This equipment has been tested and found to comply with the limits for a class A digital device, pursuant to part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation.
This equipment generates radio frequency signal and, if not installed and used in accordance with the instructions, may
cause harmful interferenc e to radio communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the e quipmen t off a nd on, t he user is e ncourage d to try to corre ct the inter feren ce by one or m ore o f
the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
CE Declaration of Conformity
The DVS Layer 3 series switches are CE certificated products. They could be used in any kind of the environments under
CE environment specification. For keeping m ore safe application, we strongly suggest to use the CE-compliant ind ust ria l
enclosure products.
1.1 Feature
Thank you for purchasing the DVS Series Layer 3 Managed Industrial GbE Modular Rack Mount Ethernet Switch. The
DVS series switches are equipped with the intelligent alarm, digital input function, and allow the wide range of operating
temperature (-40 to 85℃). The DVS series switches are designed to support the application in any rugged environment
and comply with UL, CE, FCC and CCC standards.
1.1.1 High Performance Network Technology
10/100/1000Base-T(RJ45 and M12), 100/1000Base-SFP Fiber , 1000B a se-SFP Fiber
IEEE 802.3/802.3u/802.3ab/802.3x/802.3z
Auto negotiation speed
Auto MDI/MDI-X
1.1.2 Industrial Grade Reliability
2 sets of AC/DC power input
2 sets of Relay Alarm
1 System indication LEDs: STATUS/PWR1/PWR2/R.M/RING/ALARM/RESET/RMT
2 Port status LEDs: LINK/SPD/FDX/port number
3 RJ45 CONSOLE port
Chapter 1 Introduction
4
5 RJ-45/SFP/M12 module slots
6 4 port SFP module slot
Buttons: RESET/PORT MODE (Press RESET for 3 seconds to reset and 5 second s to
return to factory default. To change port LED mode, press the
button)
1.1.5 Rear Panel
On the rear panel of the switch sit two panel module slots and one terminal block. The terminal blocks include two powe r
pairs for redundant power supply.
Delta has LCP-155 and LCP-1250 series SFP module. DVS switch can promise 100% compatible
The actual link distance of a particular fiber optic link given the optical budget, th e numb er of
connectors and splices, and c abli ng quant ity. Please measure and verify the actual link loss values
once the link is established to identify any potential performance issues.
1-4
Page 11
Chapter 1 Introduction
1_
1.3 Package Checklist
Delta DVS series Layer 3 Managed Ethernet Switch
Protective Caps for unused RJ45 ports, M12 ports and SFP fiber ports(insert to the module)
RS232 to RJ45 console cable
User manual and software CD
Instruction sheet
Accessories package
A Delta Layer 3 managed s witch supports configuration using the CLI interface, available on the RS232 port to RJ45
interface. You can use the terminal software to connect to a Delta Layer 3 managed switch.
1. Open the terminal software, and select an appropriate COM port for Console Connection, 115200 for Baud Rate, 8
for Data Bits, None for Parity, and 1 for Stop Bits, None for Flow Control.
The Windows 7 system does not support Hyper Terminal. If you need it, you can do wn lo ad t he
2. The user name and the password are the same as Web Browser. The default user name is “admin”, and the
password is blank.
2. The default user na me is “admin” and the password is blank.
2.2 Telnet Console Configuration
A Delta Layer 3 managed switch supports the telnet server functi on; it can be globally enabled or disabled. The user can
use all CLI com m an d s over a telnet session. The maximum number of inbound telnet sessions allowed on the switch can
be configured to 0-5. The inactivity timeout value for the incoming Telnet sessions for the switch can be configured to
1-160 minutes. The login authentication supports the local user method or the remote user method which is configured.
When the login authentication is the remote user method, it supports RADIUS and TACACS+.
1. Open a Command Prompt window and input “telnet 192.168.1.X” to login to a Delta switch.
2. After entering a user name and a password, you can use the CLI command to control the switch.
1. The IP Address by default is 192.168.1.5
2-4
Page 17
Chapter 2 User Interface Introduction
2_
Note:
ports.
2.3 Web Browser Configuration
A Delta Lay er 3 managed switch supports a friendly GUI for normal user s t o c onfi gure the switch. You can monitor the port
status of a Delta PoE managed switch, and configure the settings of each function via the web interface.
1. Open a web browser and connect to the default IP address 192.168.1.5. Enter a user name and a password. (The
default user name is “admin” and the password is blank.)
1. The default user name “admin” is in the lowercase not uppercase.
2. By default, IE5.0 or later version does not allow Java Applets to open sockets.
You need to explicitly modify the browser setting in order to enable Java App lets to use network
2. You can use the menu tree in the left side frame to find the function you want to configure. And configure the detailed
settings in the right side frame.
3. The port status and the LED status on the switch can be monitored in the top frame.
3.14 System Reboot .......................................................................................... 3-111
3-4
Page 23
Chapter 3 Featured Functions
_3
3.1 Basic Setting
The basic setting group includes the most common settings, and an administrator can maintain the control of the Delta
switch in this group.
3.1.1 System Information
System Information includes the basic switch status items and the version .It also displayed in the banner of the GUI.
These informations can help the administrator identify the switch in the network.
System
Name
The system name of the swi tch. Fixed
Description
The device description of the switch. Fixed
Location
The system location of the switch. Fixed
Contact
The system contact of the switch. Fixed
OID
The based object ID for the Management Information Base (MIB) of the switch. Fixed
The time of hours, minutes, and seconds since the switch was last started. Fixed
Software
Description Factory default
Kernel Version
The kernel version of the switch. Model Name
Software Version
The software version of the switch. Boot Version
Software Date
The software version released date of the switch. Software Version
3.1.2 Basic Setting
The Basic Setting will help you customerizing the system information.These informations will display in the System
Information when you change it.
Basic Setting
Description Factory default
System Name
The system name of the switch. Product Name
System Description
The device description of the switch. Product Description
System Location
The system location of the switch. None
System Contact
The system contact of the switch. None
3-6
Page 25
_3
3.1.3 Admin Password
characters from 32 to 126 are allowed. T he default passw ord is blank.
characters from 32 to 126 are allowed.
Only the admin of the Delta switch can modify system username and password.
Admin Password
Description Factory default
Old User Name
The current system username of the switch. admin
Old Password
Chapter 3 Featured Functions
The current password of the sw itch. The default password is blank. None
New User Name
The new system User na me. The al lowed string l ength i s 0 to 31, an d only ASCII
New Password
The new system password. The allowed string length is 0 to 31, and only ASCII
Confirm New Password
Re-type the new password. None
None
None
3.1.4 Auth Method
A Delta Layer-3 Switch provides three authentication methods: Local, RADIUS, and TACACS+. If there is no RADIUS or
TACACS+ server in your network environment, you can use the local authentication method for the login authentication.
The management client for which the configuration below applies. Fixed
Authentication Method
Method can be set to one of the following values:
No: Authenti cation is disabled and login is not possible.
Local: A loc ally stored user ID and a password are used for the authentication.
This is the default setting. You need to set up a us er acc ount on the Local
User Management page.
RADIUS: The user ID and the password are authenticated through a RADIUS
server.
TACACS+: The user ID and the password are authenticated through a
Fallback
If there is not any confiugured authentication server consist, the local user
database is used for authentication.
Note:
This is only possible if the Authentication Method is set to a value
Local
None
3.1.5 IP Setting
You can configure a static IP address, a subnet mask and a default gateway for the switch. Or you can enable DHCP
mode for receiving a dynamic IP address, a subnet mask and a default gateway.
The default Current Network Configuration Protocol is None.
192.168.1.5.
IP Setting
Mode
Configure whether the IP stack should act as a host or a router. In Host mode, IP
traffic between interfaces will not be routed. In Router mode traffic is routed
3-8
Description Factory default
Router
Page 27
Chapter 3 Featured Functions
_3
blank if IPv6 operation on the interface is not desired.
address.
Description Factory default
IP Interface
You can configure the information of IPv4 and IPv6 in this section.
IPv4 DHCP configurations include:
Enable: check to enable IPv4 DHCP function.
Fallback: specifies the number of seconds for trying to obtain a DHCP lease.
Current Lease: For DHCP interfaces with an active lease, the column shows
the current interface address, as provided by the DHCP server.
IPv4 configurations include:
Address: shows the IPv4 address of the interface in dotted decimal notation. If
DHCP is enabled, this field is not used. The field may also be left blank if IPv4
operation on the interface is not desired.
Mask Length: the IPv4 network mask, in number of bits (prefix length). Valid
values are between 0 and 30 bits for a n IPv 4 addr e ss. If D HC P is ena ble d, this
field is not used. The field may also be left blank if IPv4 operation on the
interface is not desired.
