American Fibertek SM10p Quick User Guide

SM10P
-Port 10/100/1000Base-T +
2 RJ-45/100/1000 SFP Combo Port
Managed Switch
User Guide
Rev.A1
19-Mar-12
Regulatory Approval
- FCC Class A
- CE
Safety Compliance
- LVD
Warranty
© Copyright 2012 Transition Networks
Lifetime
To Contac t Transitio n Networks
For prompt response when calling for service information, have the following information ready:
-
Product serial number and revision
-
Date of purchase
-
Vendor or place of purchase
You can reach Transition Networks technical support at:
E-mail: techsupport@transition.com Transition Networks 10900 Red Circle Drive Minnetonka, MN 55344 United States of America
Telephone: +1.800.526.9267 Fax: +1.952.941.2322
http://www.transition.com info@ Transition.com
Revision A1
Purpose
Audience
About This Manual
This manual gives specific information on how to operate and use the management functions of the SM10P
The Manual is intended for use by network administrators who are responsible for operating and maintaining network equipment; consequently, it assumes a basic working knowledge of general switch functions, the Internet Protocol (IP), and Simple Network Management Protocol (SNMP).
ii
i
Publication date: Feb., 2012
Publication date: Mar., 2012
Revision A1
Table of Contents
Revision History......................................................... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... .. ... ... ..... ... ... .. ... ...viii
INTRODUCTION ............................... .. ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ..... ... ... ... ..... ... ... .. ...... .. ...... ... .. ... ...... .. ... ... ..... ... ...1
CHAPTER 1 OPERATION OF WEB-BASED MANAGEMENT ........................................ ..... ........ ......2
CONNECTING NETWORK DEVICES...................................... .. ... ...... .. ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ... ..... ... ...2
TWISTED-PAIR DEVICES..................... ... ...... .. ... ... ..... ... ... .. ...... ... .. ...... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ..... ... ... ...2
CABLING GUIDELINEST
PINOUT CONFIGURATION, SO YOU CAN USE STANDARD STRAIGHT-THROUGH TWISTED-PAIR CABLES TO
CONNECT TO ANY OTHER NETWORK DEVICE (PCS, SERVERS, SWITCHES, ROUTERS, OR HUBS)...............2
CHAPTER 2 SYSTEM CONFIGURATION ........................... ... ..... ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ... ..... ... ...4
YSTEM INFORMATION...................................... ....... ...... .......... ....... ...... ....... ......... ....... ...... .......... ....... ...... ....... .......4
2-1 S
2-1.1 Information................ ... ...... .. ... ... ... ..... ... ... .. ... ..... ... ... ... ..... ... ... .. ... ..... ... ... ... .. ...... .. ... ...... .. ... ...... .. ... ... ..... ... ...4
2-1.2 Configuration................................... ................................................. ....................................................... ...7
2-1.3 CPU Load....................................................................................................................... .........................8
2-2 T
IME............................ ... ...... .. ... ..... ... ... ... ..... ... .. ... ...... .. ... ... ..... ... ... ..... ... ... .. ...... ... .. ... ..... . ..... ... .. ... ...... .. ... ... ..... ... ...9
2-2.1 Manual............................................................................................................ ............................................9
2-2.2 NTP ........................................................................ ................................................. ... ..... ... ... ... ..... ... ... .. .....11
2-3 A
CCOUNT....................................... ......................................................................................... . ......................12
2-3.1 Users...................................... .... ... .. ..... .. .. ..... ... .. .. ..... .. ... .... ... .. ..... .. .. ... .... ... .. ..... .. ...................................12
2-3.2 Privitege Level.......................................................................................................................................14
2-4 IP................................. ................... ..................... ................... ..................... ................... ................................17
2-4.1 IPV4 .................................... ..... ... ... .. ...... .. ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... .. ...... .. ... ... ... .. ...... ... .. ... ...... .. ... .17
2-4.2 IPV6 .................................... ..... ... ... .. ...... .. ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... .. ...... .. ... ... ... .. ...... ... .. ... ...... .. ... .19
2-5 S
YSLOG........................................................... ... .. ...... .. ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ..... ... ... ... .. ... ...... .. ... ... ..... ... .21
2-5.1 Configuration..................................................................................................................................... .. ... .21
2-5.2 Log........................................................................................................................................................22
2-5.3 Detailed Log.........................................................................................................................................23
2-6 SNMP....................................................... ... ... ..... ... ... .. ...... ... .. ...... ... .. ... ..... ... ... ... ..... ... .. ... ... ... ..... ... ... .. ...... .. ... ... .24
2-6.1 System ....................................................................................................................... ... ..... ... ... .. ...... .. ... ....24
2-6.2 Communities..................................................... ........................................................................................26
2-6.3 Users...................................... .... ... .. ..... .. .. ..... ... .. .. ..... .. ... .... ... .. ..... .. .. ... .... ... .. ..... .. ...................................27
2-6.4 Groups......................................................................................................................................... ...... .......... ..29
2-6.5 Views ................................ ................ ................ ..................... ................ ................ ............ ............ ................ ....30
2-6.6 Access....................................................... ......... ........ ........ ........... ........ ........ ........... ... ..... ... ... ... ..... ... .. ... ....32
2-6.7 Tarp......................................................... ........................... ..................... ..................... ........................... ...............34
CHAPTER 3. CONFIGURATION .......................... ... ..... ... ... .. ...... ... .. ...... ... .. ... ..... ... ... ... ..... ... ... .. ...... ... .. ... .36
3-1 P
ORT.............................................................................. ............. ............ ................ ............ ................ ............ ............36
3-1.1 Configuration................................... ................................................. ....................................................... .36
3-1.2 Port Description...... ................................................. .................................................... .. ... ... ..... ... ... ..... ... .38
3-1.3 Traffic Overview....................................................... ........ ........ ........ ......... ........ ........ .............. .. ... ..... ... ... .39
3-1.4 Detailed Statistics............................................................... .... ... ... ....... ... ... ... ....... ... ... .... ......... ....... ...... ....... ..40
3-1.5 Qos Statistics ...................................... ... .. ... ...... .. ... ... ... ..... ... .. ... ...... .. ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... ..... .42
