KTI Networks KS-2262 User Manual

KTI Networks KS-2262 User Manual

24 fast ethernet + 2 gigabit l2 managed switch
Table of Contents

Advertisement

Quick Links

24 Fast Ethernet + 2 Gigabit
L2 Managed Switch
User's Manual
KS-2262
Release 2.28

Advertisement

Table of Contents
loading

Summary of Contents for KTI Networks KS-2262

  • Page 1 24 Fast Ethernet + 2 Gigabit L2 Managed Switch User's Manual KS-2262 Release 2.28...
  • Page 2: Electronic Emission Notices

    Electronic Emission Notices Federal Communications Commission (FCC) Statement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
  • Page 3: Table Of Contents

    1-2. CHECKLIST --------------------------------------------------------------------------------------------------------------------8 1-3. FEATURES ----------------------------------------------------------------------------------------------------------------------8 1-4. VIEW OF 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH ---------------------------------------- 10 1-4-1. USER INTERFACES ON THE FRONT PANEL (BUTTON, LEDS AND PLUGS)---------------------------- 10 1-4-2. USER INTERFACES ON THE REAR PANEL ----------------------------------------------------------------------- 12 1-5.
  • Page 4 3-15. SECURITY------------------------------------------------------------------------------------------------------------------128 3-16. BANDWIDTH MANAGEMENT ---------------------------------------------------------------------------------------131 3-17. QOS(QUALITY OF SERVICE) CONFIGURATION ----------------------------------------------------------------135 3-18. DIAGNOSTICS ------------------------------------------------------------------------------------------------------------145 3-19. TFTP SERVER--------------------------------------------------------------------------------------------------------------148 3-20. LOG --------------------------------------------------------------------------------------------------------------------------149 3-21. FIRMWARE UPGRADE -------------------------------------------------------------------------------------------------151 3-22. REBOOT --------------------------------------------------------------------------------------------------------------------152 3-23. LOGOUT --------------------------------------------------------------------------------------------------------------------153 4. OPERATION OF CLI MANAGEMENT--------------------------------------------------------------------------------154 4-1. CLI MANAGEMENT-------------------------------------------------------------------------------------------------------154 4-1-1. LOGIN ----------------------------------------------------------------------------------------------------------------------154 4-2.
  • Page 6: Caution

    Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
  • Page 7 In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH through the built-in CLI and web by RS-232 serial interface and Ethernet ports step-by-step. Many explanations in detail of hardware and software functions are shown as well as the examples of the operation for web- based interface and command-line interface (CLI).
  • Page 8: Introduction

    1-1. Overview of 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH, 24 Fast Ethernet + 2 Gigabit L2 Managed Switch, implemented 24 10/100Mbps TP + 2 Gigabit dual media ports with TP/SFP, is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet and Ethernet specifications.
  • Page 9 C C C C Key Features in the Device QoS: Support Quality of Service by the IEEE 802.1P standard. There are two priority queue and packet transmission schedule using Weighted Round Robin (WRR). User-defined weight classification of packet priority can be based on either VLAN tag on packets or user-defined port priority.
  • Page 10: Checklist

    1-2. Checklist Before you start installing the switch, verify that the package contains the following: 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH 24 Fast Ethernet + 2 Gigabit L2 Managed Switch Fiber Modules (optional) Mounting Accessory (for 19” Rack Shelf)
  • Page 11 CSupports 802.1x port security on a VLAN CSupports user management and only first login administrator can configure the device. The rest of users can only view the switch CSNMP access can be disabled and prevent from illegal SNMP access C...
  • Page 12: View Of 24 Fast Ethernet + 2 Gigabit L2 Managed Switch

    1-4. View of 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH Fig. 1-1 Full View of 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH with SFP 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Fast Ethernet ports and 2 slots for optional removable modules on the front panel of the switch.
  • Page 13 C C C C LED Indicators Color System LED CPURUN Green POWER Green Green Green Green 10/100Mbps Ethernet TP Port 1 to 24 LED Green Amber ACT/FDX/ SPD (TP Port 1 to 24 LED) 10/100/1000Mbps Gigabit TP/Fiber Port 25, 26 LED Green Green Green...
  • Page 14: User Interfaces On The Rear Panel

    One RS-232 DB-9 interface is offered for configuration or management. And there is one AC power input socket for having the switch powered on or off. AC Line 100-240V 50/60 Hz RS-232 DB-9 Connector Fig. 1-3 Rear View of 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH...
  • Page 15: View Of The Optional Modules

    1-5. View of the Optional Modules In the switch, Port 25, 26 includes two types of media --- TP and SFP Fiber (LC, BiDi LC…); this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed connection expansion.
  • Page 17: Installation

    At the beginning, please do first: ⇒ Wear a grounding device to avoid the damage from electrostatic discharge C C C C Installing Optional SFP Fiber Transceivers to the L2 Managed Switch Note: If you have no modules, please skip this section.
  • Page 18 It means you do not have to tell from them, just plug it. ⇒ Use Cat. 5 grade RJ-45 TP cable to connect to a TP port of the switch and the other end is connected to a network-aware device such as a workstation or a server.
  • Page 19: Installing Chassis To A 19-Inch Wiring Closet Rail

    ⇒ Wear a grounding device for electrostatic discharge. ⇒ Screw the mounting accessory to the front side of the switch (See Fig. 2-2). ⇒ Place the Chassis into the 19-inch wiring closet rail and locate it at the proper position. Then, fix the Chassis by screwing it.
  • Page 20: Cabling Requirements For Tp Ports

    2-1-3-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters.
  • Page 21: Switch Cascading In Topology

    Level 1 switch and connect all other switches to it at Level 2. Server/Host is recommended to connect to the Level 1 switch. This is general if no VLAN or other special requirements are applied.
  • Page 22 Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-3). Fig. 2-3 No VLAN Configuration Diagram If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area.
  • Page 23 Case 2b: Port-based VLAN (See Fig.2-5). Fig. 2-5 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4.
  • Page 24: Switch

    2-1-4. Configuring the Management Agent of 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH We offer you three ways to startup the switch management function. They are RS- 232 console, CLI, and Web. Users can use any one of them to monitor and configure the switch.
  • Page 25: Configuring The Management Agent Through The Serial Rs-232 Port

    DB-9 connector. Next, run a terminal emulator with the default setting of the switch’s serial port. With this, you can communicate with the switch. In the switch, RS-232 interface only supports baud rate 57.6k bps with 8 data bits, 1 stop bit, no parity check and no flow control.
  • Page 26 Please refer to Fig. 2-7 CLI Management for details about factory setting. They are default setting of IP address. You can first either configure your PC IP address or change IP address of the switch, next to change the IP address of default gateway and subnet mask.
  • Page 27: Configuring The Management Agent Through The Ethernet Port

    C C C C Managing L2 MANAGED SWITCH through Ethernet Port Before you communicate with the switch, you have to finish first the configuration of the IP address or to know the IP address of the switch. Then, follow the procedures listed below.
  • Page 28: Ip Address Assignment

    Fig. 2-10 the Login Screen for Web 2-1-5. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication.
  • Page 29 With the class addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24.
  • Page 30 Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1- 1 and is used for IP broadcast.
  • Page 31 In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched.
  • Page 32 The gateway setting is used for Trap Events Host only in the switch. For assigning an IP address to the switch, you just have to check what the IP address of the network will be connected with the switch. Use the same network address and append your host address to it.
  • Page 33: Typical Applications

    Fast Ethernet TP ports with auto MDIX and 2 Gigabit dual media ports with SFP for removable module supported comprehensive fiber types of connection, including LC, BiDi LC for SFP. For more details on the specification of the switch, please refer to Appendix A.
  • Page 34 Fig. 2-14 Peer-to-peer Network Connection Fig. 2-15 Office Network Connection...
  • Page 35: Operation Of Web-Based Management

    24 10/100Mbps TP + 2 Gigabit dual media ports with TP/SFP Fiber management Ethernet switch. access and monitor through any one port of the switch all the status of the switch, including MIBs status, each port activity, Spanning tree status, port aggregation...
  • Page 36 If there are two or more users using administrator’s identity, the switch will allow the only one who logins first to configure the system. The rest of users, even with administrator’s identity, can only monitor the system.
  • Page 37: Web Management Home Overview

    C C C C The Information of Page Layout On the top side, it shows the front panel of the switch. In the front panel, the linked ports will display green; as to the ports, which are link off, they will be dark.
  • Page 38 In Fig. 3-3, it shows the basic information of the clicked port. With this, you’ll see the information about the port status, traffic status and bandwidth rating for egress and ingress respectively. On the left-top corner, there is a pull-down list for Auto Logout. For the sake of security, we provide auto-logout function to protect you from illegal user as you are leaving.
  • Page 39 Root System SNMP IGMP Snooping MAC Table 802.1x Configuration Bandwidth Diagnostics Reboot Port DHCP Boot VLAN GVRP Trunk Alarm Security TFTP Server Firmware Upgrade Logout...
  • Page 40: System Information

