technical support 24 hours aday, 7 days a week: Callor fax
Mailing address:, 1000 Park Drive, Lawrence, PA15055-1018
Web site:E-mail:
Black Box Corporation
www.blackbox.cominfo@blackbox.com
Page 3
Page 4
FCC AND ICRFI STATEMENTS
FEDERAL COMMUNICATIONS COMMISSION
AND
INDUSTRY CANADA
RADIO FREQUENCY INTERFEREN CE STATEMENTS
This equipment generates, uses, and can radiate radio-frequency energy, and if not installed and used properly,
that is, in strict accordance with the manufacturer’s instructions, may cause interference to radio
communication. It has been tested and found to comply with the limits for a Class A computing device in
accordance with the specifications in Subpart B of Part 15 of FCC rules, which are designed to provide
reasonable protection against such interference when the equipment is operated in a commercial environment.
Operation of this equipment in a residential area is likely to cause interference, in which case the user at his
own expense will be required to take whatever measures may be necessary to correct the interference.
Changes or modifications not expressly approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
This digital apparatus does not exceed the Class A limits for radio noise emission from digital apparatus set out
in the Radio Interference Regulation of Industry Canada.
Le présent appareil numérique n’émet pas de bruits radio électriques dépassant les limites applicables aux
appareils numériques de la classe A prescrites dans le Règlement sur le brouillage radio électrique publié par
Industrie Canada.
EUROPEANUNION DECLARATIONOF CONFORMITY
This equipment complies with the requirements of the European EMC Directive 89/336/EEC.
CAUTION
Circuit devices are sensitive to static electricity, which can damage their delicate
electronics. Dry weather conditions or walking across a carpeted floor may cause you
to acquire a static electrical charge.
To protect your switch, always:
• T ouch your computer’s met al chassis to ground the st atic electrical charge before you
pick up the switch.
• Pick up the switch by holding it on the left and right edges only.
1
Page 5
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
INSTRUCCIONES DE SEGURIDAD (Normas Oficiales Mexicanas Electrical Safety Statement)
1. Todas las instrucciones de seguridad y operación deberán ser leídas antes de que el aparato eléctrico sea operado.
2. Las instrucciones de seguridad y operación deberán ser guardadas para referencia futura.
3. Todas las advertencias en el aparato eléctrico y en sus instrucciones de operación deben ser respetadas.
4. Todas las instrucciones de operación y uso deben ser seguidas.
5. El aparato eléctrico no deberá ser usado cerca del agua—por ejemplo, cerca de la tina de baño, lavabo, sótanomojado o
cerca de una alberca, etc..
6. El aparato eléctrico debe ser usado únicamente con carritos o pedestales que sean recomendados por el fabricante.
7. El aparato eléctrico debe ser montado a la pared o al techo sólo como sea recomendado por el fabricante.
8. Servicio—El usuario no debe intentar dar servicio al equipo eléctrico más allá a lo descrito en las instrucciones
deoperación. Todo otro servicio deberá ser referido a personal de servicio calificado.
9. El aparato eléctrico debe ser situado de tal manera que su posición no interfiera su uso. La colocación del
aparatoeléctrico sobre una cama, sofá, alfombra o superficie similar puede bloquea la ventilación, no se debe colocar
enlibreros o gabinetes que impidan el flujo de aire por los orificios de ventilación.
10. El equipo eléctrico deber ser situado fuera del alcance de fuentes de calor como radiadores, registros de calor, estufasu
otros aparatos (incluyendo amplificadores) que producen calor.
11. El aparato eléctrico deberá ser connectado a una fuente de poder sólo del tipo descrito en el instructivo deoperación, o
como se indique en el aparato.
12. Precaución debe ser tomada de tal manera que la tierra fisica y la polarización del equipo no sea eliminada.
13. Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por
objetoscolocados sobre o contra ellos, poniendo particular atención a los contactos y receptáculos donde salen del aparato.
14. El equipo eléctrico debe ser limpiado únicamente de acuerdo a las recomendaciones del fabricante.
15. En caso de existir, una antena externa deberá ser localizada lejos de las lineas de energia.
16. El cable de corriente deberá ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo.
17. Cuidado debe ser tomado de tal manera que objectos liquidos no sean derramados sobre la cubierta u orificios
deventilación.
18. Servicio por personal calificado deberá ser provisto cuando:
A: El cable de poder o el contacto ha sido dañado; u
B: Objectos han caído o líquido ha sido derramado dentro del aparato;o
C: El aparato ha sido expuesto a la lluvia; o
D: El aparato parece no operar normalmente o muestra un cambio en su desempeño; o
E: El aparato ha sido tirado o su cubierta ha sido dañada.
2
Page 6
TRADEMARKS USED IN THIS MANUAL
ST is a registered trademark of AT&T.
BLACK BOX and the Double Diamond logo are registered trademarks of BB Technologies, Inc.
VT100 is a trademark of Digital Equipment Corporation.
DB2 and IBM are registered trademarks of International Business Machines Corporation.
Linux is a registered trademark of Linus Torvalds.
Internet Explorer, Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
Netscape is a registered trademark of Netscape Communications Corporation.
Telnet is a trademark of Telnet Communications, Inc.
UNIX is a registered trademark of UNIX System Laboratories, Inc.
Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark
owners.
TRADEMARKS USED IN THIS MANUAL
The 12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports is called
the LPB200A in the software screens and also in the screens shown in this manual. Both
names refer to the LPB200A switch.
NOTE
3
Page 7
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2.2 What’s Included ......................................................................................................................................11
3.4 Configuring the Management Agent ....................................................................................................21
3.4.1 Via the Serial RS-232 Console Port ..........................................................................................22
3.4.2 Via the Ethernet Port ................................................................................................................24
3.5 IP Address Assignment ...........................................................................................................................25
3.5.1 IP Address ..................................................................................................................................25
3.5.4 DNS ............................................................................................................................................27
4.1 Home Overview ......................................................................................................................................32
4.2 System ....................................................................................................................................................32
4.2.1 System Information ..................................................................................................................32
4.2.2 IP Configuration .......................................................................................................................34
4.2.3 Time Configuration ..................................................................................................................35
4.3 Port Configuration .................................................................................................................................40
4
Page 8
Chapter Page
4.3.1 Status ..........................................................................................................................................40
4.12.2 Tag-Based Group .......................................................................................................................60
4.12.3 Port-Based Group ......................................................................................................................60
4.12.4 Tag Rule .....................................................................................................................................61
4.13 MAC Table ............... ..............................................................................................................................62
4.13.1 MAC Table Information ............................................................................................................62
4.13.2 MAC Table Maintenance ..........................................................................................................63
4.20.2 Loopback Test ...........................................................................................................................86
4.20.3 Ping Test ....................................................................................................................................86
4.21 TFTP Server ...........................................................................................................................................87
6.3 Calling Black Box .................................................................................................................................173
6.4 Shipping and Packaging ......................................................................................................................173
6
Page 10
CHAPTER 1: Specifications
1. Specifications
1.1 Hardware
Standards: IEEE802.3, 802.3ab, 802.3z, 802.3u, 802.3af Power over Ethernet, 802.1v protocol-based VLAN
classification, 802.3x port-based network access control, 802.1q tag-based VLAN, 802.1d Spanning Tree
Protocol, 802.1w Rapid Spanning Tree Protocol, 802.1p Class of Service with 2-level priority queuing, 802.1ad
port trunking with flexible load distribution and failover function
Compatible Fiber Transceiver Modules: Ports 11, 12 are TP/SFP fiber dual-media ports with auto detection
function; Optional SFP module (LGB200C-MLC, LGB200C-SLC10, LGB200C-SLC30, LGB204C, LGB205C)
supports LC or BiDi LC transceiver
Network Interface: 10/100/1000 Mbps Fast Ethernet twisted-pair (ports 1–12), or 1000BASE-LX duplex
multimode, duplex single-mode, or single-strand single-mode LC or WDM (BiDi LC) (ports 11, 12)
Transmission Mode: 10-/100-Mbps support for full or half-duplex; 1000-Mbps support for full duplex only
Speed: 10/100/1000 Mbps for twisted pair; 1000 Mbps for fiber
Forwarding/Filtering Packet Rate: 1,488,000 pps at 1000 Mbps; 148,800 pps at 100 Mbps; 14,880 pps at 10
Mbps
MAC Address and Self-Learning: 8K MAC address, 4K VLAN table entries
Buffer Memory: Embedded frame buffer: 208 KB
Flow Control: IEEE802.3x compliant for full duplex; Backpressure flow control for half-duplex
Cable Type and Maximum Length: Twisted-pair: CAT5 UTP cable, up to 328 feet (100 m) (ports 1–8);
Single-mode single-strand fiber, up to 12.4miles (20 km): 1000BASE-LX single-strand single-mode WDM (BiDi)
SFP for LGB204C and LGB205C (slots 7 and 8);
Multimode fiber, up to 1804.4 feet (550 m) for LGB200C-MLC;
Single-mode duplex fiber, up to 6.2 miles (10 km) for LGB200C-SLC10;
Single-mode duplex fiber up to 18.6 miles (30 km)for LGB200C-SLC30
User Controls: (1) Reset button
Connectors: (10) RJ-45, (2) slots for fiber media converter modules;
Indicators: (52) LEDs: All: System LEDs: (1) Power, (1) CPU; (12) 10/100/1000 Mbps TP, (12) Link/Act, (12)
PoE-PSE Act and (12) PoE Fail for ports 1–12, (2) SFP (1000 Mbps), (2) SFP (Link/Act) for ports 11, 12
Temperature Tolerance: 32˚ to 104˚F (0˚ to 40˚C)
Relative Humidity: 5% to 90%
Power: 100–240 VAC, 50–60 Hz
7
Page 11
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Power Consumption: Max. 15W ( in case no PD device connected)
Max. 135W ( with 8 x 15.4W PoE device connected )
Max. 185W ( with 12 x 15.4W PoE device connected )
Size: 1.7"H x 17.4"W x 8.2"D (4.4 x 44.2 x 20.9 cm)
1.2 Management Software
System Configuration: Auto negotiation support on 10/100BASE-TXports; Web browser or console interface
can set transmission speed (10/100 Mbps) and operation mode (full/half-duplex) on each port,
enable/disable any port, set VLAN group, set trunk connection
Management Agent: SNMP support; MIB II, Bridge MIB, RMONMIB
Spanning Tree Algorithm: IEEE 802.1d
VLAN Function: Port-based/802.1q tagged allows up to 256 VLANs in one switch
Trunk Function: Port trunk connections allowed
IGMP: IP multicast filtering by passively snooping on the IGMP query
Bandwidth Control: Supports by-port Egress/Ingress rate control
Quality of Service (QoS): Referred to as Class of Service (CoS)by the IEEE802.1p standard; classification of
packet priority can be based on either a VLAN tag on a packet or user-defined per-port QoS; Two queues per
port; IP ToS classification, TCP/UDP port classification, IP DiffServe classification
Port Security: Limited number of MAC addresses learned per port; static MAC addresses in the filtering table
stay in the filtering table
Internetworking Protocol: Bridging: 802.1d spanning tree; IP Multicast: IGMP snooping; Maximum of 256
active LANs and IP multicast sessions
Network Management: (1) RS-232 port as local control console, Telnet™ remote-control console; SNMP
agent: MIB-2 (RFC 1213), Bridge MIB (RFC1493), RMON MIB (RFC1757)-statistics; VLAN MIN (802.1q); Web
browser support based on HTTP server and CGI parser TFTP software-upgrade capability
8
Page 12
CHAPTER 1: Specifications
1.3 Null-Modem Cable
Use the included DB9 cable to connect a terminal or terminal emulator to the managed switch’s RS-232 port to
access the command-line interface. Table 1-1 shows the pin assignments for the DB9 cable.
Table 1-2 shows the pin out for the null-modem cable.
Table 1-2. Null-modem cable pin out.
Signal Pin Pin Signal
CD DTR
DSR CD
DTR
RXD 2 3 TXD
TXD 3 2 RXD
GND 5 5 GND
RTS 7 8 CTS
1
4
6
4
1
6
DSR
CTS 8 7 RTS
Not used 9 9 Not used
9
Page 13
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2. Overview
2.1 Introduction
The 12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports is standard switch that meet
all IEEE 802.3/u/x/z Gigabit and Fast Ethernet specifications. Manage the switch via an async console directly
connected to the switch’s RS-232 port, or through an Ethernet port using CLI or SNMP. In this switch, ports 11,
12 include two types of media --- TP and SFP Fiber (LC, BiDi LC, etc); this port supports 10/100/1000Mbps TP
or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed
connection expansion.
This PoE Switch also complies with IEEE 802.3af, its advanced auto-sensing algorithm enables providing power
devices (PD) discovery, classification, current limit, and other necessary functions. It also supports high safety
with short circuit protection and power-out auto-detection to PD.
This standalone off-the-shelf switch provides comprehensive hardware features. This switch has 10 RJ-45
twisted-pair ports and 2 STP fiber transceiver module slots (for STP fiber [LC or BiDi LC] modules). The
1000-Mbps SFP fiber transceiver is used for high-speed connection expansion. These two ports auto detect
whether the 10/100/1000-Mbps TP or the 1000-Mbps SFP fiber port is used. On this switch, ports 11, 12 can be
twisted-pair or Ethernet. Multimode or single-mode fiber transceiver modules plug into these two ports. (See
Section 2.4 for more information about the fiber transceiver modules.)
The LPB200A has a 208 KB on-chip frame buffer. The switch features jumbo frame support, programmable
classifier for QoS (Layer4/Multimedia), 8K MAC address and 4K VLAN support (IEEE 802.1a), per-port
shaping, policing, and Broadcast Storm Control, IEEE 802.1q-in-q nested VLAN support, full-duplex flow
control (IEEE 802.3x) and half-duplex backpressure, and extensive front-panel diagnostic LEDs.
Software features include port status and configuration, per-port traffic monitoring counters, system
information snapshot upon login, port mirroring, static trunk, and 802.1q VLAN. The switch also supports user
management and limits three users to login to enhance security. The maximum packet length can be up to
9208 bytes for a jumbo frame application. More features include DHCP broadcasting suppression to avoid a
suspended or crashed network, sending trap event for monitored events, default configuration that can be
restored to overwrite the current configuration working on either a Web browser or CLI, online plug/unplug
SFP modules, port mirror function with Ingress traffic, rapid spanning tree (802.1w RSTP), 802.1x port security
on a VLAN, user management, and only the first login administrator can configure the device.
With the SNMP agent, the network administrator can log in to the switch to monitor, configure, and control
each port’s activity. The overall network management is enhanced and the network efficiency is also improved
to accommodate high-bandwidth applications. In addition, the switch features comprehensive and useful
functions such as QoS (Quality of Service), Spanning Tree, VLAN, Port Trunking, Bandwidth Control, Port
Security, SNMP/RMON, and IGMP Snooping capability via the intelligent software. These functions are
described below and on the next page. The switch is suitable for both metro-LAN and office applications.
• QoS complies with the IEEE802.1p standard. There are two priority queue and packet transmission schedules.
• Spanning Tree complies with IEEE802.1d and IEEE802.1w (RSTP: Rapid Spanning Tree Protocol) standards.
10
Page 14
• The switch also supports port-based VLAN and IEEE 802.1a tag VLAN, with 256 active VLANs and VLAN IDs
from 1–4094. It also handles static port trunking and IEEE 802.3ad LACP port trunking.
• Supports Ingress and Egress per port bandwidth control.
• Port Security: Support allowed, denied forwarding, and port security with MAC address.
• SNMP/RMON: SNMP agent and RMON MIB. In the device, the SNMP agent is client software that’s
operating over the SNMP protocol used to receive the command from an SNMP manager (server site) and
echo the corresponding data (MIB object). The SNMP agent actively issues TRAP information.
• RMON is the abbreviation for Remote Network Monitoring and is a branch of the SNMP MIB.
3, and 9, Ethernet-like MIB (RFC 1643), and Ethernet MIB (RFC 1643).
• IGMP Snooping: Supports IGMP version 2 (RFC 2236): IGMP snooping establishes the multicast groups that
forward multicast packets to the member ports. This avoids wasting the bandwidth while IP multicast packets
are running over the network.
CHAPTER 2: Overview
2.2 What’s Included
Your package should contain the following items. If anything is missing or damaged, please contact Black Box
at 724-746-5500.
• 12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
• CD-ROM containing this user’s manual in PDF format
• AC power cord
• DB9 female to DB9 female RS-232 cable
• Rackmount kit
• (4) rubber feet
11
Page 15
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2.3 Hardware Description
Figure 2-1 shows the 12-Port 1000BASE-TX L2 Managed PoE Switch’s front panel. The numbered components
in the figure are described in Table 2-1.
Figure 2-1. Front panel.
Table 2-1. Front-panel components.
Component Description
c Power LED Lights when power is on.
d CPU LED Lights when there is activity on the CPU.
e PoE-PSE ACT LEDs (ports 1-12) Lights when PoE Power is active.
f PoE FAIL LEDs (ports 1-12) Lights when PoE Power is failed.
Lights green when 1000Mbps speed is active.
g 10/100/1000Mbps LEDs
(ports 1-12)
h LINK/ACT LEDs (ports 1-12)
i SFP(LINK) LED
(port 11)
Lights ember when 100Mbps speed is active.
Off when 10Mbps speed is active.
Lights when connection with remote device is good.
Blinks when any traffic is present.
Off when cable connection is not good.
Lights when connection with the remote device is good.
Off when module connection is not good.
j SFP(LINK) LED
(port 12)
12
Lights when connection with the remote device is good.
