Black Box LPB200A User Manual

Page 1
© Copyright 2006. Black Box Corporation. All rights reserved.
Page 2
12-Port 1000BASE-TX
L2 Managed PoE Switch
With 2 SFP Dual Media Ports
JUNE 2006
LPB200A
CUSTOMER
SUPPORT
INFORMATION
toll-free 877-877-BBOX 724-746-5500
Order in the U.S.: Call (outside U.S. call )
FREE 724-746-5500 724-746-0746
Black Box Corporation
www.blackbox.com info@blackbox.com
Page 3
Page 4
FCC AND ICRFI STATEMENTS
FEDERAL COMMUNICATIONS COMMISSION
AND
INDUSTRY CANADA
RADIO FREQUENCY INTERFEREN CE STATEMENTS
This equipment generates, uses, and can radiate radio-frequency energy, and if not installed and used properly, that is, in strict accordance with the manufacturer’s instructions, may cause interference to radio communication. It has been tested and found to comply with the limits for a Class A computing device in accordance with the specifications in Subpart B of Part 15 of FCC rules, which are designed to provide reasonable protection against such interference when the equipment is operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his own expense will be required to take whatever measures may be necessary to correct the interference.
Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
This digital apparatus does not exceed the Class A limits for radio noise emission from digital apparatus set out in the Radio Interference Regulation of Industry Canada.
Le présent appareil numérique n’émet pas de bruits radio électriques dépassant les limites applicables aux appareils numériques de la classe A prescrites dans le Règlement sur le brouillage radio électrique publié par Industrie Canada.
EUROPEANUNION DECLARATIONOF CONFORMITY
This equipment complies with the requirements of the European EMC Directive 89/336/EEC.
CAUTION
Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge.
To protect your switch, always:
• T ouch your computer’s met al chassis to ground the st atic electrical charge before you pick up the switch.
• Pick up the switch by holding it on the left and right edges only.
1
Page 5
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
INSTRUCCIONES DE SEGURIDAD (Normas Oficiales Mexicanas Electrical Safety Statement)
1. Todas las instrucciones de seguridad y operación deberán ser leídas antes de que el aparato eléctrico sea operado.
2. Las instrucciones de seguridad y operación deberán ser guardadas para referencia futura.
3. Todas las advertencias en el aparato eléctrico y en sus instrucciones de operación deben ser respetadas.
4. Todas las instrucciones de operación y uso deben ser seguidas.
5. El aparato eléctrico no deberá ser usado cerca del agua—por ejemplo, cerca de la tina de baño, lavabo, sótanomojado o cerca de una alberca, etc..
6. El aparato eléctrico debe ser usado únicamente con carritos o pedestales que sean recomendados por el fabricante.
7. El aparato eléctrico debe ser montado a la pared o al techo sólo como sea recomendado por el fabricante.
8. Servicio—El usuario no debe intentar dar servicio al equipo eléctrico más allá a lo descrito en las instrucciones deoperación. Todo otro servicio deberá ser referido a personal de servicio calificado.
9. El aparato eléctrico debe ser situado de tal manera que su posición no interfiera su uso. La colocación del aparatoeléctrico sobre una cama, sofá, alfombra o superficie similar puede bloquea la ventilación, no se debe colocar enlibreros o gabinetes que impidan el flujo de aire por los orificios de ventilación.
10. El equipo eléctrico deber ser situado fuera del alcance de fuentes de calor como radiadores, registros de calor, estufasu otros aparatos (incluyendo amplificadores) que producen calor.
11. El aparato eléctrico deberá ser connectado a una fuente de poder sólo del tipo descrito en el instructivo deoperación, o como se indique en el aparato.
12. Precaución debe ser tomada de tal manera que la tierra fisica y la polarización del equipo no sea eliminada.
13. Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por
objetoscolocados sobre o contra ellos, poniendo particular atención a los contactos y receptáculos donde salen del aparato.
14. El equipo eléctrico debe ser limpiado únicamente de acuerdo a las recomendaciones del fabricante.
15. En caso de existir, una antena externa deberá ser localizada lejos de las lineas de energia.
16. El cable de corriente deberá ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo.
17. Cuidado debe ser tomado de tal manera que objectos liquidos no sean derramados sobre la cubierta u orificios deventilación.
18. Servicio por personal calificado deberá ser provisto cuando:
A: El cable de poder o el contacto ha sido dañado; u
B: Objectos han caído o líquido ha sido derramado dentro del aparato;o
C: El aparato ha sido expuesto a la lluvia; o
D: El aparato parece no operar normalmente o muestra un cambio en su desempeño; o
E: El aparato ha sido tirado o su cubierta ha sido dañada.
2
Page 6
TRADEMARKS USED IN THIS MANUAL
ST is a registered trademark of AT&T.
BLACK BOX and the Double Diamond logo are registered trademarks of BB Technologies, Inc.
VT100 is a trademark of Digital Equipment Corporation.
DB2 and IBM are registered trademarks of International Business Machines Corporation.
Linux is a registered trademark of Linus Torvalds.
Internet Explorer, Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
Netscape is a registered trademark of Netscape Communications Corporation.
Telnet is a trademark of Telnet Communications, Inc.
UNIX is a registered trademark of UNIX System Laboratories, Inc.
Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark owners.
TRADEMARKS USED IN THIS MANUAL
The 12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports is called the LPB200A in the software screens and also in the screens shown in this manual. Both names refer to the LPB200A switch.
NOTE
3
Page 7
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Contents
Chapter Page
1. Specifications ......................................................................................................................................................7
1.1 Hardware ...................................................................................................................................................7
1.2 Management Software .............................................................................................................................8
1.3 Null-Modem Cable ...................................................................................................................................9
2. Overview ............................................................................................................................................................10
2.1 Introduction ...........................................................................................................................................10
2.2 What’s Included ......................................................................................................................................11
2.3 Hardware Description ............................................................................................................................12
2.4 Optional SFP Fiber Transceiver Modules .............................................................................................14
3. Installation ........................................................................................................................................................15
3.1 Installation Instructions .........................................................................................................................15
3.2 Installing the Chassis in a 19-Inch Wiring Closet Rail .........................................................................16
3.3 Cabling Requirements ...........................................................................................................................17
3.3.1 Twisted-Pair Ports ......................................................................................................................17
3.3.2 Fiber Transceiver Ports .............................................................................................................17
3.3.3 Switch Cascading ......................................................................................................................17
3.4 Configuring the Management Agent ....................................................................................................21
3.4.1 Via the Serial RS-232 Console Port ..........................................................................................22
3.4.2 Via the Ethernet Port ................................................................................................................24
3.5 IP Address Assignment ...........................................................................................................................25
3.5.1 IP Address ..................................................................................................................................25
3.5.2 Subnet Mask ..............................................................................................................................26
3.5.3 Default Gateway ........................................................................................................................27
3.5.4 DNS ............................................................................................................................................27
3.6 Typical Applications ...............................................................................................................................27
3.6.1 Remote Site/Central Site Connection ....................................................................................28
3.6.2 Peer-to-Peer Network Connection ...........................................................................................29
3.6.3 Office Network Connection .....................................................................................................30
4. Web-Based Management ..................................................................................................................................31
4.1 Home Overview ......................................................................................................................................32
4.2 System ....................................................................................................................................................32
4.2.1 System Information ..................................................................................................................32
4.2.2 IP Configuration .......................................................................................................................34
4.2.3 Time Configuration ..................................................................................................................35
4.2.4 Account Configuration .............................................................................................................37
4.2.5 Management Policy ..................................................................................................................38
4.2.6 Virtual Stack ..............................................................................................................................39
4.3 Port Configuration .................................................................................................................................40
4
Page 8
Chapter Page
4.3.1 Status ..........................................................................................................................................40
4.3.2 Configuration ............................................................................................................................43
4.3.3 Simple Counter .........................................................................................................................44
4.3.4 Detail Counter ...........................................................................................................................45
4.4 PoE .........................................................................................................................................................48
4.4.1 PoE Status . ................................................................................................................................49
4.4.2 PoE Configuration ....................................................................................................................49
4.5 Mirror .....................................................................................................................................................49
4.6 Bandwidth Management .... ................................................................................................................50
4.7 QoS Configuration ................................................................................................................................51
4.7.1 Per Port Priority .........................................................................................................................51
4.7.2 VLAN Tag Priority .....................................................................................................................51
4.7.3 IP TOS Classification ..................................................................................................................52
4.7.4 IP TCP/UDP Port Classification .................................................................................................53
4.7.5 IP Diffev Classification ................................................................................................................55
4.8 SNMP Configuration .............................................................................................................................55
4.9 IGMP Snooping ..... ...............................................................................................................................57
4.10 Max. Packet Length ................................................................................................................................58
4.11 DHCP Boot .............................................................................................................................................58
4.12 VLAN .......................................................................................................................................................58
4.12.1 VLAN Mode...............................................................................................................................59
4.12.2 Tag-Based Group .......................................................................................................................60
4.12.3 Port-Based Group ......................................................................................................................60
4.12.4 Tag Rule .....................................................................................................................................61
4.13 MAC Table ............... ..............................................................................................................................62
4.13.1 MAC Table Information ............................................................................................................62
4.13.2 MAC Table Maintenance ..........................................................................................................63
4.13.3 Static Forward ............................................................................................................................64
4.13.4 Static Filter .................................................................................................................................64
4.13.5 MAC Alias ...................................................................................................................................65
4.14 GVRP Configuration ..............................................................................................................................65
4.14.1 GVRP Config .............................................................................................................................66
4.14.2 GVRP Counter ..........................................................................................................................67
4.14.3 GVRP Group Information ........................................................................................................68
4.15 STP Configuration .................................................................................................................................68
4.15.1 STP Status .................................................................................................................................69
4.15.2 STP Configuration ...................................................................................................................70
4.15.3 STP Port Configuration ...........................................................................................................71
4.16 Trunking Information ..........................................................................................................................73
4.16.1 Port Setting Status ....................................................................................................................74
4.16.2 Aggregator View .......................................................................................................................75
4.16.3 LACP System Config ................................................................................................................76
Contents
5
Page 9
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Contents (continued)
Chapter Page
4.17 802.1x Configuration .............................................................................................................................76
4.17.1 802.1x State Setting .................................................................................................................80
4.17.2 802.1x Mode Setting ................................................................................................................81
4.17.3 Port Security Management ......................................................................................................81
4.17.4 Parameter Setting ....................................................................................................................82
4.18 Alarm Configuration .............................................................................................................................83
4.18.1 Events Configuration ................................................................................................................83
4.18.2 E-Mail/SMS Configuration .......................................................................................................84
4.19 Configuration .........................................................................................................................................84
4.19.1 Save/Restore .............................................................................................................................85
4.19.2 Config File .................................................................................................................................85
4.20 Diagnostics ..............................................................................................................................................86
4.20.1 Diag ............................................................................................................................................86
4.20.2 Loopback Test ...........................................................................................................................86
4.20.3 Ping Test ....................................................................................................................................86
4.21 TFTP Server ...........................................................................................................................................87
4.22 Log ..........................................................................................................................................................87
4.23 Firmware Upgrade .................................................................................................................................87
4.24 Reboot ....................................................................................................................................................88
4.25 Logout ....................................................................................................................................................89
5. CLI Management ..............................................................................................................................................90
5.1 Login .......................................................................................................................................................90
5.2 Commands ..............................................................................................................................................90
5.2.1 Global CLI Commands .............................................................................................................91
5.2.2 Local CLI Commands ..............................................................................................................96
6. Troubleshooting .............................................................................................................................................172
6.1 Resolving a No Link Condition ...........................................................................................................172
6.2 Problems/Solutions .............................................................................................................................172
6.3 Calling Black Box .................................................................................................................................173
6.4 Shipping and Packaging ......................................................................................................................173
6
Page 10
CHAPTER 1: Specifications
1. Specifications
1.1 Hardware
Standards: IEEE802.3, 802.3ab, 802.3z, 802.3u, 802.3af Power over Ethernet, 802.1v protocol-based VLAN classification, 802.3x port-based network access control, 802.1q tag-based VLAN, 802.1d Spanning Tree Protocol, 802.1w Rapid Spanning Tree Protocol, 802.1p Class of Service with 2-level priority queuing, 802.1ad port trunking with flexible load distribution and failover function
Compatible Fiber Transceiver Modules: Ports 11, 12 are TP/SFP fiber dual-media ports with auto detection function; Optional SFP module (LGB200C-MLC, LGB200C-SLC10, LGB200C-SLC30, LGB204C, LGB205C) supports LC or BiDi LC transceiver
Network Interface: 10/100/1000 Mbps Fast Ethernet twisted-pair (ports 1–12), or 1000BASE-LX duplex multimode, duplex single-mode, or single-strand single-mode LC or WDM (BiDi LC) (ports 11, 12)
Transmission Mode: 10-/100-Mbps support for full or half-duplex; 1000-Mbps support for full duplex only
Speed: 10/100/1000 Mbps for twisted pair; 1000 Mbps for fiber
Forwarding/Filtering Packet Rate: 1,488,000 pps at 1000 Mbps; 148,800 pps at 100 Mbps; 14,880 pps at 10
Mbps
MAC Address and Self-Learning: 8K MAC address, 4K VLAN table entries
Buffer Memory: Embedded frame buffer: 208 KB
Flow Control: IEEE802.3x compliant for full duplex; Backpressure flow control for half-duplex
Cable Type and Maximum Length: Twisted-pair: CAT5 UTP cable, up to 328 feet (100 m) (ports 1–8);
Single-mode single-strand fiber, up to 12.4miles (20 km): 1000BASE-LX single-strand single-mode WDM (BiDi) SFP for LGB204C and LGB205C (slots 7 and 8); Multimode fiber, up to 1804.4 feet (550 m) for LGB200C-MLC; Single-mode duplex fiber, up to 6.2 miles (10 km) for LGB200C-SLC10; Single-mode duplex fiber up to 18.6 miles (30 km)for LGB200C-SLC30
User Controls: (1) Reset button
Connectors: (10) RJ-45, (2) slots for fiber media converter modules;
LGB200C-MLC, LGB200C-SLC10, LGB200C-SLC30: (2) LC; LGB204C, LGB205C: (1) LC
Indicators: (52) LEDs: All: System LEDs: (1) Power, (1) CPU; (12) 10/100/1000 Mbps TP, (12) Link/Act, (12) PoE-PSE Act and (12) PoE Fail for ports 1–12, (2) SFP (1000 Mbps), (2) SFP (Link/Act) for ports 11, 12
Temperature Tolerance: 32˚ to 104˚F (0˚ to 40˚C)
Relative Humidity: 5% to 90%
Power: 100–240 VAC, 50–60 Hz
7
Page 11
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Power Consumption: Max. 15W ( in case no PD device connected)
Max. 135W ( with 8 x 15.4W PoE device connected )
Max. 185W ( with 12 x 15.4W PoE device connected )
Size: 1.7"H x 17.4"W x 8.2"D (4.4 x 44.2 x 20.9 cm)
1.2 Management Software
System Configuration: Auto negotiation support on 10/100BASE-TXports; Web browser or console interface can set transmission speed (10/100 Mbps) and operation mode (full/half-duplex) on each port, enable/disable any port, set VLAN group, set trunk connection
Management Agent: SNMP support; MIB II, Bridge MIB, RMONMIB
Spanning Tree Algorithm: IEEE 802.1d
VLAN Function: Port-based/802.1q tagged allows up to 256 VLANs in one switch
Trunk Function: Port trunk connections allowed
IGMP: IP multicast filtering by passively snooping on the IGMP query
Bandwidth Control: Supports by-port Egress/Ingress rate control
Quality of Service (QoS): Referred to as Class of Service (CoS)by the IEEE802.1p standard; classification of
packet priority can be based on either a VLAN tag on a packet or user-defined per-port QoS; Two queues per port; IP ToS classification, TCP/UDP port classification, IP DiffServe classification
Port Security: Limited number of MAC addresses learned per port; static MAC addresses in the filtering table stay in the filtering table
Internetworking Protocol: Bridging: 802.1d spanning tree; IP Multicast: IGMP snooping; Maximum of 256 active LANs and IP multicast sessions
Network Management: (1) RS-232 port as local control console, Telnet™ remote-control console; SNMP agent: MIB-2 (RFC 1213), Bridge MIB (RFC1493), RMON MIB (RFC1757)-statistics; VLAN MIN (802.1q); Web browser support based on HTTP server and CGI parser TFTP software-upgrade capability
8
Page 12
CHAPTER 1: Specifications
1.3 Null-Modem Cable
Use the included DB9 cable to connect a terminal or terminal emulator to the managed switch’s RS-232 port to access the command-line interface. Table 1-1 shows the pin assignments for the DB9 cable.
Table 1-1. Command-line interface DB9 connector pin out.
Function Pin
Carrier (CD) 1
Receive Data (RXD) 2
Transmit Data (TXD) 3
Data Terminal Ready (DTR) 4
Signal Ground (GND) 5
Data Set Ready (DSR) 6
Request To Send (RTS) 7
Clear To Send (CTS) 8
Table 1-2 shows the pin out for the null-modem cable.
Table 1-2. Null-modem cable pin out.
Signal Pin Pin Signal
CD DTR
DSR CD
DTR
RXD 2 3 TXD
TXD 3 2 RXD
GND 5 5 GND
RTS 7 8 CTS
1
4
6
4
1 6
DSR
CTS 8 7 RTS
Not used 9 9 Not used
9
Page 13
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2. Overview
2.1 Introduction
The 12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports is standard switch that meet all IEEE 802.3/u/x/z Gigabit and Fast Ethernet specifications. Manage the switch via an async console directly connected to the switch’s RS-232 port, or through an Ethernet port using CLI or SNMP. In this switch, ports 11, 12 include two types of media --- TP and SFP Fiber (LC, BiDi LC, etc); this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for high-speed connection expansion.
This PoE Switch also complies with IEEE 802.3af, its advanced auto-sensing algorithm enables providing power devices (PD) discovery, classification, current limit, and other necessary functions. It also supports high safety with short circuit protection and power-out auto-detection to PD.
