SignaMax 065-7851 User Manual

SignaMax 065-7851 User Manual

16-port sfp + 8-port combo port gbe l2 plus managed switch
Hide thumbs Also See for 065-7851:
Table of Contents

Advertisement

Quick Links

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 065-7851 and is the answer not in the manual?

Questions and answers

Summary of Contents for SignaMax 065-7851

  • Page 3 SIGNAMAX 065-7851 L2 User's Manual 16-Port SFP + 8-Port Combo GbE L2 Plus Managed Switch Release 5. 79 © 2012, Manufacture Corporation. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies Publication date:Oct., 2012...
  • Page 4 The information in this document is subject to change without notice. Unless the explicit written permission of Manufacture Corporation, this document in whole or in part shall not be replicated or modified or amended or transmitted, in any from, or by any means manual, electric, electronic, electromagnetic, mechanical, optical or otherwise for any purpose.
  • Page 5 DISCLAIMER. EXCEPT AS PROVIDED ABOVE, THE SOFTWARE IS PROVIDED “AS IS ” AND MANUFACTURE AND ITS LICENSORS MAKE NO WARRANTIES, EXPRESS OR IMPLIED, WITH REPSECT TO THE SOFTWARE AND DOCUMENTAITON. MANUFACTURE AND ITS LICENSORS DISCLAIM ALL OTHER WARRANTIES, INCLUSIVE OF WITHOUT LIMITATION, IMPLIED WARRANTIES OR MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  • Page 6: Table Of Contents

    2-1-3-3. Switch Cascading in Topology ................23 2-1-4. Configuring the Management Agent of SIGNAMAX 065-7851 L2 ....26 2-1-4-1. Configuring the Management Agent of SIGNAMAX 065-7851 L2 through the Serial RS-232 Port ........................ 26 2-1-4-2. Configuring the Management Agent of SIGNAMAX 065-7851 L2 through the Ethernet Port .........................
  • Page 7 3-3-4. Ports ........................79 3-3-5. Port Isolation .....................81 3-3-6. Management VLAN....................82 3-4. MAC ..........................83 3-4-1. Mac Address Table .....................83 3-4-2. Static Filter ......................85 3-4-3. Static Forward ....................86 3-4-4. MAC Alias ......................88 3-4-5. MAC Table ......................90 3-5. GVRP.........................91 3-5-1. Config ........................91 3-5-2. Counter ......................95 3-5-3.
  • Page 8 3-16-4 IGMP Group Allow ..................218 3-16-5 IGMP Group Membership ................219 3-16-6 MVR ........................220 3-16-7 MVID ......................221 3-16-8 MVR Group Allow ..................222 3-16-9 MVR Group Membership ................223 3-17. A ..................224 LARM ONFIGURATION 3-17-1 Events ......................224 3-17-2 Email ......................226 3-18. DHCP S ....................227 NOOPING 3-18-1.
  • Page 9: Revision History

    Revision History Release Date Revision 5.33 2011/03/09 5.79 2012/10/24 Publication date:Oct., 2012 Revision A2...
  • Page 10: Caution

    Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: Touch the metal chassis of your computer to ground the static electrical charge •...
  • Page 11: Warning

    EN55022(2006)+A1:2007/CISPR class A 22:2006+A1:2006 IEC61000-4-2 (2001) 4K V CD, 8KV, AD IEC61000-4-3( 2002) 3V/m IEC61000-4-4(2004) 1KV – (power line), 0.5KV – (signal line) IEC61000-4-5 (2001) Line to Line: 1KV, Line to Earth: 2KV IEC61000-4-6 (2003) 130dBuV(3V) Level 2 IEC61000-4-8 (2001) 1A/m Voltage dips: >95%, 0.5period, 30%, 25periods...
  • Page 12 In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the SIGNAMAX 065-7851 L2 through the built-in CLI and web by RS-232 serial interface and Ethernet ports step-by-step.
  • Page 13: Introduction

    1. Introduction 1-1. Overview of SIGNAMAX 065-7851 L2 SIGNAMAX 065-7851 L2 , a 24-port Gigabit L2 Plus Managed Switch, is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. 16-Port 1000Mbps SFP and 8-Port Combo Gigabit TP/SFP Fiber dual media management Ethernet switch.
  • Page 14 Key Features in the Device • • • • QoS: Support Quality of Service by the IEEE 802.1P standard. There are two priority queue and packet transmission schedule. Spanning Tree: Support IEEE 802.1D, IEEE 802.1w (RSTP: Rapid Spanning Tree Protocol) standards. VLAN: Support Port-based VLAN and IEEE802.1Q Tag VLAN.
  • Page 15 with the router on its upstream interface through the exchange of IGMP messages. However, when acting as the proxy, the system performs the host portion of the IGMP task on the upstream interface as follows: When queried, sends group membership reports to the •...
  • Page 16 when forwarding DHCP requests from a DHCP client to a DHCP server via Trust Port. DHCP snooping can be configured on LAN switches to harden the security on the LAN to only allow clients with specific IP/MAC addresses to have access to the network. In short, DHCP snooping ensures IP integrity on a Layer 2 switched domain.
  • Page 17: Checklist

    1-2. Checklist Before you start installing the switch, verify that the package contains the following: SIGNAMAX 065-7851 L2 16-Port SFP + 8-Port Combo GbE L2 Plus Managed  Switch SFP Modules (optional)  Mounting Accessory (for 19” Rack Shelf) ...
  • Page 18 • Supports port mirror function • Supports the static trunk function • Supports 802.1Q VLAN • Supports user management and limits three users to login • Maximal packet length can be up to 9600 bytes for jumbo frame application • Supports DHCP Broadcasting Suppression to avoid network suspended or crashed •...
  • Page 19: Full View Of Signamax 065-7851 L2

    1-4. Full View of SIGNAMAX 065-7851 L2 Fig. 1-1 Full View of 065-7851 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 8 TP Gigabit Ethernet ports and 24 SFP fiber ports for optional removable modules on the front panel of the switch. LED display area, locating on the left side of the panel, contains a Power LED, which indicates the power status and 24 ports working status of the switch.
  • Page 20: Ac/Dc Power Input On The Rear Panel

    1-4-2. AC/DC Power Input on the Rear Panel One socket on the rear panel is for AC power input. AC Line 100-240V 50/60 Hz Fig. 1-3 Rear View of 065-7851 One socket on the rear panel is for DC power input. DC Power Input Fig.
  • Page 21 Fig. 1-4 Front View of 1000Base-SX/LX LC, SFP Fiber Transceiver Fig. 1-5 Front View of 1000Base-LX BiDi LC, SFP Fiber Transceiver Publication date:Oct., 2012 Revision A2...
  • Page 22: Installation

    ⇒ Be sure that power switch is OFF before you insert the power cord to power source • • • • Installing Optional SFP Fiber Transceivers to the SIGNAMAX 065-7851 L2 Note: If you have no modules, please skip this section.
  • Page 23 Gigabit 10/100/1000 TP device. Now, you can start having the switch in operation. • • • • AC Power On ( For SIGNAMAX 065-7851 L2 ) The switch supports 100-240 VAC, 50-60 Hz power supply. The power supply will automatically convert the local AC power source to DC power. It does not matter whether any connection plugged into the switch or not when power on, even modules as well.
  • Page 24: Installing Chassis To A 19-Inch Wiring Closet Rail

    2-1-2. Installing Chassis to a 19-Inch Wiring Closet Rail Fig. 2-2 Caution: Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis. Wear a grounding device for electrostatic discharge. ⇒ Screw the mounting accessory to the front side of the switch (See Fig. 2-2). ⇒...
  • Page 25: Switch Cascading In Topology

    Gigabit Fiber with multi-mode LC SFP module  Gigabit Fiber with single-mode LC SFP module  Gigabit Fiber with BiDi LC 1310nm SFP module  Gigabit Fiber with BiDi LC 1550nm SFP module  The following table lists the types of fiber that we support and those else not listed here are available upon request.
  • Page 26 Sum up all elements’ bit-time delay and the overall bit-time delay of wires/devices must be within Round Trip Delay (bit times) in a half-duplex network segment (collision domain). For full-duplex operation, this will not be applied. You may use the TP-Fiber module to extend the TP node distance over fiber optic and provide the long haul connection.
  • Page 27 1. The same VLAN members could not be in different switches. 2. Every VLAN members could not access VLAN members each other. 3. The switch manager has to assign different names for each VLAN groups at one switch. Case 2b: Port-based VLAN (See Fig.2-5). Fig.
  • Page 28: Configuring The Management Agent Of Signamax 065-7851 L2

    RS-232 console, CLI, and Web. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures. Section 2-1-4-1: Configuring the Management Agent of SIGNAMAX 065-7851 L2 through the Serial RS-232 Port...
  • Page 29 255.255.255.0. You can change the switch’s default IP address 192.168.1.1 to 10.1.1.1 and set the subnet mask to be 255.255.255.0. Then, choose your default gateway, may be it is 10.1.1.254. Default Value SIGNAMAX 065-7851 Your Network Setting IP Address 192.168.1.1 10.1.1.1...
  • Page 30: Configuring The Management Agent Of Signamax 065-7851 L2 Through The Ethernet Port

    Default Gateway = 192.168.1.254 Fig. 2-9 • • • • Managing SIGNAMAX 065-7851 L2 through Ethernet Port Before you communicate with the switch, you have to finish first the configuration of the IP address or to know the IP address of the switch. Then, follow the procedures listed below.
  • Page 31: Ip Address Assignment

    2-1-5. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication.
  • Page 32 Bit # 01 2 15 16 Network address Host address Class C: IP address range between 192.0.0.0 and 223.255.255.255. Each class C network has a 24-bit network prefix followed 8-bit host address. There are 2,097,152 (2^21)/24 networks able to be defined with a maximum of 254 (2^8 –2) hosts per network.
  • Page 33 Not all IP address is available in the sub-netted network. Two special addresses are reserved. They are the addresses with all zero’s and all one’s host number. For example, an IP address 128.1.2.128, what IP address reserved will be looked like? All 0s mean the network itself, and all 1s mean IP broadcast. 128.1.2.128/25 Network Subnet...
  • Page 34 According to the scheme above, a subnet mask 255.255.255.0 will partition a network with the class C. It means there will have a maximum of 254 effective nodes existed in this sub-netted network and is considered a physical network in an autonomous network.
  • Page 35: Typical Applications

    2-2. Typical Applications The SIGNAMAX 065-7851 L2 implements 8 Gigabit Ethernet TP ports with auto MDIX and two slots for the removable module supporting comprehensive fiber types of connection, including LC and BiDi-LC SFP modules. For more details on the specification of the switch, please refer to Appendix A.
  • Page 36 Fig. 2-14 Peer-to-peer Network Connection Fig. 2-15 Office Network Connection Publication date: Oct., 2012 Revision A2...
  • Page 37: Operation Of Web-Based Management

    Management This chapter instructs you how to configure and manage the SIGNAMAX 065-7851 L2 through the web user interface it supports, to access and manage the 16-Port Gigabit SFP and 8-Port Gigabit TP/SFP Fiber management Ethernet switch. With this facility, you can easily access and monitor through any one port of the...
  • Page 38 To optimize the display effect, we recommend you use Microsoft IE 6.0 above, Netscape V7.1 above or FireFox V1.00 above and have the resolution 1024x768. The switch supported neutral web browser interface. In Fig. 3-2, for example, left section is the whole function tree with web user interface and we will travel it through this chapter.
  • Page 39: Web Management Home Overview

    3-1. Web Management Home Overview After you login, the switch shows you the system information as Fig. 3-2. This page is default and tells you the basic information of the system, including “Model Name”, “System Description”, “Location”, “Contact”, “Device Name”, “System Up Time”, “Current Time”, “BIOS Version”, “Firmware Version”, “Hardware-Mechanical Version”, “Serial Number”, “Host IP Address”, “Host Mac Address”, “Device Port”, “RAM Size”...
  • Page 40: The Information Of Page Layout