Off when module connection is not good.
Page 16
Table 2-1 (continued). Front-panel components.
Component Description
k Reset button Resets the management system.
l Gigabit TP Ports 12 10/100/1000Mbps TP ports.
CHAPTER 2: Overview
SFP Fiber Ports
The switch’s rear panel is shown in Figure 2-2. The numbered components in the figure are described in Table
2-2.
2 SFP fiber port module slots.
Figure 2-2. Rear panel.
Table 2-2. Rear panel components.
Component Description
DB9 connector
RS-232 serial console port for configuration or management.
Power connector
Connects to a 100–240-VAC, 50/60-Hz AC power line.
13
Page 17
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2.4 Optional SFP Fiber Transceiver Modules
Ports 11, 12 on the LPB200A include two types of media: twisted-pair (TP) and optional small form factor
pluggable (SFP) fiber (LC, BiDi LC, etc.) modules. The twisted-pair ports are the switch’s two rightmost RJ-45
twisted-pair connectors (ports 11, 12). For the fiber option, 1000-Mbps fiber transceiver modules slide into the
switch’s two fiber module slots (located to the right of the twisted-pair connectors on the switch’s front panel).
The fiber transceiver modules are used for high-speed connection expansion. The two fiber ports auto detect
10/100/1000-Mbps TP or 1000-Mbps SFP fiber.
Five 1000-Mbps transceiver modules are available. These modules are described below and shown in Figures 2-3
and 2-4.
• Small Form Factor Pluggable (SFP) Optical Transceiver, Multimode, 850-nm, 550 m (LGB200C-MLC)
• Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Mode, 1310-nm, 10 km (LGB200C-SLC10)
• Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Mode, 1550-nm, 30 km (LGB200C-SLC30)
• Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Strand, Single-Mode Fiber
WDM1550TX/1310 RX, 20 km (LGB204C)
• Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Strand, Single-Mode Fiber
WDM1310TX/1550 RX, 20 km (LGB205C)
Figure 2-3. LGB200C-MLC, LGB200C-SLC10, or LGB200C-SLC30 module.
Figure 2-4. LGB204C or LGB205C module.
NOTE
The LGB204C and LGB205C fiber transceivers must be used together.
14
Page 18
CHAPTER 3: Installation
3. Installation
3.1 Installation Instructions
CAUTION
Wear a grounding device to avoid damage from electrostatic discharge.
Be sure that the power switch is OFF before you connect the power cord to the power
source.
INSTALLING THE OPTIONAL MODULES
NOTE
If you do not plan to install SFP fiber transceivers in the switch’s ports 11, 12, skip this section.
Slide the fiber transceiver module into one of the sixteen open module slots in the switch as shown in Figure
3-1.
12-Port 1000BASE-TX L2 Managed PoE
Switch with 2 SFP Dual Media Ports
SFP Fiber Transceiver Module
Figure 3-1. Installing the optional SFP fiber transceiver module.
Connecting the SFP Module to the Chassis
The optional SFP modules are hot-swappable, so you can plug or unplug them before or after powering on the
switch.
1. Verify that the SFP module is the right model and conforms to the chassis.
2. Slide the module into the slot. Make sure that the module is properly seated against the slot
socket/connector.
3. Connect the fiber optic network cable to the LC connector(s) on the module.
4. If you want to install a second module in the switch, repeat steps 1–3.
15
Page 19
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Installing the Rubber Feet
For this switch, install the rubber feet and place it on a desktop, or install the switch in the rack with mounting
hardware (see Section3.2).
TP Port and Cable Installation
1. The switch’s twisted-pair (TP) ports support MDI/MDI-X auto-crossover, so either type of cable
(straight-through or crossover) can be used for each TP port.
2. Use Category 5 grade RJ-45 TP cable to connect to a switch TP port at one end and a Gigabit device (for
example, a workstation or server) at the other end.
3. Repeat the above steps, as needed, for each RJ-45 port to be connected to a Gigabit 10/100/1000 TP
device.
The switch is now ready to operate.
Power On
The switch supports a 100–240-VAC, 50–60-Hz power supply. The power supply will automatically convert the
local AC power source to DC power. It does not matter whether any network device (such as a workstation or
server) or fiber transceiver module is plugged into the switch or not when powered on. After the power is on,
all LED indicators will light up immediately and then all LEDs except the power LED go off. This resets the
system.
Firmware Loading
After resetting, the boot loader will load the firmware into the memory. This will take about 30 seconds, then
all switch LEDs will flash once as the switch automatically performs a self-test.
3.2 Installing the Chassis in a 19-Inch Wiring Closet Rail
CAUTION
Allow proper spacing and air ventilation for the cooling fan on both sides of the chassis.
Wear a grounding device for electrostatic discharge.
1. Using two screws (included), attach the rackmount ears to the switch’s left and right sides. See Figure 3-2.
2. Line up the mounting holes on the switch assembly (the switch with rackmount ears installed) with the
mounting holes on a 19" wiring closet rack. Install two screws (included) to hold the switch in place in the
rack.
16
Page 20
12-Port 1000BASE-TX L2 Managed PoE
Switch with 2 SFP Dual Media Ports
CHAPTER 3: Installation
Figure 3-2. Installing the switch chassis in a 19"rack.
3.3 Cabling Requirements
3.3.1 TWISTED-PAIR PORTS
For Fast Ethernet or Gigabit Ethernet twisted-pair (TP) connections, use CAT5 or CAT5e cable up to 328 feet
(100 m) long.
3.3.2 F
For Gigabit Ethernet fiber transceiver ports, use fiber optic cable as described below.
Theoretically, the switch partitions the collision domain for each port in switch cascading so that you may
up-link an unlimited number of switches. In practice, the network extension (cascading levels and overall
diameter) must comply with the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications,
which limit the timing requirement from physical signals defined by the Media Access Control (MAC) and
PHY802.3 series specification, and timer from some OSI layer 2 protocols such as 802.1d, 802.1q, and LACP.
IBER TRANSCEIVER PORTS
WITCH CASCADING
The fiber, TP cables, and devices’ bit-time (round-trip) delay are as described in Table 3-1.
17
Page 21
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Cat. 5 TP Wire: 11.12/m
Fiber Cable: 10.10/m
Bit Time Unit: 1 ns
(1 sec./1000 Mega bit)
Cat. 5 TP Wire: 1.12/m Fiber Cable: 1.0/m
TP to Fiber Converter: 56 kbps
Bit Time Unit: 0.01 ms (1 sec./100 Mega bit)
The sum of all elements’ bit-time delay and the overall bit-time delay of wires/devices must be within the
bit-time (round-trip) delay in a half-duplex network segment (collision domain). For full-duplex operation, this
will not apply. Use the TP-Fiber module to extend the TP node distance over fiber optic cable and to provide
the long-haul connection.
Typical Network Topology in Deployment
A hierarchical network with minimum switch levels may reduce the timing delay between the server and the
client station. This approach will minimize the number of switches in any one path. It will also lower the
network loop possibility and will improve network efficiency. If more than two switches are connected in the
same network, select one switch as the Level 1 switch and connect all other switches to it at Level 2. We
recommend that you connect a server/host to the Level 1 switch.
Example 1: Same LAN.
All switch ports are in the same local area network. Every port can access each other (see Figure 3-3).
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
PCs PCs Server/host
18
Figure 3-3. No VLAN configuration.
Page 22
Example 2: Port-based VLAN
If VLAN is enabled and configured, each node in the network that can communicate with each other directly is
in the same VLAN.
The switch supports both port-based VLAN and tag-based VLAN. They are different in practical deployment,
especially in physical location. Figures 3-4 and 3-5 show a port-based VLAN and Figure 3-6 shows an
attribute-based VLAN.
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
CHAPTER 3: Installation
VLAN 1 VLAN 2 VLAN 3 VLAN 4
Figure 3-4. One switch connected to four VLANs in a port-based VLAN.
NOTES
The same VLAN members must be connected to the same switch.
VLAN members can’t access another VLAN’s members.
The switch manager must assign different names for each VLAN group at one switch.
19
Page 23
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Example 3: Another Port-Based VLAN
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
VLAN 1 VLAN 2 VLAN 3 VLAN 4
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
Figure 3-5. Two switches connected to two VLANs, each in a port-based VLAN.
NOTES
VLAN 1 members can’t access VLAN 2, VLAN 3, and VLAN 4 members.
VLAN 2 members can’t access VLAN 1 and VLAN 3 members, but they can access VLAN 4
members.
VLAN 3 members can’t access VLAN 1, VLAN 2, and VLAN 4.
VLAN 4 members can’t access VLAN 1 and VLAN 3 members, but they can access VLAN 2
members.
20
Page 24
CHAPTER 3: Installation
Example 4. The same VLAN members can be at different switches with the same VID
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
VLAN 1
VLAN 2
VLAN 3
Figure 3-6. Attribute-based VLAN diagram.
3.4 Configuring the Management Agent
There are two ways to start up the switch management function: RS-232 console and Ethernet port. Use one to
monitor and configure the switch. Follow the instructions in Sections 3.4.1 and 3.4.2.
Modify the IP address, subnet mask, default gateway, and DNS through the RS-232
console.
NOTE
21
Page 25
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.4.1 V
IA THE SERIAL RS-232 CONSOLE PORT
To configure the switch through its serial RS-232 console port, the port must be directly connected to a DCE
device (for example, a PC, through an RS-232 cable with a DB9 connector). See Figure 3-7.
AC line outlet
12-Port 1000BASE-TX L2 Managed
RS-232 Cable
PoE Switch with 2 SFP Dual Media
Ports
Default IP setting:
IP address: 192.168.1.1
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.254
Serial console PC
Figure 3-7. Connecting the switch’s RS-232 DB9 port to a serial console.
Next, run a terminal emulator with the switch’s serial port’s default setting. Using this, you can communicate
with the switch.
The RS-232 interface only supports a 57.6-kbps baud rate with 8 data bits, 1 stop bit, no parity check, and no
flow control.
To configure the switch:
1. Attach the included DB9 female cable’s connector to the switch’s male serial RS-232 DB9 connector.
2. Attach the other end of the serial RS-232 DB9 cable to the PC’s serial port, running a terminal emulator
supporting a VT100™/ANSI terminal with the switch’s serial port default settings. For example, use the
Windows® 98/2000/XP HyperTerminal utility.
NOTE
The switch’s serial port default settings are listed below:
Baud rate: 57600
Stop bits: 1
Data bits: 8
Parity: N
Flow control: None
3. Once the cable is connected, press the Enter key. The login prompt appears on the screen. The default
username and password are:
Username = admin
Password = admin
22
Page 26
Set IP Address, Subnet Mask, and Default Gateway IP Address
The switch’s default IP address, gateway, and subnet mask are listed in Table 3-2.
Table 3-2. The switch’s default and revised network settings.
Parameter Default Value Sample Network Setting
CHAPTER 3: Installation
IP Address
Subnet
Default Gateway
192.168.1.1
255.255.255.0
192.168.1.254
10.1.1.1
255.255.255.0
10.1.1.254
NOTE
There are no default DNS settings. DNS addresses are assigned by the network
administrator.
You can first either configure your PC’s IP address or change the switch’s IP address, then change the default
gateway’s IP address and subnet mask.
For example, suppose your network address is 10.1.1.0, and the subnet mask is 255.255.255.0. You can change
the switch’s default IP address 192.168.1.1 to 10.1.1.1 and set the subnet mask to 255.255.255.0. Then, choose
the default gateway’s address (for example 10.1.1.254).
After completing these settings, reboot it so the configuration takes effect. After this step, operate the
management through the network, either from a Web browser or Network Management System (NMS). See
Figure 3-8.
Copyright (c) 1981–2005 Black Box Corp.
L2 Managed Switch LPB200A
Login: admin
Password:
LPB200A#
Figure 3-8. The CLI login screen for the LPB200A.
23
Page 27
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.4.2 V
IA THE ETHERNET PORT
There are three ways to configure and monitor the switch through the switch’s Ethernet port: CLI, Web
browser, and SNMP management. The user interface for SNMP is NMS dependent and is not described here.
CLI and Web browser interfaces are described below.
24-Port 10/100BASE-TX L2 Managed PoE
Switch with 2 SFP Dual Media Ports
Assign a reasonable IP address, for
example:
IP address: 192.168.1.100
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.254
Ethernet
LAN
PC
Figure 3-9. Connecting the Ethernet LAN PC to the switch for network management through an
Ethernet port.
Managing the Switch via the Ethernet Port
Before you communicate with the switch, you must first configure or identify the switch’s IP address. Next,
follow the steps listed below.
1. Connect the switch and PC together via UTP CAT5 cable with RJ-45 connectors.
NOTE
If the PC directly connects to the switch, set up the same subnet mask between them.
If the PC connects to the switch through a remote site, the remote PC’s subnet mask
may be different.
2. Run CLI or a Web browser and follow the menus. For details, refer to Chapters 4 and 5.
3. A login screen appears. Type in the switch’s username and password in this screen.
24
Page 28
CHAPTER 3: Installation
3.5 IP Address Assignment
For IP address configuration, you will need the switch’s IP address, subnet mask, default gateway, and DNS.
3.5.1 IP A
The network device’s address is used for internetworking communication. The 32-bit address consists of a
network identifier and a host identifier. It’s split into predefined address classes or categories.
Each class has its own network range between the network identifier and host identifier in the 32-bit address.
Each IP address has two parts: network identifier (address) and host identifier (address). The network address
is the network where the addressed host resides, and the host identifier indicates the individual host in the
network that the host address refers to. The host identifier must be unique in the same LAN.
The IP address is divided into three classes: class A, class B, and class C. The rest of the IP addresses are used for
multicast and broadcast. The network prefix’s bit length is the same as that of the subnet mask and is denoted
as IP address/X, for example, 192.168.1.0/24. The address range for each class is described below.
Class A
The address is less than 126.255.255.255. A total of 126 networks can be defined. (The address 0.0.0.0 is
reserved for default route and 127.0.0.0/8 is reserved for loop back function.)
Class B
The IP address ranges between 128.0.0.0 and 191.255.255.255. Each class B network has a 16-bit network prefix
followed by a 16-bit host address. There are 16,384 (214)/16 networks that can be defined with a maximum
of65534 (216-2) hosts per network.
DDRESS
Class C
The IP address ranges between 192.0.0.0 and 223.255.255.255. Each class C network has a 24-bit network prefix
followed by an 8-bit host address. A total of 2,097,152 (221)/24 networks can be defined with a maximum of
254(28-2) hosts per network.
Class D and E
Class D is a class with the first 4 MSBs (Most Significant Bits) set to 1-1-1-0 and is used for IP Multicast. See also
RFC 1112. Class E is a class with the first 4 MSBs set to 1-1-1-1 and is used for IP broadcast.
According to IANA (Internet Assigned Numbers Authority), three specific IP address blocks (called a private IP
address) are reserved for extending an internal network. They are listed below.
Class A 10.0.0.0---10.255.255.255
Class B 172.16.0.0---172.31.255.255
Class C 192.168.0.0---192.168.255.255
Refer to RFC 1597 and RFC 1466 for more information. These documents are available at www.faqs.org.
25
Page 29
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.5.2 S
Subnet mask is the sub-division of a class-based network or a CIDR block. The subnet is used to determine how
to split an IP address to the network prefix and the host address. It’s designed to use an IP address more
efficiently to manage an IP network.
For a class B network, 128.1.2.3, the default subnet mask may be 255.255.0.0. The first two bytes are all 1s. This
means more than 60 thousands of nodes in flat IP addresses will be on the same network. It’s too large to
manage practically. If we divide it into smaller networks by extending the network prefix from 16 bits to, say
24bits, the network uses its third byte to subnet this class B network. The subnet mask is 255.255.255.0; each bit
of the first three bytes is 1. The first two bytes are used to identify the class B network, the third byte is used to
identify the subnet within this class B network, and the last byte is the host number.
Not all IP addresses are available in the subnetted network. Two special addresses are reserved. They are the
addresses with all zeros and all ones host number.
As shown in the table below, the subnet mask with a 25-bit long, 255.255.255.128 address contains 126
members in the subnetted network. The network prefix length equals the bit number with 1s in that subnet
mask. Use this table to count the number of IP addresses matched.
According to the table above, a subnet mask 255.255.255.0 will partition a network with the class C. This means
that a maximum of 254 effective nodes exist in this subnetted network and it’s considered a physical network in
an autonomous network. A sample network IP address is 168.1.2.0.
With the subnet mask, for more than two independent networks in a worknet, the network can be partitioned
into smaller networks. A subnet mask must be applied.
For different network applications, a sample subnet mask is 255.255.255.240. This is for a small network with a
maximum of 15 nodes.
26
Page 30
CHAPTER 3: Installation
3.5.3 D
For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the
designated IP address, known as the default router. Only the switch uses the gateway setting for Trap Events
Host.
When assigning an IP address to the switch, first check to see what an existing switch on the same network uses
as a network address. Use the same network address and append your host address to it.
Once you type in the username and password in the login screen, the IP Configuration screen appears.
Options in this screen include DHCP Setting, IP Address, Subnet Mask, Default Gateway, DNS Server, and the
Apply button.
Type in the IP address in the format 192.168.1.xon your PC.
For the subnet mask, enter 255.255.255.0. Any subnet mask such as 255.255.255.x is allowed.
3.5.4 DNS
The Domain Name Server translates a human-readable machine name to an IP address. Every machine on the
Internet has a unique IP address. A server generally has a static IP address. To connect to a server, the client
needs to know the server’s IP. However, a user generally uses the name to connect to the server. Thus, the
switch DNS client program (such as a browser) will ask the DNS to find the named server’s IP address.