    The time accumulated since this switch is powered up. Its format is day, hour, minute, second. Current time: Show the system time of the switch. Its format: day of week, month, day, hours: minutes: seconds, year. For instance, Tue Apr 20 23:25:58 2004 BIOS version: The version of the BIOS in this switch.
  • Page 41 Host IP address: The IP address of the switch. Host MAC address: It is the Ethernet MAC address of the management agent in this switch. Device Port: Show all types and numbers of the port in the switch. RAM size: The size of the DRAM in this switch.
  • Page 42: Ip Configuration

    The switch supports both manual IP address setting and automatic IP address setting via DHCP server. When IP address is changed, you must reboot the switch to have the setting taken effect and use the new IP to browse for web management and CLI management.
  • Page 43 IP address: Users can configure the IP settings and fill in new values if users set the DHCP function “Disable”. Then, click <Apply> button to update. When DHCP is disabled, Default: 192.168.1.1 If DHCP is enabled, this field is filled by DHCP server and will not allow user manually set it any more.
  • Page 44 The switch supports DNS client function to re-route the mnemonic name address to DNS server to get its associated IP address for accessing Internet. User can specify a DNS IP address for the switch. With this, the switch can translate a mnemonic name address into an IP address.
  • Page 45: Time Configuration

    “Second” within the valid value range indicated in each item. If you input an invalid value, for example, 61 in minute, the switch will clamp the figure to 59. NTP is a well-known protocol used to synchronize the clock of the switch system time over a network.
  • Page 46 Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manually specify an user-defined NTP server as well as Time Zone, the switch will sync the time in a short after pressing <Apply> button. Though it synchronizes the time automatically, NTP does not update the time periodically without user’s processing.
  • Page 47 Day Light Saving End: This is used to set when to stop performing the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day: Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23. Default: 0 Fig.
  • Page 48: Account Configuration

    3-1-4. Account Configuration In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password.
  • Page 49: Management Security

    3-1-5. Management Security Through the management security configuration, the manager can do the strict setup to control the switch and limit the user to access this switch. The following rules are offered for the manager to manage the switch: Rule 1) : When no list exists, then it will accept all connections.
  • Page 50 VLAN VID is able to be accepted or denied by the switch, the IP range of the user could be accepted or denied by the switch, the port that the user is allowed or not allowed to connect with the switch, or the way of controlling and connecting to the switch via Http, Telnet or SNMP.
  • Page 51 The switch including “Any” and “Custom”. Default is “Any”. “Http”, “Telnet” and “SNMP” are three ways for the access and managing the switch in case that” Custom” had been chosen. Action: supports two kinds of options The switch including “Deny”...
  • Page 52: Virtual Stack

    Master machine. Instead of SNMP or Telnet UI, VSM is only available in Web UI. While one switch becomes the Master, two rows of buttons for group device will appear on the top of its Web UI.
  • Page 53 It is used for the activation or de-activation of VSM. Default is Enable. Role: The role that the switch would like to play in virtual stack. Two types of roles, including master and slave are offered for option. Default is Master.
  • Page 54: Port Configuration

    3-2. Port Configuration Four functions, including Port Status, Port Configuration, Simple Counter and Detail Counter are contained in this function folder for port monitor and management. Each of them will be described in detail orderly in the following sections. Port Configuration 3-2-1.Port Status The function Port Status gathers the information of all ports’...
  • Page 55 Port Status Function Description: Report the latest updated status of all ports in this switch. When any one of the ports in the switch changes its parameter displayed in the page, it will be automatically refreshed the port current status about every 5 seconds.
  • Page 56 Speed / Duplex : Display the speed and duplex of all port. There are three speeds 10Mbps, 100Mbps and 1000Mbps supported for TP media, and the duplex supported is half duplex and full duplex. If the media is 1Gbps fiber, it is 1000Mbps supported only.
  • Page 57 Parameter description of Port 25 and Port 26: Connector Type: Display the connector type, for instance, UTP, SC, ST, LC and so Fiber Type: Display the fiber mode, for instance, Multi-Mode, Single-Mode. Tx Central Wavelength: Display the fiber optical transmitting central wavelength, for instance, 850nm, 1310nm, 1550nm and so on.
  • Page 58 Vendor SN (Serial Number): Show the serial number assigned by the manufacturer. Date Code: Show the date this module was made. Temperature: Show the current temperature of module. Vcc: Show the working DC voltage of module. Mon1(Bias) mA: Show the Bias current of module. Mon2(TX PWR): Show the transmit power of module.
  • Page 59: Port Configuration

    Function name: Port Configuration Function description: It is used to set each port’s operation mode. The switch supports 3 parameters for each port. They are State, Speed/Duplex and Flow Control. Parameter description: State: Set the communication capability of the port is Enabled or Disabled.
  • Page 60 Speed/Duplex: Set the speed and duplex of the port. In speed, 10/100Mbps baud rate is available for Fast Ethernet, Gigabit module in port 25, 26. If the media is 1Gbps fiber, it is always 1000Mbps and the duplex is full only. If the media is TP, the Speed/Duplex is comprised of the combination of speed mode, 10/100/1000Mbps, and duplex mode, full duplex and half duplex.
  • Page 61: Port Description

    3-2-3. Port Description Port Description is applied to change the setting of each port. In this configuration function, you can give a name to each port. All of them are described in detail below. Function name: Port Description Function description: It is used to set each port’s description.
  • Page 62: Simple Counter

    3-2-5. Simple Counter The function of Simple Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-13, the window can show all ports’ counter information at the same time.
  • Page 63 Rx Packet: The counting number of the packet received. Tx Collision: Number of collisions transmitting frames experienced. Rx Error Packet: Number of bad packets received.
  • Page 64: Detail Counter

    3-2-4. Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the Fig. 3-14, the window can show only one port counter information at the same time.
  • Page 65 Show the counting number of the received unicast packet. Rx Broadcast Packets: Show the counting number of the received broadcast packet. Rx Multicast Packets: Show the counting number of the received multicast packet. Rx Pause Packets: Show the counting number of the received pause packet. Tx Collisions: Number of collisions transmitting frames experienced.
  • Page 66 Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes. Tx Unicast Packets: Show the counting number of the transmitted unicast packet. Tx Broadcast Packets: Show the counting number of the transmitted broadcast packet. Tx Multicast Packets: Show the counting number of the transmitted multicast packet.
  • Page 67: Snmp Configuration

    Basically, it is passive except issuing the trap information. The switch supports a switch to turn on or off the SNMP agent. If you set the field SNMP “Enable”, SNMP agent will be started up. All supported MIB OIDs, including RMON MIB, can be accessed via SNMP manager.
  • Page 68 Default port number: 162 Trap: In the switch, there are 6 trap hosts supported. Each of them has its own community name and IP address; is user-definable. To set up a trap host means to create a trap manager by assigning an IP address to host the trap message.
  • Page 69: Loop Detection

    3-4. Loop Detection Looping will always occur when the switches are connected as a cycle and a switch transmits the packets that will go back to the transmitted switch. Loop Detection will prevent the looping from happening. Moreover, it could remove the looping phenomenon per port.
  • Page 70 looping detection. After enabling looping action, you should decide which port you would like to open loop detection capability. For example, you open the loop detection of port 1 as enable state. When the looping situation happens from port 1, Loop Detection will lock the port1’s ability. And then you will see that the “Current Status”...
  • Page 71: Dhcp Boot

    At this moment, a bunch of switch or other network device on the LAN will try its best to find the server to get the services or try to set up the predefined links, they will issue many broadcast packets in the network.
  • Page 72: Igmp Snooping

    IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
  • Page 73 Passive: In Passive Snooping mode, the IGMP snooping will not periodically poll the hosts in the groups. The switch will send a Membership Query message to all hosts only when it has received a Membership Query message from a router.
  • Page 74 Parameter description: IP Range: The switch supports two kinds of options for managed valid IP range, including “Any” and “Custom”. Default is “Any”. In case that ”Custom” is chosen, you can assign effective IP range. The valid range is 224.0.0.0~239.255.255.255.
  • Page 75 Add: A new entry of allowed group parameters as mentioned above had been setup and then press <Add> button. Edit: The existed entry also can be modified after pressing <Edit> button. Delete: Remove the existed entry of allowed group configuration from the allowed group.
  • Page 76: Vlan

    1, you can communicate with port 2&3&4. If you are on the port 5, then you cannot talk to them. Each port-based VLAN you built up must be assigned a group name. This switch can support up to maximal 26 port-based VLAN groups.
  • Page 77 Note: If Symmetric is enabled and port 1, for example, receives an untagged packet, the switch will apply the PVID of port 1 to tag this packet, the packet then will be forwarded. But if the PVID of port 1 is not 100, the packet will be dropped.
  • Page 78 Fig. 3-20...
  • Page 79: Tag-Based Group

    3-7-2. Tag-based Group Function name: Tag-based Group Configuration Function description: It shows the information of existed Tag-based VLAN Groups. You can also easily create, edit and delete a Tag-based VLAN group by pressing <Add>, <Edit> and <Delete> function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID after pressing <Add>...
  • Page 80 Add Group: Input the VLAN name, VID and then choose the member by ticking the check box beside the port No. to create a new Tag-based VLAN. As to the parameter of Untag, it stands for an egress rule of the port. If you tick the check box beside the port No., packets with this VID outgoing from this port will be untagged.
  • Page 81: Pvid