This standalone off-the-shelf switch provides comprehensive hardware features. This switch has 10 RJ-45 twisted-pair ports and 2 STP fiber transceiver module slots (for STP fiber [LC or BiDi LC] modules). The 1000-Mbps SFP fiber transceiver is used for high-speed connection expansion. These two ports auto detect whether the 10/100/1000-Mbps TP or the 1000-Mbps SFP fiber port is used. On this switch, ports 11, 12 can be twisted-pair or Ethernet. Multimode or single-mode fiber transceiver modules plug into these two ports. (See Section 2.4 for more information about the fiber transceiver modules.)
The LPB200A has a 208 KB on-chip frame buffer. The switch features jumbo frame support, programmable classifier for QoS (Layer4/Multimedia), 8K MAC address and 4K VLAN support (IEEE 802.1a), per-port shaping, policing, and Broadcast Storm Control, IEEE 802.1q-in-q nested VLAN support, full-duplex flow control (IEEE 802.3x) and half-duplex backpressure, and extensive front-panel diagnostic LEDs.
Software features include port status and configuration, per-port traffic monitoring counters, system information snapshot upon login, port mirroring, static trunk, and 802.1q VLAN. The switch also supports user management and limits three users to login to enhance security. The maximum packet length can be up to 9208 bytes for a jumbo frame application. More features include DHCP broadcasting suppression to avoid a suspended or crashed network, sending trap event for monitored events, default configuration that can be restored to overwrite the current configuration working on either a Web browser or CLI, online plug/unplug SFP modules, port mirror function with Ingress traffic, rapid spanning tree (802.1w RSTP), 802.1x port security on a VLAN, user management, and only the first login administrator can configure the device.
With the SNMP agent, the network administrator can log in to the switch to monitor, configure, and control each port’s activity. The overall network management is enhanced and the network efficiency is also improved to accommodate high-bandwidth applications. In addition, the switch features comprehensive and useful functions such as QoS (Quality of Service), Spanning Tree, VLAN, Port Trunking, Bandwidth Control, Port Security, SNMP/RMON, and IGMP Snooping capability via the intelligent software. These functions are described below and on the next page. The switch is suitable for both metro-LAN and office applications.
QoS complies with the IEEE802.1p standard. There are two priority queue and packet transmission schedules.
Spanning Tree complies with IEEE802.1d and IEEE802.1w (RSTP: Rapid Spanning Tree Protocol) standards.
10
Page 14
The switch also supports port-based VLAN and IEEE 802.1a tag VLAN, with 256 active VLANs and VLAN IDs
from 1–4094. It also handles static port trunking and IEEE 802.3ad LACP port trunking.
Supports Ingress and Egress per port bandwidth control.
Port Security: Support allowed, denied forwarding, and port security with MAC address.
SNMP/RMON: SNMP agent and RMON MIB. In the device, the SNMP agent is client software that’s
operating over the SNMP protocol used to receive the command from an SNMP manager (server site) and echo the corresponding data (MIB object). The SNMP agent actively issues TRAP information.
RMON is the abbreviation for Remote Network Monitoring and is a branch of the SNMP MIB.
The device supports MIB-2 (RFC 1213), Bridge MIB (RFC 1493), RMON MIB (RFC 1757)-statistics Group1, 2,
3, and 9, Ethernet-like MIB (RFC 1643), and Ethernet MIB (RFC 1643).
IGMP Snooping: Supports IGMP version 2 (RFC 2236): IGMP snooping establishes the multicast groups that
forward multicast packets to the member ports. This avoids wasting the bandwidth while IP multicast packets are running over the network.
CHAPTER 2: Overview
2.2 What’s Included
Your package should contain the following items. If anything is missing or damaged, please contact Black Box at 724-746-5500.
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
CD-ROM containing this user’s manual in PDF format
AC power cord
DB9 female to DB9 female RS-232 cable
Rackmount kit
(4) rubber feet
11
Page 15
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2.3 Hardware Description
Figure 2-1 shows the 12-Port 1000BASE-TX L2 Managed PoE Switch’s front panel. The numbered components in the figure are described in Table 2-1.
Figure 2-1. Front panel.
Table 2-1. Front-panel components.
Component Description
c Power LED Lights when power is on.
d CPU LED Lights when there is activity on the CPU.
e PoE-PSE ACT LEDs (ports 1-12) Lights when PoE Power is active.
f PoE FAIL LEDs (ports 1-12) Lights when PoE Power is failed.
Lights green when 1000Mbps speed is active.
g 10/100/1000Mbps LEDs
(ports 1-12)
h LINK/ACT LEDs (ports 1-12)
i SFP(LINK) LED
(port 11)
Lights ember when 100Mbps speed is active. Off when 10Mbps speed is active.
Lights when connection with remote device is good. Blinks when any traffic is present.
Off when cable connection is not good.
Lights when connection with the remote device is good. Off when module connection is not good.
j SFP(LINK) LED
(port 12)
12
Lights when connection with the remote device is good.
Off when module connection is not good.
Page 16
Table 2-1 (continued). Front-panel components.
Component Description
k Reset button Resets the management system.
l Gigabit TP Ports 12 10/100/1000Mbps TP ports.
CHAPTER 2: Overview
SFP Fiber Ports
The switch’s rear panel is shown in Figure 2-2. The numbered components in the figure are described in Table 2-2.
2 SFP fiber port module slots.
Figure 2-2. Rear panel.
Table 2-2. Rear panel components.
Component Description
DB9 connector
RS-232 serial console port for configuration or management.
Power connector
Connects to a 100–240-VAC, 50/60-Hz AC power line.
13
Page 17
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
2.4 Optional SFP Fiber Transceiver Modules
Ports 11, 12 on the LPB200A include two types of media: twisted-pair (TP) and optional small form factor pluggable (SFP) fiber (LC, BiDi LC, etc.) modules. The twisted-pair ports are the switch’s two rightmost RJ-45 twisted-pair connectors (ports 11, 12). For the fiber option, 1000-Mbps fiber transceiver modules slide into the switch’s two fiber module slots (located to the right of the twisted-pair connectors on the switch’s front panel). The fiber transceiver modules are used for high-speed connection expansion. The two fiber ports auto detect 10/100/1000-Mbps TP or 1000-Mbps SFP fiber.
Five 1000-Mbps transceiver modules are available. These modules are described below and shown in Figures 2-3 and 2-4.
Small Form Factor Pluggable (SFP) Optical Transceiver, Multimode, 850-nm, 550 m (LGB200C-MLC)
Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Mode, 1310-nm, 10 km (LGB200C-SLC10)
Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Mode, 1550-nm, 30 km (LGB200C-SLC30)
Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Strand, Single-Mode Fiber
WDM1550TX/1310 RX, 20 km (LGB204C)
Small Form Factor Pluggable (SFP) Optical Transceiver, Single-Strand, Single-Mode Fiber
WDM1310TX/1550 RX, 20 km (LGB205C)
Figure 2-3. LGB200C-MLC, LGB200C-SLC10, or LGB200C-SLC30 module.
Figure 2-4. LGB204C or LGB205C module.
NOTE
The LGB204C and LGB205C fiber transceivers must be used together.
14
Page 18
CHAPTER 3: Installation
3. Installation
3.1 Installation Instructions
CAUTION
Wear a grounding device to avoid damage from electrostatic discharge. Be sure that the power switch is OFF before you connect the power cord to the power
source.
INSTALLING THE OPTIONAL MODULES
NOTE
If you do not plan to install SFP fiber transceivers in the switch’s ports 11, 12, skip this section.
Slide the fiber transceiver module into one of the sixteen open module slots in the switch as shown in Figure 3-1.
12-Port 1000BASE-TX L2 Managed PoE
Switch with 2 SFP Dual Media Ports
SFP Fiber Transceiver Module
Figure 3-1. Installing the optional SFP fiber transceiver module.
Connecting the SFP Module to the Chassis
The optional SFP modules are hot-swappable, so you can plug or unplug them before or after powering on the switch.
1. Verify that the SFP module is the right model and conforms to the chassis.
2. Slide the module into the slot. Make sure that the module is properly seated against the slot
socket/connector.
3. Connect the fiber optic network cable to the LC connector(s) on the module.
4. If you want to install a second module in the switch, repeat steps 1–3.
15
Page 19
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Installing the Rubber Feet
For this switch, install the rubber feet and place it on a desktop, or install the switch in the rack with mounting hardware (see Section3.2).
TP Port and Cable Installation
1. The switch’s twisted-pair (TP) ports support MDI/MDI-X auto-crossover, so either type of cable (straight-through or crossover) can be used for each TP port.
2. Use Category 5 grade RJ-45 TP cable to connect to a switch TP port at one end and a Gigabit device (for example, a workstation or server) at the other end.
3. Repeat the above steps, as needed, for each RJ-45 port to be connected to a Gigabit 10/100/1000 TP device.
The switch is now ready to operate.
Power On
The switch supports a 100–240-VAC, 50–60-Hz power supply. The power supply will automatically convert the local AC power source to DC power. It does not matter whether any network device (such as a workstation or server) or fiber transceiver module is plugged into the switch or not when powered on. After the power is on, all LED indicators will light up immediately and then all LEDs except the power LED go off. This resets the system.
Firmware Loading
After resetting, the boot loader will load the firmware into the memory. This will take about 30 seconds, then all switch LEDs will flash once as the switch automatically performs a self-test.
3.2 Installing the Chassis in a 19-Inch Wiring Closet Rail
CAUTION
Allow proper spacing and air ventilation for the cooling fan on both sides of the chassis. Wear a grounding device for electrostatic discharge.
1. Using two screws (included), attach the rackmount ears to the switch’s left and right sides. See Figure 3-2.
2. Line up the mounting holes on the switch assembly (the switch with rackmount ears installed) with the mounting holes on a 19" wiring closet rack. Install two screws (included) to hold the switch in place in the rack.
16
Page 20
12-Port 1000BASE-TX L2 Managed PoE
Switch with 2 SFP Dual Media Ports
CHAPTER 3: Installation
Figure 3-2. Installing the switch chassis in a 19"rack.
3.3 Cabling Requirements
3.3.1 TWISTED-PAIR PORTS
For Fast Ethernet or Gigabit Ethernet twisted-pair (TP) connections, use CAT5 or CAT5e cable up to 328 feet (100 m) long.
3.3.2 F
For Gigabit Ethernet fiber transceiver ports, use fiber optic cable as described below.
62.5/125-μm multimode Gigabit fiber with multimode LC SFP module (LGB200C-MLC).
9/125-μm single-mode Gigabit fiber with single-mode LC SFP module (LGB200C-SLC10 orLGB200C-SLC30).
9/125-μm single-strand single-mode Gigabit fiber with BiDi LC1310-nm SFP module (LGB204C).
9/125-μm single-strand single-mode Gigabit fiber with BiDi LC1550-nm SFP module (LGB205C).
3.3.3 S
Theoretically, the switch partitions the collision domain for each port in switch cascading so that you may up-link an unlimited number of switches. In practice, the network extension (cascading levels and overall diameter) must comply with the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications, which limit the timing requirement from physical signals defined by the Media Access Control (MAC) and PHY802.3 series specification, and timer from some OSI layer 2 protocols such as 802.1d, 802.1q, and LACP.
IBER TRANSCEIVER PORTS
WITCH CASCADING
The fiber, TP cables, and devices’ bit-time (round-trip) delay are as described in Table 3-1.
17
Page 21
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 3-1. Cable’s bit-time (round-trip) delay.
1000BASE-X TP, Fiber 1000BASE-TX TP 100BASE-FX Fiber
Round-Trip Delay: 4096 Round-Trip Delay: 512
Cat. 5 TP Wire: 11.12/m Fiber Cable: 10.10/m Bit Time Unit: 1 ns (1 sec./1000 Mega bit)
Cat. 5 TP Wire: 1.12/m Fiber Cable: 1.0/m TP to Fiber Converter: 56 kbps Bit Time Unit: 0.01 ms (1 sec./100 Mega bit)
The sum of all elements’ bit-time delay and the overall bit-time delay of wires/devices must be within the bit-time (round-trip) delay in a half-duplex network segment (collision domain). For full-duplex operation, this will not apply. Use the TP-Fiber module to extend the TP node distance over fiber optic cable and to provide the long-haul connection.
Typical Network Topology in Deployment
A hierarchical network with minimum switch levels may reduce the timing delay between the server and the client station. This approach will minimize the number of switches in any one path. It will also lower the network loop possibility and will improve network efficiency. If more than two switches are connected in the same network, select one switch as the Level 1 switch and connect all other switches to it at Level 2. We recommend that you connect a server/host to the Level 1 switch.
Example 1: Same LAN.
All switch ports are in the same local area network. Every port can access each other (see Figure 3-3).
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
PCs PCs Server/host
18
Figure 3-3. No VLAN configuration.
Page 22
Example 2: Port-based VLAN
If VLAN is enabled and configured, each node in the network that can communicate with each other directly is in the same VLAN.
The switch supports both port-based VLAN and tag-based VLAN. They are different in practical deployment, especially in physical location. Figures 3-4 and 3-5 show a port-based VLAN and Figure 3-6 shows an attribute-based VLAN.
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
CHAPTER 3: Installation
VLAN 1 VLAN 2 VLAN 3 VLAN 4
Figure 3-4. One switch connected to four VLANs in a port-based VLAN.
NOTES
The same VLAN members must be connected to the same switch. VLAN members can’t access another VLAN’s members. The switch manager must assign different names for each VLAN group at one switch.
19
Page 23
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Example 3: Another Port-Based VLAN
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
VLAN 1 VLAN 2 VLAN 3 VLAN 4
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
Figure 3-5. Two switches connected to two VLANs, each in a port-based VLAN.
NOTES
VLAN 1 members can’t access VLAN 2, VLAN 3, and VLAN 4 members. VLAN 2 members can’t access VLAN 1 and VLAN 3 members, but they can access VLAN 4
members. VLAN 3 members can’t access VLAN 1, VLAN 2, and VLAN 4. VLAN 4 members can’t access VLAN 1 and VLAN 3 members, but they can access VLAN 2
members.
20
Page 24
CHAPTER 3: Installation
Example 4. The same VLAN members can be at different switches with the same VID
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
12-Port 1000BASE-TX L2
Managed PoE Switch with 2
SFP Dual Media Ports
VLAN 1
VLAN 2
VLAN 3
Figure 3-6. Attribute-based VLAN diagram.
3.4 Configuring the Management Agent
There are two ways to start up the switch management function: RS-232 console and Ethernet port. Use one to monitor and configure the switch. Follow the instructions in Sections 3.4.1 and 3.4.2.
Modify the IP address, subnet mask, default gateway, and DNS through the RS-232 console.
NOTE
21
Page 25
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.4.1 V
IA THE SERIAL RS-232 CONSOLE PORT
To configure the switch through its serial RS-232 console port, the port must be directly connected to a DCE device (for example, a PC, through an RS-232 cable with a DB9 connector). See Figure 3-7.
AC line outlet
12-Port 1000BASE-TX L2 Managed
RS-232 Cable
PoE Switch with 2 SFP Dual Media Ports
Default IP setting:
IP address: 192.168.1.1
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.254
Serial console PC
Figure 3-7. Connecting the switch’s RS-232 DB9 port to a serial console.
Next, run a terminal emulator with the switch’s serial port’s default setting. Using this, you can communicate with the switch.
The RS-232 interface only supports a 57.6-kbps baud rate with 8 data bits, 1 stop bit, no parity check, and no flow control.
To configure the switch:
1. Attach the included DB9 female cable’s connector to the switch’s male serial RS-232 DB9 connector.
2. Attach the other end of the serial RS-232 DB9 cable to the PC’s serial port, running a terminal emulator
supporting a VT100™/ANSI terminal with the switch’s serial port default settings. For example, use the Windows® 98/2000/XP HyperTerminal utility.
NOTE
The switch’s serial port default settings are listed below:
Baud rate: 57600 Stop bits: 1 Data bits: 8 Parity: N Flow control: None
3. Once the cable is connected, press the Enter key. The login prompt appears on the screen. The default username and password are:
Username = admin Password = admin
22
Page 26
Set IP Address, Subnet Mask, and Default Gateway IP Address
The switch’s default IP address, gateway, and subnet mask are listed in Table 3-2.
Table 3-2. The switch’s default and revised network settings.
Parameter Default Value Sample Network Setting
CHAPTER 3: Installation
IP Address Subnet Default Gateway
192.168.1.1
255.255.255.0
192.168.1.254
10.1.1.1
255.255.255.0
10.1.1.254
NOTE
There are no default DNS settings. DNS addresses are assigned by the network administrator.
You can first either configure your PC’s IP address or change the switch’s IP address, then change the default gateway’s IP address and subnet mask.
For example, suppose your network address is 10.1.1.0, and the subnet mask is 255.255.255.0. You can change the switch’s default IP address 192.168.1.1 to 10.1.1.1 and set the subnet mask to 255.255.255.0. Then, choose the default gateway’s address (for example 10.1.1.254).
After completing these settings, reboot it so the configuration takes effect. After this step, operate the management through the network, either from a Web browser or Network Management System (NMS). See Figure 3-8.
Copyright (c) 1981–2005 Black Box Corp. L2 Managed Switch LPB200A
Login: admin Password:
LPB200A#
Figure 3-8. The CLI login screen for the LPB200A.
23
Page 27
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.4.2 V
IA THE ETHERNET PORT
There are three ways to configure and monitor the switch through the switch’s Ethernet port: CLI, Web browser, and SNMP management. The user interface for SNMP is NMS dependent and is not described here. CLI and Web browser interfaces are described below.
24-Port 10/100BASE-TX L2 Managed PoE
Switch with 2 SFP Dual Media Ports
Assign a reasonable IP address, for example:
IP address: 192.168.1.100
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.254
Ethernet
LAN
PC
Figure 3-9. Connecting the Ethernet LAN PC to the switch for network management through an
Ethernet port.
Managing the Switch via the Ethernet Port
Before you communicate with the switch, you must first configure or identify the switch’s IP address. Next, follow the steps listed below.
