Congratulations for purchasing the Web Smart Ethernet Switch. Before you
install and use this product, please read this manual carefully for full exploiting
the functions of this product.
1.1 Product Overview
This is 48 10/100/1000Mbps RJ45 ports + 4 100/1000Mbps SFP ports Ethernet
Switch. The Switch provides the seamless network connection. This device
integrates 1000Mbps Gigabit Ethernet, 100Mbps Fast Ethernet and 10Mbps
Ethernet network capabilities in a highly flexible package. With
48-10/100/1000Mbps Auto-Negotiation RJ45 ports, all UTP ports support Auto
MDI/MDIX function. The Switch with a low-cost, easy-to-use, high performance
upgrade your old network to a 1000Mbps Gigabit network. It is essential to
helping solve network bottlenecks that frequently develop as more advanced
computer users and newer applications continue to demand greater network
resources.
The Switch is easy to install and use. It is a great selection for office network.
1.2 Features
Comply with IEEE802.3, IEEE802.3u, IEEE802.3ab, IEEE802.3x, IEEE802.3z,
IEEE802.3ad standards
Supports IEEE802.3x flow control for Full-duplex Mode and backpressure for
Half-duplex Mode
Supports MAC address auto-learning and auto-aging
Store and forward mode operates
Support SNMP/RMON/TELENT
Supports IEEE802.1Q VLAN, 4K VLAN Table
Support IEEE802.1p Priority Queues
Support 2K+256-entry ingress and egress ACL
Support Storm Control
Support QoS, Port Mirroring, Link Aggregation Protocol
LED indicators for monitoring power, link/activity ,Speed
Web-based Management Support
Internal power adapter supply
The front panel of the Switch consists of 48 x 10/100/1000Mbps RJ-45 ports, 4 x
1000Mbps SFP ports, 1 x Console port, 1 x Reset button and a series of LED
indicators as shown as below.
10/100/1000Mbps RJ-45 ports (1~48):
Designed to connect to the device with a bandwidth of 10Mbps, 100Mbps or
1000Mbps. Each has a corresponding 10/100/1000Mbps LED.
SFP ports (49~52):
Designed to install the SFP module and connect to the device with a bandwidth
of 100Mbps or 1000Mbps.Each has a corresponding 100/1000Mbps LED.
Console port (Console):
Designed to connect with the serial port of a computer or terminal for
monitoring and configuring the Switch.
Reset button (Reset):
Keep the device powered on and press down the button for about 6 seconds. The
system restores the factory default settings.
LED indicators:
The LED Indicators will allow you to monitor, diagnose and troubleshoot any
potential problem with the Switch, connection or attached devices.
The following chart shows the LED indicators of the Switch along with
explanation of each indicator.
The rear panel of the Switch contains AC power connector and one marker
shown as below.
AC Power Connector:
Power is supplied through an external AC power adapter. It
supports AC
100-240V, 50/60Hz.
Grounding Terminal:
The Switch already comes with Lightning Protection Mechanism. You can also
ground the Switch through the PE (Protecting Earth) cable of AC cord or with
Ground Cable.
Before installing the Switch, make sure that the following the "packing list"
listed OK. If any part is lost and damaged, please contact your local agent
immediately. In addition, make sure that you have the tools install Switches and
cables by your hands.
One Web Smart Ethernet Switch
Four rubber feet, two mounting ears and eights screws
This part describes how to install your Web Smart Ethernet Switch and make
connections to it. Please read the following topics and perform the procedures in
the order being presented.
2.1 Installation
Please follow the following instructions in avoid of incorrect installation causing
device damage and security threat.
Put the Switch on stable place or desktop in case of falling damage.
Make sure the Switch works in the proper AC input range and matches the
voltage labeled on the Switch.
To keep the Switch free from lightning, do not open the Switch’s shell even
in power failure.
Make sure that there is proper heat dissipation from and adequate
ventilation around the Switch.
Make sure the cabinet to enough back up the weight of the Switch and its
accessories.
2.1.1 Desktop Installation
Sometimes users are not equipped with the 19-inch standard cabinet. So when
installing the Switch on a desktop, please attach these cushioning rubber feet
provided on the bottom at each corner of the Switch in case of the external
vibration. Allow adequate space for ventilation between the device and the
objects around it.
