To display IGMP Snooping Querier Setting web page, click Switching > Multicast >
IGMP Snooping > IGMP Snooping Querier Setting
VLAN ID: Select the VLANs to configure.
Querier State: Set enabling status of IGMP Querier Election on the VLANs.
Enable: Enable IGMP Querier Election.
Disable: Disable IGMP Querier Election.
Version: Select the Querier Version, IGMPv2 or IGMPv3
3. IGMP Static Group
To display IGMP Static Setting web page, click Switching > Multicast > IGMP
Snooping > IGMP Static Group
41
Page 42
This page is used to configure specified ports as static member ports.
4. IGMP Group Table
To display IGMP Group Table web page, click Switching > Multicast > IGMP
Snooping > IGMP Group Table
This page is used to display IGMP Group Table statistics information.
5. IGMP Router Port Setting
To display IGMP Router Port Setting web page, click Switching > Multicast > IGMP
Snooping > IGMP Router Port Setting
This page is used to configure specified ports as static route ports.
42
Page 43
6. IGMP Router Table
To display IGMP Router Table web page, click Switching > Multicast > IGMP
Snooping > IGMP Router Table
This page is used to display IGMP Router Table statistics information.
7. IGMP Forward All
To display IGMP Forward All web page, click Switching > Multicast > IGMP Snooping >
IGMP Forward All
43
Page 44
4.3.6.3 Multicast Throttling Setting
To display Multicast Throttling Setting web page, click Switching > Multicast >Multicast
Throttling Setting
This page is used to limit the port can join one of the biggest Multicast instance.
4.3.6.4 Multicast Filter
This page allow user to create filter instance.
1.Multicast Profile Setting
To display Multicast Profile Setting web page, click Switching > Multicast >Multicast
Filter > Multicast Profile Setting
44
Page 45
2.Multicast Profile Setting
To display IGMP Filter Setting web page, click Switching > Multicast > Multicast Filter >
IGMP Filter Setting
This page is used to filter the port to bind to that instance.
4.3.7 Jumbo Frame
To display Jumbo Frame web page, click Switching > Jumbo Frame
Jumbo Frame: Jumbo frame size. The valid range is 0 bytes – 9216 bytes.
45
Page 46
4.3.8 STP
The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology
for any bridged Ethernet local area network.
4.3.8.1 STP Global Setting
To display STP Global Setting web page, click Switching > STP > STP Global Setting
Enabled: Set the STP status to be enable/disable on the Switch.
BPDU Forward: Choose BPDU packets is a flood or filtering
Path Cost Method:Choose the path overhead is short or long
Force Version: Select the operating mode of STP.
STP-Compatible: 802.1D STP operation.
RSTP-Operation: 802.1w operation.
MSTP-Operation: 802.1s operation.
Configuration Revision: Set the revision of the configuration identification. (Range:
0-65535).
4.3.8.2 STP Port Setting
To display STP Port Setting web page, click Switching > STP > STP Port Setting
46
Page 47
Port Select: Select the port list to specify which ports should apply this setting.
External Path Cost: set the port’s contribution, when it is the Root Port, to the Root Path
cost for the Bridge. (0 means `Auto`).
Edge Port: Set the edge port configuration.
No: Force to false state (as link to a bridge).
Yes: Force to true state (as link to a host).
Excluded: exclude preamble & IFG (20 bytes) when count ingress storm control rate.
Included: include preamble & IFG (20 bytes) when count ingress storm control rate.
4.3.5.2 Port Setting
To display Port Setting web page, click Security > Storm Control > Port Setting
52
Page 53
Port: Select the ports.
Type Enable: Select the type of storm control.
Broadcast: Broadcast packet.
Unknown Multicast: Unknown multicast packet.
Unknown Unicast: Unknown unicast packet.
Rate: Value of storm control rate, Unit: pps (packet per-second) or Kbps (Kbits per-second)
depends on global mode setting. The range is from 0 to 1000000.
4.5.2 802.1X
802.1x is based on the Client/Server access control and authentication protocol. It can
restrict unauthorized users or devices to connect the access port via LAN/WLAN. Before
getting permission from the switch, 802.1x will check the users or devices that connect
with the switch ports. EAPoL data are transmitted between device and switch, when the
device is allowed to access; all data can be transmitted through Ethernet ports.
