Microsoft Edge
Internet Explorer 8/9/10/11
Mozilla Firefox
Google Chrome
Safari
Refer to our website to confirm the latest information of the compatible browser versions.
Business Switch Configuration Tool’s Compatible OSs
Windows 10 (64-bit/32-bit),
Windows 8.1 (64-bit/32-bit), Windows 8 (64-bit/32-bit),
Windows 7 (64-bit/32-bit), Windows Vista (64-bit/32-bit), Windows XP (32-bit)
Install Business Switch Configuration Tool
Install “Business Switch Configuration Tool” before you perform the following procedure. (Compatible with Windows
only.)
Note: You can download the latest version of Business Switch Configuration Tool from the URLs below:
BS-GS2008: http://d.buffalo.jp/BS-GS2008/
BS-GS2008P: http://d.buffalo.jp/BS-GS2008P/
BS-GS2016: http://d.buffalo.jp/BS-GS2016/
BS-GS2016P: http://d.buffalo.jp/BS-GS2016P/
BS-GS2024: http://d.buffalo.jp/BS-GS2024/
BS-GS2024P: http://d.buffalo.jp/BS-GS2024P/
BS-GS2048: http://d.buffalo.jp/BS-GS2048/
6
Page 8
Change Switch’s IP Address
Chapter 1 Initial Settings
To enter Settings, the switch’s web user interface, the switch’s IP address should belong to the same segment as your
PC’s IP address.
1 Connect the switch to your PC and your network with an Ethernet cable (sold separately). Confirm that link/act
LED of the connected port is on.
2 Double-click the “Business Switch Configuration Tool” icon to open Business Switch Configuration Tool.
3 Click [Next] to start searching for the switch.
4 Select the switch and click [Next].
7
Page 9
5 Click [Change IP Address].
Chapter 1 Initial Settings
6 Configure the switch’s IP address to match the segment of the IP address of your PC and click [Next]. If the
password input screen is displayed, enter “password” and click [Next].
7 Click [Back to Select Switch].
8
Page 10
Open Settings
Chapter 1 Initial Settings
1 Configure the switch’s IP address referring to the “Change Switch’s IP Address” section above.
2 Double-click the “Business Switch Configuration Tool” icon to open Business Switch Configuration Tool.
3 Click [Next] to start searching for the switch.
4 Select the switch and click [Next].
9
Page 11
5 Click [Settings (Web Admin Interface)].
Chapter 1 Initial Settings
6 Click OK to launch a web browser and display the login screen. Enter “admin” as the username and “password”
as the password, then click [Log In].
Configure Date and Time
To configure the date and time, refer to the following procedure.
1 Open Settings.
2 Navigate to [Basic] - [Date & Time].
3 Configure each settings and click [Apply].
Note: Enter the IP address or FQDN of the NTP server to change the NTP server. You may enter 4-255
characters. To use FQDN, you have to configure DNS settings separately.
10
Page 12
Change Username and Password
Chapter 1 Initial Settings
To change the default username and password from “admin” and “password”, refer to the following procedure.
1 Open Settings.
2 Navigate to [Basic] - [System Security] - [Administration Account].
3 Enter your new username and password (also fill the “Confirm” field), then click [Apply].
Notes:
• For the new username, you may enter up to 8 alphanumeric characters, hyphens (-), and underscores (_).
• For the new password, you may enter up to 32 alphanumeric characters, hyphens (-), and underscores (_).
4 Enter the new username and password, then click [Log In].
11
Page 13
MAC Address Learning
Chapter 1 Initial Settings
This switch uses SVL (Shared VLAN Learning) to learn MAC addresses. SVL is a method that retains a shared MAC
address table for the entire switch. It differs from IVL, which retains a MAC address table for each VLAN. Be sure you
understand how SVL works before you create a VLAN with the switch.
Differences between Operation of SVL and IVL
PC3
(VLAN 1, 2,3
PVID 3)
VLAN 1
Switch 1
Switch 2
VLAN 1VLAN 2
PC1 (VLAN 1, PVID 1)PC2 (VLAN 2, PVID 2)
SVL
VLAN 2
VLAN 3
When PC 1 and PC 3 communicate, PC 3 is learned by port 1 on switch 2 so PC 2 and PC 3 cannot communicate.
IVL
When PC 1 and PC 3 communicate, PC 3 is learned by both VLAN 1 and VLAN 2 so PC 2 and PC 3 can communicate.
However, frames sent from PC 3 to PC 1 are also delivered to PC 2.
12
Page 14
Chapter 2 Settings
Chapter 2 Settings
Refer to the “Open Settings” section in chapter 1 to access Settings.
Menu
System InformationDisplays the switch’s information.
Basic
SystemConfigure the switch’s name, location, and contact.
VLAN
Routing
SNMP
LLDP
MAC Addresses
Port Settings
System Security
Date & TimeConfigure date and time by using SNTP or manually.
PoE
(PoE-compatible
switches only)
Advanced
VLAN Settings
VLAN PortsConfigure PVID (Port VLAN ID).
L2/L3 SettingsSwitch between L2 mode and L3 mode.
Static Routing
(L3 mode only)
SNMP Community TableConfigure SNMP community table.
SNMP Host TableConfigure SNMP host table.
SNMP TrapConfigure SNMP trap.
SNMPv3 UserConfigure SNMPv3 user information.
LLDP PropertiesConfigure LLDP.
LLDP PortConfigure LLDP for each port.
LLDP-MED PortConfigure LLDP-MED for each port.
Neighbor Table
Static MAC FilteringConfigure static MAC address-based filtering.
Dynamic MAC FilteringConfigure dynamic MAC address-based filtering.
Convert MAC Address
Static MAC AddressRegister static MAC addresses to the MAC address table.
MAC Address AgingConfigure MAC address aging time.
StatusDisplays port status.
Speed/Mode SettingsConfigure transmission rate and flow control for each port.
Administration AccountConfigure administration username and password.
Access ManagementConfigure each administration interface.
CertificateConfigure certificate.
StatusDisplays PoE status.
PoE ProfilesConfigure PoE settings.
Power ProfilesConfigure power saving schedules.
Confirm VLAN status and create new VLAN. This switch’s IP
address can also be configured on this page.
Configure the gateway to access the specific destination.
Displays the information of LLDP-compatible products
connected to the switch.
Add dynamic MAC addresses to the static MAC address table to
filter them in static MAC filtering.
13
Page 15
QoS SettingsConfigure QoS priority.
Chapter 2 Settings
QoS MappingConfigure QoS mapping for each priority.
VoIP Auto PriorityConfigure priority for SIP, H.323, SCCP.
DiffServ
IPv4/MAC PolicyCreate DiffServ policies based on IPv4 or MAC addresses.
QoS
Security
Authentication
Port TrunkingConfigure port trunking.
Traffic ControlConfigure traffic storm control.
MirroringConfigure to monitoring traffic.
Management
Update FirmwareUpdate firmware from a local file.
IPv6 PolicyCreate DiffServ policies based on IPv6 addresses.
Port SettingsConfigure ports to assign each DiffServ policy.
IPv4/MAC Priority
IPv6 Priority
StatusDisplays DiffServ status.
Auto DoS Attack
Prevention
DHCP SnoopingConfigure DHCP snooping.
DHCP Table
StatusDisplays authentication server status.
RADIUSConfigure authentication (RADIUS) server.
Port AuthenticationConfigure authentication for each port.
STP SettingsConfigure STP/RSTP/MSTP.
StatusDisplays STP/RSTP/MSTP status of each port.
PortsConfigure STP/RSTP/MSTP priority for each port.
StatusDisplays IGMP status.
IGMP SettingsConfigure IGMP snooping.
IGMP QuerierConfigure IGMP querier.
IGMP Router PortSpecify ports to connect to multicast routers.
StatusDisplays MLD status.
MLD SettingsConfigure MLD snooping.
MLD QuerierConfigure MLD querier.
MLD Router PortSpecify ports to connect to multicast routers.
ACL WizardConfigure ACL with wizard.
MAC ACLCreate MAC address-based ACL.
IPv4 ACLCreate IPv4 address-based ACL.
IPv6 ACLCreate IPv6 address-based ACL.
PortsConfigure ports to assign each ACL group.
IPv4/MAC PriorityConfigure priority of each IPv4 or MAC ACL group.
IPv6 PriorityConfigure priority of each IPv6 ACL group.
StatusDisplays ACL status.
Configure priority of each DiffServ policy based on IPv4 or MAC
address.
Configure priority of each DiffServ policy based on IPv6
address.
Configure to drop specified packets.
Displays the list of DHCP clients that obtain IP addresses from a
DHCP server via the switch.
Configure DHCP relay settings.
14
Page 16
Dual ImageSelect a firmware image to be read when booting.
Chapter 2 Settings
Back Up and Restore SettingsSave settings to a file or restore settings from a file.
RebootReboot the switch.
InitializeInitialize the switch.
ARP Table
(L3 mode only)
MAC Address
Table
StatisticsDisplays the switch’s statistics.
LogsDisplays log information.
Syslog SettingsConfigure to transfer logs to syslog server.
Network DiagnosticsExecute communication test to the specified IP address.
Cable Diagnostics
Port OrderDisplays the ARP table ordered by ports.
IP Address OrderDisplays the ARP table ordered by IP addresses.
Port OrderDisplays the MAC address table ordered by ports.
MAC OrderDisplays the MAC address table ordered by MAC addresses.
Confirm abnormalities of each Ethernet cable connected to the
switch.
System Information
Displays the switch’s information.
System Information
IPv4 Address
IPv6 AddressDisplays information such as the switch’s IPv6 addresses and default gateways.
VersionDisplays the switch’s firmware, boot code, and hardware version.
Displays system information such as the switch name, serial number, and MAC
address.
Displays information such as the switch’s IPv4 address, subnet mask, and default
gateway.
15
Page 17
System
Chapter 2 Settings
Configure the switch’s name, location, and contact.
Switch Name
Location
Contact
Enter the switch’s name. You may enter up to 50 alphanumeric characters,
hyphens, and underscores.
Enter the location of the switch. You may enter up to 50 alphanumeric characters,
hyphens, underscores, and spaces.
Enter the contact information of the switch. You may enter up to 50 alphanumeric
characters, hyphens, underscores, and spaces.
VLAN
VLAN Settings
Confirm VLAN status and configure new VLAN. The switch’s IP address, default gateway, and DNS server can also be
configured on this page.
In L2 mode
Mode
Select a VLAN mode from “VLAN Settings” or “Privacy Separator”. Privacy separator
is a mode that enables communication to the router from a port but blocks
communication between ports.
Note: VLAN and privacy separator cannot be used at the same time.
16
Page 18
VLAN Status
Chapter 2 Settings
VLAN IDSpecify VLAN ID from 2-4094.
VLAN Name
Management VLAN
TaggedSelect when you assign the port to tag member.
UntaggedSelect when you assign the port to untag member.
Not MemberSelect when you do not assign the port to any member.
ResetClick to reset the changes to the previous settings.
Uplink
Downlink
Note: In privacy separator mode, only the device connected to an uplink port can open Settings. If you configure
the port that your PC is connected as a downlink port, you cannot open Settings any more.
Displays current VLAN and PVID (Port VLAN ID) status. Click [Edit] to edit the VLAN
selected. Click [Delete] to delete the VLAN selected. VLAN 1 cannot be deleted.
Enter the VLAN name. You may enter up to 17 alphanumeric characters, hyphens,
and underscores.
Check it if the VLAN is a management VLAN. Only devices which belong to the
management VLAN can open Settings.
Appears when “Privacy Separator” is selected.
A router should be connected to the uplink port to connect to the Internet.
Uplink ports can communicate with all downlink ports. Specify at least 1 port to
an uplink port.
Appears when “Privacy Separator” is selected.
Downlink ports are the ones which each device connected to. Downlink ports can
communicate with uplink ports, but cannot communicate with each downlink
port.
The following screen is displayed when you select VLAN 1 and click [Edit] or click [Edit] next to the IP address field in
privacy separator mode.
Select a method of obtaining the switch’s IP address.
Connection Method
IPv4 Address
Subnet Mask
Default Gateway
Static IP Address
Enter the IP address manually.
Obtain from DHCP Server
Obtain the switch’s IP address from DHCP server.
Enter the switch’s IPv4 address if you select [Static IP Address] as the connection
method.
Enter the switch’s subnet mask if you select [Static IP Address] as the connection
method.
Enter the switch’s default gateway if you select [Static IP Address] as the
connection method.