    Tag-based VLAN with VID x. For example, if port x receives an untagged packet, the switch will apply the PVID (assume as VID y) of port x to tag this packet, the packet then will be forwarded as the tagged packet with VID y.
  • Page 82 It bases on 802.1p QoS and affects untagged packets. When the packets enter the switch, it would get the priority precedence according to your Default Priority setting and map to 802.1p priority setting in QoS function. For example, while you set Default Priority of port 2 with 2 and transmit untagged packets to port 2, these packets will own priority 2 precedence due to your default 802.1p Priority Mapping setting in QoS function and...
  • Page 83: Port-Based Group

    3-7-4. Port-based Group Function name: Port-based Group Configuration Function description: It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a Port-based VLAN group by pressing <Add>, <Edit> and <Delete> function buttons. User can add a new VLAN group by inputting a new VLAN name.
  • Page 84 Add Group: Create a new Port-based VLAN. Input the VLAN name and choose the member by ticking the check box beside the port No., then, press the <Apply> button to have the setting taken effect. Delete Group: Just press the <Delete> button to remove the selected group entry from the Port-based group table.
  • Page 85: Management Vlan

    3-7-5. Management VLAN Function name: Management VLAN Function Description: Parameter description: State: It works when the tag-based mode is chosen. When this function is enabled, only the tagged packets with this VID can manage the switch. VID: Valid range 1~4094.
  • Page 86: Mac Table

    3-8. MAC Table MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table Maintenance, Static and MAC Alias, which cannot be categorized to some function type. They are described below. Function name: MAC Table Information Function Description: Display the static or dynamic learning MAC entry and the state for the selected port.
  • Page 87 Port: The port that exists in the searched MAC Entry. VID: VLAN Group that MAC Entry exists. State: Display the method that this MAC Entry is built. It may show “Dynamic MAC” or “Static MAC”. Fig. 3-26...
  • Page 88 Function Name: MAC Table Maintenance Function Description: This function can allow the user to set up the processing mechanism of MAC Table. An idle MAC address exceeding MAC Address Age-out Time will be removed from the MAC Table. The range of Age-out Time is 10-1000000 seconds, and the setup of this time will have no effect on static MAC addresses.
  • Page 89 As “static” is chosen, assign a MAC address to a specific port, all of the switch’s traffics sent to this MAC address will be forwarded to this port. As “static with destination drop” is chosen, the packet will be dropped if its DA is equal to the value you set up.
  • Page 90 Static with Source Drop: While the SA of the incoming packets meets the value you set up, these packets will be dropped. Port : Select the port No. you would like to do setup in the switch. It is 1 ~26.
  • Page 91 Function name: MAC Alias Function description: MAC Alias function is used to let you assign MAC address a plain English name. This will help you tell which MAC address belongs to which user in the illegal access report. At the initial time, it shows all pairs of the existed alias name and MAC address.
  • Page 92 Parameter description: MAC Address: It is a six-byte long Ethernet hardware address and usually expressed by hex and separated by hyphens. For example, 00 – 40 - C7 - D6 – 00 - 02 Alias: MAC alias name you assign. Note: If there are too many MAC addresses learned in the table, we recommend you inputting the MAC address and alias name directly.
  • Page 93: Gvrp Configuration

    3-9. GVRP Configuration GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations.
  • Page 94 A time period for announcement that all registered device is going to be de-registered. If someone still issues a new join, then a registration will be kept in the switch. Valid range: 1000-5000 unit time, Default: 1000 unit time. Default Applicant Mode: The mode here means the type of participant.
  • Page 95 GVRP PDU. There are two modes, disable and enable, provided for the user’s choice. Disabled: In this mode, the switch dynamic VLAN will be created when this port received GVRP PDU. The default setting is Normal. Enabled: In this mode, the switch does not create dynamic VLAN when this port received GVRP PDU.
  • Page 96 Function name: GVRP Counter Function description: All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions. Actually, they are GARP packets. Parameter description: Received: Total GVRP Packets: Total GVRP BPDU is received by the GVRP application. Invalid GVRP Packets: Number of invalid GARP BPDU is received by the GARP application.
  • Page 97 LeaveEmpty Message Packets: Number of GARP BPDU with Leave Empty message is received by the GARP application. Empty Message Packets: Number of GARP BPDU with Empty message is received by the GARP application. Transmitted: Total GVRP Packets: Total GARP BPDU is transmitted by the GVRP application. Invalid GVRP Packets: Number of invalid GARP BPDU is transmitted by the GVRP application.
  • Page 98 Function name: GVRP Group Information Function description: To show the dynamic group member and their information. Parameter description: Current Dynamic Group Number: The number of GVRP group that are created currently. VID: VLAN identifier. When GVRP group creates, each dynamic VLAN group owns its VID.
  • Page 99: Stp Configuration

    Bridge Priority: Show this switch’s current bridge priority setting. Default is 32768. Designated Root: Show root bridge ID of this network segment. If this switch is a root bridge, the “Designated Root” will show this switch’s bridge ID. Designated Priority: Show the current root bridge priority.
  • Page 100 All bridges in the LAN will re-learn and determine which the root bridge is. Maximum Age time is assigned by Root Bridge in unit of seconds. Default is 20 seconds. Current Forward Delay: Show the current root bridge forward delay time. The value of Forward Delay time is set by root.
  • Page 101: Stp Configuration

    Max. Age: When the 24 FAST ETHERNET + 2 GIGABIT L2 MANAGED SWITCH is the root bridge, the whole LAN will apply this figure set by this switch as their maximum age time. When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max.
  • Page 102 Two options are offered for the user’s choosing STP algorithm. One is RSTP and the other is STP. If STP is chosen, RSTP will run as a legacy STP. The switch supports RSTP (802.1w) which is backward compatible with STP (802.1d).
  • Page 103: Stp Port Configuration

    Root Port more possibly. Configured Path Cost: The range is 0 – 200,000,000. In the switch, if path cost is set to be zero, the STP will get the recommended value resulted from auto-negotiation of the link accordingly and display this value in the field of Path Cost Status.
  • Page 104 802.1w RSTP recommended value: (Valid range: 1 – 200,000,000) 10 Mbps : 2,000,000 100 Mbps : 200,000 1 Gbps Default: 0 Priority: Priority here means Port Priority. Port Priority and Port Number are mixed to form the Port ID. Port IDs are often compared in order to determine which port of a bridge would become the Root Port.
  • Page 105 M Check: Migration Check. It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmission. The only benefit of this operation is to make the port quickly get back to act as an RSTP port. Click <M Check>...
  • Page 106: Trunking Configuration

    As to system restrictions about the port aggregation function on the switch, In the management point of view, the switch supports maximum 3 trunk groups for LACP and additional 3 trunk groups for Static Trunk. But in the system capability view, only 3 “real trunked”...
  • Page 107 Per Trunking Group supports a maximum of 4 ready member-ports. Please note that some decisions will automatically be made by the system while you are configuring your trunking ports. Trunk Setting Rules are listed below: Rule1: Maximum 3 groups are allowed Rule 2: The members of each group cannot exceed more than 4 ports Rule 3: Group 1 and 2 cannot exist member 25 and 26 port Rule 4: Group 3 cannot exist member from 1 to 24 port...
  • Page 108 Function name: Port Setting/Status Function description: Port setting/status is used to configure the trunk property of each and every port in the switch system. Parameter description: Method: This determines the method a port uses to aggregate with other ports. None: A port does not want to aggregate with any other port should choose this default setting.
  • Page 109 Aggtr: Aggtr is an abbreviation of “aggregator”. Every port is also an aggregator, and its own aggregator ID is the same as its own Port No. We can regard an aggregator as a representative of a trunking group. Ports with same Group ID and using same trunking method will have the opportunity to aggregate to a particular aggregator port.
  • Page 110 Function name: Aggregator View Function description: To display the current port trunking information from the aggregator point of view. Parameter description: Aggregator: It shows the aggregator ID (from 1 to 26) of every port. In fact, every port is also an aggregator, and its own aggregator ID is the same as its own Port No..
  • Page 111 LACP Detail (LACP Aggregator Detailed Information) Function description: Show the detailed information of the LACP trunking group. Parameter description: Actor: The switch you are watching on. Partner: The peer system from this aggregator’s view. System Priority: Show the System Priority part of a system ID.
  • Page 112 Default: 32768. LACP Hash Method: DA+SA, DA and SA are three Hash methods offered for the Link Aggregation of the switch. Packets will decide the path to transmit according to the mode of Hash you choose. Default: DA and SA...
  • Page 113: Configuration

