Black Box LGB2003A-R2 User Manual

Black Box LGB2003A-R2 User Manual

24-port gbe web smart switch
Hide thumbs Also See for LGB2003A-R2:

Advertisement

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LGB2003A-R2 and is the answer not in the manual?

Questions and answers

Summary of Contents for Black Box LGB2003A-R2

  • Page 3 24-Port GbE Web Smart Switch User's Manual Release 1.04...
  • Page 4: Table Of Contents

    Table of Contents Caution ..........................v Electronic Emission Notices ....................v Introduction ........................2 1-1. Overview of 24-Port GbE Web Smart Switch ..............2 1-2. Checklist.........................3 1-3. Features .........................3 1-4. View of 24-Port GbE Web Smart Switch................5 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs).......5 1-4-2.
  • Page 5 4-4. Maintenance.........................94 4-4-1. Warm Restart......................95 4-4-2. Factory Default .....................96 4-4-3. Software Upgrade....................97 4-4-4. Configuration File Transfer ...................98 4-4-5. Logout........................99 5. Maintenace ........................100 5-1. Resolving No Link Condition ..................100 5-2. Q&A..........................100 Appendix A Technical Specifications..................101 Appendix B MIB Specifications....................105...
  • Page 6 Revision History Release Date Revision 1.00 02/10/2007 1.01 03/13/2007 1.02 06/23/2007 1.03 07/13/2007 1.04 09/04/2007...
  • Page 7: Caution

    Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
  • Page 9 About this user’s manual This user’s manual provides instructions on how to install your Web Smart Switch. This guide also covers management options and detailed explanation about hardware and software functions. Overview of this user’s manual Chapter 1 “Introduction” describes the features of 24 Gigabit Web Smart Switch Chapter 2 “Installation”...
  • Page 10: Introduction

    User Manual 1. Introduction 1-1. Overview of 24-Port GbE Web Smart Switch The 24-port Gigabit Web Smart Switch is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. switch 10/100/1000Mbps TP ports and 4 Gigabit TP/SFP transceiver slots. It supports console, telnet, http and SNMP interface for switch management.
  • Page 11: Checklist

    User Manual 1-2. Checklist Before you start installing the switch, verify that the package contains the following: A 24-Port GbE Web Smart Switch ⎯ Modules (optional) ⎯ Mounting Accessory (for 19” Rack Shelf) ⎯ This User's Manual in CD-ROM ⎯ AC Power Cord ⎯...
  • Page 12 User Manual • Supports 802.1Q VLAN • Supports user management and limits one user to login • Maximal packet length can be up to 9600 bytes for jumbo frame application • Supports Broadcasting Suppression to avoid network suspended or crashed •...
  • Page 13: View Of 24-Port Gbe Web Smart Switch

    User Manual 1-4. View of 24-Port GbE Web Smart Switch Fig. 1-1 Full View of 24-PORT GBE WEB SMART SWITCH 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional removable modules on the front panel of the switch.
  • Page 14: User Interfaces On The Rear Panel

    User Manual • LED Indicators Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED Lit when connection with remote device is good LINK/ACT Green Blinks when any traffic is present Lit Green when TP link on 1000Mbps speed Green/ Lit Amber when TP link on 100Mbps speed...
  • Page 15: View Of The Optional Modules

    User Manual 1-5. View of the Optional Modules In the switch, Port 21~24 include two types of media --- TP and SFP Fiber (LC, BiDi-SC…); they support 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed connection expansion;...
  • Page 16: Installation

    User Manual 2. Installation 2-1. Starting 24-Port GbE Web Smart Switch Up This section describes how to install the Web Smart Switch and its components, and it includes the following information: Hardware and Cable Installation - Management Station Installation - Software booting and configuration 2-1-1.
  • Page 17: Cabling Requirements