17
Page 19
Method of Acquiring DNS
Chapter 2 Settings
Server Address
Primary DNS ServerEnter the primary DNS server’s IP address.
Secondary DNS ServerEnter the secondary DNS server’s IP address.
IPv6Check “Enable” to enable IPv6.
Obtain IPv6 address
automatically
DHCPv6 Client
Link Local Address
Static Global Address
Static Default Gateway
Dynamic Global Address
Dynamic Default GatewayDisplays the default gateway obtained from router advertisement.
Select a method of obtaining the DNS server’s IP address.
Check “Enable” if the switch need to obtain router advertisement from IPv6compatible router.
Check “Enable” if using DHCPv6 client. When “Rapid Commit” is checked, the
communication speed with DHCPv6 server will be increased if the DHCPv6 server
is also compatible with rapid commit.
Displays the switch’s link local address. This is generated automatically when IPv6
is enabled.
Enter the global address and prefix length to configure an IPv6 address manually.
The prefix length may contain 1-128. When “EUI-64” is checked, the bottom 64-bit
of the IPv6 address will be generated automatically based on the switch’s MAC
address, in accordance with Modified EUI-64 (RFC4291).
Enter the default gateway to configure an IPv6 default gateway manually. The
default gateway prefix should be the same as the static global address.
Displays the dynamic global address obtained from DHCPv6 or router
advertisement.
The address with the trailing “SF” means that the address was obtained from
DHCPv6. The address with the trailing “SL” means that the address was obtained
from router advertisement.
In L3 mode
ModePrivacy separator cannot be used when the switch is in L3 mode.
VLAN Status
Displays current VLAN and PVID (Port VLAN ID) status. Click [Edit] to edit the VLAN
selected. Click [Delete] to delete the VLAN selected. VLAN 1 cannot be deleted.
18
Page 20
VLAN IDSpecify the VLAN ID from 2-4094.
Chapter 2 Settings
VLAN Name
Management VLAN
IPv4 Address
TaggedSelect when you assign the port to tag member.
UntaggedSelect when you assign the port to untag member.
Not MemberSelect when you do not assign the port to any member.
ResetClick to reset the changes to the previous settings.
Uplink
Downlink
Note: In privacy separator mode, only the device connected to an uplink port can open Settings. If you configure
the port that your PC is connected as a downlink port, you cannot open Settings anymore.
Enter the VLAN name. You may enter up to 17 alphanumeric characters, hyphens,
and underscores.
If an IP address is assigned to the VLAN, that VLAN will become a management
VLAN in L3 mode.
Enter an IPv4 address and a subnet mask to assign them to the VLAN. Up to 32
VLANs that a unique IPv4 addresses is assigned can be created.
Appears when “Privacy Separator” is selected.
A router should be connected to the uplink port to connect to the Internet.
Uplink ports can communicate with all downlink ports. Specify at least 1 port to
an uplink port.
Appears when “Privacy Separator” is selected.
Downlink ports are the ones which each device connected to. Downlink ports can
communicate with uplink ports, but cannot communicate with each downlink
port.
The following screen is displayed when you select VLAN 1 and click [Edit].
Method of Acquiring DNS
Server Address
Primary DNS ServerEnter the primary DNS server’s IP address.
Secondary DNS ServerEnter the secondary DNS server’s IP address.
IPv6Check “Enable” to enable IPv6.
Obtain IPv6 address
automatically
DHCPv6 Client
Link Local Address
Static Global Address
Select a method of obtaining the DNS server’s IP address.
Check “Enable” if the switch need to obtain router advertisement from IPv6compatible router.
Check “Enable” if using DHCPv6 client. When “Rapid Commit” is checked, the
communication speed with the DHCPv6 server will be increased if the DHCPv6
server is also compatible with rapid commit.
Displays the switch’s link local address. This is generated automatically when IPv6
is enabled.
Enter the global address and prefix length to configure an IPv6 address manually.
The prefix length may contain 1-128. When “EUI-64” is checked, the bottom 64-bit
of the IPv6 address will be generated automatically based on the switch’s MAC
address, in accordance with Modified EUI-64 (RFC4291).
19
Page 21
Static Default Gateway
Chapter 2 Settings
Dynamic Global Address
Dynamic Default GatewayDisplays the default gateway obtained from router advertisement.
Note: In L3 mode, you can configure the default gateway from the [Routing] - [Static Routing] page.
Enter the default gateway to configure an IPv6 default gateway manually. The
default gateway prefix should be the same as the static global address.
Displays the dynamic global address obtained from DHCPv6 or router
advertisement.
The address with the trailing “SF” means that the address was obtained from
DHCPv6. The address with the trailing “SL” means that the address was obtained
from router advertisement.
VLAN Ports
Configure PVID (Port VLAN ID).
PVID
Acceptable Frame Type
Ingress Filter
Protected Port“Protected Port” enabled ports cannot communicate with each other.
Specify the port VLAN ID. The received untagged frames will be recognized as the
specified VLAN ID. (1-4094)
Admit All
Receive both untagged and tagged frames.
Tag Only
Receive tagged frames only and drop untagged frames.
Enable
Drop frames if the received frame’s VLAN ID is not a member of incoming port’s
VLAN.
Disable
All tagged and untagged frames will be received.
20
Page 22
Routing
Chapter 2 Settings
L2/L3 Settings
Configure the layer mode of the switch.
Specify the layer mode from the following.
Mode
Note: Switching the mode will delete static routing settings and all VLANs except VLAN 1.
L3 mode
The switch works as a layer 3 switch.
L2 mode
The switch works as a layer 2 switch.
Static Routing
Displayed only when the switch is in L3 mode. Configure the gateway to reach the specified network.
Number of Static RoutingsDisplays the number of enabled static routings.
Default GatewayEnter the IP address of the gateway to reach an unspecified network.
21
Page 23
Add the static routing setting to the table by entering the following items. Up to
Chapter 2 Settings
32 static routes can be created.
Network
Static Routing Table
Setting
Static Routing TableDisplays the static routing information.
Enter the IP address of the network that you need to configure the static routing
for.
Subnet Mask
Enter the subnet mask of the network.
Gateway
Enter the IP address of the gateway to reach the specified network.
SNMP Settings
To use SNMP, SNMP monitoring software is needed.
SNMP Community Table
Configure SNMP community table.
Community Name
Get
Set
TrapIf checked, communication members can receive SNMP traps.
Enter the community name. You may enter up to 31 alphanumeric characters,
hyphens, and underscores.
If checked, community members are allowed to read the switch’s SNMP
information.
If checked, community members are allowed to write the switch’s SNMP
information.
22
Page 24
SNMP Host Table
Chapter 2 Settings
Configure the SNMP host table.
Note: To delete the registered host, make “Hostname” and “IP Address” field blank and click [Apply].
Host Authentication
Hostname
IP Address
Community
Enable/disable SNMP host authentication.
Enable
SNMP service will be provided from SNMP manager only. Read/write authority
depends on the community.
Disable
Receive SNMP requests from any hosts. Read/write authority depends on the
community.
Enter a hostname to permit SNMP requests. You may enter 1-31 alphanumeric
characters, hyphens, and underscores.
Enter an IPv4/IPv6 address of the host. To communicate with the host using an
IPv6 address, enable IPv6 in advance.
Select the host’s community. Communities should be configured on the [SNMP
Community Table] page in advance.
23
Page 25
SNMP Trap
Chapter 2 Settings
Configure SNMP traps.
Note: To use SNMP traps, register the host to the host table on the [Basic] - [SNMP] - [SNMP Host Table] page and
enable “trap” for that community.
Compatible traps:
0 coldStart
1 warmStart
2 LinkDown (Link Up/Down)
3 LinkUp (Link Up/Down)
4 authenticationFailure (Authentication Trap)
6 topoligyChange (STP)
7 Loop detection (Loop Detection)
Private MIB OID: 1.3.6.1.4.1.5227.28.1.1.1
8 Trunk (Trunk)
Private MIB OID: 1.3.6.1.4.1.5227.28.1.1.2 (the value differs depending on the trunk’s link status as below)
1.3.6.1.4.1.5227.28.1.2.1 (trunk key 1-8)
1.3.6.1.4.1.5227.28.1.2.2 (link up: 1, link down: 2)
All traps can be enabled/disabled except “coldStart” and “warmStart”.
SNMP TrapEnable or disable all of the following traps.
Authentication Trap
Link Up/DownIf enabled, the trap will be sent when link up/down of the port is detected.
STP
Loop DetectionIf enabled, the trap will be sent when the loop is detected.
TrunkIf enabled, the trap will be sent when the trunk is configured or unconfigured.
If enabled, the trap will be sent when SNMP is requested from an unallowed IP
address.
If enabled, the trap will be sent when STP/RSTP/MSTP topology change is
occurred.
24
Page 26
SNMPv3 User
Chapter 2 Settings
Configure information of users who are authenticated with SNMPv3. SNMPv3 will authenticate users using
username and the authentication can be encrypted. This switch is compatible with the following authentication and
encryption method.
Authentication method: HMAC-MD5-96/HMAC-SHA-96
Encryption method: CBC-DES/CFB-AES-128
Engine ID
Username
Access Control
Authentication MethodConfigure the authentication method.
Authentication KeyEnter the key phrase compatible with the authentication method.
EncryptionConfigure the encryption method.
Encryption KeyEnter the key phrase compatible with the encryption method.
This is the switch’s unique ID to identify SNMP engine. This ID will be notified to
other side when SNMPv3 communication is done.
Enter the username to authenticate. The username should be up to 32
alphanumeric characters, hyphens (-), and underscores (_).
Limit the access depending on the user.
Read Only
Prohibit writing.
Read/Write
Permit any access.
25
Page 27
LLDP
Chapter 2 Settings
LLDP Properties
Configure LLDP.
TLV Advertised IntervalEnter the interval of sending LLDP packets. (5-32768 seconds)
Enter the amount of time of TTL (Time To Live: the time that LLDP packets
Hold Multiplier
Reinitializing Delay
Transmit Delay
Fast Start Duration
are held before the packets are discarded) measured in multiples of the TLV
advertised interval. (2-10)
Enter the time that passes between disabling and reinitializing LLDP. (1-10
seconds)
Enter the time that passes between changing the LLDP settings and transmitting
LLDP frame. (1-8192 seconds)
Enter the number of times that LLDP packets are sent when the LLDP-MEDcompatible device is detected.
26
Page 28
LLDP Port
Chapter 2 Settings
Configure LLDP for each port.
Status
Notification
Disable
Disable LLDP.
Tx Only
Enable transmitting LLDP packets only.
Rx Only
Enable receiving LLDP packets only.
Tx and Rx
Enable transmitting and receiving LLDP packets.
If enabled, SNMP traps will be sent to the SNMP server when the neighbor table is
updated.
Note: To use notification, configure SNMP manager and SNMP trap settings.
Port Description TLVIf enabled, the port information (port number) will be included in LLDP packets.
If enabled, the switch name will be included in LLDP packets.
System Name TLV
Note: The switch name can be configured on the [Basic] - [System] page.
System Description TLVIf enabled, the product name will be included in LLDP packets.
System Capabilities TLVIf enabled, the system capabilities will be included in LLDP packets.
Management Address TLVIf enabled, the switch’s IP address will be included in LLDP packets.
27
Page 29
LLDP-MED Port
Chapter 2 Settings
Configure LLDP-MED for each port.
If enabled, LLDP-MED will be transmitted.
Status
Notification
Capabilities TLVIf enabled, the capabilities will be included in LLDP packets.
Network Policy TLVIf enabled, the network policy will be included in LLDP packets.
Extend Power TLV
Software Revision TLVIf enabled, the firmware version will be included in LLDP packets.
Note: To use this functionality, configure the status to [Tx Only] or [Tx and Rx] on
the [LLDP Port] page.
If enabled, the SNMP trap will be sent to the SNMP server when the LLDP-MED
information in the neighbor table is updated.
Note: To use notification, configure SNMP manager and SNMP trap settings.
If enabled, the extend power will be included in LLDP packets.
Note: This functionality is compatible with PoE switches only.
28
Page 30
Neighbor Table
Chapter 2 Settings
Displays the information of the LLDP-compatible devices connected to the switch.
MSAP Entry #Displays the entry number of the detected devices.
Local PortDisplays port number that the detected devices are connected to.
Chassis ID SubtypeDisplays the chassis ID subtype of the detected devices.
Chassis IDDisplays the chassis ID of the detected devices.
Port ID SubtypeDisplays the port ID subtype of the detected devices.
Port IDDisplays the port ID of the detected devices.