2.1.2 Rack-mountable Installation in 19-inch Cabinet
The Switch can be mounted in an EIA standard-sized, 19-inch rack, which can be
placed in a wiring closet with other equipment. To install the Switch, please
follow these steps:
a. Attach the mounting brackets on the Switch’s side panels (one on each side)
and secure them with the screws provided.
b. Use the screws provided with the equipment rack to mount the Switch on
the rack and tighten it.
2.1.3 Power on the Switch
The Switch is powered on by the AC 100-240V 50/60Hz internal
high-performance power supply. Please follow the next tips to connect:
AC Electrical Outlet:
It is recommended to use single-phase three-wire receptacle with neutral outlet
or multifunctional computer professional receptacle. Please make sure to
connect the metal ground connector to the grounding source on the outlet.
AC Power Cord Connection:
Connect the AC power connector in the back panel of the Switch to external
receptacle with the included power cord, and check the power indicator is on or
not. When it is on, it indicates the power connection is OK.
Please insert the NIC into the computer, after installing network card driver,
please connect one end of the twisted pair to RJ-45 jack of your computer, the
other end will be connected to any RJ-45 port of the Switch, the distance
between Switch and computer is around 100 meters. Once the connection is OK
and the devices are power on normally, theLNK/ACT/Speed status indicator lights
corresponding ports of the Switch.
Use standard Cat.5/5e Ethernet cable (UTP/STP) to connect the Switch to end
nodes as described below. Switch ports will automatically adjust to the
characteristics (MDI/MDI-X, speed, duplex) of the device to which is connected.
Please refer to the LED Indicator Specification. The LINK/ACT/Speed LEDs for each
port lights on when the link is available.
3.2 How to Login the Switch
As the Switch provides Web-based management login, you can configure your
computer’s IP address manually to log on to the Switch. The default settings of
the Switch are shown below.
Parameter Default Value
Default IP address 192.168.2.1
Default username admin
Default password admin
The Web Smart Ethernet Switch Managed switch software provides rich layer 2
functionality for switches in your networks. This chapter describes how to use
Web-based management interface (Web UI) to thisswitchconfigure managed
switch software features.
In the Web UI, the left column shows the configuration menu. Above you can see
the information for switch system, such as memory, software version. The middle
shows the switch’s current link status. Green squares indicate the port link is up,
while black squares indicate the port link is down. Below the switch panel, you
can find a common toolbar to provide useful functions for users. The rest of the
screen area displays the configuration settings.
4.1 Quickly setting
In the navigation bar to select “Quick Setup”, can create a VLAN in this module,
add the port in the VLAN, set the basic information and modify the switch login
password. The following picture:
Parameter Description
VLAN ID VLAN number,48GE default VLAN 1
VLAN name VLAN mark
Manage IP Manage the IP address of the VLAN
device name Switch name
Manage VLAN Switches management in use of the VLAN
【instructions】Native VLAN: as a Trunk, the mouth will belong to a Native VLAN. The so-called
Native VLAN, is refers to UNTAG send or receive a message on the interface, is
considered belongs to the VLAN. Obviously, the interface of the default VLAN ID
(PVID) in the IEEE 802.1 Q VLAN ID is the Native VLAN. At the same time, send
belong to Native VLAN frame on the Trunk, must adopt UNTAG way.
Allowed VLAN list: a Trunk can transport the equipment support by default all
the VLAN traffic (1-4094). But, also can by setting the permission VLAN Trunk at
the mouth of the list to limit the flow of some VLAN can't through the Trunk.
【Configuration example】
1) VLAN setting:such as create VLAN 2 ,Sets the port 8 to Trunk ,Native VLAN 2
In the navigation bar to select “PORT”. You may conduct basic config, port
aggregation, port mirroring , port limit and port isolation.
4.2.1 Basic config
In the navigation bar to select “PORT>basic config”. For panel port to port
described, port speed, port status, working mode, flow control, cross line order
configuration, the following picture:
parameterdescription
port Select the current configuration port number
port status Choose whether to close link port
flow control Whether open flow control
ALL-SG8452M – User Manual
Can choose the following kinds:
Aggregation
port speed
10 M
100 M
1000 M
Can choose the following kinds:
Self negotiated
working mode
10 M
100 M
1000 M
port described The port is described
Cross line sequence Whether open intersection line sequence
【instructions】
Open flow control should be negotiated will close, negotiated close is to set port
speed rate and working mode; Set the port rate more than actual rate of port, the
port will be up.