    3-12. 802.1x Configuration 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1x-enabled port.
  • Page 114 If success, the authentication server will notice the authenticator the grant. PC A, then, is allowed to access B and C via the switch. If there are two switches directly connected together instead of single one, for the link connecting two switches, it may have to act two port roles at the end of the link: authenticator and supplicant, because the traffic is bi-directional.
  • Page 115 EAPOL and the left side is EAP. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage.
  • Page 116 If user ID and password is correct, the authentication server will send a Radius-Access-Accept to the authenticator. If not correct, the authentication server will send a Radius-Access-Reject. When the authenticator PAE receives a Radius-Access-Accept, it will send an EAP-Success to the supplicant. At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x control is in the authorized state.
  • Page 117 Only MultiHost 802.1X is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port.
  • Page 118 Function name: 802.1x State Setting Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1x port security application. Parameter description: Radius Server: RADIUS server IP address for authentication. Default: 192.168.1.1 Port Number: The port number to communicate with RADIUS server for the authentication service.
  • Page 119 The port number to communicate with Accounting server for the accounting service. The valid value ranges 1-65535. Default port number is 1813.
  • Page 120 Function name: 802.1x Mode Setting Function description: Set the operation mode of 802.1X for each port. In this device, it supports only Multi-host operation mode. Parameter description: Port Number: Indicate which port is selected to configure the 802.1x operation mode. 802.1x Mode: 802.1x operation mode.
  • Page 121 Function name: Port Security Management Function description: Shows each port status. In Multihost mode, it shows the port number and its status, authorized or unauthorized. Parameter description: Disable Mode: When selecting Disable mode for a port in the function 802.1X Port Mode Configuration, the port is in the uncontrolled port state and does not apply 802.1X authenticator on it.
  • Page 122 Function name: Param. Setting Function description: This function is used to configure the parameters for each port in 802.1x port security application. Refer to the following parameters description for details. Parameter description: Port: It is the port number to be selected for configuring its associated 802.1x parameters which are Port control, reAuthMax, txPeriod, Quiet Period, reAuthEnabled, reAuthPeriod, max.
  • Page 123 reAuthEnabled: Choose whether regular authentication will take place in this port. Default: ON reAuthPeriod(1-65535 s): A non-zero number seconds between the periodic re-authentication of the supplicant. Default: 3600 max. Request(1-10): The maximum of number times that the authenticator will retransmit an EAP Request to the supplicant before it times out the authentication session.
  • Page 124: Alarm Configuration

    Events Configuration Function description: The Trap Events Configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 21 different trap events to users for switch management. The trap information can be sent out in three ways, including email, mobile phone SMS (short message system) and trap.
  • Page 125 Function name: Email/SMS Configuration Function description: Alarm configuration is used to configure the persons who should receive the alarm message via either email or SMS, or both. It depends on your settings. An email address or a mobile phone number has to be set in the web page of alarm configuration.
  • Page 126 Parameter description: Email: Mail Server: the IP address of the server transferring your email. Username: your username on the mail server. Password: your password on the mail server. Email Address 1 – 6: email address that would like to receive the SMS: SMS Server: the IP address of the server transferring your SMS.
  • Page 127: Configuration

    This is factory setting and cannot be altered. In Web UI, two restore default functions are offered for the user to restore to the default setting of the switch. One is the function of “Restore Default Configuration included default IP address”, the IP address will restore to default “192.168.1.1”...
  • Page 128: Save/Restore

    Restore Default Configuration (includes default IP address) Function description: Restore Default Configuration function can retrieve factory setting to replace the start configuration. And the IP address of the switch will also be restored to 192.168.1.1. Function name: Restore Default Configuration (excludes current IP address)
  • Page 129: Config File

    3-14-2. Config File Function name: Config File Function description: With this function, user can back up or reload the config files of Save As Start or Save As User via TFTP. To notice that after import config file, the original IP related setting won’t be changed by config file.
  • Page 130: Security

    3-15. Security Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring.
  • Page 131 Port 1~26. In this group, all of these member ports cannot forward packets with each other. Thus, the switch will not be capable of forwarding any packets in case its all ports become the members of the Isolated group.
  • Page 132 Function name: Restricted Group Function description: The function of the Restricted Group can decide the direction of transmitting packets for the specific port. The packets received by the port with the “Ingress” mode of Restricted Group will be sent to the ports with the “Egress” mode of Restricted Group.
  • Page 133: Bandwidth Management

    3-16. Bandwidth Management Function name: Ingress Bandwidth Setting Function description: Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port. Parameter description: Port No.: Choose the port that you would like this function to work on it. Valid range of the port is 1~26.
  • Page 134 Function name: Egress Bandwidth Setting Function description: Egress Bandwidth Setting function is used to set up the limit of Egress bandwidth for each port. Parameter description: Port No.: Choose the port that you would like this function to work on it. Valid range of the port is 1~26.
  • Page 135 Function name: Storm Setting Function description: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port. Parameter description: Storm Type: Disable: Disable the function of the bandwidth storm control. Broadcast Storm Control: Enable the function of bandwidth storm control for broadcast packets.
  • Page 136 Storm Rate: Set up the limit of bandwidth for storm type you choose. Valid value of the storm rate ranges from 1-100 with the minimum unit of 1. And only integer is acceptable. Default is 100.
  • Page 137: Qos(Quality Of Service) Configuration

    3-17. QoS(Quality of Service) Configuration The switch supports 5 kinds of QoS, are as follows, MAC Priority, 802.1p Priority, IP TOS Priority, and DiffServ DSCP Priority. Port Based Priority has a special name called VIP Port in the switch. Any packets enter VIP Port will have highest transmitting priority.
  • Page 138 The QoS functions as we mentioned above are able to enable at the same time. But, the following precedence will decide whether these functions work or not. 1. enable both VIP and TOS 2. enable both VIP and DSCP 3. enable both TOS and DSCP 4.
  • Page 139 Function name: QoS Global Setting Function description: When you want to use QoS function, please enable QoS Mode in advance. Then you can use MAC Priority, 802.1p Priority, IP TOS Priority, DiffServ DSCP Priority, or VIP Port functions and take effect. In this function, you can Enable QoS Mode.
  • Page 140 Function name: VIP Port Setting Function description: When the port is set as VIP Port, the packets enter this port and will have highest transmitting priority. For example, as you choose port 2 is VIP Port, simultaneously transmit packets from port 2 and port 3 to port 1 at speed of 100MB and let congestion happen.
  • Page 141 Function description: This function will affect the priority of VLAN tag. Based on priority of VLAN tag, it can arrange 0~8 priorities, priorities can map to 4 queues of the switch (queue 0~3) and possess different bandwidth distribution according to your weight setting.
  • Page 142 PRECEDENCE 3-bits can arrange 8 kinds of priorities corresponding to the 0~7 priority in the following priority diagram. TOS Delay Priority Mapping works while D-TYPE in TOS field of IP header of the packets received by the switch is configured. Parameter description: TOS Delay Priority Mapping: Each Priority can select any of Queue 0 ~ Queue 3.
  • Page 143 PRECEDENCE 3-bits can arrange 8 kinds of priorities corresponding to the 0~7 priority in the following priority diagram. TOS Throughput Priority Mapping works while T-TYPE in TOS field of IP header of the packets received by the switch is configured. Parameter description: TOS Throughput Priority Mapping: Each Priority can select any of Queue 0 ~ Queue 3.
  • Page 144 PRECEDENCE 3-bits can arrange 8 kinds of priorities corresponding to the 0~7 priority in the following priority diagram. TOS Reliability Priority Mapping works while R-TYPE in TOS field of IP header of the packets received by the switch is configured. Parameter description: TOS Reliability Priority Mapping: Each Priority can select any of Queue 0 ~ Queue 3.
  • Page 145 PRECEDENCE 3-bits can arrange 8 kinds of priorities corresponding to the 0~7 priority in the following priority diagram. TOS Monetary Cost Priority Mapping works while M-TYPE in TOS field of IP header of the packets received by the switch is configured. Parameter description: TOS Monetary Cost Priority Mapping: Each Priority can select any of Queue 0 ~ Queue 3.
  • Page 146 DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet. In the switch, user is allowed to set up these 64 kinds of Class that belong to any of queue 0~3.
  • Page 147: Diagnostics

    3-18. Diagnostics Three functions, including Diagnostics, Loopback Test and Ping Test are contained in this function folder for device self-diagnostics. Each of them will be described in detail orderly in the following sections. Diagnostics Function name: Diagnostics Function description: Diagnostics function provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed.
  • Page 148 The test signal only wraps around in the switch box. As to the latter test function, it will send the test signal to its link partner. If you do not have them connected to active network devices, i.e.
  • Page 149 Ping Test function to let you know that if the target device is available or not. You can simply fill in a known IP address and then click <Ping> button. After a few seconds later, the switch will report you the pinged device is alive or dead in the field of Ping Result.
  • Page 150: Tftp Server

    3-19. TFTP Server Function name: TFTP Server Function description: Set up IP address of TFTP server. Parameter description: Specify the IP address where the TFTP server locates. Fill in the IP address of your TFTP server, then press <Apply> button to have the setting taken effect. Fig.
  • Page 151: Log