System NameDisplays the system name of the detected devices.
Note: To use this functionality, configure the status to [Rx Only] or [Tx and Rx] on the [Basic] - [LLDP] - [LLDP Port]
page.
MAC Addresses
Static MAC Filtering
Configure the filtering of MAC addresses that are registered manually. Only the frames with the registered MAC
address as a source MAC address can pass through the ports that the MAC address is registered to.
Static MAC FilteringCheck “Enable” to enable static MAC filtering.
MAC Address
Port NumberSelect a port to apply the static MAC filter.
Static MAC Filtering TableDisplays the registered MAC addresses and port numbers.
Enter the MAC address you want to filter. (Example: 00:11:22:aa:bb:cc)
Up to 16 addresses can be registered per port.
Note: This function is not compatible with multicast MAC addresses, VRRP MAC addresses (00:00:5E:00:01:XX), and
broadcast MAC addresses.
29
Page 31
Dynamic MAC Filtering
Chapter 2 Settings
Configure the dynamic MAC filtering that enables you to set the number of MAC address learn limits for each port.
Dynamic MAC FilteringCheck “Enable” to enable dynamic MAC filtering.
NumberEnter the number of MAC address learning limits of each port. (1-16384)
Notes:
• If the port’s “Number” field is left blank, all MAC addresses can pass through that port.
• The number of MAC address learn limits can be set between 1-16384 for each port. However, the switch can learn
16384 MAC addresses in total. If the number of MAC address is over 16384, MAC addresses will never be learned
and will be dropped.
• When both static and dynamic MAC filtering are enabled, MAC addresses in the static MAC address table are not
counted towards the number of dynamic MAC address.
30
Page 32
Convert MAC Address
Chapter 2 Settings
Add dynamic MAC addresses to static MAC filtering table to filter them in static MAC filtering.
Add to Static MAC
Filtering Table from
Dynamic MAC Address
Select a port number to display the dynamic MAC addresses that was learned
from the port. Select MAC addresses to add to the static MAC filtering table and
click [Add].
Static MAC Address
Register the static MAC address to the MAC address table. The device with a registered MAC address can
communicate only when it is connected to the specified port. You can confirm the status of static MAC addresses
registration in [Management] - [MAC Address Table].
MAC Address
PortSpecify the port number to register the static MAC address.
Static MAC AddressDisplays the registered static MAC addresses.
Enter a MAC address. Up to 256 MAC addresses can be registered to the switch in
total.
Notes:
• This function is not compatible with multicast MAC addresses, VRRP MAC addresses (00:00:5E:00:01:XX), and
broadcast MAC addresses.
• The registered device cannot communicate when it is not connected to the specified port.
MAC Address Aging
Configure MAC address aging time. MAC address aging time is the time between the last reference of the MAC
address and deleting MAC address.
Aging TimeEnter the aging time.
31
Page 33
Port Settings
Chapter 2 Settings
Status
Displays the port status.
NameDisplays the port name.
AdminDisplays whether the port is enabled (on) or disabled (off).
Link StatusDisplays whether the link is up or down.
AutonegotiationDisplays whether the autonegotiation is enabled (on) or disabled (off).
Speed/DuplexDisplays the speed and duplex status.
Flow ControlDisplays whether the flow control is enabled (on) or disabled (off).
IEEE 802.3azDisplays whether IEEE 802.3az is enabled (on) or disabled (off).
APDDisplays whether APD is enabled (on) or disabled (off).
Displays whether jumbo frame is enabled (on) or disabled (off).
Jumbo Frame
Note: Jumbo frames of up to 9216 frames (including header 14 bytes + FCS 4
bytes) can be forwarded.
32
Page 34
Speed/Mode Settings
Chapter 2 Settings
Configure ports settings such as the transmission rate or flow control.
Name
AdminCheck to enable the port.
ModeSelect the transmission rate and duplex.
Flow ControlCheck to enable flow control.
IEEE 802.3azCheck to enable IEEE802.3az.
APD
Jumbo FrameCheck to enable jumbo frame settings.
Speed/DuplexDisplays the current transmission rate and duplex.
Enter the port name. You may enter up to 15 alphanumeric characters, hyphens,
underscores, and spaces.
Check to enable APD (auto power down). If enabled, power consumption of link
down ports can be reduced.
System Security
Administration Account
Configure the username and password.
Username
Password
ConfirmEnter the new password again.
Enter the new username. You may enter up to 8 alphanumeric characters,
hyphens, and underscores.
Enter the new password. You may enter up to 32 alphanumeric characters,
hyphens, and underscores.
33
Page 35
Access Management
Chapter 2 Settings
Configure each administration interface.
SNMPEnable or disable SNMP administration interface.
Enable or disable HTTPS administration interface.
HTTPS
Web Session TimeoutEnter the timeout period for accessing Settings using HTTP.
Maximum Web Session
Number
PortSpecify the port number for HTTPS connections.
HTTPS Session TimeoutEnter the timeout period for accessing Settings using HTTPS.
Maximum HTTPS Session
Number
Note: To use this functionality, upload SSL certificate on the [Basic] - [System
Security] - [Certificate] page.
Enter the number of users who can access Settings using HTTP at the same time.
Enter the number of users who can access Settings using HTTPS at the same time.
Certificate
Upload or download the certificate. For HTTPS communication, prepare a certificate by yourself, or use the
certificate automatically created on the switch.
A certificate will be automatically created on the switch when no certificate is uploaded and the switch is rebooted.
The compatible certificate types are:
Certificate TypeX.509
Private KeyRSA up to 2048-bit (no encryption only)
Hash AlgorithmSHA1, SHA256, SHA384, SHA512
The certificate must include the private key as the following:
-----BEGIN CERTIFICATE----…
…
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY----…
…
-----END RSA PRIVATE KEY-----
34
Page 36
Upload HTTPS Certificate
Chapter 2 Settings
to Switch
Download HTTPS
Certificate from Switch
SSL Certificate
Information
Upload HTTPS certificate.
Download HTTPS certificate.
Displays the uploaded certificate information. Click [Delete] to delete the
uploaded certificate.
Note: If the certificate is deleted, a certificate will be automatically created next
time the switch reboots.
Date & Time
Configure whether to manually set the date and time or automatically using a SNTP server.
SNTPEnable to automatically obtain the time from SNTP server.
TimeConfigure the time when SNTP is disabled.
Server IP/FQDN
Update IntervalEnter the interval which time is obtained from the SNTP server.
Time ZoneConfigure the time zone.
Enter the SNTP server IP address or FQDN. To enter the FQDN, DNS settings must
be configured.
35
Page 37
PoE
Chapter 2 Settings
This functionality is for PoE-compatible switches only.
Status
Displays the PoE status.
PowerDisplays the maximum power, power being used, and available power.
Displays if PoE is enabled (on) or disabled (off).
Notes:
PoE
StatusDisplays the power feeding status.
Power ClassDisplays the connected device’s class.
PriorityDisplays the priority of each port.
Supplied PowerDisplays the supplied power of each port.
CurrentDisplays the supplied current of each port.
• If you connect a PoE device to the switch while available power (shown to the
right of "Available") is 16000 mW (16 W) or lower, the switch will not supply PoE
power to the device.
• The maximum power of BS-GS20P series is 180000 mW (180 W).
36
Page 38
PoE Profiles
Chapter 2 Settings
Configure PoE settings for each profile that is used in [Power Profile] page.
Profile NameTo change the profile name, enter a new profile name and click [Modify].
PoEEnable or disable PoE functionality.
Configure the priority of PoE power feeding. When the supplied power exceeds
Priority
High Power
Turn Off LEDs?Select “Yes” to turn off all LEDs except the power LED.
InitializeClick to initialize the selected profile.
Copy ProfileSelect the source and destination profiles and click [Copy Profiles] to copy them.
maximum power, the switch will supply power to the ports in the order of
priority.
Configure the high-powered power feeding function.
Disable
The switch will supply power up to 15.4 W to the 802.3af-compatible devices.
High-powered power feeding is disabled.
802.3af High Power
This is the expansion of 802.3af standard. The switch will supply power up to 15.4
W to the class 0-3 devices and up to 30 W to the class 4 devices.
802.3at
The switch will supply power up to 30 W to the 802.3at-compatible devices.
37
Page 39
Notes:
Chapter 2 Settings
• Click [Apply] to apply the current settings to all profiles.
• To use dynamic power feeding by LLDP, configure the status to [Tx and Rx] on the [Basic] - [LLDP] - [LLDP Port]
page.
• If the supplied power exceeds the maximum power, the switch will supply power to the port in the order of the
port number.
Power Profile
Configure the power saving schedule.
Manual
Switch the profile manually.
Automatic
Schedule
Manual Profile SettingSelect a profile to be used when the schedule is set to [Manual].
Profiles
ScheduleDisplays the list of the schedule. Click [Edit Schedule] to edit the schedule.
View
The screen appears when [Edit Schedule] is clicked
Unscheduled ProfileSelect a profile to be used when no schedules are configured.
Specify bySelect a timetable type.
DateEnter the date to add to the schedule if “Date” is selected as the timetable type.
Day of Week
Period
Switch the profile automatically in accordance with the settings below.
Note: To set to [Automatic], SNTP must be enabled. If the time cannot be
obtained from SNTP server, the configured profile will be applied in accordance
with the switch’s internal clock.
Displays the list of the profiles. Click [Edit Profiles] to edit the profile.
Note: To edit the profile, set the schedule to [Manual].
Weekly
Displays the weekly schedule.
Daily
Displays the daily schedule.
Select the day of week to add to the schedule if “Day of week and time” is selected
as the timetable type.
Select the time frame while the schedule is enabled if “Day of week and time” is
selected as the timetable type.
38
Page 40
Select a method of specifying the profile. “Copy profile from a different day”
Chapter 2 Settings
Select Profile
Profile
Use profile from
ScheduleDisplays the list of configured schedule.
cannot be selected when “Day of week and time” is selected as the timetable
type.
Select a profile name if “Use profile below” is selected as the method of specifying
the profile. Click [Check] to confirm each profile’s settings.
Select a day of week to copy the profile if “Copy profile from a different day” is
selected as the method of specifying the profile.
QoS
QoS Settings
Configure the priority.
QoSCheck to enable QoS. Click [Show Detail] to enable/disable QoS for each port.
Configure the queue scheduling type.
Strict
Execute the queue scheduling based on strict priority. High-prioritized queues
are always forwarded strictly; low-prioritized queue will never be forwarded if any
data remains in the high prioritized queue.
Schedule Method
Priority TypeSelect a priority parameter from DSCP, CoS, and IP precedence.
WRR
Execute the queue scheduling based on WRR (Weighted Round Robin). This will
forward queues in order of a round robin; even lower priority queues will be
forwarded at a constant rate. The priority can be specified from 0 (lowest) to 7
(highest).
Note: Packets without VLAN tag will belong to the lowest priority queue.
39
Page 41
QoS Mapping
Chapter 2 Settings
Configure port-based priority for DSCP, CoS, and IP precedence.
Port PriorityConfigure the priority of each port.
DSCP MappingConfigure the DSCP priority value from 0-63.
CoS MappingConfigure the CoS priority value from 0-7.
IP Precedence MappingConfigure the IP precedence priority value from 0-7.
PriorityConfigure the priority from 0-7.
Note: DSCP mapping, CoS mapping, and IP precedence mapping is displayed when each type is selected.
40
Page 42
VoIP Auto Priority
Chapter 2 Settings
Configure the priority of SIP, H.323, SCCP.
VoIP Auto Priority
CoS
Check to enable VoIP auto priority. Click [Show Detail] to enable or disable this
functionality for each port.
Applied to the VoIP packets of SIP, H.323, SCCP only. If QoS is enabled, it is
handled in accordance with CoS priority.
IPv4/MAC Policy
Create DiffServ policies. IPv4 and MAC addresses can be specified here. The enabled policies will be applied when
the packet or frame enters to the switch.
Current Number of
Policies
Current Number of Active
Policies
Policy Name
Displays the number of created policies.
Displays the number of active policies.
Enter the policy name into the blank field and click [Apply] to create a new policy.
Click [Show Detail] to configure the policy in detail.
Check the created policy name, enter the new name and click [Rename] to
rename the policy.
41
Page 43
The following screen appears when [Show Detail] is clicked.
Chapter 2 Settings
Policy NameDisplays the selected policy name.
CoSAdds the CoS value to the policy condition.
Adds the frame’s destination MAC address to the policy condition. For
Destination MAC Address
Source MAC Address
EtherTypeAdds the frame’s ether type to the policy condition.