IPv6 configurations include:
Address: shows the address of the interface. A IPv6 address is in 128-bit
records represented a s eight fields of up t o four hex adecimal digit s w ith a colon
separating each field (:). For example, fe80::21:cff:fe03:4dc7. The symbol :: is
a special syntax that can be used as a shorthand way of representing multiple
16-bit groups of contiguous zeros; but it can appear only once. It can also
represent a legally valid IPv4 address. For example: 192.1.2.34. The field may
be left blank if IPv6 operation on the interface is not desired.
Mask Length: the IPv6 network mask, in number of bits (prefix length). Valid
values are between 1 and 128 bits for a IPv6 address. The field may be left
Input the IP address of the IPv4 network interface.
Note:
After you change the IP address and clicking Apply, we suggest
you to login again, and making sure the URL is the latest IP
IP Routes
Delete: Select this option to delete an existing IP route.
Network: The destination IP network or host address of this route. Valid format
is dotted decimal notation or a valid IPv6 notation. A default route can use the
value 0.0.0.0 or IPv6 notation.
Mask Length: T he destinatio n IP netw ork or hos t mask, i n number of b it s (pref ix
length). It defines how much of a network address that must match, in order to
qualify for this route. Valid values are between 0 and 32 bits respectively 128
for IPv6 routes. Only a default route will have a mask length of 0 (as it will
match anything).
Gateway: The IP address of the IP gateway. Valid format is dotted decimal
notation or a valid IPv6 notation. Gateway and Network must be of the same
type.
Next Hop VLAN: The VLAN ID (VID) of the specific IPv6 interface associated
with the gateway. The given VID ranges from 1 to 4094 and will be effective
only when the corresponding IPv6 interface is valid. If the IPv6 gateway
address is link-local, it must specify the next hop VLAN for the gateway. If the
IPv6 gateway address is not link-local, system ignores the next hop VLAN for
the gateway.
Note:
If you select the daylight saving mode as “Disable”
Fixed
3.1.8 RIP
RIP (Routing Information Protocol) is one of the protocols which may be used by routers to exchange network topology
information. It is characterized as an “interior” gateway protocol, and is typically used in small to medium-sized networks.
A rout er running RIP sends the contents of i ts routing table to each of it s a dja cent routers every 30 seconds. When a route
is removed from the routing table it is flagged as unusable by the receiving routers after 180 seconds, and removed from
their tables after an additional 120 seconds. You can choose to enable or disable RIP in the section.
3.1.9 VRRP
A VRRP (Virtual Router Redundancy Protocol) is a computer networking protocol aimed to eliminate the single point of
failure by automatically assigning available IP routers to participating hosts. Using a virtual router ID (VRID) address and
virtual router IP (VRIP) address to repres ent itself, a virtual router consists of two or more physical routers, including one
master router and one or more backup routers. All routers in the virtual router group share the same VRID and VRIP. The
master router provides primary routing and the backup routers monitor the status of the master router and become active
if the master router fails.
VRRP Configuration
Description Factory default
VRRP Global
Mode : user can enable or disable VRRP Function.
VRRP Group
For each VRRP Group, we provide several options:
VRID: Virtual Router ID, from 1 to 254.
VLAN ID: input VLAN ID, from 1 to 4096.
Primary IP: Input Virtual IP.
Preempt Mode: Controls whether a (starting or restarting) higher-priority
Backup router preempts a lower-priority Master router. Values are True to
allow preemption and False to prohibit preemption.
Auth Type: user can setting NoAuth / Simple Text.
Auth Code: Enter the authorization code for the VRRP group.
VRRP State: show VRRP Master / Backup Status.
Virtual MAC: show Virtual MAC Address.
Note:
If you select the VRRP mode as “Disable”, the configurati on w ill also be
3.1.10 HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secur e co mm uni cat ion. I t ena bles t he t ra ns mis si on of HTTP
over an encrypted Secure Sockets L ay er (SS L) or Transport Layer Security (T LS ) co nne cti on. S o H T T P S can hel p protect
the communication between a computer and a switch from eavesdroppers and man-in-the-middle (MITM) attacks.
If you want to configure the swi tch to access an HTTPS connection from a computer, the switch needs a public ke y
certificate. You can configure the switch to generate a key or download it to the switch.
HTTPS Configuration
Mode
Specify whether the web management interface can be accessed from a web
browser over an HTTPS connection.
Disable: The web manage ment interfac e can not be acces sed over an HTTPS
connection. You need to use a Telnet, SSH, or console connection to access
the switch.
Enable: The web management interface can be accessed over an HTTPS
connection.
Note:
If you want to enable the HTTPS Admin mode, you need to use
Generate Key, then apply Generate Certi ficate, please refer to
After you enable the HTTPS connection, you can type https://Delta switch’s IP address into the web browser to
establish an HTTPS connection.
For example, if a switch’s IP address is 192.168.1.5, the complete address is https://192.168.1.5
You can configure an SSH configuration on this page.
SSH Configuration
Description Factory default
Mode
Specify the status of SSH.
Disable: SSH is disabled. This is the default setting.
Disable
3.1.12 LLDP
LLDP (Link Layer Discover Protocol) provides a method for switches, routers and access points to advertise their
identification, configuration and capabilities to the neighboring devices that store the data in a MIB, and to learn
information about the neighboring devices.
LLDP-MED (Link Layer Discovery Protocol for Media Endpoint Devices) is an extension of LLDP in that it operates
between endpoint devices such as IP phones or switches.
LLDP-Media Endpoint Discovery (LLDP-MED) is an enhancement of LLDP with the following features:
Auto Discovery: Autodiscove r y of LAN polic ie s (su ch a s VL A N, Lay er 2 priori t y, and DiffServ settings) and capability
to enable a plug and play networking
Device Location: Dev ice locat ion dis cover y for the creat ion of locat ion dat a bas es
Power Management: Extended and automated power management of Power over Ethernet (PoE) endpoints
Inventory Management: Inventory management, which lets network administrators track network devices and
determine their characteristics such as the manufacturer, the software and hardware versions, and the serial and
asset numbers
3.1.12.1 Configuration
This page allows the user to inspect and configure the current LLDP port settings.
LLDP Parameter
Tx Interval
Entering the transmit interval of LLDP message in seconds. The values are 5 to
3-14
Description Factory default
Disable
Page 33
Chapter 3 Featured Functions
_3
not take effect after you have applied them.
LLDP Port Configuration
The default of the LLDP status is enabling. If you want to configure other settings, please refer to the following table.
Description Factory default
Port
This field displays the interface number.
Mode
Specify the status of LLDP on the switch:
Enabled: LLDP is enabled. You can configure LLDP, and the settings take
effect after you have applied them.
Disabled: LLDP is disabled. You can still configure LLDP, but the settings do
3.1.12.2 LLDP Neighbours
You can view the LLDP neighbor statistics for an individual interface or all interfaces.
The fields can display the following information: Router, Bridge, Telephone,
Notice:
capability is disabled, the capability is followed by (-).
Management Address is the neighbor unit's address that is used for higher layer
hold the neighbor's IP address.
Item
Description
changed
Added
Deleted
Dropped
Aged Out
LLDP Neighbour Information
Item Description
Local Port
The interface on the switch that receives the LLDP information from the remote
Chassis ID The chassis ID of the remote neighbor.
Port ID The Port ID is the identification of the neighbor port.
Port Description Port Description is the port description adverti sed by the neighbor unit.
System Name System Name is the name advertised by the neighbor unit.
DOCSIS Cable Device, W LAN Access Point, Repeater, Station Only, Reserved or
System Capabilities
Other.
When a capability is enabled, the capability is followed by (+). If the
Management
Address
entities to assist the di scov er y by the network management. This could for instan ce
3.1.12.3 Port Statistics
You can view the LLDP neighbor statistics for an individual interface or all interfaces.
LLDP Global Counters: These statistics are total quantities of LLDP traffic for the switch.
Neighbour entries were last
Total Neighbours Entries
Total Neighbours Entries
Shows the time when the last entry was deleted or added.
Shows the number of new entries added since switch reboot
Shows the number of new entries deleted since switch reboot
Total Neighbours Entries
Total Neighbours Entries
Shows the number of LLDP frames dropped due to full entry table
Shows the number of entries deleted due to expired time-to-live
3-16
Page 35
Chapter 3 Featured Functions
_3
remote neighbor.
(Type Length Value). If a TLV is malformed, it will be counted and discarded.
incremented.
LLDP Statistics Local Counters: The statistics of the fields are for each individual interface.
Item Description
Local Port
Tx Frames
Rx Frames
Rx Errors
Framed Discarded
TLVs Discarded
TLVs Unrecognized
Org. Discarded
Age-Outs
The interface on the switch that receives the LLDP information from the
The number of LLDP frames transmitted on the port.
The number of LLDP frames received on the port
The number of received LLDP frames containing errors
If a port receives an LLDP frame, and the switch's internal table is full, the
LLDP frame will be counted and discarded.
Each LLDP frame containing multiple pieces of information, known as TLVs
The number of well-formed TLVs, but with an unknown type value.