3-1.6 SFP Information...... .. ...... ... .. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... ... .. ...... .. ... ... ... ..... ... .. ... ...... ..... ... ... ..... ... .. ... ....43
3-1.7 EEE ........................................................................ ................................................. ...... .. ... ... ..... ... ... ... ..... .45
3-2 ACL................................................................................................ ...............................................................47
3-2.1 Ports............................................ ....................................................................................................... ... ....47
3-2.2 Rate Limiters....................................... ................................................. .....................................................49
3-2.3 Access Control List..................................... ......... ....... ....... .......... ....... ......... ....... ...................................50
3-2.4 ACL Status.............................................................. .......... .......... .......... ............. ............. ...... ....... ......... ....... ..53
3-3 A
GGREGATION................................................................................... ............ ............ ................ ............ ................ ....55
3-3.1 Static Trunk ............................................. ......... .... .... ........ .... .... .... ........ .... .... ........ .... ............ ................ ............55
3-3.1.1 Static Trunk..............................................................................................................................................................55
3-3.2 LACP.........................................................................................................................................................57
3-3.2.1 Configuration...................................................................................................................................... ........ ....... ..57
3-3.2.2 System Status ...................................................................................................... ........ ............... ........ ........ .........59
3-3.2.3 Port Status............................................................................................. ........ ....... ........ ............... ........ ........ ....... ..60
3-3.2.4 Port Statistics..................................................................................................................................................... ..61
3-4 SPANNING TREE.............................................. .. ...... ... .. ...... ... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ...... .. ... ... ... .. ...... .. ... ... .62
HE RJ-45 PORTS ON THE SWITCH SUPPORT AUTOMATIC MDI/MDI-X
Revision A1
3-4.1 Bridge Settings ......................................................................................................................................62
2-4.2 MSTI Mapping..................................................................................... .....................................................65
3-4.3 MSTI Priorities......................................................... ... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... .. ...... ... .. ...... .. ... ... .67
3-4.4 CIST Ports............................................................................................................................. ... .. ... ..... ... ... .68
3-4.5 MSTI Ports............................... ........................................................................................................ .. ...... .70
3-4.6 Bridge Status....................................................... ........................................................... ...... .......... ...... ....... ..72
3-4.7 Port Status.............................................. .......................................................................................................73
3-4.8 Port Statistics............................................................................................................. ... .. ...... ... .. ... ...... .. ... .74
3-5 IGMP S
NOOPING............................................................ ... ..... ... ... ... ..... ... .. ... ...... .. ... ... ..... ... ... ..... ... ... .. ... ... ..... ... .76
3-5.1 Basic Configuration ............................................................................ .....................................................76
3-5.2 VLAN Configuration ........................................................ ........ ........ ......... ........ ........ ........ ...... .. ... ... ..... ... .78
3-5.3 Port Group Filtering ....................... ...... .. ... ... ..... ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... ..... ... ..... ... ... .. ...... .. ... ... .80
3-5.4 Status ................................................................ ... ....... ... ... ... ....... ... ... .... ... ...... .... ... .......... ...... ....... ...... .......... ..82
3-5.5 Group Infermation........................................................................................................................ ...... .. ... .84
3-5.6 IPv4 SSM information........ .. ... ... ... ..... ... ... .. ...... .. ... ... ... ..... ... ... .. ... ..... ... ... ... .. ...... .. ... ... ..... ...... ... .. ...... .. ... ....85
3-6 MLD S
NOOPING.......................................................... ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ..... ... ... .. ...... ... .. ... ... .. ...... .87
3-6.1 Basic Configuration ............................................................................ .....................................................87
3-6.2 VLAN Configuration ........................................................ ........ ........ ......... ........ ........ ........ ...... .. ... ... ..... ... .89
3-6.3 Port Group Filtering ....................... ...... .. ... ... ..... ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... ..... ... ..... ... ... .. ...... .. ... ... .91
3-6.4 Status ................................................................ ... ....... ... ... ... ....... ... ... .... ... ...... .... ... .......... ...... ....... ...... .......... ..92
3-6.5 Group Infermation........................................................................................................................ ...... .. ... .94
3-6.6 IPv6 SSM Information........................................ ... ... ... .. ...... ... .. ... ... ..... ... ... .. ... ..... ... ... ... .. ...... ... .. ...... .. ... ... .96
3-7 MVR.............................................. ............................................ ....................................................................97
3-7.1 Configuration................................... ................................................. ....................................................... .97
3-7.2 Groups Information....................................................... .............. ......................... ............. ... ... .. ...... ... .. ... .99
3-7.3 Statistics.. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... ........ ... .. ...... ... .. ... ...... .. ..100
3-8 LLDP............................................. ...... ... .. ... ..... ... ... ... ..... ... ... ..... ... .. ... ...... .. ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ... ..... ..101
3-8.1 LLDP Configuration ..............................................................................................................................101
3-8.2 LLDP Neighbours................................................................................................................................. ..104
3-8.3 LLDP-MED Configuration....................................................................................................... ... ... ..... ..106
3-8.4 LLDP-MED Neighbours....................................................... ... ... ... ..... ... ... .. ...... ... .. ...... .. ... ... ... ..... ... ... .. ..112
