Page 2
We make no warranties with respect to this documentation and disclaim any implied warranties of merchantability, quality, or fitness for any particular purpose. The information in this document is subject to change without notice. We reserve the right to make revisions to this publication without obligation to notify any person or entity of any such changes.
Contents 1. INTRODUCTION..................1 1.1 P ...................1 ACKAGE ONTENTS 2. WHERE TO PLACE THE INTELLIGENT SWITCH......3 3. CONFIGURE NETWORK CONNECTION..........3 3.1 C .........3 ONNECTING EVICES TO THE NTELLIGENT WITCH 3.2 C ........3 ONNECTING TO NOTHER THERNET WITCH 3.3 C .............4 ONNECTING WITH RUNK CONNECTION 3.4 A ....................4...
1. Introduction This switch is a cost-effect high performance 8TX + 2Gigabit ports 10/100/1000 Mbps Ethernet/Fast Ethernet/Gigabit Ethernet management switch with Broadcom solution. There are two built-in gigabit ports for high-speed users and high-speed connections. This switch supports remote management function by SNMP, Http and Telnet operations.
2. Where To Place the Intelligent Switch This Intelligent Switch can be placed on a flat surface (your desk, shelf or table). Place the Intelligent Switch at a location with these connection considerations in mind: The switch configuration does not break the rules as specified in Section 3. The switch is accessible and cables can be connected easily to it.
Another Switch Straight-Through cable Max. 100m 3.3 Connecting with Trunk connection This switch supports trunk function for high-speed connection between switches to remove the bottleneck problem of switch-to-switch connection. The bandwidth of the trunk connection is the total bandwidth of the cables in the trunk. For example, Port 1,2,3,4 are used for trunk connection and the trunk bandwidth is 200Mbps x 4 = 800Mbps.
Page 8
File Server Gigabit Connection File Server Switch Switch Power User Workgroup Workgroup...
4. Adding Module 4.1 Adding MiniGBIC(SFP) Module A MiniGBIC module slot for gigabit connection extension is supported at front panel. You can add a MiniGBIC module to the switch and this switch gets another gigabit port. MiniGBIC slot Please follow the steps to add the module to the switch. 1.
5. LEDs Conditions Definition 5.1 LEDs Defined The LEDs provide useful information about the switch and the status of all individual ports. STATUS CONDITION Power Switch is receiving power. LINK / ACT Port has established a valid link. Flashing Packets being received or sent. The connection is Full Duplex.
6. Manage / Configure the switch 6.1 Introduction the management functions This switch is a L2 management switch. It supports in-band management function from SNMP, Http and Telnet interface. It also supports out-band management function from RS232 console interface. Besides, it supports network configuration functions, like VLAN, Trunking, Port Mirror, QoS, spanning tree and software backup/update.
Page 13
it will also cause a 30 seconds delay if any network connection is changed because of the network topology detection operation of the protocol. Because there could be more than one switch in the network, users can configure this function for their network spanning tree application. 4.
Page 14
enable the port for network access. This function is very useful for network security application to prevent illegal users access network through the switch. This switch supports MD5, TLS and PEAP authentication types. 8. IGMP Snooping Function This switch can forward IP multicast packets according to the IP multicast group definition.
6.2 Management with Console Connection Please follow the steps to complete the console hardware connection first. 1. Connect from the console port of the switch to COM port of PC with the console cable. 2. Start the terminal program of Windows. Create a new connection and select COM port of PC used for the console.
Page 16
With help command, you can find the command list as follow. ------------------------------------------------------------------------------------------------------- >help [Command List] ?....Help commands backup..backup run-time firmware or configuration file del.... Del commands find... Find commands exit... Logout help... Help commands logout..Logout ping... Ping a specified host with IP address reset..
Page 17
>del arl Del ARL [xx-xx-xx-xx-xx-xx] xx-xx-xx-xx-xx-xx is a assigned static Mac ID in ARL table of the switch. You can remove it from the table with the command. For example, “del arl 00-11- 22-33-44-55” will delete the static Mac ID “00-11-22-33-44-55” from ARL table.
Page 18
3. Find command The “find” command can find a static Mac address in the ARL table. Enter “find” at the prompt, the command syntax will be shown. >find [Command List] ?....Help commands help... Help commands arl.... Search a specified MAC address in ARL table The syntax is as follow.
Page 19
Enter “reset” at the prompt, the command syntax will be shown. >reset Syntax: reset [configuration | system] “reset configuration” will restore the configuration to the factory default setting. “reset system” will reset the switch and the switch will reboot. 9. Set command This command can be used to configure most functions of the switch.