    User Manual • TP Port and Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used.
  • Page 18 User Manual 2-1-2-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection ⎯...
  • Page 19 User Manual 2-1-2-3. Switch Cascading in Topology • Takes the Delay Time into Account Theoretically, the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly. In practice, the network extension (cascading levels & overall diameter) must follow the constraint of the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications, in which the limitations are the timing requirement from physical signals defined by 802.3 series specification of Media Access Control (MAC) and PHY, and timer from some...
  • Page 20 User Manual Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-2). Fig. 2-2 No VLAN Configuration Diagram If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area.
  • Page 21 User Manual Case 2b: Port-based VLAN (See Fig.2-4). Fig. 2-4 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. VLAN3 members could not access VLAN1, VLAN2 and VLAN4.
  • Page 22: Configuring The Management Agent Of 24-Port Gbe Web Smart Switch

    User Manual 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch In the way of web, user is allowed to startup the switch management function. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures.
  • Page 23 User Manual 2-1-3-1. Management through Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. We just introduce the first type of management interface. Web-based UI for the switch is an interface in a highly friendly way.
  • Page 24: Ip Address Assignment

    User Manual Fig. 2-7 the Login Screen for Web 2-1-4. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication.
  • Page 25 User Manual With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24.
  • Page 26 User Manual Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast.
  • Page 27 User Manual In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched.
  • Page 28 User Manual For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as default router.
  • Page 29: Typical Applications

    User Manual 2-2. Typical Applications The 24-Port GbE Web Smart Switch provides auto MDIX on its TP ports and supports fiber types like: LC and BiDi-LC SFP for removable modules on its four slots. For more details on the specification of the switch, please refer to Appendix A. The switch is suitable for the following applications.
  • Page 30 User Manual Fig. 2-11 Peer-to-peer Network Connection Fig. 2-12 Office Network Connection Publication date: September, 2007 Revision A3...
  • Page 31: Basic Concept And Management

    User Manual 3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What’s the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980.
  • Page 32 User Manual IEEE 802.2 LLC Data Link Layer IEEE802.3 CSMA/CD MAC IEEE 802.3 PLS Physical Layer ANSI X3T9.5 PMD IEEE 802.3 Fiber Coaxial/STP/UTP This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model.
  • Page 33 User Manual Table 3-1 LLC Format The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address.
  • Page 34: Media Access Control (Mac)

    User Manual Fig. 3-2 SAP Format 3-2. Media Access Control (MAC) MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer.
  • Page 35 User Manual Bit 47 bit 0 1st byte 2nd byte 3rd byte 4th byte 5th byte 6th byte OUI code Serial number Table 3-3 Ethernet MAC address The first bit of the first byte in the Destination address (DA) determines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1).
  • Page 36 User Manual Destination address (DA) — The DA field is used to identify which network device(s) should receive the packet. It is a unique address. Please see the section of MAC addressing. Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0.
  • Page 37 User Manual How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to detect error; when transmitting data, it performs frame assembly. 2. Performing Media access control. It prepares the initiation jobs for a frame transmission and makes recovery from transmission failure.
  • Page 38 User Manual Ethernet MAC transmits frames in half-duplex and full-duplex ways. In half- duplex operation mode, the MAC can either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with the half-duplex operation exists only in the same collision domain, the carrier signal needs to spend time to travel to reach the targeted device.
  • Page 39 User Manual Parameter 10Base 100Base 1000Base value/LAN Max. collision 100 meters for UTP 100 meters for UTP 100 meters domain DTE to 412 meters for fiber 316 meters for fiber Max. collision 2500 meters 205 meters 200 meters domain with repeater 512 bit times 512 bit times...
  • Page 40: Flow Control

    User Manual 3-3. Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device.
  • Page 41 User Manual Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame.
  • Page 42 User Manual What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data immediately following the MAC source address. When tagged VLAN is applied, the Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag control information are different in comparison with the basic Ethernet frame.
  • Page 43: How Does A Switch Work

    User Manual The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision.
  • Page 44 User Manual Fig.3-5 Collision Domain Extended Distance Limitations: The diameter of a half-duplex LAN segment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using yellow cable is 2500 meters and 185 meters when using coaxial cable.
  • Page 45 User Manual Fig. 3-6 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination port(s). Here we introduce some important features of a switch and how they work. MAC address table When a packet is received on a port of switch, the switch first checks if the packet good or bad and extracts the source MAC address (SA) and destination...
  • Page 46 User Manual Mac address aging There is a field in MAC address table used to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA. Usually, the age time is programmable. Transmission schedule In most layer 2 switches, the QoS is supported.
  • Page 47: Virtual Lan