4.5.2.1 802.1X Setting
To display 802.1X Setting web page, click Security > 802.1X > 802.1X Setting
802.1X: Set the status of 802.1X functionality.
Enable: Enable 802.1X.
Disable: Disable 802.1X.
53
Page 54
4.5.2.2 802.1X Port Setting
To display 802.1X Port Setting web page, click Security > 802.1X > 802.1X Port
Setting
Port: Select the ports to configure their authentication mode.
Mode: The authentication mode.
Force Unauthorized: Force this port to be unconditional unauthorized.
Force Authorized: Force this port to be unconditional authorized.
Authentication: 802.1X authentication.
No Authentication:802.1X disabled.
54
Page 55
Reauthentication Enable: Set the enabling status of 802.1X reauthentication.
Reauthentication Period: Set the reauthentication period of 802.1X if reauthentication is
enabled.
4.5.5.1 Guest VLAN Setting
To display Guest VLAN Setting web page, click Security > 802.1X > Guest VLAN
Setting
4.3.5.1 Authenticated Hosts
To display Authenticated Hosts web page, click Security > 802.1X > Authenticated
Hosts
4.5.3 DHCP Snooping
When the switch opens DHCP-Snooping, it will snoop DHCP message and receive DHCP
Request and abstract and record the IP address and MAC address from DHCP ACK
message. Besides, DHCP-Snooping admits one physical port setting as creditable port or
55
Page 56
discreditable ports. Creditable ports can receive and forward the DHCP Offer message, on
the contrary, the discreditable port will lose the DHCP Offer message. In that way, the
switch can pick out the fake DHCP Server and make sure that the client gets legal IP
address from DHCP Server.
4.5.3.1 Global Setting
To display Global Setting web page, click Security > DHCP Snooping > Global Setting
This page is used to open DHCP Snooping function
DHCP Snooping: enable or disable DHCP Snooping function
4.5.3.2 VLAN Setting
To display VLAN Setting web page, click Security > DHCP Snooping > VLAN Setting
Specific VLAN starts DHCP Snooping
4.5.3.3 Port Setting
To display Port Setting web page, click Security > DHCP Snooping > Port Setting
This page allow user to configure the specific port as DHCP Snooping trust port.
56
Page 57
4.5.3.4 Statistics
To display Statistics web page, click Security > DHCP Snooping > Statistics
This page shows statistics of each port´s DHCP Snooping state information.
4.5.3.5 Rate Limit
To display Rate Limit web page, click Security > DHCP Snooping > Rate Limit
57
Page 58
4.5.3.6 DHCP Option82 Global Setting
To display DHCP Option82 Global Setting web page, click Security> DHCP Snooping >
Option82 Global Setting
This page is used to configure DHCP Snooping support Option82 strategy.
4.5.3.7 Option82 Port Setting
To display Option82 Port Setting web page, click Security> DHCP Snooping > Option82
Port Setting
To the specified port configuration of receiving containing Option 82 options request
packet port handling strategy.
58
Page 59
4.5.3.8 Option82 Circuit-ID Setting
To display Option82 Circuit-ID Setting web page, click Security> DHCP Snooping >
Option82 Circuit-ID Setting
This page allow user to edit circuit ID content in the option82.
4.5.4 Port Security
To display Port Security web page, click Security> Port Security
Ports Security can set port isolation and specific behavior.
59
Page 60
Port Select: Select one or multiple ports to configure.
Security: Port security function. It constraint how many MAC addresses can be learned
by a port and drop new one when reach the limitation.
Enable: Enable port security function.
Disable: Disable port security function.
Max L2 Entry: The total number of MAC addresses entry, which can be learned by a port.
4.5.5 AAA
4.5.5.1 Login List
To display Login List web page, click Security > AAA > Login List
This page allow user to add, edit or delete login authentication list settings (The“default”
list cannot be deleted.).The line combined to this list will authenticate login user by
methods in this list. If the first method is failed, it will try to use the next priority method to
authenticate if it exists.