The number of organizationally TLVs received
If no new LLDP frame is received during the age-out time, the LLDP
information will be removed, and the value of the age-out counter will be
3.1.13 NTP
NTP Configuration let s a user configure the time of the switch which can be gotten from the NTP server . And it also can be
configured manually.
can manually set the time. When an SNTP client is enabled, t he field is grayed out.
Note:
NTP Configuration
Specify whether the switch works as a SNTP client or a SNTP server.
Disable: The switch does not operat in NTP mode.
Client: The switch works as an SNTP client mode.
Server
The date parameter format is DD/MM/YYYY.
When an SNTP client is disabled, you can manually set the date. When an SNTP
client is enabled, the field is grayed out.
Disable
YYYY-MM-DD
The time parameter format is HH:MM:SS. When an SNTP client is disabled, you
HH:MM:SS
3.1.14 MODBUS TCP
The module status of MODBUS TCP is used to enable/disable the MODBUS TCP feature. If you need to set parameters,
please refer to Appendix B MODBUS TCP Map.
3.1.15 EtherNet/IP
The module status of EtherNet/IP is used to enable/disable the EtherNet/IP feature. If you need to set parameters, please
refer to Appendix C EtherNet/IP.
Since Ethernet/IP devi ce s can gener a te a lot of multicast traffic, users are recommended to enable
IGMP snooping to avoi d overloading.
3.1.16 Backup
The Delta switch supports uploading the configuration to a local host.
3-18
Page 37
Chapter 3 Featured Functions
_3
Enabled
Checked: The DHCP server is enabled.
Start IP Address
Enter the start IP address of the DHCP server pool.
192.168.1.100
3.1.17 Restore
The Delta switch supports downloading the configuration from a local host.
3.1.18 UpgradeFirmware
The Delta switch supports uploading the firmware from a local h ost to the Delta switch.
3.2 DHCP Server/Relay
The Delta switch can function as a DHCP se rver, DHCP relay and DHCP L2 relay. If there is no DHCP server in your
network, then you can enab le a DHCP server function on the Delta switch. If ther e is a DH CP server in your network, then
you can configure the Delta switch as a DHCP relay. If there is already a DHCP serv er and a DHCP relay in your netw ork,
or there are L2 devices between DHCP clients and relay agents, then you can configure the Delta switch as a DHCP L2
relay in this network.
3.2.1 Settings
If the DHCP server is ena ble d on the switch, it c an a ssi gn an IP address which is in the same network as the switch to the
client.
DHCP Server Configuration
Description Factory default
Specify the status of the DHCP server on the switch:
Specify the default gateway IP address. The information will be included in
Specify the DNS server IP address. The information will be included in the
Enter the duration by entering the seconds. 86400
Enter the TFTP s erver address. 0.0.0.0
Specify the boot file name. None
192.168.1.254
192.168.1.254
3.2.2 DHCP Dynamic Client List
If the DHCP server function is activated, you can see the DHCP client’s information which is ge t the IP add ress fr om the
DHCP server on this page.
3.2.3 DHCP Client List
A Delta sw itch sup ports the specific IP address which is in the assigned dynamic IP range to the specific port.
If you select a dynamic client from the DHCP Dynamic Client List to add to static Table, then it will appear in the DHCP
Client List.
3.2.4 DHCP Relay Agent
A DHCP Relay can make broadcast mes sag es to be sent over router s. And a DHCP relay can receive a DHCP broadcast
3-20
Page 39
Chapter 3 Featured Functions
_3
Notice:
client can ping the server after getting an IP address.
Relay Mode
Enable: The DHCP relay is enabled.
Relay Server
Specify the DHCP relay server IP address.
0.0.0.0
Relay Information Mode
Enable: Disable DHCP relay information mode operation.
information is received.
request packet and forward it to a specified server. The operating theory is shown in the figure below.
When a DHCP request packet comes, the DHCP relay receives it and then sends it to all VLANs.
But according to RFC 2131, w hen a unicast DHCP request packet renew s, it will be sent to a DHCP
server directly without passing a DHCP relay, s o it is recommended to make sure that the DHCP
3.2.4.1 Relay
The DHCP relay sends a unicast DHCP packet to the specified server(s). You can enable or disable a DHCP relay
function, and configure the parameters on the switch.
DHCP Relay Configuration
Specify the status of the DHCP relay on the switch:
Disable: The DHCP relay is disabled. This is the default setting.
Specify the DHCP relay information mode option operation.
Disable: Enable DHCP relay information mode operation.
Relay Information Policy
Specify the DHCP relay information option policy.
Replace: Replace the original relay information when a DHCP message that
already contains it is received.
Keep: Keep the original relay i nform atio n when a DHCP message that already
contains it is received.
Drop: Drop the package when a DHCP message that already contains relay
The number of packets received with the Circuit ID option missing.
circuit ID.
known Remote ID.
option.
agent information.
3.2.4.2 Relay Statistics
Server Statistics
Transmit to Server
Transmit Error
Receive Missing Agent Option
Receive Missing Remote ID
Receive Bad Circuit ID
Receive Bad Remote ID
Client Statistics
Item Description
The number of packets that are relayed from client to server.
The number of packets that resulted in errors while being sent to
clients.
The number of packets received without agent information options.
The number of packets received with the Remote ID option missing.
The number of packets whose Circuit ID option did not match known
The number of packets whose Remote ID option did not match
Transmit to Client
Transmit Error
Receive from Client
Receive Agent Option
Replace Agent Option
Keep Agent Option
Drop Agent Option
The number of relayed packets from server to client.
The number of packets that resulted in error while being sent to servers.
The number of received packets from server.
The number of received packets with relay agent information option.
The number of packets which were replaced with relay agent information
The number of packets whose relay agent information was retained.
The number of packet s that were dropped w hich w ere rec eive d with r elay
3.3 Port Setting
You can configure the bas ic po rt setting s a nd LAG settings of a Delta switch in the Port Settings group .
3.3.1 Port Control
You can configure and monitor the port status on this page.
3-22
Page 41
Chapter 3 Featured Functions
_3
Red: No network device is connecting to the interface.
Configured
Description Factory default
Port
This field displays the interface number.
Link
This field displays the connecti on of the interf ac e graphically.
Green: There is a network device connecting to the interface.
Speed
This field displays the actual port speed capability and configured the port
capability.
Current: This field displays the actual port speed and the duplex mode.
Configured: Specify the speed capability of each interface.
Note:
1. When you configure the Port "*" to Auto, 100 Mbps HDX, 100
Mbps FDX and 1G Mbps FDX, it meaning configure to all interface
the same speed.
2. If you select the “Disable”, it will disable the switch port
operation.
Flow Control
This field displays whether the flow control is enabled for the port:
Current Rx: Indicates whether pause frames on the port are obeyed.
Current Tx: Indicates whether pause frames on the port are transmitted.
Restart: Restart backoff algorithm after 16 collisions.
difference ports.
Description Factory default
Maximum Frame
The field displays whether the maximum frame is configured for the port. The
Excessive Collision Mode
Configure port transmit collision behavior.
Discard: Discard frame after 16 collisions (default).
10056
Discard
3.3.2 Port Alias
You can create an alias on a physical interface. It will help you to manage the network topology more easily.
Port
This field displays the interface number.
Port Alias
Specify an alias for the port to help administrator differentiate between
3-24
Description Factory default
interface number
None
Page 43
Chapter 3 Featured Functions
_3
Unchecked: Disabled the use of the Source MAC address.
Unchecked: Disabled the use of the Destination MAC address.
Unchecked
3.3.3Port Trunk
Port Trunking can help you aggregate more links to form on e li nk gr o up. If there are 4 ports in a trunk group, and one port
fails, then the other seven ports will provide backups and share the traffic automatically. If all ports on these two switches
are configured as 100BaseTX and full duplex, then the potential bandwidth of the connection can be 400Mbps.The
function theory is shown in the figure below.
3.3.3.1 Configuration
Aggregation Mode Configuration
Source MAC Address
Specify the Source MAC Address to calculate the source port for the frame.
Checked: Enabled the use of the Source MAC address.
Destination MAC Address
Specify the Source MAC Address to calculate the destination port for the frame.
Checked: Enabled the use of the Destination MAC address.
IP Address
Specify the IP Address to calculate the destination port for the frame.
Specify the T CP/U DP port number t o calc ulate the de stinati on port for the f rame.
Checked: Enabled the use of the TCP/UDP port number.
Aggregation Group Configuration
: Disabled the use of the TCP/UDP port number.
Checked
Description Factory default
Group ID
This field displays the group ID number. The Group ID "Normal" indicates there
is no aggregation. Only one group ID is valid per port.
Port Members
Select one or more interfaces by clicking the square. Normal
3.3.3.2 LACP Configuration
Link aggregation group s (LAG s) let y ou co mbine m ultiple full-duplex Ethernet links into a single logical link. LAG increases
fault tolerance and provide traffic sharing. You can assign LAG VLAN membership after you have added interfaces as
members of a LAG.