    User Manual 3-5. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different physical network segments bridged by switches or bridges which attach to end stations in the same broadcast domain.
  • Page 48 User Manual Fig. 3-8 Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical networks which have their own broadcast domain. The traffic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1.
  • Page 49 User Manual There are many types of VLAN applied. Most popular is port-based VLAN, tag-based VLAN and protocol-based VLAN. Port-based VLAN Some physical ports are configured as members of a VLAN. All stations attached on these ports can communicate with each other. Tag-based VLAN It identifies the membership by VLAN ID, no matter where the packet comes from.
  • Page 50 User Manual VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification with the value of 0 and priority information. Untagged frame: An Ethernet frame carries no VLAN tag information.
  • Page 51 User Manual Ingress Rule: Each packet received by a VLAN-aware bridge will be classified to a VLAN. The classification rule is described as follows. 1. If the VID of the packet is null VID (VID=0)or this packet is an untagged packet: a.
  • Page 52 User Manual How does a Tagged VLAN work? If the ingress filtering is enabled and when a packet is received, VLAN bridge will first check if the VID of the packet presents. 1). If the packet has a non-zero VID, VLAN bridge will apply this VID as the VLAN ID of the packet in the network.
  • Page 53: Link Aggregation

    User Manual 3-6. Link Aggregation Basically, Link Aggregation is to aggregate the bandwidth of more than one port to an assigned logical link. This highly increases total bandwidth to the targeted device. There is more than one Link Aggregation technology in many vendors’ switch products already, which may cause the problem of interoperability.
  • Page 54 User Manual Terminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group with a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an independent link. There are three cases of link used in the network, which are switch to switch, switch to station and station to station.
  • Page 55: Operation Of Web-Based Management

    User Manual 4. Operation of Web-based Management This chapter would introduce how to manage your Web Smart Switch and how to configure the 10/100/1000Mbps TP Ports and Gigabit TP/SFP Fiber dual media ports on the switch via web user interfaces. Web Smart Switch provides 20 fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports.
  • Page 56: Web Management Home Overview

    User Manual Fig. 4-1 4-1. Web Management Home Overview After login, System Information would be displayed as Fig. 4-2 illustrated. This page lists default values and shows you the basic information of the switch, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”.
  • Page 57: Configuration

    User Manual • The Information of Page Layout On the top part of the information page, it shows the front panel of the switch. ⎯ Linked ports will be displayed in green color, and linked-off ones will be in black. For the optional modules, the slots with no module will only show covered plates, the other slots with installed modules would present modules.
  • Page 58: System Configuration

    User Manual 4-2. Configuration Configuration includes the following functions: System Configuration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuration, Aggregation, LACP, RSTP, 802.1X, IGMP Snooping, Mirror, QoS, Filter, Rate Limit, Storm Control and SNMP. Configuration System Configuration Ports Configuration VLAN Mode Configuration VLAN Group Configuration Aggregation LACP...
  • Page 59 User Manual 4-2-1. System Configuration System configuration is one of the most important functions. Without a proper setting, network administrator would not be able to manage the device. The switch supports manual IP address setting. Fig. 4-3 Function name: System Configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, active IP address, active subnet mask, active gateway, DHCP...
  • Page 60 User Manual Active IP Address: Show the active IP address of this switch. Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Server: Show the IP address of the DHCP server. Default: 0.0.0.0 Lease Time Left: Show the lease time left of DHCP client.
  • Page 61 User Manual 32 bits Network ID Host ID Network ID Host ID Subnet number Subnet mask is used to set the subnet mask value, which should be the same value as that of the other devices resided in the same network it attaches.
  • Page 62 User Manual 4-2-2. Port Configuration Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports on the switch. By this function, you can set or reset the values for Mode and Flow Control. Parameter description: Enable Jumbo Frames: This function support jumbo frames of up to 9600 bytes, Just tick the check box ( ) to enable it.
  • Page 63 User Manual Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration Web Smart Switch supports Port-based VLAN and Tag-based VLAN (802.1q). Its VLAN mode supports 24 active VLANs and the available VLAN ID range is from 1~4094. VLAN configuration is used to divide a LAN into smaller ones. With proper configuration, you can gain not only improved security and increased performance, but also save a lot of VLAN management effort.
  • Page 64 User Manual support up to maximal 24 port-based VLAN groups. Tag-based: Tag-based VLAN identifies its member by VID. This is quite different from port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to determine if it can be forwarded.
  • Page 65 User Manual Fig. 4-6 Metro mode 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the information of VLAN Groups, and allows administrators to maintain them by modifying and deleting each VLAN group. User also can add a new VLAN group by inputting a new VLAN name and VLAN ID.
  • Page 66 User Manual Add Group: Create a new port-based VLAN or tag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the check box ( beside the ID, then press the <Delete> button to delete the group.
  • Page 67 User Manual Fig. 4-9 Port-Based VLAN Configuration Publication date: September, 2007 Revision A3...
  • Page 68: Aggregation