List Name:
New login authentication list name. This name should be different from other existing lists.
60
Page 61
Method 1: Select first priority of login authentication method.
Local: Use local accounts database to authenticate.
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
Enable: Use local enable password to authenticate.
Method 2: Select second priority of login authentication method.
Local: Use local accounts database to authenticate.
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
Enable: Use local enable password to authenticate.
Method 3: Select third priority of login authentication method.
Local: Use local accounts database to authenticate.
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
Enable: Use local enable password to authenticate.
Method 4: Select forth priority of login authentication method.
Local: Use local accounts database to authenticate
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
Enable: Use local enable password to authenticate
4.5.5.2 Enable List
To display Login List web page, click Security> AAA > Enable List
This page allow user to add, edit or delete enable authentication list settings (The
“default” list cannot be deleted.). The line combined to this list will authenticate user
who issuing the‘enable’ command by methods in this list. If the first method is failed, it
will try to use the next priority method to authenticate if it exists.
61
Page 62
List Name: New enable authentication list name. This name should be different from
other existing lists.
Method 1: Select first priority of enable authentication method.
Enable: Use local enable password to authenticate
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
Method 2: Select second priority of enable authentication method.
Enable: Use local enable password to authenticate
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
Method 3: Select third priority of enable authentication method.
Enable: Use local enable password to authenticate.
Tacacs+: Use remote TACACS+ server to authenticate.
Radius: Use remote Radius server to authenticate. Not supported now, it will be supported in
the future.
4.5.5.3 Accounting List
To display Accounting List web page, click Security> AAA > Accounting List
This page allow user to add, edit or delete accounting list settings (The “default” list cannot
be deleted.). The line combined to this list will accounting user who entering CLI shell by
methods in this list. If the first method is failed, it will try to use the next priority method to
accounting if it exists.
List Name:
New accounting list name. This name should be different from other existing lists.
Record Type:
Select accounting record type.
None: No accounting.
Start-stop: Record start and stop without waiting.
Stop-only: Record stop when service terminates.
62
Page 63
Method 1: Select first priority of exec accounting method.
Tacacs+: Use remote TACACS+ server to accounting.
Radius: Use remote Radius server to accounting. Not supported now, it will be supported in
the future.
Method 2: Select second priority of exec accounting method.
Tacacs+: Use remote TACACS+ server to accounting.
Radius: Use remote Radius server to accounting. Not supported now, it will be supported in
the future.
4.5.5.4 Accounting Update
To display Accounting Update web page, click Security> AAA > Accounting Update
4.5.6 Tacacs+ Server
To display Tacacs+ server web page, click Security> AAA >Tacacs+ server
This page allow user to add, edit or delete TACACS+ server settings.
4.5.7 Radius server
To display Radius server web page, click Security > AAA > Radius server
63
Page 64
This page is used to set up radius server.
4.5.8 Access
4.5.8.1 Console
To display Console web page, click Security > Access > Console
This page allow user to combine all kinds of AAA lists to console line. The user accesses
switch from console will be authenticated, authorized and accounted by AAA lists we
combined here.
Login Authentication List: Select one of the login authentication lists we configured in
“Login List” page.
Enable Authentication List: Select one of the enable authentication lists we configured
in “Enable List” page.
EXEC Authorization List: Select one of the EXEC authorization lists we configured in
“EXEC List” page.
Commands Authorization List: Select one of the commands authorization lists we
configured in “Commands List” page.
64
Page 65
EXEC Accounting List: Select one of the EXEC accounting lists we configured in
“Accounting List” page.
Session Timeout: Set session timeout minutes for user access CLI from console line. If
user does not response after session timeout minute, CLI will logout automatically. 0
minutes means never timeout.
4.5.8.2 Telnet
To display Telnet web page, click Security > Access > Telnet
This page allow user to combine all kinds of AAA lists to telnet line. The user accesses
switch from telnet will be authenticated, authorized and accounted by AAA lists we
combined here.
Telnet Service: Set remote service disable or enable
Login Authentication List: Select one of the login authentication lists we configured in
“Login List” page.
Enable Authentication List: Select one of the enable authentication lists we configured
in “Enable List” page.