    The Information of Page Layout • • • • On the top side, it shows the front panel of the switch. In the front panel, the  linked ports will display green; as to the ports, which are link off, they will be dark.
  • Page 41 Root System Port VLAN GVRP SNMP IP MAC Binding 802.1X TACACS+ Trunk MSTP Mirroring Multicast Alarm DHCP Snooping LLDP Save/Restore Export/ Import Diagnostics Maintenance Logout Publication date:Oct., 2012 Revision A2...
  • Page 42: System Information

    You can configure this parameter through the device’s user interface or SNMP. Device name: The name of the switch. User-defined. Default is SIGNAMAX 065- 7851 L2 System up time: Publication date:March., 2011...
  • Page 43 The time accumulated since this switch is powered up. Its format is day, hour, minute, second. Current time: Show the system time of the switch. Its format: day of week, month, day, hours : minutes : seconds, year. For instance, Wed, Apr. 23, 12:10:10, 2004.
  • Page 44: Account Configuration

    3-1-2. Account Configuration In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password.
  • Page 45: Time Configuration

    3-1-3. Time Configuration The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour”, “Minute” and “Second” within the valid value range indicated in each item. If you input an invalid value, for example, 61 in minute, the switch will clamp the figure to NTP is a well-known protocol used to synchronize the clock of the switch system time over a network.
  • Page 46 <Apply> button, the device will reject the time adjustment request. There is no time zone setting in Manual mode. Default: Year = 2000, Month = 1, Day = 1 Hour = 0, Minute = 0, Second = 0 NTP: NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT).
  • Page 47 Range is 0 ~ 23. Default: 0 Day Light Saving End : This is used to set when to stop performing the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day: Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23.
  • Page 48: Ip Configuration

    3-1-4. IP Configuration IP configuration is one of the most important configurations in the switch. Without the proper setting, network manager will not be able to manage or view the device. The switch supports both manual IP address setting and automatic IP address setting via DHCP server.
  • Page 49 IP address: Users can configure the IP settings and fill in new values if users set the DHCP function “Disable”. Then, click <Apply> button to update. When DHCP is disabled, Default: 192.168.1.1 If DHCP is enabled, this field is filled by DHCP server and will not allow user manually set it any more.
  • Page 50 address to DNS server to get its associated IP address for accessing Internet. User can specify a DNS IP address for the switch. With this, the switch can translate a mnemonic name address into an IP address. There are two ways to specify the IP address of DNS. One is fixed mode, which manually specifies its IP address, the other is dynamic mode, which is assigned by DHCP server while DHCP is enabled.
  • Page 51: Ipv6 Configuration

    3-1-5. IPv6 Configuration Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) that is designed to succeed Internet Protocol version 4 (IPv4). The Internet operates by transferring data in small packets that are independently routed across networks as specified by an international communications protocol known as the Internet Protocol.
  • Page 52 Current Address Address field displays the information set. Prefix Provide the IPv6 Prefix of this switch. The allowed range is 1 to 128. Current Prefix Prefix field displays the information set. Router Provide the IPv6 gateway address of this switch. IPv6 address is in 128- bit records represented as eight fields of up to four hexadecimal digits with colon...
  • Page 53: Loop Detection

    3-1-6. Loop Detection The loop detection is used to detect the presence of traffic. When switch receives packet’s(looping detection frame) MAC address the same as oneself from port, show Loop detection happens. The port will be locked when it received the looping detection frames.
  • Page 54: Management Policy

    3-1-7. Management Policy Through the management security configuration, the manager can do the strict setup to control the switch and limit the user to access this switch. The following rules are offered for the manager to manage the switch: Rule 1) : When no lists exists, then it will accept all connections. Accept ----------------------------------------------------------------------- Rule 2) : When only “accept lists”...
  • Page 55 Function name: Management Security Configuration Function description: The switch offers Management Security Configuration function. With this function, the manager can easily control the mode that the user connects to the switch. According to the mode, users can be classified into two types: Those who are able to connect to the switch (Accept) and those who are unable to connect to the switch (Deny).
  • Page 56 Delete: Remove the existed entry of Management Security Configuration from the management security table. Name: A name is composed of any letter (A-Z, a-z) and digit (0-9) with maximal 8 characters. VID: The switch supports two kinds of options for managed valid VLAN VID, including “Any”...
  • Page 57: Syslog

    3-1-8. Syslog The Syslog is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages.
  • Page 58: System Log

    3-1-9. System Log The System Log provides information about system logs, including information when the device was booted, how the ports are operating, when users logged in, when sessions timed out, as well as other system information. Function name: System Log Function description: The Trap Log Data is displaying the log items including all SNMP Private Trap events, SNMP Public traps and user logs occurred in the system.
  • Page 59: Virtual Stack

    The device of the group will be shown as station address ( the last number of IP Address) + device name on the button (e.g. 196_SIGNAMAX 065-7851 L2 ), otherwise it will show ” ---- “ if no corresponding device exists.
  • Page 60 Parameter description: State: It is used for the activation or de-activation of VSM. Default is Enable. Role: The role that the switch would like to play in virtual stack. Two types of roles, including master and slave are offered for option. Default is Master. Group ID: It is the group identifier (GID) which signs for VSM.
  • Page 61: Port Configuration

    3-2. Port Configuration Four functions, including Port Status, Port Configuration, Simple Counter and Detail Counter are contained in this function folder for port monitor and management. Each of them will be described in detail orderly in the following sections. Port Configuration Configuration Status Simple Counter...
  • Page 62 Fig. 3-12 Publication date: Oct., 2012 Revision A2...
  • Page 63 Parameter description: Port: To display the port index Media: To display the port media type with UTP or SFP Speed: Set the speed and duplex of the port. In speed, if the media is 1Gbps fiber, it is always 1000Mbps and the duplex is full only. If the media is TP, the Speed/Duplex is comprised of the combination of speed mode, 10/100/1000Mbps, and duplex mode, full duplex and half duplex.
  • Page 64: 3-2-2.Port Status

    3-2-2.Port Status The function Port Status gathers the information of all ports’ current status and reports it by the order of port number, media, link status, port state, Auto- Negotiation status, speed/duplex, Rx Pause and Tx Pause. An extra media type information for the module ports1 to 8 is also offered (See Fig.
  • Page 65 No default value. Speed / Duplex Mode: Display the speed and duplex of all port. There are three speeds 10Mbps, 100Mbps and 1000Mbps supported for TP media, and the duplex supported is half duplex and full duplex. If the media is 1Gbps fiber, it is 1000Mbps supported only.
  • Page 66 Parameter description of Port 1 ~ Port 24 SFP: Connector Type: Display the connector type, for instance, UTP, SC, ST, LC and so Fiber Type: Display the fiber mode, for instance, Multi-Mode, Single-Mode. Tx Central Wavelength: Display the fiber optical transmitting central wavelength, for instance, 850nm, 1310nm, 1550nm and so on.
  • Page 67: Simple Counter

    3-2-3. Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-15, the window can show all ports’ counter information at the same time.
  • Page 68 Bytes: Transmit:: Total transmitted bytes. Receive: Total received bytes. Errors: Transmit:: Number of bad packets transmitted. Receive: Number of bad packets received. Drops Transmit:: Number of packets transmitted drop. Receive: Number of packets received drop. Auto-refresh: The simple counts will be refreshed automatically on the UI screen. Refresh: The simple counts will be refreshed manually when user use mouse to click on “Refresh”...
  • Page 69: Detail Counter

    3-2-4. Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-16, the window can show only one port counter information at the same time.
  • Page 70 Number of Rx packets classified as low priority. Rx Broadcast: Show the counting number of the received broadcast packet. Rx Multicast: Show the counting number of the received multicast packet. Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes.
  • Page 71 Tx 256-511 Bytes: Number of 256 ~ 511-byte frames in good and bad packets transmitted. Tx 512-1023 Bytes: Number of 512 ~ 1023-byte frames in good and bad packets transmitted. Tx 1024-Bytes: Number of 1024-max_length-byte frames in good and bad packets transmitted.
  • Page 72: Power Saving

    3-2-5. Power Saving The function of Power Saving and provides the Power saving for reduce the power consumption with "ActiPHY Power Management" and "PerfectReach Power Management" two technique.It could efficient saving the switch Power when the client idle and detec the cable length to provide different power. Function name: Power Saving Function description:...
  • Page 73: Vlan

    3-3. VLAN The switch supports Tag-based VLAN (802.1Q) and Port-based VLAN Support 4094 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management.
  • Page 74 assigned a group name. This switch can support up to maximal 24 port- based VLAN groups. Tag-based: Tag-based VLAN identifies its member by VID. This is quite different from port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to determine if it can be forwarded.
  • Page 75 Port 23 Port 24 The ports in the same LAN segment will forward any packet in the same segment ports, the received packets will be forwarded to the same segment port member without any change (for example: VLAN tag or un- tag frames).
  • Page 76: Tag-Based Group

    3-3-2. Tag-based Group Function name: Tag-based Group Configuration Function description: It shows the information of existed Tag-based VLAN Groups, You can also easily create, edit and delete a Tag-based VLAN group by pressing <Add>, <Edit> and <Delete> function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID.
  • Page 77 VLAN, “Enable” means it is a member of the VLAN. Just tick the check box ( beside the port x to enable it. Add new VLAN: Please click on <Add new VLAN> to create a new Tag-based VLAN. Input the VLAN name as well as VID, configure the SYM-VLAN function and choose the member by ticking the check box beside the port No., then, press the <Apply>...
  • Page 78 Fig. 3-20-1 c. You need to assign these ports for member of port isolation. Fig. 3-20-2 d. Press the “Save” to complete the PVLAN configuration process. Publication date: Oct., 2012 Revision A2...
  • Page 79: Port-Based Group

    3-3-3. Port-based Group Function name: Port-based Group Configuration Function description: It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a Port-based VLAN group by pressing <Add>, <Edit> and <Delete> function buttons. User can add a new VLAN group by inputting a new VLAN name.
  • Page 80 Delete Group: Just press the <Delete> button to remove the selected group entry from the Port-based group table. Fig. 3-23 Publication date: Oct., 2012 Revision A2...
  • Page 81: Ports

    3-3-4. Ports Function name: VLAN Port Configuration Function description: In VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User also can choose ingress filtering rules to each port. There are two ingress filtering rules which can be applied to the switch.
  • Page 82 Port number. VLAN Aware: Based on IEEE 802.1Q VLAN tag to forward packet Ingress Filtering: Discard other VLAN group packets, only forward this port joined VLAN group packets Frame Type: All: Forward all tagged and untagged packets Tagged: Forward tagged packets only and discard untagged packets PVID: This PVID range will be 1-4094.
  • Page 83: Port Isolation

    3-3-5. Port Isolation Function name: Port Isolation Function description: Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port.
  • Page 84: Management Vlan

    3-3-6. Management VLAN Function name: Management VLAN Function description: To assign a specific VLAN for management purpose. Fig. 3-25 Parameter description: VID: Specific Management VLAN ID. Publication date:March., 2011 Revision A1...
  • Page 85: Mac

    3-4. MAC MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table Maintenance, Static Forward, Static Filter and MAC Alias, which cannot be categorized to some function type. They are described below. 3-4-1. Mac Address Table Function name: MAC Address Table Information Function Description: This function can allow the user to set up the processing mechanism of MAC...
  • Page 86 Time is 10-1000000 seconds. The default Aging Time is 300 seconds. Disable automatic aging: Stop the MAC table aging timer, the learned MAC address will not age out automatically Auto: Enable this port MAC address dynamic learning mechanism. Disable: Disable this port MAC address dynamic learning mechanism, only support static MAC address setting.
  • Page 87: Static Filter

    3-4-2. Static Filter Function name: Static Filter Function Description: Static Filter is a function that denies the packet forwarding if the packet’s MAC Address is listed in the filtering Static Filter table. User can very easily maintain the table by filling in MAC Address, VID (VLAN ID) and Alias fields individually.
  • Page 88: Static Forward

    3-4-3. Static Forward Function Name: Static Forward Function Description: Static Forward is a function that allows the user in the static forward table to access a specified port of the switch. Static Forward table associated with a specified port of a switch is set up by manually inputting MAC address and its alias name.
  • Page 89 Port number of the switch. It is 1 ~24. VID: VLAN identifier. This will be filled only when tagged VLAN is applied. Valid range is 1 ~ 4094. Alias: MAC alias name you assign. Publication date:Oct., 2012 Revision A2...
  • Page 90: Mac Alias