    User Manual 4-2-5. Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle ports by same speed, MAC, and full duplex to be a single logical port, thus the logical port can aggregate the bandwidth of these ports.
  • Page 69: Lacp

    User Manual 4-2-6. LACP Smart Web Switch supports link aggregation IEEE802.3ad standard. The standard describes Link Aggregate Control Protocol (LACP) which dynamically creates and manages trunk groups. When you enable LACP link aggregation on a port, the port can automatically negotiate with the ports at the remote end of a link to establish trunk groups.
  • Page 70: Rstp

    User Manual 4-2-7. RSTP RSTP detects and resolves network loops, and provides backup links between switches, bridges and routers. The protocol allows a switch to communicate with other RSTP compliant switches, and to ensure only one path existing between two stations in your network environment. The switch allows you to create multiple STP configurations and assign ports to a specific tree.
  • Page 71 User Manual Function name: RSTP Port Configuration Function description: Enable or disable RSTP protocol on the ports that are selected and set path cost. Parameter description: Protocol Enabled: Just tick the check box ( beside the port x to enable RSTP protocol, then press the <Apply>...
  • Page 72 User Manual 4-2-8. 802.1X 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1x-enabled port.
  • Page 73 User Manual replies if the request is granted or denied. While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator exchanges message authentication server using...
  • Page 74 User Manual The Fig. 4-15 shows the procedure of 802.1x authentication. There are steps for the login based on 802.1x port access control management. The protocol used in the right side is EAPOL and the left side is EAP. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state.
  • Page 75 User Manual to access the network. When supplicant issue EAP-Logoff message Authentication server, the port you are using is set to be unauthorized. Fig. 4-15 The 802.1X “Enabled” is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port.
  • Page 76 User Manual Function name: 802.1X Configuration Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1x port security application.Parameter description: Mode: Enable or disable 802.1X function. RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to communicate with RADIUS server for the...
  • Page 77 User Manual Re-authenticate All: Re-authenticate for all ports in at once. Force Reinitialize: Force the subscriber has to reinitialize connected to the port. Force Reinitialize All: Force Reinitialize for all ports in at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration Statistics: Choose the port which you want to show of 802.1X statistics, the screen include Authenticator counters, backend Authenticator counters, dot1x...
  • Page 78 User Manual Fig. 4-17 802.1X Statistics Function name: 802.1x Parameters Function description: In here, user can enable or disable Reauthentication function and specify how often a client has to re-enter his or her username and password to stay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authentication will take place in this port.
  • Page 79: Igmp Snooping

    User Manual 4-2-9 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch to constrain multicast traffic by listening to Internet Group Management Protocol (IGMP). After finishing the settings, please press <Apply> button to start up the function. Parameter description: IGMP Enabled: Just tick the check box (...
  • Page 80: Mirror Configuration

    User Manual 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is provided to monitor the traffic in the network. This switch supports one-port mirror multi-ports. For example, we assume that Port A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the traffic passing through Port A and Port B will be copied to Port C for monitor purpose.
  • Page 81: Qos(Quality Of Service) Configuration