EXEC Authorization List: Select one of the EXEC authorization lists we configured in
“EXEC List” page.
Commands Authorization List: Select one of the commands authorization lists we
configured in “Commands List” page.
EXEC Accounting List: Select one of the EXEC accounting lists we configured in
“Accounting List” page.
Session Timeout: Set session timeout minutes for user access CLI from telnet line. If
user does not response after session timeout minute, CLI will logout automatically.
4.5.8.3 HTTP
To display HTTP web page, click Security > Access > HTTP
This page allow user to combine all kinds of AAA lists to HTTP line. The user accesses
switch WEBUI from HTTP will be authenticated by AAA lists we combined here.
65
Page 66
HTTP Server:set HTTP Server disable or enable.
Login Authentication List: Select one of the login authentication lists we configured in
“Login List” page.
Session Timeout: Set session timeout minutes for user access WEB from HTTP protocol.
If user does not response after session timeout minute, WEB UI will logout automatically.
0 minutes means never timeout.
4.5.8.4 HTTPS
To display HTTPS web page, click Security > Access > HTTPS
This page allow user to combine all kinds of AAA lists to HTTPS line. The user accesses
switch WEBUI from HTTPS will be authenticated by AAA lists we combined here.
HTTPS Server: Set HTTPS Server disable or enable.
Login Authentication List: Select one of the login authentication lists we configured in
“Login List” page.
Session Timeout: Set session timeout minutes for user access WEB from HTTPS
protocol. If user does not response after session timeout minute, WEBUI will logout
automatically. 0 minutes means never timeout.
66
Page 67
4.6 ACL
4.6.1 MAC-Based ACL
To display MAC-Based ACL web page, click ACL > MAC-Based ACL
This page allow user to set name for MAC-Based ACL.
ACL Name: Enter ACL name in this field.
4.6.2 MAC-Based ACE
To display MAC-Based ACE web page, click ACL > MAC-Based ACE
This page allow user to set Based on MAC address expanding ACL list, matching
corresponding MAC and setting the ports as drop or forward.
4.6.3 IPv4-Based ACL
To display IPv4-Based ACL web page, click ACL > IPv4-Based ACL
This page allow user to set name for IPv4-Based ACL.
67
Page 68
4.6.4 IPv4-Based ACE
To display IPv4-Based ACE web page, click ACL > IPv4-Based ACE
This page allow user to set based on IPv4 expanding ACL Peer Guardian and matching
corresponding IP and setting the port as drop or forward.
4.6.5 ACL Binding
To display ACL Binding web page, click ACL > ACL Binding
This page allow user to bounding with accordingly ACL rules, port bounding ACL rules.
68
Page 69
4.7 QoS
Use the QoS pages to configure settings for the switch QoS interface.
4.7.1 General
4.7.1.1 QoS Properties
To display QoS properties web page, click QoS >General > QoS properties
This page allow user to set QoS mode, basic or advanced.
4.7.1.2 Port Settings
To display Port Settings web page, click QoS > General > Port Settings
This page is used to give the QoS instance port configuration.
4.7.1.3 Queue Settings
To display Queue Setting web page, click QoS > General > Queue Settings
This page allow user to set the QoS instance queue scheduling model.
69
Page 70
4.7.1.4 COS Mapping
To display COS Mapping web page, click QoS > General > COS Mapping
The page allow user to set QoS instance of COS Mapping.
4.7.1.5 DSCP Mapping
To display DSCP Mapping web page, click QoS > General > DSCP Mapping
The page allow user to set QoS instance of DSCP Mapping.
70
Page 71
4.7.1.5 IP Precedence Mapping
To display IP Precedence Mapping web page, click QoS > General > IP Precedence
The page allow user to set QoS instance of IP Precedence Mapping.
4.7.2 QoS Basic Mode
4.7.2.1 Global Settings
To display Global Settings web page, click QoS > QoS Basic Mode > Global Settings
This page allow user to set QoS for trust mode on basic mode global settings.
71
Page 72
4.7.2.2 Port Settings
To display Port Settings web page, click QoS > QoS Basic Mode > Port Settings
This page allow user to set QoS port setting enabled or disabled.