3-8.5 EEE ........................................................................ ................................................. ...... .. ... ... ..... ... ... ... ....115
3-8.6 Port Statistics............................................................................................................. ... .. ...... ... .. ... ...... .. ..117
3- 9 F
ILTERING DATA BASE........................................ ... ..... ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ...... .. .....119
3- 9.1 Configuration................................ .. ...... .. ... ... ... .. ...... ... .. ... ... .. ...... ... .. ... ... ... ..... ... ... .. ...... .. ... ...... .. ... ... ..... ..119
3- 9.2 Dynamic MAC Table.................................................................. ........ .... .... .... ........ .... .... ........ ................ ......121
3-10 VLAN..................................................... ... ... ..... ... ... ..... ... ... .. ...... ... .. ... ..... ... ... ... ..... ... .. ... ... ..... ... ... ... ..... ... .. .....123
3-10.1 VLAN Membership ................... ........ ........ ........ ......... ........ ........ ........ ........... ........ ........ ........... ... ... ..... ..123
3-10.2 Ports....................................................................................................................................... .. ... ... ..... ..125
3-10.3 Switch Status........................................... ....... ... ... .... ... ...... .... ... ... ....... ... ... ... ....... ... .. ..... ...... ....... ...... .......... 128
3-10.4 Po rt Status.......................................................................................................................... ....... ......... ....... 129
3-10.5 Private VLANs...................................................................................................................................131
3-10.5.1 Private VLANs Membership.......................... ........ ....... ................ ........ ....... ........ ................ ....... ........ .......131
3-10.5.2 Port Isolation ............................................ ........ ........ ............... ........ ........ ............... ........ ....... ............... ........132
3-10.6 MAC-based VLAN................................................................................................................................133
3-10.6.1 Configuration.................................................................................................. ........ ........ ............... ....... ........133
3-10.6.2 Status ......................................................................................................................................................................135
3-10.7 PROTOCOL -BASED VLAN............................................. ............................................. ............................136
3-10.7.1 Protocol to Group........................................................................................................................................136
3-10.7.2 Group to VLAN ................................. ....... ........ ................ ....... ........ ....... ................ ........ ....... ................ .......138
3-11 VOICE VLAN ...................... ... ..... ... ... ... ..... ... .. ... ...... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ..... ... ... ... .. ... ..... ... ..140
3-11.1 Configuration........................................................................................................................................140
3-11.2 OUI............................................ ..... ... ... .. ...... ... .. ...... ... .. ... ..... ... ... ..... ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... ....142
3-12 GARP.............................................................. ..................... ...................... ...................... ..... ... ... ... ..... ... ... .. ..143
3-12.1 Configuration .......................................................................................................................................143
3-12.2 Statistics................................................................................................................................................145
3-13 GVRP.............................................................. ..................... ...................... ...................... ..... ... ... ... ..... ... ... .. ..146
3-13.1 Configuration .......................................................................................................................................146
3-13.2 Statistics................................................................................................................................................148
3-14 Q
OS ..................................... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ...... .. ... ... .... . ...... .. ... ... ..... ... ... .. .....149
3-14.1 Port Classification............................ ....................................................... .. ...... ... .. ... ... ..... ... ... .. ...... ... .. ..149
3-14.2 Port Policing ...................................................................................................................................... ..151
3-14.3 Port Scheduler......................................................................................................................................152
3-14.4 Port Shaping.........................................................................................................................................155
3-14.5 Port Tag Remarking ....................................................................... ...... ... .. ... ..... ... ... ... ... ..... ... .. ... ..... ... ..158
v
Publication date: Mar., 2012
Revision A1
3-14.6 Port DSCP............................................................................................................................. ............159
3-14.7 DSCP-Based QoS..............................................................................................................................161
3-14.8 DSCP Translation.....................................................................................................................................163
3-14.9 DSCP Classification.............................................................................................................................165
3-14.10 QoS Control List Configuration ........................................................................................................166
3-14.11 QCL Status............ .......................................................... ........................................................... ...... ....... 170
3-14.12 Storm Control ................................. ........................................................................................................172
3-15 T
HERMAL PROTECTION................................................ ... ..... ... ... ..... ... ... .. ...... ... .. ... ..... ... ... ... ..... ... ... ..... ... ... .. ..173
3-15.1 Configuration .......................................................................................................................................173
3-15.2 Status .........................................................................................................................................................175
3-16
S-FLOW AGENT.......................................................... ... ... ... ..... ... ... .. ...... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ... .. .....176
3-16.1 Collector .......................................................................................................................... ... ... ..... ... .. ... ..176
3-16.2 Sampler........................................................ ... .. ... ...... .. ... ... .. ... ...... .. ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... ....178
3-17 L
OOP PROTECTION.....................................................................................................................................180