    User Manual 4-2-11. QoS(Quality of Service) Configuration offers powerful QoS function. This function supports VLAN-tagged switch priority that can make precedence of 8 priorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Fig. 4-21 QoS Configuration Function name: QoS Configuration Function description: While setting QoS function, please select QoS Mode in drop-down menu at...
  • Page 82 User Manual Function name: 802.1p QoS Mode Function description: This function will affect the priority of VLAN tag. Based on priority of VLAN tag, it can arrange 0~7 priorities, priorities can map to 4 queues of the switch (low, normal, medium, high) and possess different bandwidth distribution according to your weight setting.
  • Page 83 User Manual Function name: DSCP QoS Mode Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused.
  • Page 84: Filter

    User Manual 4-2-12 Filter Function name: Filter Configuration Function description: This function lets administrators easily set management source IP addresses to the ports on the switch. After completing the settings, please press <Apply> button to make this function take effect. Parameter description: Source IP Filter: Mode:...
  • Page 85 User Manual Fig. 4-24 Filter Configuration Publication date: September, 2007 Revision A3...
  • Page 86: Rate Limit

    User Manual 4-2-13 Rate Limit Function name: Ingress and Egress Bandwidth Setting Function description: Ingress and Egress Bandwidth Setting function are used to set up the limit of Ingress or Egress bandwidth for each port. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field.
  • Page 87: Storm Control

    User Manual 4-2-14 Storm Control Function name: Storm Control Function description: Storm Control is used to block unnecessary multicast and broadcast frames that reduce switch’s performance. When the function is enabled and Storm Control rate settings are detected as exceeded, the unnecessary frames would be dropped.
  • Page 88 User Manual Multicast Rate: To enable the Multicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Flooded unicast Rate: To enable the Flooded unicast Storm capability. User can use drop-down menu to select number of frames.
  • Page 89: Snmp

    User Manual 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
  • Page 90 User Manual Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig. 4-27 SNMP Configuration Publication date: September, 2007 Revision A3...
  • Page 91: Monitoring

    User Manual 4-3. Monitoring There are six functions contained in the monitoring function. Monitoring Statistics Overview Detailed Statistics LACP Status RSTP Status IGMP Status Ping 4-3-1. Statistics Overview The function of Statistics Overview collects any information and provides the counting summary about the traffic of the port, no matter the packet is good or bad. In the Fig.
  • Page 92 User Manual The counting number of the packet received. Tx Errors: Number of bad packets transmitted. Rx Errors: Number of bad packets received. Fig. 4-28 Statistics Overview for all ports Publication date: September, 2007 Revision A3...
  • Page 93 User Manual 4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. In the Fig. 4-26, the window can show all counter information each port at one time. Parameter description: Rx Packets: The counting number of the packet received.
  • Page 94 User Manual Tx Multicast: Show the counting number of the transmitted multicast packet. Tx Broad- and Multicast: Show the counting number of the transmitted broadcast with multicast packet. Tx Error Packets: Show the counting number of the received error packets. Rx 64 Bytes: Number of 64-byte frames in good and bad packets received.
  • Page 95 User Manual Number of short frames (<64 Bytes) with valid CRC. Rx Oversize: Number of long frames(according to max_length register) with valid CRC. Rx Fragments: Number of short frames (< 64 bytes) with invalid CRC. Rx Jabber: Number of long frames(according tomax_length register) with invalid CRC.
  • Page 96 User Manual 4-3-3. LACP Status Function name: LACP Status Function description: Display LACP status. Fig. 4-30 illustrates that LACP Status window can show LACP information and status for all ports in the same time. Parameter description: LACP Aggregation Overview: Show the group/port status. Default will set to red sign for port link down, user can check legend table below for all reference.
  • Page 97 User Manual 4-3-4. RSTP Status Function name: RSTP Status Function description: Display RSTP status. Fig. 4-28 shows you that RSTP window can present VLAN bridge information and the status of all ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id.
  • Page 98 User Manual Fig. 4-31 RSTP Status Publication date: September, 2007 Revision A3...
  • Page 99 User Manual 4-3-5. IGMP Status Function name: IGMP Status Function description: Display IGMP status. In Fig. 4-29, the window shows VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted.
  • Page 100: Ping Status