    3-4-4. MAC Alias Function name: MAC Alias Function description: MAC Alias function is used to let you assign MAC address a plain English name. This will help you tell which MAC address belongs to which user in the illegal access report. At the initial time, it shows all pairs of the existed alias name and MAC address.
  • Page 91 Note: If there are too many MAC addresses learned in the table, we recommend you inputting the MAC address and alias name directly. Publication date:Oct., 2012 Revision A2...
  • Page 92: Mac Table

    3-4-5. MAC Table Function name: MAC Table Function Description: Display the static or dynamic learning MAC entry and the state for the selected port. Fig. 3-30 Parameter description: Alias: MAC alias name you assign. MAC address: Display the MAC address of one entry you selected from the searched MAC entries table.
  • Page 93: Gvrp

    3-5. GVRP GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations.
  • Page 94 Fig. 3-31 Parameter description: GVRP State: This function is simply to let you enable or disable GVRP function. You can pull down the list and click the <Downward> arrow key to choose “Enable” or “Disable”. Then, click the <Apply> button, the system will take effect immediately.
  • Page 95 de-registered. If someone still issues a new join, then a registration will be kept in the switch. Valid range: 1000-5000 unit time, Default: 1000 unit time. Default Applicant Mode: The mode here means the type of participant. There are two modes, normal participant and non-participant, provided for the user’s choice.
  • Page 96 Disabled: In this mode, the switch dynamic VLAN will be created when this port received GVRP PDU. The default setting is Normal. Enabled: In this mode, the switch does not create dynamic VLAN when this port received GVRP PDU. Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch, this port will be added into the static VLAN members dynamically.
  • Page 97: Counter

    3-5-2. Counter Function name: GVRP Counter Function description: All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions. Actually, they are GARP packets. Fig. 3-32 Parameter description: Received: Total GVRP Packets: Total GVRP BPDU is received by the GVRP application.
  • Page 98 Empty Message Packets: Number of GARP BPDU with Empty message is received by the GARP application. Transmitted: Total GVRP Packets: Total GARP BPDU is transmitted by the GVRP application. Invalid GVRP Packets: Number of invalid GARP BPDU is transmitted by the GVRP application.
  • Page 99: Group

    3-5-3. Group Function name: GVRP Group VLAN Information Function description: To show the dynamic group member and their information. Fig. 3-33 Parameter description: VID: VLAN identifier. When GVRP group creates, each dynamic VLAN group owns its VID. Valid range is 1 ~ 4094. Member Port: Those are the members belonging to the same dynamic VLAN group.
  • Page 100: Qos(Quality Of Service) Configuration

    3-6. QoS(Quality of Service) Configuration support four QoS queues per port with strict or weighted fair switch queuing scheduling. There are 24 QoS Control Lists (QCL) for advance programmable QoS classification, based on IEEE 802.1p, Ethertype, VID, IPv4/IPv6 DSCP and UDP/TCP ports and ranges. High flexibility in the classification of incoming frames to a QoS class.
  • Page 101 Fig. 3-34 Publication date:Oct., 2012 Revision A2...
  • Page 102 Parameter description: Number of Classes: 1 / 2 / 4 Port: User can choose the port (1~24) respectively with Priority Class on Per Port Priority function. Default Class: User can set up High Priority or Low Priority for each port respectively. Low / Normal / Medium / High QCL: The number of QCL rule 1~24, each port have to apply one of the QCL...
  • Page 103: Qos Control List

    3-6-2. Qos Control List Function name: Qos Control List Configuration Function description: support four QoS queues per port with strict or weighted fair switch queuing scheduling. There are 24 QoS Control Lists (QCL) for advance programmable QoS classification, based on IEEE 802.1p, Ether Type, VID, IPv4/IPv6 DSCP and UDP/TCP ports and ranges.
  • Page 104 Fig. 3-37 Fig. 3-38 Fig. 3-39 Publication date: Oct., 2012 Revision A2...
  • Page 105 Fig. 3-40 Fig. 3-41 Publication date:Oct., 2012 Revision A2...
  • Page 106 Fig. 3-42 Publication date: Oct., 2012 Revision A2...
  • Page 107 Parameter description: QCL#: QCL number : 1~24 QCE Type: Ethernet Type / VLAN ID / UDP/TCP Port / DSCP / ToS / Tag Priority Ethernet Type Value: The configurable range is 0x600~0xFFFF. Well known protocols already assigned EtherType values. The commonly used values in the EtherType field and corresponding protocols are listed below: Ethertype Protocol...
  • Page 108 Protocol. MPLS, Multi-Protocol Label Switching 0x8847 (unicast). MPLS, Multi-Protocol Label Switching 0x8848 (multicast). PPPoE, PPP Over Ethernet (Discovery 0x8863 Stage). PPPoE, PPP Over Ethernet (PPP Session 0x8864 Stage). 0x88BB LWAPP, Light Weight Access Point Protocol. 0x88CC LLDP, Link Layer Discovery Protocol. 0x8E88 EAPOL, EAP over LAN.
  • Page 109: 3-6-3.Rate Limiters

    3-6-3.Rate Limiters Function name: Rate Limit Configuration Function description: Each port includes an ingress policer, and an egress shaper, which can limit the bandwidth of received and transmitted frames. Ingress policer or egress shaper operation is controlled per port in the Rate Limit Configuration. Fig.
  • Page 110 Port #: Port number. Policer Enabled: Policer enabled to limit ingress bandwidth by policer rate. Policer Rate: The configurable policer rate range: 500 Kbps ~ 1000000 Kbps 1 Mbps ~ 1000 Mbps Policer Unit: There are two units for ingress policer rate limit: kbps / Mbps Shaper Enabled: Shaper enabled to limit egress bandwidth by shaper rate.
  • Page 111: 3-6-4.Storm Control

    3-6-4.Storm Control Function name: Storm Control Configuration Function description: The switch support storm ingress policer control function to limit the Flooded, Multicast and Broadcast to prevent storm event happen. Fig. 3-44 Parameter description: Frame Type: There three frame types of storm can be controlled: Flooded unicast / Multicast / Broadcast Status: Enable/Disable Selection:...
  • Page 112: 3-6-5.Wizard

    3-6-5.Wizard Function name: Wizard Function description: The QCL configuration Wizard is targeted on user can easy to configure the QCL rules for QoS configuration. The wizard provide the typical network application rules, user can apply these application easily. Fig. 3-45 Parameter description: Please select an Action: User need to select one of action from following items, then click on...
  • Page 113 Fig. 3-46 Set up Port Policies Parameter description: QCL ID: QoS Control List (QCL): 1~24 Port Member: Port Member: 1~24 Publication date:Oct., 2012 Revision A2...
  • Page 114 Fig. 3-47 Set up Port Policies Parameter description: Wizard Again: Click on the <Wizard Again> , back to QCL Configuration Wizard. Finish: When you click on <Finish>, the parameters will be set according to the wizard configuration and shown on the screen, then ask you to click on <Apply>...
  • Page 115 Fig. 3-48 Set up Port Policies Finish Fig. 3-49 Set up Typical Network Application Rules Publication date:Oct., 2012 Revision A2...
  • Page 116 Fig. 3-50 Set up Typical Network Application Rules Fig. 3-51 Set up Typical Network Application Rules Parameter description: Audio and Video: QuickTime 4 Server / MSN Messenger Phone / Yahoo Messenger Phone / Napster / Real Audio Games: Blizzard Battlenet (Diablo2 and StarCraft) / Fighter Ace II / Quake2 / Quake3 / MSN Game Zone User Definition: Ethernet Type / VLAN ID / UDP/TCP Port / DSCP...
  • Page 117 VLAN ID Range: 1~4094 UDP/TCP Port: Two Mode: Range / Specific UDP/TCP Port Range: Port Range: 0~65535 UDP/TCP Port No.: Port Range: 0~65535 DSCP Value: DSCP Value Range: 0~63 Fig. 3-52 Set up Typical Network Application Rules Parameter description: QCL ID: QCL ID Range: 1~24 Traffic Class: There are four classes: Low / Normal / Medium / High...
  • Page 118 Fig. 3-53 Set up Typical Network Application Rules Fig. 3-54 Set up Typical Network Application Rules Finish Fig. 3-55 Set up Typical Network Application Rules Finish Publication date: Oct., 2012 Revision A2...
  • Page 119 Fig. 3-56 Set up Typical Network Application Rules Finish Parameter description: QCL #: QoS Control List (QCL): 1~24 Fig. 3-57 Set up TOS Precedence Mapping Parameter description: QCL ID: QoS Control List (QCL): 1~24 TOS Precedence 0~7 Class: Low / Normal / Medium / High Publication date:Oct., 2012 Revision A2...
  • Page 120 Fig. 3-58 Set up TOS Precedence Mapping Fig. 3-59 Set up TOS Precedence Mapping Finish Fig. 3-60 Set up VLAN Tag Priority Mapping Parameter description: QCL ID: QoS Control List (QCL): 1~24 Tag Priority 0~7 Class: Low / Normal / Medium / High Publication date: Oct., 2012 Revision A2...
  • Page 121 Fig. 3-61 Set up VLAN Tag Priority Mapping Publication date:Oct., 2012 Revision A2...
  • Page 122 Fig. 3-62 Set up VLAN Tag Priority Mapping Finish Publication date:March., 2011 Revision A1...
  • Page 123: Snmpv3 Configuration

    3-7. SNMPv3 Configuration Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
  • Page 124 Function name: SNMPv3 Communities Configuration Function description: The function is used to configure SNMPv3 communities. The Community and UserName is unique. To create a new community account, please check <Add new community> button, and enter the account information then check <Save>. Max Group Number : 4.
  • Page 125 Function name: SNMPv3 Users Configuration Function description: The function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, please check <Add new user> button, and enter the user information then check <Save>. Max Group Number : 10. Fig.
  • Page 126 Function name: SNMPv3 Groups Configuration Function description: The function is used to configure SNMPv3 group. The Entry index key are Security Model and Security Name. To create a new group account, please check <Add new group> button, and enter the group information then check <Save>. Max Group Number : v1: 2, v2: 2, v3:10.
  • Page 127 Function name: SNMPv3 Views Configuration Function description: The function is used to configure SNMPv3 view. The Entry index key are OID Subtree and View Name. To create a new view account, please check <Add new view> button, and enter the view information then check <Save>. Max Group Number : 28.
  • Page 128 Function name: SNMPv3 Accesses Configuration Function description: The function is used to configure SNMPv3 accesses. The Entry index key are Group Name, Security Model and Security level. To create a new access account, please check <Add new access> button, and enter the access information then check <Save>.
  • Page 129 Function name: Trap Hosts Configuration Function description: The function is used to configure SNMP trap. To create a new trap account, please check <No number> button, and enter the trap information then check <Apply>. Max Group Number : 6. Fig. 3-63-8 The Trap Hosts setting Fig.
  • Page 130 Version: You may choose v1, v2c or v3 trap. SNMP Host IP address. Port: Port number. Default: 162 Community / Security Name: The length of “Community / Security Name” string is restricted to 1-32. Security Level: There are three kinds of choices. NoAuth, NoPriv: No authentication and no privacy.
  • Page 131: Acl

    3-8. ACL The SIGNAMAX 065-7851 L2 switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for packet filtering but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way.
  • Page 132 Policy ID: Policy ID range:1~8 Action: Permit or Deny forwarding the met ACL packets Rate Limiter ID: Disabled: Disable Rate Limitation Rate Limiter ID Range: 1~16. To select one of rate limiter ID for this port, it will limit met ACL packets by rate limiter ID configuration. Port Copy: Disabled: Disable to copy the met ACL packets to specific port Port number: 1~24.
  • Page 133: 3-8-2.Rate Limiters

    3-8-2.Rate Limiters Function name: ACL Rate Limiter Configuration Function description: There are 16 rate limiter ID. You can assign one of the limiter ID for each port. The rate limit configuration unit is Packet Per Second (pps). Fig. 3-65 Parameter description: Rate Limiter ID: ID Range: 1~16 Rate(pps):...
  • Page 134: 3-8-3.Access Control List