3-17.1 Configuration .......................................................................................................................................180
3-17.2 Status .........................................................................................................................................................182
3-18 S
INGLE IP.................................................................................................................. .................................183
3-19 E
ASY PORT...................................................................................... ............ ............ ................ ............ ................ ..186
3-20 M
IRRORING ............................................... ... ... ..... ... .. ...... ... .. ... ..... ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ... .. ...... ... .. ..188
3-21 TRAP EVENT SEVERITY...................................................... ..... ... .. ... ...... .. ... ... ..... ... ... ..... ... ... .. ...... ... .. ... ...... .. ..190
3-22 SMTP C 3-23 UP
ONFIGURATION ........ ............ ................ ............ ............. ................ ............ ............ ................ ............ ......192
NP........ ... .. ...... ... .. ... ..... ... ... ... ..... ... ... .. ...... ... .. ...... .. ... ... ..... ... ... ... ..... ... .. ... ...... .. ... ..... ... ... ... .. ... ...... .. ... ... ..... ..193
CHAPTER 4. SECURITY............................... ... ...... .. ... ... ..... ... ... .. ...... ... .. ...... .. ... ... ..... ... ... ... ..... ... ... .. ..195
4-1 IP S
OURCE GUARD.......................................................................................................................................195
4-1.1 Configuration................................... ................................................. ......................................................195
4-1.2 Static Table .................................................. ..... ........... ..... ..... ...... .......... ..... ...... ...... ......... ...................... .............197
4-1.3 Dynamic Table............ .... .... .... ........ .... .... ........ ..... .... ........ .... .... ........ .... .... .... ........ .... ........ ................ ............ ..198
4-2 ARP I
NSPRCTION .................................... ........................................................................................... ..........199
4-2.1 Configuration................................... ................................................. ......................................................199
4-2.2 Static Table .................................................. ..... ........... ..... ..... ...... .......... ..... ...... ...... ......... ...................... .............200
4-2.3 Dynamic Table............ .... .... .... ........ .... .... ........ ..... .... ........ .... .... ........ .... .... .... ........ .... ........ ................ ............ ..202
4-3 DHCP S
NOOPING .................. ... ... ..... ... ... .. ...... ... .. ... ..... ... ... ... ..... ... .. ...... ... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ... ... ....203
4-3.1 Configuration................................... ................................................. ......................................................203
4-3.2 Statistics.. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... ........ ... .. ...... ... .. ... ...... .. ..204
4-4 DHCP R
ELAY....................................................................................................... ..................... ..................... .............206
4-4.1 Configuration................................... ................................................. ......................................................206
4-4.2 Statistics.. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... ........ ... .. ...... ... .. ... ...... .. ..208
4-5 NAS.......................................... ........................ ...................... ...................... ................... ...... .. ... ... ..... ... ... ... ....210
4-5.1 Configuration................................... ................................................. ......................................................210
4-5.2 Switch Status....................................................... ... ... .... ...... .... ... ... ....... ... ... ... .... ...... . .. .......... ....... ...... ....... ...218
4-5.3 Port Status.............................................. .....................................................................................................220
4-6 AAA ................................... ............................................ ............................................ ... .. ...... .. ... ... ..... ... ... ... ....223
4-6.1 Configuration................................... ................................................. ......................................................223
4-6.2 Radius Overview................................................................................................ .....................................227
4-6.3 Radius Details............................. ..................................................................................................... ... ....229
4-7 P
ORT SECURITY.............................................. .. ... ... ..... ... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ..... ... ... .. ...... .. ... ... ... .. .....230
4-7.1 Limit Control........................................................................................................................ .......... ...... ....... 230
4-7.2 Switch Status....................................................... ... ... .... ...... .... ... ... ....... ... ... ... .... ...... . .. .......... ....... ...... ....... ...233
4-7.3 Port Status.............................................. .....................................................................................................235
4-8 A
CCESS MANAGEMENT.......................................................... ... ... ..... ... ... .. ...... ... .. ...... .. ... ... ..... ... ... ... ..... ... .. ... ..236
4-8.1 Configuration................................... ................................................. ......................................................236
4-8.2 Statistics.. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... ... ..... ... .. ... ... ..... ... ... .. ...... ... .. ... ...... .. ... ... ........ ... .. ...... ... .. ... ...... .. ..238
4-9 SSH........................................... ...................... ...................... ..................... ...................... ... ... ..... ... ... .. ...... ... .. ..239
4-10 HTTP 4-11 A
S.............................. ...... ... .. ...... ... .. ... ...... .. ... ... ..... ... ... .. ...... .. ... ... ..... ... ... ..... ... ... .. ...... . .... ... ... ... ..... ... ... .. ..240
UTH METHOD.......................................... ..... ... ... ... ..... ... ... ..... ... ... .. ...... .. ... ... ..... ... ... .. ...... ... .. ...... ..................241
CHAPTER 5. MAINTENANCE .......................................................................................................242
5-1 R
ESTART DEVICE......................................... ... ... ..... ... .. ...... ... .. ... ...... .. ... ... ..... ... ... .. ...... .. ... ... ..... ... ... .... . ...... .. ... ..242
5-2 F
IRMWARE........................................................................ ............. ................ ............ ............ ................ ............ ......243
5-2.1 Firmware Upgrade............................................................................................................ ... ... ..... ... ... ....243
5-2.2 Firmware Selection ................................................................................................................................244
5-3 S
AVE / RESTORE ............................... ... ... .. ...... .. ... ... ..... ... ... ... ..... ... ... ..... ... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ... .. .....246
vi