【Configuration example】
Such as:The port is set to 10 M, half duplex, open flow control and cross line
sequence and port state
In the navigation bar to select “PORT>port aggregation”. In order to expand the
port bandwidth or achieve the bandwidth of the redundancy backup, the following
picture:
【parameter description】
parameter description
52GE switch can be set up eight link trunk group, group_1
Aggregation port
to group_8
For each of the members of the group and add your own
Member port
port, and with members of other groups
【instructions】
Open the port of the ARP check function, the port of the important device ARP, the
port of the VLAN MAC function, and the monitor port in the port image can’t be
Such as: set the port 9, 10, for aggregation port 1, lets this aggregation port 1
connected to other switch aggregation port 1 to build switch links .
4.2.3 Port mirroring
In the navigation bar to select “PORT>port mirroring”,Open port mirror feature,All
packets on the source port are copied and forwarded to the destination
port,Destination port is usually connected to a packet analyzer to analyze the source
port,Multiple ports can be mirrored to a destination port,the following picture:
【parameter description】
parameterdescription
Source port To monitor the port in and out of flow
Destination port
Set destination port,All packets on the source port are copied
and forwarded to the destination port
【instructions】
The port of the aggregate port can not be used as a destination port and the source
port, destination port and source port can not be the same.
【Configuration example】
Such as: set a mirror group for port 10 regulatory port 4, 6, 8 on and out flow
conditions
4.2.4 Port rate-limit
In the navigation bar to select “PORT>port rate-limit”.
To port output, input speed limit, the following picture:
In the navigation bar to select “PORT>port isolation”, ports are isolated. The
following picture:
【parameter description】
parameter
description
Source port Choose a port, to configure the isolated port
Isolated port
Port will be isolated
【instructions】
Open port isolation function, All packets on the source port are not forwarded from
the isolated port, the selected ports are isolated.
Ports that have been added to the aggregate port aren't also capable of being a
destination port and source port, destination port and source port cannot be the
same
【Configuration example】
Such as: the port 3, 4, 5, and 6 ports are isolated
In the navigation bar to select “VLAN”. You can manage the VLAN config, Trunk
Settings and Hybrid Settings. The following picture:
4.3.1 VLAN config
In the navigation bar to select “VLAN config”. VLANs can be created and set the
port to the VLAN (port default state for the access mode) ,the following picture
【parameter description】
parameterdescription
VLAN ID VLAN number,48GE default VLAN 1
VLAN name VLAN mark
Native VLAN: as a Trunk, the mouth will belong to a Native VLAN. The so-called
Native VLAN, is refers to UNTAG send or receive a message on the interface, is
considered belongs to the VLAN. Obviously, the interface of the default VLAN ID
(PVID) in the IEEE 802.1 Q VLAN ID is the Native VLAN. At the same time, send belong
to Native VLAN frame on the Trunk, must adopt UNTAG way.
Allowed VLAN list: a Trunk can transport the equipment support by default all the
VLAN traffic (1-4094). But, also can by setting the permission VLAN Trunk at the
mouth of the list to limit the flow of some VLAN can't through the Trunk.
【Configuration example】
Such as:PVID=VLAN2
PC1:192.168.2.122, port 8, access VLAN2
PC2:192.168.2.123, port 9, Trunk allowed VLAN 1-2
PC3:192.168.2.124, port 10, access VLAN1(The default port belongs to VLAN1)
Can let the PC2 PING PC1, cannot PING PC3
In the navigation bar to select “VLAN config>hybrid-port setting”, Can set the
port to take the tag and without the tag ,the following picture:
【instructions】
Hybrid port to packet:
Receives a packet, judge whether there is a VLAN information: if there is no play in
port PVID, exchanged and forwarding, if have, whether the Hybrid port allows the
VLAN data into: if can be forwarded, or discarded (untag on port configuration is not
considered, untag configuration only work when to send it a message)
Hybrid port to send packet:
1, determine the VLAN in this port attributes (disp interface can see the port to which
VLAN untag, which VLAN tag)
2, if it is untag stripping VLAN information, send again, if the tag is sent directly
【Configuration example】
Such as: create vlans 10, 20, VLAN sets the Native VLAN port 1 to 10, to tag VLAN for
10, 20, sets the Native VLAN port 2 to 20, to tag VLAN for 10, 20
This system e0/1 and the receive system e0/2 PC can be exchanged, but when each
data taken from a VLAN is different.