    This function shows the log data. The switch provides system log data for users. There are 16 private trap logs, 5 public trap logs. The switch supports total 120 log entries. For more details on log items, please refer to the section of Trap/Alarm Configuration and SNMP Configuration.
  • Page 152 Upload Log: Upload log data through tftp. Clear Log: Clear log data.
  • Page 153: Firmware Upgrade

    3-21. Firmware Upgrade Software upgrade tool is used to help upgrade the software function in order to fix or improve the function. The switch provides a TFTP client for software upgrade. This can be done through Ethernet. Function name: Firmware Upgrade Function description: The switch supports TFTP upgrade tool for upgrading software.
  • Page 154: Reboot

    Function name: Reboot Function description: Reboot the switch. Reboot takes the same effect as the RESET button on the front panel of the switch. It will take around thirty (30) seconds to complete the system boot. Parameter description: Save and Reboot: Save the current settings as start configuration before rebooting the switch.
  • Page 155: Logout

    Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout. Besides this manually logout and implicit logout, you can pull down the <Auto Logout>...
  • Page 156: Operation Of Cli Management

    -- Locate the correct DB-9 null modem cable with female DB-9 connector. Null modem cable comes with the management switch. Refer to the Appendix B for null modem cable configuration. -- Attach the DB-9 female connector to the male DB-9 serial port connector on the Management board.
  • Page 157 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262# ------------------------------- ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262$ ------------------------------- Fig. 4-1 Fig. 4-2...
  • Page 158: Commands Of Cli

    4-2. Commands of CLI To see the commands of the mode, please input “?” after the prompt, then all commands will be listed in the screen. All commands can be divided into two categories, including global commands and local commands. Global commands can be used wherever the mode you are.
  • Page 159: Global Commands Of Cli

    4-2-1. Global Commands of CLI --------------------------- Syntax: Description: Back to the top mode. When you enter this command, your current position would move to the top mode. If you use this command in the top mode, you are still in the position of the top mode. Argument: None.
  • Page 160 --------------------------- help Syntax: help Description: To show available commands. Some commands are the combination of more than two words. When you enter this command, the CLI would show the complete commands. Besides, the command would help you classify the commands between the local commands and the global ones.
  • Page 161 --------------------------- history Syntax: history [#] Description: To show a list of previous commands that you had ever run. When you enter this command, the CLI would show a list of commands which you had typed before. The CLI supports up to 256 records. If no argument is typed, the CLI would list total records up to 256.
  • Page 162 --------------------------- logout Syntax: logout Description: When you enter this command via Telnet connection, you would logout the system and disconnect. If you connect the system through direct serial port with RS-232 cable, you would logout the system and be back to the initial login prompt when you run this command.
  • Page 163 --------------------------- restore user Syntax: restore user Description: To restore the startup configuration as user defined configuration. If restoring default successfully, the CLI would prompt if reboot immediately or not. If you press Y or y, the system would reboot immediately; others would back to the CLI system. After restoring user-defined configuration, all the changes in the startup configuration would be lost.
  • Page 164 --------------------------- save user Syntax: save user Description: To save the current configuration as the user-defined configuration. When you enter this command, the CLI would save your current configuration into the non-volatile FLASH as user-defined configuration. Argument: None. Possible value: None. Example: FE2262 # save user Saving user...
  • Page 165: Local Commands Of Cli