EFAULT GATEWAY
3.6 Typical Applications
The LGB201A implements 24 Fast Ethernet TP ports with auto MDIX and 2 Gigabit dual media ports with SFP
for removable module supported comprehensive fiber types of connection, including LC, BiDi LC for SFP.
Use the switch for the following applications.
• FTTB (Fiber To The Building)/FTTO (Fiber To The Office) application is used in carrier or ISP (see
Figure 3-10).
• FTTH (Fiber To The Home) application is used in carrier or ISP (see Figure 3-11).
• Daisy-Chain Fiber Network Connection (see Figure 3-12).
27
Page 31
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.6.1 FTTB/FTTO C
ONNECTION
Figure 3-10 shows a FTTB/FTTO application is used in carrier or ISP.
Figure 3-10. Network Connection of FTTB/FTTO.
28
Page 32
CHAPTER 3: Installation
3.6.2 FTTH C
Figure 3-11 shows a FTTH application is used in carrier or ISP.
ONNECTION
Figure 3-11. Network Connection of FTTH.
29
Page 33
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.6.3 D
AISY-CHAIN FIBER NETWORK CONNECTION
Figure 3-12 shows the Daisy-Chain Fiber Network Connection.
Figure 3-12. Typical office network using three switches.
30
Page 34
CHAPTER 4: Web-Based Management
4. Web-Based Management
This chapter explains how to configure and manage the switch through the Web user interface. Via one switch
port, you can easily access and monitor the switch’s status, including MIBs, port activity, spanning tree, port
aggregation, multicast traffic, VLAN and priority, and even a record of illegal access to the network.
The switch’s default values are listed in Table 4-1.
Before accessing the managed switch via a network port, you must first configure the
switch in its command-line interface (CLI) from the connected a sync serial
COM/RS-232 interface. For details, see Chapter 5.
Once you configure the switch, type in the IP address (for example, http://192.168.1.1) in the address row in a
browser. The login screen appears. Table 4-2 lists the screen options.
Table 4-2. Login screen parameters.
Parameter Setting
Username admin
Password admin
Login Click on this button to log in.
Cancel Click on this button to cancel the log in.
Forget Password Click on this button to choose a new password.
Type in the username and password. (The default username and password are both admin.) The first time you
log in, type in the default username and password, then click on the Login button.
31
Page 35
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
If you forget the password, click the link of Forget Password in Web UI or press the Ctrl button, then type Z in
the CLI login screen. The system then displays a serial number. Write down this serial number and contact
Black Box—we’ll give you a temporary password. Type in this new password as ID and Password, and the system
will allow you to temporarily log into the system with manager authority. This password allows you to login to
the system only one time, so modify your password immediately after you log into the system successfully.
To modify your password, type in the complete new username and password. The switch will not give you a
shortcut to the username automatically. This looks inconvenient, but it provides additional system security.
The switch supports a simple user management function, allowing only one administrator to configure the
system at a time. If two or more users use the administrator’s identity, the switch will allow only the one who
logs in first to configure the system. Other users, even with an administrator’s identity, can only monitor the
system. Users who have no administrator’s identity can only monitor the system. A maximum of three users can
log in simultaneously.
To optimize the display effect, we recommend using Microsoft® Internet Explorer® version 6.0 or above,
Netscape® V7.1 or above, or FireFox V1.00 or above with a resolution of 1024 x 768. The switch supports a
neutral Web browser interface.
4.1 Home Overview
Once you log into the switch, the Home screen appears.
At the top of the screen, the switch’s front-panel diagram appears. The linked ports display green, and the
unlinked ports appear dark. The slot shows only a cover plate if no module exists, and it shows a module if a
module is present. The module image depends on the one that’s installed in the switch. If disconnected, the
port will appear dark; if linked, it will be green.
Simply click on the ports in the switch diagram to browse the information for a specific port. An information
window appears, containing Link, State, Auto Negotiation, Speed/Duplex, Flow Control, Ingress All State,
Ingress All Rate, Ingress Storm State, Egress All State, Egress All Rate, Tx Byte, Rx Byte, Tx Packet, Rx Packet,
Tx Collision, RX Error Packet, and the Close button.
In the left top corner of the screen, a pull-down list appears for Auto Logout. This is a security function meant
to prevent illegal users from accessing the switch. If you select ON, the system will log out automatically when
there is no action on the device for three minutes. If you select OFF, the screen will remain visible to the user.
The default setting is ON.
On the left side of the screen, the main menu tree for the Web is listed. Options (in a vertical list on the left
side of the screen) include System, Port, Mirror, Bandwidth, QoS, SNMP, IGNP Snooping, Max. Packet Length,
DHCP Boot, VLAN, MAC Table, GVRP, STP, Trunk, 802.1x, Alarm, Configuration, Diagnostics, TFTP Server,
Log, Firmware Upgrade, Reboot, and Logout. These options are described in Sections 4.2 through 4.24.
4.2 System
4.2.1 SYSTEM INFORMATION
Click on System in the Home screen, and the System Information screen appears. This screen’s settings are
described in Table 4-3.
32
Page 36
CHAPTER 4: Web-Based Management
Table 4-3. System Information screen settings.
Parameter Description
Model Name LPB200A
System Description 12-Port 1000BaseT/TX Managed PoE Switch.
Location The user-defined switch location.
Contact This is the contact name and phone number for help.
Configure this parameter via the switch’s user interface or
SNMP.
Device Name The user-defined switch’s name. LPB200A is the default.
System Up Time Time in days, hours, and minutes accumulated since the
switch was powered on. Its format is day of week, month,
day , hours: minutes: seconds, year. For example, Wed., Apr.
26, 12:10:10, 2006.
Current Time The switch’s system time. Its format is day of week, month,
day , hours: minutes: seconds, year. For example, Wed., Apr.
26, 12:10:10, 2006.
BIOS Version The switch’s BIOS version.
Firmware Version The switch’s firmware version.
Hardware-Mechanical Version The electrical and mechanical switch version. The figure
before the hyphen is the electronic hardware version; the
one after the hyphen is the mechanical hardware version.
Serial Number The switch’s serial number; assigned by the manufacturer.
Host IP Address The switch’s IP address.
Host MAC Address The switch’s management agent’s Ethernet MAC address.
Device Port Displays all types and numbers of switch ports.
RAM Size The switch’s DRAM size.
Flash Size The switch’ s Flash memory size.
Apply button Click on this button to apply the selections.
33
Page 37
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.2.2 IP CONFIGURATION
IP configuration is one of the most important switch configurations. Without the proper setting, the network
manager will not be able to manage or view the device. The switch supports both manual IP address setting and
automatic IP address setting via a DHCP server. When the IP address is changed, you must reboot the switch for
the setting to take effect and to use the new IP to browse for Web management and CLI management. To get to
the IP Configuration screen, click on IP in the System menu. Then, set the switch’s IP address, subnet mask,
default gateway, and DNS. Table 4-4 describes the IP Configuration screen parameters.
Table 4-4. IP Configuration screen options.
Parameter Description
DHCP Setting Dynamic Host Configuration Protocol (DHCP) can be ON or OFF.
Select Enable or Disable from the drop-down menu.
The switch supports a DHCP client that’s used to get an IP address
automatically if you set this function to Enable. When enabled, the
switch will issue the request to the DHCP server residing in the
network to get an IP address. If the DHCP server is down or does not
exist, the switch will issue the request and show the IP address as
requesting, until the DHCP server is up. Before getting an IP address
from the DHCP server, the device will not continue booting
procedures. If this field is set to Disable, you must type in the IP
address manually. For more details about IP address and DHCP, see
Section3.5.
The default setting is Disable.
IP address If DHCP is set to Disable, you can type in new IP settings. Then click
on the Apply button.
When DHCP is disabled, the default setting is 192.168.1.1.
If DHCP is enabled, this field is filled by the DHCP server and will not
allow you to manually type it in.
Subnet mask An IP device in a network must own its IP address, composed of a
Network address and a Host address; otherwise, it can’t
communicate with other devices. Subnet mask is designed to
provide more network addresses. The network classes A, B, and C
are all too large to fit for almost all networks; subnet mask solves this
problem. The subnet mask uses some bits from the host address
and makes an IP address look like a network address, subnet mask
number, and host address. This reduces the total IP number that a
network can support, by the amount of 2 power of the bit number of
subnet number (2
[bit number of subnet number]
).
34
Page 38
CHAPTER 4: Web-Based Management
Table 4-4 (continued). IP Configuration screen options.
Parameter Description
Subnet mask (continued) Subnet mask sets the subnet mask value, which should be the same
value as that of the other devices residing in the same network that
the switch is attached to. For more information, see Section 3.5.
Default: 255.255.255.0
Default gateway Set an IP address for a gateway to handle those packets that do not
meet the routing rules predefined in the device. If a packet does not
meet the criteria for another pre-defined path, it must be forwarded to
a default router on a default path. This means any packet with an
undefined IP address in the routing table will be sent to this device
unconditionally.
Default: 192.168.1.254
DNS Domain Name Server translates the IP address and name address.
The switch supports the DNS client function to re-route the
mnemonic name address to the DNS server to get its associated IP
address for accessing the Internet. Specif y a DNS IP address for the
switch. With this, the switch can translate a mnemonic name address
into an IP address.
There are two ways to specify the DNSIP address. Fixed mode
manually specifies its IP address, and dynamic mode i s assig ned by
the DHCP server while DHCP is enabled. DNS can help you easily
remember the mnemonic address name with meaningful words. The
default is no DNS address assignment.
Default: 0.0.0.0
Apply button Click on this button to save the changes.
4.2.3 TIME CONFIGURATION
In the System menu, click on Time Configuration (see Table 4-5).The switch provides manual and automatic
ways to set the system time via NTP*. The manual setting is simple—just type in the year, month, day, hour,
minute, and second within the valid value range indicated in each item. If you type in an invalid value (for
example, 61 in minutes), the switch changes the figure to 59.
*NTP is a well-known protocol used to synchronize the switch system time clock over a network. NTP, an Internet draft standard formalized in
RFC 1305, has been adopted on the system as version 3 protocol. The switch provides four built-in NTP server IP addresses residing in the
Internet and a user-defined NTP server IP address. The time zone is Greenwich-centered (Greenwich Mean Time or GMT), using the form
GMT+/- xx hours.
35
Page 39
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-5. Time Configuration screen options.
Parameter Description
Time Type in the system time or set it by syncing from Time servers. The
function also supports daylight savings time for different areas’ time
adjustment.
Current Time Shows the current system time.
Manual Adjust the time manually . Type in the valid figures in the Year, Month,
Day, Hour, Minute, and Second fields respectively, then click on the
Apply button to adjust the time. The valid figures for the parameter
Year, Month, Day, Hour, Mi nute, and Second are >=2000, 1–12,
1–31, 0–23, 0–59, and 0–59 respectively. If you type in an invalid
figure and press the Apply button, the device will reject the time
adjustment request. There is no time zone setting in Manual mode.
Default: Year = 2000, Month = 1, Day = 1,
Hour = 0, Minute = 0, Second = 0
NTP NTP is Network Time Protocol and is used to sync the
network-time-based Greenwich Mean Time (GMT). If you use the
NTP mode and select a built-in NTP time se rver or manually specify
a user-defined NTP server as well as Time Zone, the switch will sy nc
the time after you press the Apply button. Though it sy nchronizes
the time automatically, NTP does not update the time periodically
without user processing.
Time Zone is an of fset time of GMT. From the drop-down menu,
select the time zone first and then perform time sync via NTP. The
switch will combine this time zone offset and update NTP time to the
local time; otherwise, you will not be able to get the correct time. The
switch supports a configurable time zone from -12 to +13 in 1-hour
steps.
Default time zone: +8 Hrs.
Daylight Saving If set for daylight savings time, the switch will adjust the time lag or
advance in units of hours, according to the starting date and the
ending date. From the drop-down menu, set the daylight savings
time to 1 hour. When the time p asses over the starting time, the
system time will be increased one hour after one minute at the time
since it passed over . And when the time passes over t he ending time,
the system time will be decreased one hour after one minute at the
time since it passed over.
36
Page 40
CHAPTER 4: Web-Based Management
Table 4-5 (continued). Time Configuration screen options.
Parameter Description
Daylight saving (continued) The switch supports valid configurable daylight savings time of -5
to+5 step one hour. The zero for this parameter means it does not
have to adjust current time; it’s equivalent to activating daylight
saving. In this case, you don’t have to set the starting/ending date. If
you set daylight saving to be non-zero, you have to set the
starting/ending dates; otherwise, the daylight saving function will not
be activated.
Default for Daylight Saving: 0
Daylight Saving Start This defines when to st art performing the daylight saving time.
Mth: Range is 1–12. Default: 1
Day: Range is 1–31. Default: 1
Hour: Range is 0–23. Default: 0
Daylight Saving End Set this to stop performing the daylight saving time.
Mth: Range is 1–12. Default: 1
Day: Range is 1–31. Default: 1
Hour: Range is 0–23. Default: 0
Apply button Click on this button to apply the settings.
4.2.4 ACCOUNT CONFIGURATION
To get to the Account Configuration screen, click on Account in the System menu. Only the user logged in as
administrator can create, modify, or delete the username and password. The administrator can modify other
guest identities’ passwords without confirming the password but must also modify the administrator-equivalent
identity. A guest-equivalent identity can modify his own password only. You must confirm administrator/guest
identity in the Authorization field in advance before configuring the username and password. Only one
administrator is allowed to exist and can’t be deleted. Up to four guest user accounts can be created.
Table 4-6. Account configuration screen settings.
Parameter Description
Account Name Type in the name.
Authorization Select administrator or guest user from the drop-down menu.
Create New Click on this button to create a new guest user account.
Edit Click on this button to edit a guest user account.
Delete Click on this button to delete a guest user account.
37
Page 41
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
The default setting for administrator user account is:
Username: admin
Password: admin
The default setting for guest user account is:
Username: guest
Password: guest
4.2.5 M
ANAGEMENT POLICY
Limiting User Access to the Switch
Through the management security configuration, the administrator can control the switch and limit the user’s
access to this switch. To get to this screen, click on Management Policy in the System menu.
The following rules apply:
1. When no lists exist, then the switch will accept all connections.
2. When only “accept lists” exist, then the switch will deny all connections, excluding the connection inside
the accepting range.
3. When only “deny lists” exist, then the switch will accept all connections, excluding the connection inside
the denying range.
4. When both “accept and deny” lists exist, then the switch will deny all connections, excluding the
connection inside the accepting range.
5. When both “accept and deny” lists exist, then the switch will deny all connections, excluding the
connection inside the accepting range and NOT inside of the denying range at the same time.
Management Security Configuration
With the Management Security Configuration function (see Table 4-7), the manager can easily control the
user’s mode when connecting to the switch. According to the mode, users can be classified into two types: those
who are able to connect to the switch (Accept) and those who are unable to connect to the switch (Deny).Some
restrictions also can be placed on the user mode while connecting to the switch. For example, a VLANVID can
be accepted or denied by the switch, the user’s IP range can be accepted or denied by the switch, the port that
the user is allowed or not allowed to connect with the switch, or the way of controlling and connecting to the
switch can vary (via HTTP, Telnet, or SNMP).
Name A name is co mposed of any letter (A–Z, a–z) and digit (0–9) with a
maximum of 8 characters.
VID VID supports two buttons for managed valid VLAN VID: Any and
Custom. The default is the Any button. When you click on the Custom
button, you can type in the VID number. The valid VID range is 1–4094.
IP Range The switch supports two options for the managed valid IP Range: Any
and Custom. The default is the Any button. When you click on the
Custom button, you can type in an effective IP range. The valid range
is 0.0.0.0–255.255.255.255.
Incoming Port The switch supports options for managed valid Port Range: Any and
Custom. The default is the Any button. When you click on the Custom
button, you can check the box(es) next to the ports that you would like
to be restricted in the management security configuration.
Access Type The switch supports two options for managed valid Access Type: Any
and Custom. The default is the Any button. When you click on the
Custom button, you can check the box next to the option you want to
use to access and manage the switch. The three options include HTTP,
Telnet, and SNMP.
Action The switch supports two options for managed valid Action Type: Deny
and Accept. The default is the Deny button. When you choose Deny,
you can’t manage the switch. If you click on the Accept button, you can
manage the switch.
Edit/Create Click on this button to create a new management security entry, or to
modify an existing entry.
Delete Click on this button to remove the selected management security
configuration entry from the management security table.
4.2.6 VIRTUAL STACK
Virtual Stack Management (VSM) is the group management function. To get to this option, click on Virtual
Stack in the System menu. Through the proper configuration of this function, switches in the same LAN will
be grouped automatically. Among these switches, one switch will be a master machine, and the others in this
group will become the slave devices.
VSM offers a simple centralized management function. You don’t have to remember all devices’ addresses,
since the administrator can manage the network with knowing only the Master machine’s address. Instead of
39
Page 43
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
an SNMP or Telnet user interface, VSM is only available in a Web user interface (UI). While one switch is the
Master, two rows of buttons for a group device will appear on the top of its Web UI. Press the buttons to
connect the group devices’ Web UI in the same window without logging in to the corresponding devices.
The top-left button is only for the Master device. The background color of the button you press will be changed
to represent that the device is under your management.
NOTE
If you log into the switch via the console, the grouping will be removed temporarily.
The group device is shown as station address (the last number of IP Address) + device name on the button (for
example, 196_LPB200A); otherwise it will display “----”if no corresponding device exists.