Data from the pc1, by inter0/1 pvid VLAN10 encapsulation VLAN10 labeled into
switches, switch found system e0/2 allows 10 data through the VLAN, so the data is
forwarded to the system e0/2, because the system e0/2 VLAN is untagged 10, then
switches at this time to remove packet VLAN10 tag, in the form of ordinary package
sent to pc2, pc1 - > p2 is VLAN10 walking at this time
Again to analyze pc2 gave pc1 package process, data from the pc2, by inter0/2 pvid
VLAN20 encapsulation VLAN20 labeled into switch, switch found system e0/1 allows
VLAN by 20 data, so the data is forwarded to the system e0/1, because the system
e0/1 on the VLAN is untagged 20, then switches remove packets on VLAN20 tag at
this time, in the form of ordinary package sent to pc1, pc2 at this time - > pc1 is VLAN
20
4.4 Fault/Safety
In the navigation bar to select “fault/safety”. You can set anti attack、channel
detection and ACL access control configuration 。
4.4.1 Anti attack
4.4.1.1 Anti DHCP attack
In the navigation bar to select “fault/safety>anti attack>anti dhcp attack”. Open
the DHCP anti-attack function, intercepting counterfeit DHCP server and address
depletion attack packets ban kangaroo DHCP server, the following picture:
DHCP trusted port configuration. Select the port as a trusted port. Prohibit DHCP for
address, select the port and save, you can disable this feature for the port。
Open DHCP attack prevention function, need to set the DHCP protective vlan
simultaneously, other functions to take effect.
【Configuration example】
Such as:1.dhcp snooping open
2.Setting dhcp snooping vlan
Set the connection router 10 ports for trust, then 12 port is set to the prohibit
In the navigation bar to select“fault/safety>anti attack>anti dhcp attack”,Open
the anti DOS attack function, intercept Land attack packets, illegal TCP packets, to
ensure that the device or server to provide normal service to legitimate users.,the
following picture:
【instructions】
Open the anti DOS attack function, intercept Land attack packets, illegal TCP packets,
to ensure that the device or server to provide normal service to legitimate users.
In the navigation bar to select“fault/safety>anti attack>ip source
guard”,Through the source port security is enabled, on port forwarding the packet
filter control, prevent illegal message through the port, thereby limiting the illegal
use of network resources, improve the safety of the port,the following picture:
【instructions】
Add the port that is currently being used as a IP source protection enable port, the
port will not be able to use.
【Configuration example】
Such as: to open source IP protection enabled port first,then to binding
In the navigation bar to select“fault/safety>anti attack>anti three
bind”,Automatically detect the port based IP address, MAC address of the mapping
relationship, and then realize the function of a key binding,the following picture:
【instructions】
A bond must be bound before the binding to enable the switch to open,And if you
want to access shall be binding and switch the IP address of the same network
segment 。
【Configuration example】
Such as: the binding to make first can open, must be a key bindings port 7
In the navigation bar to select“fault/safety> channel detection>ping
testing”,Use ping function to test internet connect and host whether to arrive. The
parameter description
destination IP
address Fill in the IP address of the need to detect
Timeout period Range of 1 to 10
Repeat number Testing number
【instructions】
Use ping function to test internet connect and host whether to arrive.
【Configuration example】
Such as: PING connect the IP address of the PC
4.4.2.2 Tracert testing
In the navigation bar to select“fault/safety> channel detection>tracert
testing”,Tracert detection can detect to the destination through the .following
The ACL rules are sequenced, row in front of the match will be priority rule. Many, if
the strategy items operating time is relatively longer.
Basic principles:
1, according to the order, as long as there is a meet, will not continue to find
2, implied refused, if don't match, so must match the final implied refused entry,
cisco default
3, any only under the condition of the minimum permissions to the user can satisfy
their demand
4, don't forget to apply the ACL to the port
【Configuration example】
such as: test time is every Monday to Friday 9 to 18 points, set port 1-8 cannot access
the network
steps: building ACL time - building ACL rules - is applied to the port
parameter description
Region name Configure the region name
Revision level Parameter configuration revision level
Instance ID Select configuration instance ID
VLAN ID Mapping of the VLAN configuration instance
【instruction】
An instance can only be mapped to a VLAN, instance and VLAN is a one-to-one
relationship.