Publication date: Mar., 2012
Revision A1
5-3.1 Factory Defaults................................................................................................................................ .....246
5-3.2 Save Start................................................. ..... .... ........ .... .... .... ........ .... .... .... ........ .... .... ............ ............ ..............246
5-3.3 Save User......... .. ... ... ..... ... ... .. ... ...... .. ... ... ..... ... ... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ... .....................................247
5-3.4 Restore User.............. ............................................. .............................................................................247
XPORT / IMPORT................................................. ................. ............ ............ ................ ............ ............ ................ ..248
5-4 E
5-4.1 Export Config .........................................................................................................................................248
5-4.2 Import Config ................................................... .. ... ... ..... ... ... .. ...... ... .. ... ... ..... ... ... ... ..... ... ..... ... ... .. ...... ... .. ..249
5-5 D
IAGMOSTICS......................................... .. ... ...... .. ... ... ..... ... ... .. ...... .. ... ...... .. ... ... ..... ... ... .. ...... ... .. ... ... ... ..... ... ... .. ..250
5-5.1 Ping.................................................................................................................................................. ... ....250
5-5.2 Ping6..................................................................................................................................................... ..251
5-5.3 VeriPHY.................................................................................... ............ ................ ................ ............ ............ ..252
A. GLOSSARY OF WEB-BASED MANAGEMENT........................................................................................253
A ................................................................................................................................................................... .....253
C........................................ .................................................................................................................................254
D ................................................................................................................................................................... .....254
E.......................................................................................................................... ...............................................256
F.........................................................................................................................................................................256
H ................................................................................................................................................................... .....256
I.............................................. ............................................ ................................................................................257
L.......................................................................................................................... ...............................................258
M................................................ .......................................................................................... ..............................258
N ................................................................................................................................................................... .....259
O ................................................................................................................................................................... .....260
P.........................................................................................................................................................................260
Q ................................................................................................................................................................... .....261
R........................................ .................................................................................................................................262
S.........................................................................................................................................................................262
T.......................................................................................................................... ...............................................263
U ................................................................................................................................................................... .....264
V ................................................................................................................................................................... .....264
vii
Publication date: Mar., 2012
Revision A1
Revision History
Date Revision
03/20/2012 A1
viii
Publication date: Mar., 2012
Revision A1
INTRODUCTION
Overview
The SM10P is an affordable managed switch that provides a reliable infrastructure for your business network. These switches deliver more intelligent features you need to improve the availability of your critical business applications, protect your sensitive information, and optimize your network bandwidth to deliver information and applications more effectively. It provides the ideal combination of affordability and capabilities for entry level networking includes small business or enterprise application and helps you create a more efficient, better-connected workforce.
SM10P specification is hig h lig h te d as follo ws.
L2+ features provide better manageability, security, QoS, and performance.
High port count design with all Gigabit Ethernet ports
Support guest VLAN, voice VLAN, Port based, tag-based and Protocol based
VLANs.
Support 802.3az Energy Efficient Ethernet standard
Support 8K MAC table
Support IPv6/ IPv4 Dual stack
Support s-Flow
Support Easy-Configuration-Port for easy implement the IP Phone, IP Camera
or Wireless environment.
Overview of this user’s manual
Chapter 1 “Operation of Web-based Management”
Chapter 2 “Maintenance”
Managed Switch
provides
10 ports in
a single device;
the
1
Publication date: Mar., 2012
Revision A1
Chapter 1 Operation of Web-based Management
Initial Configuration
This chapter instruct s you how to conf igure an d manage the SM10P through the web user interface. With this facility, you can easily access and monitor through any one port of the switch all t he stat us of the swit ch, including MIBs status, each port activity, Spanning tree status, port aggregation status, mult icast traffic , VLAN and priorit y status, even illegal access record and so on.
The default values of the SM10P are listed in the table below:
IP Address Subnet Mask Default Gateway Username Password
After the SM10P has been finished configuration the interface, you can browse it. For instance, type http://192.168.1.77 in a browser, it will show the following screen and ask you inputting username and password in order to login and access authentication.
The default username is “admin” and password is admin. For the first time to use, please enter the default username and password, and then click the <Login> button.
In the SM10P, it supports a simple user management function allowing only one administrator to configure the system at the same time. If there are two or more users using administrator’s identity, it will allow the only one who logins first to configure the system. The rest of users, even with administrat or’s identity, can only monitor the syst em. For those who have no administrator’s identity, can only monitor the system. There are only a maximum of three users able to login simultaneously in the SM10P.