1. Connect the switch and PC together via UTP CAT5 cable with RJ-45 connectors.
NOTE
If the PC directly connects to the switch, set up the same subnet mask between them. If the PC connects to the switch through a remote site, the remote PC’s subnet mask
may be different.
2. Run CLI or a Web browser and follow the menus. For details, refer to Chapters 4 and 5.
3. A login screen appears. Type in the switch’s username and password in this screen.
24
Page 28
CHAPTER 3: Installation
3.5 IP Address Assignment
For IP address configuration, you will need the switch’s IP address, subnet mask, default gateway, and DNS.
3.5.1 IP A
The network device’s address is used for internetworking communication. The 32-bit address consists of a network identifier and a host identifier. It’s split into predefined address classes or categories.
Each class has its own network range between the network identifier and host identifier in the 32-bit address. Each IP address has two parts: network identifier (address) and host identifier (address). The network address is the network where the addressed host resides, and the host identifier indicates the individual host in the network that the host address refers to. The host identifier must be unique in the same LAN.
The IP address is divided into three classes: class A, class B, and class C. The rest of the IP addresses are used for multicast and broadcast. The network prefix’s bit length is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24. The address range for each class is described below.
Class A
The address is less than 126.255.255.255. A total of 126 networks can be defined. (The address 0.0.0.0 is reserved for default route and 127.0.0.0/8 is reserved for loop back function.)
Class B
The IP address ranges between 128.0.0.0 and 191.255.255.255. Each class B network has a 16-bit network prefix followed by a 16-bit host address. There are 16,384 (214)/16 networks that can be defined with a maximum of65534 (216-2) hosts per network.
DDRESS
Class C
The IP address ranges between 192.0.0.0 and 223.255.255.255. Each class C network has a 24-bit network prefix followed by an 8-bit host address. A total of 2,097,152 (221)/24 networks can be defined with a maximum of 254(28-2) hosts per network.
Class D and E
Class D is a class with the first 4 MSBs (Most Significant Bits) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with the first 4 MSBs set to 1-1-1-1 and is used for IP broadcast.
According to IANA (Internet Assigned Numbers Authority), three specific IP address blocks (called a private IP address) are reserved for extending an internal network. They are listed below.
Class A 10.0.0.0---10.255.255.255
Class B 172.16.0.0---172.31.255.255
Class C 192.168.0.0---192.168.255.255
Refer to RFC 1597 and RFC 1466 for more information. These documents are available at www.faqs.org.
25
Page 29
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.5.2 S
Subnet mask is the sub-division of a class-based network or a CIDR block. The subnet is used to determine how to split an IP address to the network prefix and the host address. It’s designed to use an IP address more efficiently to manage an IP network.
For a class B network, 128.1.2.3, the default subnet mask may be 255.255.0.0. The first two bytes are all 1s. This means more than 60 thousands of nodes in flat IP addresses will be on the same network. It’s too large to manage practically. If we divide it into smaller networks by extending the network prefix from 16 bits to, say 24bits, the network uses its third byte to subnet this class B network. The subnet mask is 255.255.255.0; each bit of the first three bytes is 1. The first two bytes are used to identify the class B network, the third byte is used to identify the subnet within this class B network, and the last byte is the host number.
Not all IP addresses are available in the subnetted network. Two special addresses are reserved. They are the addresses with all zeros and all ones host number.
As shown in the table below, the subnet mask with a 25-bit long, 255.255.255.128 address contains 126 members in the subnetted network. The network prefix length equals the bit number with 1s in that subnet mask. Use this table to count the number of IP addresses matched.
According to the table above, a subnet mask 255.255.255.0 will partition a network with the class C. This means that a maximum of 254 effective nodes exist in this subnetted network and it’s considered a physical network in an autonomous network. A sample network IP address is 168.1.2.0.
UBNET MASK
Prefix Length Number of IPs Matched
Table 3-3. Subnet mask values.
Number of Addressable IPs
/32 1 ­/31 2 ­/30 4 2 /29 8 6 /28 16 14 /27 32 30 /26 64 62 /25 128 126 /24 256 254 /23 512 510 /22 1024 1022 /21 2048 2046 /20 4096 4094 /19 8192 8190 /18 16384 16382 /17 32768 32766 /16 65536 65534
With the subnet mask, for more than two independent networks in a worknet, the network can be partitioned into smaller networks. A subnet mask must be applied.
For different network applications, a sample subnet mask is 255.255.255.240. This is for a small network with a maximum of 15 nodes.
26
Page 30
CHAPTER 3: Installation
3.5.3 D
For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as the default router. Only the switch uses the gateway setting for Trap Events Host.
When assigning an IP address to the switch, first check to see what an existing switch on the same network uses as a network address. Use the same network address and append your host address to it.
Once you type in the username and password in the login screen, the IP Configuration screen appears. Options in this screen include DHCP Setting, IP Address, Subnet Mask, Default Gateway, DNS Server, and the Apply button.
Type in the IP address in the format 192.168.1.xon your PC.
For the subnet mask, enter 255.255.255.0. Any subnet mask such as 255.255.255.x is allowed.
3.5.4 DNS
The Domain Name Server translates a human-readable machine name to an IP address. Every machine on the Internet has a unique IP address. A server generally has a static IP address. To connect to a server, the client needs to know the server’s IP. However, a user generally uses the name to connect to the server. Thus, the switch DNS client program (such as a browser) will ask the DNS to find the named server’s IP address.
EFAULT GATEWAY
3.6 Typical Applications
The LGB201A implements 24 Fast Ethernet TP ports with auto MDIX and 2 Gigabit dual media ports with SFP for removable module supported comprehensive fiber types of connection, including LC, BiDi LC for SFP.
Use the switch for the following applications.
FTTB (Fiber To The Building)/FTTO (Fiber To The Office) application is used in carrier or ISP (see
Figure 3-10).
FTTH (Fiber To The Home) application is used in carrier or ISP (see Figure 3-11).
Daisy-Chain Fiber Network Connection (see Figure 3-12).
27
Page 31
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.6.1 FTTB/FTTO C
ONNECTION
Figure 3-10 shows a FTTB/FTTO application is used in carrier or ISP.
Figure 3-10. Network Connection of FTTB/FTTO.
28
Page 32
CHAPTER 3: Installation
3.6.2 FTTH C
Figure 3-11 shows a FTTH application is used in carrier or ISP.
ONNECTION
Figure 3-11. Network Connection of FTTH.
29
Page 33
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
3.6.3 D
AISY-CHAIN FIBER NETWORK CONNECTION
Figure 3-12 shows the Daisy-Chain Fiber Network Connection.
Figure 3-12. Typical office network using three switches.
30
Page 34
CHAPTER 4: Web-Based Management
4. Web-Based Management
This chapter explains how to configure and manage the switch through the Web user interface. Via one switch port, you can easily access and monitor the switch’s status, including MIBs, port activity, spanning tree, port aggregation, multicast traffic, VLAN and priority, and even a record of illegal access to the network.
The switch’s default values are listed in Table 4-1.
Table 4-1. Default settings.
Parameter Setting
IP Address 192.168.1.1 Subnet Mask 255.255.255.0 Default Gateway 192.168.1.254 Username admin Password admin
NOTE
Before accessing the managed switch via a network port, you must first configure the switch in its command-line interface (CLI) from the connected a sync serial COM/RS-232 interface. For details, see Chapter 5.
Once you configure the switch, type in the IP address (for example, http://192.168.1.1) in the address row in a browser. The login screen appears. Table 4-2 lists the screen options.
Table 4-2. Login screen parameters.
Parameter Setting
Username admin Password admin Login Click on this button to log in. Cancel Click on this button to cancel the log in. Forget Password Click on this button to choose a new password.
Type in the username and password. (The default username and password are both admin.) The first time you log in, type in the default username and password, then click on the Login button.
31
Page 35
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
If you forget the password, click the link of Forget Password in Web UI or press the Ctrl button, then type Z in the CLI login screen. The system then displays a serial number. Write down this serial number and contact Black Box—we’ll give you a temporary password. Type in this new password as ID and Password, and the system will allow you to temporarily log into the system with manager authority. This password allows you to login to the system only one time, so modify your password immediately after you log into the system successfully.
To modify your password, type in the complete new username and password. The switch will not give you a shortcut to the username automatically. This looks inconvenient, but it provides additional system security.
The switch supports a simple user management function, allowing only one administrator to configure the system at a time. If two or more users use the administrator’s identity, the switch will allow only the one who logs in first to configure the system. Other users, even with an administrator’s identity, can only monitor the system. Users who have no administrator’s identity can only monitor the system. A maximum of three users can log in simultaneously.
To optimize the display effect, we recommend using Microsoft® Internet Explorer® version 6.0 or above, Netscape® V7.1 or above, or FireFox V1.00 or above with a resolution of 1024 x 768. The switch supports a neutral Web browser interface.
4.1 Home Overview
Once you log into the switch, the Home screen appears.
At the top of the screen, the switch’s front-panel diagram appears. The linked ports display green, and the unlinked ports appear dark. The slot shows only a cover plate if no module exists, and it shows a module if a module is present. The module image depends on the one that’s installed in the switch. If disconnected, the port will appear dark; if linked, it will be green.
Simply click on the ports in the switch diagram to browse the information for a specific port. An information window appears, containing Link, State, Auto Negotiation, Speed/Duplex, Flow Control, Ingress All State, Ingress All Rate, Ingress Storm State, Egress All State, Egress All Rate, Tx Byte, Rx Byte, Tx Packet, Rx Packet, Tx Collision, RX Error Packet, and the Close button.
In the left top corner of the screen, a pull-down list appears for Auto Logout. This is a security function meant to prevent illegal users from accessing the switch. If you select ON, the system will log out automatically when there is no action on the device for three minutes. If you select OFF, the screen will remain visible to the user. The default setting is ON.
On the left side of the screen, the main menu tree for the Web is listed. Options (in a vertical list on the left side of the screen) include System, Port, Mirror, Bandwidth, QoS, SNMP, IGNP Snooping, Max. Packet Length, DHCP Boot, VLAN, MAC Table, GVRP, STP, Trunk, 802.1x, Alarm, Configuration, Diagnostics, TFTP Server, Log, Firmware Upgrade, Reboot, and Logout. These options are described in Sections 4.2 through 4.24.
4.2 System
4.2.1 SYSTEM INFORMATION
Click on System in the Home screen, and the System Information screen appears. This screen’s settings are described in Table 4-3.
32
Page 36
CHAPTER 4: Web-Based Management
Table 4-3. System Information screen settings.
Parameter Description
Model Name LPB200A
System Description 12-Port 1000BaseT/TX Managed PoE Switch.
Location The user-defined switch location. Contact This is the contact name and phone number for help.
Configure this parameter via the switch’s user interface or
SNMP. Device Name The user-defined switch’s name. LPB200A is the default. System Up Time Time in days, hours, and minutes accumulated since the
switch was powered on. Its format is day of week, month,
day , hours: minutes: seconds, year. For example, Wed., Apr.
26, 12:10:10, 2006. Current Time The switch’s system time. Its format is day of week, month,
day , hours: minutes: seconds, year. For example, Wed., Apr.
26, 12:10:10, 2006.
BIOS Version The switch’s BIOS version.
Firmware Version The switch’s firmware version. Hardware-Mechanical Version The electrical and mechanical switch version. The figure
before the hyphen is the electronic hardware version; the
one after the hyphen is the mechanical hardware version.
Serial Number The switch’s serial number; assigned by the manufacturer.
Host IP Address The switch’s IP address.
Host MAC Address The switch’s management agent’s Ethernet MAC address.
Device Port Displays all types and numbers of switch ports.
RAM Size The switch’s DRAM size.
Flash Size The switch’ s Flash memory size.
Apply button Click on this button to apply the selections.
33
Page 37
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.2.2 IP CONFIGURATION
IP configuration is one of the most important switch configurations. Without the proper setting, the network manager will not be able to manage or view the device. The switch supports both manual IP address setting and automatic IP address setting via a DHCP server. When the IP address is changed, you must reboot the switch for the setting to take effect and to use the new IP to browse for Web management and CLI management. To get to the IP Configuration screen, click on IP in the System menu. Then, set the switch’s IP address, subnet mask, default gateway, and DNS. Table 4-4 describes the IP Configuration screen parameters.
Table 4-4. IP Configuration screen options.
Parameter Description
DHCP Setting Dynamic Host Configuration Protocol (DHCP) can be ON or OFF.
Select Enable or Disable from the drop-down menu. The switch supports a DHCP client that’s used to get an IP address
automatically if you set this function to Enable. When enabled, the switch will issue the request to the DHCP server residing in the network to get an IP address. If the DHCP server is down or does not exist, the switch will issue the request and show the IP address as requesting, until the DHCP server is up. Before getting an IP address from the DHCP server, the device will not continue booting procedures. If this field is set to Disable, you must type in the IP address manually. For more details about IP address and DHCP, see Section3.5.
The default setting is Disable.
IP address If DHCP is set to Disable, you can type in new IP settings. Then click
on the Apply button. When DHCP is disabled, the default setting is 192.168.1.1. If DHCP is enabled, this field is filled by the DHCP server and will not
allow you to manually type it in.
Subnet mask An IP device in a network must own its IP address, composed of a
Network address and a Host address; otherwise, it can’t communicate with other devices. Subnet mask is designed to provide more network addresses. The network classes A, B, and C are all too large to fit for almost all networks; subnet mask solves this problem. The subnet mask uses some bits from the host address and makes an IP address look like a network address, subnet mask number, and host address. This reduces the total IP number that a network can support, by the amount of 2 power of the bit number of subnet number (2
[bit number of subnet number]
).
34
Page 38
CHAPTER 4: Web-Based Management
Table 4-4 (continued). IP Configuration screen options.
Parameter Description
Subnet mask (continued) Subnet mask sets the subnet mask value, which should be the same
value as that of the other devices residing in the same network that the switch is attached to. For more information, see Section 3.5.
Default: 255.255.255.0
Default gateway Set an IP address for a gateway to handle those packets that do not
meet the routing rules predefined in the device. If a packet does not meet the criteria for another pre-defined path, it must be forwarded to a default router on a default path. This means any packet with an undefined IP address in the routing table will be sent to this device unconditionally.
Default: 192.168.1.254
DNS Domain Name Server translates the IP address and name address.
The switch supports the DNS client function to re-route the mnemonic name address to the DNS server to get its associated IP address for accessing the Internet. Specif y a DNS IP address for the switch. With this, the switch can translate a mnemonic name address into an IP address.
There are two ways to specify the DNSIP address. Fixed mode manually specifies its IP address, and dynamic mode i s assig ned by the DHCP server while DHCP is enabled. DNS can help you easily remember the mnemonic address name with meaningful words. The default is no DNS address assignment.
Default: 0.0.0.0
Apply button Click on this button to save the changes.
4.2.3 TIME CONFIGURATION
In the System menu, click on Time Configuration (see Table 4-5).The switch provides manual and automatic ways to set the system time via NTP*. The manual setting is simple—just type in the year, month, day, hour, minute, and second within the valid value range indicated in each item. If you type in an invalid value (for example, 61 in minutes), the switch changes the figure to 59.
*NTP is a well-known protocol used to synchronize the switch system time clock over a network. NTP, an Internet draft standard formalized in RFC 1305, has been adopted on the system as version 3 protocol. The switch provides four built-in NTP server IP addresses residing in the Internet and a user-defined NTP server IP address. The time zone is Greenwich-centered (Greenwich Mean Time or GMT), using the form GMT+/- xx hours.
35
Page 39
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-5. Time Configuration screen options.
Parameter Description
Time Type in the system time or set it by syncing from Time servers. The
function also supports daylight savings time for different areas’ time adjustment.
Current Time Shows the current system time.
Manual Adjust the time manually . Type in the valid figures in the Year, Month,
Day, Hour, Minute, and Second fields respectively, then click on the Apply button to adjust the time. The valid figures for the parameter Year, Month, Day, Hour, Mi nute, and Second are >=2000, 1–12, 1–31, 0–23, 0–59, and 0–59 respectively. If you type in an invalid figure and press the Apply button, the device will reject the time adjustment request. There is no time zone setting in Manual mode.
Default: Year = 2000, Month = 1, Day = 1, Hour = 0, Minute = 0, Second = 0
NTP NTP is Network Time Protocol and is used to sync the
network-time-based Greenwich Mean Time (GMT). If you use the NTP mode and select a built-in NTP time se rver or manually specify a user-defined NTP server as well as Time Zone, the switch will sy nc the time after you press the Apply button. Though it sy nchronizes the time automatically, NTP does not update the time periodically without user processing.
Time Zone is an of fset time of GMT. From the drop-down menu, select the time zone first and then perform time sync via NTP. The switch will combine this time zone offset and update NTP time to the local time; otherwise, you will not be able to get the correct time. The switch supports a configurable time zone from -12 to +13 in 1-hour steps.
Default time zone: +8 Hrs.
Daylight Saving If set for daylight savings time, the switch will adjust the time lag or
advance in units of hours, according to the starting date and the ending date. From the drop-down menu, set the daylight savings time to 1 hour. When the time p asses over the starting time, the system time will be increased one hour after one minute at the time since it passed over . And when the time passes over t he ending time, the system time will be decreased one hour after one minute at the time since it passed over.
36
Page 40
CHAPTER 4: Web-Based Management
Table 4-5 (continued). Time Configuration screen options.
Parameter Description
Daylight saving (continued) The switch supports valid configurable daylight savings time of -5
to+5 step one hour. The zero for this parameter means it does not have to adjust current time; it’s equivalent to activating daylight saving. In this case, you don’t have to set the starting/ending date. If you set daylight saving to be non-zero, you have to set the starting/ending dates; otherwise, the daylight saving function will not be activated.
Default for Daylight Saving: 0
Daylight Saving Start This defines when to st art performing the daylight saving time.
Mth: Range is 1–12. Default: 1 Day: Range is 1–31. Default: 1 Hour: Range is 0–23. Default: 0
Daylight Saving End Set this to stop performing the daylight saving time.