VLANAdds the frame’s VLAN ID to the policy condition.
ProtocolAdds the packet’s protocol to the policy condition.
Destination IPv4 Address
Destination PortAdds the packet’s destination port to the policy condition.
Source IPv4 Address
Source PortAdds the packet’s source port to the policy condition.
Service Type
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Adds the frame’s source MAC address to the policy condition. For instructions on
how to enter the address, refer to “About Address and Mask” section below.
Adds the packet’s destination IPv4 address to the policy condition. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Adds the packet’s source IPv4 address to the policy condition. For instructions on
how to enter the address, refer to “About Address and Mask” section below.
Adds the packet’s service type to the policy condition. Only 1 value can be
specified when “IP DSCP” or “IP Precedence” is selected.
42
Page 44
DiffServ Policy
Chapter 2 Settings
Select the action for when the frames satisfy the condition.
Permit
Permits forwarding the frames and packets.
Deny
Discards the frames and packets.
Egress Queue
Changes the processing priority of the frames and packets.
Remark CoS
Rewrites CoS value of the frames and packets.
Remark DSCP
Rewrites DSCP value of the frames and packets.
Remark IP Precedence
Rewrites IP precedence value of the frames and packets.
Profile Action
Processes the frames and packets depending on the committed rate. If the rate
of the frames and packets is less than the committed rate, the switch will process
the frames and packets in accordance with the in-profile action. Otherwise, the
switch will process the frames and packets in accordance with the out-of-profile
action.
Committed Rate
Specify the rate to determine the process method.
Committed Burst
Specify the burst size that the switch processes in accordance with the inprofile action when the rate of frames and packets exceeds the committed rate
instantaneously. When the burst size exceeds the committed burst, the switch
will process in accordance with the out-of-profile action.
In-Profile Action
Specify the action when the rate of frames and packets is less than the committed
rate.
Out-of-profile Action
Specify the action when the rate of frames and packets exceeds the committed
rate.
About Address and Mask
This product adopts “wildcard masks”.
To configure the source MAC address or destination MAC address, refer to the following example.
• To specify the range of “00:11:22:ab:cd:00” to “00:11:22:ab:cd:ff”
Enter “00:11:22:ab:cd:00” in the address field and also enter “00:00:00:00:00:ff” in the mask field.
• To specify only “00:11:22:ab:cd:ef”
Enter “00:11:22:ab:cd:ef” in the address field and also enter “00:00:00:00:00:00” in the mask field.
To configure the source IPv4 address or destination IPv4 address, refer to the following example.
• To specify the range of “192.168.1.0” to “192.168.1.254”
Enter “192.168.1.0” in the address field and also enter “0.0.0.255” in the mask field.
• To specify only “192.168.1.1”
Enter “192.168.1.1” in the address field and also enter “0.0.0.0” in the mask field.
43
Page 45
IPv6 Policy
Chapter 2 Settings
Create DiffServ policies. IPv6 addresses can be specified here. The enabled policies will be applied when the packet
or frame enters the switch.
Current Number of
Policies
Current Number of Active
Policies
Policy Name
The following screen appears when [Show Detail] is clicked.
Policy NameDisplays the selected policy name.
Destination IPv6 Address
Source IPv6 Address
Displays the number of created policies.
Displays the number of active policies.
Enter the policy name into the blank field and click [Apply] to create a new policy.
Click [Show Detail] to configure the policy in detail.
Check the created policy name, enter the new name and click [Rename] to
rename the policy.
Adds the packet’s destination IPv6 address to the policy condition. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Adds the packet’s source IPv6 address to the policy condition. For instructions on
how to enter the address, refer to “About Address and Mask” section below.
44
Page 46
DiffServ Policy
Chapter 2 Settings
Select the action for when the frames satisfy the condition.
Permit
Permits forwarding the frames and packets.
Deny
Discards the frames and packets.
Egress Queue
Changes the processing priority of the frames and packets.
Remark CoS
Rewrites CoS value of the frames and packets.
Remark DSCP
Rewrites DSCP value of the frames and packets.
Remark IP Precedence
Rewrites IP precedence value of the frames and packets.
Profile Action
Processes the frames and packets depending on the committed rate. If the rate
of the frames and packets is less than the committed rate, the switch will process
the frames and packets in accordance with the in-profile action. Otherwise, the
switch will process the frames and packets in accordance with the out-of-profile
action.
Committed Rate
Specify the rate to determine the process method.
Committed Burst
Specify the burst size that the switch processes in accordance with the inprofile action when the rate of frames and packets exceeds the committed rate
instantaneously. When the burst size exceeds the committed burst, the switch
will process in accordance with the out-of-profile action.
In-Profile Action
Specify the action when the rate of frames and packets is less than the committed
rate.
Out-of-profile Action
Specify the action when the rate of frames and packets exceeds the committed
rate.
About Address and Mask
This product adopts “wildcard masks”. To configure the source IPv6 address or destination IPv6 address, refer to the
following example.
• To specify the range of “2001:db8::” to “2001:db8::ffff”
Enter “2001:db8::” in the address field and also enter “::ffff” in the mask field.
• To specify only “2001:db8::”
Enter “2001:db8::” in the address field and also enter “::” in the mask field.
45
Page 47
Port Settings
Chapter 2 Settings
Configure the ports to apply DiffServ policies. The ports specified by ACL rules cannot be specified.
Current Number of Active
Policies
Current Number of Active
IPv6 Policies
Port SettingsSelect a policy name and ports, then click [Apply].
IPv4/MAC (IPv6) ACL Rule
List
Displays the number of active IPv4 and MAC address-based policies.
Displays the number of active IPv6 address-based policies.
Displays the selected policy’s conditions.
IPv4/MAC Priority
Configure IPv4 and MAC address-based policies priority.
IPv4/MAC Policy List
Move Policy
Displays the list of IPv4 and MAC address-based policy. Policies are listed in order
of the priority.
Select a policy and enter the policy number that the selected policy moves to
before (or after). Select [Before] or [After] and click [Move] to change the priority
of the policy.
46
Page 48
IPv6 Priority
Chapter 2 Settings
Configure IPv6 address-based policies priority.
IPv6 Policy List
Move Policy
Status
Displays the DiffServ status.
Policy List
IPv4/MAC Policy List
IPv6 Policy List
Displays the list of IPv6 address-based policies. Policies are listed in order of the
priority.
Select a policy and enter the policy number that the selected policy moves to
before (or after). Select [Before] or [After] and click [Move] to change the priority
of the policy.
Displays the list of policies. Policies are listed in order of the priority. Select a port
from [Port Filter] to display only the policies that the selected port belongs to.
Displays the list of IPv4 and MAC address-based policies. Click [+] next to a policy
to show its conditions. Conditions are listed in order of the priority.
Displays the list of IPv6 address-based policies. Click [+] next to a policy to show
its conditions. Conditions are listed in order of the priority.
47
Page 49
Security
Chapter 2 Settings
Auto DoS Attack Prevention
Configure packets to be dropped.
LAND Attack
Minimum TCP Header Size
TCP/UDP L4 Port
ICMPIf enabled, the ICMP packets whose ICMP header+data is more than 512 bytes.
TCP Flag
Fragment
If enabled, the packets whose source IP address and destination IP address are
the same will be dropped.
If enabled, the packets whose TCP header size is less than 20 bytes will be
dropped.
If enabled, the packets whose source port number and destination port number
are the same will be dropped. Disable when using SNTP, RADIUS, and DHCP relay.
If enabled, the illegal TCP flagged packets will be dropped. This will not be
applied to the fragment packets.
If checked, the configuration of [TCP Flag] will be applied also to the fragment
packets.
48
Page 50
DHCP Snooping
Chapter 2 Settings
Configure DHCP snooping. DHCP snooping is a function to prevent leasing IP addresses when an illegal DHCP server
is connected.
DHCP SnoopingCheck to enable DHCP snooping.
Add option 82 to the DHCP packets received from DHCP clients. To obtain an IP
DHCP Option 82
Rate Limit (pps)
Status
address from the DHCP server using this functionality, the DHCP server should be
compatible with option 82.
Limits the rate of the DHCP packets received from DHCP clients to all ports per a
second. Exceeded DHCP packets from DHCP clients will be discarded.
Trusted
The DHCP server connected to the trusted port can lease IP addresses.
Untrusted
The DHCP packet from the DHCP server connected to the untrusted port will be
blocked.
49
Page 51
DHCP Table
Chapter 2 Settings
Displays the DHCP clients that obtained an IPv4 address from the DHCP server via the switch. Up to 256 clients can
be listed.
Note: DHCP table can be used only when DHCP snooping is enabled.
MAC AddressDisplays the DHCP client’s MAC address.
IPv4 AddressDisplays the IPv4 address that DHCP client obtained.
Lease TimeDisplays the lease period of the IPv4 address.
VLAN IDDisplays the VLAN ID that the DHCP client belongs to.
PortDisplays the port number that the DHCP client is connected to.
50
Page 52
Authentication
Chapter 2 Settings
Status
Displays the authentication server and port authentication status.
Primary/Secondary
Authentication StatusDisplays the authentication status of each port.
Displays if each server is enabled or disabled, and the server’s IP address and port
number.
51
Page 53
RADIUS
Chapter 2 Settings
Configure the RADIUS server.
AuthenticationCheck to enable authentication server.
Authentication Server IPEnter the authentication server’s IP address.
Authentication Server
Port
Shared Secret
Reset TimerEnter the time that passes before re-authentication.
Advanced
Enter the authentication server’s port number. (1-65535)
Enter the shared secret of the authentication server. You may enter up to 20
alphanumeric characters, hyphens, and underscores.
Accounting
If enabled, notify the connection status to the RADIUS server.
Termination-Action
If you follow the termination-action notified by the server, enable this.
Dynamic VLAN Assignment
If enabled, the VLAN to which the port belongs to can change dynamically based
on the authentication information received from the RADIUS server. You need to
add attributes in the RADIUS server settings in advance to use dynamic VLAN . For
more information, refer to “RADIUS Server Settings to Use Dynamic VLAN” section
below.
Note: This product’s dynamic VLAN can only be used with 802.1X port
authentication.
Notes:
• Use only the primary authentication server under normal conditions. Use the secondary server when a backup
server is used.
• Session-timeout is fixed to 5 seconds and the number of confirmation times is fixed to 3 times.
• To delete configured shared secret, initialize the switch. You do not have to initialize the switch when you change
the shared secret.
RADIUS Server Settings to Use Dynamic VLAN
When dynamic VLAN is enabled, add the following attributes to the RADIUS server.
AttributeValue
Tunnel-Type13 (VLAN)
Tunnel-Medium-Type6 (IEEE-802)
Tunnel-Private-Group-IDVLAN ID that the authenticated user will belong to
52
Page 54
Port Authentication
Chapter 2 Settings
Configure authentication settings for each port. Prepare an authentication server (RADIUS server) separately.
802.1X Port
802.1X MAC
By MAC
EAP Passthrough
Guest VLAN
Authenticate 802.1X based on the port. All devices connected to the port can
communicate after the authentication.
Authenticate 802.1X based on the MAC address. Only the authenticated devices
can communicate. Up to 12 MAC addresses can be authenticated per port.
Enables MAC authentication. Up to 12 MAC addresses can be authenticated per
port.
If the authentication of all ports is disabled or received EAP frames should be
transmitted, enable this.
Click “Enable” to enable guest VLAN functionality. Enter each port’s guest VLAN
period and the VLAN ID to be assigned to users who could not be authenticated
by the time the guest VLAN period expires.
Notes:
• Only the guest VLAN settings of ports using 802.1X port authentication are
enabled.
• If the port’s guest VLAN ID is “0”, guest VLAN of that port is disabled.
53
Page 55
The MAC authentication port authenticates using the source MAC address when it receives IP packets. Use the
Chapter 2 Settings
following username and password to authenticate to the RADIUS server.
Username: source MAC address
Password: source MAC address
Example: If the source MAC address of the IP packet is 00:11:22:33:AA:BB, the username and password is the
following.
Username: 00112233aabb
Password: 00112233aabb
Enter letters in lower case.
RADIUS requests will be sent to the RADIUS server with this information. On the RADIUS server side, user registration
is needed in advance.
Note: MAC authentication will not authenticate the same MAC address twice in a row. If MAC authentication fails,
disconnect and reconnect the Ethernet cable or authenticate others, then try again.
This product’s authentication is compatible with the following encryption method.