192.168.1.77
255.255.255.0
192.168.1.254
admin
admin
in the address row
NOTE:
When you login SM10P series switch Web UI management, you can use both ipv4 ipv6 login to manage
To optimize the display effect, we recommend you use Microsoft IE 6.0 above, Netscape V7.1 above or FireFox V1.00 above and have the resolution 1024x768. The switch supported neutral web browser interface
2 Publication date: Mar., 2012
Revision A1
NOTE:
AS SM10P the function enable dhcp, so If you do not have DHCP server to provide ip addresses to the switch, the Switch default ip 192.168.1.77
Figure 1 The login page
NOTE: If you need to configuration the function or parameter
then you can refer the detail in the User Guide. Or you could access to the Switch and click the "help" under the web GUI and the switch will po p- u p the simple help content to teach you how to set the parameters.
Publication date: Mar., 2012
Revision A1
SM10P web help function:
CONNECTING NETWORK DEVICES
TWISTED-PAIR
The switch is designed to be connected to 10, 100 or 1000Mbps network cards in PCs and serve rs, as well as to other switches and hubs. It may also be connected to remote devices using optional SFP transceivers.
DEVICES
Publication date: Mar ., 2012
Revision A1
Each device requires an unshielded twisted­pair (UTP) cable with RJ-45 connectors at
CABLING GUIDELINES
See Appendix B for further information on cabling.
both ends. Use Category 5, 5e or 6 cable for 1000BASE-T connections, Category 5 or better for 100BASE-TX connections.
The RJ-45 ports on the switch support automatic MDI/MDI-X pinout configuration, so you can use standard straight-through twisted-pair cables to connect to any other network device (PCs, servers, switches, routers, or hubs).
CAUTION:
port. This will damage the switch. Use only twisted-pair cables with RJ-45 connectors that conform to FCC standards.
Do not plug a phone jack connector into an RJ-45
CONNECTING TO PCS, SERVERS, HUBS AND SWITCHES
Step1. Attach one end of a twisted-pair cable segment to the device’s RJ-45
connector.
Figure 16: Making Twisted-Pair Connections
2 Publication date: Mar ., 2012
Revision A1
quip
Step2. If the device is a network card and the switch is in the wiring closet, attach the
other end of the cable segment to a modular wall outlet that is connected to the wiring closet. (See the section “Network Wiring Connections.”) Otherwise, attach the other end to an available port on the switch.
Make sure each twisted pair cable does not exceed 100 meters (328 ft) in length.
NOTE: Avoid using flow control on a port connected to a hub
unless it is actually required to solve a problem. Otherwise back pressure jamming signals may degrade overall performance for the segment attached to the hub.
Step3. As each connection is made, the Link LED (on the switch) corresponding to
each port will light green (1000 Mbps) or amber (100 Mbps) to indicate that the connection is valid.
NETWORK WIRING CONNECTIONS
Today, the punch-down block is an integral part of many of the newer equipment racks. It is actually part of the patch panel. Instructions for making connections in the wiring closet with this type of equipment follows.
Step1. Attach one end of a patch cable to an available port on the switch , and the
other end to the pat c h p anel.
Step2. If not already in place, attach one end of a cable segment to the back of the
patch panel where the punch-down block is located, and the other end to a modular wall outlet.
Step3. Label the cables to simplify future troubleshooting. See “Cable Labeling and
Connection Records” on page 29
.
Figure 17: Network Wiring Connections
Switch
ment Rack
E (side view)
Patch-Down Block
Patch Panel
Wall
3 Publication date: Mar., 2012
Revision A1
Chapter 2 System Configuration
This chapter describes the entire basic configuration tasks which includes the System Information and any manage of th e Swit ch (e.g. Ti me, Acco unt , IP, Syslog and SNMP.)
2-1 System Information
After you login, the switch shows you the system information. This page is default and tells you the basic information of the system, including “Model Name”, “System Description”, “Contact”, “Device Name”, “System Up Time”, “BIOS Version”, “Firmware Version”, “Hardware-Mechanical Version”, “Serial Number”, “Host IP Address”, “Host Mac Address”, “Device Port”, “RAM Size” , “Flash Size” and. With this information, you will know the software version used, MAC address, serial number, how many ports good and so on. This is helpful while malfunctioning.
2-1.1 Information
The switch system information is provided here.
Web interface
To configure System Information in the web interface:
1. Click SYSTEM, System, and Information.
2. Specify the contact information for the system administrator as well as the name and location of the switch. Also indicate the local time zone by configuring the appropriate offset.
3. Click Refresh
Figure 2-1.1: System
Information
4
Publication date: Mar., 2012
Revision A1
Parameter description:
Model name:
The model name of this device.
System description:
As it is, this tells what this device is. Here, it is “8 port 10/100/1000 Base-T + 2-Port 100/1000 SFP/RJ-45 Managed Switch”.
Location:
Basically, it is the location where this switch is put. User-defined.
Contact:
For easily managing and maintaining device, you may write down the contact person and phone here for getting help soon. You can configure this parame t er through the device’s user interface or SNMP.
Device nam e:
The name of the switch. User-defin e d .
System Date:
Show the system time of the switch. Its format: day of week, month, day, hours : minutes : seconds, year.