After you have added interfaces to a LAG and enabled the LAG, Link Aggregation Control Protocol (LACP) can
automatically configure a port channel link between the switch and another device.
Group number
3-26
Page 45
Chapter 3 Featured Functions
_3
Passive: It will wait for a LACP packet from a partner (speak if spoken to).
LACP Port Configuration
Description Factory default
Port
This field displays the interface number.
LACP Enabled
Specify whether the static mode of the LAG ID is enabled. Unchecked
Key
Specify whether the key of the LACP mode.
Auto: Enabled the key as appropriate by the physical link speed, 10Mb = 1,
100Mb = 2, 1Gb = 3
Specific: User-defined value can be entered.
Role
Specify the role of the LACP activity status.
Active: It will transmit LACP packets in per second
is shown as 'isid:aggr-id' and for GLAGs as 'aggr-id'
format is: "Switch ID:Port".
3.3.3.3 System Status
The System Status is displayed on this page.
Item Description
Aggr ID
The Aggregation ID associated with this aggregation instance. For LLAG the id
Partner System ID
Partner Key
Last Changed
Local Ports
The system ID (MAC address) of the aggregation partner.
The Key that the partner has assigned to this aggregation ID.
The time since this aggregation changed.
Shows which ports are a part of this aggregation for this switch/stack. The
3.3.3.4 Port Status
The Port Status is displayed on this page.
Item Description
Port
LACP
Key
3-28
This field displays the interface number.
The system ID (MAC address) of the aggregation partner.
The Key that the partner has assigned to this aggregation ID.
Page 47
_3
Item Description
format is: "Switch ID:Port".
discarded at each port.
Notice:
same time because the operating theory of these two functions are conflict.
Chapter 3 Featured Functions
Aggr ID
Partner System ID
Partner Port
The time since this aggregation changed.
Shows which ports are a part of this aggregation for this switch/stack. The
The partner port number connected to this port.
3.3.3.5 Port Statistics
The Port Statistics is displayed on this page.
Item Description
Port
LACP Received
LACP Transmitted
Discarded
This field displays the interface number.
This field displays how many LACP frames have been received at each port.
This field displays how many LACP frames have been sent from each port.
This field displays how many unknown or illegal LACP frames have been
3.3.4 Loopback-Detection
A loopback error occurs when the keep-alive packet is looped back to the port that sent the keep-alive packet.A Delta
managed switch provide the Loopback-Detection function to detect the error in the network environment.
We suggest that the Loopback-Detection function and redundancy protocol should not enable at the
Global Configuration
The module status of Loopback- Detection Global Configuration is used to enable/disable the Loopback-Detection
feature.
Description Factory default
Enable Loopback-Detection
Specify whether the status in global configuration is activated or not. Disable
Transmission Time
The interval between each loop protection PDU sent on each port v alid valu es
Shutdown Time
The period (in seconds) for which a port will be kept disabled in the event of a
loop is detected (and the port action shuts down the port). Valid values are 0 to
604800 seconds (7 days). A value of zero will keep a port disabled (until next
5
180
Port Configuration
The parameters of Loopback-Detection should be set for each port.
If you need to configure Loopback-Detection Port Configuration, y ou mu st enab le the Loop bac k-Detection
Global mode.
3-30
Page 49
Chapter 3 Featured Functions
_3
Log Only
it is just passively looking for looped PDUs.
Description Factory default
Port
The interface number.
Enable
Enable/Disable the Loopback-Detection feature on the port. Checked
Action
Configures the action to take when a loop is detected. Valid values include:
Shutdown Port
Shutdown Port and Log
Tx Mode
Specify whether the port is acti v ely generating loop protection P DU s, or whether
3.3.4.2 Status
The Loopback-Detection Status is displayed on this page.
In some network environments, users need to set up redundant loops in the network to provide a backup path for
disconnection or a network device breakdown. But if there are many network devices in the network, then each host
needs to spend more time and cross many network devices to associate with each other. And sometimes the
disconnection happens in a busy network, so the network must recover in a short time. Setting up redundancy on your
network helps protect critical links against failure, protects against network loops, and keeps network downtime at a
minimum. For example, if the Delta switch is used as a key communication component of a production line, several
minutes of downtime may cause a big loss in production and revenue.
3.4.1 Redundancy Ring
The Redundany Ring topology consists of nodes having two ports participating in Redundancy Ring.
It can reduce unexpected damage caused by network topology change. It supports three of ring topology: Ring, Coupling
Ring and Dual Homing.
Description Factory default
Redundancy Ring
Specify whether the Redundancy Ring mode is enabled or not. Unchecked
Ring Master
The master node manages the ring network, and there can only be one master
node in a ring network.
1st Ring Port
On the master node, it is the primary port. Port1
2nd Ring Port
On the master node, it is the backup port. Port2
Coupling Ring
Specify whether the Coupling Ring mode is enabled or not. Disable
Coupling Port
Select the specific port as a Coupling Port. Port1
Dual Homing
Specify whether the Dual Homing mode is enabled or not. Disable
Disable
Homing Port
Select the specific port as a Homing Port. Port1
3-32
Page 51
Chapter 3 Featured Functions
_3
Notice:
due to heavy load.
Unchecked: The interface is not an edge port.
We don’t suggest you to set one switch as a Ring Master and a Coupling Ring at the same time
3.4.2 Redundancy Chain
The Redundany Chain topology consists of nodes having two ports participating in Redundancy Chain.
It can reduce unexpected damage caused by network topology change, and allows multiple redundant network rings of
different redundancy protocols to join and function as a larger and more robust compound network topology.
Description Factory default
Enable
Specify whether the Redundancy Chain mode is enabled or not. Unchecked
Uplink Port
Specify the priority of the specific port as an Uplink Port. Port1
Edge Port
The edge port status of the interface:
Checked: The interface is an edge port.
Unchecked
3.4.3 MSTP
Multiple Spanning Tree Protocol (MSTP) is an extension protocol of RSTP. It can provide an independent spanning tree
for different VLANs. MSTP builds a separate Multiple Spanning Tree (MST) for each instance. And MST Region may
include multiple MSTP instances. The operating theory is shown in the figure below.
This page allows you to configure RSTP s ystem settings. The settings are used by all RSTP Bridge instances in the
Switch Stack.
3-34
Page 53
_3
Basic Settings
MSTP: Multiple Spanning Tree Protocol.
seconds.
(FwdDelay-1)*2.
seconds, and MaxAge must be <= (FwdDelay-1)*2.
10 BPDU's per second.
Protocol Version
Specify the version of the STP protocol:
STP: Sp anning Tree Protocol.
RSTP: Rapid Spanning Tree Protocol.
Bridge Priority
Controls the bridge priority. Lower numeric values have better priority. The
bridge priority plus the MSTI instance number, concatenated with the 6-byte
MAC address of the switch forms a Bridge Identifier.
For MSTP operation, t hi s is t h e priority of the CIST. Otherwise, this is the priority
of the STP/RSTP bridge.
Forward Delay
The delay used by STP bridges to transit root and designated ports to
forwarding (used in STP compatible mode). The range of valid values is 4 to 30
Chapter 3 Featured Functions
Description Factory default
MSTP
32768
15
Max Age
The maximum time the information transmitted by the root bridge is considered
valid. The range of valid values is 6 to 40 seconds, and Max Age must be <=
Maximum Hop Count
This defines the initial value of remaining hops for MSTI information generated
at the boundary of an MSTI region. It defines how many bridges a root bridge
can distribute its BPDU information to. The range of valid values is 4 to 30
Transmit Hold Count
The number of BPDU's a bridge port can send per second. W hen exceeded,
transmission of the n ext BPDU will be delayed. Valid values are in the range 1 to
20
20
6
3.4.3.2 MSTI Mapping
This page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change
them as well.
MSTI The Bridge Instance. This is also a link to the STP Detailed Bridge Status.
Bridge ID The Bridge ID of this Bridge instance.
Root ID The Bridge ID of the currently elected root bridge.
Root Port The switch port currently assigned the root port role.
Root Cost
Topology Flag The current state of the Topology Change Flag for this Bridge instance.
Topology Change Last The time since last Topology Change occurred.
Root Path Cost. For the Root Bridge this is zero. For all other Bridges, it is the
3.4.3.7Port Status
Item Description
Port
CIST Role
CIST State
Uptime
This field shows the interface number.
The current STP port rol e of the CIST port. The port role can be one of the following
The current STP port state of the CIST port. The port state can be one of the
following values: Blocking Learning Forwarding.
The time since the bridge port was last initialized.
This field shows the interface number.
This field shows the number of MSTP/RSTP/STP/TCN configuration BPDU’s
transmitted on the port.
This field shows the number of MSTP/RSTP/STP/TCN configuration BPDU’s
received on the port.
The number of unknow n/illegal Sp anni ng Tree BPDU's received (and dis carde d)
3.4.4 Fast Recovery
The Fast Recovery Mode can be set to connect multiple ports to one or more switches. The DVS Layer 3 switch with its
fast recovery mode will provide redundant links.