4.7.3 QoS Advanced Mode
4.7.3.1 Global Settings
To display Global Settings web page, click QoS > QoS Advanced Mode > Global
Settings
This page allow user to set the default QoS mode state under advanced mode global
settings trust mode.
72
Page 73
4.7.3.2 Class Mapping
To display Class Mapping web page, click QoS > QoS Advanced Mode > Class
Mapping
This page allow user to create a QoS class, which is used to link the ACL.
4.7.3.3 Aggregate Policer
To display Aggregate Policer web page, click QoS > QoS Advanced Mode > Aggregate
Policer
4.7.3.4 Policy Table
To display Policy Table web page, click QoS > QoS Advanced Mode > Policy Table
73
Page 74
4.7.3.5 Policy Class Maps
To display Policy Class Maps web page, click QoS > QoS Advanced Mode > Policy
Class Maps
4.7.3.6 Policy Binding
To display Policy Binding web page, click QoS > QoS Advanced Mode > Policy Binding
74
Page 75
4.7.4 Rate Limit
4.7.4.1 Ingress Port Settings
To display Ingress Port Settings web page, click QoS > Rate Limit > Ingress Port
Settings
This page allow user to set ingress port monitor.
4.7.4.2 Ingress VLAN Settings
To display Ingress VLAN Settings web page, click QoS > Rate Limit > Ingress VLAN
Settings
This page is used to set the bandwidth of the VLAN entry control.
4.7.4.3 Egress Port Settings
To display Egress Port Settings web page, click QoS > Rate Limit > Egress Port
Settings
This page is used to set the egress port monitor.
75
Page 76
4.7.4.4 Egress Queue Settings
To display Egress Queue Settings web page, click QoS > Rate Limit > Egress Queue
Settings
The page is used to set the egress lined up bandwidth monitor.
4.8 Management
4.8.1 LLDP
LLDP is a one-way protocol; there are no request/response sequences. Information is
advertised by stations implementing the transmit function, and is received and processed
by stations implementing the receive function.
76
Page 77
4.8.1.1 LLDP Global Settings
To display LLDP Global Settings web page, click Management > LLDP > LLDP Global
Settings
Enabled: Enable/ Disable LLDP protocol on this switch.
Transmission Interval: Select the interval at which frames are transmitted. The default is
30 seconds, and the valid range is 5–32768 seconds.
Hold time Multiplier: Select the multiplier on the transmit interval to assign to TTL
(Range 2–10, default = 4).
Reinitialization Delay: Select the delay before a re-initialization (range 1–10 seconds,
default = 2).
4.8.1.2 LLDP Port Settings
To display LLDP Port Settings web page, click Management > LLDP > LLDP Port
Settings
77
Page 78
Port Select: Select specified port or all ports to configure transmission state.
State: Select the transmission state of LLDP port interface.
Disable: Disable the transmission of LLDP PDUs.
RX Only: Receive LLDP PDUs only.
TX Only: Transmit LLDP PDUs only.
TX And RX: Transmit and receive LLDP PDUs both select specified port or all port configure
transmission state.
Port Select: Select specific ports.
Optional TLV Select: Select Optional TLVs.
4.8.1.3 LLDP Local Device
To display LLDP Local Device web page, click Management > LLDP > LLDP Local
Device
Use the LLDP Local Device page to view information about devices on the network for
which the switch has received LLDP information.
4.8.1.4 LLDP Remote Device
To display LLDP Remote Device web page, click Management > LLDP > LLDP Remote
Device
Use the LLDP Remote Device page to view information about remote devices for which
the switch has received LLDP information.
78
Page 79
4.8.1.5 LLDP Network Policy
To display LLDP Network Policy web page, click Management > LLDP > LLDP Network
Policy
4.8.1.6 MED Port Setting
To display MED Port Setting web page, click Management > LLDP > MED Port Setting
79
Page 80
4.8.1.7 LLDP Overloading
To display LLDP Overloading web page, click Management > LLDP > LLDP
Overloading
4.8.2 SNMP
4.8.2.1 SNMP Setting
To display SNMP Setting web page, click Management > SNMP > SNMP Setting
State: SNMP daemon state
Enabled: Enable SNMP daemon
Disabled: Disable SNMP daemon
4.8.2.2 SNMP View
To display SNMP View web page, click Management > SNMP > SNMP View
This page is used to configure SNMP view, used in the SNMP message Management
variables (OID) to describe the switch in the Management object. MIB (Management
Information Base) is a set of monitoring network equipment Management variables. View
is used to control, variable is how to be managed.