Once the devices join the group successfully, then they can only be managed via the Master device, and a user
won’t be able to manage them individually via Telnet/console/Web.
Up to 16 devices can be grouped for VSM; however, only one Master is allowed to exist in each group. For
Master redundancy, you may configure more than two devices as the Master device; however, the Master device
with the smaller MAC value will be the Master one. All 16 devices can become a Master device and back up each
other.
Table 4-8. Virtual Stack screen options.
Parameter Description
State Activates or de-activates VSM. Select Enable or Disable from the
drop-down menu. The default is Enable.
Role The role that the switch plays in the virtual stack. Sele ct Master or
Slave from the drop-down menu. The default is Master.
Group ID Type in the group identifier (GID) to indicate a VSM. Valid letters are
A–Z, a–z, 0–9, “-” and “_” characters. The maximum length is 15
characters.
Apply button Click on this button to apply the settings.
4.3 Port Configuration
To get to the Port Configuration menu, click on Port in the Home screen. This menu contains Status,
Configuration, Simple Counter, and Detail Counter for port monitoring and management. They are described
in Sections 4.3.1 through 4.3.4.
4.3.1 S
The function Port Status gathers the information of all ports’ current status and reports it by port number, link
status, port state, auto-negotiation status, speed/duplex, and flow control. To get to the Port Status screen, click
on Port Status in the Port menu (see Table 4-9). Media type information for the module ports 11, 12 is listed in
Table 4-10.
TATUS
40
Page 44
CHAPTER 4: Web-Based Management
Table 4-9. Port Configuration menu options.
Parameter Description
Port Status Report the latest updated status of all switch ports. When any one of
the ports in the switch changes its p arameter displayed in the page,
the port status will automatically refresh about every 5 seconds.
Port No. Display the port number. The number is 1–12. Ports 11, 12 are
optional modules.
Media Show the media type adopted in all ports. The Port 25 and Port 26
are optional modules, which support either fiber or UTP media with
either Gigabit Ethernet (1000Mbps) or 10/100Mbps F ast Ethernet
port. They may have different media types and speed. Especially,
fiber port has comprehensive types of connector, distance, fiber
mode and so on. The switch describes the module ports with the
following page.
Link Shows if the link on the port is active or not. If the link is connected to
a device that is working properly, the Link will show the link Up;
otherwise, it will show Down. Both connected devices determine the
link value.
No default value.
State Shows that the port’s communication function is Enabled or
Disabled. When it’s enabled, traffic can be transmitted and received
via this port. When it’s disabled, no traffic can be transferred through
this port. The Port State is configured by the user.
Default: Enabled.
Auto Negotiation Shows the Ethernet MAC’s exchange mode. The switch supports
two modes: auto-negotiation mode Enabled and forced mode
Disabled. When in Enabled mode, this switch automatically
negotiates the best speed and duplex values at both ends of the
connection. When in Disabled mode, both parties must have the
same speed and duplex settings; otherwise, they won’t be linked. In
this case, the link result is Down.
Default: Enabled
41
Page 45
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-9 (continued). Port Configuration menu options.
Parameter Description
Speed/Duplex Mode Display the speed and duplex of all port. There are three speeds
10Mbps, 100Mbps and 1000Mbps supported for TP media, and the
duplex supported is half duplex and full duplex. If the media is 1Gbps
fiber, it is 1000Mbps supported only. The status of speed/duplex
mode is determined by 1) the negotiation of both local port and link
partner in Auto Speed mode or 2) user setting in Force mode. The
local port has to be preset its capability.
Default: None, depends on the negotiation result.
Flow Control Show each port’s flow control status.
There are two types of flow control in Ethernet, Backpressure for
half-duplex operation and Pause flow control (IEEE802.3x) for
full-duplex operation. The switch supports both of the m.
Default: Disable
Wait State For 10/100M ports, there is no side effect on this setting.
For Gigabit ports, setting of Wait-State will remove the issue with
ignored pause frames but resolve in the minimum interframe gap
being at least 14 bytes instead of the usual 12 bytes. This applies for
uncongested traffic as well. The larger interframe gap will result in
throughput rates less than 100%. For example, a stream of 64-byte
frames and a stream of 1518-byte frames, their maximum throughput
is 97.7% and 99.9% respectively.
Table 4-10. Ports 11---12.
Parameter Description
Connector Type Displays the connector type—for example, UTP, SC, ST®, or LC.
Fiber Type Displays the fiber mode—for example, multimode or single-mode.
Tx Central Wavelength Displays the fiber optic transmitting central wavelength—for example,
850-nm, 1310-nm, or 1550-nm.
Baud Rate Displays the fiber module’s maximum supported baud rate—for
42
example, 10M, 100M, or 1G.
Page 46
Table 4-10 (continued). Ports 11--12.
CHAPTER 4: Web-Based Management
Parameter Description
Vendor OUI Displays the Manufacturer's OUI code that’s assigned by IEEE.
Vendor Na me Displays the module manufacturer’s company name.
Vendor P/N Displays the manufacturer’s switch’s part number.
Vendor Rev (Revisi on) Displays the module revision.
Vendor SN (Serial Number) Shows the manufacturer-assigned serial number.
Date Code Shows the date this SFP module was made.
Temperature Shows the SFP module’s current temperature.
Vcc Shows the SFP module’s working DC voltage.
Mon1 (Bias) mA Shows the SFP module’s bias current.
Mon2 (TX PWR) Shows the SFP module’s transmit power.
Mon3 (RX PWR) Shows the SFP module’s receiver power.
Close button Click on this button to close the window .
4.3.2 CONFIGURATION
Use the Configuration menu to change each port’s setting. To get to this screen, click on Config in the Port
menu. In this menu, you can set/reset the following functions. All are described in detail in Table 4-11.
Table 4-11. Configuration screen options.
Parameter Description
State From the drop-down menu, set the port’s communication capability
to Enabled or Disabled. When enabled, traffic can be transmitted
and received via this port. When disabled, the port is blocked and no
traffic can be transferred through this port. Port State is configurable
by the user. If you set a port’s state to Disable, then that port is
prohibited from passing any traffic.
Default: Enable.
43
Page 47
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Mode Set the speed and duplex of the port. In speed, 10/100Mbps baud
rate is available for Fast Ethernet, Gigabit module in port 11, 12. If
the media is 1Gbps fiber , it is always 1 000Mbp s and the duplex is f ull
only. If the media is TP, the Speed/Duplex is comprised of the
combination of speed mode, 10/100/1000Mbps, and duplex mode,
full duplex and half duplex. The following table summarized the
function the media supports.
Media Type NWay Speed Duplex
100M TP ON/OFF 10/100M Full/Half
1000M TP ON/OFF 10/100/1000M Full for all, Half for 10/100
1000M Fiber ON/OFF 1000M Full
In auto-negotiation mode, there is no default value. In forced mode,
the default value depends on your setting.
Flow Control There are two modes to choose in flow control, including Symmetric
and Asymmetric. If flow cont rol is set Symmetric, both parties can
send PAUSE frame to the transmitting device(s) if the receiving port
is too busy to handle. When it is set Asymmetric, this will let the
receiving port care the PAUSE frame from transmitting device(s), but
it doesn’t send PAUSE frame. This is one-way flow control.
Default: Enable
Wait State For more details about this parameter please refer to section 4.3.1.
Default: Disable.
Apply Click on this button to save the settings.
4.3.3 SIMPLE COUNTER
Simple Counter collects any information and provides the port traffic counting, whether the packet is good or
bad. To get to this screen, click on Simple Counter in the Port Configuration screen.
The Simple Counter window can show all ports’ counter information at the same time. To get to this screen,
click on Simple Counter in the Port menu. Each data field is 20 digits long. If the count is more than 20
(overflow), the counter will reset and restart counting. The data is updated every time a user defines an interval.
The valid range is 3 to 10 seconds. The Refresh Interval sets the update frequency. The default update time is 3
seconds.
44
Page 48
Table 4-12. Simple Counter screen options.
CHAPTER 4: Web-Based Management
Parameter Description
Simple Counter Displays each port’s traffic summary counting, including Tx Byte, Rx
Refresh Interval Select a number (in seconds) from the drop-down menu.
Reset button Click on this button to reset the simple counter.
Port No. The port number.
Tx Byte Total transmitted bytes.
Rx Byte Total received bytes.
Tx Packet Total transmitted packets.
Rx Packet Total received packets.
Tx Collision Total collisions experienced while transmitting frames.
Rx Error Packet Total bad packets received.
4.3.4 DETAIL COUNTER
The Detail Counter collects any information and provides the port traffic counting, whether the packet is good
or bad. To get to this screen, click on Detail Counter in the Port Configuration screen.
The Detail Counter window can show only one port counter information at the same time. To get to this screen,
click on Detail Counter in the Port menu. To see another port’s counter, select it from the drop-down menu.
Each data field is 20 digits long. If the counting is longer than 20 digits (overflows), the counter will be reset
and restart counting. The data is updated every user-defined time interval. The valid range is 3 to 10 seconds.
The Refresh Interval is used to set the update frequency. The default update time is 3 seconds.
45
Page 49
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-13. Detail Counter screen options.
Parameter Description
Detail Counter Displays the detailed counting number of each port’s traffic. The
Detail Counter window can show all counter information of each port
at onetime. To get to this screen, click on Detail Counter in the Port
menu.
Select Choose the port numb er from the drop-down menu.
Refresh Interval Select the interval from the drop-down menu. The valid range is 3 to
10 seconds, and the default is 3 seconds.
Reset button Click on this button to reset the choices.
Rx Packets Total packets received.
Rx Octets Total received bytes.
Rx High Priority Packets Number of Rx packets classified as high priority.
Rx Low Priority Packets Number of Rx packets classified as low priority.
Rx Broadcast Packets Show the counting number of the received broadcast packets.
Rx Multicast Packets Show the counting number of the received multicast packets.
Tx Packets The counting number of the packet transmitted.
TX Octets Total transmitted bytes.
Tx High Priority Packets Number of Tx packets classified as high priority.
Tx Low Priority Packets Number of Tx packets classified as low priority.
Tx Broadcast Packets Show the counting number of the transmitted broadcast packet.
Tx Multicast Packets Show the counting number of the transmitted multicast packet.
Rx 64 Bytes Number of 64-byte frames in good and bad packets received.
Rx 65-127 Bytes Number of 65 ~ 126-byte frames in good and bad packets received.
Rx 128-255 Bytes Number of 127 ~ 255-byte frames in good and bad packets received.
Rx 256-511 Bytes Number of 256 ~ 511-byte frames in good and bad packets received.
Rx 512-1023 Bytes
Rx 1024-Bytes
Tx 64 Bytes Number of 64-byte frames in good and bad packets transmitted.
Tx 65-127 Bytes
Tx 128-255 Bytes
Tx 256-511 Bytes
Tx 512-1023 Bytes
Tx 1024-Bytes
Rx CRC/Alignment Number of Alignment errors and CRC error packets received.
Rx Undersize Number of short frames (<64 Bytes) with valid CRC.
Rx Oversize
Number of 512 ~ 1023-byte frames in good and bad packets
received.
Number of 1024-max_length-byte frames in good and bad packets
received.
Number of 65 ~ 126-byte frames in good and bad packets
transmitted.
Number of 127 ~ 255-byte frames in good and bad packets
transmitted.
Number of 256 ~ 511-byte frames in good and bad packets
transmitted.
Number of 512 ~ 1023-byte frames in good and bad packets
transmitted.
Number of 1024-max_length-byte frames in good and bad packets
transmitted.
Number of long frames(according to max_length register) with valid
CRC.
Rx Fragments Number of short frames (< 64 bytes) with invalid CRC
Rx Jabbers
Rx Errors Number of the error packet received.
Tx Collisions Number of collisions transmitting frames experienced.
Tx Drops
Tx FIFO Drops Number of frames dropped due to the lack of transmitting buffer.
Number of long frames(according tomax_length register) with
invalid CRC.
Number of frames dropped due to excessive collision, late collision,
or frame aging.
47
Page 51
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.4 PoE
4.4.1 POE STATUS
Table 4-14 shows all the parameters of the PoE status.
Table 4-14 PoE screen options.
Parameter Description
PoE Status Display the information about the PoE status.
Vmain The volt is supplied by the PoE.
Imain The sum of the current that every port supplies.
Pconsume The sum of the power that every port supplies
Power Limit The maximal power that the switch can supply (Read Only).
Temperature The temperature of the chip on PoE
Port No Port number.
Port On Show whether the port is supplying the power to the PD or not
AC Disconnect Port Off Port is turned off due to the AC Disconnect function.
DC Disconnect Port Off Port is turned off due to the DC Disconnect function.
The switch will stop supplying the power to the port due to the power
Overload Port Off
Short Circuit Port Off
Over Temp. Protection
Power Management Port Off
required by the PD that is linked to the port on the switch excesses
the Class setting of the PD
The switch will stop supplying the power to the port if it detects that
the PD linked to the port is short circuit.
The port of the switch will be disabled due to fast transient rise in
temperature to 240
Due to total power required by all PDs linked to the switch excesses
the power limit, so the switch stops supplying the power to this port
after referring to the information of the priority.
o
C or slow rise in temperature to 200oC.
48
Page 52
4.4.2 POE CONFIGURATION
The switch complies with IEEE 802.3af protocol and be capable of detecting automatically that whether the
device linked to the port on the switch is PD (Powered Device) or not. The switch also manage the power
supplement based on the Class of the PD, and it will stop supplying the power once the power required by the
PD excesses the Class, Short Circuit or over temperature occurs.
Table 4-15. PoE Configuration screen settings
CHAPTER 4: Web-Based Management
Parameter Description
Status Include Normal or Active two kinds of status. The former means th e
port is ready to link and supply the power to the PD at any time. The
latter means the port is in the condition of supplying the power.
State Enable means the manager allows the power supplied to the PD is
legal while the port linked to the PD; Disable means the port does
not own PoE function.
Priority Three options are offered for the user to choose, including Normal,
Low and High. Default is Normal. The switch will stop supplying the
power to the port based on the order of the priority
LowÆNormalÆHigh in case total power required by all PDs linked to
the switch excesses the power limit. As the ports have the same
priority, then the switch will cease the power supplement from the
port with the highest port id (12Æ1).
Power (W) The power is consumed by the port
Current (mA) The current is supplied to the PD by the port
Class The Class of the PD linked to the port of the switch
4.5 Mirror
Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B
areMonitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port
A for monitoring.
49
Page 53
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-16. Mirror Configuration screen settings.
Parameter Description
Mode Used for the activation or de-activation of Port Mirror function.
Default is disable.
Monitoring Port Set up the port for monitoring. Valid port is Port 1~12 and default is
Port 1.
Monitored Port
Set up the port for being monitored. Just tick the check box (
beside the port x and valid port is Port 1~12.
;)
4.6 Bandwidth Management
Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port.
Each port of the switch owns 16KB packet buffer. The packet buffer size will be reduced when the bandwidth
rate limitation is enabled, which may cause that jumbo frame cannot be forwarded.
Please avoid enabling jumbo frame and bandwidth rating functions at the same time.
Port Number Choose the port that you would like this function to work on it. Valid
range of the port is 1~12
All Traffic for Ingress Rate
Limiting (Policing)
Set up the limit of Ingress bandwidth for the port you choose.
Incoming traffic will be discarded if the rate exceeds the value you
set up in Data Rate field. Pause frames are also generated if flow
control is enabled. The format of the packet limits to unicast,
broadcast and multicast. Valid range is 0~1000.
Broadcast & Multicasat for
Ingress Rate Limiting
(Policing)
All Traffic for Egress Rate
Limiting (Shaping)
50
Set up the limit of Ingress bandwidth for the port you choose.
Incoming traffic will be discarded if the rate exceeds the value you
set up in Data Rate field. The format of the packet limi ts to broadcast
and multicast. Valid range is 0~1000.
Set up the limit of Egress bandwidth for the port you choose. Packet
transmission will be delayed if the rate exceeds the value you set up
in Data Rate field. Traffic may be lost if egress buffers run full. The
format of the packet limits to unicast, broadcast and multicast. Valid
range is 0~1000.
Page 54
CHAPTER 4: Web-Based Management
4.7 QoS (Quality of Service) Configuration
The switch offers powerful 5 kinds of QoS functions. There are Per Port Priority that you can assign each port
to different precedence, VLAN Tag priority that can make precedence of 8 priorities, IP TOS Classification, IP
TCP/UDP Port Classification and IP DiffServe Classification.
In Quality of Service (QoS) Configuration, there is one option named Default Class. As you had selected one
of the five QoS functions, then some packets that did not belong to this QoS setting would be viewed as Default
Class. For instance, if you set QoS function as VLAN Tag Priority mode, and then choose Default Class as High,
finally, the priority of the packets with no tag will be considered as High priority precedence. The initial value
of the Default Class is High.
4.7.1 P
We can assign QoS Priority, including High and Low for each port. For example, if we transmit IP packets from
Port 2 and Port 3 at the speed of 1 Gbps to Port 1, and set the Class of Port 2 as High and Port 3 as Low, then
the packets of Port 3 will be dropped when the congestion happens because Port 2 owns higher precedence of
transmitting packets.
ER PORT PRIORITY
Table 4-18. Per Port Priority screen options.
Parameter Description
Port No User can choose the port (1~12) respectively with Priority Class on
Per Port Priority function.
Class User can set up High Priority or Low Priority for each port
respectively.