Fast Recovery mode supports 28 priorities, only the first priority will be the act port, the other ports configured with other
priority will be the backup ports.
3-42
Page 61
Chapter 3 Featured Functions
_3
Note:
untagged port of VLAN 1 (the default VLAN).
3.5 Virtual LANs
Virtual LAN (VLAN) is a logical group network. VLANs electronically separate interfaces on the same switch into different
broadcast domains so that broadcast packets are not sent to all the interfaces on a single switch. VLAN allows the switch
manager to isolate network traffic so that only members of the VLAN can receive traffic from the same VLAN members.
VLAN also allows a user to access the network from a different place or switch. So VLAN provide security and flexibility.
For example: Configure department A, B, C to VLAN 1, 2, 3. Users can only access the resource which belongs to their
department, so the resource in their department can be protected. And they can access the resource in a different floor,
even though in a different place. So they do not need to st ay in a fixed place to access the resource which be lon gs to t heir
department.
3.5.1 VLAN Membership
VLAN Membership is used to define VLAN gr oup s and the VLAN infor mat ion will be stored in the VLAN membership t a ble .
A Delta Layer 3 sw itch su pport s up t o 64 VLANs. VLAN 1 is the default VLAN, and all interf ace s are unt agg ed member s by
the default setting.
If you need to access the switch via the port, we suggest that you make sure that the port you use is the
Description Factory default
Delete
Check to delete the entry. It will be deleted during the next save
Enter the identifier for the new VLAN. The range can be set in the range of 1 to
VLAN Name
Enter a name for the VLA N. The name can be up to 32 alphanumeric ch arac t ers
Port Members
If the interface is not a member of VLAN, the square must keep blank. The port
currently is not the static member of the VLAN, but it can be added dynamically
Add New VLAN
Enter the identifier and a name for the VLAN, and the range of VLAN ID is from 1 to 4095. You can add and configure all
interfaces as members to the specific VLAN
1
None
Checked
3.5.2 Ports
Ethertype for Custom S-ports
Description Factory default
Entertype for Custom S-ports
Specify the ether type used for C ustom S-port s. T his is a glob al sett ing for all t he
Custom S-ports.
Ports Configuration
Ports Configuration i s used to defined all interface with three difference type:
Unware: It can be used for 802.1 QinQ, and the TPID of frame will be set to 0x8100.
C-port: The TPID of frame will be set to 0x8100.
S-port: The TPID of frame will be set to 0x88A8
S-custom-port: The TPID of received frame will be set to 0x88A8, and the transceived frame will be set to a
customize value which from the Ethertype for Custom S-port.
0x88A8
3-44
Page 63
Chapter 3 Featured Functions
_3
S-custom-port: Custom Service port.
forwarded.
Description Factory default
Port
This field displays the interface number or port channel number
Port Typa
Specify the interface type:
Unware: All frames are classified to the Port VLAN ID and tags are not
removed.
C-port: Customer Port
S-port: Service Port
Ingress Filtering
Specify whether the ingress filtering is applied:
Checked: The ingress filtering is enabled for the interface.
Unchecked: The ingress filtering is disabled for the interface. All frames are
Specify whether the port accepts all frames or only tagged/untagged frames.
All: The port accepts all frames.
Tagged: The port only accepts tagged frame, and the untagged will be
discarded.
Port VLAN_Mode
Specify the mode of the interface.
None: This mode is normally used for p orts connected to VLAN aware switches.
Tx tag should be set to Untag_pvid when this mode is used.
Specific: If Specific (the default value) is selected, a Port VLAN ID can be
Port VLAN_ID
Specify the the VLAN identifier for the port.
Note:
If you want to change the default PVID of an interface, create
All
Specific
1
Tx Tag
Specify the egress tagging rule of a port.
Untag_pvid: All VLANs except the configured PVID will be tagged.
Tag_all: All VLANs are tagged.
All VLANs are untagged.
Untag_pvid
3.5.3 Private VLAN
The Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be
added or deleted here. Port members of each Private VLAN can be added or removed here. Private VLANs are based on
the source port mask, and there are no connections to VLANs. This means that VLAN IDs and Private VLAN IDs can be
identical.
A port mu st be a me mber of bo th a VLAN and a Privat e VLAN to be able t o forw ard pa cket s. B y default, a ll por ts ar e VLAN
unaware and members of VLAN 1 and Private VLAN 1.
A VLAN unaware port can only be a member of one VLAN, but it can be a member of multiple Private VLANs.
3.5.3.1PVLAN Membership
Delete
Check to delete the entry. It will be deleted during the next save. Unchecked
PVLAN ID
Enter the identifier for the new Private VLAN 1
3-46
Description Factory default
Page 65
Chapter 3 Featured Functions
_3
by other protocols, for example by GVRP.
Unchecked: The interface is disabled.
hundredth of a second.
hundredth of a second.
Description Factory default
Port Members
If the interface is not a member of VLAN, the square must keep blank. The port
currently is not the static member of the VLAN, but it can be added dynamically
Add New Private VLAN
Enter the identifier and a name for the Private VLAN, and the range is from 1 to 4095. You can add and configure all
interfaces as members to the specific Private VLAN.
Checked
3.5.3.2Port Isolation
Description Factory default
Port Number
Specify whether the interface is enabled or not.
Checked: The interface is enabled.
Unchecked
3.5.4 GVRP Config
GVRP is a GARP appli cati on that provides IEEE 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1 Q
trunk ports. With GVRP, the switch can exchange VLAN configuration information with other GVRP switches, prune
unnecessary broadcast and unk nown unicast traffic, and dynamically create and manage VLANs on switches connected
through 802.1Q trunk ports.
Description Factory default
GVRP
User can enable / disable GVRP Function None
Join-time
The valu e in the range 1-20 in the units of centi seconds, i.e. in units of one
20
Leave-time
The value in the range 60-300 in the units of centi seconds, i.e. in units of one
LeaveAll-time
The value in the range 1000-5000 in the units of centi seconds, i.e. in units of
SNMP v3: Uses SNMPv3 to send traps to the trap community.
126.
126.
Change of the Engine ID will clear all original local users.
Description Factory default
Max Number of VLANs
When GVRP is enabled a maximum number of VLANs supported by GVRP is
specified. By default this number is 20. This number can only be changed when
20
3.6 SNMP
Simple Network Management Protocol (SNMP) is an application protocol used for exchanging management information
between network devices. SNMP is a member of the TCP/IP protocol suite. SNMP V1, V2 and V3 are supported on the
Delta switch, and it is enabled by default.
A Delta switch supports standard public MIBs for standard functionality and private MIBs that provide additional
functionality. You can use SNMP to enable or disable authentication traps, cold-start and warm-start functionality traps,
link up and link down traps, Spanning Tree Protoc ol (STP) traps, SFP traps, and password and IP address change traps.
3.6.1 System
System Configuration
Description Factory default
Mode
Specify whether the SNMP mode is enabled or not.
Enabled: SNMP is enabled.
Version
Specify the SNMP version that is used for the trap community:
SNMP v1: Uses SNMPv1 to send traps to the trap community.
SNMP v2c: Uses SNMPv2c to send traps to the trap community.
Read Community
Entering the community read access string to permit access to SNMP agent.
The string length is 0 to 255, and the content is the ASCII characters from 33 to
Write Commnunity
Entering the community read access string to permit access to SNMP agent.
The string length is 0 to 255, and the content is the ASCII characters from 33 to
Engine ID
Entering the SNMPv3 engine ID. The string must contain an even number
between 10 and 64 hexadeci m al dig its, but all-zeros and all-'F's are not allowed.
Enabled
SNMP v2c
public
private
Fixed
3-48
Page 67
Chapter 3 Featured Functions
_3
Disabled: Trap mode is disabled.
SNMP v3: Uses SNMPv3 to send traps to the trap community.
126.
well-known port for SNMP traps is 162 (default).
version to SNMPv2c.
3.6.2 Trap
Trap Configuration
If network engineers need to get information from an SNMP agent (network device), they usually use the SNMP software
to poll information and get a response from an agent. But the SNMP Trap is the unsolicited trap which sends from the
agent to the NMS (Network Management System).The operating theory is shown in the figure below.
Description Factory default
Trap Mode
Specify whether the Trap mode is enabled or not.
Enabled: Trap mode is enabled.
Disabled
Trap Version
Specify the SNMP Trap version that is used for the trap community.
SNMP v1: Uses SNMPv1 to send traps to the trap community.
SNMP v2c: Uses SNMPv2c to send traps to the trap community.
SNMP v1
Trap Community
Specify the community access string when send SNMP trap packet. The allowed
string length is 0 to 255, and the allowed content is the ASCII characters from 33 to
public
Trap Destination Address
Entering the SNMP trap destination address in IPv6 format.None
Trap Destination Port
This is the SNMP Trap destination port used by the SNMP Trap option for event
notification. You can optionally change the IP port on which to send the SNMP trap,
this must be the actual port on which the SNMP trap host listens. The typical,
162
Trap Inform Mode
Specify whether the Trap Link-up and Link-down is enabled or not.