802.1X Port802.1X (EAP-MD5, TLS, PEAP)Cannot use with other methods at the same time
802.1X MAC802.1X (EAP-MD5, TLS, PEAP)Can use with other methods at the same time
By MACPAPCan use with other methods at the same time
Notes:
• If 802.1X MAC is enabled, EAPOL-Start should be issued by the supplicant.
• You cannot use MAC filtering for the port that enables 802.1X port authentication.
• You cannot select a authentication type for the port that enables MAC filtering or trunk.
Port Trunking
Configure port trunking settings.
Trunk ModeSelect a trunk mode.
Trunk KeyEnter the key to identify the trunk group.
Trunk NameEnter the trunk name.
Enter the priority that is used to decide whose settings are used when the trunk is
System Priority
MemberSelect ports to join the trunk member.
constructed. The settings of the device whose system priority is the minimum will
be used. If the system priorities are the same, the settings of the device whose
MAC address is smaller will be used.
54
Page 56
Notes:
Chapter 2 Settings
• 8 groups can be created in total between LACP and manual creation. Up to 8 port can be set to a group.
• The ports in the same trunk group should belong to the same VLAN.
• If you construct the trunk group using LACP, the opposing switch can set the LACP to both active and passive.
Traffic Control
Configure storm settings. If each packet exceeds the threshold configured on this page, exceeded packets will be
dropped.
BroadcastSelect a rate to allow passing broadcasts.
MulticastSelect a rate to allow passing multicasts.
DLFSelect a rate to allow passing DLF (destination lookup failure) unicasts.
Limits the bandwidth of ingress (input to the switch) speed as the configured
value.
Ingress Bandwidth
Note: If the ingress bandwidth value is lower than the received data threshold on
the “Loop Prevention” page, the switch may not be able to detect a loop.
Egress Bandwidth
Note: If the rate is configured based on broadcasts, multicasts, or DLF unicasts that sometimes cannot pass due to
the difference of traffic, configure the minimum rate of frames for normal use.
Limits the bandwidth of egress (output from the switch) speed as the configured
value.
55
Page 57
Mirroring
Chapter 2 Settings
Configure to monitor the traffic (copy the contents of communication from source to destination).
EnableCheck to enable mirroring.
Source PortSelect ports to be monitored.
Destination PortSelect ports to monitor the traffic.
Spanning Tree Protocol
STP Settings
Configure STP settings.
Select a STP version from STP, RSTP or MSTP.
STP Version
BPDU Forwarding
(Only when STP is disabled)
Hello TimeEnter the interval of BPDU transmission when this switch is the root bridge.
Max Age
Forward Delay
Max Hop Count
(MSTP only)
Bridge PriorityEnter the priority of this switch for selecting the root bridge.
MST Configuration Name
(MSTP only)
MST Revision Level
(MSTP only)
Configuration Digest
(MSTP only)
MSTI Settings
(MSTP only)
Note: MSTP cannot be enabled when LDF is enabled. To disable LDF, navigate to
[Advanced] - [Loop Prevention].
Enable to forward BPDU frames when STP is disabled.
Enter the maximum time that passes before trying to reconfigure when this
switch doesn’t receive BPDU.
Enter the time spent in the status changes (listening-learning-forwarding) of the
switch before forwarding packets.
Specify the maximum hop count of BPDU.
Enter an MST region name. The same name should be configured for all devices
that belong to the same region.
Configure MST revision. The same value should be configured for all devices that
belong to the same region.
Displays the MSTI status as MD5 digest message.
To add MSTI ID, enter the MSTI ID and bridge priority, select VLAN ID(s) to belong
to, then click [Add].
56
Page 58
MSTP Status
Chapter 2 Settings
(MSTP only)
Notes:
• To use spanning tree, all devices in the segment must be compatible with spanning tree.
• To configure each items, the following relational expression must be true.
2 x (Forward Delay - 1) ≥ Max Age
Max Age ≥ 2 x (Hello Time + 1)
Displays the MSTI configuration status. Select an MSTI ID and click [Edit] to add or
delete the VLAN ID(s) and change the bridge priority value.
Status
Displays the STP status of each port.
MSTI/CIST
(MSTP only)
Root PortDisplays the root port. If this switch is the root bridge, “0” is displayed.
Root Port Path
Regional Root Port Path
(MSTP only)
Hello TimeDisplays the interval of BPDU transmission when this switch is the root bridge.
Max Age
Forward Delay
Max Hop Count
(STP/RSTP only)
When MSTP is enabled, this page shows the status of each MSTI ID or CIST. Select
an MSTI ID or CIST to display the status.
Displays the path cost to the root bridge. If this switch is the root bridge, “0” is
displayed.
Displays the path cost to the CIST root bridge in the MST region.
Displays the maximum time that passes before trying to reconfigure when this
switch doesn’t receive BPDU.
Displays the time spent in the status changes (listening-learning-forwarding) of
the switch before forwarding packets.
Displays the maximum hop count of BPDU.
57
Page 59
Root Bridge Priority
Chapter 2 Settings
(STP/RSTP only)
Root MAC Address
(MSTP only)
CIST Root Bridge Priority
(MSTP only)
CIST Root MAC Address
(MSTP only)
Regional Root Bridge
Priority
(MSTP only)
Regional Root MAC
Address
(MSTP only)
Switch MAC AddressDisplays this switch’s MAC address.
PriorityDisplays the port priority.
Path CostDisplays the path cost.
FastlinkDisplays if fastlink is enabled or disabled.
StatusDisplays the port status.
RoleDisplays the port role.
Select a root bridge priority of this switch.
Displays the root bridge’s MAC address.
Displays the CIST root bridge’s bridge priority.
Displays the CIST root bridge’s MAC address.
Displays the bridge priority of the root bridge in the MST region.
Displays the MAC address of the root bridge in the MST region.
Ports
Configure STP settings for each port. Path cost can be switched between “Auto” and “Manual”.
Priority
Path Cost
Enter the port priority in hexadecimal format. This is used to decide the path to
the root bridge.
If path cost is set to “Manual”, you can edit the value. This is used to decide the
path to the root bridge.
58
Page 60
Fastlink
Chapter 2 Settings
IGMP
Status
Displays the IGMP status.
If enabled, the port will be in forwarding status immediately. It is recommended
to enable fastlink to the port a PC is connected to. Disable it if the switch using
STP is connected to the port.
Note: Fastlink is disabled when the port trunking is configured.
IGMP StatusDisplays the multicast address table.
Router Port StatusDisplays the port connected to the multicast router (server).
IGMP Settings
Configure IGMP snooping. This product is compatible with IGMP snooping v1, v2, and v3.
Check to enable IGMP snooping.
If enabled, you can prevent the flooding of multicast packets except for the port
IGMP Snooping
Filter Unknown Multicasts
Host TimeoutEnter the host timeout period for receiving multicast.
Router Port TimeoutEnter the timeout length for the multicast router (server).
connected to the host which joins the multicast group.
Note: The addresses in the range of 224.0.0.1-224.0.0.255 will be excepted from
IGMP snooping.
If checked, the packets of the multicast that is not learned will be discarded
except for 224.0.0.1-224.0.0.255.
59
Page 61
IGMP Querier
Chapter 2 Settings
If IGMP querier is enabled, IGMP snooping can be enabled even if no multicast router is connected.
IGMP QuerierCheck to enable IGMP querier. IGMP queries will be forwarded from each VLAN.
Querier Interval
Querier Source IPv4
Address
Max Response Time
Configure the transmit interval for the querier that confirms the existence of
multicast group’s member.
Enter the source IPv4 address of the querier.
Configure the time between transmitting the querier and response from
the member. If the member responds to the querier by this time, the querier
determines that the member is connected.
IGMP Router Port
Specify the port connected to the multicast router (server) for each VLAN.
IGMP Router Port Settings
Enter the VLAN ID and specify the port connected to the multicast router (server),
then click [Add].
60
Page 62
MLD
Chapter 2 Settings
Status
Displays the MLD status.
MLD StatusDisplays the multicast address table.
Router Port StatusDisplays the port connected to the multicast router (server).
MLD Settings
Configure MLD snooping.
Check to enable MLD snooping.
If enabled, you can prevent the flooding of multicast packets except for the port
MLD Snooping
Filter Unknown Multicasts
Host TimeoutEnter the host timeout period for receiving multicast.
Router Port TimeoutEnter the timeout length for the multicast router (server).
connected to the host which joins the multicast group.
Note: FF02::-FF02::FF and FF0X:: will be excepted from MLD snooping.
If checked, the packets of the multicast that is not learned will be discarded
except for FF02::-FF02::FF and FF0X::.
61
Page 63
MLD Querier
Chapter 2 Settings
If MLD querier is enabled, MLD snooping can be enabled even if no multicast router is connected.
MLD QuerierCheck to enable MLD querier. MLD queries will be forwarded from each VLAN.
Querier Interval
Querier Source IPv6
Address
Max Response Time
Configure the transmit interval for the querier that confirms the existence of
multicast group’s member.
Enter the source IPv6 address of the querier.
Configure the time between transmitting the querier and response from
the member. If the member responds to the querier by this time, the querier
determines that the member is connected.
MLD Router Port
Specify the port connected to the multicast router (server) for each VLAN.
MLD Router Port Settings
Enter the VLAN ID and specify the port connected to the multicast router (server),
then click [Add].
62
Page 64
ACL
Chapter 2 Settings
ACL Wizard
Configure ACLs with the wizard. Follow the directions on the screen.
Based on source MAC
address
Based on destination MAC
address
Based on source IPv4
address
Based on destination IPv4
address
Based on source IPv6
address
Based on destination IPv6
address
MAC ACL
Create MAC address-based ACLs.
Configure to permit or deny the specified source MAC address.
Configure to permit or deny the specified destination MAC address.
Configure to permit or deny the specified source IPv4 address.
Configure to permit or deny the specified destination IPv4 address.
Configure to permit or deny the specified source IPv6 address.
Configure to permit or deny the specified destination IPv6 address.
Current Number of GroupsDisplays the number of ACL groups.
Current Number of Active
Rules
ACL Group Name
Number of RulesDisplays the number of rules of each ACL group.
Displays the number of active rules for ACLs.
Displays the ACL group name. To create new ACLs, enter the group name and
click [Apply]. Click [Show Detail] to add rules to the ACL group. To change the
group name, select a group, enter the new name and click [Rename].
63
Page 65
The following screen is displayed when [Show Detail] is clicked. Up to 10 rules can be configured per group.
Chapter 2 Settings
ACL Rule ListDisplays the list of rules in the ACL group. Rules are listed in order of the priority.
Move Rule
ACL Group NameDisplays the selected ACL group name.
CoSConfigure the filtering rule based on the frame’s class of service value.
Destination MAC Address
Source MAC Address
Ether TypeConfigure the filtering rule based on the Ether Type of the frame.
VLANConfigure the filtering rule based on the frame’s VLAN ID.
Select a rule and enter the rule number that the selected rule moves to before (or
after). Select [Before] or [After] and click [Move] to move the priority of the rule.
Configure the filtering rule based on the frame’s destination MAC address. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Configure the filtering rule based on the frame’s source MAC address. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Select whether the frames that satisfy the requirements can be forwarded to the
other port or not.
Permit/Deny
Egress Queue
Redirect Port
About Address and Mask
This product adopts “wildcard masks”. To configure the source MAC address or destination MAC address, refer to the
following example.
• To specify the range of “00:11:22:ab:cd:00” to “00:11:22:ab:cd:ff”
Enter “00:11:22:ab:cd:00” in the address field and also enter “00:00:00:00:00:ff” in the mask field.
• To specify only “00:11:22:ab:cd:ef”
Enter “00:11:22:ab:cd:ef” in the address field and also enter “00:00:00:00:00:00” in the mask field.
Permit
Forwards the incoming frames to the other port. Any packets or frames out of the
range of permitted MAC addresses will be dropped.
Deny
Drops the incoming frames.
Apply the scheduling to the frames that satisfy the requirement and configure
the priority. Select the priority from 0 (lowest) to 7 (highest).
The scheduling is executed based on strict or WRR. It depends on the settings on
the [Advanced] - [QoS] page. If QoS is disabled, it will be based on WRR.
Forwards the frames that satisfy the requirements to the specified port. If
enabled, the frames will not be forwarded to the primary destination port.
If the rule is set to [Deny], the frames will be dropped and will not be forwarded
to the primary destination port.
64
Page 66
IPv4 ACL
Chapter 2 Settings
Create IPv4 address-based ACLs.
Current Number of GroupsDisplays the number of ACL groups.