    3-8-3.Access Control List Function name: ACL Rate Limiter Configuration Function description: The switch ACL function support up to 128 Access Control Entries (ACEs), using the shared 128 ACEs for ingress classification. You can create an ACE and assign this ACE for each port with <Any> or assign this ACE for a policy or assign this ACE for a port.
  • Page 135 Ingress Port Fig. 3-67 Fig. 3-68 Parameter description: Frame Type: Range: Any / Ethernet Type / ARP / IPv4 Any: It is including all frame type Ethernet Type: It is including all Ethernet frame type ARP: It is including all ARP protocol frame type IPv4: It is including all IPv4 protocol frame type Publication date:Oct., 2012 Revision A2...
  • Page 136 Fig. 3-69 Frame Type Fig. 3-70 Publication date: Oct., 2012 Revision A2...
  • Page 137 Fig. 3-71 Fig. 3-72 Fig. 3-73 ARP Publication date:Oct., 2012 Revision A2...
  • Page 138 Fig. 3-74 ARP Fig. 3-75 ARP Fig. 3-76 ARP Fig. 3-77 ARP Publication date: Oct., 2012 Revision A2...
  • Page 139 Fig. 3-79 ARP Fig. 3-80 ARP Fig. 3-81 ARP Publication date:Oct., 2012 Revision A2...
  • Page 140 Fig. 3-82 ARP Fig. 3-83 ARP Fig. 3-84 ARP Fig. 3-85 ARP Fig. 3-86 ARP Publication date: Oct., 2012 Revision A2...
  • Page 141 Fig. 3-87 ARP Fig. 3-88 IPv4 Publication date:Oct., 2012 Revision A2...
  • Page 142 Fig. 3-89 IPv4 Fig. 3-90 IPv4 Fig. 3-91 IPv4 Fig. 3-92 IPv4 Fig. 3-93 IPv4 Publication date: Oct., 2012 Revision A2...
  • Page 143 Fig. 3-94 IPv4 Fig. 3-95 IPv4 Fig. 3-96 IPv4 Fig. 3-97 IPv4 Fig. 3-98 IPv4 Publication date:Oct., 2012 Revision A2...
  • Page 144 Fig. 3-99 IPv4 Fig. 3-100 IPv4 Fig. 3-101 IPv4 Fig. 3-102 IPv4 Publication date: Oct., 2012 Revision A2...
  • Page 145 Fig. 3-103 IPv4 Fig. 3-104 IPv4 Fig. 3-105 IPv4 Publication date:Oct., 2012 Revision A2...
  • Page 146 Fig. 3-106 IPv4 Fig. 3-107 IPv4 Fig. 3-108 IPv4 Publication date: Oct., 2012 Revision A2...
  • Page 147 Fig. 3-109 IPv4 Fig. 3-110 IPv4 Fig. 3-111 IPv4 Publication date:Oct., 2012 Revision A2...
  • Page 148 Fig. 3-112 IPv4 Fig. 3-113 IPv4 Fig. 3-114 IPv4 Publication date: Oct., 2012 Revision A2...
  • Page 149 Fig. 3-115 IPv4 Fig. 3-116 IPv4 Fig. 3-117 IPv4 Publication date:Oct., 2012 Revision A2...
  • Page 150 Fig. 3-118 Action Fig. 3-119 Rate Limiter Publication date: Oct., 2012 Revision A2...
  • Page 151 Fig. 3-120 Port Copy Fig. 3-121 DMAC Filter Publication date:Oct., 2012 Revision A2...
  • Page 152 Fig. 3-122 VLAN ID Filter Fig. 3-123 VLAN ID Filter Fig. 3-124 Tag Priority Publication date: Oct., 2012 Revision A2...
  • Page 153 Function name: ACE Configuration Function description: The switch ACL function support up to 128 Access Control Entries (ACEs), using the shared 128 ACEs for ingress classification. You can create an ACE and assign this ACE for each port with <Any> or assign this ACE for a policy or assign this ACE for a port.
  • Page 154 MAC Parameters: (When Frame Type = ARP) SMAC Filter: Range: Any / Specific Any: It is including all source MAC address Specific: It is according to SMAC Value specific the source MAC address DMAC Filter: Range: Any / MC / BC / UC Any: It is including all destination MAC address MC: It is including all Multicast MAC address BC: It is including all Broadcast MAC address...
  • Page 155 Sender IP Filter: Range: Any / Host / Network Any: Including all sender IP address Host: Only one specific sender host IP address Network: A specific IP subnet segment under the sender IP mask Sender IP Address: Default: 192.168.1.1 Sender IP Mask: Default: 255.255.255.0 Target IP Filter: Range: Any / Host / Network...
  • Page 156 Both 0 and 1 The ingress ARP/PARP frames where the Hardware size is not equal "0x6" or the Protocol size is not equal "0x4" The ingress ARP/PARP frames where the Hardware size is equal "0x6" and the Protocol size is "0x4" Range: Any / 0 / 1 Any: Both 0 and 1...
  • Page 157 No: The ingress frames is not fragmented packet IP Option: A list of optional specifications for security restrictions, route recording, and source routing. Not every datagram specifies an options field. Range: Any / Yes / No Any: Including all IP option case Yes: The ingress frame is specified IP options No: The ingress frame is not specified IP options SIP Filter: (SIP Source IP Address)
  • Page 158 Specific: According to following ICMP code value setting for ingress classification ICMP Code Value: Range: 0-255 IP Parameters: (Frame Type = IPv4 and IP Protocol Filter = UDP) Source Port Filter: Range: Any / Specific / Range Any: Including all UDP source ports Specific: According to following Source Port No.
  • Page 159 Range: 0-65535 Source Port Range.: Range: 0-65535 Dest. Port Filter: Range: Any / Specific / Range Any: Including all TCP destination ports Specific: According to following Dest. Port No. setting for ingress classification Range: According to following Dest. Port Range setting for ingress classification Dest.
  • Page 160 0: The TCP control bit PSH is 0 1: The TCP control bit PSH is 1 TCP ACK: TCP Control Bit ACK: Means Acknowledgment field significant Range: Any / 0 / 1 Any: Including all TCP ACK case 0: The TCP control bit ACK is 0 1: The TCP control bit ACK is 1 TCP URG: TCP Control Bit URG: Means Urgent Pointer field significant...
  • Page 161 Yes: The ingress frame is fragmented packet No: The ingress frames is not fragmented packet IP Option: A list of optional specifications for security restrictions, route recording, and source routing. Not every datagram specifies an options field. Range: Any / Yes / No Any: Including all IP option case Yes: The ingress frame is specified IP options No: The ingress frame is not specified IP options...
  • Page 162 Any: Including all Tag Priority values 0-7: The Tag Priority Value is one of number (0-7) Action Parameters: When the ingress frame meet above ACL ingress classification rule you can do the following actions: Action: Range: Permit / Deny Permit: Permit the met ACL ingress classification rule packets forwarding to other ports on the switch Deny:...
  • Page 163: 3-8-4.Wizard

    3-8-4.Wizard Function name: Wizard Function description: The wizard function is provide 4 type of typical application for user easy to configure their application with ACL function. Fig. 3-125 Wizard Parameter description: Please select an Action: Set up Policy Rules / Set up Port Policies / Set up Typical Network Application Rules / Set up Source MAC and Source IP Binding Next: Click on <Next>...
  • Page 164 Fig. 3-126 Set up Policy Rules Fig. 3-127 Set up Policy Rules Fig. 3-128 Set up Policy Rules Publication date: Oct., 2012 Revision A2...
  • Page 165 Fig. 3-129 Set up Policy Rules Finish Fig. 3-130 Set up Port Policies Publication date:Oct., 2012 Revision A2...
  • Page 166 Fig. 3-131 Set up Port Policies Fig. 3-132 Set up Port Policies Publication date: Oct., 2012 Revision A2...
  • Page 167 Fig. 3-133 Set up Port Policies Finish Fig. 3-134 Set up Typical Network Application Rules Publication date:Oct., 2012 Revision A2...
  • Page 168 Fig. 3-135 Set up Typical Network Application Rules Fig. 3-136 Set up Typical Network Application Rules Fig. 3-137 Set up Typical Network Application Rules Publication date: Oct., 2012 Revision A2...
  • Page 169 Fig. 3-138 Set up Typical Network Application Rules Finish Parameter description: Common Server: DHCP / DNS / FTP / HTTP / IMAP / NFS / POP3 / SAMBA / SMTP / TELNET / TFTP Instant Messaging: Google Talk / MSN Messenger / Yahoo Messenger User Definition: Ethernet Type / UDP Port / TCP Port Others:...
  • Page 170: Ip Mac Binding

    3-9. IP MAC Binding The IP network layer uses a four-byte address. The Ethernet link layer uses a six-byte MAC address. Binding these two address types together allows the transmission of data between the layers. The primary purpose of IP-MAC binding is to restrict the access to a switch to a number of authorized users.
  • Page 171 Parameters description: State: Disabled / Enabled Time Interval: Range: 10 / 20 / 30 Time interval is for ARP echo, the switch will according to server table entries to send ARP echo. Server/Client: The maximum number of IP-MAC binding client table is 512 entries. The maximum number of IP-MAC Binding server table is 64 entries.
  • Page 172: Configuration

    3-10. 802.1X Configuration 802.1X port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1X- enabled port without authentication. If a user wishes to touch the network through a port under 802.1X control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1X-enabled port.
  • Page 173 The overview of operation flow for the Fig. 3-53 is quite simple. When Supplicant PAE issues a request to Authenticator PAE, Authenticator and Supplicant exchanges authentication message. Then, Authenticator passes the request to RADIUS server to verify. Finally, RADIUS server replies if the request is granted or denied.
  • Page 174 The Fig. 3-55 shows the procedure of 802.1X authentication. There are steps for the login based on 802.1X port access control management. The protocol used in the right side is EAPOL and the left side is EAP. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state.
  • Page 175 supplicant and the devices connected to this port won’t be allowed to access the network. When supplicant issue EAP-Logoff message Authentication server, the port you are using is set to be unauthorized. Fig. 3-55 Only MultiHost 802.1X is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port.
  • Page 176: 3-10-1.Server

    3-10-1.Server Function name: 802.1X Server Configuration Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1X port security application. Fig. 3-144 Parameter description: Authentication Server 1 and 2 Server IP Server: Server IP address for authentication. Default: 192.168.1.1 UDP Port: Default port number is 1812.
  • Page 177 Secret Key: The secret key between authentication server and authenticator. It is a string with the length 1 – 31 characters. The character string may contain upper case, lower case and 0-9. It is character sense. It is not allowed for putting a blank between any two characters. Default: Radius Accounting Server 1 and 2 Server IP Server:...
  • Page 178: 3-10-2.Port Configuration

    3-10-2.Port Configuration Function name: 802.1X Port Configuration Function description: This function is used to configure the parameters for each port in 802.1X port security application. Refer to the following parameters description for details. Fig. 3-145 Parameter description: Port: It is the port number to be selected for configuring its associated 802.1X parameters which are Port control, reAuthMax, txPeriod, Quiet Period, reAuthEnabled, reAuthPeriod, max.
  • Page 179 Clientless: The clients don’t need to install 802.1X client function, that means the client PC (for example WINDOW XP) does not need to enable 802.1X client function also can do 802.1X authentication. But the network maintainer need to configure the Radius server using each client’s MAC address for Radius account ID and password.
  • Page 180 session. The valid range: 1 – 10. Default: 2 times suppTimeout(1-65535 s): A timeout condition in the exchange between the authenticator and the supplicant. The valid range: 1 –65535. Default: 30 seconds. serverTimeout(1-65535 s): A timeout condition in the exchange between the authenticator and the authentication server.
  • Page 181: 3-10-3.Status

    3-10-3.Status Function name: 802.1X Status Function description: Show the each port IEEE 802.1X authentication current operating mode and status. Fig. 3-146 Parameter description: Port: Port number: 1-24 Mode: Show this port IEEE 802.1X operating mode: There are four modes Disable, Normal, Advance and Clientless Status: Show this port IEEE 802.1X security current status: Authorized or Unauthorized Vlan Policy:...
  • Page 182: Statistics