Mth: Range is 1–12. Default: 1 Day: Range is 1–31. Default: 1 Hour: Range is 0–23. Default: 0
Apply button Click on this button to apply the settings.
4.2.4 ACCOUNT CONFIGURATION
To get to the Account Configuration screen, click on Account in the System menu. Only the user logged in as administrator can create, modify, or delete the username and password. The administrator can modify other guest identities’ passwords without confirming the password but must also modify the administrator-equivalent identity. A guest-equivalent identity can modify his own password only. You must confirm administrator/guest identity in the Authorization field in advance before configuring the username and password. Only one administrator is allowed to exist and can’t be deleted. Up to four guest user accounts can be created.
Table 4-6. Account configuration screen settings.
Parameter Description
Account Name Type in the name. Authorization Select administrator or guest user from the drop-down menu. Create New Click on this button to create a new guest user account. Edit Click on this button to edit a guest user account. Delete Click on this button to delete a guest user account.
37
Page 41
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
The default setting for administrator user account is:
Username: admin Password: admin
The default setting for guest user account is:
Username: guest Password: guest
4.2.5 M
ANAGEMENT POLICY
Limiting User Access to the Switch
Through the management security configuration, the administrator can control the switch and limit the user’s access to this switch. To get to this screen, click on Management Policy in the System menu.
The following rules apply:
1. When no lists exist, then the switch will accept all connections.
2. When only “accept lists” exist, then the switch will deny all connections, excluding the connection inside the accepting range.
3. When only “deny lists” exist, then the switch will accept all connections, excluding the connection inside the denying range.
4. When both “accept and deny” lists exist, then the switch will deny all connections, excluding the connection inside the accepting range.
5. When both “accept and deny” lists exist, then the switch will deny all connections, excluding the connection inside the accepting range and NOT inside of the denying range at the same time.
Management Security Configuration
With the Management Security Configuration function (see Table 4-7), the manager can easily control the user’s mode when connecting to the switch. According to the mode, users can be classified into two types: those who are able to connect to the switch (Accept) and those who are unable to connect to the switch (Deny).Some restrictions also can be placed on the user mode while connecting to the switch. For example, a VLANVID can be accepted or denied by the switch, the user’s IP range can be accepted or denied by the switch, the port that the user is allowed or not allowed to connect with the switch, or the way of controlling and connecting to the switch can vary (via HTTP, Telnet, or SNMP).
38
Page 42
CHAPTER 4: Web-Based Management
Table 4-7. Management Security Configuration settings.
Parameter Description
Name A name is co mposed of any letter (A–Z, a–z) and digit (0–9) with a
maximum of 8 characters.
VID VID supports two buttons for managed valid VLAN VID: Any and
Custom. The default is the Any button. When you click on the Custom button, you can type in the VID number. The valid VID range is 1–4094.
IP Range The switch supports two options for the managed valid IP Range: Any
and Custom. The default is the Any button. When you click on the Custom button, you can type in an effective IP range. The valid range is 0.0.0.0–255.255.255.255.
Incoming Port The switch supports options for managed valid Port Range: Any and
Custom. The default is the Any button. When you click on the Custom button, you can check the box(es) next to the ports that you would like to be restricted in the management security configuration.
Access Type The switch supports two options for managed valid Access Type: Any
and Custom. The default is the Any button. When you click on the Custom button, you can check the box next to the option you want to use to access and manage the switch. The three options include HTTP, Telnet, and SNMP.
Action The switch supports two options for managed valid Action Type: Deny
and Accept. The default is the Deny button. When you choose Deny, you can’t manage the switch. If you click on the Accept button, you can manage the switch.
Edit/Create Click on this button to create a new management security entry, or to
modify an existing entry.
Delete Click on this button to remove the selected management security
configuration entry from the management security table.
4.2.6 VIRTUAL STACK
Virtual Stack Management (VSM) is the group management function. To get to this option, click on Virtual Stack in the System menu. Through the proper configuration of this function, switches in the same LAN will
be grouped automatically. Among these switches, one switch will be a master machine, and the others in this group will become the slave devices.
VSM offers a simple centralized management function. You don’t have to remember all devices’ addresses, since the administrator can manage the network with knowing only the Master machine’s address. Instead of
39
Page 43
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
an SNMP or Telnet user interface, VSM is only available in a Web user interface (UI). While one switch is the Master, two rows of buttons for a group device will appear on the top of its Web UI. Press the buttons to connect the group devices’ Web UI in the same window without logging in to the corresponding devices.
The top-left button is only for the Master device. The background color of the button you press will be changed to represent that the device is under your management.
NOTE
If you log into the switch via the console, the grouping will be removed temporarily.
The group device is shown as station address (the last number of IP Address) + device name on the button (for example, 196_LPB200A); otherwise it will display “----”if no corresponding device exists.
Once the devices join the group successfully, then they can only be managed via the Master device, and a user won’t be able to manage them individually via Telnet/console/Web.
Up to 16 devices can be grouped for VSM; however, only one Master is allowed to exist in each group. For Master redundancy, you may configure more than two devices as the Master device; however, the Master device with the smaller MAC value will be the Master one. All 16 devices can become a Master device and back up each other.
Table 4-8. Virtual Stack screen options.
Parameter Description
State Activates or de-activates VSM. Select Enable or Disable from the
drop-down menu. The default is Enable.
Role The role that the switch plays in the virtual stack. Sele ct Master or
Slave from the drop-down menu. The default is Master.
Group ID Type in the group identifier (GID) to indicate a VSM. Valid letters are
A–Z, a–z, 0–9, “-” and “_” characters. The maximum length is 15 characters.
Apply button Click on this button to apply the settings.
4.3 Port Configuration
To get to the Port Configuration menu, click on Port in the Home screen. This menu contains Status, Configuration, Simple Counter, and Detail Counter for port monitoring and management. They are described in Sections 4.3.1 through 4.3.4.
4.3.1 S
The function Port Status gathers the information of all ports’ current status and reports it by port number, link status, port state, auto-negotiation status, speed/duplex, and flow control. To get to the Port Status screen, click on Port Status in the Port menu (see Table 4-9). Media type information for the module ports 11, 12 is listed in Table 4-10.
TATUS
40
Page 44
CHAPTER 4: Web-Based Management
Table 4-9. Port Configuration menu options.
Parameter Description
Port Status Report the latest updated status of all switch ports. When any one of
the ports in the switch changes its p arameter displayed in the page, the port status will automatically refresh about every 5 seconds.
Port No. Display the port number. The number is 1–12. Ports 11, 12 are
optional modules.
Media Show the media type adopted in all ports. The Port 25 and Port 26
are optional modules, which support either fiber or UTP media with either Gigabit Ethernet (1000Mbps) or 10/100Mbps F ast Ethernet port. They may have different media types and speed. Especially, fiber port has comprehensive types of connector, distance, fiber mode and so on. The switch describes the module ports with the following page.
Link Shows if the link on the port is active or not. If the link is connected to
a device that is working properly, the Link will show the link Up; otherwise, it will show Down. Both connected devices determine the link value.
No default value.
State Shows that the port’s communication function is Enabled or
Disabled. When it’s enabled, traffic can be transmitted and received via this port. When it’s disabled, no traffic can be transferred through this port. The Port State is configured by the user.
Default: Enabled.
Auto Negotiation Shows the Ethernet MAC’s exchange mode. The switch supports
two modes: auto-negotiation mode Enabled and forced mode Disabled. When in Enabled mode, this switch automatically negotiates the best speed and duplex values at both ends of the connection. When in Disabled mode, both parties must have the same speed and duplex settings; otherwise, they won’t be linked. In this case, the link result is Down.
Default: Enabled
41
Page 45
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-9 (continued). Port Configuration menu options.
Parameter Description
Speed/Duplex Mode Display the speed and duplex of all port. There are three speeds
10Mbps, 100Mbps and 1000Mbps supported for TP media, and the duplex supported is half duplex and full duplex. If the media is 1Gbps fiber, it is 1000Mbps supported only. The status of speed/duplex mode is determined by 1) the negotiation of both local port and link partner in Auto Speed mode or 2) user setting in Force mode. The local port has to be preset its capability.
Default: None, depends on the negotiation result.
Flow Control Show each port’s flow control status.
There are two types of flow control in Ethernet, Backpressure for half-duplex operation and Pause flow control (IEEE802.3x) for full-duplex operation. The switch supports both of the m.
Default: Disable
Wait State For 10/100M ports, there is no side effect on this setting.
For Gigabit ports, setting of Wait-State will remove the issue with ignored pause frames but resolve in the minimum interframe gap being at least 14 bytes instead of the usual 12 bytes. This applies for uncongested traffic as well. The larger interframe gap will result in throughput rates less than 100%. For example, a stream of 64-byte frames and a stream of 1518-byte frames, their maximum throughput is 97.7% and 99.9% respectively.
Table 4-10. Ports 11---12.
Parameter Description
Connector Type Displays the connector type—for example, UTP, SC, ST®, or LC.
Fiber Type Displays the fiber mode—for example, multimode or single-mode.
Tx Central Wavelength Displays the fiber optic transmitting central wavelength—for example,
850-nm, 1310-nm, or 1550-nm.
Baud Rate Displays the fiber module’s maximum supported baud rate—for
42
example, 10M, 100M, or 1G.
Page 46
Table 4-10 (continued). Ports 11--12.
CHAPTER 4: Web-Based Management
Parameter Description
Vendor OUI Displays the Manufacturer's OUI code that’s assigned by IEEE.
Vendor Na me Displays the module manufacturer’s company name.
Vendor P/N Displays the manufacturer’s switch’s part number.
Vendor Rev (Revisi on) Displays the module revision.
Vendor SN (Serial Number) Shows the manufacturer-assigned serial number.
Date Code Shows the date this SFP module was made. Temperature Shows the SFP module’s current temperature. Vcc Shows the SFP module’s working DC voltage. Mon1 (Bias) mA Shows the SFP module’s bias current. Mon2 (TX PWR) Shows the SFP module’s transmit power. Mon3 (RX PWR) Shows the SFP module’s receiver power. Close button Click on this button to close the window .
4.3.2 CONFIGURATION
Use the Configuration menu to change each port’s setting. To get to this screen, click on Config in the Port menu. In this menu, you can set/reset the following functions. All are described in detail in Table 4-11.
Table 4-11. Configuration screen options.
Parameter Description
State From the drop-down menu, set the port’s communication capability
to Enabled or Disabled. When enabled, traffic can be transmitted and received via this port. When disabled, the port is blocked and no traffic can be transferred through this port. Port State is configurable by the user. If you set a port’s state to Disable, then that port is prohibited from passing any traffic.
Default: Enable.
43
Page 47
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-11 (continued). Configuration screen options.
Parameter Description
Mode Set the speed and duplex of the port. In speed, 10/100Mbps baud
rate is available for Fast Ethernet, Gigabit module in port 11, 12. If the media is 1Gbps fiber , it is always 1 000Mbp s and the duplex is f ull only. If the media is TP, the Speed/Duplex is comprised of the combination of speed mode, 10/100/1000Mbps, and duplex mode, full duplex and half duplex. The following table summarized the function the media supports.
Media Type NWay Speed Duplex 100M TP ON/OFF 10/100M Full/Half 1000M TP ON/OFF 10/100/1000M Full for all, Half for 10/100 1000M Fiber ON/OFF 1000M Full In auto-negotiation mode, there is no default value. In forced mode,
the default value depends on your setting.
Flow Control There are two modes to choose in flow control, including Symmetric
and Asymmetric. If flow cont rol is set Symmetric, both parties can send PAUSE frame to the transmitting device(s) if the receiving port is too busy to handle. When it is set Asymmetric, this will let the receiving port care the PAUSE frame from transmitting device(s), but it doesn’t send PAUSE frame. This is one-way flow control.
Default: Enable
Wait State For more details about this parameter please refer to section 4.3.1.
Default: Disable.
Apply Click on this button to save the settings.
4.3.3 SIMPLE COUNTER
Simple Counter collects any information and provides the port traffic counting, whether the packet is good or bad. To get to this screen, click on Simple Counter in the Port Configuration screen.
The Simple Counter window can show all ports’ counter information at the same time. To get to this screen, click on Simple Counter in the Port menu. Each data field is 20 digits long. If the count is more than 20 (overflow), the counter will reset and restart counting. The data is updated every time a user defines an interval. The valid range is 3 to 10 seconds. The Refresh Interval sets the update frequency. The default update time is 3 seconds.
44
Page 48
Table 4-12. Simple Counter screen options.
CHAPTER 4: Web-Based Management
Parameter Description
Simple Counter Displays each port’s traffic summary counting, including Tx Byte, Rx
Byte, Tx Packet, Rx Packet, Tx Collision, and Rx Error Packet.
Refresh Interval Select a number (in seconds) from the drop-down menu.
Reset button Click on this button to reset the simple counter.
Port No. The port number.
Tx Byte Total transmitted bytes.
Rx Byte Total received bytes.
Tx Packet Total transmitted packets.
Rx Packet Total received packets.
Tx Collision Total collisions experienced while transmitting frames.
Rx Error Packet Total bad packets received.
4.3.4 DETAIL COUNTER
The Detail Counter collects any information and provides the port traffic counting, whether the packet is good or bad. To get to this screen, click on Detail Counter in the Port Configuration screen.
The Detail Counter window can show only one port counter information at the same time. To get to this screen, click on Detail Counter in the Port menu. To see another port’s counter, select it from the drop-down menu.
Each data field is 20 digits long. If the counting is longer than 20 digits (overflows), the counter will be reset and restart counting. The data is updated every user-defined time interval. The valid range is 3 to 10 seconds. The Refresh Interval is used to set the update frequency. The default update time is 3 seconds.
45
Page 49
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-13. Detail Counter screen options.
Parameter Description
Detail Counter Displays the detailed counting number of each port’s traffic. The
Detail Counter window can show all counter information of each port at onetime. To get to this screen, click on Detail Counter in the Port menu.
Select Choose the port numb er from the drop-down menu.
Refresh Interval Select the interval from the drop-down menu. The valid range is 3 to
10 seconds, and the default is 3 seconds.
Reset button Click on this button to reset the choices.
Rx Packets Total packets received.
Rx Octets Total received bytes. Rx High Priority Packets Number of Rx packets classified as high priority.
Rx Low Priority Packets Number of Rx packets classified as low priority.
Rx Broadcast Packets Show the counting number of the received broadcast packets.
Rx Multicast Packets Show the counting number of the received multicast packets.
Tx Packets The counting number of the packet transmitted.
TX Octets Total transmitted bytes.
Tx High Priority Packets Number of Tx packets classified as high priority.
Tx Low Priority Packets Number of Tx packets classified as low priority.
Tx Broadcast Packets Show the counting number of the transmitted broadcast packet.
Tx Multicast Packets Show the counting number of the transmitted multicast packet.
Rx 64 Bytes Number of 64-byte frames in good and bad packets received.
Rx 65-127 Bytes Number of 65 ~ 126-byte frames in good and bad packets received.
46
Page 50
CHAPTER 4: Web-Based Management
Table 4-13 (continued). Detail Counter screen options.
Parameter Description
Rx 128-255 Bytes Number of 127 ~ 255-byte frames in good and bad packets received.
Rx 256-511 Bytes Number of 256 ~ 511-byte frames in good and bad packets received.
Rx 512-1023 Bytes
Rx 1024-Bytes
Tx 64 Bytes Number of 64-byte frames in good and bad packets transmitted.
Tx 65-127 Bytes
Tx 128-255 Bytes
Tx 256-511 Bytes
Tx 512-1023 Bytes
Tx 1024-Bytes
Rx CRC/Alignment Number of Alignment errors and CRC error packets received.
Rx Undersize Number of short frames (<64 Bytes) with valid CRC.
Rx Oversize
Number of 512 ~ 1023-byte frames in good and bad packets received.
Number of 1024-max_length-byte frames in good and bad packets received.
Number of 65 ~ 126-byte frames in good and bad packets transmitted.
Number of 127 ~ 255-byte frames in good and bad packets transmitted.
Number of 256 ~ 511-byte frames in good and bad packets transmitted.
Number of 512 ~ 1023-byte frames in good and bad packets transmitted.
Number of 1024-max_length-byte frames in good and bad packets transmitted.
Number of long frames(according to max_length register) with valid CRC.
Rx Fragments Number of short frames (< 64 bytes) with invalid CRC
Rx Jabbers
Rx Errors Number of the error packet received.
Tx Collisions Number of collisions transmitting frames experienced.
Tx Drops
Tx FIFO Drops Number of frames dropped due to the lack of transmitting buffer.
Number of long frames(according tomax_length register) with invalid CRC.
Number of frames dropped due to excessive collision, late collision, or frame aging.
47
Page 51
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.4 PoE
4.4.1 POE STATUS
Table 4-14 shows all the parameters of the PoE status.
Table 4-14 PoE screen options.
Parameter Description
PoE Status Display the information about the PoE status.
Vmain The volt is supplied by the PoE.
Imain The sum of the current that every port supplies.
Pconsume The sum of the power that every port supplies
Power Limit The maximal power that the switch can supply (Read Only).
Temperature The temperature of the chip on PoE
Port No Port number.
Port On Show whether the port is supplying the power to the PD or not
AC Disconnect Port Off Port is turned off due to the AC Disconnect function.
DC Disconnect Port Off Port is turned off due to the DC Disconnect function.
The switch will stop supplying the power to the port due to the power
Overload Port Off
Short Circuit Port Off
Over Temp. Protection
Power Management Port Off
required by the PD that is linked to the port on the switch excesses the Class setting of the PD
The switch will stop supplying the power to the port if it detects that the PD linked to the port is short circuit.
The port of the switch will be disabled due to fast transient rise in temperature to 240
Due to total power required by all PDs linked to the switch excesses the power limit, so the switch stops supplying the power to this port after referring to the information of the priority.
o
C or slow rise in temperature to 200oC.