    4-2-2. Local Commands of CLI 802.1x --------------------------- set max-request Syntax: set max-request <port-range> <times> Description: The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplicant before it times out the authentication session. Argument: <port range>: syntax 1,5-7, available from 1 to 26 <times>: max-times, range 1-10...
  • Page 166 --------------------------- set port-control Syntax: set port-control <port-range> <authorized> Description: To set up 802.1X status of each port. Argument: <port range> : syntax 1,5-7, available from 1 to 26 <authorized> : set up the status of each port 0:ForceUnauthorized 1:ForceAuthorized 2:Auto Possible value: <port range>...
  • Page 167 --------------------------- set reAuthMax Syntax: set reAuthMax <port-range> <max> Description: The number of reauthentication attempts that are permitted before the port becomes Unauthorized. Argument: <port range> : syntax 1,5-7, available from 1 to 26 <max> : max. value , range 1-10 Possible value: <port range>...
  • Page 168 set state Syntax: set state <ip> <port-number> <secret-key> <Accounting Service> <Accounting Server> <Accounting Port> Description: To configure the settings related with 802.1X Radius Server and Accounting service. Argument: ip: xxx.xxx.xxx.xxx port-number:1~65535 secret-key: The length of secret-key is from 1 to 31 Accounting Service: 0 for disable, 1 for enable Accounting Server: xxx.xxx.xxx.xxx Accounting Port:1~65535...
  • Page 169 FE2262 (802.1x)# set txPeriod 2 30 --------------------------- show mode Syntax: show mode Description: To display the mode of each port. Argument: None. Possible value: None. Example: FE2262(802.1x)# show mode Port Mode ====== ============ Disable Multi-host Disable Disable Disable Disable --------------------------- show parameter Syntax: show parameter...
  • Page 170 --------------------------- show security Syntax: show security Description: To display the status of each port. authentication Argument: None. Possible value: None. Example: FE2262 (802.1x)# show security Port Mode Status ====== ============ ============== Disable Multi-host Unauthorized Disable Disable Disable Disable --------------------------- show state Syntax: show state Description:...
  • Page 171 account --------------------------- Syntax: add <name> Description: To create a new guest user. When you create a new guest user, you must type in password and confirm password. Argument: <name> : new account name Possible value: <name> : A string must be at least 5 character. Example: FEL2SW-26(account)# add aaaaa Password:...
  • Page 172 --------------------------- modify Syntax: modify <name> Description: To change the username and password of an existing account. Argument: <name> : existing user account Possible value: None. Example: FEL2SW-26(account)# modify aaaaa username/password: the length is from 5 to 15. Current username (aaaaa):bbbbb New password: Confirm password: Username changed successfully.
  • Page 173 alarm <<email>> --------------------------- del mail-address Syntax: del mail-address <#> Description: To remove the e-mail address. Argument: <#>: email address number, range: 1 to 6 Possible value: <#>: 1 to 6 Example: FEL2SW-26(alarm-email)# del mail-address 2 --------------------------- del server-user Syntax: del server-user Description: To remove the server, user account and password.
  • Page 174 --------------------------- set server Syntax: set server <ip> Description: To set up the IP address of the email server. Argument: <ip>:email server ip address or domain name Possible value: None. Example: FEL2SW-26(alarm-email)# set server 192.168.1.6 --------------------------- set user Syntax: set user <username> Description: To set up the account of the email server.
  • Page 175 <<events>> --------------------------- del all Syntax: del all <range> Description: To disable email, sms and trap of events. Argument: <range>:del the range of email, sms and trap of events, syntax 1,5-7 Possible value: <range>: 1~21 Example: FEL2SW-26(alarm-events)# del all 1-3 --------------------------- del email Syntax: del email <range>...
  • Page 176 --------------------------- del trap Syntax: del trap <range> Description: To disable the trap of the events. Argument: <range>:del the range of trap, syntax 1,5-7 Possible value: <range>: 1~21 Example: FEL2SW-26(alarm-events)# del trap 1-3 --------------------------- set all Syntax: set all <range> Description: To enable email, sms and trap of events.
  • Page 177 --------------------------- set sms Syntax: set sms <range> Description: To enable the sms of the events. Argument: <range>:set the range of sms, syntax 1,5-7 Possible value: <range>: 1~21 Example: FEL2SW-26(alarm-events)# set sms 1-3 --------------------------- set trap Syntax: set trap <range> Description: To enable the trap of the events.
  • Page 178 --------------------------- show Syntax: show Description: The Show here is used to display the configuration of alarm event. Argument: None. Possible value: None. Example: FEL2SW-26(alarm-events)# show Events ----------------------------------------- 1 Cold Start 2 Warm Start 3 Link Down 4 Link Up 5 Authentication Failure 6 User Login 7 User Logout 8 STP Topology Changed...
  • Page 179 --------------------------- show (alarm) Syntax: show Description: The Show for alarm here is used to display the configuration of Trap, SMS or E-mail. Argument: None. Possible value: None. Example: FEL2SW-26 (alarm)# show email FEL2SW-26 (alarm)# show events FEL2SW-26 (alarm)# show sms --------------------------- <<sms>>...
  • Page 180 --------------------------- set phone-number Syntax: set phone-number <#> <phone-number> Description: To add sms phone number. Argument: <#>: mobile phone number, range: 1 to 6 <phone-number>: phone number Possible value: <#>: 1 to 6 Example: FEL2SW-26(alarm-sms)# set phone-number 1 0968777777 --------------------------- set server Syntax: set server <ip>...
  • Page 181 --------------------------- show Syntax: show Description: To display the configuration of SMS trap event. Argument: None. Possible value: None. Example: FEL2SW-26(alarm-sms)# show SMS Server : 192.168.1.7 Username : ABC Password : **************** Mobile Phone 1: 0968777777 Mobile Phone 2: Mobile Phone 3: Mobile Phone 4: Mobile Phone 5: Mobile Phone 6:...
  • Page 182 autologout --------------------------- autologout Syntax: autologout <time> Description: To set up the timer of autologout. Argument: <time>: range 1 to 3600 seconds, 0 for autologout off, current setting is 180 seconds. Possible value: < time >: 0,1-3600 Example: FEL2SW-26 # autologout 3600 Set autologout time to 3600 seconds bandwidth ---------------------------...
  • Page 183 --------------------------- set storm-rate Syntax: set storm-rate <range> <data_rate> Description: To set up the storm-rate of the ports. Argument: <range>:syntax: 1,3-5, available from 1 to 5 1: Disable 2: Broadcast Storm Control 3: Multicast Storm Control 4: Unknown Unicast Storm Control 5: Broadcast, Multicast, Unknown Unicast Storm Control <data_rate>: 1-100.
  • Page 184 config-file --------------------------- export start Syntax: export start Description: To run the export start function. Argument: None. Possible value: None. Example: FEL2SW-26 (config-file)# export start Export successful. --------------------------- export user-conf Syntax: export user-conf Description: To run the export user-conf function. Argument: None.
  • Page 185 --------------------------- import user-conf Syntax: import user-conf Description: To run the import user-conf function. Argument: None. Possible value: None. Example: FEL2SW-26 (config-file)# import user-conf Import successful. --------------------------- set export-path Syntax: set export-path <filepath> Description: To set up the file path and filename that user would like to export. Argument: <filepath>:filepath and filename Possible value:...
  • Page 186 --------------------------- show Syntax: show Description: To display the information of the config file. Argument: None. Possible value: None. Example: FEL2SW-26(config-file)# show TFTP Server IP Address: 192.168.3.111 Export Path and Filename: log/21511.txt Import Path and Filename: log/21511.txt dhcp-boot --------------------------- set dhcp-boot Syntax: set <sec>...
  • Page 187 --------------------------- ping Syntax: ping <ip> Description: To confirm that whether the remote end-station or switch itself is alive or not. Argument: <ip> : IP address or domain name Possible value: IP address, e.g. 192.168.2.65 or domain name, e.g. tw.yahoo.com Example: FEL2SW-26(diag)# ping 192.168.1.115...
  • Page 188 192.168.1.115 is alive.
  • Page 189 firmware --------------------------- set upgrade-path Syntax: set upgrade-path <filepath> Description: To set up the image file that will be upgraded. Argument: <filepath>: upgrade file path and name Possible value: <filepath>: upgrade file path and name Example: FEL2SW-26 (firmware)# set upgrade-path FEL2SW26_v2.05.img --------------------------- show Syntax:...
  • Page 190 gvrp --------------------------- disable Syntax: disable Description: To disable the gvrp function Argument: None. Possible value: None. Example: FEL2SW-26 (gvrp)# disable --------------------------- enable Syntax: enable Description: To enable the gvrp function. Argument: None. Possible value: None. Example: FEL2SW-26 (gvrp)# enable --------------------------- group Syntax: group <group number>...
  • Page 191 FEL2SW-26 (gvrp)# group 2 FEL2SW-26 (gvrp-group-2)# set applicant 1-6 non-participant FEL2SW-26 (gvrp-group-2)# show GVRP group VID: 2 Port Applicant Registrar ---- --------------- --------- Non-Participant Normal Non-Participant Normal Non-Participant Normal Non-Participant Normal Non-Participant Normal Non-Participant Normal Normal Normal Normal Normal Normal Normal Normal Normal...
  • Page 192 --------------------------- set applicant Syntax: set applicant <range> <normal|non-participant> Description: To set default applicant mode for each port. Argument: <range>: port range, syntax 1,5-7, available from 1 to 26 <normal>: set applicant as normal mode <non-participant>: set applicant as non-participant mode Possible value: <range>: 1 to 26 <normal|non-participant>: normal or non-participant...
  • Page 193 Example: FEL2SW-26 (gvrp)# set restricted 1-10 enable FEL2SW-26 (gvrp)# show config GVRP state: Enable Port Join Time Leave Time LeaveAll Time ---- --------- ---------- ------------- --------------- --------- ---------- Applicant Registrar Restricted 1000 Normal Normal 1000 Normal Normal 1000 Normal Normal 1000 Normal Normal...
  • Page 194 --------------------------- set timer Syntax: set timer <range> <join> <leave> <leaveall> Description: To set gvrp join time, leave time, and leaveall time for each port. Argument: <range> : port range, syntax 1,5-7, available from 1 to 26 <join>: join timer, available from 20 to 100 <leave>: leave timer, available from 60 to 300 <leaveall>: leaveall timer, available from 1000 to 5000 Leave Time must equal double Join Time at least.
  • Page 195 --------------------------- show counter Syntax: show counter <port> Description: To show counter of the port. Argument: <port>: port number, available from 1 to 26 Possible value: <port>: 1 to 26 Example: FEL2SW-26(gvrp)# show counter 2 GVRP Counter port: 2 Counter Name Received Transmitted -------------------- -------- -----------...
  • Page 196 --------------------------- hostname Syntax: hostname <name> Description: To set up the hostname of the switch. Argument: <name>: hostname, max. 40 characters. Possible value: <name>: hostname, max. 40 characters. Example: FEL2SW-26 # hostname Company Company# igmp-snooping --------------------------- add allowed-group Syntax: add allowed-group <ip-multicast> <vid> <port-range>...
  • Page 197 --------------------------- set mode Syntax: set mode <status> Description: To set up the mode of IGMP Snooping. Argument: <status>: 0:disable, 1:active, 2:passive Possible value: <status>: 0,1or 2 Example: FEL2SW-26(igmp-snooping)# set mode 2 --------------------------- show igmp-snooping Syntax: show igmp-snooping Description: To display IGMP snooping mode and allowed IP multicast entry. Argument: None.
  • Page 198 --------------------------- disable dhcp Syntax: disable dhcp Description: To disable the DHCP function of the system. Argument: None. Possible value: None. Example: FEL2SW-26(ip)# disable dhcp DHCP is already stopped. --------------------------- enable dhcp Syntax: enable dhcp <manual|auto> Description: To enable the system DHCP function and set DNS server via manual or auto mode. Argument: <manual|auto>...
  • Page 199 --------------------------- set ip Syntax: set ip <ip> <mask> <gateway> Description: To set the system IP address, subnet mask and gateway. Argument: <ip> : ip address <mask> : subnet mask <gateway> : default gateway Possible value: <ip> : 192.168.1.1 or others <mask>...
  • Page 200 --------------------------- clear Syntax: clear Description: To clear the log data. Argument: None. Possible value: None. Example: FEL2SW-26 (log)# clear --------------------------- disable auto-upload Syntax: disable auto-upload Description: To disable the auto-upload function. Argument: None. Possible value: None. Example: FEL2SW-26 (log)# disable auto-upload --------------------------- enable auto-upload Syntax:...
  • Page 201 loop-detection (LD) --------------------------- disable action Syntax: disable action Description: Disable LD and corresponding action. Disable the locked-port action when loop occurs. Argument: None. Possible value: None. Example: FEL2SW-26(loop-detection)# disable action --------------------------- disable port Syntax: disable port <port range> Description: Disable LD and corresponding action. Disable LD per port. Argument: <port range>: The range of your setting disabled loop detection with ports.
  • Page 202 --------------------------- enable port Syntax: enable port <port range> Description: Enable LD and corresponding action. Enable LD per port. Argument: <port range>: The range of your setting enabled loop detection with ports. Possible value: <port range>: syntax: 1,5-7, available from 1 to 26 Example: FEL2SW-26(loop-detection)# enable port 7-9 ---------------------------...
  • Page 203 --------------------------- show Syntax: show Description: To show a list of trap log events. When any of log events happens, it will be recorded and using show command in log function to query. Up to 120 log records are supported. Argument: None.
  • Page 204 mac-table <<alias>> --------------------------- Syntax: del <mac> Description: To delete the mac alias entry. Argument: <mac> : mac address, format: 00-02-03-04-05-06 Possible value: <mac> : mac address Example: FEL2SW-26 (mac-table-alias)# del 00-44-33-44-55-44 --------------------------- Syntax: set <mac> <alias> Description: To set up the mac alias entry. Argument: <mac>...
  • Page 205 <<information>> --------------------------- search Syntax: search <port> <mac> <vid> Description: To look for the relative mac information in mac table. Argument: <port> : set up the range of the ports to search for, syntax 1,5-7, available from 1 to 26 <mac> : mac address, format: 01-02-03-04-05-06, '?' can be used <vid>...
  • Page 206 <<maintain>> --------------------------- set aging Syntax: set aging <time> Description: To set up the age out time of dynamic learning mac. Argument: <time> : Mac table age out time between 10 and 1000000 seconds. The value “0” means to disable age out time Possible value: <time>...
  • Page 207 Example: FEL2SW-26(mac-table-maintain)# show Mac table age out time: 300 seconds Port Dynamically learn limit ------ ------------------------- 8191 8191 8191 8191 8191 8191 8191 8191 8191 8192 8192 <<static-mac>> --------------------------- Syntax: add <mac> <vid> <queue> <rule> <port> Description: To add the static mac entry. Argument: <mac>: mac address, format: 01-02-03-04-05-06 <vid>: vlan id, from 1 to 4094...