    3-10-4. Statistics Function name: 802.1X Port Statistics Port1 Function description: Show the IEEE 802.1X authentication related counters for manager monitoring authenticator status. Fig. 3-147 Parameter description: Port: Port Number: 1-24 Auto - refresh: Refresh the authenticator counters in the web UI automatically Publication date: Oct., 2012 Revision A2...
  • Page 183 Refresh: Click on the <Refresh> to update the authenticator counters in the web Clear: Click on the <Clear> to clear all authenticator counters in the web UI Publication date:Oct., 2012 Revision A2...
  • Page 184: Tacacs

    3-11. TACACS+ TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol which provides access control for the switch via one or more centralized servers. It provides separate authentication, authorization and accounting services. TACACS+ utilizes TCP port 49. It consists of three separate protocols, which can, if desired, be implemented on separate servers.
  • Page 185: Authentication

    3-11-2. Authentication Function name: Authentication Configuration Function description: The switch supports including Console, Telnet and Web authentication method via TACACS+ server . Fig. 3-147-1 Parameter description: Console: To set console authentication method with Login primary or Login secondary. Default: Primary is “Local” and Secondary is “None” Telnet: To set Telnet authentication method with Login primary or Login secondary.
  • Page 186: Authorization

    3-11-3. Authorization Function name: Authorization Configuration Function description: The switch supports TACACS+ server Authorization method with “State” and “Fallback to Local Authorization “. Fig. 3-147-1 Parameter description: State: To enable or disable the State Authorization via TACACS+ Server. Default: Disable Fallback to Local Authorization: To enable or disable the switch Fallback to Local Authorization.
  • Page 187: Accounting

    3-11-4. Accounting Function name: Accounting Configuration Function description: The switch supports TACACS+ server Accounting method with “Enable” and “Disable “ for manage login traffic accounting. Fig. 3-147-1 Parameter description: State: To enable or disable the accounting via TACACS+ Server. Default: Disable Publication date:March., 2011 Revision A1...
  • Page 188: Trunking Configuration

    3-12. Trunking Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports.
  • Page 189: 3-12-1.Port

    Per Trunking Group supports a maximum of 12 ready member-ports. Please note that some decisions will automatically be made by the system while you are configuring your trunking ports. Some configuration examples are listed below: 12 ports have already used Static Trunk Group ID 1, the 13th port willing to use the same Static Trunk Group ID will be automatically set to use the “None”...
  • Page 190 Fig.3-148 Parameter description: Port: Port Number: 1-24 Publication date: Oct., 2012 Revision A2...
  • Page 191 Method: This determines the method a port uses to aggregate with other ports. None: A port does not want to aggregate with any other port should choose this default setting. LACP: A port use LACP as its trunk method to get aggregated with other ports also using LACP.
  • Page 192: Aggregator View

    3-12-2 Aggregator View Function name: Aggregator View Function description: To display the current port trunking information from the aggregator point of view. Fig.3-149 Parameter description: Aggregator: It shows the aggregator ID (from 1 to 24) of every port. In fact, every port is also an aggregator, and its own aggregator ID is the same as its own Port No..
  • Page 193 Ready Ports: Show only the ready member ports within an aggregator (port). Publication date:Oct., 2012 Revision A2...
  • Page 194: Aggregation Hash Mode

    3-12-3 Aggregation Hash Mode Function name: Aggregation Hash Mode Configuration Function description: To configure the current port aggregate mode with 4 types. Fig.3-149-1 Parameter description: Source MAC Address: To evoke to enable source MAC address for Aggregate Mode . Destination MAC Address: To evoke to enable destination MAC address for Aggregate Mode .
  • Page 195: Lacp System Priority

    3-12-4 LACP System Priority Function name: LACP System Priority Function description: It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system.
  • Page 196: Stp Configuration

    3-13 STP Configuration The Spanning Tree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loops in switched networks. When STP is enabled, ensure that only one path is active between any two nodes on the network at a time. User can enable Spanning Tree Protocol on switch’s web management and then set up other advanced items.
  • Page 197 Show the current root bridge priority. Root Port: Show port number connected to root bridge with the lowest path cost. Root Path Cost: Show the path cost between the root port and the designated port of the root bridge. Current Max. Age: Show the current root bridge maximum age time.
  • Page 198: Configuration

    It decides how long a bridge should send this message to other bridge to tell I am alive. When the SIGNAMAX 065-7851 L2 is the root bridge of the LAN, for example, all other bridges will use the hello time assigned by this switch to Publication date:March., 2011...
  • Page 199 Default is 2 seconds. Max. Age: When the SIGNAMAX 065-7851 L2 is the root bridge, the whole LAN will apply this figure set by this switch as their maximum age time. When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max.
  • Page 200: Stp Port Configuration

    3-13-3. STP Port Configuration Function name: STP Port Setting Function description: In the STP Port Setting, one item selection and five parameters settings are offered for user’s setup. User can disable and enable each port by selecting each Port Status item. User also can set “Path Cost” and “Priority” of each port by filling in the desired value and set “Admin Edge Port”...
  • Page 201 Notice: Three other states (Disable state, BLOCKING state and LISTENING state) defined in the 802.1d specification are now all represented as DISCARDING state. LEARNING state indicates this port can now contribute its learning knowledge but cannot forward packets still. FORWARDING state indicates this port can both contribute its learning knowledge and forward packets normally.
  • Page 202 duplex mode but is shared link if it is in half-duplex mode. RSTP fast convergence can only happen on point-to-point links and on edge ports. This can expedite the convergence because this will have the port fast transited to forwarding state. There are three parameters, Auto, True and False, used to configure the type of the point-to-point link.
  • Page 203: Mstp

    3-14 MSTP The implementation of MSTP is according to IEEE 802.1Q 2005 Clause 13 – Multiple Spanning Tree Protocol. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent Multiple Spanning Tree Instance (MSTI), within Multiple Spanning Tree (MST) Regions composed of LANs and or MST Bridges.
  • Page 204: Region Config

    3-14-2 Region Config Function name: MSTP Region Config Function description: To configure the basic identification of a MSTP bridge. Bridges participating in a common MST region must have the same Region Name and Revision Level. Fig. 3-155 Parameter description: Region Name: 0-32 characters.(A variable length text string encoded within a fixed field of 32 octets , conforming to RFC 2271’s definition of SnmpAdminString.) Revision Level:...
  • Page 205: Instance View

    3-14-3 Instance View Function name: MSTP Instance Config Function description: Providing an MST instance table which include information(vlan membership of a MSTI ) of all spanning instances provisioned in the particular MST region which the bridge belongs to. Through this table, additional MSTP configuration data can be applied and MSTP status can be retrieved.
  • Page 206 To delete an MSTI. Del All MSTI: Deleting all provisioned MSTIs at a time. Instance Configuration: Fig. 3-158 To provision spanning tree performance parameters per instance. Port Config: Fig. 3-159 To provision spanning tree performance parameters per instance per port. Instance Status: Fig.
  • Page 207 Fig. 3-158 Instance Config Parameter description: Priority: The priority parameter used in the CIST(Common and Internal Spanning Tree) connection. 0 / 4096 / 8192 / 12288 / 16384 / 20480 / 24576 / 28672 / 32768 / 36864 / 40960 / 45056 / 49152 / 53248 / 57344 / 61440 MAX.
  • Page 208 Fig. 3-159 Port Config Parameter description: Port: 1-24 Path Cost: 1 – 200,000,000 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI. Publication date: Oct., 2012 Revision A2...
  • Page 209 Priority: 0 / 16 / 32 / 48 / 64 / 80 / 96 / 112 / 128 / 144 / 160 / 176 / 192 / 208 / 224 / 240 The same definition as in the RSTP specification. But in MSTP, this parameter can be respectively applied to ports of CIST and ports of any MSTI.
  • Page 210 Fig. 3-160 Instance Status Parameter description: MSTP State: MSTP protocol is Enable or Disable. Force Version: It shows the current spanning tree protocol version configured. Bridge Max Age: It shows the Max Age setting of the bridge itself. Bridge Forward Delay: It shows the Forward Delay setting of the bridge itself.
  • Page 211 Spanning tree priority value of the CIST root bridge CIST ROOT MAC: Mac Address of the CIST root bridge CIST EXTERNAL ROOT PATH COST: Root path cost value from the point of view of the bridge’s MST region. CIST ROOT PORT ID: The port ID of the bridge’s root port.
  • Page 212 Fig. 3-161 Port Status Parameter description: Port No: 1-24 Status: The forwarding status.Same definition as of the RSTP specification Possible values are “FORWARDING” , “LEARNING” , “DISCARDING” Status: The role that a port plays in the spanning tree topology. Possible values are “dsbl”(disable port) , ”alt”(alternate port) , “bkup”(backup port) , “ROOT”(root port) , “DSGN”(designated port) , “MSTR”(master port).
  • Page 213 per port Hello Time display. It takes the following form: Current Hello Time/Hello Time Setting Oper. Edge: Whether or not a port is an Edge Port in reality. Oper. P2P: Whether or not a port is a Point-to-Point Port in reality. Restricted Role: Same as mentioned in “Port Config”...
  • Page 214: Mirror

    3-15. Mirror Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring.
  • Page 215 Port #: Range: 1-24 Select the monitored ports. Source Enable: The source enable means the monitored port ingress traffic will be copied to monitoring port. Destination Enable: The destination enable means the monitored port egress traffic will be copied to monitoring port. Publication date:Oct., 2012 Revision A2...
  • Page 216: Multicast

    Multicast 3-16. The function, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
  • Page 217: Igmp Proxy

    3-16-2 IGMP Proxy Function name: IGMP Proxy Configuration Function description: IGMP proxy enables the switch to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces. The switch acts as a proxy for its hosts. You enable IGMP proxy on the switch, which connects to a router closer to the root of the tree.
  • Page 218 To set the frequency. When Switch received IGMP leave then switch send specific query frequency. (Available : 1~16 secs) Last Member Query Interval : To set the frequency what the Switch send specific query period time. (Available : 1~25 secs) Last Member Query Max Response Time : To set the max response code value in the specific query packet (Available : 1~25 secs)
  • Page 219: Igmp Snooping

    3-16-3 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping enables the switch to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces. The switch acts with Snooping mode for its hosts. You enable IGMP Snooping on the switch, Fig.
  • Page 220: Igmp Group Allow

    3-16-4 IGMP Group Allow Function name: IGMP Group Allow Function description: The Group Allow function allows the Multicast VLAN Registration to set up the IP multicast group filtering conditions. IGMP join behavior that meet the items you set up will be joined or formed the multicast group. Fig.
  • Page 221: Igmp Group Membership

    3-16-5 IGMP Group Membership Function name: IGMP Group Membership Function description: To show the IGMP group members information, the you can edit the parameters for IGMP groups and members in the web user interface. Fig. 3-164 Parameter description: Index: To display current built-up multicast group entry index. Group Address: To display current built-up multicast Group Address .
  • Page 222: Mvr

    3-16-6 MVR Function name: MVR configuration (Multicast VLAN Registration) Function description: Multicast VLAN Registration (MVR) routes packets received in a multicast source VLAN to one or more receive VLANs. Clients are in the receive VLANs and the multicast server is in the source VLAN. Multicast routing has to be disabled when MVR is enabled.
  • Page 223: Mvid

    3-16-7 MVID Function name: MVID configuration (Multicast VLAN Registration ID assign entry) Function description: To set the MVR Group member ID (MVID) entry with the Member port and Router Port. Fig. 3-164-2 MVID configuration Fig. 3-164-3 MVID configuration Parameter description: Add new MVID: To create a new MVID entry.
  • Page 224: Mvr Group Allow

    3-16-8 MVR Group Allow Function name: MVR Group Allow Function description: The Group Allow function allows the Multicast VLAN Registration to set up the IP multicast group filtering conditions. IGMP join behavior that meet the items you set up will be joined or formed the multicast group. Fig.
  • Page 225: Mvr Group Membership