48
Page 52
4.4.2 POE CONFIGURATION
The switch complies with IEEE 802.3af protocol and be capable of detecting automatically that whether the device linked to the port on the switch is PD (Powered Device) or not. The switch also manage the power supplement based on the Class of the PD, and it will stop supplying the power once the power required by the PD excesses the Class, Short Circuit or over temperature occurs.
Table 4-15. PoE Configuration screen settings
CHAPTER 4: Web-Based Management
Parameter Description
Status Include Normal or Active two kinds of status. The former means th e
port is ready to link and supply the power to the PD at any time. The latter means the port is in the condition of supplying the power.
State Enable means the manager allows the power supplied to the PD is
legal while the port linked to the PD; Disable means the port does not own PoE function.
Priority Three options are offered for the user to choose, including Normal,
Low and High. Default is Normal. The switch will stop supplying the power to the port based on the order of the priority LowÆNormalÆHigh in case total power required by all PDs linked to the switch excesses the power limit. As the ports have the same priority, then the switch will cease the power supplement from the port with the highest port id (12Æ1).
Power (W) The power is consumed by the port
Current (mA) The current is supplied to the PD by the port
Class The Class of the PD linked to the port of the switch
4.5 Mirror
Mirror Configuration is to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring.
49
Page 53
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-16. Mirror Configuration screen settings.
Parameter Description
Mode Used for the activation or de-activation of Port Mirror function.
Default is disable.
Monitoring Port Set up the port for monitoring. Valid port is Port 1~12 and default is
Port 1.
Monitored Port
Set up the port for being monitored. Just tick the check box (
beside the port x and valid port is Port 1~12.
;)
4.6 Bandwidth Management
Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port. Each port of the switch owns 16KB packet buffer. The packet buffer size will be reduced when the bandwidth rate limitation is enabled, which may cause that jumbo frame cannot be forwarded.
Please avoid enabling jumbo frame and bandwidth rating functions at the same time.
Table 4-17. Bandwidth Management Configuration screen options.
Parameter Description
Port Number Choose the port that you would like this function to work on it. Valid
range of the port is 1~12
All Traffic for Ingress Rate Limiting (Policing)
Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field. Pause frames are also generated if flow control is enabled. The format of the packet limits to unicast, broadcast and multicast. Valid range is 0~1000.
Broadcast & Multicasat for Ingress Rate Limiting (Policing)
All Traffic for Egress Rate Limiting (Shaping)
50
Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field. The format of the packet limi ts to broadcast and multicast. Valid range is 0~1000.
Set up the limit of Egress bandwidth for the port you choose. Packet transmission will be delayed if the rate exceeds the value you set up in Data Rate field. Traffic may be lost if egress buffers run full. The format of the packet limits to unicast, broadcast and multicast. Valid range is 0~1000.
Page 54
CHAPTER 4: Web-Based Management
4.7 QoS (Quality of Service) Configuration
The switch offers powerful 5 kinds of QoS functions. There are Per Port Priority that you can assign each port to different precedence, VLAN Tag priority that can make precedence of 8 priorities, IP TOS Classification, IP TCP/UDP Port Classification and IP DiffServe Classification.
In Quality of Service (QoS) Configuration, there is one option named Default Class. As you had selected one of the five QoS functions, then some packets that did not belong to this QoS setting would be viewed as Default Class. For instance, if you set QoS function as VLAN Tag Priority mode, and then choose Default Class as High, finally, the priority of the packets with no tag will be considered as High priority precedence. The initial value of the Default Class is High.
4.7.1 P
We can assign QoS Priority, including High and Low for each port. For example, if we transmit IP packets from Port 2 and Port 3 at the speed of 1 Gbps to Port 1, and set the Class of Port 2 as High and Port 3 as Low, then the packets of Port 3 will be dropped when the congestion happens because Port 2 owns higher precedence of transmitting packets.
ER PORT PRIORITY
Table 4-18. Per Port Priority screen options.
Parameter Description
Port No User can choose the port (1~12) respectively with Priority Class on
Per Port Priority function.
Class User can set up High Priority or Low Priority for each port
respectively.
4.7.2 VLAN TAG PRIORITY
In vlan tag, there are 3 bits belonging to priority. According to these 3 bits, we could arrange 8 traffics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. We can set High priority or Low priority for each traffic class. For instance, if we let VLAN-tagged priority 0 0 0 be high priority and VLAN-tagged priority 0 0 1 be Low Priority, and then make port 1, 2, 3 be in the vlan 2. We sent the packets that have the value 0 0 0 in vlan-tagged field and VID equals 2 from the port 2 and the packets that have the value 0 0 1 in vlan-tagged field and VID equals 2 from the port 3 into the switch. We let the two kinds of packets be transmitted for port 1 until the port results in congestion. The result is that the packets will be dropped partially from the port 3 because the packets that belong to Low Priority. For the use of VLAN Tag Priority function, please press Configure button at the right section for setting in advance.
51
Page 55
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-19. VLAN Tag Priority screen options.
Parameter Description
Quality of Service (QoS) Vlan Tag Configuration
Port User can set up the port (1~12) respectively to let Vlan Tag QoS
Bit 0, Bit 1, Bit 2 According to the arrangement of VLAN-tagged priority, it can form
Class 8 kinds of traffic as mentioned above, user can set up High Priority
Used for setting up the QoS belongs to Vlan operation.
function work on them. If you would like to set up all ports at a time, user is also allowed to choose “All” in the selection list to simplify the procedure of configuration.
8 kinds of traffics, including 0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0 and 1 1 1.
or Low Priority for each port respectively.
4.7.3 IP TOS CLASSIFICATION
Another QoS function is the application of Layer 3 on network framework. We focus on TOS field of IP header. There are three bits in TOS field. We means bit 5~7 of TOS field that we will use. According to these 3 bits, we could arrange 8 traffics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. As long as we change bit 5~7 of TOS field of IP header, we will create the 8 traffic packets we meant before. Moreover, we can set High priority or Low priority for each traffic class. For instance, if we let TOS 0 0 0 be high priority and TOS 0 0 1 be Low Priority, we sent in the packets that have bit 5~7 of TOS Field appears 0 0 0 from the port 2 and the packets that have bit 5~7 of TOS Field appears 0 0 1 from the port 3. We let the two kinds of packets be transmitted for port 1 until the port results in congestion. The result is that the packets will be dropped partially from the port 3 because the packets that belong to Low Priority.
Table 4-20. IP TOS Classification screen options.
Parameter Description
Port User can set up the port (1~12) respectively to let TOS QoS
function work on them. If you would like to set up all ports at a time, user is also allowed to choose “All” in the selection list to simplify the procedure of configuration.
Bit 0, Bit 1, Bit 2 According to the arrangement of Bit 5 ~ Bit 7 in TOS Field of IP
Header, it can form 8 kinds of traffics, including 0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0 and 1 1 1.
Class 8 kinds of traffic as mentioned above, user can set up High Priority
or Low Priority for each port respectively.
52
Page 56
CHAPTER 4: Web-Based Management
4.7.4 IP TCP/UDP P
In L4 QoS Configuration, you can enter one of these special network transmission events, for example we use Down prioritize web browsing, e-mail, FTP and news L4 QoS Configuration and click Apply button, and then click Advance button. We can find Special TCP/UDP port 80, 280, 443, 25, 110, 20, 21, 69, 119, 2009 have already existed and defined for your using but it is fine that you modify this pre-defined TCP/UDP port with other port number you prefer. In Down prioritize web browsing, e-mail, FTP and news L4 QoS Configuration with default setting, special defined TCP/UDP port possesses lower QoS traffic than Default class (all other TCP/UDP ports such as port 81,82,83,84,85, etc.). Giving an example, when we transmit TCP packets with port number 80 at each of port 2 and port number 81 at port 3 to port 1 until the congestion happens. The packets from port 3 will be dropped by port 1 because the TCP packets have port number 80 is high priority and will have higher precedence to be sent out from port 1.
ORT CLASSIFICATION
Table 4-21. IP TCP/UDP Port Classification screen options.
Parameter Description
Disable IP TCP/UDP Port Classification
Down prioritize web browsing, e-mail, FTP and news
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance
button to set up Special TCP/UDP port for QoS.
button to set up Special TCP/UDP port for QoS.
Prioritize IP Telephony (VoIP) Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance
Prioritize iSCSI Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance
Prioritize web browsing, e-mail, FTP transfers and news
Prioritize Streaming Audio/Video
Prioritize Databases (Oracle, IBM DB2, SQL, Microsoft)
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance button set up Special TCP/UDP port for QoS.
Belong to the QoS in L4. Just tick the option button and press
Apply button to have this function taken affect. Then, click Advance button set up Special TCP/UDP port for QoS.
button set up Special TCP/UDP port for QoS.
button to set up Special TCP/UDP port for QoS.
button to set up Special TCP/UDP port for QoS
53
Page 57
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-21 (Continued). IP TCP/UDP Port Classification screen options.
Parameter Description
Advanced Mode
Display the TCP/UDP port number in L4 QoS. In “Disable IP TCP/UDP Port Classification” mode, user can randomly choose TCP/UDP port number that L4 QoS will affect. As to other special L4 QoS events, Special TCP/UDP port number will be took action. Of course, user could be allowed to add or modify the port number at random. For instance, if we choose “Down prioritize web browsing, e-mail, FTP and news” as the QoS of L4 and enter the “Advanced Mode”, then we can see that some special port number 80, 280, 443, 25, 110, 20, 21, 69, 119, 2009 have been configured already. User also has the right to modify these port numbers.
Special TCP/UDP class: There are two modes for selection, including Low and High. Default class (all other TCP/UDP ports): There are two modes for selection, including Low and High. Port: User can set up the port (1~12) respectively to let Special
TDP/UDP class function work on them. If you would like to set up all ports at a time, user is allowed to choose “All” selection to simplify the procedure of configuration.
Special UDP/TCP Port Selection: The following are port numbers defined by six specific networks
in L4:
Down prioritize web browsing, e-mail, FTP and news:
port number 80,280,443,25,110,20,21,69,119,2009
Prioritize IP Telephony (VoIP):1718,1719,1720 Prioritize iSCSI:3225,3260,3420 Prioritize web browsing, e-mail, FTP transfers and news:
80,280,443,25,110,20,21,69,119,2009
Prioritize Streaming Audio/Video:
2979,1755,7070,7071,554,8000
Prioritize Databases (Oracle, IBM DB2, SQL, Microsoft):
66,1571,1575,523,118,156,3306,1232,1433,1434
Simple Mode Press Simple button is to return to the screen that all L4 port
54
number will disappear.
Page 58
CHAPTER 4: Web-Based Management
4.7.5 IP D
In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused.
IP Diffserve Classification function, it can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet. In the switch, user is allowed to set up these 64 kinds of Class that belong to High or Low Priority.
IFFSERV CLASSIFICATION
Table 4-22. IP Diffserv Classification screen options.
Parameter Description
IP Differentiated Services (DiffServ) Configuration
Diffserv Display 64 (0~63) DiffServ Priority items.
Class 64 kinds of traffic as we mentioned above, user can set up High
Used for setting up the IP Differentiated Services Configuration QoS.
Priority or Low Priority for each port respectively.
4.8 SNMP Configuration
Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax. SNMP agent is running on the switch to response the request issued by SNMP manager.
Basically, it is passive except issuing the trap information. The switch supports a switch to turn on or off the SNMP agent. If you set the field SNMP “Enable”, SNMP agent will be started up. All supported MIB OIDs, including RMON MIB, can be accessed via SNMP manager. If the field SNMP is set “Disable”, SNMP agent will be de-activated, the related Community Name, Trap Host IP Address, Trap and all MIB counters will be ignored.
Table 4-23. SNMP Configuration screen options.
Parameter Description
SNMP Configuration
This function is used to configure SNMP settings, community name, trap host and public traps as well as the throttle of SNMP. A SNMP manager must pass the authentication by identifying both community names, then it can access the MIB information of the target device. So, both parties must have the same community name. Once completing the setting, click Apply button, the setting takes effect.
55
Page 59
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-23 (Continued). SNMP Configuration screen options.
Parameter Description
SNMP The term SNMP here is used for the activation or de-activation of
SNMP. Default is Enable.
Get/Set/Trap Community Community name is used as password for authenticating if the
requesting network management unit belongs to the same community group. If they both don’t have the same community name, they don’t belong to the same group. Hence, the requesting network management unit can not access the device with diff erent community name via SNMP protocol; If they both have the same community name, they can talk each other.
Community name is user-definable with a maximum length of 15 characters and is case sensitive. There is not allowed to put any blank in the community name string. Any printable character is allowable.
The community name for each function works independently. Each function has its own community name. Say, the community name for GET only works for GET function and can’t be applied to other function such as SET and Trap.
Default SNMP function : Enable Default community name for GET: public Default community name for SET: private Default community name for Tra p: public Default Set function : Enable Default trap host IP address: 0.0.0.0 Default port number :162
Trap In the switch, there are 6 trap hosts supported. Each of them has
its own community name and IP address; is user-definable. To set up a trap host means to create a trap manager by assigning an IP address to host the trap message. In other words, the trap host is a network management unit with SNMP manager receiving the trap message from the managed switch with SNMP agent issuing the trap message. 6 trap hosts can prevent the important trap message from losing.
For each public trap, the switch supports the trap event Cold Start, Warm Start, Link Down, Link Up and Authentication Failure Trap. They can be enabled or disabled individually. When enabled, the corresponded trap will actively send a trap message to the trap host when a trap happens. If all public traps are disabled, no public trap message will be sent. As to the Enterprise (no. 6) trap is classified as private trap, which are listed in the Trap Alarm Configuration function folder.
56
Default for all public traps: Enable.
Page 60
CHAPTER 4: Web-Based Management
4.9 IGMP Snooping
The function, IGMP Snooping, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet. Without IGMP Snooping, the multicast packet forwarding function is plain and nothing is different from broadcast packet.
A switch supported IGMP Snooping with the functions of query, report and leave, a type of packet exchanged between IP Multicast Router/Switch and IP Multicast Host, can update the information of the Multicast table when a member (port) joins or leaves an IP Multicast Destination Address. With this function, once a switch receives an IP multicast packet, it will forward the packet to the members who joined in a specified IP multicast group before.
The packets will be discarded by the IGMP Snooping if the user transmits multicast packets to the multicast group that had not been built up in advance.
Table 4-24. IGMP Snooping screen options.
Parameter Description
IGMP Snooping IGMP is used to snoop the status of IP multicast groups and
display its associated information in both tagged VLAN and non-tagged VLAN networks. Enabling IGMP with either passive or active mode, you can monitor the IGMP snooping information, which contains the multicast member list with the multicast groups, VID and member port.
IGMP snooping mode selection The switch supports three kinds of IGMP Snooping st atus,
including “Passive”, “Active” and “Disable”.
Disable:
Set “Disable” mode to disable IGMP Snooping function. Default: Disable
Active:
In Active mode, IGMP snooping switch will periodically issue the Membership Query message to all hosts attached to it and gather the Membership report message to update the database of the Multicast table. By the way, this also reduces the unnecessary multicast traffic.
Passive:
In Passive Snooping mode, the IGMP snooping will not periodically poll the hosts in the groups. The switch will send a Membership Query message to all hosts only when it has received a Membership Query message from a router.
57
Page 61
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-24 (Continued). IGMP Snooping screen options.
Parameter Description
IP Address Show all multicast groups IP addresses that are registered on this
device.
VLAN ID Show VLAN I D for each multicast group.
Member Port Show member ports that join each multicast group. Member port
may be only or more than one.
4.10 Max Packet Length
The switch is capable of dealing with 9k Jumbo Frames, which suits the transmission for a large amount of data in the network environment.
Table 4-25. Max Packet Length screen options.
Parameter Description
Jumbo Frame (bytes) Set up the maximum length of the packet that each port of the
switch can accept. Maximum length can be up to 1532 bytes or 9208 bytes. The default is 1532 bytes.
4.11 DHCP Boot
The DHCP Boot function is used to spread the request broadcast packet into a bigger time frame to prevent the traffic congestion due to broadcast packets from many network devices which may seek its NMS, boot server, DHCP server and many connections predefined when the whole building or block lose the power and then reboot and recover. At this moment, a bunch of switch or other network device on the LAN will try its best to find the server to get the services or try to set up the predefined links, they will issue many broadcast packets in the network.
The switch supports a random delay time for DHCP and boot delay for each device. This suppresses the broadcast storm while all devices are at booting stage in the same time. The maximum user-defined delay time is 30 sec. If DHCP Broadcasting Suppression function is enabled, the delay time is set randomly, ranging from 0 to 30 seconds, because the exactly delay time is computed by the switch itself. The default is “Disable”.
4.12 VLAN
The switch supports Tag-based VLAN (802.1q) and Port-based VLAN. Support 256 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management.
58
Page 62
CHAPTER 4: Web-Based Management
4.12.1 VLAN MODE
The VLAN Mode Selection function includes five modes: Port-based, Tag- based, Metro Mode, Double-tag and Disable, you can choose one of them by pulling down list and selecting an item. Then, click Apply button, the settings will take effect immediately.
Table 4-26. VLAN Mode screen options.
Parameter Description
VLAN Mode Disable: Stop VLAN function on the switch. In this mode, no VLAN is applied
to the switch. This is the default setting. Port-based: Port-based VLAN is defined by port. Any packet coming in or
outgoing from any one port of a port-based VLAN will be accepted. No filtering criterion applies in port-based VLAN. The only criterion is the physical port you connect to. For example, for a port-based VLAN named PVLAN-1 contains port members Port 1&2&3&4. If you are on the port 1, you can communicate with port 2&3&4. If you are on the port 5, then you cannot talk to them. Each port-based VLAN you built up must be assigned a group name. This switch can support up to maximal 12 port-based VLAN groups.
Tag-based: Tag-based VLAN identifies its member by VID. This is quite different from port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to determine if it can be forwarded. The switch supports sup plement of 802.1q.
Each tag-based VLAN you built up must be assigned VLAN name and VLAN ID. V alid VLAN ID is 1-409 4. User can create tot al up to 64 Tag VLAN groups.
