000 0000 0000 0000 0000 0000 1111 1111 (which means ACLs are also used as the building elements of flow definitions for per-flow that you match on the bits where there is 0 and don’t match on the bits QoS handling (see QoS Advanced Mode) where there are 1’s) You need to translate the 1’s to a decimal integer and...
Linksys Linksys Table of Contents Table of Contents Shutdown—Drop packet that meets the ACE criteria and disable the Single Port—Enter a single TCP/UDP source port to which packets • • port to which the packet was addressed Ports are reactivated from...
Linksys Table of Contents STEP 3 Click Add Any—Match to all source ports • STEP 4 Enter the parameters Single Port—Enter a single TCP/UDP source port to which packets • are matched This field is active only if 800/6-TCP or 800/17-UDP is ACL Name—Displays the name of the ACL...
Page 95
Linksys Table of Contents STEP 4 Select an interface, and click Edit STEP 5 Select one of the following: MAC Based ACL—Select a MAC-based ACL to be bound to the interface • IPv4 Based ACL—Select an IPv4-Based ACL to be bound to the interface •...
Linksys Linksys Table of Contents Table of Contents Chapter 14 Quality of Service Assignment to Hardware Queues—Assigns incoming packets to • forwarding queues Packets are sent to a particular queue for handling as a function of the traffic class to which they belong See Queue Scheduling Other Traffic Class-Handling Attribute—Applies QoS mechanisms to...
Linksys Linksys Table of Contents Table of Contents Feature Configuration When the mode is changed, the following occurs: When disabling QoS, the shaper and queue setting (WRR/SP bandwidth • To select the QoS mode: setting) are reset to default values STEP 1 Click Configuration >...
Page 98
Linksys Linksys Table of Contents Table of Contents Weighted Round Robin (WRR)—In WRR mode, the number of packets STEP 3 Click Apply The queues are configured, and the Running • sent from the queue is proportional to the weight of the queue (the...
Linksys Linksys Table of Contents Table of Contents 802 1p—Displays the 802 1p priority tag values to be assigned to an • DSCP egress queue, where 0 is the lowest and 7 is the highest priority Queue Output Queue—Select the egress queue to which the 802 1p priority is •...
Linksys Linksys Table of Contents Table of Contents Ingress Rate Limit—Enter the maximum amount of bandwidth allowed STEP 4 Select the Interface • on the interface STEP 5 For each queue that is required, enter the following fields: Ingress Committed Burst Size—Enter the maximum burst size of data for •...
Linksys Linksys Table of Contents Table of Contents STEP 1 Click Configuration > Quality of Service > Basic QoS 30 Sec—Statistics are refreshed every 30 seconds • STEP 2 Select the Trust Mode while the device is in Basic mode The Trust 60 Sec—Statistics are refreshed every 60 seconds...
Linksys Linksys Table of Contents Table of Contents Chapter 15 Maintenance STEP 3 Click Apply and Reboot The parameters are copied to the Running Configuration file and the stack is rebooted File Management This section describes how system files are managed The following topics are...
Linksys Linksys Table of Contents Table of Contents The configuration files are text files and can be edited in a text editor, such as View the firmware image currently in use or select the image to be used • Notepad after they are copied to an external device, such as a PC...
Linksys Linksys Table of Contents Table of Contents Backup—Specifies that a copy of the file type is to be saved to a file on Bytes Transferred—How many bites were transferred in the process • • another device Status—Did the process succeed or fail •...
Linksys Linksys Table of Contents Table of Contents When restoring a configuration file to the Startup Configuration or a backup Interface—Select the link local interface (if IPv6 is used) from the list • configuration file, the new file replaces the previous file TFTP Server IP Address—Enter the IP address of the TFTP server...
Linksys Linksys Table of Contents Table of Contents Time Domain Reflectometry (TDR) technology tests the quality and • characteristics of a copper cable attached to a port Cables of up to 140 CAUTION: meters long can be tested These results are displayed in the Test Results...
Linksys Linksys Table of Contents Table of Contents No Cable—Cable is not connected to the port sometimes called a pong It measures the round-trip time and records any • packet loss Open Cable—Cable is connected on only one side •...
Linksys Linksys Table of Contents Table of Contents Result—Success or fail of ping Target IP Address—Select the target source interface whose IPv4 address • • will be used as the source IPv4 address for communication messages Number of Pings Sent—Numbers of responses sent •...
Page 109
The following fields are displayed: Destination Port—Port to which traffic is to be copied; the analyzer port • Click “Get Support” to go to the Linksys Small Business support website Source Port—Interface, port, from which traffic is sent to the analyzer port •...
Need help?
Do you have a question about the Smart Switch LGS3XX and is the answer not in the manual?
Questions and answers