Page 20
For example, “set ARL 00-c0-f6-11-22-33 5 low” will add a static Mac ID “00-c0-f6-11-22-33” to ARL table for Port 5 with low priority and this Mac ID will never be aged out from Port 5. Note: Because the static Mac address is fixed on the assigned port, the static Mac address can access network through the assigned port only.
Page 21
For example, “set igmp routerport 2” will set the IGMP active connection is at Port 2 of the switch. You have to assign the port that connects IGMP active device first for IP multicast operation. 9.7 set mirror command This command is used to configure mirror port function. The following is the sub-command for it.
Page 22
9.7.4 set mirror enable command This command is used to enable the mirror operation. 9.7.5 set mirror disable command This command is used to disable the mirror operation. 9.8 set age command This command is used changed the aging time of the switch. Its syntax is .
Page 23
User can configure the following items for each port. a. Name of a port with “name” sub-command. b. Enable/Disable a port with “admin” sub-command. c. Operation speed of a port with “speed” sub-command. d. Duplex mode of a port with “duplex” sub-command. e.
Page 24
This command is used to set the weight of traffic rate for low priority queue. For example, “set qos lq=3” command will set the weight of traffic rate for low priority queue to 3. 9.11.6 set qos pt command This command is used to set the threshold of high priority queue and low priority for 802.1P tagged packets.
Page 25
function. The trunk groups are disabled and null trunk groups default. Users can use this command to configure trunk function of the switch. Its syntax is . . . >set trunk Syntax : Set trunk enable Description: Enable trunk function. Syntax : Set trunk disable Description: Disable trunk function.
Page 26
>set mactrunk giga Syntax: Set mactrunk giga [disable | 0 | 1 | 2]! [disable] : Disable Giga port trunking! [0 | 1 | 2]: Specify Giga group id to enable Giga port trunking! 0= Port 9/G1,10/G2 Note: 9/G1 means the Port# is 9 and it is the 1 gigabit port.
Page 27
[Command List] enable..Set 802.1Q enabled. disable..Set 802.1Q disabled. membermap..Set 802.1Q VLAN table membership. tag.... Set 802.1Q VLAN table port tagged/untagged. default_tag..Set 802.1Q default tag of specified port. newprimap..Enable remap priority, and set new priority. frame_cntl..To change frame's priority, VID or both. vtable..
Page 28
none: is for “no change”. vid: is for “change VLAN ID”. priority is for “change priority”. vid_priority: is for “vid_priority”. Note: If “vtable” is set to “drop” or “ifilter” is set to “on”, the VLAN ID change may be no effect because the packet with different VLAN ID could be dropped first.
Page 29
transparent sub-command is used to set the operation of 802.1x function to transparent mode. In this mode, the switch will forward 802.1x packets directly. re_au sub-command is used to enable the re-authentication function of the switch. When the re-authentication time is up, the switch will start the re- authentication process.
Page 30
This command is used to set the Mac address security mode of physical port. If it is enabled and ports are set to “accept”, only the users with the static Mac address on the ports can access network through these ports. Its syntax is .
Page 31
b. set sta enable and set sta disable commands will enable/disable spanning tree function of the switch. c. set sta bridge command is used to configure for the switch. Its syntax is . . . >set sta bridge [Syntax]set sta bridge [arg_1 data_1] [arg_1 data_1] ... [arg_n data_n] [Argument List] priority..
Page 32
This command is used to enable/disable the http function of the switch. Because hacker or worm/virus (like ColdRed) often attacks http server, this command is provided to disable http to prevent it. (If this switch is installed in public Internet without any firewall protection, we suggest users to disable the http interface and use Telnet or SNMP instead.) Its syntax is .
Page 33
10.5 show cfg command will show model name and Mac address of the switch. For example, >sh cfg [System Configuration] Model Name : Intelligent Switch MAC Address : 00:C0:F6:50:36:6E 10.6 show net command will show IP address/Mask address/Gateway address setting of the switch. For example, >show net [eth0] Network Configuration: IP Address: 192.168.1.250...
Page 34
For applications, you should select Auto Detect mode if the connected device is auto-negotiation enabled. And you can select Auto Negotiation mode if the connected device is auto-negotiation disabled. For most applications, Auto Detect mode is OK. 10.10 show port command will show status and configuration of each switch port.