80
Page 81
4.8.2.3 SNMP Access Group
To display SNMP Access Group web page, click Management > SNMP > SNMP Access
Group
This page is used to configure SNMP group, within the group the user can set read-only or
write only.
4.8.2.4 SNMP Community
To display SNMP Community web page, click Management > SNMP > SNMP
Community
SNMP v1 and SNMP v2c uses the group Name (Community Name) certification, which is
similar to the password. If use SNMP v1 and SNMP v2c, after configuring SNMP view, the
SNMP community can be directly configured.
81
Page 82
4.8.2.5 SNMP User
To display SNMP User web page, click Management > SNMP > SNMP User
This page is used to create SNMP user under the group and the group with the same level
of security and access control permissions.
4.8.2.6 SNMPv1,2 Notification Recipients
To display SNMPv1,2 Notification Recipients web page, click Management > SNMP >
SNMPv1,2 Notification Recipients
82
Page 83
4.8.2.7 SNMPv3 Notification Recipients
To display SNMPv3 Notification Recipients web page, click Management > SNMP >
SNMPv3 Notification Recipients
4.8.2.8 SNMP Engine ID
To display SNMP Engine ID web page, click Management > SNMP > SNMP Engine ID
83
Page 84
4.8.2.9 SNMP Remote Engine ID
To display SNMP Remote Engine ID web page, click Management > SNMP > SNMP
Remote Engine ID
4.8.3 RMON
4.8.3.1 RMON Statistics
To display RMON Statistics web page, click Management > RMON > RMON Statistics
4.8.3.2 RMON Event
To display RMON Event web page, click Management > RMON >RMON Event
This page is used to configure RMON event group.
84
Page 85
4.8.3.3 RMON Event Log
To display RMON Event Log web page, click Management > RMON > RMON Event Log
4.8.3.4 RMON Alarm
To display RMON Alarm web page, click Management > RMON >RMONAlarm
This page is used to configure RMON statistics group and alarm group.
4.8.3.5 RMON History
To display RMON History web page, click Management > RMON >RMON History
This page is used to configure the RMON history group.
85
Page 86
4.8.3.6 RMON History Log
To display RMON History Log web page, click Management > RMON > RMON History
Log
4.9 Diagnostics
Use the Diagnostics pages to configure settings for the switch diagnostics feature or
operating diagnostic utilities.
4.9.1 System Status
To display System Status Log web page, click Diagnostics > System Status
4.9.2 Ping Test
To display Ping Test Log web page, click Diagnostics > Ping Test
86
Page 87
IP Address: The IP address of ping target.
Count: How many times to send ping request packet.
Interval: Time interval between each ping request packet.
Size: The size of ping packet.
Ping Results: After ping finished, results will show in this field.
4.9.3 Logging Setting
4.9.3.1 Logging Service
To display Logging Service web page, click Diagnostics > Logging Setting > Logging
Service
4.9.3.2 Local Logging
To display Local Logging web page, click Diagnostics > Logging Setting > Local
Logging
87
Page 88
Target: Select the target to store log message
RAM: Store log messages in RAM disk. All log messages will disappear after system reboot.
FLASH: Store log messages in FLASH. All log messages will not disappear after system
reboot.
Severity: Select severity of log messages, which will be stored.
4.9.3.3 Remote Logging
To display Remote Logging web page, click Diagnostics > Logging Setting > Remote
Logging
Server Address: The IP address of remote log server.
Server Port: The Port number of remote log server.
Severity: Select severity of log messages, which will be sent.
4.9.4 Factory Default
To display Factory Default web page, click Diagnostics > Factory Default
This page allow user to restore switch to factory default by pushing “Restore” button.