    User Manual Fig. 4-32 IGMP Status 4-3-6. Ping Status Function name: Ping Status Function description: To set up target IP address for ping function and display ping status. In Fig. 4- 30, the window shows the ping information. Parameter description: Ping Parameters: Target IP address: Set up a Target IP address to ping.
  • Page 101 User Manual Ping Results: Target IP address: Show the active target IP address. Status: Show the result of the ping status. Received replies: Show the received replies number of times. Request timeouts: Show the timeout of request. Average Response times (In ms): Show the average response time in milliseconds.
  • Page 102: Maintenance

    User Manual 4-4. Maintenance There are five functions contained in the maintenance function. Maintenance Warm Restart Factory Default Software Upgrade Configuration File Transfer Logout Publication date: September, 2007 Revision A3...
  • Page 103 User Manual 4-4-1. Warm Restart Web Smart Switch offers many approaches to reboot your switch, such as: power up, hardware reset and software reset. You can press RESET button in the front panel of your switch to reset the device and to retrieve default settings. After upgrading software, you have to reboot the device to have new configuration take effect.
  • Page 104 User Manual 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and replace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed.
  • Page 105 User Manual 4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can just click Browse button to retrieve the file you want in your system to upgrade your switch. Fig. 4-36 Software Upgrade Publication date: September, 2007 Revision A3...
  • Page 106 User Manual 4-4-4. Configuration File Transfer Function name: Configuration File Transfer Function description: You can backup your switch’s configuration file into your computer folder in case accident happens. In addition, uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes. Fig.
  • Page 107: Logout

    User Manual 4-4-5. Logout In addition to auto logout function we just mentioned in system configuration section, the switch also allows administrators to logout manually by Logout function. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission.
  • Page 108: Maintenace

    User Manual 5. Maintenace 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5-2.
  • Page 109: Appendix A Technical Specifications

    User Manual Appendix A Technical Specifications Features • 20 (10/100/1000Mbps) Gigabit Ethernet (TP) switching ports are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward shared-memory Web-Smart switched. •...
  • Page 110 User Manual Hardware Specifications Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x Network Interface: Configuration Mode Connector Port 10/100/1000Mbps Gigabit TP NWay TP (RJ-45) 1 - 24 21,22,23,24 1000 FDX *SFP 1000Base-SX Gigabit Fiber (Option) 21,22,23,24 1000 FDX *SFP 1000Base-LX Gigabit Fiber (Option) 21,22,23,24...
  • Page 111 User Manual Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT, 10/100/1000Mbps 1000M SFP Fiber Port 21,22,23,24 : SFP(LINK/ACT) AC Line Power Requirement Voltage 100∼240 V Frequency 50∼60 Hz Consumption 0° to 40°C Ambient Temperature 10% to 90% Humidity...
  • Page 112 User Manual Management Software Specifications Auto-negotiation support on 10/100Base-TX ports, Web browser can set transmission speed (10/100Mbps) and operation mode (Full/Half System Configuration duplex) on each port, enable/disable any port, set VLAN group, set Trunk Connection. Port-Base / 802.1Q-Tagged, allowed up to 24 VLAN Function active VLANs in one switch.
  • Page 113: Appendix Bmib Specifications

    User Manual Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below. PRIVATE-GESM-SW24L-MIB DEFINITIONS ::= BEGIN IMPORTS mib-2, DisplayString,ifIndex FROM RFC1213-MIB enterprises,Counter, TimeTicks, Gauge,IpAddress FROM RFC1155-SMI OBJECT-TYPE FROM RFC-1212 TRAP-TYPE FROM RFC-1215; privatetech OBJECT IDENTIFIER ::= { enterprises 5205 } switch OBJECT IDENTIFIER ::= { privatetech 2 } GESM-SW24LProductId...

This manual is also suitable for:

Lgb2002a-r2

Table of Contents