4.7.2 VLAN TAG PRIORITY
In vlan tag, there are 3 bits belonging to priority. According to these 3 bits, we could arrange 8 traffics –0 0 0, 0
0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. We can set High priority or Low priority for each traffic class. For
instance, if we let VLAN-tagged priority 0 0 0 be high priority and VLAN-tagged priority 0 0 1 be Low Priority,
and then make port 1, 2, 3 be in the vlan 2. We sent the packets that have the value 0 0 0 in vlan-tagged field
and VID equals 2 from the port 2 and the packets that have the value 0 0 1 in vlan-tagged field and VID equals 2
from the port 3 into the switch. We let the two kinds of packets be transmitted for port 1 until the port results
in congestion. The result is that the packets will be dropped partially from the port 3 because the packets that
belong to Low Priority. For the use of VLAN Tag Priority function, please press Configure button at the right
section for setting in advance.
51
Page 55
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-19. VLAN Tag Priority screen options.
Parameter Description
Quality of Service (QoS) Vlan
Tag Configuration
Port User can set up the port (1~12) respectively to let Vlan Tag QoS
Bit 0, Bit 1, Bit 2 According to the arrangement of VLAN-tagged priority, it can form
Class 8 kinds of traffic as mentioned above, user can set up High Priority
Used for setting up the QoS belongs to Vlan operation.
function work on them. If you would like to set up all ports at a time,
user is also allowed to choose “All” in the selection list to simplify
the procedure of configuration.
8 kinds of traffics, including 0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1
1 0 and 1 1 1.
or Low Priority for each port respectively.
4.7.3 IP TOS CLASSIFICATION
Another QoS function is the application of Layer 3 on network framework. We focus on TOS field of IP header.
There are three bits in TOS field. We means bit 5~7 of TOS field that we will use. According to these 3 bits, we
could arrange 8 traffics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. As long as we change bit 5~7 of TOS
field of IP header, we will create the 8 traffic packets we meant before. Moreover, we can set High priority or
Low priority for each traffic class. For instance, if we let TOS 0 0 0 be high priority and TOS 0 0 1 be Low
Priority, we sent in the packets that have bit 5~7 of TOS Field appears 0 0 0 from the port 2 and the packets that
have bit 5~7 of TOS Field appears 0 0 1 from the port 3. We let the two kinds of packets be transmitted for port
1 until the port results in congestion. The result is that the packets will be dropped partially from the port 3
because the packets that belong to Low Priority.
Table 4-20. IP TOS Classification screen options.
Parameter Description
Port User can set up the port (1~12) respectively to let TOS QoS
function work on them. If you would like to set up all ports at a time,
user is also allowed to choose “All” in the selection list to simplify
the procedure of configuration.
Bit 0, Bit 1, Bit 2 According to the arrangement of Bit 5 ~ Bit 7 in TOS Field of IP
Header, it can form 8 kinds of traffics, including 0 0 0, 0 0 1, 0 1 0,
0 1 1, 1 0 0, 1 0 1, 1 1 0 and 1 1 1.
Class 8 kinds of traffic as mentioned above, user can set up High Priority
or Low Priority for each port respectively.
52
Page 56
CHAPTER 4: Web-Based Management
4.7.4 IP TCP/UDP P
In L4 QoS Configuration, you can enter one of these special network transmission events, for example we use
Down prioritize web browsing, e-mail, FTP and news L4 QoS Configuration and click Apply button, and
then click Advance button. We can find Special TCP/UDP port 80, 280, 443, 25, 110, 20, 21, 69, 119, 2009
have already existed and defined for your using but it is fine that you modify this pre-defined TCP/UDP port
with other port number you prefer. In Down prioritize web browsing, e-mail, FTP and news L4 QoS
Configuration with default setting, special defined TCP/UDP port possesses lower QoS traffic than Default
class (all other TCP/UDP ports such as port 81,82,83,84,85, etc.). Giving an example, when we transmit TCP
packets with port number 80 at each of port 2 and port number 81 at port 3 to port 1 until the congestion
happens. The packets from port 3 will be dropped by port 1 because the TCP packets have port number 80 is
high priority and will have higher precedence to be sent out from port 1.
ORT CLASSIFICATION
Table 4-21. IP TCP/UDP Port Classification screen options.
Parameter Description
Disable IP TCP/UDP Port
Classification
Down prioritize web browsing,
e-mail, FTP and news
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance
button to set up Special TCP/UDP port for QoS.
button to set up Special TCP/UDP port for QoS.
Prioritize IP Telephony (VoIP) Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance
Prioritize iSCSI Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance
Prioritize web browsing, e-mail,
FTP transfers and news
Prioritize Streaming
Audio/Video
Prioritize Databases (Oracle,
IBM DB2, SQL, Microsoft)
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance button set up Special TCP/UDP port for QoS.
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click
Advance button set up Special TCP/UDP port for QoS.
button set up Special TCP/UDP port for QoS.
button to set up Special TCP/UDP port for QoS.
button to set up Special TCP/UDP port for QoS
53
Page 57
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-21 (Continued). IP TCP/UDP Port Classification screen options.
Parameter Description
Advanced Mode
Display the TCP/UDP port number in L4 QoS. In “Disable IP
TCP/UDP Port Classification” mode, user can randomly choose
TCP/UDP port number that L4 QoS will affect. As to other
special L4 QoS events, Special TCP/UDP port number will be
took action. Of course, user could be allowed to add or modify
the port number at random. For instance, if we choose “Down
prioritize web browsing, e-mail, FTP and news” as the QoS of L4
and enter the “Advanced Mode”, then we can see that some
special port number 80, 280, 443, 25, 110, 20, 21, 69, 119, 2009
have been configured already. User also has the right to modify
these port numbers.
Special TCP/UDP class:
There are two modes for selection, including Low and High.
Default class (all other TCP/UDP ports):
There are two modes for selection, including Low and High.
Port:
User can set up the port (1~12) respectively to let Special
TDP/UDP class function work on them. If you would like to set
up all ports at a time, user is allowed to choose “All” selection to
simplify the procedure of configuration.
Special UDP/TCP Port Selection:
The following are port numbers defined by six specific networks
in L4:
⎯ Down prioritize web browsing, e-mail, FTP and news:
port number 80,280,443,25,110,20,21,69,119,2009
⎯ Prioritize IP Telephony (VoIP):1718,1719,1720
⎯ Prioritize iSCSI:3225,3260,3420
⎯ Prioritize web browsing, e-mail, FTP transfers and news:
80,280,443,25,110,20,21,69,119,2009
⎯ Prioritize Streaming Audio/Video:
2979,1755,7070,7071,554,8000
⎯ Prioritize Databases (Oracle, IBM DB2, SQL, Microsoft):
66,1571,1575,523,118,156,3306,1232,1433,1434
Simple Mode Press Simple button is to return to the screen that all L4 port
54
number will disappear.
Page 58
CHAPTER 4: Web-Based Management
4.7.5 IP D
In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of
differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a
codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused.
IP Diffserve Classification function, it can form total 64 (0~63) kinds of Traffic Class based on the arrangement
of 6-bit field in DSCP of the IP packet. In the switch, user is allowed to set up these 64 kinds of Class that
belong to High or Low Priority.
IFFSERV CLASSIFICATION
Table 4-22. IP Diffserv Classification screen options.
Parameter Description
IP Differentiated Services
(DiffServ) Configuration
Class 64 kinds of traffic as we mentioned above, user can set up High
Used for setting up the IP Differentiated Services Configuration
QoS.
Priority or Low Priority for each port respectively.
4.8 SNMP Configuration
Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can
manage the Managed devices equipped with SNMP agent, provided that the Management Information Base
(MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer
of information between SNMP manager and agent and traverses the Object Identity (OID) of the management
Information Base (MIB), described in the form of SMI syntax. SNMP agent is running on the switch to
response the request issued by SNMP manager.
Basically, it is passive except issuing the trap information. The switch supports a switch to turn on or off the
SNMP agent. If you set the field SNMP “Enable”, SNMP agent will be started up. All supported MIB OIDs,
including RMON MIB, can be accessed via SNMP manager. If the field SNMP is set “Disable”, SNMP agent will
be de-activated, the related Community Name, Trap Host IP Address, Trap and all MIB counters will be
ignored.
Table 4-23. SNMP Configuration screen options.
Parameter Description
SNMP Configuration
This function is used to configure SNMP settings, community
name, trap host and public traps as well as the throttle of SNMP.
A SNMP manager must pass the authentication by identifying
both community names, then it can access the MIB information of
the target device. So, both parties must have the same
community name. Once completing the setting, click Apply
button, the setting takes effect.
55
Page 59
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
SNMP The term SNMP here is used for the activation or de-activation of
SNMP. Default is Enable.
Get/Set/Trap Community Community name is used as password for authenticating if the
requesting network management unit belongs to the same
community group. If they both don’t have the same community
name, they don’t belong to the same group. Hence, the requesting
network management unit can not access the device with diff erent
community name via SNMP protocol; If they both have the same
community name, they can talk each other.
Community name is user-definable witha maximum length of 15
characters and is case sensitive. There is not allowed to put any
blank in the community name string. Any printable character is
allowable.
The community name for each function works independently. Each
function has its own community name. Say, the community name
for GET only works for GET function and can’t be applied to other
function such as SET and Trap.
Default SNMP function : Enable
Default community name for GET: public
Default community name for SET: private
Default community name for Tra p: public
Default Set function : Enable
Default trap host IP address: 0.0.0.0
Default port number :162
Trap In the switch, there are 6 trap hosts supported. Each of them has
its own community name and IP address; is user-definable. To set
up a trap host means to create a trap manager by assigning an IP
address to host the trap message. In other words, the trap host is a
network management unit with SNMP manager receiving the trap
message from the managed switch with SNMP agent issuing the
trap message. 6 trap hosts can prevent the important trap
message from losing.
For each public trap, the switch supports the trap event Cold Start,
Warm Start, Link Down, Link Up and Authentication Failure Trap.
They can be enabled or disabled individually. When enabled, the
corresponded trap will actively send a trap message to the trap
host when a trap happens. If all public traps are disabled, no public
trap message will be sent. As to the Enterprise (no. 6) trap is
classified as private trap, which are listed in the Trap Alarm
Configuration function folder.
56
Default for all public traps: Enable.
Page 60
CHAPTER 4: Web-Based Management
4.9 IGMP Snooping
The function, IGMP Snooping, is used to establish the multicast groups to forward the multicast packet to the
member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the
network. This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast
packet from the broadcast packet, so it can only treat them all as the broadcast packet. Without IGMP
Snooping, the multicast packet forwarding function is plain and nothing is different from broadcast packet.
A switch supported IGMP Snooping with the functions of query, report and leave, a type of packet exchanged
between IP Multicast Router/Switch and IP Multicast Host, can update the information of the Multicast table
when a member (port) joins or leaves an IP Multicast Destination Address. With this function, once a switch
receives an IP multicast packet, it will forward the packet to the members who joined in a specified IP multicast
group before.
The packets will be discarded by the IGMP Snooping if the user transmits multicast packets to the multicast
group that had not been built up in advance.
Table 4-24. IGMP Snooping screen options.
Parameter Description
IGMP Snooping IGMP is used to snoop the status of IP multicast groups and
display its associated information in both tagged VLAN and
non-tagged VLAN networks. Enabling IGMP with either passive
or active mode, you can monitor the IGMP snooping information,
which contains the multicast member list with the multicast groups,
VID and member port.
IGMP snooping mode selection The switch supports three kinds of IGMP Snooping st atus,
including “Passive”, “Active” and “Disable”.
Disable:
Set “Disable” mode to disable IGMP Snooping function.
Default: Disable
Active:
In Active mode, IGMP snooping switch will periodically issue the
Membership Query message to all hosts attached to it and gather
the Membership report message to update the database of the
Multicast table. By the way, this also reduces the unnecessary
multicast traffic.
Passive:
In Passive Snooping mode, the IGMP snooping will not periodically
poll the hosts in the groups. The switch will send a Membership
Query message to all hosts only when it has received a
Membership Query message from a router.
57
Page 61
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
IP Address Show all multicast groups IP addresses that are registered on this
device.
VLAN ID Show VLAN I D for each multicast group.
Member Port Show member ports that join each multicast group. Member port
may be only or more than one.
4.10 Max Packet Length
The switch is capable of dealing with 9k Jumbo Frames, which suits the transmission for a large amount of data
in the network environment.
Table 4-25. Max Packet Length screen options.
Parameter Description
Jumbo Frame (bytes) Set up the maximum length of the packet that each port of the
switch can accept. Maximum length can be up to 1532 bytes or
9208 bytes. The default is 1532 bytes.
4.11 DHCP Boot
The DHCP Boot function is used to spread the request broadcast packet into a bigger time frame to prevent
the traffic congestion due to broadcast packets from many network devices which may seek its NMS, boot server,
DHCP server and many connections predefined when the whole building or block lose the power and then
reboot and recover. At this moment, a bunch of switch or other network device on the LAN will try its best to
find the server to get the services or try to set up the predefined links, they will issue many broadcast packets in
the network.
The switch supports a random delay time for DHCP and boot delay for each device. This suppresses the
broadcast storm while all devices are at booting stage in the same time. The maximum user-defined delay time
is 30 sec.If DHCP Broadcasting Suppression function is enabled, the delay time is set randomly, ranging from 0
to 30 seconds, because the exactly delay time is computed by the switch itself. The default is “Disable”.
4.12 VLAN
The switch supports Tag-based VLAN (802.1q) and Port-based VLAN. Support 256 active VLANs and VLAN
ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly
configuring it, you can gain not only improving security and increasing performance but greatly reducing
VLAN management.
58
Page 62
CHAPTER 4: Web-Based Management
4.12.1 VLAN MODE
The VLAN Mode Selection function includes five modes: Port-based, Tag- based, Metro Mode, Double-tag and
Disable, you can choose one of them by pulling down list and selecting an item. Then, click Apply button, the
settings will take effect immediately.
Table 4-26. VLAN Mode screen options.
Parameter Description
VLAN Mode Disable: Stop VLAN function on the switch. In this mode, no VLAN is applied
to the switch. This is the default setting.
Port-based: Port-based VLAN is defined by port. Any packet coming in or
outgoing from any one port of a port-based VLAN will be accepted. No
filtering criterion applies in port-based VLAN. The only criterion is the
physical port you connect to. For example, for a port-based VLAN named
PVLAN-1 contains port members Port 1&2&3&4. If you are on the port 1, you
can communicate with port 2&3&4. If you are on the port 5, then you cannot
talk to them. Each port-based VLAN you built up must be assigned a group
name. This switch can support up to maximal 12 port-based VLAN groups.
Tag-based: Tag-based VLAN identifies its member by VID. This is quite
different from port-based VLAN. If there are any more rules in ingress filtering
list or egress filtering list, the packet will be screened with more filtering
criteria to determine if it can be forwarded. The switch supports sup plement
of 802.1q.
Each tag-based VLAN you built up must be assigned VLAN name and VLAN
ID. V alid VLAN ID is 1-409 4. User can create tot al up to 64 Tag VLAN groups.
Metro Mode: The Metro Mode is a quick configuration VLAN environment
method on Port-based VLAN. It will create 10 or 11 Port-based VLAN groups.
Double-tag: Double-tag mode belongs to the tag-based mode, however, it
would treat all frames as the untagged ones, which means that t ag with PVID
will be added into all packets. Then, these packets will be forwarded as
Tag-based VLAN. So, the incoming packets with tag will become the
double-tag ones.
Up-link Port This function is enabled only when metro mode is chosen in VLAN mode.
1 1: Except Port 11, each port of the switch cannot transmit packets with each
other. Each port groups a VLAN with Port 11, thus, total 11 groups
consisting of 2 members are formed.
12: Except Port 12, each port of the switch cannot transmit pa cket s wit h each
other. Each port groups a VLAN with Port 12, thus, total 11 groups
consisting of 2 members are formed.
11 & 12: Except Port 11 a nd Port 12, each port of the switch cannot transmit
packets with each other. Each port groups a VLAN with Port 11 and Port 12,
thus, total 10 groups consisting of 3 members are formed.
59
Page 63
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.12.2 T
AG-BASED GROUP
It shows the information of existed Tag-based VLAN Groups, You can also easily create, edit and delete a
Tag-based VLAN group by pressing Add, Edit and Delete function buttons. User can add a new VLAN group
by inputting a new VLAN name and VLAN ID.
Table 4-27. Tag-Based Group screen settings.
Parameter Description
VLAN Name The name defined by administrator is associated with a VLAN
group. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters. The
maximal length is 15 characters.
VID VLAN identifier. Each tag-based VLAN group has a unique VID. It
appears only in tag-based and Double-tag mode.
SYM-VLAN While the SYM-VLAN function of the group is enabled, all packets
with this group VID will be dropped in case they are transmitted
from the ports that do not belong to this group.
Member This is used to enable or disable if a port is a member of the new
added VLAN, “Enable” means it is a member of the VLAN. Just tick
the check box (;) beside the port x to enable it.
Add Group Create a new Tag-based VLAN. Input the VLAN name as well as
VID, configure the SYM-VLAN function and choose the member by
ticking the check box beside the port No., then, press the Apply
button to have the setting taken effect.
Delete Group Just press the Delete button to remove the selected group entry
from the Tag-based group table
Edit a group Just select a group entry and press the Edit button, then you can
modify a group’s description, SYM-VLAN and member set.
4.12.3 PORT-BASED GROUP
It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a
Port-based VLAN group by pressing Add, Edit and Delete function buttons. User can add a new VLAN group
by inputting a new VLAN name.
60
Page 64
CHAPTER 4: Web-Based Management
Table 4-28. Port-Based Group screen options.