Current Number of Active
Rules
ACL Group Name
Number of RulesDisplays the number of rules of each ACL group.
The following screen is displayed when [Show Detail] is clicked. Up to 10 rules can be configured per group.
Displays the number of active rules for ACLs.
Displays the ACL group name. To create new ACLs, enter the group name and
click [Apply]. Click [Show Detail] to add rules to the ACL group. To change the
group name, select a group, enter the new name and click [Rename].
ACL Rule ListDisplays the list of rules in the ACL group. Rules are listed in priority order.
Move Rule
ACL Group NameDisplays the selected ACL group name.
ProtocolConfigure the filtering rule based on the packet’s protocol.
Destination IPv4 Address
Destination PortConfigure the filtering rule based on the frame’s destination port.
Source IPv4 Address
Source PortConfigure the filtering rule based on the frame’s source port.
Service Type
Select a rule and enter the rule number that the selected rule moves to before (or
after). Select [Before] or [After] and click [Move] to change the priority of the rule.
Configure the filtering rule based on the frame’s destination IPv4 address. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Configure the filtering rule based on the frame’s source IPv4 address. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Configure the filtering rule based on the frame’s service type.
If [IP DSCP] or [IP Precedence] is selected, only 1 value can be permitted or
denied. If [IP ToS] is selected, you can specify the range of values which is
permitted or denied. Refer to “About IP ToS Mask” section below for details.
65
Page 67
Select if the frames that satisfy the requirement can be forwarded to the other
Chapter 2 Settings
port or not.
Permit/Deny
Egress Queue
About Address and Mask
This product adopts “wildcard masks”. To configure the source IP address or destination IP address, refer to the
following example.
• To specify the range of “192.168.1.0” to “192.168.1.254”
Enter “192.168.1.0” in the address field and also enter “0.0.0.255” in the mask field.
• To specify only “192.168.1.1”
Enter “192.168.1.1” in the address field and also enter “0.0.0.0” in the mask field.
About IP ToS Mask
Permit
Forwards the incoming frames to the other port. Any packets or frames out of the
range of permitted IP addresses will be dropped.
Deny
Drops the incoming frames.
Apply the scheduling to the frames satisfy the requirement and configure the
priority. Select the priority from 0 (lowest) to 7 (highest).
The scheduling is executed based on strict or WRR. It depends on the settings on
the [Advanced] - [QoS] page. If QoS is disabled, it will be based on WRR.
IP ToS mask also adopts “wildcard mask”. If [IP ToS] is selected for [Service Type], you can specify the range of IP DSCP
values or IP precedence values. To specify the range of values, refer to the following example.
To specify DSCP value 1-7,
Enter “0” in [Bits] field and also enter “1C” in [Mask] field.
IPv6 ACL
Create IPv6 address-based ACLs.
Current Number of GroupsDisplays the number of ACL groups.
Current Number of Active
Rules
ACL Group Name
Number of RulesDisplays the number of rules of each ACL group.
Displays the number of active rules for ACLs.
Displays the ACL group name. To create new ACLs, enter the group name and
click [Apply]. Click [Show Detail] to add rules to the ACL group. To change the
group name, select a group, enter the new name and click [Rename].
66
Page 68
The following screen is displayed when [Show Detail] is clicked. Up to 10 rules can be configured per group.
Chapter 2 Settings
IPv6 ACL Rule ListDisplays the list of rules in the ACL group. Rules are listed in priority order.
Move Rule
ACL Group NameDisplays the selected ACL group name.
Destination IPv6 Address/
Subnet Mask
Source IPv6 Address/
Subnet Mask
Select a rule and enter the rule number that the selected rule moves to before (or
after). Select [Before] or [After] and click [Move] to move the priority of the rule.
Configure the filtering rule based on the frame’s destination IPv6 address. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Configure the filtering rule based on the frame’s source IPv6 address. For
instructions on how to enter the address, refer to “About Address and Mask”
section below.
Select if the frames that satisfy the requirement can be forwarded to the other
port or not.
Permit/Deny
Egress Queue
About Address and Mask
This product adopts “wildcard masks”. To configure the source IPv6 address or destination IPv6 address, refer to the
following example.
• To specify the range of “2001:db8::” to “2001:db8::ffff”
Enter “2001:db8::” in the address field and also enter “::ffff” in the mask field.
• To specify only “2001:db8::”
Enter “2001:db8::” in the address field and also enter “::” in the mask field.
Permit
Forwards the incoming frames to the other port. Any packets or frames out of the
range of permitted IP addresses will be dropped.
Deny
Drops the incoming frames.
Apply the scheduling to the frames satisfy the requirement and configure the
priority. Select the priority from 0 (lowest) to 7 (highest).
The scheduling is executed based on strict or WRR. It depends on the settings on
the [Advanced] - [QoS] page. If QoS is disabled, it will be based on WRR.
67
Page 69
Ports
Chapter 2 Settings
Configure the ports to apply ACL groups. A total of up to 126 MAC ACL and IP ACL rules may be applied to the ports.
Current Number of Active
IPv4/MAC ACL Rules
Current Number of Active
IPv6 ACL Rules
Port SettingsSelect an ACL group name and ports, then click [Apply].
MAC (IPv4/IPv6) ACL Rule
List
Note: If the group has no rules, the ports that the group belongs to will permit and forward all packets and frames.
If the group has any rules, the ports that the group belongs to will drop all packets and frames that don’t belong to
any rules.
Displays the number of active rules for IPv4/MAC ACLs.
Displays the number of active rules for IPv6 ACLs.
Displays the selected ACL group’s rules.
IPv4/MAC Priority
Configure IPv4 and MAC ACL group’s priority. MAC ACL will be applied to both of the IPv4 and IPv6 packets. Filtering
The destination and source ports for IPv4 ACL will not be applied to IPv6 packets.
IPv4/MAC ACL Group ListDisplays the list of ACL groups. Groups are listed in order of the priority.
Move Group
Select a group and enter the group number that the selected group moves to
before (or after). Select [Before] or [After] and click [Move] to move the priority of
the group.
68
Page 70
IPv6 Priority
Chapter 2 Settings
Configure IPv6 ACL group’s priority. IPv6 ACL takes a priority than MAC and IPv4 ACL.
IPv6 ACL Group ListDisplays the list of ACL groups. Groups are listed in order of the priority.
Select a group and enter the group number that the selected group moves to
Move Group
before (or after). Select [Before] or [After] and click [Move] to move the priority of
the group.
Status
Displays the ACL status.
ACL Group List
MAC ACL Rule List
IPv4 ACL Rule List
IPv6 ACL Rule List
Displays the list of ACL groups. Groups are listed in order of the priority. Select a
port from [Port Filter] to display only the groups that the selected port belongs to.
Displays the list of MAC ACL groups. Click [+] next to a group to show its rules.
Rules are listed in order of the priority.
Displays the list of IPv4 ACL groups. Click [+] next to a group to show its rules.
Rules are listed in order of the priority.
Displays the list of IPv6 ACL groups. Click [+] next to a group to show its rules.
Rules are listed in order of the priority.
69
Page 71
Loop Prevention
Chapter 2 Settings
Configure loop prevention functionality.
Configure the switch’s action when a loop is detected.
Action
Disable for
MAC Thrashing
LDF
Receive Rate
Ignore
When a loop is detected, the switch will do nothing for the port itself; the diag
LED and loop-detected port’s LED will blink for the time configured in [Disable
for] section. If a loop is detected again, it will blink and continue until the loop is
resolved.
Disable port
The switch will disable the loop-detected port for the time configured in [Disable
for] section. At the same time, the diag LED and loop-detected port’s LED will
blink for the time configured in [Disable for] section. If a loop is detected again
after the time configured in [Disable for] section is passed, the switch will disable
the loop-detected port and continue until the loop is resolved.
Configure the period to disable the loop-detected port when [Disable port] is
selected as the action.
Check to enable MAC thrashing loop detection method, which assumes that a
loop occurs when the switch’s MAC address learn limit exceeds the configured
threshold in one second.
Check to enable LDF loop detection method. The switch will transmit the LDF
packet once per second. If the transmitted LDF packet is received, this will
assume that a loop is occurring.
Note: LDF cannot be used when MSTP is enabled.
Check to enable receive rate loop detection method. If the port’s threshold
exceeds the configured receive rate, this will assume that a loop is occurring.
Configure the threshold to assume that a loop is occurring. (1-1000 Mbps)
Received Data Threshold
Note: The loop prevention functionality temporarily disables the port, but will not resolve the loop itself. On
the other hand, the spanning tree functionality blocks the port when a loop is detected and switches the route
automatically to prevent the network from going down. This switch has both functions; use the most appropriate
one depending on your network environment.
Note: If the received data threshold value is higher than the ingress bandwidth
value on the “Traffic Control” page, the switch may not be able to detect a loop.
70
Page 72
Loop PreventionSpanning Tree
Chapter 2 Settings
Action when the loop is
detected
How to resolve the loop
Recommended
Environment
Temporarily disables the port. After the
configured time passes, the port will be
enabled again.
Resolve manually
Data can be transmitted temporarily while
the port is disabled.
Data cannot be transmitted until the loop
is resolved unless storm control is enabled.
Small-scale network
Blocks the port and switches the
transmission route automatically.
Resolve automatically
Communication will be interrupted
while the route is being switched.
• Large or medium-scale network
with existing spanning tree
• The environment that the loop
must be prevented in
DHCP Relay
Displayed only when the switch is in L3 mode. Configure DHCP relay, that relays the DHCP messages in the other
network to the specific VLAN.
DHCP RelayCheck to enable DHCP relay.
If only one DHCP server is configured for all VLANs, select “For all VLANs”. If DHCP
servers are configured for each VLAN, select “For selected VLANs”.
DHCP Relay Settings
If “For all VLAN” is selected, enter the DHCP server IP address. If “For selected
VLANs” is selected, check “Enabled” of each VLAN that need to enable DHCP relay.
Then, enter the DHCP server IP address for each VLAN.
71
Page 73
Update Firmware
Chapter 2 Settings
Update firmware with the local firmware file.
Select a file image to update and click [Browse] to select the firmware image, then click [Update].
Notes:
• Do not turn off the switch or close the browser while updating.
• To finish the update, reboot the switch.
• If changing the firmware to version 1.0.3.32 or earlier, the Settings username and password may also be changed
unintentionally. For more detailed information, refer to the “Restrictions” section in appendix A.
File ImageSelect a file image to update.
Dual Image
The switch can save up to 2 firmware files and can be configured to choose one for booting.
Image NameSelect an image to change the action.
Select the action for the image selected on “Image Name”.
Active
Reads the image when the switch boots.
This setting will be applied after clicking [Apply] and rebooting the switch.
Action
None
The image will not be used.
This setting will be applied after clicking [Apply] and rebooting the switch.
Delete
Select [Delete] and click [Apply] to delete the image.
The image will be deleted without having to reboot the switch.
Enter the image’s description. You may enter up to 50 alphanumeric characters.
Image Description
Note: The image description will never be initialized even if the switch is
initialized.
72
Page 74
Notes:
Chapter 2 Settings
• Switching to the lower version image (older version firmware) may delete some settings.
• If switching the firmware to version 1.0.3.32 or earlier, the Settings username and password may be changed
unintentionally. For more detailed information, refer to the “Restrictions” section in appendix A.
Back Up and Restore Settings
Save or restore the switch’s settings.
Back Up SettingsClick [Save] to save current settings to a file.
Click [Browse] to select a settings file and click [Restore] to start restoring.
Notes:
Restore Settings
• To finish restoring, reboot the switch.
• If restoring the switch’s Settings from a Settings file while the switch is running
firmware version 1.0.3.32 or earlier, the Settings username and password
may be changed unintentionally. For more detailed information, refer to the
“Restrictions” section in appendix A.
Reboot
Reboot the switch.
RebootClick [Reboot] to reboot the switch.
73
Page 75
Initialize
Chapter 2 Settings
Restore the switch settings to the factory default.
Initialize Except IP AddressClick [Initialize] to initialize all settings except the switch’s IPv4/IPv6 address.
Initialize All SettingsClick [Initialize] to initialize all switch settings.
Physical Reset ButtonEnable or disable the reset button on the switch.
ARP Table
Displayed only when the switch is in L3 mode. ARP table can record up to 510 devices.
Port Order
Displays the IP addresses and the MAC addresses of the connected devices with the port order. Select a port from
the dropdown menu to display the devices that is connected to the selected port.
IP Address Order
Displays the IP addresses and the MAC addresses of the connected devices with the IP address order.