Page 35
2 Disabled public 0.0.0.0 3 Disabled public 0.0.0.0 4 Disabled public 0.0.0.0 5 Disabled public 0.0.0.0 The “Status” is the trap operation status of each trap IP address. 10.13 show trunk command will show trunk configuration of the switch. For example, >show trunk [Trunk Group Setting]...
Page 36
New Priority Map: old-new old-new old-new old-new Default Tag: Management Port Default tag Priority=0, PVID=1 Port PVID Pri Port PVID Pri Port PVID Pri Port PVID Pri [VID] [Port List] ====== ======================================= 1[U] 2[U] 3[U] 4[U] 5[U] 6[U] 7[U] 8[U] 9[U] 10[U] “Frame Control”...
Page 37
Security Key : 12345678 >show dot1x port 802.1X Port Authentication Configuration Menu PORT Status Auth.Mode ================================= The Auth. Mode could be Auto, FA(Forced Authenticated), FU(Forced Unauthenticated) and No(No 802.1x function). 10.18 show security command will show current Mac address security mode for port.
Page 38
====================================================== None None None None None None None None None None It shows the Bridge and Port spanning tree configuration. 10.20 show http command will show http enable/disable state. For example, >show http [HTTP Protocol Setting] HTTP Setting: Enabled 11. Upgrade command This switch supports firmware or configuration upgrade with TFTP protocol.
6.3 Management with Http Connection Users can manage the switch with Http Web Browser connection. Before http connection, IP address configuration of the switch should be done first. Please follow the instruction in Section 6.2 to complete the console connection and use “show net”...
Page 40
System Configuration “System Configuration” is the homepage of the switch. Users can find firmware version and Mac address of the switch in this page. And users can configure the following items in this page. a. Auto Mode : You can select the auto function of connection port here. For Auto Negotiation mode, the switch will do auto-negotiation ON/OFF when the auto mode of port is enabled/disabled.
Page 41
For Auto Detect mode, the switch will always keep auto-negotiation function ON but just modify its attribution if the auto mode of port is disabled. Auto-MDIX function will be always enabled in this mode. For applications, you should select Auto Detect mode if the connected device is auto-negotiation enabled.
Page 42
Port Configuration You can find link status and port status here. In this page, you can enable/disable port connection function in “Admin.” and configure their operation mode in “Auto”, “Speed/Duplex” and “Flow Control”. “Auto” is enabled, the setting of “Speed” and “Duplex” will be ignored. Click [Apply] after any modification.
Page 43
Spanning Tree In the page, users can enable/disable spanning tree function and configure the bridge parameters. Please refer to 9.20 of Section 6.2 for the details of these parameters. Press [Apply] after any modification. Configuring port parameters for spanning tree, press [Configuration STA Port] and the configuration page will appear.
Page 44
Static Address Table This switch supports static Mac address assignment on port. This switch will not age out these static Mac addresses. But there is a limitation for these static Mac addresses - they are allowed to work on the assigned port only because they are static fixed on the assignment port.
Page 45
Address Table This page will show the Mac addresses learn by the switch. This information is useful for network administrator to check the user connection status. Note: Because of aging time operation of switch, wrong Mac addresses could be found in the Mac Address Table sometimes. These wrong Mac addresses are the machines that had ever accessed to the port and the switch learns them into the learning table.
Page 46
Mac Security Configuration This function is used to limit the users that can access network through the switch. If this function is enabled and the port is set to Accept mode, only those users with the static Mac addresses can be accepted by the port for network access.
Page 47
802.1Q Virtual LAN This web page is for 802.1Q VLAN setting. The operation of 802.1Q VLAN is based on the “tag” in a packet. A tag contains a 12-bit VLAN ID and 3-bit priority information. A packet with tag inside is called tagged packet and a packet without tag inside is called untagged packet.
Page 48
The switch can change VLAN ID and Priority setting in a packet. You can select [No Change]/[Change Priority]/[Change VID]/[Change Both] in the Frame Control function. If any modification is requested, the default tag value will be used to replace the VLAN ID or Priority in the packet. Note: If [Ingress Filter] is set to “ON”...
Page 49
802.1Q Table 802.1Q VLAN Table This function is used to configure the static VLAN setting. Follow the steps to complete a VLAN configuration. Input a VLAN ID in “VID” and click [Select]. Input a VLAN name in “Name”. Click the port to add or remove the port to/from the VLAN. “T” means tagged port.