Metro Mode: The Metro Mode is a quick configuration VLAN environment method on Port-based VLAN. It will create 10 or 11 Port-based VLAN groups.
Double-tag: Double-tag mode belongs to the tag-based mode, however, it would treat all frames as the untagged ones, which means that t ag with PVID will be added into all packets. Then, these packets will be forwarded as Tag-based VLAN. So, the incoming packets with tag will become the double-tag ones.
Up-link Port This function is enabled only when metro mode is chosen in VLAN mode.
1 1: Except Port 11, each port of the switch cannot transmit packets with each other. Each port groups a VLAN with Port 11, thus, total 11 groups consisting of 2 members are formed.
12: Except Port 12, each port of the switch cannot transmit pa cket s wit h each other. Each port groups a VLAN with Port 12, thus, total 11 groups consisting of 2 members are formed.
11 & 12: Except Port 11 a nd Port 12, each port of the switch cannot transmit packets with each other. Each port groups a VLAN with Port 11 and Port 12, thus, total 10 groups consisting of 3 members are formed.
59
Page 63
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.12.2 T
AG-BASED GROUP
It shows the information of existed Tag-based VLAN Groups, You can also easily create, edit and delete a Tag-based VLAN group by pressing Add, Edit and Delete function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID.
Table 4-27. Tag-Based Group screen settings.
Parameter Description
VLAN Name The name defined by administrator is associated with a VLAN
group. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters. The maximal length is 15 characters.
VID VLAN identifier. Each tag-based VLAN group has a unique VID. It
appears only in tag-based and Double-tag mode.
SYM-VLAN While the SYM-VLAN function of the group is enabled, all packets
with this group VID will be dropped in case they are transmitted from the ports that do not belong to this group.
Member This is used to enable or disable if a port is a member of the new
added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box (;) beside the port x to enable it.
Add Group Create a new Tag-based VLAN. Input the VLAN name as well as
VID, configure the SYM-VLAN function and choose the member by ticking the check box beside the port No., then, press the Apply button to have the setting taken effect.
Delete Group Just press the Delete button to remove the selected group entry
from the Tag-based group table
Edit a group Just select a group entry and press the Edit button, then you can
modify a group’s description, SYM-VLAN and member set.
4.12.3 PORT-BASED GROUP
It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a Port-based VLAN group by pressing Add, Edit and Delete function buttons. User can add a new VLAN group by inputting a new VLAN name.
60
Page 64
CHAPTER 4: Web-Based Management
Table 4-28. Port-Based Group screen options.
Parameter Description
VLAN Name The name defined by administrator is associated with a VLAN
group. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters. The maximal length is 15 characters.
Member This is used to enable or disable if a port is a member of the new
added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box (;) beside the port x to enable it.
Add Group Create a new Port-based VLAN. Input the VLAN name and
choose the member by ticking the check box beside the port No., then, press the Apply button to have the setting taken effect.
Delete Group Just press the Delete button to remove the selected group
entry from the Port-based group table.
Edit a group Just select a group entry and press the Edit button, then you
can modify a group‘s description and member set
4.12.4 TAG RULE
In VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to
4094. User also can choose ingress filtering rules to each port. There are two ingress filtering rules which can be applied to the switch. The Ingress Filtering Rule 1 is “forward only packets with VID matching this port’s configured VID”. The Ingress Filtering Rule 2 is “drop untagged frame”. You can also select the Role of each port as Access, Trunk, or Hybrid.
Table 4-29. Tag Rule screen options.
Parameter Description
PVID This PVID range will be 1-4094. Before you set a number x as PVID,
you have to create a Tag-based VLAN with VID x. For example, if port x receives an untagged packet, the switch will apply the PVID (assume as VID y) of port x to tag this packet, the packet then will be forwarded as the tagged packet with VID y.
Rule 1 Forward only packets with VID matching this port’s configured VID. You
can apply Rule 1 as a way to a given port to filter unwanted traffic. In Rule 1, a given port checks if the given port is a member of the VLAN on which the received packet belongs to, to determine forward it or not. For example, if port 1 receives a tagged packet with VID=100 (VLA N name=VLAN100), and if Rule 1 is enabled, the switch will check if port 1 is a member of VLAN100. If yes, the received packet is forwarded; otherwise, the received packet is dropped.
61
Page 65
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-29 (Continued). Tag Rule screen options.
Parameter Description
Rule 2 Drop untagged frame. You can configure a given port to accept all
frames (Tagged and Untagged) or just receive tagged frame. If the former is the case, then the packets with tagged or untagged will be processed. If the later is the case, only the packets carrying VLAN tag will be processed, the rest packets will be discarded.
Note
If Rule 1 is enabled and port 1, for example, receives an untagged packet, the switch will apply the PVID of port 1 to tag this packet, the packet then will be forwarded. But if the PVID of port 1 is 100 and port 1 is not member of VLAN 100, the packet will be dropped.
Role This is an egress rule of the port. Here you can choo se Access, Trunk
or Hybrid. Trunk means the outgoing packets must carry VLAN tag header. Access means the outgoing packets carry no VLAN tag header. If p ackets have do uble VLAN tags, one will b e dropped and the other will still be left. As to Hybrid, it is similar to Trun k, and both of them will tag-out. When the port is set to Hybrid, its packets will be untagged out if the VID of the outgoing packets with tag is the same as the one in the field of Untag VID of this port.
Untag VID Valid range is 1~4094. It works only when Role is set to Hybrid.
4.13 MAC Table
MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table Maintenance, Static Forward, Static Filter and MAC Alias, which cannot be categorized to some function type. They are described below.
4.13.1 MAC T
Parameter Description
MAC Table Information Display the static or dynamic learning MAC entry and the state for
Port Select the port you would like to inquire.
Search Set up the MAC entry you would like to inquire.
ABLE INFORMATION
Table 4-30. MAC Table screen options.
the selected port.
The default is ??-??-??-??-??-??
62
Page 66
Table 4-30 (continued). MAC Table screen options.
CHAPTER 4: Web-Based Management
Parameter Description
MAC Display the MAC address of one entry you selected from the
searched MAC entries table.
Alias Set up the Alias for the selected MAC entry.
Set Alias Save the Alias of MAC entry you set up.
Search Find the entry that meets your setup
Previous Page Move to the previous page.
Next Page Move to the next page.
Alias The Alias of the searched entry .
MAC Address The MAC address of the searched entry.
Port The port that exists in the searched MAC Entry.
VID VLAN Group that MAC Entry exists.
State Display the method that this MAC Entry is built. It may show
“Dynamic MAC” or “St atic MAC”.
4.13.2 MAC TABLE MAINTENANCE
This function can allow the user to set up the processing mechanism of MAC Table. An idle MAC address exceeding MAC Address Age-out Time will be removed from the MAC Table. The range of Age-out Time is 10-65535 seconds, and the setup of this time will have no effect on static MAC addresses.
Table 4-31. MAC Table Maintenance screen options.
Parameter Description
Aging Time Delete a MAC address idling for a period of time from the MAC
Table, which will not affect static MAC address. Range of MAC Address Agin g Time is 10-65535 seconds. The default Aging Time is 300 seconds.
Flush Remove all entries that do not belong to the static Mac Entry from
the MAC Table.
63
Page 67
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.13.3 STATIC FORWARD
Static Forward is a function that allows the user in the static forward table to access a specified port of the switch. Static Forward table associated with a specified port of a switch is set up by manually inputting MAC address and its alias name.
When a MAC address is assigned to a specific port, all of the switch’s traffics sent to this MAC address will be forwarded to this port.
For adding a MAC address entry in the allowed table, you just need to fill in four parameters: MAC address, associated port, VID and Alias. Just select the existed MAC address entry you want and click Delete button, you also can remove it.
Table 4-32. Static Forward screen options.
Parameter Description
MAC It is a six-byte long Ethernet hardware address and usually
expressed by hex and separated by hyphens. For example, 00 – 40 - C7 - D6 – 00 - 00
Port No Port number of the switch. It is 1 ~12.
VID VLAN identifier. This will be filled only when tagged VLAN is
applied. Valid range is 1 ~ 4094.
Alias MAC alias name you assign.
4.13.4 STATIC FILTER
Static Filter is a function that denies the packet forwarding if the packet’s MAC Address is listed in the filtering Static Filter table. User can very easily maintain the table by filling in MAC Address, VID (VLAN ID) and Alias fields individually. User also can delete the existed entry by clicking Delete button.
Table 4-31. GVRP Group Information screen options.
Parameter Description
MAC It is a six-byte long Ethernet hardware address and usually
expressed by hex and separated by hyphens. For example,
VID VLAN identifier. When GVRP group creates, each dynamic
Alias MAC alias name you assign.
64
00 – 40 - C7 - D6 – 00 - 02
VLAN group owns its VID. Valid range is 1 ~ 4094.
Page 68
CHAPTER 4: Web-Based Management
4.13.5 MAC A
MAC Alias function is used to let you assign MAC address a plain English name. This will help you tell which MAC address belongs to which user in the illegal access report. At the initial time, it shows all pairs of the existed alias name and MAC address.
There are three MAC alias functions in this function folder, including MAC Alias Add, MAC Alias Edit and MAC Alias Delete. You can click Create/Edit button to add/modify a new or an existed alias name for a specified MAC address, or mark an existed entry to delete it. Alias name must be composed of A-Z, a-z and 0-9 only and has a maximal length of 15 characters.
LIAS
Table 4-32. MAC Alias screen options.
Parameter Description
MAC Alias Create/Edit or Delete
In the MAC Alias function, MAC Alias Add/Edit function is used to let you add or modify an association between MAC address and a plain English name. User can click Create/Edit button to add a new record with name.
As to MAC Alias Delete function is used to let you remove an alias name to a MAC address. You can select an existed MAC address or alias name to remove.
MAC Address It is a six-byte long Ethernet hardware address and usually
expressed by hex and separated by hyphens. For example, 00 – 40 - C7 - D6 – 00 - 01
Alias MAC alias name you assign.
NOTE
If there are too many MAC addresses learned in the table, we recommend you inputting the MAC address and alias name directly.
4.14 GVRP Configuration
GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations. With GID information and GIP, GVRP state machine maintain the contents of Dynamic VLAN Registration Entries for each VLAN and propagate these information to other GVRP-aware devices to setup and update their knowledge database, the set of VLANs associated with currently active members, and through which ports these members can be reached.
In GVRP Configuration function folder, there are three functions supported, including GVRP Config, GVRP Counter and GVRP Group explained below.
65
Page 69
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.14.1 GVRP C
Parameter Description
GVRP Config In the function of GVRP Config, it is used to configure each port’s
GVRP State Setting This function is simply to let you enable or disable GVRP function.
Join Time Used to declare the Join T ime in unit of centisecond. Valid time
Leave Time Used to declare the Leave T i me in unit of centisecond. Valid time
Leave All Time A time period for announcement that all registered device is going
ONFIG
Table 4-33. GVRP Configuration screen options.
GVRP operation mode, in which there are seven parameters needed to be configured described below.
You can pull down the list and click the Downward arrow key to choose Enable or Disable. Then, click the Apply button, the system will take effect immediately.
range: 20 –100 centisecond, Default: 20 centisecond.
range: 60 –300 centisecond, Default: 60 centisecond.
to be de-registered. If someone still issues a new join, then a registration will be kept in the switch. Valid range: 1000-5000 unit time, Default: 1000 unit time.
Default Applicant Mode The mode here means the type of participant. There are two
modes, normal participant and non-participant, provided for the user’s choice.
Normal: It is Normal Participant. In this mode, the switch participates normally in GARP protocol exchanges. The default setting is Normal.
Non-Participant: It is Non-Participant. In t his mode, the switch does not send or reply any GARP messages. It just listens messages and reacts for the received GVRP BPDU.
66
Page 70
CHAPTER 4: Web-Based Management
Table 4-33 (Continued). GVRP Configuration screen options.
Parameter Description
Default Registrar Mode The mode here means the type of Registrar. There are three types
of parameters for registrar administrative control value, normal registrar, fixed registrar and forbidden registrar, provided for the user’s choice.
Normal: It is Normal Registration. The Registrar responds normally to incoming GARP messages. The default setting is Normal.
Fixed: It is Registration Fixed. The Registrar ignores all GARP messages, and all members remain in the registered (IN) state.
Forbidden: It is Registration Forbidden. The Registrar ignores all GARP messages, and all members remain in the unregistered (EMPTY) state.
Restricted Mode This function is used to restrict dynamic VLAN be created wh en
this port received GVRP PDU. There are two modes, disable and enable, provided for the user’s choice.
Disabled: In this mode, the switch dynamic VLAN will be created when this port received GVRP PDU. The default setting is Normal.
Enabled: In this mode, the switch does not create dynamic VLAN when this port received GVRP PDU. Except received dynamic VLAN message of the GVRP PDU is an existed static VLAN in the switch, this port will be added into the static VLAN members dynamically.
4.14.2 GVRP COUNTER
All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions. Actually, they are GARP packets.
Table 4-34. GVRP Counter screen options.
Parameter Description
Total GVRP Packets Total GVRP BPDU is received/ transmitted by the GVRP
application.
Invalid GVRP Packets Number of invalid GARP BPDU is received/ transmitted by the
GARP application.
LeaveAll Message Packets Number of GARP BPDU with Leave All message is received/
transmitted by the GARP application.
67
Page 71
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-34 (Continued). GVRP Counter screen options.
Parameter Description
JoinEmpty Message Packets Number of GARP BPDU with Join Empty message is received/
transmitted by the GARP application.
JoinIn Message Packets Number of GARP BPDU with Join In message is received/
transmitted by the GARP application.
LeaveEmpty Message Packets Number of GARP BPDU with Leave Empty message is received/
transmitted by the GARP application.
Empty Message Packets Number of GARP BPDU with Empty message is received/
transmitted by the GARP application.
4.14.3 GVRP GROUP INFORMATION
Table 4-35. GVRP Group Information screen options.
Parameter Description
Current Dynamic Group Number The number of GVRP group that are created currently.
VID VLAN identifier. When GVRP group creates, each dynamic
VLAN group owns its VID. Valid range is 1 ~ 4094.
Member Port Those are the members belonging to the same dynamic VLAN
group.
Edit Administrative Control When you create GVRP group, you can use Administrative
Control function to change Applicant Mode and Registrar Mode of GVRP group member.
Refresh Refresh function can help you to see current GVRP group st atus.
4.15 STP Configuration
The Spanning Tree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loops in switched networks. When STP is enabled, ensure that only one path is active between any two nodes on the network at a time. User can enable Spanning Tree Protocol on switch’s web management and then set up other advanced items. We recommend that you enable STP on all switches to ensure a single active path on the network.
68
Page 72
CHAPTER 4: Web-Based Management
4.15.1 STP S
TATUS
In the Spanning Tree Status, user can read 12 parameters to know STP current status. The 12 parameters’ description is listed in the following table.
Table 4-36. STP Status screen options.
Parameter Description
STP State Show the current STP Enabled / Disabled status. Default is Disabled.
Bridge ID Show switch’s bridge ID which stands for the MAC address of this
switch.
Bridge Priority Show this switch’s current bridge priority setting. Default is 32768.
Designated Root Show root bridge ID of this network segment. If this switch is a root
bridge, the Designated Root will show this switch’s bridge ID.
Designated Priority Show the current root bridge priority
Root Port Show port number connected to root bridge with the lowest path cost.
Root Path Cost Show the path cost between the root port and the designated port of
the root bridge.
Current Max. Age Show the current root bridge maximum age time. Maximum age time is
used to monitor if STP topology needs to change. When a bridge does not receive a hello message from root bridge until the maximum age time is counted down to 0, the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification (TCN) BPDU to all other bridges.
All bridges in the LAN will re-learn and determine which the ro ot bridge is. Maximum Age time is assigned by root bridge in unit of seconds. Default is 20 seconds.
Current Forward Delay Show the current root bridge forward delay time. The value of Forward
Delay time is set by root. The Forward Delay time is defined as the time spent from Listening state moved to Learning state or from Learning state moved to Forwarding state of a port in bridge.
Hello Time Show the current hello time of the root bridge. Hello time is a time
interval specified by root bridge, used to request all other bridges periodically sending hello message every “hello time” seconds to the bridge attached to its designated port.
69
Page 73
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-36 (Continued). STP Status screen options.
Parameter Description
STP Topology Change Count STP Topology Change Count expresses the time spent in unit of
seconds since the beginning of the Spanning Tree Topology Change to the end of the STP convergence. Once the STP chan ge is converged, the Topology Change count will be reset to 0. The figures showing in the screen may not be the exact time it spent but very close to, because the time is eclipsing.
Time Since Last Topology Change
Time Since Last Topology Change is the accumulated time in unit of seconds the STP has been since the last STP Topology Change was made. When Topology Change is initiated again, this counter will be reset to 0. And it will also count again once STP topology Change is completed.
4.15.2 STP CONFIGURATION
The STP, Spanning Tree Protocol, actually includes RSTP. In the Spanning Tree Configuration, there are six parameters open for the user to configure as user’s idea. Each parameter description is listed below.
Table 4-37. STP Configuration screen options.
Parameter Description
STP Configuration User can set the following Spanning Tre e parameters to control STP
function enable/disable, select mode RSTP/STP and affect STP state machine behavior to send BPDU in this switch. The default setting of Spa nning Tree Protocol is Disable.
Spanni ng Tree Protocol Set 802.1W Rapid STP function Enable / Disable. De fault is Disable.
Bridge Priority The lower the bridge priority is, the higher priority it has. Usually, the
bridge with the highest bridge priority is the root. If you want to have the LPB200Aas root bridge, you can set this value lower than that of bridge in the LAN. The valid value is 0 ~ 61440. The default is 32768.
Hello Time Hello Time is used to determine the periodic time to send normal
70
BPDU from designated ports among bridges. It decides how long a bridge should send this message to other bridge to tell I am alive. When the LPB200Ais the root bridge of the LAN, for example, all other bridges will use the hello time assigned by this switch to communicate with each other. The valid value is 1 ~ 10 in unit of second.
Default is 2 seconds.