  • Page 208 --------------------------- Syntax: del <mac> Description: To remove the static mac entry. Argument: <mac> : mac address, format: 00-02-03-04-05-06 Possible value: <mac> : mac address Example: FEL2SW-26(mac-table-static-mac)# del 00-02-03-04-05-06 --------------------------- show Syntax: show Description: To display static mac entry. Argument: None. Possible value: None.
  • Page 209 management --------------------------- Syntax: Usage: set [<name> <value>] [<vid> <value>] [<ip> <value>] [<port> <value>] [<type> <value>] <action> <value> Synopsis: set name Mary vid 20 ip 192.168.1.1-192.168.1.90 port 2-5,8 type h,s action a Synopsis: set name Mary vid 20 ip 192.168.1.1-192.168.1.90 Description: To save the adding management policy records.
  • Page 210 --------------------------- delete Syntax: delete # Description: To delete a specific record or range. Argument: [#]: a specific or range management security entry(s) Possible value: None. Example: FEL2SW-26 (management)# show #: 1 Name : Tom VlanID : 2 Type : SNMP Action : Deny FEL2SW-26 (management)# delete 1 FEL2SW-26 (management)# show...
  • Page 211 Example: FEL2SW-26 (management)# edit 1 FEL2SW-26 (management-edit-1)# set name Tom vid 2 ip 192.168.1.30- FEL2SW-26 (management-edit-1)# show #: 1 Name : Tom VlanID : 2 Type : SNMP Action : Deny --------------------------- show Syntax: show Description: To show the specific management policy record. Argument: None.
  • Page 212 port --------------------------- clear counter Syntax: clear counter Description: To clear all ports’ counter (include simple and detail port counter) information. Argument: None. Possible value: None. Example: FEL2SW-26 (port)# clear counter --------------------------- disable state Syntax: disable state <range> Description: To disable the communication capability of the port. Argument: <range>: port range, syntax 1,5-7, available from 1 to 26 Possible value:...
  • Page 213 set description Syntax: set description <range> <description> Description: To set up the human readable description of all ports. Argument: range syntax: 1,5-7, available from 1 to 26 description: set its port description, max 47 characters Possible value: <range>: 1 to 26 Example: FEL2SW-26(port)# set description 1-26 testport ---------------------------...
  • Page 214 --------------------------- show conf Syntax: show conf Description: To display the each port’s configuration about state, speed-duplex and flow control. Argument: None. Possible value: None. Example: FEL2SW-26 (port)# show conf --------------------------- show description Syntax: show description Description: To display the each port’s description. Argument: None.
  • Page 215 Port 25 Fiber Media Information --------------------------------------------------------------------- Connector Type : SFP - LC Fiber Type : Multi-mode (MM) Tx Central Wavelength : 850 Baud Rate : 1G Vendor OUI : 00:40:c7 Vendor Name : APAC Opto Vendor PN : KM28-C3S-TC-N Vendor Rev : 0000 Vendor SN : 5425011140...
  • Page 216 Enable Down Enable Down Enable Down Enable Down Enable Down Enable --------------------------- disable 1p Syntax: disable 1p Description: To disable 802.1p qos. Argument: None. Possible value: None. Example: FEL2SW-26 (qos)# disable 1p --------------------------- disable dscp Syntax: disable dscp Description: To disable IP DSCP qos. Argument: None.
  • Page 217 --------------------------- disable tos Syntax: disable tos Description: To disable IP TOS qos. Argument: None. Possible value: None. Example: FEL2SW-26 (qos)# disable tos --------------------------- enable 1p Syntax: enable 1p Description: To enable 802.1p qos. Argument: None. Possible value: None. Example: FEL2SW-26 (qos)# enable 1p --------------------------- enable dscp Syntax:...
  • Page 218 --------------------------- enable qos Syntax: enable qos Description: To enable qos function. Argument: None. Possible value: None. Example: FEL2SW-26 (qos)# enable qos --------------------------- enable tos Syntax: enable tos Description: To enable IP TOS qos. Argument: None. Possible value: None. Example: FEL2SW-26 (qos)# enable tos --------------------------- set dscp Syntax:...
  • Page 219 --------------------------- set pri-tag Syntax: set pri-tag [<q0><priority>] [<q1><priority>] [<q2><priority>] [<q3><priority>] Description: To set 802.1p qos weighting for 4 queues. Argument: <q>: queue level, q0: queue 0; q1: queue 1; q2: queue 2; q3: queue 3. <priority>: priority level. One queue has been assigned 2 different priorities. You don't need to use all of queues, but must assign queues in order.
  • Page 220 Possible value: <type_value>: 0~3 <priority>: 0 to 7. Example: FEL2SW-26 (qos)# set tos 0 q0 1 q1 2 q2 4 q3 6 --------------------------- set vip Syntax: set vip <port_range> <mode> Description: To set vip port for strict priority. Argument: <port_range>: syntax 1,5-7, available from 1 to 26 <mode>: enable/disable vip port for each port.
  • Page 221 DiffServ Queue DiffServ --------- ------- ---------- ------- ---------- ------- ---------- ------- --------------------------- show port Syntax: show port Description: To show VIP port configuration. Argument: none Possible value: none Example: FEL2SW-26 (qos)# show port Port Based Priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority Disable ip tos classification Disable ip diffserv classification...
  • Page 222 --------------------------- show priority-tag Syntax: show priority-tag Description: To show 802.1p Qos configuration. Argument: None. Possible value: None. Example: FEL2SW-26 (qos)# show priority-tag 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority Disable ip tos classification Disable ip diffserv classification Scheduling: weighted round robin method.
  • Page 223 --------------------------- show tos Syntax: show tos Description: To show IP tos Qos configuration. Argument: none Possible value: none Example: FEL2SW-26 (qos)# show tos ip tos classification ==================== Global QoS mode: Enable QoS Disable 802.1p Priority Enable ip tos classification Disable ip diffserv classification Scheduling: weighted round robin method.
  • Page 224 --------------------------- reboot Syntax: reboot Description: To reboot the system. Argument: None. Possible value: None. Example: FEL2SW-26 # reboot security <<isolated-group>> --------------------------- Syntax: set <port> Description: To set up the function of the isolated group. Argument: <port> : isolated port; range syntax: 1,5-7, available from 0 to 26 set 0 as disabled Possible value: <port>:0 to 26...
  • Page 225 <<mirror>> --------------------------- disable Syntax: disable Description: To disable the function of mirror. Argument: None. Possible value: None. Example: FEL2SW-26 (security-mirror)# disable --------------------------- enable Syntax: enable Description: To enable the function of mirror. Argument: None. Possible value: None. Example: FEL2SW-26 (security-mirror)# enable --------------------------- Syntax: set <spy>...
  • Page 226 --------------------------- show Syntax: show Description: To display the current setting status of mirror. Argument: None. Possible value: None. Example: FEL2SW-26 (security-mirror)# show Mirror: Monitoring Port :1 Monitored Ingress :4 Monitored Egress :2 3 <<restricted-group>> --------------------------- Syntax: set <ingress> <egress> Description: To set up the function of restricted group.
  • Page 227 snmp --------------------------- disable Syntax: disable set-community disable snmp Description: The Disable here is used for the de-activation of snmp or set-community. Argument: None. Possible value: None. Example: FEL2SW-26(snmp)# disable set-community FEL2SW-26(snmp)# disable snmp --------------------------- enable Syntax: enable set-community enable snmp Description: The Enable here is used for the activation snmp or set-community.
  • Page 228 --------------------------- Syntax: set get-community <community> set set-community <community> set trap <#> <ip> [port] [community] Description: The Set here is used for the setup of get-community, set-community, trap host ip, host port and trap- community. Argument: <#>: trap number, range: 1 to 6 <ip>: ip address or domain name <port>: trap port <community>: community name...
  • Page 229 --------------------------- MCheck Syntax: MCheck <range> Description: To force the port to transmit RST BPDUs. Argument: <range>: syntax 1,5-7, available from 1 to 26 Possible value: <range>: 1 to 26 Example: FEL2SW-26 (stp)# Mcheck 1-8 --------------------------- disable Syntax: disable Description: To disable the function of STP. Argument: None.
  • Page 230 --------------------------- set config Syntax: set config <Bridge Priority> <Hello Time> <Max. Age> <Forward Delay> Description: To set up the parameters of STP. Argument: <Bridge Priority>: priority must be a multiple of 4096,available from 0 to 61440. <Hello Time>: available from 1 to 10. <Max.
  • Page 231 FEL2SW-26 (stp)# set version rstp --------------------------- show config Syntax: show config Description: To display the STP configuration data. Argument: None. Possible value: None. Example: FEL2SW-26 (stp)# show config STP State Configuration : Spanning Tree Protocol Bridge Priority (0-61440) : 61440 Hello Time (1-10 sec) Max.
  • Page 232 --------------------------- show status Syntax: show status Description: To display of the status of STP. Argument: None. Possible value: None. Example: FEL2SW-26 (stp)# show status STP Status : STP State Bridge ID Bridge Priority Designated Root Designated Priority Root Port Root Path Cost Current Max.
  • Page 233 --------------------------- set device-name Syntax: set device-name <device-name> Description: To set the device name description of the switch. Argument: <device-name>: string length up to 40 characters. Possible value: <device-name>: A, b, c, d, ... ,z and 1, 2, 3, …. etc.
  • Page 234 --------------------------- show Syntax: show Description: To display the basic information of the switch. Argument: None. Possible value: None. Example: FEL2SW-26(system)# show Model Name System Description Location Contact Device Name System Up Time Current Time BIOS Version Firmware Version Hardware-Mechanical Version : v65535.65535-v0.04...
  • Page 235 tftp --------------------------- set server Syntax: set server <ip> Description: To set up the IP address of tftp server. Argument: <ip>: the IP address of tftp server Possible value: <ip>: tftp server IP Example: FEL2SW-26 (tftp)# set server 192.168.3.111 --------------------------- show Syntax: show Description:...
  • Page 236 time --------------------------- set daylightsaving Syntax: set daylightsaving <hr> <MM/DD/HH> <mm/dd/hh> Description: To set up the daylight saving. Argument: <hr> : daylight saving hour, range: -5 to +5 <MM> : daylight saving start Month (01-12) <DD> : daylight saving start Day (01-31) <HH>...
  • Page 237 --------------------------- set ntp Syntax: set ntp <ip> <timezone> Description: To set up the current time via NTP server. Argument: <ip>: ntp server ip address or domain name <timezone>: time zone (GMT), range: -12 to +13 Possible value: <timezone>: -12,-11…,0,1…,13 Example: FEML2-SW26E(time)# set ntp clock.via.net 8 Synchronizing...(1) Synchronization success...
  • Page 238 trunk --------------------------- del trunk Syntax: del trunk <port-range> Description: To remove the trunk port. Argument: <port-range> : syntax 1,5-7, available from 1 to 26 Possible value: <port-range> : 1 to 26 Example: FEL2SW-26 (trunk)# del trunk 1 --------------------------- set hash Syntax: set hash <method>...
  • Page 239 --------------------------- set trunk Syntax: set trunk <port-range> <method> <group> <active LACP> Description: To set up the status of trunk, including the group number and mode of the trunk as well as LACP mode. Argument: <port-range> : syntax 1,5-7, available from 1 to 26 <method>: <static|lacp>...
  • Page 240 --------------------------- show lacp-config Syntax: show lacp-config Description: To display the value of LACP Priority. Argument: None. Possible value: None. Example: FEL2SW-26 (trunk)# show lacp-config LACP System Priority : 33333 Hash Method : DA --------------------------- show lacp-detail Syntax: show lacp-detail <aggtr> Description: To display the detailed information of the LACP trunk group.
  • Page 241 --------------------------- show status Syntax: show status Description: To display the aggregator status and the settings of each port. Argument: None. Possible value: None. Example: FEL2SW-26 (trunk)# show status Trunk Port Setting ------------------------------------- ---------------------- port Method Group Active LACP ====== ======== ======= ============= ============= ======== None LACP LACP...
  • Page 242 vlan --------------------------- del port-group Syntax: del port-group <name> Description: To delete the port-based vlan group. Argument: <name>: port-vlan name Possible value: <name>: port-vlan name Example: FEL2SW-26 (vlan)# del port-group vlan-2 --------------------------- del tag-group Syntax: del tag-group <vid> Description: To delete the tag-based vlan group. Argument: <vid>: vlan ID, available from 1 to 4094 Possible value:...
  • Page 243 --------------------------- disable drop-untag Syntax: disable drop-untag <port_range> Description: To disable drop-untag. Argument: <port_range>: which port(s) you want not to drop untagged frames. Syntax: 1,5-7, available from 1 to 26 Possible value: <port_range>: 1 to 26 Example: FEL2SW-26 (vlan)# disable drop-untag 2,4,5-7 --------------------------- disable svl Syntax:...
  • Page 244 --------------------------- enable double-tag Syntax: enable double-tag Description: To enable double-tag. Argument: None. Possible value: None. Example: FEL2SW-26 (vlan)# enable double-tag --------------------------- enable drop-untag Syntax: enable drop-untag <port_range> Description: To enable drop-untag. Argument: <port_range>: which port(s) you want to drop untagged frames. Syntax: 1,5-7, available from 1 to 26 Possible value: <port_range>: 1 to 26...
  • Page 245 FEL2SW-26(vlan)# set mgt-vlan 1 1 --------------------------- set mode Syntax: set mode <port|tag> Description: To switch vlan mode between port-based and tag-based modes. Argument: <port|tag>: port or tag tag: set tag-based vlan port: set port-based vlan Possible value: <port|tag>: port or tag...
  • Page 246 <name>: port-vlan name <range>: vlan group members, syntax: 1,5-7, available from 1 to 26 Possible value: <range>: 1 to 26 Example: FEL2SW-26 (vlan)# set port-group vlan-1 2-5,6-10 --------------------------- set pvid Syntax: set pvid <port_range> <pvid> <default_priority> Description: To set vlan PVID and port pripority. Argument: <port_range>: which port(s) you want to set PVID(s).
  • Page 247 --------------------------- show config Syntax: show config Description: To display the current vlan mode, Symmetric vlan, SVL and Double tag states. Argument: None. Possible value: None. Example: FEL2SW-26 (vlan)# show config Current vlan mode:Tag-based vlan Global setting: Symmetric vlan : Disable (Asymmetric) : Disable (IVL) Double tag : Disable...
  • Page 248 Description: To display management setting. Argument: None Possible value: None Example: FEL2SW-26(vlan)# show mgt-vlan Management Vlan: State : Disable --------------------------- show pvid Syntax: show pvid Description: To display pvid, priority and drop untag result. Argument: None Possible value: None Example: FEL2SW-26 (vlan)# show pvid Port PVID...
  • Page 249 --------------------------- disable Syntax: disable Description: To disable the virtual stack. Argument: None. Possible value: None. Example: FEL2SW-26(vs)# disable --------------------------- enable Syntax: enable Description: To enable the virtual stack. Argument: None. Possible value: None. Example: FEL2SW-26 (vs)# enable --------------------------- set gid Syntax: set gid <gid>...
  • Page 250 --------------------------- set role Syntax: set role <master|slave> Description: To set role. Argument: <master|slave>: master: act as master, slave : act as slave Possible value: <master|slave>: master or slave Example: FEL2SW-26 (vs)# set role master --------------------------- show Syntax: show Description: To display the configuration of the virtual stack. Argument: None.
  • Page 251: Maintenance