Parameter Description
VLAN Name The name defined by administrator is associated with a VLAN
group. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters. The
maximal length is 15 characters.
Member This is used to enable or disable if a port is a member of the new
added VLAN, “Enable” means it is a member of the VLAN. Just tick
the check box (;) beside the port x to enable it.
Add Group Create a new Port-based VLAN. Input the VLAN name and
choose the member by ticking the check box beside the port
No., then, press the Apply button to have the setting taken
effect.
Delete Group Just press the Delete button to remove the selected group
entry from the Port-based group table.
Edit a group Just select a group entry and press the Edit button, then you
can modify a group‘s description and member set
4.12.4 TAG RULE
In VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to
4094. User also can choose ingress filtering rules to each port. There are two ingress filtering rules which can
be applied to the switch. The Ingress Filtering Rule 1 is “forward only packets with VID matching this port’s
configured VID”. The Ingress Filtering Rule 2 is “drop untagged frame”. You can also select the Role of each
port as Access, Trunk, or Hybrid.
Table 4-29. Tag Rule screen options.
Parameter Description
PVID This PVID range will be 1-4094. Before you set a number x as PVID,
you have to create a Tag-based VLAN with VID x. For example, if port
x receives an untagged packet, the switch will apply the PVID (assume
as VID y) of port x to tag this packet, the packet then will be forwarded
as the tagged packet with VID y.
Rule 1 Forward only packets with VID matching this port’s configured VID. You
can apply Rule 1 as a way to a given port to filter unwanted traffic. In
Rule 1, a given port checks if the given port is a member of the VLAN
on which the received packet belongs to, to determine forward it or not.
For example, if port 1 receives a tagged packet with VID=100 (VLA N
name=VLAN100), and if Rule 1 is enabled, the switch will check if port
1 is a member of VLAN100. If yes, the received packet is forwarded;
otherwise, the received packet is dropped.
61
Page 65
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-29 (Continued). Tag Rule screen options.
Parameter Description
Rule 2 Drop untagged frame. You can configure a given port to accept all
frames (Tagged and Untagged) or just receive tagged frame. If the
former is the case, then the packets with tagged or untagged will be
processed. If the later is the case, only the packets carrying VLAN tag
will be processed, the rest packets will be discarded.
Note
If Rule 1 is enabled and port 1, for example, receives an untagged
packet, the switch will apply the PVID of port 1 to tag this packet, the
packet then will be forwarded. But if the PVID of port 1 is 100 and port
1 is not member of VLAN 100, the packet will be dropped.
Role This is an egress rule of the port. Here you can choo se Access, Trunk
or Hybrid. Trunk means the outgoing packets must carry VLAN tag
header. Access means the outgoing packets carry no VLAN tag
header. If p ackets have do uble VLAN tags, one will b e dropped and the
other will still be left. As to Hybrid, it is similar to Trun k, and both of
them will tag-out. When the port is set to Hybrid, its packets will be
untagged out if the VID of the outgoing packets with tag is the same as
the one in the field of Untag VID of this port.
Untag VID Valid range is 1~4094. It works only when Role is set to Hybrid.
4.13 MAC Table
MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table
Maintenance, Static Forward, Static Filter and MAC Alias, which cannot be categorized to some function type.
They are described below.
4.13.1 MAC T
Parameter Description
MAC Table Information Display the static or dynamic learning MAC entry and the state for
Port Select the port you would like to inquire.
Search Set up the MAC entry you would like to inquire.
ABLE INFORMATION
Table 4-30. MAC Table screen options.
the selected port.
The default is ??-??-??-??-??-??
62
Page 66
Table 4-30 (continued). MAC Table screen options.
CHAPTER 4: Web-Based Management
Parameter Description
MAC Display the MAC address of one entry you selected from the
searched MAC entries table.
Alias Set up the Alias for the selected MAC entry.
Set Alias Save the Alias of MAC entry you set up.
Search Find the entry that meets your setup
Previous Page Move to the previous page.
Next Page Move to the next page.
Alias The Alias of the searched entry .
MAC Address The MAC address of the searched entry.
Port The port that exists in the searched MAC Entry.
VID VLAN Group that MAC Entry exists.
State Display the method that this MAC Entry is built. It may show
“Dynamic MAC” or “St atic MAC”.
4.13.2 MAC TABLE MAINTENANCE
This function can allow the user to set up the processing mechanism of MAC Table. An idle MAC address
exceeding MAC Address Age-out Time will be removed from the MAC Table. The range of Age-out Time is
10-65535 seconds, and the setup of this time will have no effect on static MAC addresses.
Table 4-31. MAC Table Maintenance screen options.
Parameter Description
Aging Time Delete a MAC address idling for a period of time from the MAC
Table, which will not affect static MAC address. Range of MAC
Address Agin g Time is 10-65535 seconds. The default Aging Time
is 300 seconds.
Flush Remove all entries that do not belong to the static Mac Entry from
the MAC Table.
63
Page 67
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.13.3 STATIC FORWARD
Static Forward is a function that allows the user in the static forward table to access a specified port of the switch.
Static Forward table associated with a specified port of a switch is set up by manually inputting MAC address
and its alias name.
When a MAC address is assigned to a specific port, all of the switch’s traffics sent to this MAC address will be
forwarded to this port.
For adding a MAC address entry in the allowed table, you just need to fill in four parameters: MAC address,
associated port, VID and Alias. Just select the existed MAC address entry you want and click Delete button, you
also can remove it.
Table 4-32. Static Forward screen options.
Parameter Description
MAC It is a six-byte long Ethernet hardware address and usually
expressed by hex and separated by hyphens. For example,
00 – 40 - C7 - D6 – 00 - 00
Port No Port number of the switch. It is 1 ~12.
VID VLAN identifier. This will be filled only when tagged VLAN is
applied. Valid range is 1 ~ 4094.
Alias MAC alias name you assign.
4.13.4 STATIC FILTER
Static Filter is a function that denies the packet forwarding if the packet’s MAC Address is listed in the filtering
Static Filter table. User can very easily maintain the table by filling in MAC Address, VID (VLAN ID) and Alias fields
individually. User also can delete the existed entry by clicking Delete button.
Table 4-31. GVRP Group Information screen options.
Parameter Description
MAC It is a six-byte long Ethernet hardware address and usually
expressed by hex and separated by hyphens. For example,
VID VLAN identifier. When GVRP group creates, each dynamic
Alias MAC alias name you assign.
64
00 – 40 - C7 - D6 – 00 - 02
VLAN group owns its VID. Valid range is 1 ~ 4094.
Page 68
CHAPTER 4: Web-Based Management
4.13.5 MAC A
MAC Alias function is used to let you assign MAC address a plain English name. This will help you tell which
MAC address belongs to which user in the illegal access report. At the initial time, it shows all pairs of the
existed alias name and MAC address.
There are three MAC alias functions in this function folder, including MAC Alias Add, MAC Alias Edit and
MAC Alias Delete. You can click Create/Edit button to add/modify a new or an existed alias name for a
specified MAC address, or mark an existed entry to delete it. Alias name must be composed of A-Z, a-z and 0-9
only and has a maximal length of 15 characters.
LIAS
Table 4-32. MAC Alias screen options.
Parameter Description
MAC Alias Create/Edit or
Delete
In the MAC Alias function, MAC Alias Add/Edit function is used to
let you add or modify an association between MAC address and a
plain English name. User can click Create/Edit button to add a
new record with name.
As to MAC Alias Delete function is used to let you remove an alias
name to a MAC address. You can select an existed MAC address
or alias name to remove.
MAC Address It is a six-byte long Ethernet hardware address and usually
expressed by hex and separated by hyphens. For example,
00 – 40 - C7 - D6 – 00 - 01
Alias MAC alias name you assign.
NOTE
If there are too many MAC addresses learned in the table, we
recommend you inputting the MAC address and alias name
directly.
4.14 GVRP Configuration
GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically
and dynamically maintain the group membership informationof the VLANs. The GVRP offers the function
providing the VLAN registration service through a GARP application. It makes use of GARP Information
Declaration (GID) to maintain the ports associated with their attribute database and GARP Information
Propagation (GIP) to communicate among switches and end stations. With GID information and GIP, GVRP
state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate
these information to other GVRP-aware devices to setup and update their knowledge database, the set of
VLANs associated with currently active members, and through which ports these members can be reached.
In GVRP Configuration function folder, there are three functions supported, including GVRP Config, GVRP
Counter and GVRP Group explained below.
65
Page 69
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.14.1 GVRP C
Parameter Description
GVRP Config In the function of GVRP Config, it is used to configure each port’s
GVRP State Setting This function is simply to let you enable or disable GVRP function.
Join Time Used to declare the Join T ime in unit of centisecond. Valid time
Leave Time Used to declare the Leave T i me in unit of centisecond. Valid time
Leave All Time A time period for announcement that all registered device is going
ONFIG
Table 4-33. GVRP Configuration screen options.
GVRP operation mode, in which there are seven parameters
needed to be configured described below.
You can pull down the list and click the Downward arrow key to
choose Enable or Disable. Then, click the Apply button, the
system will take effect immediately.
to be de-registered. If someone still issues a new join, then a
registration will be kept in the switch. Valid range: 1000-5000 unit
time, Default: 1000 unit time.
Default Applicant Mode The mode here means the type of participant. There are two
modes, normal participant and non-participant, provided for the
user’s choice.
Normal: It is Normal Participant. In this mode, the switch
participates normally in GARP protocol exchanges. The default
setting is Normal.
Non-Participant: It is Non-Participant. In t his mode, the switch does
not send or reply any GARP messages. It just listens messages
and reacts for the received GVRP BPDU.
Default Registrar Mode The mode here means the type of Registrar. There are three types
of parameters for registrar administrative control value, normal
registrar, fixed registrar and forbidden registrar, provided for the
user’s choice.
Normal: It is Normal Registration. The Registrar responds normally
to incoming GARP messages. The default setting is Normal.
Fixed: It is Registration Fixed. The Registrar ignores all GARP
messages, and all members remain in the registered (IN) state.
Forbidden: It is Registration Forbidden. The Registrar ignores all
GARP messages, and all members remain in the unregistered
(EMPTY) state.
Restricted Mode This function is used to restrict dynamic VLAN be created wh en
this port received GVRP PDU. There are two modes, disable and
enable, provided for the user’s choice.
Disabled: In this mode, the switch dynamic VLAN will be created
when this port received GVRP PDU. The default setting is Normal.
Enabled: In this mode, the switch does not create dynamic VLAN
when this port received GVRP PDU. Except received dynamic
VLAN message of the GVRP PDU is an existed static VLAN in the
switch, this port will be added into the static VLAN members
dynamically.
4.14.2 GVRP COUNTER
All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the
GVRP actions. Actually, they are GARP packets.
Table 4-34. GVRP Counter screen options.
Parameter Description
Total GVRP Packets Total GVRP BPDU is received/ transmitted by the GVRP
application.
Invalid GVRP Packets Number of invalid GARP BPDU is received/ transmitted by the
GARP application.
LeaveAll Message Packets Number of GARP BPDU with Leave All message is received/
transmitted by the GARP application.
67
Page 71
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is received/
transmitted by the GARP application.
JoinIn Message Packets Number of GARP BPDU with Join In message is received/
transmitted by the GARP application.
LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is received/
transmitted by the GARP application.
Empty Message Packets Number of GARP BPDU with Empty message is received/
transmitted by the GARP application.
4.14.3 GVRP GROUP INFORMATION
Table 4-35. GVRP Group Information screen options.
Parameter Description
Current Dynamic Group Number The number of GVRP group that are created currently.
VID VLAN identifier. When GVRP group creates, each dynamic
VLAN group owns its VID. Valid range is 1 ~ 4094.
Member Port Those are the members belonging to the same dynamic VLAN
group.
Edit Administrative Control When you create GVRP group, you can use Administrative
Control function to change Applicant Mode and Registrar Mode
of GVRP group member.
Refresh Refresh function can help you to see current GVRP group st atus.
4.15 STP Configuration
The Spanning Tree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loops in switched
networks. When STP is enabled, ensure that only one path is active between any two nodes on the network at a
time. User can enable Spanning Tree Protocol on switch’s web management and then set up other advanced
items. We recommend that you enable STP on all switches to ensure a single active path on the network.
68
Page 72
CHAPTER 4: Web-Based Management
4.15.1 STP S
TATUS
In the Spanning Tree Status, user can read 12 parameters to know STP current status. The 12 parameters’
description is listed in the following table.
Table 4-36. STP Status screen options.
Parameter Description
STP State Show the current STP Enabled / Disabled status. Default is Disabled.
Bridge ID Show switch’s bridge ID which stands for the MAC address of this
switch.
Bridge Priority Show this switch’s current bridge priority setting. Default is 32768.
Designated Root Show root bridge ID of this network segment. If this switch is a root
bridge, the Designated Root will show this switch’s bridge ID.
Designated Priority Show the current root bridge priority
Root Port Show port number connected to root bridge with the lowest path cost.
Root Path Cost Show the path cost between the root port and the designated port of
the root bridge.
Current Max. Age Show the current root bridge maximum age time. Maximum age time is
used to monitor if STP topology needs to change. When a bridge does
not receive a hello message from root bridge until the maximum age
time is counted down to 0, the bridge will treat the root bridge
malfunctioned and issue a Topology Change Notification (TCN) BPDU
to all other bridges.
All bridges in the LAN will re-learn and determine which the ro ot bridge
is. Maximum Age time is assigned by root bridge in unit of seconds.
Default is 20 seconds.
Current Forward Delay Show the current root bridge forward delay time. The value of Forward
Delay time is set by root. The Forward Delay time is defined as the
time spent from Listening state moved to Learning state or from
Learning state moved to Forwarding state of a port in bridge.
Hello Time Show the current hello time of the root bridge. Hello time is a time
interval specified by root bridge, used to request all other bridges
periodically sending hello message every “hello time” seconds to the
bridge attached to its designated port.
69
Page 73
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-36 (Continued). STP Status screen options.
Parameter Description
STP Topology Change Count STP Topology Change Count expresses the time spent in unit of
seconds since the beginning of the Spanning Tree Topology
Change to the end of the STP convergence. Once the STP chan ge
is converged, the Topology Change count will be reset to 0. The
figures showing in the screen may not be the exact time it spent
but very close to, because the time is eclipsing.
Time Since Last Topology
Change
Time Since Last Topology Change is the accumulated time in unit
of seconds the STP has been since the last STP Topology Change
was made. When Topology Change is initiated again, this counter
will be reset to 0. And it will also count again once STP topology
Change is completed.
4.15.2 STP CONFIGURATION
The STP, Spanning Tree Protocol, actually includes RSTP. In the Spanning Tree Configuration, there are six
parameters open for the user to configure as user’s idea. Each parameter description is listed below.
Table 4-37. STP Configuration screen options.
Parameter Description
STP Configuration User can set the following Spanning Tre e parameters to control STP
function enable/disable, select mode RSTP/STP and affect STP
state machine behavior to send BPDU in this switch. The default
setting of Spa nning Tree Protocol is Disable.
Spanni ng Tree Protocol Set 802.1W Rapid STP function Enable / Disable. De fault is Disable.
Bridge Priority The lower the bridge priority is, the higher priority it has. Usually, the
bridge with the highest bridge priority is the root. If you want to have
the LPB200Aas root bridge, you can set this value lower than that of
bridge in the LAN. The valid value is 0 ~ 61440. The default is 32768.
Hello Time Hello Time is used to determine the periodic time to send normal
70
BPDU from designated ports among bridges. It decides how long a
bridge should send this message to other bridge to tell I am alive.
When the LPB200Ais the root bridge of the LAN, for example, all
other bridges will use the hello time assigned by this switch to
communicate with each other. The valid value is 1 ~ 10 in unit of
second.
Max. Age When the LPB200A is the root brid ge, the whole LAN will apply this
figure set by this switch as their maximum age time. When a bridge
received a BPDU originated from the root bridge and if the
message age conveyed in the BPDU exceeds the Max. Age of the
root bridge, the bridge will treat the root bridge malfunctioned and
issue a Topology Change Notification (TCN) BPDU to all other
bridges. All bridges in the LAN will re-calculate and determine who
the root bridge is. The valid value of Max. Age is 6 ~ 40 seconds.
Default is 20 seconds.
Forward Delay You can set the root bridge forward delay time. This figure is set by
root bridge only. The forward delay time is defined as the time
spent from Listening state moved to Learning state and also from
Learning state moved to Forwarding state of a port in bridge. The
forward delay time contains two states, Listening state to Learning
state and Learning state to Forwarding state. It assumes that
forward delay time is 15 seconds, then total forward delay time will
be 30 seconds. This has much to do with the STP convergent time
which will be more than 30 seconds because some other factors.
The valid value is 4 ~ 30 seconds, default is 15 seconds
Force Versio n Two options are offered for the user’s choosing STP algorithm.
One is RSTP and the other is STP. If STP is chosen, RSTP will
run as a legacy STP. The switch supports RSTP (802.1w) which is
backward compatible with STP (802.1d).
4.15.3 STP P
ORT CONFIGURATION
In the STP Port Setting, one item selection and fiveparameters settings are offered for user’s setup. User can
disable and enable each port by selecting each Port Status item. User also can set Path Cost and Priority of
each port by filling in the desired value and set Admin Edge Port and Admin Point To Point by selecting the
desired item.
71
Page 75
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-
38. STP Port setting screen options.
Parameter Description
Port Status It displays the current state of a port. We cannot manually set it
because it displays the status only. There are three possible
states. ( according to 802.1w specification).
DISCARDING state indicates that this port can neither forward
packets nor contribute learning knowledge.