Page 74
CHAPTER 4: Web-Based Management
Table 4-37 (Continued). STP Configuration screen options.
Parameter Description
Max. Age When the LPB200A is the root brid ge, the whole LAN will apply this
figure set by this switch as their maximum age time. When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max. Age of the root bridge, the bridge will treat the root bridge malfunctioned and issue a Topology Change Notification (TCN) BPDU to all other bridges. All bridges in the LAN will re-calculate and determine who the root bridge is. The valid value of Max. Age is 6 ~ 40 seconds.
Default is 20 seconds.
Forward Delay You can set the root bridge forward delay time. This figure is set by
root bridge only. The forward delay time is defined as the time spent from Listening state moved to Learning state and also from Learning state moved to Forwarding state of a port in bridge. The forward delay time contains two states, Listening state to Learning state and Learning state to Forwarding state. It assumes that forward delay time is 15 seconds, then total forward delay time will be 30 seconds. This has much to do with the STP convergent time which will be more than 30 seconds because some other factors.
The valid value is 4 ~ 30 seconds, default is 15 seconds
Force Versio n Two options are offered for the user’s choosing STP algorithm.
One is RSTP and the other is STP. If STP is chosen, RSTP will run as a legacy STP. The switch supports RSTP (802.1w) which is backward compatible with STP (802.1d).
4.15.3 STP P
ORT CONFIGURATION
In the STP Port Setting, one item selection and five parameters settings are offered for user’s setup. User can disable and enable each port by selecting each Port Status item. User also can set Path Cost and Priority of each port by filling in the desired value and set Admin Edge Port and Admin Point To Point by selecting the desired item.
71
Page 75
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-
38. STP Port setting screen options.
Parameter Description
Port Status It displays the current state of a port. We cannot manually set it
because it displays the status only. There are three possible states. ( according to 802.1w specification).
DISCARDING state indicates that this port can neither forward
packets nor contribute learning knowledge.
Note
Three other states (Disable state, BLOCKING state and LISTENING state) defined in the 802.1d specification are now all represented as DISCARDING state.
LEARNING state indicates this port can now contribute its
learning knowledge but cannot forward packets still.
FORWARDING state indicates this port can both contribute its
learning knowledge and forward packets no rmally.
Path Cost Status It is the contribution value of the path through this port to Root
Bridge. STP algorithm determines a best path to Root Bridge by calculating the sum of path cost contributed by all ports on this path. A port with a smaller path cost value would become the Root Port more possibly.
Configured Path Cost The range is 0 – 200,000,000. In the switch, if path cost is set to be
zero, the STP will get the recommended value resulted from auto-negotiation of the link accordingly and display this value in the field of Path Cost Status. Otherwise, it may show the value that the administrator set up in Configured Path Cost and Path Cost St atus.
802.1w RSTP recommended value: (Valid range: 1 – 200,000,000) 10 Mbps : 2,000,000
100 Mbps : 200,000 1 Gbps : 20,000 Default: 0
Priority Priority here means Port Priority. Port Priority and Port Number are
mixed to form the Port ID. Port IDs are often compared in order to determine which port of a bridge would become the Root Port. The range is 0 – 240.
Default is 128.
72
Page 76
CHAPTER 4: Web-Based Management
4.16 Trunking Configuration
The Port Trunking Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation. For example, if there are three Fast Ethernet ports aggregated in a logical port, then this logical port has bandwidth three times as high as a single Fast Ethernet port has.
The switch supports two kinds of port trunking methods:
LACP
Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their unique LACP GroupID (1~3) to form a logic “trunked port”. The benefit of using LACP is that a port makes an agreement with its peer port before it becomes a ready member of a “trunk group” (also called aggregator). LACP is safer than the other trunking method - static trunk.
The switch LACP does not support the followings:
- Link Aggregation across switches
- Aggregation with non-IEEE 802.3 MAC link
- Operating in half-duplex mode
- Aggregate the ports with different data rates
Static Trunk
Ports using Static Trunk as their trunk method can choose their unique Static GroupID (also 1~3, this Static groupID can be the same with another LACP groupID) to form a logic trunked port. The benefit of using Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking with its peer port. This is also a disadvantage because the peer ports of your static trunk group may not know that they should be aggregate together to form a logic trunked port. Using Static Trunk on both end of a link is strongly recommended. Please also note that low speed links will stay in “not ready” state when using static trunk to aggregate with high speed links.
As to system restrictions about the port aggregation function on the switch, in the management point of view, the switch supports maximum 3 trunk groups for LACP and additional 3 trunk groups for Static Trunk. But in the system capability view, only 3 real trunked groups are supported. An LACP trunk group with more than one ready member-ports is a real trunked group. An LACP trunk group with only one or less than one ready member-ports is not a real trunked group. Any Static trunk group is a real trunked group.
Per Trunking Group supports a maximum of 12 ready member-ports. Please note that some decisions will automatically be made by the system while you are configuring your trunking ports. Some configuration examples are listed below.
Rule 1: 12 ports have already used Static Trunk Group ID 1, the 13th port willing to use the same Static
Trunk Group ID will be automatically set to use the “None” trunking method and its Group ID will turn to 0. This means the port won’t aggregate with other ports.
Rule 2: 14 ports all use LACP Trunk Group ID 1 at most 12 ports can aggregate together and transit into
the ready state.
Rule 3: A port using the “None“ trunking method or Group ID 0 will be automatically set to use the “None”
trunking method with Group ID 0.
73
Page 77
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.16.1 P
ORT SETTING/ STATUS
Port setting/status is used to configure the trunk property of each and every port in the switch system.
Table 4-39. Port Setting/ Status screen options.
Parameter Description
Method This determines the method a port uses to aggregate with other
ports. None: A port does not want to aggregate with any other port should
choose this default setting. LACP: A port use LACP as its trunk method to get aggregated with
other ports also using LACP. Static: A port use Static Trunk as its trunk method to g et aggregated
with other ports also using Static Trunk.
Group Ports choosing the same trunking method other than None must be
assigned a unique Group number (i.e. Group ID, valid value is from 1 to 12) in order to declare that they wish to aggregate with each other.
Active LACP This field is only referenced when a port’s trunking method is LACP.
Active: An Active LACP port begins to send LACPDU to its link partner right after the LACP protocol entity started to take control of this port.
Passive: A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner.
Aggtr Aggtr is an abbreviation of aggregator. Every port is also an
aggregator, and its own aggregator ID is the same as its own Port No. We can regard an aggregator as a representative of a trunking group. Ports with same Group ID and using same trunking method will have the opportunity to aggregate to a particular aggre gator port. This aggregator port is usually the port with the smallest Port No. within the trunking group.
Status This field represents the trunking status of a port which uses a
trunking method other than None. It also represents the management link status of a port which uses the “None” trunking method. --- means not ready.
74
Page 78
CHAPTER 4: Web-Based Management
4.16.2 A
To display the current port trunking information from the aggregator point of view.
GGREGATOR VIEW
Table 4-40. Aggregator View screen options.
Parameter Description
Aggregator It shows the aggregator ID (from 1 to 12) of every port. In fact, every
port is also an aggregator , and its own aggregator ID is the same as its own Port No.
Method Show the method a port uses to aggregate with other ports.
Member Ports Show all member ports of an aggregator (port).
Ready Ports Show only the ready member ports within an aggregator (port).
This page shows the detailed information of the LACP trunking group.
Table 4-41. LACP Detail screen options.
Parameter Description
Actor The switch you are watching on.
Partner The peer system from this aggregator’s view.
System Priority Show the System Priority part of a system ID.
MAC Address Show the MAC Address part of a system ID.
Port Show the port number part of an LACP port ID.
Key Show the key value of the aggregator. The key value is determined
by the LACP protocol entity and can’t be set through management.
Trunk Status Show the trunk status of a single member port. --- means not ready.
75
Page 79
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.16.3 LACP S
It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system. Each system supports LACP will be assigned a globally unique System Identifier for this purpose. A system ID is a 64-bit field comprising a 48-bit MAC Address and 16-bit priority value.
YSTEM CONFIG
Table 4-42. LACP System Configuration screen options.
Parameter Description
System Priority The System Priority can be set by the user. Its range is from 1 to
65535. Default: 32768.
Hash Method DA+SA, DA and SA are three Hash methods offered for the Link
Aggregation of the switch. Packets will decide the path to transmit according to the mode of Hash you choose.
Default: DA and SA
4.17 802.1x Configuration
802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a
802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1x-enabled port.
Before the devices or end stations can access the network resources through the ports under 802.1x control, the devices or end stations connected to a controlled port send the authentication request to the authenticator, the authenticator pass the request to the authentication server to authenticate and verify, and the server tell the authenticator if the request get the grant of authorization for the ports.
According to IEEE802.1x, there are three components implemented. They are Authenticator, Supplicant and Authentication server shown in Fig. 4-1.
Supplicant:
It is an entity being authenticated by an authenticator. It is used to communicate with the Authenticator PAE (Port Access Entity) by exchanging the authentication message when the Authenticator PAE request to it.
Authenticator:
An entity facilitates the authentication of the supplicant entity. It controls the state of the port, authorized or unauthorized, according to the result of authentication message exchanged between it and a supplicant PAE. The authenticator may request the supplicant to re-authenticate itself at a configured time period. Once start re-authenticating the supplicant, the controlled port keeps in the authorized state until re-authentication fails.
76
Page 80
CHAPTER 4: Web-Based Management
A port acting as an authenticator is thought to be two logical ports, a controlled port and an uncontrolled port. A controlled port can only pass the packets when the authenticator PAE is authorized, and otherwise, an uncontrolled port will unconditionally pass the packets with PAE group MAC address, which has the value of 01-80-c2-00-00-03 and will not be forwarded by MAC bridge, at any time.
Authentication server:
A device provides authentication service, through EAP, to an authenticator by using authentication credentials supplied by the supplicant to determine if the supplicant is authorized to access the network resource.
The overview of operation flow for the Fig. 4-1 is quite simple. When Supplicant PAE issues a request to Authenticator PAE, Authenticator and Supplicant exchanges authentication message. Then, Authenticator passes the request to RADIUS server to verify. Finally, RADIUS server replies if the request is granted or denied.
While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator exchanges the message to authentication server using EAP encapsulation. Before successfully authenticating, the supplicant can only touch the authenticator to perform authentication message exchange or access the network from the uncontrolled port.
Supplicant’s
System
Supplicant
PAE
Authenticator’s System
Services Offered
by Authenticator
(e.g Bridge Relay)
Port Authorize
Authenticator
PAE
Uncontrolled portControlled port
MAC Enable
Authentication
Server’s System
Authentication
Server
LAN
Figure 4-1.
In the Fig. 4-2, this is the typical configuration, a single supplicant, an authenticator and an authentication server. B and C is in the internal network, D is Authentication server running RADIUS, switch at the central location acts Authenticator connecting to PC A and A is a PC outside the controlled port, running Supplicant PAE. In this case, PC A wants to access the services on device B and C, first, it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet. The authenticator transfers the supplicant’s credentials to Authentication server for verification. If success, the authentication server will notice the authenticator the grant. PC A, then, is allowed to access B and C via the switch. If there are two switches directly connected together instead of single one, for the link connecting two switches, it may have to act two port roles at the end of the link: authenticator and supplicant, because the traffic is bi-directional.
77
Page 81
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Authentication server
C
Authenticator
B
Supplicant A
Figure 4-2.
The Fig. 4-3 shows the procedure of 802.1x authentication. There are steps for the login based on 802.1x port access control management. The protocol used in the right side is EAPOL and the left side is EAP.
1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage.
2. Initiating a session. Either authenticator or supplicant can initiate the message exchange. If supplicant initiates the process, it sends EAPOL-start packet to the authenticator PAE and authenticator will immediately respond EAP-Request/Identity packet.
3. The authenticator always periodically sends EAP-Request/Identity to the supplicant for requesting the identity it wants to be authenticated.
4. If the authenticator doesn’t send EAP-Request/Identity, the supplicant will initiate EAPOL-Start the process by sending to the authenticator.
5. And next, the Supplicant replies an EAP-Response/Identity to the authenticator. The authenticator will embed the user ID into Radius-Access-Request command and send it to the authentication server for confirming its identity.
6. After receiving the Radius-Access-Request, the authentication server sends Radius-Access-Challenge to the supplicant for asking for inputting user password via the authenticator PAE.
7. The supplicant will convert user password into the credential information, perhaps, in MD5 format and replies an EAP-Response with this credential information as well as the specified authentication algorithm (MD5 or OTP) to Authentication server via the authenticator PAE. As per the value of the type field in message PDU, the authentication server knows which algorithm should be applied to authenticate the credential information, EAP-MD5 (Message Digest 5) or EAP-OTP (One Time Password) or other else algorithm.
8. If user ID and password is correct, the authentication server will send a Radius-Access-Accept to the authenticator. If not correct, the authentication server will send a Radius-Access-Reject.
78
Page 82
CHAPTER 4: Web-Based Management
9. When the authenticator PAE receives a Radius-Access-Accept, it will send an EAP-Success to the supplicant. At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x control is in the authorized state. The supplicant and other devices connected to this port can access the network. If the authenticator receives a Radius-Access-Reject, it will send an EAP-Failure to the supplicant. This means the supplicant is failed to authenticate. The port it connected is in the unauthorized state, the supplicant and the devices connected to this port won’t be allowed to access the network.
10. When the supplicant issue an EAP-Logoff message to Authentication server, the port you are using is set
to be unauthorized.
PC
Port connect
EAPOL-Start
EAPOL EAP
EAP-Request/Identity
EAP-Response/Identity
EAP-Request
EAP-Response (cred)
EAP-Success
EAP-Logoff
EAP-Failure
Bridge
LAN
Access blocked
Authenticator
Access allowed
Radius Server
Radius
Radius-Access-Request
Radius-Access-Challenge
Radius-Access-Request
Radius-Access-Accept
Figure 4-3.
Only MultiHost 802.1X is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port.
802.1x Port-based Network Access Control function supported by the switch is little bit complex, for it just support basic Multihost mode, which can distinguish the device’s MAC address and its VID. The following table is the summary of the combination of the authentication status and the port status versus the status of port mode, set in 802.1x Port mode, port control state, set in 802.1x port setting. Here Entry Authorized means MAC entry is authorized.
79
Page 83
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-43.
Port Mode Port Control Authentication Port Status
Disable Don’t Care Don’t Care Port Uncontrolled
Multihost Auto Successful Port Authorized
Multihost Auto Failure Port Unauthorized
Multihost ForceUnauthorized Don’t Care Port Unauthorized
Multihost ForceAuthorized Don’t Care Port Authorized
4.17.1 802.1x S
Parameter Description
802.1x State Setting This function is used to configure the global parameters for RADIUS
Radius Server RADIUS server IP address for authentication.
Port Number The port number to communicate with RADIUS server for the
Secret Key The secret key between authentication server and authenticator. It is
TATE SETTING
Table 4-44. 802.1x Configuration screen options.
authentication in 802.1x port security application.
Default: 192.168.1.1
authentication service. The valid value ranges 1-65535. Default port number is 1812.
a string with the length 1 – 31 characters. The character string may contain upper case, lower case and 0-9. It is character sense. It is not allowed for putting a blank between any two characters.
Default: Radius
80
Page 84
CHAPTER 4: Web-Based Management
4.17.2 802.1x M
ODE SETTING
Set the operation mode of 802.1X for each port. In this device, it supports only Multi-host operation mode.
Table 4-45. 802.1x Mode Setting screen options.
Parameter Description
Port Number Indicate which port is selected to configure the 802.1x operation
mode.
802.1x Mode 802.1x operation mode. There are two options, including Disable and Multi-host mode. Default is Disable.
Disable: It will have the chosen port acting as a plain port, that is no
802.1x port access control works on the port.
802.1x with Multi-host: In Multi-host mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port.
4.17.3 P
ORT SECURITY MANAGEMENT
This page shows each port status. In Multihost mode, it shows the port number and its status, authorized or unauthorized.
Table 4-46. Port Security Management screen options.
Parameter Description
Disable Mode When selecting Disable mode for a port in the function 802.1X Port
Mode Configuration, the port is in the uncontrolled port state and does not apply 802.1X authenticator on it. Any node attached on this port can access the network without the admittance of 802.1X authenticator. The Port Status will show the following screen.
Port Number The port number to be chosen to show its 802.1X Port Status. The
valid number is Port 1 – 26.
Port Status The current 802.1X status of the port. In Disable mode, this field is
Disabled.
802.1x with Multihost mode When selecting 802.1x with Multihost mode for a port in the function
802.1X Port Mode Configuration, Devices can access the network through this port once the authenticator is authorized. The Port Status will show the following screen. If the port is granted to access the network, the port status is authorized, otherwi se, unauthorized.
81
Page 85
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.17.4 P
ARAMETER SETTING
This function is used to configure the parameters for each port in 802.1x port security application. Refer to the following parameters description for details.
Table 4-47. Parameter Setting screen options.
Parameter Description
Port It is the port number to be selected for configuring its associated
802.1x parameters which are Port control, reAuthMax, txPeriod, Quiet Period, reAuthEnabled, reAuthPeriod, max. Request, suppTimeout, serverTimeout and Controlled direction.
Port Control This is used to set the operation mode of authorization. There are
three type of operation mode supported, ForceUnauthorized, ForceAuthorized, Auto.
ForceUnauthorized: The controlled port is forced to hold in the unauthorized state.
ForceAuthorized: The controlled port is forced to hold in the authorized state.
Auto: The controlled port is set to be in authorized st ate or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant.
Default: Auto
reAuthMax (1-10) The number of authentication attempt that is permitted before the
port becomes unauthorized. Default: 2
txPeriod (1-65535 s) A time period to transmitted EAPOL PDU between the authenticator
and the supplicant. Default: 30
Quiet Period (0-65535 s) A period of time during which we will not attempt to access the
supplicant. Default: 60 seconds
reAuthEnabled Choose whether regular authentication will take place in this port.