【Configuration example】
Such as: change the region to DEADBEEF0102, region name is 123, instance 4 is
mapped to a VLAN 2, in the first need to create a VLAN 2
4.5.2 MSTP bridge
In the navigation bar to select“MSTP>MSTP bridge”,Can be related to bridge, port
configuration,the following picture:
inst-priority Whether open instance priority setting
Instance ID Select the created instance id is configured
enable Whether to open the STP bridge function
Bridge priority
Priority setting bridge example, the default
instance bridge priority for 32768
mode The model is divided into: the STP, RSTP, MSTP
Hello-time Switches sends bpdus in packet interval
Max-age
Ports are not yet received a message in the
time, will initiate topology changes
Forward-delay The state of the port switch time
Port-priority
Set port instance priority, defaults to 128, you
must enter multiple of 16, the range of 0-240
Path-cost Configure port costs
Port-fast Select configuration state
Auto-ege Select configuration state
Point-to-point Select configuration state
Bpdu guard Select configuration state
Bpdu filter Select configuration state
compatible Select configuration state
Root guard Select configuration state
TC guard Select configuration state
TC filter Select configuration state
【instruction】
(1) (hello_time+1)×2<=max_age<=(f_delay-1)×2 ,enable the switch to set instance
priority.
(2) Enable STP or switch mode would spend 2 times of the forward delay time.
Such as:1)Open the STP, configuration has to create an instance of the priority,
configuration time parameters, set the pattern to MSTP
2)Set MSTP has launched port configuration, select the created instance, set priority
(port configuration is not online, on-line configuration will only take effect, can click
on the "view the current configuration" button to view the configured completed)
In the navigation bar to select“DHCP relay”,Open the DHCP relay function, set up
and view the relay server IP address and its status.the following picture
【parameter description】
parameter description
IP address DHCP server address
status Invalid and vaild
【instruction】
If open the function of relay agent, then receives the broadcast DHCP message, to be
delivered in the form of unicast to configure on the server. The DHCP server to IP and
switches in the same network segment will only take effect.
In the navigation bar to select“DHCP relay>option82”,can set to OPTION82circuit
control、proxy remote 、ip address。the following picture:
【parameter description】
parameter description
VLAN id the DHCP request message in the VLAN, value range is 1
~ 4094
Circuit control Circuit ID to populate the user custom content, scope of
string length is 3 ~ 63
Proxy remote Configuration ASCII remote id string value, the length of
the range of 1 ~ 63
IP address Decimal IP address
【instruction】
Switches, relay information to the DHCP server will take option82, VLAN ID must be
configured to DHCP message taken VLAN can bring option82 information.
【Configuration example】
Sach as:add circuit control、proxy remote、ip address information
In the navigation bar to select“DHCP server”,Can open the DHCP server function,
setting up the network parameters.the following picture:
【instruction】
If open the DHCP server function, can't open the DHCP relay function; Open a DHCP
server is enabled, need to configure and manage the IP in the same network
segment address pool.
Such as: to switch a 192.168.2.30-192.168.2.35 bottom allied equipment distribution
within the scope of the IP address, the lease time for 1 day, the default network
management, the DNS server is configured to 192.168.2.22, package option to carry
information from the server.
1)Open the DHCP server;
2) set the address pool network 192.168.2. X, start IP for 192.168.2.30, end IP for
By setting the rule of heavy tag index number, the current
Rule index
switch can be set up 32 rule
Choose always said - match the match, all the data for tags
Choose can be set to equal matching rules, comply with the
Operation type
rules of heavy tag data
Adaptable to the rules of the heavy tag which data is mapped
Server class mapping
to a queue
Conform to the rules of heavy tag data to the marked priority
Priority relable
values
Set heavy tag matching rules, such as choice goal Mac, just
check the data destination Mac address is in accordance with
Value tye
the rules
Set the value of matching, such as choice goal Mac for HH: HH:
value
HH: HH: HH: HH
Choose port to
config The application of heavy tag on which interface
apply Click on the application of heavy marking rules to take effect
【instruction】
According to the different matching rules to map different packages to different
cos, and then according to the mapping relationship cos and queue queue to map
different packages to different queue, can also set the priority value of a tag heavy
bag.