Note
Three other states (Disable state, BLOCKING state and
LISTENING state) defined in the 802.1d specification are now all
represented as DISCARDING state.
LEARNING state indicates this port can now contribute its
learning knowledge but cannot forward packets still.
FORWARDING state indicates this port can both contribute its
learning knowledge and forward packets no rmally.
Path Cost Status It is the contribution value of the path through this port to Root
Bridge. STP algorithm determines a best path to Root Bridge by
calculating the sum of path cost contributed by all ports on this
path. A port with a smaller path cost value would become the Root
Port more possibly.
Configured Path Cost The range is 0 – 200,000,000. In the switch, if path cost is set to be
zero, the STP will get the recommended value resulted from
auto-negotiation of the link accordingly and display this value in the
field of Path Cost Status. Otherwise, it may show the value that the
administrator set up in Configured Path Cost and Path Cost St atus.
Priority Priority here means Port Priority. Port Priority and Port Number are
mixed to form the Port ID. Port IDs are often compared in order to
determine which port of a bridge would become the Root Port. The
range is 0 – 240.
Default is 128.
72
Page 76
CHAPTER 4: Web-Based Management
4.16 Trunking Configuration
The Port Trunking Configuration is used to configure the settings of Link Aggregation. You can bundle more
than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical
port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipments to
build the bandwidth aggregation. For example, if there are three Fast Ethernet ports aggregated in a logical
port, then this logical port has bandwidth three times as high as a single Fast Ethernet port has.
The switch supports two kinds of port trunking methods:
LACP
Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking
method can choose their unique LACP GroupID (1~3) to form a logic “trunked port”. The benefit of using
LACP is that a port makes an agreement with its peer port before it becomes a ready member of a “trunk
group” (also called aggregator). LACP is safer than the other trunking method - static trunk.
The switch LACP does not support the followings:
- Link Aggregation across switches
- Aggregation with non-IEEE 802.3 MAC link
- Operating in half-duplex mode
- Aggregate the ports with different data rates
Static Trunk
Ports using Static Trunk as their trunk method can choose their unique Static GroupID (also 1~3, this Static
groupID can be the same with another LACP groupID) to form a logic trunked port. The benefit of using
Static Trunk method is that a port can immediately become a member of a trunk group without any
handshaking with its peer port. This is also a disadvantage because the peer ports of your static trunk group
may not know that they should be aggregate together to form a logic trunked port. Using Static Trunk on both
end of a link is strongly recommended. Please also note that low speed links will stay in “not ready” state when
using static trunk to aggregate with high speed links.
As to system restrictions about the port aggregation function on the switch, in the management point of view,
the switch supports maximum 3 trunk groups for LACP and additional 3 trunk groups for Static Trunk. But in
the system capability view, only 3 real trunked groups are supported. An LACP trunk group with more than one
ready member-ports is a real trunked group. An LACP trunk group with only one or less than one ready
member-ports is not a real trunked group. Any Static trunk group is a real trunked group.
Per Trunking Group supports a maximum of 12 ready member-ports. Please note that some decisions will
automatically be made by the system while you are configuring your trunking ports. Some configuration
examples are listed below.
Rule 1: 12 ports have already used Static Trunk Group ID 1, the 13th port willing to use the same Static
Trunk Group ID will be automatically set to use the “None” trunking method and its Group ID will
turn to 0. This means the port won’t aggregate with other ports.
Rule 2: 14 ports all use LACP Trunk Group ID 1 at most 12 ports can aggregate together and transit into
the ready state.
Rule 3: A port using the “None“ trunking method or Group ID 0 will be automatically set to use the “None”
trunking method with Group ID 0.
73
Page 77
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.16.1 P
ORT SETTING/ STATUS
Port setting/status is used to configure the trunk property of each and every port in the switch system.
Table 4-39. Port Setting/ Status screen options.
Parameter Description
Method This determines the method a port uses to aggregate with other
ports.
None: A port does not want to aggregate with any other port should
choose this default setting.
LACP: A port use LACP as its trunk method to get aggregated with
other ports also using LACP.
Static: A port use Static Trunk as its trunk method to g et aggregated
with other ports also using Static Trunk.
Group Ports choosing the same trunking method other than None must be
assigned a unique Group number (i.e. Group ID, valid value is from 1
to 12) in order to declare that they wish to aggregate with each other.
Active LACP This field is only referenced when a port’s trunking method is LACP.
Active: An Active LACP port begins to send LACPDU to its link
partner right after the LACP protocol entity started to take control of
this port.
Passive: A Passive LACP port will not actively send LACPDU out
before it receives an LACPDU from its link partner.
Aggtr Aggtr is an abbreviation of aggregator. Every port is also an
aggregator, and its own aggregator ID is the same as its own Port
No. We can regard an aggregator as a representative of a trunking
group. Ports with same Group ID and using same trunking method
will have the opportunity to aggregate to a particular aggre gator port.
This aggregator port is usually the port with the smallest Port No.
within the trunking group.
Status This field represents the trunking status of a port which uses a
trunking method other than None. It also represents the
management link status of a port which uses the “None” trunking
method. --- means not ready.
74
Page 78
CHAPTER 4: Web-Based Management
4.16.2 A
To display the current port trunking information from the aggregator point of view.
GGREGATOR VIEW
Table 4-40. Aggregator View screen options.
Parameter Description
Aggregator It shows the aggregator ID (from 1 to 12) of every port. In fact, every
port is also an aggregator , and its own aggregator ID is the same as
its own Port No.
Method Show the method a port uses to aggregate with other ports.
Member Ports Show all member ports of an aggregator (port).
Ready Ports Show only the ready member ports within an aggregator (port).
This page shows the detailed information of the LACP trunking group.
Table 4-41. LACP Detail screen options.
Parameter Description
Actor The switch you are watching on.
Partner The peer system from this aggregator’s view.
System Priority Show the System Priority part of a system ID.
MAC Address Show the MAC Address part of a system ID.
Port Show the port number part of an LACP port ID.
Key Show the key value of the aggregator. The key value is determined
by the LACP protocol entity and can’t be set through management.
Trunk Status Show the trunk status of a single member port. --- means not ready.
75
Page 79
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.16.3 LACP S
It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer
link partners are all on a single system. Each system supports LACP will be assigned a globally unique System
Identifier for this purpose. A system ID is a 64-bit field comprising a 48-bit MAC Address and 16-bit priority
value.
YSTEM CONFIG
Table 4-42. LACP System Configuration screen options.
Parameter Description
System Priority The System Priority can be set by the user. Its range is from 1 to
65535. Default: 32768.
Hash Method DA+SA, DA and SA are three Hash methods offered for the Link
Aggregation of the switch. Packets will decide the path to transmit
according to the mode of Hash you choose.
Default: DA and SA
4.17 802.1x Configuration
802.1x port-based network access control provides a method to restrict users to access network resources via
authenticating user’s information. This restricts users from gaining access to the network resources through a
802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x
control, he (she) must firstly input his (her) account name for authentication and waits for gaining
authorization before sending or receiving any packets from a 802.1x-enabled port.
Before the devices or end stations can access the network resources through the ports under 802.1x control,
the devices or end stations connected to a controlled port send the authentication request to the authenticator,
the authenticator pass the request to the authentication server to authenticate and verify, and the server tell the
authenticator if the request get the grant of authorization for the ports.
According to IEEE802.1x, there are three components implemented. They are Authenticator, Supplicant and
Authentication server shown in Fig. 4-1.
Supplicant:
It is an entity being authenticated by an authenticator. It is used to communicate with the Authenticator PAE
(Port Access Entity) by exchanging the authentication message when the Authenticator PAE request to it.
Authenticator:
An entity facilitates the authentication of the supplicant entity. It controls the state of the port, authorized or
unauthorized, according to the result of authentication message exchanged between it and a supplicant PAE.
The authenticator may request the supplicant to re-authenticate itself at a configured time period. Once start
re-authenticating the supplicant, the controlled port keeps in the authorized state until re-authentication fails.
76
Page 80
CHAPTER 4: Web-Based Management
A port acting as an authenticator is thought to be two logical ports, a controlled port and an uncontrolled port.
A controlled port can only pass the packets when the authenticator PAE is authorized, and otherwise, an
uncontrolled port will unconditionally pass the packets with PAE group MAC address, which has the value of
01-80-c2-00-00-03 and will not be forwarded by MAC bridge, at any time.
Authentication server:
A device provides authentication service, through EAP, to an authenticator by using authentication credentials
supplied by the supplicant to determine if the supplicant is authorized to access the network resource.
The overview of operation flow for the Fig. 4-1 is quite simple. When Supplicant PAE issues a request to
Authenticator PAE, Authenticator and Supplicant exchanges authentication message. Then, Authenticator
passes the request to RADIUS server to verify. Finally, RADIUS server replies if the request is granted or denied.
While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol
over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator
exchanges the message to authentication server using EAP encapsulation. Before successfully authenticating,
the supplicant can only touch the authenticator to perform authentication message exchange or access the
network from the uncontrolled port.
Supplicant’s
System
Supplicant
PAE
Authenticator’s System
Services Offered
by Authenticator
(e.g Bridge Relay)
Port Authorize
Authenticator
PAE
Uncontrolled portControlled port
MAC Enable
Authentication
Server’s System
Authentication
Server
LAN
Figure 4-1.
In the Fig. 4-2, this is the typical configuration, a single supplicant, an authenticator and an authentication
server. B and C is in the internal network, D is Authentication server running RADIUS, switch at the central
location acts Authenticator connecting to PC A and A is a PC outside the controlled port, running Supplicant
PAE. In this case, PC A wants to access the services on device B and C, first, it must exchange the authentication
message with the authenticator on the port it connected via EAPOL packet. The authenticator transfers the
supplicant’s credentials to Authentication server for verification. If success, the authentication server will notice
the authenticator the grant. PC A, then, is allowed to access B and C via the switch. If there are two switches
directly connected together instead of single one, for the link connecting two switches, it may have to act two
port roles at the end of the link: authenticator and supplicant, because the traffic is bi-directional.
77
Page 81
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Authentication server
C
Authenticator
B
Supplicant A
Figure 4-2.
The Fig. 4-3 shows the procedure of 802.1x authentication. There are steps for the login based on 802.1x port
access control management. The protocol used in the right side is EAPOL and the left side is EAP.
1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in
unauthorized state. So the access is blocked in this stage.
2. Initiating a session. Either authenticator or supplicant can initiate the message exchange. If supplicant
initiates the process, it sends EAPOL-start packet to the authenticator PAE and authenticator will
immediately respond EAP-Request/Identity packet.
3. The authenticator always periodically sends EAP-Request/Identity to the supplicant for requesting the
identity it wants to be authenticated.
4. If the authenticator doesn’t send EAP-Request/Identity, the supplicant will initiate EAPOL-Start the
process by sending to the authenticator.
5. And next, the Supplicant replies an EAP-Response/Identity to the authenticator. The authenticator will
embed the user ID into Radius-Access-Request command and send it to the authentication server for
confirming its identity.
6. After receiving the Radius-Access-Request, the authentication server sends Radius-Access-Challenge to the
supplicant for asking for inputting user password via the authenticator PAE.
7. The supplicant will convert user password into the credential information, perhaps, in MD5 format and
replies an EAP-Response with this credential information as well as the specified authentication algorithm
(MD5 or OTP) to Authentication server via the authenticator PAE. As per the value of the type field in
message PDU, the authentication server knows which algorithm should be applied to authenticate the
credential information, EAP-MD5 (Message Digest 5) or EAP-OTP (One Time Password) or other else
algorithm.
8. If user ID and password is correct, the authentication server will send a Radius-Access-Accept to the
authenticator. If not correct, the authentication server will send a Radius-Access-Reject.
78
Page 82
CHAPTER 4: Web-Based Management
9. When the authenticator PAE receives a Radius-Access-Accept, it will send an EAP-Success to the supplicant.
At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x
control is in the authorized state. The supplicant and other devices connected to this port can access the
network. If the authenticator receives a Radius-Access-Reject, it will send an EAP-Failure to the supplicant.
This means the supplicant is failed to authenticate. The port it connected is in the unauthorized state, the
supplicant and the devices connected to this port won’t be allowed to access the network.
10. When the supplicant issue an EAP-Logoff message to Authentication server, the port you are using is set
to be unauthorized.
PC
Port connect
EAPOL-Start
EAPOLEAP
EAP-Request/Identity
EAP-Response/Identity
EAP-Request
EAP-Response (cred)
EAP-Success
EAP-Logoff
EAP-Failure
Bridge
LAN
Access blocked
Authenticator
Access allowed
Radius Server
Radius
Radius-Access-Request
Radius-Access-Challenge
Radius-Access-Request
Radius-Access-Accept
Figure 4-3.
Only MultiHost 802.1X is the type of authentication supported in the switch. In this mode, for the devices
connected to this port, once a supplicant is authorized, the devices connected to this port can access the
network resource through this port.
802.1x Port-based Network Access Control function supported by the switch is little bit complex, for it just
support basic Multihost mode, which can distinguish the device’s MAC address and its VID. The following table
is the summary of the combination of the authentication status and the port status versus the status of port
mode, set in 802.1x Port mode, port control state, set in 802.1x port setting. Here Entry Authorized means
MAC entry is authorized.
79
Page 83
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-43.
Port Mode Port Control Authentication Port Status
Disable Don’t Care Don’t Care Port Uncontrolled
Multihost Auto Successful Port Authorized
Multihost Auto Failure Port Unauthorized
Multihost ForceUnauthorized Don’t Care Port Unauthorized
Multihost ForceAuthorized Don’t Care Port Authorized
4.17.1 802.1x S
Parameter Description
802.1x State Setting This function is used to configure the global parameters for RADIUS
Radius Server RADIUS server IP address for authentication.
Port Number The port number to communicate with RADIUS server for the
Secret Key The secret key between authentication server and authenticator. It is
TATE SETTING
Table 4-44. 802.1x Configuration screen options.
authentication in 802.1x port security application.
Default: 192.168.1.1
authentication service. The valid value ranges 1-65535.
Default port number is 1812.
a string with the length 1 – 31 characters. The character string may
contain upper case, lower case and 0-9. It is character sense. It is
not allowed for putting a blank between any two characters.
Default: Radius
80
Page 84
CHAPTER 4: Web-Based Management
4.17.2 802.1x M
ODE SETTING
Set the operation mode of 802.1X for each port. In this device, it supports only Multi-host operation mode.
Table 4-45. 802.1x Mode Setting screen options.
Parameter Description
Port Number Indicate which port is selected to configure the 802.1x operation
mode.
802.1x Mode 802.1x operation mode. There are two options, including Disable and
Multi-host mode. Default is Disable.
Disable: It will have the chosen port acting as a plain port, that is no
802.1x port access control works on the port.
802.1x with Multi-host: In Multi-host mode, for the devices connected
to this port, once a supplicant is authorized, the devices connected to
this port can access the network resource through this port.
4.17.3 P
ORT SECURITY MANAGEMENT
This page shows each port status. In Multihost mode, it shows the port number and its status, authorized or
unauthorized.
Table 4-46. Port Security Management screen options.
Parameter Description
Disable Mode When selecting Disable mode for a port in the function 802.1X Port
Mode Configuration, the port is in the uncontrolled port state and
does not apply 802.1X authenticator on it. Any node attached on this
port can access the network without the admittance of 802.1X
authenticator. The Port Status will show the following screen.
Port Number The port number to be chosen to show its 802.1X Port Status. The
valid number is Port 1 – 26.
Port Status The current 802.1X status of the port. In Disable mode, this field is
Disabled.
802.1x with Multihost mode When selecting 802.1x with Multihost mode for a port in the function
802.1X Port Mode Configuration, Devices can access the network
through this port once the authenticator is authorized. The Port
Status will show the following screen. If the port is granted to access
the network, the port status is authorized, otherwi se, unauthorized.
81
Page 85
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.17.4 P
ARAMETER SETTING
This function is used to configure the parameters for each port in 802.1x port security application. Refer to the
following parameters description for details.
Table 4-47. Parameter Setting screen options.
Parameter Description
Port It is the port number to be selected for configuring its associated
802.1x parameters which are Port control, reAuthMax, txPeriod,
Quiet Period, reAuthEnabled, reAuthPeriod, max. Request,
suppTimeout, serverTimeout and Controlled direction.
Port Control This is used to set the operation mode of authorization. There are
three type of operation mode supported, ForceUnauthorized,
ForceAuthorized, Auto.
ForceUnauthorized: The controlled port is forced to hold in the
unauthorized state.
ForceAuthorized: The controlled port is forced to hold in the
authorized state.
Auto: The controlled port is set to be in authorized st ate or
unauthorized state depends on the result of the authentication
exchange between the authentication server and the supplicant.
Default: Auto
reAuthMax (1-10) The number of authentication attempt that is permitted before the
port becomes unauthorized.
Default: 2
txPeriod (1-65535 s) A time period to transmitted EAPOL PDU between the authenticator
and the supplicant.
Default: 30
Quiet Period (0-65535 s) A period of time during which we will not attempt to access the
supplicant.
Default: 60 seconds
reAuthEnabled Choose whether regular authentication will take place in this port.
Default: ON
reAuthPeriod (1-65535 s) A non-zero n umber seconds between the periodic re-authentication
max. Request (1-10) The maximum of number times that the authenticator will retransmit
suppTimeout (1-65535 s) A timeout condition in the exchange between the authenticator and
serverTimeout (1-65535 s) A timeout condition in the exchan ge between the authenticator and
4.18 Alarm Configuration
CHAPTER 4: Web-Based Management
an EAP Request to the supplicant before it times out the
authentication session. The valid range: 1 – 10.