    3-16-9 MVR Group Membership Function name: MVR Group Membership Function description: To display the MVR Group Membership information. Fig. 3-164-4 MVID Group Membership Parameter description: Refresh: Refresh function can help you to see current MVR group Membership status Previous Page: Move to the previous page.
  • Page 226: Alarm Configuration

    3-17. Alarm Configuration Alarm Configuration Events Configuration Email Configuration 3-17-1 Events Function name: Events Configuration Function description: The Trap Events Configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 24 different trap events to users for switch management.
  • Page 227 Fig. 3-165 Parameter description: Trap: Cold Start, Warm Start, Link Down, Link Up, Authentication Failure, User login, User logout STP: STP Topology Changed, STP Disabled, STP Enabled LACP: LACP Disabled, LACP Enabled, LACP Member Added, LACP Port Failure GVRP: GVRP Disabled, GVRP Enabled VLAN: VLAN Disabled, Port-based VLAN Enabled, Tag-based VLAN Enabled, Metro-mode Vlan Enabled, Double-tag Vlan Enabled Module Swap: Module Inserted, Module Removed, Dual Media Swapped...
  • Page 228: Email

    3-17-2 Email Function name: Email Configuration Function description: Alarm configuration is used to configure the persons who should receive the alarm message via email. An email address has to be set in the web page of alarm configuration (See Fig. 3-61). Then, user can read the trap information from the email.
  • Page 229: Dhcp Snooping

    3-18. DHCP Snooping DHCP Snooping DHCP Snooping State DHCP Snooping Entry DHCP Snooping Client Fig.3-62 3-18-1. DHCP Snooping State Function name: DHCP Snooping State Function description: The addresses assigned to DHCP clients on unsecure ports can be carefully controlled using the dynamic bindings registered with DHCP Snooping. DHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which send port-related information to a DHCP server.
  • Page 230: Dhcp Snooping Entry

    3-18-2. DHCP Snooping Entry Function name: DHCP Snooping Entry Function description: DHCP snooping Entry allows a switch to add the an trust DHCP server and 2 trust port to build the DHCP snooping available entry. This information can be useful in tracking an IP address back to a physical port and enable or disable the DHCP Option 82.
  • Page 231: Dhcp Snooping Client

    Trust port 2 : It set a trust port 2. available port from 0 to 24. 0 is disabled. Trust VID : : : : It set a trust VLAN ID. available VID from 1 to 4094. Server IP It set a trust DHCP Server IP address for DHCP Snooping. :...
  • Page 232 Fig. 3-17-2 DHCP Snooping Client Parameter description: : : : : To show the DHCP snooping client’s MAC address. : : : : To show the DHCP snooping client’s VLAN ID. Port T o show the DHCP snooping client’s port. :...
  • Page 233: Lldp

    3-19. LLDP The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP devices. 3-19-1 .
  • Page 234 Fig. 3-18-1 LLDP parameter Parameter description: Tx Interval To changes the interval between consecutive transmissions of : : : : LLDP advertisements on any given port. (Default: 30 secs) Tx Hold The specifies the amount of time the receiving device holds a :...
  • Page 235 Notification Interval: The minimum interval for LLDP data change Notification fpr the same neighbor. Refer to IEEE 802.1AB-2005 or later for more information. (Default: 5 secs) Mode To enable or disable the LLDP mode per port. There are four type includes Disable, Tx_Rx, Tx only and Rx only Port Descr : To evoke the outbound LLDP advertisements, includes an alphanumeric string describing the port.
  • Page 236: Lldp Entry

    3-19-2 . LLDP Entry Function name: LLDP Entry Function description: The LLDP Entry function allows a switch to display per port which build the LLDP available entry. This information can be useful in tracking LLDP packets back to a physical port. Fig.
  • Page 237 Refresh: Click on the <Refresh> to update the authenticator counters in the web Publication date:Oct., 2012 Revision A2...
  • Page 238: Lldp Statistics

    3-19-3 . LLDP Statistics Function name: LLDP Statistics Function description: Display the detailed counting number of each port’s LLDP traffic Fig. 3-18-3 LLDP statistics Parameter description: Neighbor entries were last changed at : The time period which neighbor entries were be changed . Total Neighbors Entries Added: The total neighbors entries added be received.
  • Page 239 The total neighbors entries deleted be received. Total Neighbors Entries Dropped: The total neighbors entries dropped be received. Total Neighbors Entries Aged Out: The total neighbors entries aged out be received. Local port: Show the local port on the switch. Tx Frames: The counting number of the frames transmitted.
  • Page 240: Save/Restore

    3-20. Save/Restore The switch supports three copies of configuration, including the default configuration, working configuration and user configuration for your configuration management. All of them are listed and described below respectively. Default Configuration: This is ex-factory setting and cannot be altered. In Web UI, two restore default functions are offered for the user to restore to the default setting of the switch.
  • Page 241: Factory Defaults

    3-20-1. Factory Defaults Function name: Restore Default Configuration (includes default IP address) Function description: Restore Default Configuration function can retrieve ex-factory setting to replace the start configuration. And the IP address of the switch will also be restored to 192.168.1.1. Fig.
  • Page 242: Restore User

    Fig. 3-169 3-20-4 . Restore User Function name: Restore User Configuration Function description: Restore User Configuration function can retrieve the previous confirmed working configuration stored in the flash memory to update start configuration. When completing to restore the configuration, the system’s start configuration is updated and will be changed its system settings after rebooting the system.
  • Page 243: Export/ Import

    3-21. Export/ Import Function name: Export / Import Function description: With this function, user can back up or reload the configuration files of Save As Start or Save As User via TFTP. Warming: Before importing / exporting configuration please make sure the •...
  • Page 244: Diagnostics

    3-22. Diagnostics Three functions, including Diagnostics, Loopback Test and Ping Test are contained in this function folder for device self-diagnostics. Each of them will be described in detail orderly in the following sections. Diagnostics Diagnostics Ping Test 3-22-1. Diag Function name: Diagnostics Function description: Diagnostics function provides a set of basic system diagnosis.
  • Page 245: Ping

    3-22-2. Ping Function name: Ping Test Function description: Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages. The switch provides Ping Test function to let you know that if the target device is available or not.
  • Page 246: Watchdog

    3-22-3. Watchdog Function name: Watchdog Function description: Watchdog function is a tool for detecting if the target device is alive or not through It can be configured via web UI, CLI and supports to ping one host IP address. SNMP. It supports continuing ping failed times counter setting. Note: a.
  • Page 247: Maintenance

    Firmware upgrade Function description: Click on <Browse> to select a specific SIGNAMAX 065-7851 L2 firmware file from the Web management PC, then click on <Upload> to confirm the upgrade firmware action. The new firmware will be uploaded into the switch and write into flash memory.
  • Page 248: Logout

    3-24 Logout You can manually logout by performing Logout function. In the switch, it provides another way to logout. You can configure it to logout automatically. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission.
  • Page 249: Operation Of Cli Management

    4. Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basic installation. The following description is the brief of the network connection. -- Locate the correct DB-9 null modem cable with female DB-9 connector. Null modem cable comes with the management switch. Refer to the Appendix B for null modem cable configuration.
  • Page 250 Fig. 4-1 Fig. 4-2 Publication date: Oct., 2012 Revision A2...
  • Page 251: Commands Of Cli

    4-2. Commands of CLI To see the commands of the mode, please input “?” after the prompt, then all commands will be listed in the screen. All commands can be divided into two categories, including global commands and local commands. Global commands can be used wherever the mode you are.
  • Page 252: Global Commands Of Cli

    4-2-1. Global Commands of CLI Syntax: Description: Back to the top mode. When you enter this command, your current position would move to the top mode. If you use this command in the top mode, you are still in the position of the top mode. Argument: None.
  • Page 253 help Syntax: help Description: To show available commands. Some commands are the combination of more than two words. When you enter this command, the CLI would show the complete commands. Besides, the command would help you classify the commands between the local commands and the global ones.
  • Page 254 history Syntax: history [#] Description: To show a list of previous commands that you had ever run. When you enter this command, the CLI would show a list of commands which you had typed before. The CLI supports up to 256 records. If no argument is typed, the CLI would list total records up to 256.
  • Page 255: Restore Default

    logout Syntax: logout Description: When you enter this command via Telnet connection, you would logout the system and disconnect. If you connect the system through direct serial port with RS-232 cable, you would logout the system and be back to the initial login prompt when you run this command.
  • Page 256 restore user Syntax: restore user Description: To restore the startup configuration as user defined configuration. If restoring default successfully, the CLI would prompt if reboot immediately or not. If you press Y or y, the system would reboot immediately; others would back to the CLI system. After restoring user-defined configuration, all the changes in the startup configuration would be lost.
  • Page 257 save user Syntax: save user Description: To save the current configuration as the user-defined configuration. When you enter this command, the CLI would save your current configuration into the non-volatile FLASH as user-defined configuration. Argument: None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 # s a v e u s e r S a v i n g u s e r .
  • Page 258: Local Commands Of Cli

    4-2-2. Local Commands of CLI 802.1X set maxReq Syntax: set maxReq <port-range> <vlaue> Description: The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplicant before it times out the authentication session. Argument: <port range>...
  • Page 259 set port-control Syntax: set port-control <port-range> <unauthorized| authorized| auto> Description: To set up 802.1X status of each port. Argument: <port range> : syntax 1,5-7, available from 1 to 24 <authorized> : Set up the status of each port 0:ForceUnauthorized 1:ForceAuthorized 2:Auto Possible value: <port range>...
  • Page 260 set reAuthMax Syntax: set reAuthMax <port-range> <value> Description: The number of reauthentication attempts that are permitted before the port becomes Unauthorized. Argument: <port range> : syntax 1,5-7, available from 1 to 24 <value> : max. value , range 1-10 Possible value: <port range>...
  • Page 261 set auth-server Syntax: set auth-server <ip-address> <udp-port> <secret-key> Description: To configure the settings related with 802.1X Radius Server. Argument: <ip-address> : the IP address of Radius Server <udp-port> : the service port of Radius Server(Authorization port) <secret-key> : set up the value of secret-key, and the length of secret-key is from 1 to 31 Possible value: <udp-port >...
  • Page 262 show status Syntax: show status Description: To display the mode of each port. Argument: None Possible value: None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( 8 0 2 . 1 X ) # s h o w s t a t u s P o r t M o d e = = = = = = = = = = = = = = = = = =...
  • Page 263: Show Statistics

    r e A u t h E n a b l e d : O N r e A u t h P e r i o d : 1 2 0 m a x . R e q u e s t : 2 s u p p T i m e o u t : 3 0 s e r v e r T i m e o u t : 3 0...
  • Page 264 To create a new guest user. When you create a new guest user, you must type in password and confirm password. Argument: <name> : new account name Possible value: A string must be at least 5 character. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a c c o u n t ) # a d d a a a a a P a s s w o r d : C o n f i r m P a s s w o r d : S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a c c o u n t ) #...
  • Page 265 show Description: To show system account, including account name and identity. Argument: None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a c c o u n t ) # s h o w A c c o u n t N a m e I d e n t i t y - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -...
  • Page 266 action Syntax: action <port> <permit|deny> <rate_limiter> <port copy> Description: To set the access control per port as packet filter action rule. Argument: <port> : 1-24 <permit/deny>: permit: 1, deny: 0 <rate_limiter>: 0-16 (0:disable) <port copy> : 0-24 (0:disable) Possible value: <port>...
  • Page 267: Set Mode

    move Syntax: move <index1> <index2> Description: To move the ACE ( Access Control Entry) configuration between index1 and index2.. Argument: None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a c c o u n t ) # m o v e 1 2 multicast set mode Syntax:...
  • Page 268 To set disable/enable MVR. Argument: <state>: 0 -> disable, 1 -> enable Possible value: <state>: 0 -> disable, 1 -> enable. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # s e t m v r 1 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # set mvid Syntax:...
  • Page 269 set drp <port> Description: To set router ports to disable. Argument: <port>: 1,5-9, available from 1 to 24. Possible value: <port>: 1,5-9, available from 1 to 24. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # s e t d r p 3 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # set dmlf Syntax:...
  • Page 270 Possible value: <port>: 1,5-9, available from 1 to 24. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # s e t e r p 3 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # set gqi Syntax:...
  • Page 271 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # set lmqc Syntax: set lmqc <count> Description: To set last member query count. Argument: <count>: from 1 to 16 time(s).
  • Page 272 Syntax: set mhtot <time> Description: To set mvr host time out. Argument: <time>: from 1 to 65535 second(s). Possible value: <time>: from 1 to 65535 second(s). Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # s e t mhtot 3200 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # set shtot Syntax:...
  • Page 273 Syntax: show igmpp Description: To display igmp proxy setting. Argument: None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # s h o w i g m p p I G M P P r o x y : D i s a b l e G e n e r a l Q u e r y I n t e r v a l...
  • Page 274: Show Mvr

    Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # s h o w i g m p s I G M P S n o o p i n g : E n a b l e H o s t T i m e O u t...
  • Page 275 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m u l t i c a s t ) # policy Syntax: policy <policy> <ports> Description: To set acl port policy on switch Argument: <policy>...
  • Page 276 Syntax: set [<index>] [<next index>] [switch | (port <port>) | (policy <policy>)] [<vid>] [<tag_prio>] [<dmac_type>] [(any) | (etype [<etype>] [<smac>]) | (arp [<arp type>] [<opcode>] (any | [<source ip>] [<source ip mask>]) (any | [<destination ip>] [<destination ip mask>]) [<source mac>] [<arp smac match flag>] [<raro dmac match flag>] [<ip/ethernet length flag>] [<ip flag>] [<ethernet flag>]) | (ip [(<source ip>...
  • Page 277 r a t e l i m i t e r r a t e ( p p s ) - - - - - - - - - - - - - - - - - - - - - - - - …...
  • Page 278: Set User

    <#> :email address number, range: 1 to 6 <mail address>:email address Possible value: <#>: 1 to 6 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a l a r m - e m a i l ) # s e t m a i l - a d d r e s s 1 a b c @ m a i l . a b c . c o m set server Syntax: set server <ip>...
  • Page 279 E m a i l A d d r e s s 2 : E m a i l A d d r e s s 3 : E m a i l A d d r e s s 4 : E m a i l A d d r e s s 5 : E m a i l A d d r e s s 6 : <<events>>...
  • Page 280: Set Trap

    set all Syntax: set all <range> Description: To enable email and trap of events. Argument: <range>:set the range of events, syntax 1,5-7 Possible value: <range>: 1~24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a l a r m - e v e n t s ) # s e t a l l 1 - 3 set email Syntax: set email <range>...
  • Page 281 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a l a r m - e v e n t s ) # s h o w E v e n t s E m a i l T r a p - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -...
  • Page 282 show (alarm) Syntax: show Description: The Show for alarm here is used to display the configuration of Events, or E-mail. Argument: None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a l a r m ) # s h o w e v e n t s S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( a l a r m ) # s h o w e m a i l autologout autologout...
  • Page 283 config-file export Syntax: export <current | user> < ip address> Description: To run the export function. Argument: < Usage> set up current or user < ip address> the TFTP server ip address Possible value: none Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( c o n f i g - f i l e ) # e x p o r t c u r r e n t 1 9 2 . 1 6 8 . 1 . 6 3 E x p o r t s u c c e s s f u l .
  • Page 284 gvrp set state Syntax: set state < 0 | 1> Description: To disable/ enable the gvrp function. Argument: 0 : disable the gvrp function 1 : enable the gvrp function Possible value: 0 : disable the gvrp function 1 : enable the gvrp function Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( g v r p ) # s e t s t a t e 1 group applicant...
  • Page 285 set applicant Syntax: set applicant <port> < 0 | 1 > Description: To set default applicant mode for each port. Argument: <port>: port range, syntax 1,5-7, available from 1 to 24 <0>: set applicant as normal mode <1>: set applicant as non-participant mode Possible value: <port>: 1 to 24 <...
  • Page 286 G V R P s t a t e : E n a b l e P o r t J o i n T i m e L e a v e T i m e L e a v e A l l T i m e A p p l i c a n t R e g i s t r a r R e s t r i c t e d - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -...
  • Page 287 G V R P s t a t e : E n a b l e P o r t J o i n T i m e L e a v e T i m e L e a v e A l l T i m e A p p l i c a n t R e g i s t r a r R e s t r i c t e d - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -...
  • Page 288 group grpinfo Syntax: group grpinfo <vid> Description: To show the gvrp group. Argument: <vid>: To set the vlan id from 1 to 4094 Possible value: <vid>: 1 to 4094 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( g v r p ) # g r o u p g r p i n f o 2 G V R P g r o u p i n f o r m a t i o n V I D M e m b e r P o r t - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -...
  • Page 289 set erp Syntax: set erp <port> Description: Set router ports to enable Argument: <port>: syntax 1,5-7, available from 1 to 24 Possible value: <port>: 1 to 24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( i g m p ) # s e t e r p 1 set flood Syntax: set flood <state>...
  • Page 290: Enable Dhcp

    None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( i g m p ) # s h o w i g m p p disable dhcp Syntax: disable dhcp Description: To disable the DHCP function of the system.
  • Page 291 set ip Syntax: set ip <ip> <mask> <gateway> Description: To set the system IP address, subnet mask and gateway. Argument: <ip> : ip address <mask> : subnet mask <gateway> : default gateway Possible value: <ip> : 192.168.1.2 or others <mask> : 255.255.255.0 or others <gateway>...
  • Page 292 ip_mac_binding set entry Syntax: set entry < 0 | 1> < mac> < ip> < port no> < vid> Description: To set ip mac binding entry Argument: < 0 | 1> : 0 : Client , 1: Server <mac> : mac address <...
  • Page 293 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - t a b l e - a l i a s ) # s h o w M A C A l i a s L i s t M A C A d d r e s s A l i a s...
  • Page 294 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l o o p - d e t e c t i o n ) # s h o w D e t e c t i o n P o r t L o c k e d P o r t P o r t S t a t u s P o r t S t a t u s...
  • Page 295 Possible value: <#> :1 to 24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l o o p - d e t e c t i o n ) # r e s u m e 1 - 2 4 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l o o p - d e t e c t i o n ) # s h o w D e t e c t i o n P o r t L o c k e d P o r t...
  • Page 296 LLDP <<set clear>> Syntax: set clear Description: Resets the traffic and error counters to zero. Argument: None Possible value: None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) # s e t c l e a r S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) # set mode Syntax:...
  • Page 297 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) # s e t n o t i f i c a t i o n 1 5 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) # set reInitDelay Syntax:...
  • Page 298: Show Config

    S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) # s e t t x D e l a y 5 0 0 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) # set txHold Syntax: set txHold <time>...
  • Page 299 L L D P D e l a y I n t e r v a l [ 2 ] : 1 L L D P R e i n i t I n t e r v a l [ 2 ] : 5 L L D P N o t i f i c a t i o n I n t e r v a l [ 5 ] : 5 0 0 L L D P P o r t C o n f i g u a t i o n...
  • Page 300 P o r t N a m e : 1 5 F r a m e s D i s c a r d e d : F r a m e s I n v a l i d F r a m e s R E c e i v e d F r a m e s S e n t T L V s U n r e c o g n i z e d :...
  • Page 301 l o c a l P o r t # 9 l o c a l P o r t # 1 0 l o c a l P o r t # 1 1 l o c a l P o r t # 1 2 l o c a l P o r t # 1 3...
  • Page 302 L L D P P o r t C o n f i g u r a t i o n D e t a i l P o r t : A d m i n S t a t u s [ T x _ R x ] : D i s a b l e N o t i f i c a t i o n E n a b l e d [ F a l s e ] : T r u e T L V s A d v e r t i s e d : S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( l l d p ) #...
  • Page 303 <<alias>> Syntax: del <mac> Description: To del mac alias entry. Argument: <mac> : set up the MAC format: xx-xx-xx-xx-xx-xx Possible value: <mac> : set up the MAC format: xx-xx-xx-xx-xx-xx Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - a l i a s ) # s e t 2 3 - 5 6 - r 5 - 5 5 - 3 f - 0 3 t e s t 3 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - a l i a s ) # s h o w M A C A l i a s M A C...
  • Page 304 M A C A l i a s = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = 2 3 - 5 6 - 0 0 - 5 5 - 3 F - 0 3 t e s t 3 2 3 - 5 6 - 0 0 - 5 5 - E F - 0 3...
  • Page 305 show Syntax: show Description: To show all mac table informaion. Argument: none Possible value: none Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - m a c - t a b l e ) # s h o w T y p e V L A N M A C...
  • Page 306 ..set learning Syntax: set learning <range> <auto|disable|secure> Description: To set mac table learning. Argument: <range syntax> : 1,5-7, available from 1 to 24 <auto >: auto learning <disable >: disable learning <secure >: learn frames are discarded Possible value: <range syntax>...
  • Page 307 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - m a i n t e n a n c e ) # s h o w 1 S t a t i c A g i n g C o n f i g u r a t i o n : F F 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 A g e t i m e : 3 0 0 4 , 1 5 , 1 6 , 1 7 , 1...
  • Page 308: Show Filter

    del <mac> <vid> Description: To del the static mac entry. Argument: <mac> : mac address, format: 00-02-03-04-05-06 <vid> : vlan id. 0, 1-4094. VID must be zero if vlan mode is not tag-based Possible value: <mac> : mac address <vid> : 0, 1-4094 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - s t a t i c - m a c ) # del 00-02-03-04-05-06 0 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m a c - s t a t i c - m a c ) #...
  • Page 309 mirror set mirror Syntax: set mirror < #> Description: To set mirror port and enable/disable mirror function Argument: <#>: port, available from 1 to 24 and 0. 1 to 24: available port number 0: disable mirror function Possible value: <#>: 1 to 24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m i r r o r ) # s e t m i r r o r 2 set monitor-destination...
  • Page 310 set monitor-source Syntax: set monitor-source <range> Description: To set up the monitoring port of the mirror function. User can observe the packets that the monitored port received via this port. Argument: <range>: the monitoring port that is chosen for the mirror function. Only one port is allowed to configure, available from 1 to 24 Possible value: <range>:1 to 24...
  • Page 311 show Syntax: show Description: To display the setting status of mirror configuration. Argument: None Possible value: None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m i r r o r ) # s h o w P o r t t o m i r r o r t o : 1 P o r t S o u r c e E n a b l e...
  • Page 312: Set Config

    mstp disable Syntax: disable Description: To disable mstp function. Argument: None Possible value: None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # d i s a b l e enable Syntax: enable...
  • Page 313 <Max Age> : available from 6 to 40. Recommended value is 20 <Forward Delay(sec)> : available from 4 to 30. Recommended value is 15 <Max Hops> : available from 6 to 40. Recommended value is 20 Possible value: <Max Age> : available from 6 to 40. Recommended value is 20 <Forward Delay(sec)>...
  • Page 314 <port range> syntax: 1,5-7, available from 1 to 24 <admin edge> : 0->non-edge port,1->edge ports Possible value: <port range> syntax: 1,5-7, available from 1 to 24 <admin edge> : 0->non-edge port,1->edge ports Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # s e t p - e d g e 1 0 - 1 2 0 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # set p-hello Syntax:...
  • Page 315 <Instance Priority> : 0 to 61440 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # s e t p r i o r i t y 0 4 0 9 6 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # e n a b l e M S T P s t a r t e d S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # s h o w i n s t a n c e 0...
  • Page 316 F O R W A R D I N G D S G N 2 0 0 0 0 0 1 2 8 2 / 2 D I S C A R D I N G d s b l 2 0 0 0 0 0 0 1 2 8 2 / 2 F O R W A R D I N G D S G N...
  • Page 317 1 2 8 t r u e a u t o t r u e t r u e 1 2 8 t r u e a u t o t r u e f a l s e 1 2 8 t r u e a u t o t r u e f a l s e...
  • Page 318 N a m e : t e s t 2 R e v i s i o n : 3 0 0 0 0 I n s t a n c e s : 0 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # set version Syntax: set version <stp|rstp|mstp>...
  • Page 319: Show Ports