【Configuration example】
Such as: will the destination address for 00:02:03:0b:89:12 packets are forwarded to
the port 3, 4, 5, 6, priority of remarked as 3
In the navigation bar to select“QoS>mapping the queue>differential service class mapping”,Differential service can be mapped to the corresponding service
categories.the following picture:
【parameter description】
parameter description
Server list DSCP field has seven (0-63) is divided into four tables
Map the DSCP to COS fields (0 to 7), based on the cosine is
Queue ID
mapped to a queue
【instruction】
Cos priority is greater than the DSCP, DSCP priority is greater than the port
【Configuration example】
Such as: the DSCP value of 3, 12,23 mapping to cos 5
In the navigation bar to select“Address table>Mac add and delete”,You can add
static Mac and delete Mac and view to the current of the Mac address table.the
following picture:
【parameter description】
parameter description
Can choose to clear the multicast Mac address, clear dynamic
unicast Mac address, clear static unicast Mac address, clear the
Clear Mac
specified Mac address, Mac address table
Fill in the need to add or delete VLAN id, not create vlans to
VLAN
create can only take effect
【instruction】
According to different conditions to clear Mac address, view/add/learn the Mac
address, Mac address filtering
In the navigation bar to select“address table>Mac study and laging”,Can be set
up port Mac address study limit and Mac address aging time . the following picture:
【parameter description】
parameter description
Mac address Range 0-8191,default 8191
Mac address study
limit Default 300
Such as: 1) setting port 5, 6, 7, 8 address study limit for 2000
2) will be dropped or learn the Mac address of the port equipment after 2 minutes
disappear automatically from the Mac address table
4.9.3 Mac address filtering
In the navigation bar to select“address table>Mac address table”,Can be filtered
according to the condition does not need the Mac address. the following picture:
【parameter description】
parameter description
Mac address Can not add multicast Mac address
VLAN VLAN number
【Configuration example】
Such as: the Mac address for 00:20:15:09:12:12 added to the filter in the table
In the navigation bar to select“Snmp >Snmp config>view config”,Set the view
the rules to allow or disable access to some of the MIB object. the following picture
【parameter description】
parameter description
View name Wiew mane
include Indicate the MIB object number contained within the view
exclude Indicate the MIB object son number was left out of view
MIB subtree OID View the associated MIB object, is a number of MIB
subtree mask MIB OID mask
【instruction】
Each view is best to configure a view rule, otherwise it will affect the SNMP function
【Configuration example】
such as: establish a view 123 , MIB subtree oid .1.3.6.1 contain among them
Specified using AES encryption protocol or DES encryption
encrypt mode
protocol
Group name A user group name
encrypt password Range 8-60
【instruction】
Cap on the number configuration of 8, users need a new view and group to use, the
user's security level must be consistent with the group level of security. Add a user
authentication and encryption, and configure belong to groups of users, the user will
be used for Snmpv3 connection.
【Configuration example】
Such as: new view 123, the newly built group group1, new users user1
4.10.1.6 Trap
In the navigation bar to select“Snmp>Snmp config>Trap”,Can specify sent the
trap messages to Snmp host (NMS). the following picture:
【parameter description】
parameter description
Destination ip
address
Security name Snmp user name
version
Specified using AES encryption protocol or DES encryption
Security mode
protocol
Group name User group name
【instruction】
The Trap cap on the number configuration of 8, you can configure a number of
different Snmp Trap host used to receive messages. Trigger the trap message time:
port Linkup/LinkDown, equipment of cold - start (restart when power supply
drop)/warm - start (a warm restart), and Rmon set port port statistical fluctuation
threshold.
【Configuration example】
Such as:setting hoset 192.168.2.30 receive trap information
4.10.2 Rmon config
4.10.2.1 Statistics group
In the navigation bar to select“Snmp>Rmon config>statistics group”,Set an
Ethernet interface statistics 。the following picture:
Set the lower limit parameter values
lower limit
Above/below the
Upper/lower limit reached, for each event
threshold limit of
events
owner Set the table creator, ownername for 1 ~ 30 characters of
a string
【instruction】
At the time of configuration Rmon Snmp functions must be open, otherwise the
prompt dialog box will appear.This configuration need to configure statistics groups
and events.