System up time:
The time accumulated since this switch is powered up. Its format is day, hour, minute, second.
BIOS version:
The version of the BIOS in this switch.
Firmware version:
The firmware version in this switch.
Hardware-Mechanical version:
The version of Hardware and Mechanical. The figure before the hyphen is the version of electronic hardware; the one after the hyphen is the version of mechanical.
Serial number:
The serial number is assigned by the Manufacture.
Host IP address:
The IP address of the switch.
Host MAC address:
It is the Ethernet MAC address of the management agent in this switch.
Device Port:
Show all types and numbers of the port in the switch.
RAM size:
The size of the RAM in this switch.
Flash size:
The size of the flash memory in this switch.
Bridge FDB size :
To display the bridge FDB size information.
Transmit Queue :
5 Publication date: Mar., 2012
Revision A1
To display the device’s transmit hardware prio rity qu eue information .
Maximum Frame size :
To display the device’s maximum frame size information.
6
Publication date: Mar., 2012
Revision A1
2-1.2 Configuration
You can identify the system by configuring the contact information, name, and location of the switch.
Web interface
To configure System Information in the web interface:
1. Click System, System Information and Configuration.
2. Write System Contact , System Name, System Location information
in this page.
3. Click Save
Figure 2-1.2: System Information configuration
SM10P
Parameter description:
System Contact :
The textual identification of the contact person for this ma naged node , toget her with information on how to contac t this person. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126.
System Name :
An administratively assigned name for this managed node. By convention, this is the node's fully-qualified domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name. The first character must be an alpha character. And the first or last character must not be a minus sign. The allowed string length is 0 to 255.
System Location :
The physical location of this node(e.g., telephone closet, 3rd floor). The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126.
7 Publication date: Mar., 2012
Revision A1
2-1.3 CPU Load
This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format. Consult the SVG Wiki for more information on browser support. Specifically, at the time of writing, Microsoft Internet Explorer will need to have a plug in installed to support SVG.
Web interface
To configure System Information in the web interface:
1. Click System, System Information, CPU Load .
2. Display the CPU Load on the screen
3. Click Auto-refresh .
Figure 2-1.3: CPU Load
Parameter description:
Auto-refresh
To evoke the auto-refresh icon then the device will refresh the log automatically.
NOTE: The under “from” and “to” was display ed what you set
on the “From” and “To” field info r ma ti on .
8 Publication date: Mar., 2012
Revision A1
2-2 Time
This page configure the switch Time. Time configure is including Time Configuration and NTP Configuration
2-2.1 Manual
The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour”, “Minute” and “Second” within the valid value range indicated in each item.
Web Interface
To configur e Time in the web in t er f ac e:
1. Click Time , Manual.
2. Specify the Time parameter in manual parameters.
3. Click Save.
Figure 2-2.1: The time configuration
Parameter description:
Clock Source:
To click what clock source for the SM10P. You can select “Use local Settings” or “Use NTP Server” for SM10P time clock source.
Local Time:
Show the current time of the system.
Time Zone Offset:
Provide the time zone offset relative to UTC/GMT. The offset is given in minutes east of GMT. The valid range is from -720 to 720 minutes
Daylight Saving:
Daylight saving is adopted in some countries. If set, it will adjust the time lag or in advance in unit of hours, according to the starting date and the ending date. For example, if you set the day light saving to be 1 hour. When the time passes over the starting time, the system time will be increased one hour after one minute at the time since it passed over. And when the time passes over the ending time, the system time will be decreased one hour after one minute at the time since it passed over.
The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not have to adjust current
9
Publication date: Mar., 2012
Revision A1
time, equivalent to in-act daylight saving. You don’t have to set the starting/ending date as well. If you set daylight saving to be non-zero, you have to set the starting/ending date as well; otherwise, the daylight saving function will not be activated.
Time Set Offset:
Provide the Daylight saving time set offset. The offset is given in minutes east of GMT. The valid range is from 1 to 1440 minutes. default is 60 mins
Daylight Savings Type:
Provide the Daylight savings type selection. You can select “ By Dates” or “Recurring” two type for Daylight saving type.
From:
To configure when Daylight saving start date and time, the format is “YYYY-MM- DD HH:MM”.
To:
To configure when Daylight saving end date and time, the format is “YYYY-MM- DD HH:MM”.
NOTE: The under “from” and “to” was display ed what you set
on the “From” and “To” field info r ma ti on .
10 Publication date: Mar., 2012
Revision A1
2-2.2 NTP
Web Interface
NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manually specify an user-defined NTP server as well as Time Zone, the switch will sync the time in a short after pressing <Apply> button. Though it synchronizes the time automatically, NTP does not update the time periodically without user’s processing.
Time Zone is an offset time off GMT. You have to select the time zone first and then perform time sync via NTP because the switch will combine this time zone offset and updated NTP time to come out the local time, otherwise, you will not able to get the correct time. The switch supports configurable time zone from –12 to +13 step 1 hour.
Default Time zone: +8 Hrs.
To configur e Time in the web in t er f ac e:
1. Click SYSTEM, NTP.
2. Specify the Time parameter in manual parameters.
3. Click Save.
Figure 2-2.2: The NTP configuration
Parameter description:
Server 1to 5 :
Provide the NTP IPv4 or IPv6 address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-b it groups of contiguo us zeros; but it can on ly appear once. It c an also represent a legally valid IPv4 address. For example, '::192.1.2.34'.