    S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # show pconf Syntax: show pconf <instance-id> Description: To show port configuration Argument: instance-id:0->CIST;1-4095->MSTI Possible value: <instance-id>...
  • Page 320 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( m s t p ) # s h o w p o r t s 0 show region-info Syntax: show region-info Description: To show region config Argument:...
  • Page 321 None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o l i c y ) # a d d n a m e M a r y i p 1 9 2 . 1 6 8 . 3 . 1 - 1 9 2 . 1 6 8 . 3 . 4 a c t i o n d e n y S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o l i c y ) # s h o w 1 ) N a m e...
  • Page 322: Clear Counter

    S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o l i c y ) # show Syntax: show Description: To show management policy list. Argument: none Possible value: none Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o l i c y ) # s h o w...
  • Page 323 <description> : max 47 characters Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # s e t d e s c r i p t i o n 3 - 8 s a l e s d e p a r t m e n t S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # s h o w c o n f i g S p e e d / F l o w...
  • Page 324 Syntax: set flow-control <port-range> <enable|disable> Description: To set per-port flow control Argument: <port-range>: syntax 1,5-7, available from 1 to 24 Possible value: <port-range>: 1 ~ 24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # s e t f l o w - c o n t r o l 3 - 1 0 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # s h o w c o n f i g 1 A u t o D i s a b l e d 9 6 0 0...
  • Page 325 1 0 A u t o E n a b l e d 9 6 0 0 R e s t a r t 1 1 A u t o D i s a b l e d 9 6 0 0 D i s c a r d set speed Syntax:...
  • Page 326 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # s e t p o w e r s a v i n g 2 1 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # show config Syntax:...
  • Page 327 R e c e i v e S i z e C o u n t e r s T r a n s m i t S i z e C o u n t e r s - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - R x 6 4 B y t e s 7 3 8 1...
  • Page 328 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # P o r t 2 3 S F P i n f o r m a t i o n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - C o n n e c t o r T y p e : S F P - L C...
  • Page 329: Show Powersaving

    S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # show status Syntax: show status Description: To display the port’s current status. Argument: None. Possible value: None.
  • Page 330 Argument: None Possible value: None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( p o r t ) # s h o w p o w e r s a v i n g P o r t P o w e r S a v i n g - - - - - - - - - - - - - - - - D i s a b l e d...
  • Page 331: Set Port

    <#>: 1,2,4 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( q o s - p o r t s ) # s e t c l a s s 2 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( q o s - p o r t s ) # set port Syntax:...
  • Page 332 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( q o s - p o r t s ) # show Syntax: show Description: To show port information. Argument: none Possible value: none Example:...
  • Page 333 Q C E T y p e : E t h e r n e t T y p e E t h e r n e t T y p e V a l u e : 0 x f f f 0 T r a f f i c C l a s s : H i g h S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( q o s - q c l ) #...
  • Page 334 delete Syntax: delete <qcl> <qce range> Description: To delete the specific QCE entry in the specific QCL. Argument: <qcl> : the qcl number, available from 1 to 24. <qce range> : 1,5-7, available from 1 to 12 Possible value: <qcl> : available from 1 to 24. <qce range>...
  • Page 335 << storm >> set broadcast Syntax: set broadcast <status> <rate> Description: To set broadcast storm control configuration Argument: <status> : 1 means enable and 0 means disable <rate> : 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1k, 2k, 4k, 8k, 16k, 32k, 64k, 128k , 256k, 512k Possible value: <status>...
  • Page 336 B r o a d c a s t 5 1 2 set unicast Syntax: set unicast <status> <rate> Description: To set flooded unicast storm control configuration Argument: <status> : 1 means enable and 0 means disable <rate> : 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1k, 2k, 4k, 8k, 16k, 32k, 64k, 128k , 256k, 512k Possible value: <status>...
  • Page 337 reboot reboot Syntax: reboot Description: To reboot the system. Argument: None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 # r e b o o t snmp <<disable>>...
  • Page 338 Syntax: set get-community <community> set set-community <community> set trap <#> <ip> [port] [community] Description: The Set here is used for the setup of get-community, set-community, trap host ip, host port and trap-community. Argument: <#>: trap number <ip>: ip address or domain name <port>: trap port <community>:trap community name Possible value:...
  • Page 339 MCheck Syntax: MCheck <range> Description: To force the port to transmit RST BPDUs. Argument: <range>: syntax 1,5-7, available from 1 to 24 Possible value: <range>: 1 to 24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( s t p ) # M c h e c k 1 - 8 disable Syntax: disable...
  • Page 340 set config Syntax: set config <Bridge Priority> <Hello Time> <Max. Age> <Forward Delay> Description: To set up the parameters of STP. Argument: <Bridge Priority>:priority must be a multiple of 4096, available from 0 to 61440. <Hello Time>: available from 1 to 10. <Max.
  • Page 341: Show Port

    <stp|rstp>:stp / rstp Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( s t p ) # s e t v e r s i o n r s t p show config Syntax: show config...
  • Page 342: Set Contact

    1 6 D I S C A R D I N G 2 0 0 0 0 0 0 1 2 8 A u t o 1 7 D I S C A R D I N G 2 0 0 0 0 0 0 1 2 8 A u t o 1 8 D I S C A R D I N G...
  • Page 343: Set Location

    S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( s y s t e m ) # s e t c o n t a c t T a i p e i set device-name Syntax: set device-name <device-name string>...
  • Page 344 B I O S V e r s i o n : v 1 . 0 5 F i r m w a r e V e r s i o n : v 2 . 0 8 H a r d w a r e - M e c h a n i c a l V e r s i o n : v 1 . 0 1 - v 1 . 0 1 S e r i a l N u m b e r : 0 3 0 C 0 2 0 0 0 0 0 3 H o s t I P A d d r e s s...
  • Page 345 7 M o n M a r 1 7 1 5 : 1 8 : 3 8 2 0 0 8 L i n k U p [ P o r t : 5 ] 8 M o n M a r 1 7 1 5 : 1 8 : 4 8 2 0 0 8 L o g i n [ a d m i n ] time set daylightsaving...
  • Page 346: Set Ntp

    S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( t i m e ) # s e t m a n u a l 2 0 0 4 / 1 2 / 2 3 1 6 : 1 8 : 0 0 set ntp Syntax: set ntp <ip>...
  • Page 347: Set Trunk

    Argument: <port-range>: port range, syntax 1,5-7, available from 1 to 24 Possible value: <port-range>: 1 to 24 Example: SIGNAMAX 065-7851 L2 (trunk)# del trunk 1 set priority Syntax: set priority <range> Description: To set up the LACP system priority. Argument: <range>: available from 1 to 65535.
  • Page 348 None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( t r u n k ) # s h o w a g g t r - v i e w A g g r e g a t o r 1 ) M e t h o d : N o n e M e m b e r P o r t s : 1 R e a d y P o r t s : 1...
  • Page 349 Description: To delete the port-based vlan group. Argument: <name>: which vlan group you want to delete. Possible value: <name>: port-vlan name Example: SIGNAMAX 065-7851 L2 (vlan)# del port-group VLAN-2 del tag-group Syntax: del tag-group <vid> Publication date:Oct., 2012 Revision A2...
  • Page 350 Description: To delete the tag-based vlan group. Argument: <vid>: which vlan group you want to delete, available from 1 to 4094 Possible value: <vid>: 1 to 4094 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( v l a n ) # d e l t a g - g r o u p 2 disable drop-untag Syntax: disable drop-untag <range>...
  • Page 351 enable sym-vlan Syntax: enable sym-vlan <range> Description: To drop frames from the non-member port. Argument: <range> : which port(s) you want to set, syntax 1,5-7, available from 1 to 24 Possible value: <range>: 1 to 24 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( v l a n ) # e n a b l e s y m - v l a n 5 - 1 0 set mode Syntax: set mode <...
  • Page 352: Set Pvid

    <name>: port-vlan name <range>: syntax 1,5-7, available from 1 to 24 Possible value: <range>: 1 to 24 Example: SIGNAMAX 065-7851 L2 (vlan)# set port-group VLAN-1 2-5,6,15-13 set port-role Syntax: set port-role <range> <access|trunk|hybrid> [vid] Description: To set egress rule: configure the port roles.
  • Page 353: Show Group

    set tag-group Syntax: set tag-group <vid> <name> <range> <#> Description: To add or edit the tag-based vlan group. Argument: <vid>: vlan ID, range from 1 to 4094 <name>: tag-vlan name <range>: vlan group members, syntax 1,5-7, available from 1 to 24 <#>: sym/asym vlan setting.
  • Page 354 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( v l a n ) # s h o w p v i d P o r t P V I D R u l e 1 R u l e 2 P o r t R u l e...
  • Page 355 None. Possible value: None. Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( v s ) # d i s a b l e M a n a g e d S w i t c h - S I G N A M A X 0 6 5 - 7 8 5 1 L 2 L o g i n : a d m i n P a s s w o r d : x x x x x set gid...
  • Page 356 V i r t u a l S t a c k C o n f i g : S t a t e : E n a b l e R o l e : M a s t e r G r o u p I D : 1 S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( v s ) # TACACS+...
  • Page 357 Description: To set TACACS+ Key Argument: <secret-key>: The length of secret-key is from 1 to 31 Possible value: <secret-key>: The length of secret-key is from 1 to 31 Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( t a c - p l u s ) # s e t k e y t a c a c s S e r v e r c o n n e c t ! Set retry Syntax:...
  • Page 358 To set web-authentication method Argument: <method>: available from 0 to 2 0 - Local 1 - TACACS (Authentication) 2 - None (for method2 only) Possible value: <method>: available from 0 to 2 0 - Local 1 - TACACS (Authentication) 2 - None (for method2 only) Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( t a c - p l u s ) # s e t w e b - a u t h e n t i c a t i o n 0 1 S e r v e r c o n n e c t !
  • Page 359: Show Authentication

    Argument: None Possible value: None Example: S I G N A M A X 0 6 5 - 7 8 5 1 L 2 ( t a c - p l u s ) # e n a b l e f a l l b a c k - a u t h o r S e r v e r c o n n e c t ! Show authentication Syntax:...
  • Page 360: Maintenance

    5. Maintenance 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5-2.
  • Page 361: Appendix A Technical Specifications

    Appendix A Technical Specifications Features 16 fiber (SFP) switching ports are compliant with SX/LX..etc-LC. • 8 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward shared-memory Web-Smart switched. • Supports auto-negotiation for configuring speed, duplex mode. •...
  • Page 362 Hardware Specifications Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x Network Interface: Configuration Mode Connector Port NWay TP (RJ-45) 10/100/1000Mbps Gigabit TP 1 - 8 1000Base-SX Gigabit Fiber 1-24(Option) 1000 FDX *SFP 1000Base-LX Gigabit Fiber 1-24(Option) 1000 FDX *SFP 1000Base-LX Single Fiber WDM (BiDi) 1000 FDX 1-24(Option) *SFP...
  • Page 363: Management Software Specifications

    AC Line SIGNAMAX 065-7851 L2 Voltage 100∼240 VAC Frequency 50∼60 Hz Consumption DC Line SIGNAMAX 065-7851 L2 D Voltage 36~72 VDC Consumption Ambient Temperature : 0° to 40°C Humidity : 5% to 90% Dimensions : 44(H) × 442(W) × 209(D) mm Comply with FCC Part 15 Class A &...
  • Page 364 One RS-232 port as local control console Network Management Telnet remote control console SNMP agent : MIB-2 (RFC 1213) Bridge MIB (RFC 1493) RMON MIB (RFC 1757)-statistics Ethernet-like MIB (RFC 1643) Web browser support based on HTTP Server and CGI parser TFTP software-upgrade capability. IEEE802.1AB LLDP Note: Any specification is subject to change without notice.
  • Page 365: Appendix B Null Modem Cable Specifications

    Appendix B Null Modem Cable Specifications The DB-9 cable is used for connecting a terminal or terminal emulator to the Managed Switch’s RS-232 port to access the command-line interface. The table below shows the pin assignments for the DB-9 cable. Function Mnemonic Carrier...

Table of Contents