Default: ON
reAuthPeriod (1-65535 s) A non-zero n umber seconds between the periodic re-authentication
of the supplicant
82
Page 86
Table 4-47 (continued). Parameter Setting screen options.
Parameter Description
max. Request (1-10) The maximum of number times that the authenticator will retransmit
suppTimeout (1-65535 s) A timeout condition in the exchange between the authenticator and
serverTimeout (1-65535 s) A timeout condition in the exchan ge between the authenticator and
4.18 Alarm Configuration
CHAPTER 4: Web-Based Management
an EAP Request to the supplicant before it times out the authentication session. The valid range: 1 – 10.
Default: 2 times
the supplicant. The valid range: 1 –65535. Default: 30 seconds
the authentication server. The valid range: 1 –65535. Default: 30 seconds
4.18.1 EVENTS CONFIGURATION
The Trap Events Configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 22 different trap events to users for switch management. The trap information can be sent out in three ways, including email, mobile phone SMS (short message system) and trap. The message will be sent while users tick (;) the trap event individually on the web page shown as below.
Table 4-48. Events Configuration screen options.
Parameter Description
Trap
STP STP Topology Changed, STP Disabled, STP Enabled
LACP LACP Disabled, LACP Enabled, LACP Member Added, LACP Port
GVRP GVRP Disabled, GVRP Enabled
VLAN Port-based VLAN Enabled, Tag-based VLAN Enabled
Cold Sta rt, Warm Start, Link Down, Link Up, Authentication
Failure, User login, User logout
Failure
Module Swap Module Inserted, Module Removed, Dual Media Swapped
PoE PoE Failure
83
Page 87
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
4.18.2 E
Alarm configuration is used to configure the persons who should receive the alarm message via either email or SMS, or both. It depends on your settings. An email address or a mobile phone number has to be set in the web page of alarm configuration (See Fig. 3-51). Then, user can read the trap information from the email or the mobile phone. This function provides 6 email addresses and 6 mobile phone numbers at most. The 22 different trap events will be sent out to SNMP Manager when trap event occurs. After ticking trap events, you can fill in your desired email addresses and mobile phone numbers. Then, please click Apply button to complete the alarm configuration. It will take effect in a few seconds.
MAIL/ SMS CONFIGURATION
NOTE
SMS may not work in your mobile phone system. It is customized for different systems.
Table 4-49 Email/ SMS Configuration screen options.
Parameter Description
Email Mail Server: the IP address of the server transferring your email.
Username: your username on the mail server. Password: your password on the mail server. Email Address 1 – 6: email address that would like to receive the
alarm message
SMS
SMS Server: the IP address of the server transferring your SMS. Username: your username in ISP. Password: your username in ISP. Mobile Phone 1-6: the mobile phone number that would like to
receive the alarm message
4-19 Configuration
The switch supports three copies of configuration, including the default configuration, working configuration and user configuration for your configuration management. All of them are listed and described below respectively.
Default Configuration
This is the manufacturer’s setting and cannot be altered. In the Web user interface (UI) two restore default functions are offered for the user to restore to the switch’s default setting. The first function is Restore Default Configuration for the included default IP address. This will restore the IP address to the default 192.168.1.1. The other function is Restore Default Configuration without changing the current IP address. This will keep the same IP address that you saved before.
Working Configuration
This is the configuration you are currently using. It can be changed any time. The configurations you are using are saved into this configuration file. It’s updated each time you press the Apply button.
84
Page 88
CHAPTER 4: Web-Based Management
User Configuration
This is the configuration file for the specified or backup purposes. It can be updated while confirming the configuration. Retrieve it by performing Restore User Configuration
4.19.1 S
AVE/RESTORE
To get to this screen, click on Save/Restore in the Configuration menu.
Table 4-50. Save/Restore Configuration screen options.
Parameter Description
Save As Start Configuration Save the current configuration as a start configuration file in Flash
memory.
Save As User Configuration Save the current configuration as a user configuration file in Flash
memory.
Restore Default Configuration (includes default IP address)
Restore Default Configuration (excludes current IP address)
The Restore Default Configuration function can retrieve the manufacturer’s setting to replace the start configuration. The switch’s IP address is also restored to 192.168.1.1.
The Restore Default Configuration function can retrieve the manufacturer’s setting to replace the start configuration. However, the switch’s current IP address that the user set up will not be changed and will not be restored to 192.168.1.1.
Restore User Configuration The Restore User Configuration function can retrieve the previous
confirmed working configuration stored in the Flash memory to update the start configuration. When restoring the configuration, the system’s start configuration is updated and will change its system settings after rebooting the system.
4.19.2 CONFIG FILE
To get to this screen, click on Config File in the Configuration menu. With this function, you can back up or reload the Save As Start or Save As User via TFTP configuration files.
Table 4-51. Config File screen options.
Parameter Description
TFTP Server IP The TFTP server’s IP address.
Export File Path Export Start button: Export Save As Start’s config file stored in the
Flash. Export User-Conf button: Export Save As User’s config file stored
in the Flash.
85
Page 89
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Table 4-51 (Continued). Config File screen options.
Parameter Description
Import File Path Import Start button: Import Save As Start’s config file stored in the
Flash. Import User-Conf button: Import Save As User’s config file stored in
the Flash.
4.20 Diagnostic
Three functions, including Diagnostics, Loopback Test and Ping Test are contained in this function folder for device self-diagnostics. Each of them will be described in detail orderly in the following sections.
4.20.1 D
Diagnostics function provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed. The basic system check includes EEPROM test, UART test, DRAM test and Flash test.
4.20.2 L
In the Loopback Test function, there are two different loopback tests. One is Internal Loopback Test and the other is External Loopback Test. The former test function will not send the test signal outside the switch box. The test signal only wraps around in the switch box. As to the latter test function, it will send the test signal to its link partner. If you do not have them connected to active network devices, i.e. the ports are link down, the switch will report the port numbers failed. If they all are ok, it just shows OK.
IAGNOSTICS
OOPBACK TEST
NOTE
Whatever you choose Internal Loopback Test or External Loopback Test, these two functions will interfere with the normal system working, and all packets in sending and receiving also will stop temporarily.
4.20.3 P
Ping Test function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with report messages. The switch provides Ping Test function to let you know that if the target device is available or not. You can simply fill in a known IP address and then click Ping button. After a few seconds later, the switch will report you the pinged device is alive or dead in the field of Ping Result.
ING TEST
Parameter Description
IP Address An IP address with the version of v4, e.g. 192.168.1.1. Default Gateway IP address of the default gateway.
86
Table 4-52. Ping Test screen options.
Page 90
CHAPTER 4: Web-Based Management
4.21 TFTP Server
You can set up IP address of TFTP server in this page.
Table 4-53. TFTP Server screen options.
Parameter Description
Server Specify the IP address where the TFTP server locates. Fill in the IP
address of your TFTP server, then press Apply button to have the setting taken effect.
4.22 Log
This function shows the log data. The switch provides system log data for users. There are 17 private trap logs, 5 public trap logs. The switch supports total 120 log entries. For more details on log items, please refer to the section of Trap/Alarm Configuration and SNMP Configuration.
Table 4-54. Log screen options.
Parameter Description
Log Data The Trap Log Data is displaying the log items including all SNMP
Private Trap event s, SNMP Public traps and user logs occurred in the system. In the report table, No., Time and Events are three
fields contained in each trap record. No. Display the order number that the trap happened. Time Display the time that the trap happened. Events Display the trap event name. Auto Upload Enable Switch the enabled or disabled status of the auto upload function. Upload Log Upload log data through tftp. Clear Log Clear log data.
4.23 Firmware Upgrade
Software upgrade tool is used to help upgrade the software function in order to fix or improve the function. The switch provides a TFTP client for software upgrade. This can be done through Ethernet.
The switch supports TFTP upgrade tool for upgrading software. If you assure to upgrade software to a newer version one, you must follow two procedures:
1. Specifying the IP address where TFTP server locates. In this field, the IP address of your TFTP server
should be filled in.
2. Specifying what the filename and where the file is. You must specify full path and filename.
87
Page 91
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Then, press Upgrade button if your download is not successful, the switch will also be back to “Software Upgrade”, and it will not upgrade the software as well.
When download is completed, the switch starts upgrading software. A reboot message will be prompted after completing upgrading software. At this time, you must reboot the switch to have new software worked.
NOTE
Software upgrade is hazardous if power is off. You must do it carefully.
Table 4-55. Firmware Upgrade screen options.
Parameter Description
TFTP Server A TFTP server stored the image file you want to upgrade.
Path and Filename File path and filename stored the image file you want to upgrade.
4.24 Reboot
We offer you many ways to reboot the switch, including power up, hardware reset and software reset. You can press the RESET button in the front panel to reset the switch. After upgrading software, changing IP configuration or changing VLAN mode configuration, then you must reboot to have the new configuration taken effect. Here we are discussing is software reset for the reboot in the main menu.
Reboot the switch. Reboot takes the same effect as the RESET button on the front panel of the switch. It will take around thirty (30) seconds to complete the system boot.
Table 4-56. Reboot screen options.
Parameter Description
Save and Reboot Save the current settings as start configuration before rebooting
the switch.
Reboot Reboot the system directly.
88
Page 92
CHAPTER 4: Web-Based Management
4.25 Logout
You can manually logout by performing Logout function. In the switch, it provides another way to logout. You can configure it to logout automatically.
The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout. Besides this manually logout and implicit logout, you can pull down the Auto Logout list at the left-top corner to explicitly ON/OFF this logout function.
Table 4-57. Logout screen options.
Parameter Description
Auto Logout Default is ON. If it is ON, and no action and no key is stroke as well
in any function screen more than 3 minutes, the switch will have
you logout automatically.
89
Page 93
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
5. CLI Management
Locate the included RS-232 null-modem cable. Refer to Section 1.3for the null-modem cable’s configuration.
Attach the DB9 female connector to the male DB9 serial port connector on the switch.
Attach the other end of the DB9 cable to an ASCII terminal emulator. Or, connect the cable to a PC COM1 or COM2 port on a PC running a utility such as Microsoft Windows HyperTerminal.
At the COM Port Properties Menu, configure the parameters as follows:
Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control None
5.1 Login
The command-line interface (CLI) is a text-based interface. Access the CLI through either a direct serial connection to the device or a Telnet session. The switch’s default values are listed below.
Username: admin
Password: admin
After you login successfully, the prompt appears as “#” if you are the first login person and your authorization is administrator; otherwise, it appears as “$.” The former means you act as an administrator and have all system access rights. The latter means you act as a guest and are only allowed to view the system without permission to apply configuration settings to the switch.
5.2 Commands
To see the CLI mode commands, type in a “?” after the prompt, then all commands will be listed. All command scan be divided into two categories, global and local commands. Global commands (end, exit, help, history, logout, restore default, restore user, save start, and save user) can be used in either administrator or user mode. For details, refer to Section 5.2.1.
Command instructions residing in user mode are local commands. A local command can have the same name as a remote command, but it performs a totally different function. For example, show in IP mode displays the IP information; however, it displays the system information in system mode. For more details, refer to Section
5.2.2.
Once you log into the switch as described in Section 5.1, the screen shown in Figure 5-1 appears.
90
Page 94
CHAPTER 5: CLI Management
Giga Switch — LPB200A Login: admin
Password:
5.2.1 G
end
LPB200A# ?
802.1x Enter into 802.1x mode account Enter into account mode alarm Enter into alarm mode autologout Change autologout time bandwidth Enter into bandwidth mode config-file Enter into config file moded dhcp-boot Enter into dhcp-boot mode diag Enter into diag mode firmware Enter into firmware mode gvrp Enter into gvrp mode hostname Change hostname Igmp-snooping Enter into igmp mode ip Enter into ip mode log Enter into log mode mac-table Enter into mac table mode management Enter into management mode poe Enter into poe function port Enter into port mode
Figure 5-1. Login screen.
LOBAL CLI COMMANDS
Syntax: end
Description: Return to the top mode.
When you enter this command, your current position moves to the top mode.
Argument: None
Possible value: None
Example:
Giga Switch alarm Giga Switch (alarm)# events Giga Switch (alarm-events)# end
Giga Switch#
91
Page 95
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
exit
Syntax: exit
Description: Return to the previous mode.
When you enter this command, your current position moves back to the previous mode.
Argument: None
Possible value: None
Example:
Giga Switch# trunk Giga Switch(trunk)# exit
Giga Switch#
help
Syntax: help
Description: Shows available commands.
Some commands are the combination of more than two words. When you enter this command, the CLI shows the complete commands. This command also helps you classify the commands as either local or global commands.
Argument: None
Possible value: None
Example:
Giga Switch# ip Giga Switch (ip)# help Commands available:
------------<< Local commands >>-----------­set ip Set ip, subnet mask and gateway set dns Set dns enable dhcp Enable DHCP, and set dns auto or manual disable dhcp Disable DHCP show Show IP Configuration
------------<< Local commands >>------------
92
Page 96
exit Back to the previous mode end Back to the top mode help Show available commands history Show a list of previously run commands logout Logout the system save start Save as start config save user Save as user config restore default Restore default config restore user Restore user config
history
Syntax: history [#]
CHAPTER 5: CLI Management
Description: Shows a list of previous commands that were run.
When you enter this command, the CLI shows a list of commands that you typed previously. The CLI supports up to 256 records. If you don’t type in anything, the CLI lists up to 256 total records. If you do type in a number, the CLI only shows the records’ last numbers.
Argument: [#]: show last number of history records. (optional)
Possible value: [#]: 1, 2, 3, …., 256
Example:
Giga Switch(ip)# history Command history:
0. trunk
1. exit
2. Giga Switch# trunk
3. Giga Switch(trunk)# exit
4. Giga Switch#
5. ?
6. trunk
7. exit
8. alarm
9. events
10. end
11. ip
12. help
13. ip
14. history
93
Page 97
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Giga Switch(ip)# history 3
Command history:
13. ip
14. history
15. history 3
Giga Switch(ip)#
logout
Syntax: logout
Description: When you enter this command via a Telnet connection, you will log out of the system and disconnect. If you connect the system through a direct serial port with an RS-232 cable, you will log out of the system and return to the initial login prompt when you run this command.
Argument: None
Possible value: None
Example:
Giga Switch# logout
restore default
Syntax: restore default
Description: When you use this function in CLI, the system will prompt “Do you want to restore the default IP address?(y/n)”. If you choose Y or y, the IP address will restore to the default 192.168.1.1. If you choose N or n, the IP address will keep the same one that you saved before.
If restoring the default is successful, the CLI asks if it will reboot immediately or not. Pressing Y or y reboots the system immediately; otherwise, it goes back to the CLI system. After restoring the default configuration, all the changes in the startup configuration are lost. After rebooting, the entire startup configuration resets to the factory default.
Argument: None
Possible value: None
Example:
Giga Switch# restore default Restoring ... Restore Default Configuration Successfully Press any key to reboot system.
94
Page 98
restore user
Syntax: restore user
Description: Restores the startup configuration as a user-defined configuration. If restoring default is successful, the CLI asks if you want to reboot immediately or not. Pressing Y or y reboots the system immediately; if you press N or n, the software returns to the CLI system. After restoring a user-defined configuration, all the changes in the startup configuration are lost. After rebooting, the entire startup configuration replaces the user-defined one.
Argument: None
Possible value: None
Example:
Giga Switch# restore user Restoring ... Restore User Configuration Successfully Press any key to reboot system.
CHAPTER 5: CLI Management
save start
Syntax: save start
Description: Saves the current configuration as the startup one. When you enter this command, the CLI saves your current configuration to the nonvolatile Flash. If you want the configuration to work after rebooting, save the configuration using the command save start.
Argument: None
Possible value: None
Example:
Giga Switch# save start Saving start... Save Successfully
Giga Switch#
save user
Syntax: save user
Description: Saves the current configuration as the user-defined configuration. When you enter this command, the CLI saves your current configuration in the nonvolatile Flash as a user-defined configuration.
Argument: None
95
Page 99
12-Port 1000BASE-TX L2 Managed PoE Switch with 2 SFP Dual Media Ports
Possible value: None
Example:
Giga Switch# save user Saving user... Save Successfully
Giga Switch#
5.2.2 L
OCAL CLI COMMANDS
NOTE
For local CLI commands, syntax 1, 5–7 represents a range of port s. For example, if the port range is shown as 1, 5–7, available from 1 to 12, the range of ports available is 1–8.
802.1X
set max-request
Syntax: set max-request <port-range> <times>
Description: The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplicant before it times out the authentication session.
Argument: <port range> : syntax 1, 5–7, available from 1 to 12 <times> : max-times, range 1–10
Possible value: <port range> : 1 to 12 <times>: 1–10, default is 2
Example:
Giga Switch(802.1X)# set max-request 2 2
set mode
Syntax: set mode <port-range> <mode>
Description: Sets up each port’s 802.1x authentication mode.
Argument:
<port range> : syntax 1, 5–7, available from 1 to 12 <mode>: set up 802.1X mode 0: disable the 802.1X function 1: set 802.1X to Multi-host mode
96
Page 100
Possible value:
<port range> : 1 to 12 <mode>: 0 or 1
Example:
Giga Switch(802.1X)# set mode 2 1
set port-control
Syntax: set port-control <port-range> <authorized>
Description: Sets up each port’s 802.1x status.
Argument:
<port range> : syntax 1, 5–7, available from 1 to 12 <authorized> : Set up the status of each port
0: ForceUnauthorized 1: ForceAuthorized 2: Auto
CHAPTER 5: CLI Management
Possible value:
<port range> : 1 to 12 <authorized> : 0, 1, or 2
Example:
Giga Switch(802.1X)# set port-control 2 2
set quiet-period
Syntax: set quiet-period <port-range> <sec>
Description: A timer that the Authenticator state machine uses to define time periods when it won’t attempt to acquire a Supplicant. (A state machine is a service within the switch that monitors connections and times them out when the time reaches a set maximum time.)
Argument:
<port range>: syntax 1, 5–7, available from 1 to 12 <sec>: timer, range 0–65535
Possible value:
<port range> : 1 to 12 <sec> : 0–65535, default is 60
97
Loading...