74
Page 76
MAC Address Table
Chapter 2 Settings
Port Order
Displays the MAC address table with the port order. Select a port from the dropdown menu to display the MAC
addresses that are connected to the selected port.
MAC Order
Displays the MAC address table with the MAC address order.
Note: “Authenticated” is displayed on “Device Authentication” section only when the PC is authenticated using
802.1X MAC or MAC authentication method.
75
Page 77
Statistics
Chapter 2 Settings
Displays the switch’s statistics.
Note: Each maximum value is 4,294,967,295. If this is reached or exceeded, the value will reset to 0. Rebooting the
switch will also reset the value to 0.
NameDisplays the port name.
Received OctetsDisplays the number of total received octets.
Received PacketsDisplays the number of total received packets.
Sent OctetsDisplays the number of total sent octets.
Sent PacketsDisplays the number of total sent packets.
Show DetailsClick to display the detailed information.
Port StatisticsDisplays the number of total received/sent packets of the selected port.
EAP StatisticsDisplays the number of total received/sent EAP packets of the selected port.
The following items appear when [Show Detail] is clicked.
Received OctetsDisplays the number of total received octets.
Received Unicast PacketsDisplays the number of received unicast packets.
Received Multicast
Packets
Received Broadcast
Packets
Discarded Received
Packets
Received Packet ErrorDisplays the number of packets that was discarded because of FCS error.
Sent OctetsDisplays the number of total sent octets.
Displays the number of received multicast packets.
Displays the number of received broadcast packets.
Displays the number of packets that the switch received but did not forwarded to
any port.
76
Page 78
Sent Unicast PacketsDisplays the number of sent unicast packets.
Chapter 2 Settings
Sent Multicast PacketsDisplays the number of sent multicast packets.
Sent Broadcast PacketsDisplays the number of sent broadcast packets.
Discarded Sent PacketsDisplays the number of packets that could not be sent.
Sent Packet ErrorDisplays the number of packets that was discarded because of FCS error.
Total Frames RxDisplays the number of total received EAP packets.
Total Frames TxDisplays the number of total sent EAP packets.
Start Frames RxDisplays the number of received EAPOL start packets.
Logoff Frames RxDisplays the number of received EAPOL logoff packets.
Request/ID Frames Tx
Request Frames Tx
Response/ID Frames Rx
Response Frames Rx
Invalid Frames RxDisplays the number of EAP packets whose types are invalid.
Length Error Frames RxDisplays the number of EAP packets whose packet lengths are invalid.
Last Frame VersionDisplays the version of the latest received EAP packet.
Last Frame SourceDisplays the source MAC address of the latest received EAP packet.
Displays the number of EAP packets that include “Code:Request(1)
Type:Identity(1)”.
Displays the number of EAP packets that do not include “Code:Request(1)
Type:Identity(1)”.
Displays the number of EAP packets that include “Code:Response(2)
Type:Identity(1)”.
Displays the number of EAP packets that do not include “Code:Response(2)
Type:Identity(1)”.
Notes:
• When the switch is in L2 mode, packets that are designated to the switch (such as ping or http communication
for displaying Settings) will be displayed as “received unicast packets” and “discarded received packets”.
• When the switch is in L3 mode, packets that are designated to the switch are displayed as “received unicast
packets”.
• The target packets of this page are MAC frames, IPv4 packets, and IPv6 packets.
Logs
Displays the switch’s log information.
Notes:
• Up to 512 logs can be recorded to this switch in total. If exceeded, logs will be deleted in order of oldest.
• When the switch is turned off, all logs will be deleted.
SortSelect a type of log to display.
77
Page 79
Syslog Settings
Chapter 2 Settings
Configure syslog to transfer logs.
Transfer LogsCheck to enable syslog server.
IP AddressEnter the syslog server’s IP address.
Attach HeaderSelect an item to attach to the header of the transmitted data.
TypeSelect a type of log to transfer.
Network Diagnostics
Execute a communication test to the specified IP address.
Ping
Traceroute
To enter the FQDN, configure DNS server settings on [Basic] - [VLAN] - [VLAN Settings] page in advance.
Enter the IPv4/IPv6 address or FQDN and click [Apply] to execute a ping test to
the destination.
Enter the IPv4 address or FQDN and click [Apply] to execute a traceroute test to
the destination.
78
Page 80
Cable Diagnostics
Chapter 2 Settings
Click [Test] to check whether there are any issues with the Ethernet cable connected to each port.
To check the cable status correctly, configure the following to this switch and the destination device in advance;
• Autonegotiation: enabled
• IEEE 802.3az (EEE): disabled
• Auto power down (APD): disabled
Note: If the destination device is not a BS-GS series switch, the result may not appear correctly.
Cable Status
Displays the status of each Ethernet cable.
Open
Ethernet cable is not connected.
OK
Ethernet cable is connected without any issues.
Short
Ethernet cable may be shorting out.
Unknown
Cannot check the cable status.
79
Page 81
Chapter 3 Troubleshooting
Chapter 3 Troubleshooting
LED Is Not Lit, Abnormal Lighting or Blinking
The power LED is not lit.• Confirm that the AC adapter or power cable is connected to the inlet.
• If it blinks once per a second, a loop is detected. Check the cabling.
The diag LED is blinking red.
The link/act LED is not lit.
Cannot initialize with the
reset button on the switch
• If your switch has fans and its diag LED is blinking fast, a fan error may be
occurring. Disconnect the power cable and reconnect it. If the LED keeps
blinking, contact our technical support.
• Confirm that the Ethernet cable is connected to both the switch and the
device.
• Confirm that the switch and the connected device are both powered on.
• Confirm that the Ethernet cable type and length is compatible with the
switch.
• Confirm whether the physical reset button is enabled in Settings.
• If the physical reset button is disabled and you forgot the password of
Settings, contact our technical support.
Cannot Access Settings
• Make sure that your PC is connected to the switch.
• Access Settings with the switch’s IP address (192.168.1.254 by default).
• Confirm that the username (“admin” by default) and the password (“password” by default) are correct. If you
forgot the username or password, initialize the switch.
• If a proxy server is configured for the web browser, disable the proxy server or add the switch’s IP address to the
proxy server’s exception list.
• Confirm that your PC is connected to the port which belongs to the management VLAN.
Forgot the Password
• The password is “password” by default. If you changed the password, press the reset button to initialize.
• If the physical reset button is disabled and you forgot the password of Settings, contact our technical support.
80
Page 82
Appendix A Specifications
Appendix A Specifications
Product Specifications
Refer to the quick setup guide to check the hardware specifications.
Note: Only use the cables and accessories that are included in the package. Don’t use other accessories or cables
unless specifically instructed to in the documentation.
Port Specifications
Ethernet port specifications
RJ-45 with 8 pins
100BASE-TX/10BASE-T
Pin NumberSignal NameSignal Function
1RD+/TD+Receive data (+)/Transmit data(+)
2RD-/TD-Receive data (-)/Transmit data(-)
3TD+/RD+Transmit data (+)/Receive data(+)
4(Not Use)Not used
5(Not Use)Not used
6TD-/RD-Transmit data (-)/Receive data (+)
7(Not Use)Not used
8(Not Use)Not used
1000BASE-T
Pin NumberSignal NameSignal Function
1BI_DA+/BI_DB+Transmit and receive data A (+)/Transmit and receive data B (+)
2BI_DA-/BI_DB-Transmit and receive data A (-)/Transmit and receive data B (-)
3BI_DB+/BI_DA+Transmit and receive data B (+)/Transmit and receive data A (+)
4BI_DC+/BI_DD+Transmit and receive data C (+)/Transmit and receive data D (+)
5BI_DC-/BI_DD-Transmit and receive data C (-)/Transmit and receive data D (-)
6BI_DB-/BI_DA-Transmit and receive data B (-)/Transmit and receive data A (-)
7BI_DD+/BI_DC+Transmit and receive data D (+)/Transmit and receive data C (+)
8BI_DD-/BI_DC-Transmit and receive data D (-)/Transmit and receive data C (-)
81
Page 83
PoE Port Specification (Only for PoE-compatible devices) (Alternative A)
LocationNot defined
ContactNot defined
VLAN ModeVLAN
VLAN ID1
VLAN NameNone
Management VLANEnabled
Connection MethodStatic IP Address
IPv4 Address192.168.1.254
Subnet Mask255.255.255.0
Default Gateway0.0.0.0
Method of Acquiring DNS
Server Address
Primary DNS Server0.0.0.0
Secondary DNS Server0.0.0.0
IPv6Disabled
PortsUntagged
PVID1
Acceptable Frame TypeAdmit All
Ingress FilterEnabled
Protected PortDisabled
Default Gateway0.0.0.0
Community Name“public” for only #1
GetEnabled for only #1
SetDisabled
TrapDisabled
Manual
82
Page 84
SNMP Settings
Appendix A Specifications
LLDP
MAC Addresses
Port Settings
SNMP Trap
SNMPv3 User
LLDP Properties
LLDP Port
LLDP-MED Port
Static MAC
Filtering
Dynamic MAC
Filtering
MAC Address
Aging
Speed/Mode
Settings
Authentication TrapDisabled
Link Up/DownDisabled
STPDisabled
Loop DetectionDisabled
TrunkDisabled
Usernameadmin
Access ControlRead only
Authentication MethodNone
Authentication KeyNone
EncryptionNone
Encryption KeyNone
TLV Advertised Interval30 seconds
Hold Multiplier4
Reinitializing Delay2 seconds
Transmit Delay2 seconds
Fast Start Duration3 times
StatusTx and Rx
NotificationDisabled
Port Description TLVDisabled
System Name TLVDisabled
System Description TLVDisabled
System Capabilities TLVDisabled
Management Address TLVDisabled
StatusDisabled
NotificationDisabled
Capabilities TLVDisabled
Network Policy TLVDisabled
Extend Power TLVDisabled
Software Revision TLVDisabled
Static MAC FilteringDisabled
Dynamic MAC FilteringDisabled
NumberNone
Aging Time300 seconds
NamePort + port number
AdminEnabled
ModeAutonegotiation
Flow ControlDisabled
IEEE 802.3azEnabled
APDEnabled
Jumbo FrameEnabled
83
Page 85
System Security
Appendix A Specifications
System Security
Date & Time
PoE
(PoE-compatible
product only)
QoS
Security
Administration
Account
Access
Management
Access
Management
PoE Profiles
Power Profiles
QoS Settings
QoS Mapping
VoIP Auto
Priority
Auto DoS Attack
Prevention
DHCP Snooping
Usernameadmin
Passwordpassword
SNMPEnabled
HTTPSDisabled
Web Session Timeout5 minutes
Maximum Web Session
Number
Port443
HTTPS Session Timeout5 minutes
Maximum HTTPS Session
Number
SNTPDisabled
Time2014/01/01 00:00:00
Server IP/FQDNntp.jst.mfeed.ad.jp
Update Interval24 hours
Time Zone
Profile NameProfile 1-4
PoEEnabled
PriorityLow
High Power802.3at
Turn Off LEDs?No
ScheduleManual
Manual Profile SettingProfile1
ViewWeekly
QoSDisabled
Schedule MethodWRR
Priority TypeCoS
Port Priority0
CoS Mapping2, 0, 1, 3, 5, 6, 7 in order of CoS value
VoIP Auto PriorityEnabled
CoS7
LAND AttackDisabled
Minimum TCP Header SizeDisabled
TCP/UDP L4 PortDisabled
ICMPDisabled
TCP FlagDisabled
FragmentDisabled
DHCP SnoopingDisabled
DHCP Option 82Disabled
Rate LimitNone
StatusTrusted
Max Response Time10 seconds
ActionDisable port
Disable for60 seconds
MAC ThrashingDisabled
LDFDisabled
Receive RateDisabled
Received Data Threshold700 Mbps
DHCP Relay for VLANsDisabled
DHCP Relay SettingsFor all VLANs
DHCP Server IP Address0.0.0.0
20
Disabled
Automatically generated from the
switch’s MAC address
0
0.0.0.0
::
86
Page 88
Transfer LogsDisabled
Appendix A Specifications
IP Address0.0.0.0
Attach HeaderMAC Address and System Name
(1) If changing the firmware to version 1.0.3.32 or earlier when the current firmware version is version 1.0.3.36 or
later and the current Settings password is longer than 8 characters, the Settings username and password will
revert to the default (the username will be “admin”, and the password will be “password”).
(2) If you do not save any changes on Settings after changing the firmware version to an earlier one, the username
and password will revert to the original if you upgrade the firmware to version 1.0.3.36 or later.