Entering the Trap Inform Timeout. The range is 0 to 2147.
Note:
It’s only be activated the configuration when you select the Trap
Trap Inform Retry Times
Entering the Trap Inform Retry Times. The range is 0 to 255.
Note:
It’s only be activated the configuration when you select the Trap
Trap Probe Security Engine ID
Indicates the SNMP trap probe security engine ID mod e of o perati on.
Possible values are:
Enabled: Enable SNMP trap probe security engine ID mode of operation.
Disabled: Disable SNMP trap probe security engine ID mode of operation.
When is enabled, the ID will be probed automatically. Otherwise, the ID specified in
this field is used.
Note:
It’s only be activated the configuration when you select the Trap
3
5
Enabled
Trap Security Engine ID
Indicates the SNMP trap security engine ID. SNMPv3 sends traps and informs use
USM for authentication and privacy. A unique engine ID for these traps and informs
is needed. When "Trap Probe Securi t y
Engine ID" is enabled, the ID will be probed automatically. Otherwise, the ID
specified in this field is used. The string must contain an even number (in
hexadecimal format) wi th number of digits between 10 and 64, but all-zeros and
all-'F's are not allowed.
Note:
It’s only be activated the configuration when you select the Trap
Trap Security Name
Indicates the SNMP trap security name. SNMPv3 traps and informs using USM for
authentication and privacy. A unique security name is needed when traps and
informs are enabled.
Note:
It’s only be activated the configuration when you select the Trap
3.6.3 Communities
Configure SNMPv3 communities table on this page. The entry index key is Community.
None
None
Click “ Add New Entry” to add a new communities.
3-50
Page 69
Chapter 3 Featured Functions
_3
from 33 to 126.
the Engine ID will clear all original local users.
126.
protocol.
Description Factory default
Delete
Check to delete the entry. It will be deleted during the next save. Unchecked
Community
Entering the community access string to permit access to SNMPv3 agent. The
allowed string length is 1 to 32, and the allowed content is the ASCII characters
Source IP
Entering the SNMP access source address. 0.0.0.0
Source Mask
Entering the SNMP access source address mask. 0.0.0.0
3.6.4 Users
Configure SNMPv3 users table on this page. The entry index keys are Engine ID and User Name.
None
Description Factory default
Delete
Check to delete the entry. It will be deleted during the next save. Unchecked
Engine ID
Entering the SNMPv3 engine ID. The string must contain an even number between
10 and 64 hexadecimal digits, but all-zeros and all-'F's are not allowed. Change of
User Name
A string identifying the user name that this entry should belong to. The allowed
string length is 1 to 32, and the allowed content is the ASCII characters from 33 to
Security Level
Specify the security level that this entry should belong to.
NoAuth, NoPriv: None authenticat ion and non e priva cy.
Auth, NoPriv: Authentication and none privacy.
Auth, Priv: Authe nti cati on and pr ivacy.
Note:
The value of security level cannot be modified if entry already exists.
Authentication Protocol
Specify the authentication protocol.
None: None authentication protocol
MD5: An optional flag to indicate that this user is using MD5 authentication
protocol.
SHA: An optional flag to indicate that this user is using SHA authentication
The value of security level cannot be modified if entry already exists.
DES: An optional flag to indicate that this user using DES authentication protocol.
33 to 126.
usm: User-based Security Model (USM).
from 33 to 126.
Description Factory default
Note:
Authentication Password
Entering the password for new entry authentication protocol with ASCII character,
and the length is 33 to 126. The MD5 Protocol is 8 to 32, and the SHA protocol is 8
to 40.
Privacy Protocol
Specify the privacy protocol.
None: None privacy protocol.
Privacy Password
Entering the password for Privacy protocol with ASCII character, and the length is
3.6.5 Groups
None
None
None
Delete
Check to delete the entry. It will be deleted during the next save. Unchecked
Security Model
Specify the security model.
v1: Reserved for SNMPv1.
v2c: Reserved for SNMPv2c.
Security Name
A string identifying the security name that this entry should belong to. The
allowed string length is 1 to 32, and the allowed content is the ASCII characters
Group Name
A string identifying the group name that this entry should belong to. The allowed
string length is 1 to 32, and the allowed content is the ASCII characters from 33
to 126.
3.6.6Views
Description Factory default
v1
None
None
Configure SNMPv3 views table on this page. The entry index keys are View Name and OID Subtree.
3-52
Page 71
Chapter 3 Featured Functions
_3
to 126.
view entry.
asterisk(*).
in “Groups” configuration.
usm: User-based Security Model (USM).
Auth, Priv: Authent i cati on and priv acy.
Description Factory default
Delete
Check to delete the entry. It will be deleted during the next save. Unchecked
View Name
A string identifying the view name that this entry should belong to. The allowed
string length is 1 to 32, and the allowed content is the ASCII characters from 33
View Type
Specify the view type that this entry should belong to.
included: An optional flag to indicate that this view subtree should be included.
excluded: An optional flag to indicate that this view subtree should be
excluded.
General, if a view entry's view type is 'excluded', it should be exist another view
entry which view type is 'included' and it's OID subtree overstep the 'excluded'
OID Subtree
The OID defining the root of the subtree to add to the named view. The allowed
OID length is 1 to 128. The allowed string content is digital number or
None
None
None
3.6.7 Access
Configure SNMPv3 accesses table on this page. The entry index keys are Group Name, Security Model and Security
Level.
Description Factory default
Delete
Check to delete the entry. It will be deleted during the next save. Unchecked
Group Name
Specify the group name.
Note:
If you want to add another group name, you could add the name
Security Model
Specify the security model.
any: Accepted any security model .
v1: Reserved for SNMPv1.
v2c: Reserved for SNMPv2c.
Security Level
Specify the security level that this entry should belong to.
NoAuth, NoPriv: None authenticat ion and non e priva cy.
Auth, NoPriv: Authentication and none privacy.
allowed content is the ASCII characters from 33 to 126.
Description Factory default
Note:
The value of security level cannot be modified if entry already
Read View Name
The name of the MIB view which defining the MIB objects for which this request
may request the current values. The allowed string length is 1 to 32, and the
allowed content is the ASCII characters from 33 to 126.
Write View Name
The name of the MIB view which defining the MIB objects for which this request
may potentially SET new values. The allowed string length is 1 to 32, and the
None
None
3.7 Traffic Prioritization
The traffic priorit ization allows you to make sure that the time-sensitive and system-critical dat a can be tran sferr ed w ith the
minimal delay. It uses four queues that are present in UI from the high prior it y to the low priority.
A Delta switch supports the DSCP trust mode, the 802.1p trust mode, the queue scheduling (Support Weighted Round
Robin and Strict-Priority) and 4 level priority queues. The traffic prioritization depends on 2 methods:
IEEE 802.1P: a layer 2 marking scheme.
Differentiated Services (DiffServ): a layer 3 marking scheme.
3.7.1 Storm Control
A traffic storm occurs when incoming packets flood the LAN, which causes the decreasing of the network performance.
The storm control can prevent flood ing p acket s from affecting the network performance. A Delta L ay er 3 switch allows you
to configure both storm control for each interface and rate limiting of each interface for incoming and outgoing traffic.
3-54
Page 73
Chapter 3 Featured Functions
_3
broadcast or unknown.
Unchecked: Disable the storm control of the frame type.
The 1 kpps is actually 1002.1 pps.
Description Factory default
Frame Type
The settings in a particular row apply to the frame type listed here: unicast,
Enable
Specify whether the frame type is enabled or not.
Checked: Enable the storm control of the frame type.
Rate
The rate unit is packet per second (pps), configure the rate as 1K, 2K, 4K, 8K,
16K, 32K, 64K, 128K, 256K, 512K, or 1024K.
Fixed
Unchecked
1K
3.7.2 Port Classfication
Quality of Service (QoS) provides a traffic prioritization for you to alleviate the congestion problem, and ensure that
high-priority traffi c is deliv ered first. If the ban dw idth of the net w ork is limited, y ou can us e QoS to sch edule the pr iority of a
different service packet flow.
The classified DP level can be overruled by a QCL entry.
PCP value in the tag. Otherwise the frame is classified to the default PCP value
DEI value in the tag. Otherwise the frame is classified to the default DEI value.
Description Factory default
Port
The interface number.
QoS class
Specify the default QoS class.
PCP value: 0 1 2 3 4 5 6 7
1 0 2 3 4 5 6 7
DP level
Specif the default Drop Precedence Level. All frames are classified to a DP level.
If the port is VLAN aware and the frame is tagged, then the frame is classified to a
DP level that is equal t o the D EI value in th e t ag. Otherw ise t he frame is classi fied to
the default DP level.