    The connection ports on another must be connection ports. Please check if connection ports are used on that Managed Switch. Please check the uplink setup of the Managed Switch to verify the uplink function is enabled. 3. The console interface cannot appear on the console port connection.
  • Page 252: Appendix A Technical Specifications

    Appendix A Technical Specifications Features The switch included 24-Port 10/100Mbps TP and 2-Port Gigabit Dual Media TP/SFP. Supports 24-port 10/100M TP ports with Nway and auto MDIX function. Supports on-line plug/unplug SFP transceiver modules. Non-blocking, store-and-forward and shared-memory L2 managed switch.
  • Page 253 Hardware Specifications Standard Compliance: IEEE802.3ab / 802.3z / 802.3u / 802.3x 802.3z and 802.3ab compliant Gigabit Ethernet ports Transmission Mode: 10/100Mbps support full or half duplex 1000Mbps support full duplex only Transmission Speed: 10/100/1000Mbps for TP 1000Mbps for Fiber Full Forwarding/Filtering Packet Rate: PPS (packets per second) Forwarding Rate 1,488,000PPS 148,800PPS...
  • Page 254 Diagnostic LED: System LED : Per Port LED: 10/100M TP Port 1 to 24 1000M Fiber/TP Port 25,26 Power Requirement Voltage Frequency Consumption Ambient Temperature Humidity Dimensions Compliance Power CPURUN ACT (LEDSET) FDX (LEDSET) SPD (LEDSET) : LINK/ACT, FDX, SPD : LINK/ACT, FDX, SPD AC Line 100 240 V...
  • Page 255: Management Software Specifications

    Trunk Connection. SNMP support; MIB II, Bridge MIB, RMON MIB IEEE 802.1D Port-Base / 802.1Q-Tagged, allowed up to 256 active VLANs in one switch. Ports trunk connections allowed IP Multicast Filtering by passively snooping on the IGMP Query. Supports by-port Egress/Ingress rate control Referred as Class of Service (CoS) by the IEEE 802.1P standard...
  • Page 256: Appendix B Null Modem Cable Specifications

    Null Modem Cable Specifications The DB-9 cable is used for connecting a terminal or terminal emulator to the Managed Switch’s RS-232 port to access the command-line interface. The table below shows the pin assignments for the DB-9 cable. Function Carrier...

Table of Contents