【Configuration example】
Such as: new statistics group of 77 and the event group 345, set up more than 12 and
below the lower limit 3 ,Beyond the scope of alarm
4.11 LACP
In the navigation bar to select“LACP>Lacp”,Can be set up dynamic link together.
the following picture:
parameter description
Open LACP Open lacp fuction configuration to take effect
System priority Range to 1-65535
Port priority Range to 1-65535
Sink port number 1-8
Polymerization
model Active and passive
【instruction】
LACP enabled to open, functional configuration to take effect.
【Configuration example】
Such as: the switch A port 10 to 13 and switch B port 10 to 13 dynamic link together
1)switch A/B openLACP
2) switch A/B port 10 to 13 dynamic convergence to the aggregation of group
Click the button to restart the switch.The restart process may take 1 minute. Please
wait patiently. The page will be refreshed automatically after device restart.
【Configuration example】
Such as:click“restart”button
4.10.1.3 Password change
In the navigation bar to select“SYSTEM>system config>password change”,The
password change to equipment. the following picture:
In the navigation bar to select“SYSTEM>system upgrade”,Optional upgrade file
to upgrade. the following picture
【instruction】
1 please confirm that the upgraded version of the same model and the same model.
2 in the upgrade process, you may encounter flash to make the page is temporarily
unable to respond to the page, this time can not power off or restart the device, until
prompted to upgrade successfully!
In the navigation bar to select“SYSTEM>config management>current
configuration”,can import and export configuration files, the backup file. the
following picture:
【instruction】
Import process can not be closed or refresh the page, or import will fail!
After the introduction of configuration, to enable the new configuration, please in
this page Restart device Otherwise configuration does not take effect.
4.12.3.2 Configuration backup
In the navigation bar to select“SYSTEM>config management>configuration
backup”,you can configure backup file。the following picture:
Restore the factory configuration, will delete all the current configuration. If you
have any useful configuration, the current system can lead the factory configuration
again after the current configuration.
【Configuration example】
Such as: restore configuration can be the guide before they leave the current
configuration
4.12.4 Config save
In the navigation bar to select“SYSTEM >config save”,you can save current
configuration。the following picture
Only the admin of the super administrator can access this page is used to manage
users and visitors. The user can log in the Web management system of equipment for
routine maintenance. In addition to the admin and user, can add up to five users.
Ordinary users can only access information system home page.
【Configuration example】
Such as:
4.12.6 Info collect
In the navigation bar to select“SYSTEM>info collect”,you can collect to the system
debug information。the following picture
ALLNET GmbH Computersysteme declares that the device ALL-SG8452M is in
compliance with the essential requirements and other relevant provisions of
Directive 2004/108/EC or 2014/30/EU. The Declaration of conformity can be found
under this link:
a portion of it, either verbatim or with modifications and/or translated into another language.
(Hereinafter, translation is included without limitation in the term "modification".) Each licensee is
addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running the Program is not restricted, and the output from the Program
is covered only if its contents constitute a work based on the Program (independent of having been
made by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and
to the absence of any warranty; and give any other recipients of the Program a copy of this License
along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based
on the Program, and copy and distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the
files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it,
when started running for such interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a notice that there is no warranty
(or else, saying that you provide a warranty) and that users may redistribute the program under
these conditions, and telling the user how to view a copy of this License. (Exception: if the
Program itself is interactive but does not normally print such an announcement, your work based
on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work
are not derived from the Program, and can be reasonably considered independent and separate
works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire whole, and thus to each and
every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative
or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or
with a work based on the Program) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice
placed by the copyright holder or other authorized party saying it may be distributed under the terms
of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently
linked with application programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under
these terms. A "work based on the Library" means either the Library or any derivative work under
copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with
modifications and/or translated straightforwardly into another language. (Hereinafter, translation is
included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For
a library, complete source code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control compilation and installation of the
library.
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running a program using the Library is not restricted, and output from
such a program is covered only if its contents constitute a work based on the Library (independent of
the use of the Library in a tool for writing it). Whether that is true depends on what the Library does
and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and
to the absence of any warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on
the Library, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files
and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the
terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an
application program that uses the facility, other than as an argument passed when the facility is
invoked, then you must make a good faith effort to ensure that, in the event an application does
not supply such function or table, the facility still operates, and performs whatever part of its
purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely
well-defined independent of the application. Therefore, Subsection 2d requires that any
application-supplied function or table used by this function must be optional: if the application
does not supply it, the square root function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are