If the port is VLAN aware, the frame is tagged and Tag Class is enabled, then the
frame is classified to a DP level that is mapped from the PCP and DEI value in the
tag. Otherwise the frame is classified to the default DP level.
PCP
Specify the default PCP value. All fram es are classified to a PCP value.
If the port is VLAN aw ar e and t he fr a me i s tagged, then the frame is classified to th e
DEI
Specify the default DEI value. All frames are classified to a DEI value.
If the port is VLAN aw ar e and t he fr a me i s tagged, then the frame is classified to th e
interface number
0
0
0
0
Tag Class
Specify the classification mode for tagged frames on this port.
Disabled: Use default QoS class and DP level for tagged frames.
Unchecked: Use default QoS class and DP level for tagged frames.
Checked: Use mapped versions of PCP and DEI for tagged frames.
interface number
Note:
This setting has no effect if the port is VLAN unaware. Tagged frames
received on VLAN unaware ports are always classified to the default
QoS class and DP level.
DSCP Based
Click to enable DSCP Based QoS Ingress Port Classification Unchecked
3-56
Page 75
_3
3.7.3 Po rt Tag Remarking
Mapped: Use mapped versions of QoS class and DP level.
Chapter 3 Featured Functions
Item Description
Port
Mode
The interface number.
The field displays the tag remarking mode for this port.
Classified: Use classified PCP/DEI values.
Default: Use default PCP/DEI values.
Specify whether the Ingress Translation is enabled or not.
Checked: Enabled the Translate function.
Ingress_Classify
Specify the Ingress classify function is enabled or not.
Disable: No Ingress DSCP Classification.
DSCP=0: Classify if incoming (or translated if enabled) DSCP is 0.
Selected: Classify only selected DSCP for which classification is enabled as
specified in DSCP Translation window for the specific DSCP.
Egress_Rewrite
Specify the Engress rewrite function is enabled or not.
Disable: No Engress rewrite.
Enable: Rewrite enabled without remapping.
Remap DP Unaware: The remapped DSCP value is always taken from the 'DSCP
Translation->Egress Remap DP0' table.
Remap DP Aware: the remapped DSCP value is either taken from the 'DSCP
Translation->Egress Remap DP0' table or from the 'DSCP Translation->Egress
interface number
Unchecked
Disable
Disable
3-58
Page 77
_3
3.7.5 Port Policing
Unchecked: Disablede the QoS ingress port policer.
default value is "kbps".
switch does not send pause packets.
Chapter 3 Featured Functions
Description Factory default
Port
The interface number
Enabled
Specify whether the QoS ingress port policer is enabled or no t.
Checked: Enabled the QoS ingress port policer.
Rate
Specify the rate of the QoS ingress port policer. This value is restricted to
100-1000000 when the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when
the "Unit" is "Mbps" or "kfps".
Unit
Specify the unit of measure for the policer rate as kbps, Mbps, fps or kfps . The
Flow Control
This field displays whether the flow control is enabled for the port:
Checked: The flow control is enabled. If the port buffers become full, the switch
sends pause packets.
Unchecked: The flow control is disabled. If the port buffers become full, the
It must be enabled the Queue number first, and then you could configure this feature.
Description Factory default
Port
The interface number
Queue_0-7
The Queue policer number.
Enable
Specify whether the Queue policer is enab led or not. Unchecked
E
Specify whether the interface is participates in the specific Queue policer or not. kbps
Rate
Specify the rate of the QoS ingress port policer. This value is restricted to
100-1000000 when the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when
Unit
Specify the unit of measure for the policer rate as kbps, Mbps, fps or kfps . The
interface number
Queue number
500
kbps
3-60
Page 79
Chapter 3 Featured Functions
_3
3.7.7 Port Scheduler
This feature allows you to c onfigure the Scheduler and Shapers for the specific port.
Item Description
Port
Mode
If you click on the port number, it will display the information of the specific port scheduler and shapers.
And you could also configure the scheduler mode here.
The interface number.
The field displays the scheduler mode for this port.
the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when the "Unit" is
Scheduler Mode: Strict Priority
Description Factory default
Scheduler Mode
Specify whether the scheduler mode is "Strict Priority" or "Weighted" on this
QueueShaper_Enable
Controls whether the queue shaper is enabled for this queue on this switch port.Unchecked
QueueShaper_Rate
Specify the rate of the queue shaper. This value is restricted to 100-1000000
when the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when the "Unit" is
QueueShaper_Unit
Specify the unit of measure for the queue shaper rate as kbps, Mbps, fps or kfps. kbps
QueueShaper_Excess
Specify whether the queue is allowed to use excess bandwidth. Unchecked
Port Shaper_Enable
Controls whether the port shaper is enabled or not.Unchecked
Port Shaper_Rate
Specify the rate of the port shaper. T hi s v alue is restricted to 100-10000 00 w hen
Strict Priority
500
500
3-62
Page 81
_3
"Mbps" or "kfps".
Port shaper _Unit
switch port.
"Mbps" or "kfps".
Specify the unit of measure for the port shaper rate as k bps, Mbps, fps or kfps. kbps
Scheduler Mode: Weighted
Chapter 3 Featured Functions
Description Factory default
Description Factory default
Scheduler Mode
Specify whether the scheduler mode is "Strict Priority" or "Weighted" on this
QueueShaper_Enable
Controls whether the queue shaper is enabled for this queue on this switch port.Unchecked
QueueShaper_Rate
Specify the rate of the queue shaper. This value is restricted to 100-1000000
when the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when the "Unit" is
QueueShaper_Unit
Specify the unit of measure for the queue sh aper r ate as kbp s, M bp s, fp s or kf ps . kbps
QueueShaper_Excess
Specify whether the queue is allowed to use excess bandwidth. Unchecked
parameter is only shown if "Scheduler Mode" is set to "Weighted".
shown if "Scheduler Mode" is set to "Weighted".
"Mbps" or "kfps".
Description Factory default
QueueScheduler_Weight
Specify the weight for this queue. This value is restricted to 1-100. This
QueueScheduler_Percent
This field dispaythe weight in percent for this queue. This parameter is only
Port Shaper_Enable
Specify whether the port shaper is enabled or not.Unchecked
Port Shaper_Rate
Specify the rate of the port shaper. This value is restr ict ed to 100-1000000 when
the "Unit" is "kbps" or "fps", and it is restricted to 1-3300 when the "Unit" is
Port shaper _Unit
Specify the unit of measure for the port shaper rate as kbps, Mbps, fps or kfps.
The default value is "kbps".
17
fixed
500
kbps
3.7.8Port Shaping
Item Description
Port The interface number . You could click the port number to configure the shapers.
Shapers The field displays the "disabled" or actual queue shaper rate.
3-64
Page 83
_3
3.7.9 DSCP-Based QoS
Unchecked
DSCP
The DSCP number and the maximum value is 64. interface number
Chapter 3 Featured Functions
Description Factory default
Trust
Specify whether a specific DSCP value is trusted or not.
Checked: The trust mode is enabled.
QoS Class
Specify the QoS Class.The values are from 0 to 7 0
DPL
Specify the Drop Percedence Level is 0 or 1. 0
: The trust mode is disabled.
3.7.10 DSCP Translation
Unchecked
Description Factory default
DSCP
The DSCP number and the maximum values are 64. interface number
DSCP at Ingress side can be translated to any of (0-63) DSCP values. interface number
Ingress_Classify
Specify whether the classification is enabled or not.
Checked: The classification is enabled.
Egress_Remap
Select the DSCP value from select menu to which you want to remap. DSCP
: The classification is disabled.
Unchecked
interface number
3.7.11 DSCP Classification
This page allows you to configure the mapping of QoS class and Drop Precedence Level to DSCP value.
Description Factory default
QoS Class
The QoS class number . class number
DPL
Actual Drop Precedence Level. fixed
DSCP
Select the classified DSCP value (0-63).
0 (BE)
3.7.12 QoS Control List
This feature allows you edit or insert a single QoS Control Entry at a time. A QCE consists of several parameters. These
parameters vary according to the frame type that you select.
QoS Control List
You can click the icon to add a QCE, and it will display in the QoS Control List.
3-66
Page 85
_3
QCE Configuration
enter either a specific value or a range of VIDs.
values between 0, 1 or 'Any'.
Any: In any format.
LLC: Include SSAP addre ss , DSAP address and Control Valid.
Port Members
Select the port to add in the QCL entry.
Checked: The port is including in the QCL entry.
: The port is not including in the QCL entry.
Chapter 3 Featured Functions
Description Factory default
Checked
Key Parameters
Tag
Specify the Tag mode: 'Any', 'Untag' or 'Tag'. Any
VID
Specify the Valid value of VLAN ID in the range 1-4095 or 'Any'; Or you can
PCP
Specify the Priority Code Point range.Valid value PCP are specific (0, 1, 2, 3, 4,
5, 6, 7) or in a range (0-1, 2-3, 4-5, 6-7, 0-3, 4-7) or 'Any'.