Default: 2 times
the supplicant. The valid range: 1 –65535.
Default: 30 seconds
the authentication server. The valid range: 1 –65535.
Default: 30 seconds
4.18.1 EVENTS CONFIGURATION
The Trap Events Configuration function is used to enable the switch to send out the trap information while
pre-defined trap events occurred. The switch offers 22 different trap events to users for switch management. The
trap information can be sent out in three ways, including email, mobile phone SMS (short message system) and
trap. The message will be sent while users tick (;) the trap event individually on the web page shown as below.
Cold Sta rt, Warm Start, Link Down, Link Up, Authentication
Failure, User login, User logout
Failure
Module Swap Module Inserted, Module Removed, Dual Media Swapped
PoE PoE Failure
83
Page 87
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.18.2 E
Alarm configuration is used to configure the persons who should receive the alarm message via either email or
SMS, or both. It depends on your settings. An email address or a mobile phone number has to be set in the web
page of alarm configuration (See Fig. 3-51). Then, user can read the trap information from the email or the
mobile phone. This function provides 6 email addresses and 6 mobile phone numbers at most. The 22
different trap events will be sent out to SNMP Manager when trap event occurs. After ticking trap events, you
can fill in your desired email addresses and mobile phone numbers. Then, please click Apply button to
complete the alarm configuration. It will take effect in a few seconds.
MAIL/ SMS CONFIGURATION
NOTE
SMS may not work in your mobile phone system. It is customized for different systems.
Email Mail Server: the IP address of the server transferring your email.
Username: your username on the mail server.
Password: your password on the mail server.
Email Address 1 – 6: email address that would like to receive the
alarm message
SMS
SMS Server: the IP address of the server transferring your SMS.
Username: your username in ISP.
Password: your username in ISP.
Mobile Phone 1-6: the mobile phone number that would like to
receive the alarm message
4-19 Configuration
The switch supports three copies of configuration, including the default configuration, working configuration
and user configuration for your configuration management. All of them are listed and described below
respectively.
Default Configuration
This is the manufacturer’s setting and cannot be altered. In the Web user interface (UI) two restore default
functions are offered for the user to restore to the switch’s default setting. The first function is Restore Default
Configuration for the included default IP address. This will restore the IP address to the default 192.168.1.1.
The other function is Restore Default Configuration without changing the current IP address. This will keep
the same IP address that you saved before.
Working Configuration
This is the configuration you are currently using. It can be changed any time. The configurations you are using
are saved into this configuration file. It’s updated each time you press the Apply button.
84
Page 88
CHAPTER 4: Web-Based Management
User Configuration
This is the configuration file for the specified or backup purposes. It can be updated while confirming the
configuration. Retrieve it by performing Restore User Configuration
4.19.1 S
AVE/RESTORE
To get to this screen, click on Save/Restore in the Configuration menu.
Save As Start Configuration Save the current configuration as a start configuration file in Flash
memory.
Save As User Configuration Save the current configuration as a user configuration file in Flash
memory.
Restore Default Configuration
(includes default IP address)
Restore Default Configuration
(excludes current IP address)
The Restore Default Configuration function can retrieve the
manufacturer’s setting to replace the start configuration. The
switch’s IP address is also restored to 192.168.1.1.
The Restore Default Configuration function can retrieve the
manufacturer’s setting to replace the start configuration. However,
the switch’s current IP address that the user set up will not be
changed and will not be restored to 192.168.1.1.
Restore User Configuration The Restore User Configuration function can retrieve the previous
confirmed working configuration stored in the Flash memory to
update the start configuration. When restoring the configuration,
the system’s start configuration is updated and will change its
system settings after rebooting the system.
4.19.2 CONFIG FILE
To get to this screen, click on Config File in the Configuration menu. With this function, you can back up or
reload the Save As Start or Save As User via TFTP configuration files.
Table 4-51. Config File screen options.
Parameter Description
TFTP Server IP The TFTP server’s IP address.
Export File Path Export Start button: Export Save As Start’s config file stored in the
Flash.
Export User-Conf button: Export Save As User’s config file stored
in the Flash.
85
Page 89
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Import File Path Import Start button: Import Save As Start’s config file stored in the
Flash.
Import User-Conf button: Import Save As User’s config file stored in
the Flash.
4.20 Diagnostic
Three functions, including Diagnostics, Loopback Test and Ping Test are contained in this function folder for
device self-diagnostics. Each of them will be described in detail orderly in the following sections.
4.20.1 D
Diagnostics function provides a set of basic system diagnosis. It let users know that whether the system is health
or needs to be fixed. The basic system check includes EEPROM test, UART test, DRAM test and Flash test.
4.20.2 L
In the Loopback Test function, there are two different loopback tests. One is Internal Loopback Test and the
other is External Loopback Test. The former test function will not send the test signal outside the switch box.
The test signal only wraps around in the switch box. As to the latter test function, it will send the test signal to
its link partner. If you do not have them connected to active network devices, i.e. the ports are link down, the
switch will report the port numbers failed. If they all are ok, it just shows OK.
IAGNOSTICS
OOPBACK TEST
NOTE
Whatever you choose Internal Loopback Test or External Loopback Test, these two functions will
interfere with the normal system working, and all packets in sending and receiving also will stop
temporarily.
4.20.3 P
Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which
abounds with report messages. The switch provides Ping Test function to let you know that if the target device is
available or not. You can simply fill in a known IP address and then click Ping button. After a few seconds later,
the switch will report you the pinged device is alive or dead in the field of Ping Result.
ING TEST
Parameter Description
IP Address An IP address with the version of v4, e.g. 192.168.1.1.
Default Gateway IP address of the default gateway.
86
Table 4-52. Ping Test screen options.
Page 90
CHAPTER 4: Web-Based Management
4.21 TFTP Server
You can set up IP address of TFTP server in this page.
Table 4-53. TFTP Server screen options.
Parameter Description
Server Specify the IP address where the TFTP server locates. Fill in the IP
address of your TFTP server, then press Apply button to have the
setting taken effect.
4.22 Log
This function shows the log data. The switch provides system log data for users. There are 17 private trap logs, 5
public trap logs. The switch supports total 120 log entries. For more details on log items, please refer to the
section of Trap/Alarm Configuration and SNMP Configuration.
Table 4-54. Log screen options.
Parameter Description
Log Data The Trap Log Data is displaying the log items including all SNMP
Private Trap event s, SNMP Public traps and user logs occurred in
the system. In the report table, No., Time and Events are three
fields contained in each trap record.
No. Display the order number that the trap happened.
Time Display the time that the trap happened.
Events Display the trap event name.
Auto Upload Enable Switch the enabled or disabled status of the auto upload function.
Upload Log Upload log data through tftp.
Clear Log Clear log data.
4.23 Firmware Upgrade
Software upgrade tool is used to help upgrade the software function in order to fix or improve the function.
The switch provides a TFTP client for software upgrade. This can be done through Ethernet.
The switch supports TFTP upgrade tool for upgrading software. If you assure to upgrade software to a newer
version one, you must follow two procedures:
1. Specifying the IP address where TFTP server locates. In this field, the IP address of your TFTP server
should be filled in.
2. Specifying what the filename and where the file is. You must specify full path and filename.
87
Page 91
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Then, press Upgrade button if your download is not successful, the switch will also be back to “Software
Upgrade”, and it will not upgrade the software as well.
When download is completed, the switch starts upgrading software. A reboot message will be prompted after
completing upgrading software. At this time, you must reboot the switch to have new software worked.
NOTE
Software upgrade is hazardous if power is off. You must do it carefully.
Table 4-55. Firmware Upgrade screen options.
Parameter Description
TFTP Server A TFTP server stored the image file you want to upgrade.
Path and Filename File path and filename stored the image file you want to upgrade.
4.24 Reboot
We offer you many ways to reboot the switch, including power up, hardware reset and software reset. You can
press the RESET button in the front panel to reset the switch. After upgrading software, changing IP
configuration or changing VLAN mode configuration, then you must reboot to have the new configuration
taken effect. Here we are discussing is software reset for the reboot in the main menu.
Reboot the switch. Reboot takes the same effect as the RESET button on the front panel of the switch. It will
take around thirty (30) seconds to complete the system boot.
Table 4-56. Reboot screen options.
Parameter Description
Save and Reboot Save the current settings as start configuration before rebooting
the switch.
Reboot Reboot the system directly.
88
Page 92
CHAPTER 4: Web-Based Management
4.25 Logout
You can manually logout by performing Logout function. In the switch, it provides another way to logout. You
can configure it to logout automatically.
The switch allows you to logout the system to prevent other users from the system without the permission. If
you do not logout and exit the browser, the switch will automatically have you logout. Besides this manually
logout and implicit logout, you can pull down the Auto Logout list at the left-top corner to explicitly ON/OFF
this logout function.
Table 4-57. Logout screen options.
Parameter Description
Auto Logout Default is ON. If it is ON, and no action and no key is stroke as well
in any function screen more than 3 minutes, the switch will have
you logout automatically.
89
Page 93
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
5. CLI Management
Locate the included RS-232 null-modem cable. Refer to Section 1.3for the null-modem cable’s configuration.
Attach the DB9 female connector to the male DB9 serial port connector on the switch.
Attach the other end of the DB9 cable to an ASCII terminal emulator. Or, connect the cable to a PC COM1 or
COM2 port on a PC running a utility such as Microsoft Windows HyperTerminal.
At the COM Port Properties Menu, configure the parameters as follows:
Baud rate 57600
Stop bits 1
Data bits 8
Parity N
Flow control None
5.1 Login
The command-line interface (CLI) is a text-based interface. Access the CLI through either a direct serial
connection to the device or a Telnet session. The switch’s default values are listed below.
Username: admin
Password: admin
After you login successfully, the prompt appears as “#” if you are the first login person and your authorization is
administrator; otherwise, it appears as “$.” The former means you act as an administrator and have all system
access rights. The latter means you act as a guest and are only allowed to view the system without permission to
apply configuration settings to the switch.
5.2 Commands
To see the CLI mode commands, type in a “?” after the prompt, then all commands will be listed. All command
scan be divided into two categories, global and local commands. Global commands (end, exit, help, history,
logout, restore default, restore user, save start, and save user) can be used in either administrator or user mode.
For details, refer to Section 5.2.1.
Command instructions residing in user mode are local commands. A local command can have the same name
as a remote command, but it performs a totally different function. For example, show in IP mode displays the
IP information; however, it displays the system information in system mode. For more details, refer to Section
5.2.2.
Once you log into the switch as described in Section 5.1, the screen shown in Figure 5-1 appears.
90
Page 94
CHAPTER 5: CLI Management
Giga Switch — LPB200A
Login: admin
Password:
5.2.1 G
end
LPB200A# ?
802.1x Enter into 802.1x mode
account Enter into account mode
alarm Enter into alarm mode
autologout Change autologout time
bandwidth Enter into bandwidth mode
config-file Enter into config file moded
dhcp-boot Enter into dhcp-boot mode
diag Enter into diag mode
firmware Enter into firmware mode
gvrp Enter into gvrp mode
hostname Change hostname
Igmp-snooping Enter into igmp mode
ip Enter into ip mode
log Enter into log mode
mac-table Enter into mac table mode
management Enter into management mode
poe Enter into poe function
port Enter into port mode
Figure 5-1. Login screen.
LOBAL CLI COMMANDS
Syntax: end
Description: Return to the top mode.
When you enter this command, your current position moves to the top mode.
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
exit
Syntax: exit
Description: Return to the previous mode.
When you enter this command, your current position moves back to the previous mode.
Argument: None
Possible value: None
Example:
Giga Switch# trunk
Giga Switch(trunk)# exit
Giga Switch#
help
Syntax: help
Description: Shows available commands.
Some commands are the combination of more than two words. When you enter this command, the CLI shows
the complete commands. This command also helps you classify the commands as either local or global
commands.
Argument: None
Possible value: None
Example:
Giga Switch# ip
Giga Switch (ip)# help
Commands available:
------------<< Local commands >>-----------set ip Set ip, subnet mask and gateway
set dns Set dns
enable dhcp Enable DHCP, and set dns auto or manual
disable dhcp Disable DHCP
show Show IP Configuration
------------<< Local commands >>------------
92
Page 96
exit Back to the previous mode
end Back to the top mode
help Show available commands
history Show a list of previously run commands
logout Logout the system
save start Save as start config
save user Save as user config
restore default Restore default config
restore user Restore user config
history
Syntax: history [#]
CHAPTER 5: CLI Management
Description: Shows a list of previous commands that were run.
When you enter this command, the CLI shows a list of commands that you typed previously. The CLI supports
up to 256 records. If you don’t type in anything, the CLI lists up to 256 total records. If you do type in a number,
the CLI only shows the records’ last numbers.
Argument: [#]: show last number of history records. (optional)
Possible value: [#]: 1, 2, 3, …., 256
Example:
Giga Switch(ip)# history
Command history:
0. trunk
1. exit
2. Giga Switch# trunk
3. Giga Switch(trunk)# exit
4. Giga Switch#
5. ?
6. trunk
7. exit
8. alarm
9. events
10. end
11. ip
12. help
13. ip
14. history
93
Page 97
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Giga Switch(ip)# history 3
Command history:
13. ip
14. history
15. history 3
Giga Switch(ip)#
logout
Syntax: logout
Description: When you enter this command via a Telnet connection, you will log out of the system and
disconnect. If you connect the system through a direct serial port with an RS-232 cable, you will log out of the
system and return to the initial login prompt when you run this command.
Argument: None
Possible value: None
Example:
Giga Switch# logout
restore default
Syntax: restore default
Description: When you use this function in CLI, the system will prompt “Do you want to restore the default IP
address?(y/n)”. If you choose Y or y, the IP address will restore to the default 192.168.1.1. If you choose N or n,
the IP address will keep the same one that you saved before.
If restoring the default is successful, the CLI asks if it will reboot immediately or not. Pressing Y or y reboots the
system immediately; otherwise, it goes back to the CLI system. After restoring the default configuration, all the
changes in the startup configuration are lost. After rebooting, the entire startup configuration resets to the
factory default.
Argument: None
Possible value: None
Example:
Giga Switch# restore default
Restoring ...
Restore Default Configuration Successfully
Press any key to reboot system.
94
Page 98
restore user
Syntax: restore user
Description: Restores the startup configuration as a user-defined configuration. If restoring default is successful,
the CLI asks if you want to reboot immediately or not. Pressing Y or y reboots the system immediately; if you
press N or n, the software returns to the CLI system. After restoring a user-defined configuration, all the
changes in the startup configuration are lost. After rebooting, the entire startup configuration replaces the
user-defined one.
Argument: None
Possible value: None
Example:
Giga Switch# restore user
Restoring ...
Restore User Configuration Successfully
Press any key to reboot system.
CHAPTER 5: CLI Management
save start
Syntax: save start
Description: Saves the current configuration as the startup one. When you enter this command, the CLI saves
your current configuration to the nonvolatile Flash. If you want the configuration to work after rebooting, save
the configuration using the command save start.
Argument: None
Possible value: None
Example:
Giga Switch# save start
Saving start...
Save Successfully
Giga Switch#
save user
Syntax: save user
Description: Saves the current configuration as the user-defined configuration. When you enter this command,
the CLI saves your current configuration in the nonvolatile Flash as a user-defined configuration.
Argument: None
95
Page 99
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Possible value: None
Example:
Giga Switch# save user
Saving user...
Save Successfully
Giga Switch#
5.2.2 L
OCAL CLI COMMANDS
NOTE
For local CLI commands, syntax 1, 5–7 represents a range of port s. For example, if the port
range is shown as 1, 5–7, available from 1 to 12, the range of ports available is 1–8.
802.1X
set max-request
Syntax: set max-request <port-range> <times>
Description: The maximum number of times that the state machine will retransmit an EAP Request packet to
the Supplicant before it times out the authentication session.
Argument:
<port range> : syntax 1, 5–7, available from 1 to 12
<times> : max-times, range 1–10
Possible value:
<port range> : 1 to 12
<times>: 1–10, default is 2
Example:
Giga Switch(802.1X)# set max-request 2 2
set mode
Syntax: set mode <port-range> <mode>
Description: Sets up each port’s 802.1x authentication mode.
Argument:
<port range> : syntax 1, 5–7, available from 1 to 12
<mode>: set up 802.1X mode
0: disable the 802.1X function
1: set 802.1X to Multi-host mode
96
Page 100
Possible value:
<port range> : 1 to 12
<mode>: 0 or 1
Example:
Giga Switch(802.1X)# set mode 2 1
set port-control
Syntax: set port-control <port-range> <authorized>
Description: Sets up each port’s 802.1x status.
Argument:
<port range> : syntax 1, 5–7, available from 1 to 12
<authorized> : Set up the status of each port
0: ForceUnauthorized
1: ForceAuthorized
2: Auto
CHAPTER 5: CLI Management
Possible value:
<port range> : 1 to 12
<authorized> : 0, 1, or 2
Example:
Giga Switch(802.1X)# set port-control 2 2
set quiet-period
Syntax: set quiet-period <port-range> <sec>
Description: A timer that the Authenticator state machine uses to define time periods when it won’t attempt to
acquire a Supplicant. (A state machine is a service within the switch that monitors connections and times them
out when the time reaches a set maximum time.)
Argument:
<port range>: syntax 1, 5–7, available from 1 to 12
<sec>: timer, range 0–65535
Possible value:
<port range> : 1 to 12
<sec> : 0–65535, default is 60
97
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.