Buttons
These buttons are displayed on the NTP page: Save – Click to save changes. Reset - Click to undo any changes made locally and revert to previously saved
values.
11
Publication date: Mar., 2012
Revision A1
2-3 Account
In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password. Only one administrator is allowed to exist and unable to be deleted. In addition, up to 4 guest accounts can be created.
2-3.1 Users
This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser
Web Interface
To configure Account in the web interface:
1. Click SYSTEM, Account, Users.
2. Click Add new user
3. Specify the User Name parameter.
4. Click Save.
Figure2- 3. 1: The Users Account configuration
Parameter description:
User Name :
The name identifying the user. This is also a link to Add/Edit User.
Password
To type the password. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126 .
Password (again)
To type the password again. You must type the same password again in the field.
12 Publication date: Mar., 2012
Revision A1
Privilege Level :
The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can acces s all g roups, i.e. that is grante d the fully cont rol o f the device. But others value need to refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group. By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access. And the system maintenance (software upload, factory defaults and etc.) need user privilege level 15. Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account.
13
Publication date: Mar., 2012
Revision A1
2-3.2 Privilege Level
This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation, Diagnostics, EEE, GARP,GVRP,IP, IPMC Snooping LACP LLDP LLDP-MED MAC Table MRP MVR MVRP Maintenance Mirroring POE Ports Private VLANs QoS SMTP SNMP Security Spanning Tree System Trap Event VCL VLANs Voice VLAN Privilege Levels form 1 to 15 .
Web Interface
To configure Privilege Level in the web interface:
1. Click SYSTEM, Account, Privilege Level.
2. Specify the Privilege parameter.
3. Click Save.
Figure2- 3.2: The Privilege Level configuration
14
Publication date: Mar., 2012
Revision A1
Parameter description:
Group Name
The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contains more than one. The following description defines these privilege level groups in details:
System: Contact, Name, L oc a ti on , Timezone, Log. Security: Authentication, System Access Management, Port (contains Dot1x
port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection and IP source guard.
IP: Everything except 'ping'. Port: Everything except 'VeriPHY'. Diagnostics: 'ping' and 'VeriPHY'. Maintenance: System Reboot, System Restore Default, System Password,
15
Publication date: Mar., 2012
Revision A1
Configuration Save, Configuration Load and Firmware Load. Web- Users, Privilege Levels and everything in Maintenance.
Privilege Levels
Every group has an authorization Privilege level for the following sub groups: configuration read-only, configuration/execute read-write, status/statistics read-only, status/statistics read-write (e.g. for clearing of statistics). User Privilege should be same or greater than the authorization Privilege level to have the access to that group.
16
Publication date: Mar., 2012
Revision A1
2-4 IP
IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network.
IP is a "best effort" system, which means that no packet of information sent over is assured to reach its destination in the same condition it was sent. Each device connected to a Local Area Network (LAN) or Wide Area Network (WAN) is given an Internet Protocol address, and this IP address is used to identify the device uniquely among all other devices connected to the extended network.
The current version of the Internet protocol is IPv4, which has 32-bits Internet Protocol addresses allowing for in excess of four billion unique addresses. This number is reduced drastically by the practice of webmasters taking addresses in large blocks, the bulk of which remain unused. There is a rather substantial movement to adopt a new version of the Internet Protocol, IPv6, which would have 128-bits Internet Protocol addresses. This number can be represented roughly by a three with thirty-nine zeroes after it. However, IPv4 is still the protocol of choice for most of the Internet.
2-4.1 IPV4
The IPv4 address for the switch could be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to change the switch's default settings to values that are compatible with your network. You may also need to a establish a default gateway between the switch and management stations that exist on another network segment.
Configure the switch-managed IP information on this page
The Configured column is used to view or change the IP configuration.
The Current column is used to show the active IP configuration.
Web Interface
To configure an IP address in the web interface:
1. Click System, IP Configuration.
2. Specify the IPv4 settings, and enable DNS proxy service if required.
3. Click Save.
Figure2- 4.1: The IP configuration
Parameter description:
17
Publication date: Mar., 2012
Revision A1
DHCP Client :
Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP will retry. If DHCP fails and the configured IP address is non-zero, DHCP will stop and the configured IP settings will be used. The DHCP client will announce the configured System Name as hostname to provide DNS lookup.
IP Address :
Provide the IP address of this switch in dotted decimal notation.
IP Mask :
Provide the IP mask of this switch dotted decimal notation.
IP Router :
Provide the IP address of the router in dotted decimal notation.
SNTP Server :
Provide the IP address of the SNTP Server in dotted decimal notation.
DNS Server :
Provide the IP address of the DNS Server in dotted decimal notation.
VLAN ID :
Provide the managed VLAN ID. The allowed range is 1 to 4095.
DNS Proxy :
When DNS proxy is enabled, DUT will relay DNS requests to the current configured DNS server on DUT, and reply as a DNS resolver t o the client device on the network.
18
Publication date: Mar., 2012
Revision A1
Loading...
+ 247 hidden pages