DEI
Specify the Drop Eligible Indicator mode. The valid value of DEI can be any of
SMAC
Source MAC address: 24 MS bits (OUI) or 'Any'. Any
DMAC Type
Specify the Destination MAC type.
UC: In unicast format
MC: In multicast format.
BC: In broadcast format
Frame Type
Specify the frame type as below:
Any: Allow all types of frames.
Ethernet: Ethernet Type Valid ethernet type can have a value within
0x600-0xFFFF or 'Any' but excluding 0x800(IPv4) and 0x86DD(IPv6)
Specify the DPL and the range can be 0 to 3 or Default. Default
DSCP
Specify the DSCP value. Default
3.7.13 QoS Statistics
You can click on the Port number to check the details.
Item Description
Port
Queue number
Rx
Tx
3-68
The interface number.
There are 8 QoS queues per port. Q0 is the lowest priority queue.
The number of received packets per queue.
The number of transmittd packets per queue.
Page 87
Chapter 3 Featured Functions
_3
value displayed under DSCP column.
resources required to add QCL entry on pressing 'Resolve Conflict' button.
3.7.14 QCL Status
This page shows the QCL status by different QCL users. Each row describes the QCE that is defined. It is a conflict if a
specific QCE is not applied to the hardware due to hardware limitations. The maximum number of QCEs is 256 on each
switch.
Item Description
User
QCE#
Frame Type
Port
Action
Conflict
The QCL user name.
The index of QCE
The type of frame type.
The port list of the QCE entry.
The classification action taken on ingress frame if parameters configured are
matched with the frame's content.
Class: Classified QoS class; if a frame matches the QCE it will be put in the
queue.
DPL: Drop Precedence Level; if a frame matches the QCE then DP level will
set to value displayed under DPL column.
DSCP: If a frame matches the QCE then DSCP will be classified with the
Displays Conflict status of QCL entries. As H/W resources are shared by
multiple applications. It may happen that resources required to add a QCE may
not be available, in that case it shows conflict status as 'Yes', otherwise it is
always 'No'. Please note that conflict can be resolved by releasing the H/W
3.8 Multicast
Multicast IP traffic is traffic that is assigned to a host group. Host groups are identified by class D IP addresses, which
range from 224.0.0.0 to 239.255.255.255. A multicast IP packet is only sent by one host to multiple hosts. Only those
hosts that belong to a specific mult ica st group will receiv e t he mu lti cas t. The Internet Group Management Protocol (IGMP)
snooping enables the switch to forward multicast traffic intelligently to only the interface that requests the multicast traffic.
So the network resource is not wasted too much.
If there is a network without the multicast filtering, and a host needs to send data to many hosts, then it needs to produce
several copies in the network. It wastes too much network bandwidth. If there is a network with the multicast filtering, then
it reduces the load of resources (ex. a server) and makes the network bandwidth efficient. The figures below show the
difference between the network without Multicast Filtering and the network with Multicast Filtering.
(Only the host which belongs to the group can receive the traffic.)
3-70
Page 89
Chapter 3 Featured Functions
_3
a response from each host that belongs to the multicast group.
or is a member of a given group indicated in the report message.
member of a specific multicast group.
directed to the group address.
Checked: The unregistered IPMC traffic flooding is enabled.
IGMP Snooping manages multicast traffic by making use of switches, routers, and hosts that support IGMP. Enabling
IGMP Snooping allows the ports to detect the IGMP queries, report packets, and manage multicast traffic through the
switch. IGMP has three fundamental types of messages, as shown below:
Item Description
Query
A message is sent from the querier (an IGMP router or a switch) which asks for
Report
Leave Group
A message is sent by a host to the querier to indicate that the host wants to be
A message is sent by a host to the querier to indicate that the host has quit as a
3.8.1 IGMP Snooping
On this page, you can enable or disable IGMP Snooping. And it displays the VLAN which enables the IGMP Snooping
function.
3.8.1.1 Basic Configuration
Global Configuration
Description Factory default
Snooping Enabled
Specify the status of IGMP Snooping:
Unchecked: The IGMP Snooping is disabled. The IGMP setting still can be
configured, but the settings do not take effect after you have applied them.
Checked: The IGMP Snooping is enabled. The switch snoop all the IGMP
packets it receives to determine which segments should receive the packets
Unchecked
Unregistered IPMCv4 Flooding Enabled
Specify the status of unregistered IPMC traffic flooding:
Unchecked: The unregistered IPMC traffic flooding is disabled.
Specify whic h ports act as router ports. A router port is a port on the Ethernet
switch that leads towards the Layer 3 multicast device or IGMP querier.
If an aggregation member port is selected as a router port, the whole
aggregation will act as a router port.
Unchecked: The port doesn’t act as router port.
Fast Leave
Specify th e st atus of the port.
Unchecked: The port is disabled.
3.8.1.2 VLAN Configu ration
You can use “Add new IGMP VLAN” to create a new IGMP VLAN entry.
port number
Unchecked
Unchecked
3-72
Page 91
_3
VLAN ID
Checked:
Checked:
Enter a VLAN ID for which you want to create an IGMP snooping configuration. None
Snooping Enabled
Specify the status of per-VLAN IGMP Snooping. Up to 32 VLANs can be
selected for IGMP Snooping.
Unchecked: The status is disabled.
IGMP Querier
Specify the status of IGMP Querier in the VLAN.
Unchecked: The status is disabled.
The status is enabled.
The status is enabled.
3.8.1.3 Status
Statistics
Chapter 3 Featured Functions
Description Factory default
Unchecked
Checked
Item Description
VLAN ID
Querier Version
Host Version
Querier Status
Querier Receive
V1 Reports Receive
V2 Reports Receive
V3 Reports Receive
V2 Leave Receive
The VLAN ID of the entry.
Working Querier Version currently .
Working Host Version currently.
Show the Querier status is "ACTIVE" or "IDLE".
The number of Transmitted Querier.
The number of Received V1 Reports.
The number of Received V2 Reports.
The number of Received V3 Reports.
The number of Received V2 Leave.
The port number.
Indicate whether specific port is a router port or not.
3.8.1.4 Group Information
Entries in t he IGMP Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by
group.
Item Description
VLAN ID
Groups
Port Members
VLAN ID of the group.
Group address of the group displayed.
Ports under this group.
3.9 Security
This group allows you to config ure a MAC address, an IP address or the Port authent icatio n to reach t he securi ty pur pose.
3.9.1 Remote Control Security
Remote Control Security allow s you li mit the r emot e acce ss of manage ment int erface. When enabled, t he re quest of client
which is not in the allow list will be rejected.
3-74
Page 93
_3
You can enable the mode first, and then click”Add new entry” to add a new role.
Checked: The status is enabled.
Checked:
Checked:
Description Factory default
Port
Port number of remote client. Any
IP
IP address of remote client. Keeps this field "0.0.0.0" means "Any IP". Unchecked
Web
Specify the status of web management interface
Unchecked: The stat us is disabled.
Telnet
Specify the status of telnet management interface.
Unchecked: The stat us is disabled.
SNMP
Specify the status of SNMP management interface.
Unchecked: The stat us is disabled.
The status is enabled.
The status is enabled.
Chapter 3 Featured Functions
Unchecked
Unchecked
Unchecked
3.9.2 Device Binding
This group provides Device Binding related configuration. Device Binding is a powerful monitor for devices and network
security.
3.9.2.1 Configuration
The configuration will be activated after the Function State enabled.
DDOS Prevention
The information will relate with the Device Binding Configuration.
Description Factory default
Port
The interface number
Mode
This field displays the status of Alive Check in Device Binding Configuration. Fixed
Sensibility
Specify the level of DDOS detection.
Low: Low sensibility.
Normal: Normal sensibility.
Medium: Medium sensibility.
Packet Type
Specify the packet of DDOS monitor.
RX Total: T ot a l ingr e ss p ac kets.
RX Unicast: Unicast ingress packets.
RX Multicast: Multicast ingress packets
RX Broadcast: Broadcast ingress packets.
TCP: TCP ingress packets.
interface number
Normal
TCP
3-80
Page 99
Chapter 3 Featured Functions
_3
one, please fill the same number in low field and high field.
(Destination/Source).
Attacked
Description Factory default
Socket Number
If packet type is UDP or TCP, please specify the socket number here. The
socket number could be a range, from low to high. If the socket number is only
Filter
If packet type is UDP or TCP, please choose the socket direction
Action
Specify the action when DDOS attack happened.
---: Do nothing.
Blocking 1 minute: To block the forwarding for 1 mintue, and log the event.
Blocking 10 minute: To block the forwarding for 10 mintues, and log the
event.
Blocking: Just blocking, and log the event
Shunt Down the Port: Shut down the port(No Link), and log the event.
Only Log it: Just log the event.
Reboot Device: If switch supported, the device could be rebooted. And log
the event.
Status
This field displays the status of DDOS Prevention.
---: Disable.
Analysing: Analysing the packet throughput for initialization.