Page 50
Port-based Virtual LAN This function is used to configure Port-based VLAN. 1. Select VLAN to “Port-base VLAN” and click [Apply]. 2. Give a name for the VLAN. 3. Mark the ports for the VLAN. 4. Click [Apply] to activate the setting.
Page 51
10. Mirror Follow the steps to configure Mirror function. 1. Enable Mirroring first. 2. Select the capture port. 3. Select the monitored port from Ingress or Egress table – depending on the traffic direction. 4. Select the capture mode – All packets or for some special DA/SA address. If DA/SA is selected, enter the special Mac address in “xx-xx-xx-xx-xx-xx”...
Page 52
11. QoS This switch supports two priority queues on each port for QoS operation. Follow the steps to configure QoS function. 1. Enable QoS first. 2. If port-based priority is used, select ports for High and Low priorities. 3. Set the weight of traffic rate for high priority queue and low priority queue. 4.
Page 53
12. SNMP In this page, you can find and configure the system information. You can also configure GET/SET/Trap Community Name and the IP address for trap operation. Then users can manage this switch with these settings from SNMP management program.
Page 54
13. Trunk This switch supports Port-based Trunk and Mac-based Trunk function. For Port-based Trunk, the traffic assignment between trunk cables is based on physical port – e.g. the traffic from Port 5 will go through cable 1 and the traffic from Port 12 will go through cable 2.
Page 55
This switch supports 4 trunk groups and they are null by default. If users want to use Mac-based trunk function, follow the steps to configure it. a. Select “Mac-based” first. b. Assign ports to the trunk. Then click [Apply]. The trunk is created. c.
Page 56
14. IGMP This switch supports IP multicast function with IGMP snooping operation. Follow the steps to complete the setting. Enable IGMP first. Select “Router Port” – the port connecting to the IGMP active device. Click [Apply]. The learned IP multicast groups is shown in “Members Group”.
Page 57
802.1x Configuration The 802.1x function can limit the port access for authentication users only. It needs a RADIUS server for the authentication process and the switch acts as an authenticator. The function here is for 802.1x function configuration. 802.1x System Authentication Status: [Enable/Disable/Transparent] Enable: enable 802.1x function in authentication mode Disable: disable 802.1x function Transparent: forwarding 802.1x packets directly...
Page 58
The Max Request Count is the maximum re-try count between the switch and RADIUS server before authentication fail. Supplicant Timeout Period: This is the timeout value between the switch and users (called “supplicant” in 802.1x) after first identification. The valid value is 0~65535. Quiet Timeout Period: This is the quiet time value between the switch and the user before next authentication process when authentication fails.
Page 59
16. Statistics You can find the traffic statistics here. Select port number to get the counters for different port. You can modify the refresh interval to get different counter updating period. Click “Refresh” button can update the counter immediately. You can reset counters to zero with the “Reset Statistics” button.
Page 60
17. Tools Four functions are supported as the system maintenance tools. a. System Upgrade This function will upgrade the system operation software from the web management PC. b. System Backup [Backup Setting] will backup the configuration of the switch to the web management PC.
Page 61
18. Port Status Picture At upper part of the web interface, there is a picture showing current status of each port – green for link-up, black for link-down and orange for disabled. With this picture, you can get current port status. Click some of the port in the picture.
6.4 About Telnet Interface If you want to use Telnet to management the switch from remote site, you have to set the IP/Mask/Gateway address to the switch first from console. Then use "telnet <IP>" command in DOS. Its operation interface is the same as console interface.
7. Software Update and Backup This switch supports software/configuration backup and update/restore functions. It could be done in three ways. 1. From console when booting : by Xmodem protocol and doing by terminal program. This function can be used for run-time code and boot code updating. (Boot code works only at boot time - before the main program starts.) Press Ctrl-C when the switch is booting, the following message will be shown.
A. Product Specifications Access Method Ethernet , CSMA/CD Standards Conformance IEEE 802.3 10BASE-T, IEEE 802.3u 100BASE-TX IEEE 802.3ab 1000Base-T, IEEE 802.3z MDI/MDIX Auto-detect for each TX port Indicator Panel LEDs for each unit : Power each port : Link/Act, FDX Number of Ports 8* RJ45 10/100M TX ports, 1* RJ45 10/100/1000M TX port, 1*1000M SFP(miniGBIC) port...
B. Compliances EMI Certification FCC Class A Certification (USA) Warning: This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A digital device pursuant to Subpart B of Part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
Need help?
Do you have a question about the FXC3009 and is the answer not in the manual?
Questions and answers