Example:
(1) Change the firmware to
Ver.1.0.3.36 or later
Username: buffalo
Password: 123456789
* If you click [Apply] on any Settings page after (1), the usename and the password that had been set while
running firmware version 1.0.3.32 or earlier will remain the same after upgrading the firmware to version 1.0.3.36
or later.
an older version.
(2) Change the firmware to
a newer version without
saving any changes on
Settings.*
Ver.1.0.3.32 or earlier
Username: admin
Password: password
87
Page 89
Dual Imaging
Appendix A Specifications
(1) If switching the firmware to version 1.0.3.32 or earlier when the current firmware version is version 1.0.3.36 or
later and the current Settings password is longer than 8 characters, the Settings username and password will
revert to the default (the username will be “admin”, and the password will be “password”).
(2) If you do not save any changes on Settings after changing the firmware version to an earlier one, the username
and password will revert to the original if you switch to firmware version 1.0.3.36 or later.
Example:
(1) Switch the
Image 1 (Active):
Ver.1.0.3.36 or later
firmware to an
older version.
Image 2:
Ver.1.0.3.32 or earlier
Username: buffalo
Password: 123456789
* If you click [Apply] on any Settings page after (1), the usename and the password that had been set while
running firmware version 1.0.3.32 or earlier will remain the same after switching the firmware to version 1.0.3.36
or later.
(2) Switch the firmware
to a newer version
without saving any
changes on Settings.*
Image 1:
Ver.1.0.3.36 or later
Image 2 (Active):
Ver.1.0.3.32 or earlier
Username: admin
Password: password
Backing Up and Restoring Settings
If you set the Settings password to be 8 characters or longer and save the settings to a file while running firmware
version 1.0.3.36 or later, the Settings username and password will not be restored from that file if the unit is running
firmware version 1.0.3.32 or earlier. In that case, the username and the password will revert to the default. The
username will be “admin”, and the password will be “password”.
Example:
Ver.1.0.3.36 or later
Username: buffalo
Password: 123456789
(1) Save the settings
to a file.
Technical Support
North America
https://www.buffalotech.com/support
Europe
http://www.buffalo-technology.com/contact/
A Settings File
Ver.1.0.3.32 or earlier
Username: admin
Password: password
(2) Restore the settings
from the Settings file.
88
Page 90
Appendix B Regulatory Compliance
Appendix B Regulatory Compliance Information
Information
For Customers in Europe
Environmental Information
• The equipment that you have purchased has required the extraction and use of natural resources for its
production.
• The equipment may contain hazardous substances that could impact health and the environment.
• In order to avoid the dissemination of those substances in our environment and to diminish the pressure on the
natural resources, we encourage you to use the appropriate take-back systems.
• The take-back systems will reuse or recycle most of the materials of end life equipment in a sound way.
• The crossed-out wheeled bin symbol invites you to use those systems.
• If you need more information on the collection, reuse and recycling systems, please contact your local or
regional waste administration.
CE
Dansk
Dette er et Klasse A-produkt. I et hjemmemiljø kan dette produkt skabe radiointerferens, hvormed det kan være
nødvendigt for brugeren at tage passende forholdsregler.
Dette produkt kan forårsage interferens hvis det bruges i beboelsesområder. En sådan anvendelse skal undgås,
medmindre brugeren tager specielle foranstaltninger for at reducere elektromagnetiske emissioner for at forhindre
interferens med modtagelse af radio- og tv-udsendelser.
Der må kun bruges de kabler og det tilbehør der er inkluderet i pakken. Der må ikke bruges andet tilbehør eller
kabler, medmindre det er udtrykkeligt beskrevet i dokumentationen.
Deutsch
Dies ist ein Produkt der Klasse A. In einer häuslichen Umgebung kann dieses Produkt Funkstörungen verursachen.
Um diese zu beheben, müssen ggf. entsprechende Maßnahmen ergriffen werden.
Bei einer Nutzung in Wohngebieten können bei diesem Produkt Störungen auftreten. Eine solche Nutzung soll
vermieden werden, außer der Nutzer ergreift bestimmte Maßnahmen, um elektromagnetische Strahlung zu
reduzieren und Störungen der Radio- und Fernsehübertragung zu vermeiden.
Verwenden Sie ausschließlich die Kabel und Zubehörteile, die im Lieferumfang enthalten sind. Andere Zubehörteile
oder Kabel dürfen nur dann verwendet werden, wenn dies in der Dokumentation ausdrücklich vorgeschrieben ist.
89
Page 91
English
Appendix B Regulatory Compliance Information
This is a class A product. In a domestic environment, this product may cause radio interference, in which case the
user may be required to take adequate measures.
This product may cause interference if used in residential areas. Such use must be avoided unless the user takes
special measures to reduce electromagnetic emissions to prevent interference to the reception of radio and
television broadcasts.
Only use the cables and accessories that are included in the package. Don’t use other accessories or cables unless
specifically instructed to in the documentation.
Español
Este es un producto de Clase A. En una situación domestica, este producto puede producir interferencias de radio,
en ese caso el usuario deberá tomar las medidas adecuadas.
Este producto puede causar interferencias al utilizarlo en áreas residenciales. Debe evitarse utilizarlo así, salvo si
el usuario adopta medidas especiales para reducir las emisiones electromagnéticas e impedir que se produzcan
interferencias con la recepción de emisiones de radio y televisión.
Utilice únicamente los cables y accesorios incluidos en el paquete. No utilice otros accesorios ni cables a menos que
así se indique en la documentación.
Français
Cet appareil est un produit de Classe A. Dans un environnement domestique, ce produit est susceptible de
provoquer des interférences radio, auquel cas l’utilisateur peut être mis en demeure de prendre des mesures
appropriées.
Utilisé dans un environnement domestique, cet appareil génère des interférences. Ce type d’utilisation est donc
à éviter si l’utilisateur n’a pas pris de mesures spécifiques visant à réduire les émissions électromagnétiques pour
éviter les interférences avec la réception de programmes de radio et de télévision.
Utilisez uniquement les câbles et accessoires inclus dans ce package. N’utilisez aucun autre accessoire ou câble sauf
instruction spécifique de la documentation.
Italiano
Questo è un prodotto di Classe A. In ambienti domestici il prodotto può causare radiointerferenza, nel qual caso
potrebbe rendersi necessaria l’adozione di opportune misure.
Questo prodotto può causare interferenze se usato in zone residenziali. Evitare l’uso in queste zone a meno che
l’utente non intraprenda azioni specifiche per ridurre le emissioni elettromagnetiche e impedire le interferenze alla
ricezione di trasmissioni radio-televisive.
Utilizzare esclusivamente i cavi e gli accessori inclusi nell’imballaggio. Non utilizzare altri accessori o cavi a meno che
non sia specificamente indicato nella documentazione.
Nederlands
Dit is een Klasse A product. Dit product kan in een huishoudelijke omgeving radiostoring veroorzaken in welk geval
de gebruiker adequate maatregelen dient te nemen.
Dit product kan storing veroorzaken wanneer gebruikt in woongebieden. Dergelijk gebruik dient te worden
vermeden tenzij de gebruiker speciale maatregelen treft om de elektro-magnetische uitstraling te beperken zodat
storing van de ontvangst van radio- en televisieuitzendingen wordt voorkomen.
Gebruik alleen de kabels en toebehoren die zich in de verpakking bevinden. Gebruik geen ander toebehoren of
kabels tenzij dit uitdrukkelijk in de handleiding wordt aangegeven.
90
Page 92
Norsk
Appendix B Regulatory Compliance Information
Dette er et produkt i klasse A. I et hjemmemiljø kan dette produktet forårsake radiointerferens, noe som gjør at
brukeren i så fall må foreta passende tiltak.
Dette produktet kan forårsake interferens dersom det brukes i boligområder. Slik bruk må unngås med mindre
brukeren tar spesielle tiltak for å redusere elektromagnetisk stråling for å unngå interferens med mottak av radio- og
TV-sendinger.
Bruk kun kabler og tilbehør som er inkludert i pakken. Ikke bruk annet tilbehør eller kabler med mindre spesielt
instruert til å gjøre det i dokumentasjonen.
Português
Este é um produto de Classe A. Num ambiente doméstico, este produto pode provocar interferências de rádio, pelo
que o utilizador poderá ter de tomar medidas adequadas.
Este produto poderá causar interferências se utilizado em áreas residenciais. A utilização deverá ser evitada, salvo se
o utilizador tomar medidas especiais para reduzir as emissões electromagnéticas e assim prevenir interferências na
recepção de rádio e televisão.
Utilizar apenas cabos e acessórios incluídos na embalagem. Não utilizar outros acessórios ou cabos, salvo se
especificamente indicado na documentação.
Suomi
Tämä on luokan A tuote. Tämä tuote voi aiheuttaa radiohäiriöitä kotikäytössä, jolloin käyttäjän on ehkä ryhdyttävä
tarvittaviin toimenpiteisiin.
Tämä tuote saattaa aiheuttaa häirintää, jos sitä käytetään asuinalueella. Sellaista käyttöä on vältettävä, ellei
ryhdytä erityistoimenpiteisiin sähkömagneettisen säteilyn vähentämiseksi häiriöiden estämiseksi radio- ja
televisiolähetyksissä.
Käytä ainoastaan pakkauksen mukana toimitettuja kaapeleita ja varusteita. Älä käytä muita varusteita tai kaapeleita
ellei näin ole erityisesti ohjeistettu asiakirjoissa.
Svensk
Detta är en Klass A-produkt. I en hushållsmiljö kan denna produkt orsaka radiostörningar, och användaren kan i så
fall begäras att vidta lämpliga åtgärder.
Den här produkten kan oraka störningar om den används i bostadsområden. Sådan användning måste undvikas om
inte användaren vidtar speciella åtgärder för att minska elektromagnetiska sändningar för att förhindra störningar i
mottagningen av radio- och tv-sändningar.
Använd bara kablar och tillbehör som ingår i förpackningen. Använd inte andra tillbehör eller kablar om du inte får
uttryckliga instruktioner om det i dokumentationen.
Türk
Bu, A Sınıfı bir üründür. Evde kullanım sırasında bu ürün radyo girisimine yol açabilir ve bu durumda kullanıcının
gerekli önlemleri alması gerekebilir.
Bu ürün yerleşim bölgelerinde kullanılırsa parazite neden olabilir. Kullanıcı radyo ve televizyon yayınlarında paraziti
önlemek üzere elektromanyetik salınımları azaltacak özel önlemler almadıkça bu şekilde kullanımdan kaçınılmalıdır.
Yalnızca pakette bulunan kablo ve aksesuarları kullanın. Belgelerde özellikle belirtilmedikçe başka aksesuar ve
kablolar kullanmayın.
91
Page 93
AC Adapter
Appendix B Regulatory Compliance Information
BS-GS2008Asian Power Devices Inc. WA-24Q12R-Z079
BS-GS2008PDelta Electronics, Inc. DPS-150AB-13A
Label Information
Direct current
(For BS-GS2008,BS-GS2008P)
Polarity of DC connector
(For BS-GS2008)
Polarity of DC connector
(For BS-GS2008P)
The chassis of the switch may become quite hot. Before you touch the switch, disconnect the AC
adapter or AC cable from the switch and wait for a short while.
Indicates a hazardous situation, which could result in minor or moderate injury if not careful.
Alternating current
(For BS-GS2008,BS-GS2008P)
For BS-GS2016, BS-GS2024, BS-GS2048, BS-GS2016P, BS-GS2024P
LVD
The socket-outlet shall be installed near the equipment and shall be easily accessible.
English
The device can only be used in a fixed location such as a telecommunication centre, a dedicated computer room.
When you install the device, ensure that the protective earthing connection of the socket-outlet is verified by a
skilled person.
Norsk
Utstyr som er koplet til beskyttelsesjord via nettplugg og/eller via annet jordtilkoplet utstyr – og er tilkoplet et
kabel-TV nett, kan forårsake brannfare.
For å unngå dette skal det ved tilkopling av utstyret til kabel-TV nettet installeres en galvanisk isolator mellom
utstyret og kabel- TV nettet.
Svensk
Utrustning som är kopplad till skyddsjord via jordat vägguttag och/eller via annan utrustning och samtidigt
är kopplad till kabel-TV nät kan i vissa fall medföra risk för brand. För att undvika detta skall vid anslutning av
utrustningen till kabel-TV nät galvanisk isolator finnas mellan utrusningen och kabel-TV nätet.
92
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.