4.9.5 Reboot Switch
To display Reboot Switch web page, click Diagnostics > Reboot Switch
This page allow user to reboot the switch by pushing“Reboot”button.
88
Page 89
4.10 Maintenance
Use the Maintenance pages to configure settings for the switch network interface, and
how the switch connects to a remote server to get services.
4.10.1 Backup Manager
To display Backup Manager web page, click Maintenance > Backup Manager
This page allow user to backup the firmware image or configuration file on the switch to
remote TFTP server or host file system through HTTP protocol.
Backup Method: Select backup method
TFTP: Use TFTP to backup
HTTP: Use HTTP to backup
Server IP: IP address of the TFTP server. If the TFTP backup method is selected, the IP
address of the TFTP server must be assigned.
Backup Type: Select Backup Type
89
Page 90
4.10.2 Upgrade Manager
To display Upgrade Manager web page, click Maintenance > Upgrade Manager
This page allow user to upgrade new firmware image or configuration file to the switch
from remote TFTP server or select file from web browser.
Upgrade Method: Select upgrade method
TFTP: Use TFTP to upgrade
HTTP: Use HTTP to upgrade
Server IP: IP address of the TFTP server. If the TFTP upgrade method is selected, the IP
address of the TFTP server must be assigned.
File Name: Firmware image or configuration file name on remote TFTP server. If the
TFTP upgrade method is selected, the file name must be specified.
Browse file: If the HTTP upgrade method is selected, the browse file field allows you to
select any file on host operating system.
Upgrade Type: Select Backup Type
4.10.3 Configuration Manager
To display Configuration Manager web page, click Maintenance > Configuration
Manager
90
Page 91
4.10.4 Account Manager
To display Account Manager web page, click Maintenance > Account Manager
This page allow user to add or delete switch local user database for authenticating.
User Name: User name for new account.
Password Type: Select password type for new account.
Clear Text: Password without encryption
Encrypted: Password with encryption
No Password: No password for the new account.
Password: If the password type is not “No Password”, the password must be specified.
Retype Password: Retype password to make sure the password is exactly you typed
before in “Password” field.
Privilege Type: Select privilege level for new account.
Admin: Allow to change switch settings.
User: See switch settings only. Not allow to change it.
If AAA feature is enabled, we have one more privilege type to allow user adding privilege
value for this account.
User Name: User name for new account.
Password Type: Select password type for new account.
Clear Text: Password without encryption
Encrypted: Password with encryption
No Password: No password for the new account.
91
Page 92
Password: If the password type is not “No Password”, the password must be specified.
Retype Password: Retype password to make sure the password is exactly you typed
before in “Password” field.
Privilege Type: Select privilege level for new account.
Admin: Allow to change switch settings.
User: See switch settings only. Not allow to change it.
Other: Assign privilege level value in Privilege value field.
Privilege Value: If the account privilege type is “Other”, set the privilege level for this
account here. The valid privilege level is from 2 to 14.
4.10.5 Enable Password
To display Enable Password web page, click Maintenance > Enable Password
This page allow user to modify the enable password. In command line interface, user can
use “enable” command to change their privilege level to “Admin”. After “enable” command
is issued, user need to type the enable password to change their privilege level.
Password Type: Select password type for enable password.
Clear Text: Password without encryption
Encrypted: Password with encryption
Password: Password string.
Retype Password: Retype password to make sure the password is exactly you
typed before in “Password” field.
92
Page 93
Hinweis: Bei falscher Installation und unsachgemäßem Gebrauch im Wohnbereich kann das
Gerät Störungen bei Rundfunkgeräten und anderen elektronischen Geräten verursachen. Ein
sachgemäßer Gebrauch liegt vor, wenn das Gerät, soweit durchführbar, mit geschirmten
Anschlusskabeln betrieben wird (bei Netzwerkprodukten zusätzlich geschirmter Kabel der
Kategorie 5e und höher). Das Gerät wurde getestet und liegt innerhalb der Grenzen für
Computerzubehör der Klasse A gemäß den Anforderungen nach EN 55022. Warnung: Dieses
Produkt entspricht der Prüfklasse A –es kann im Wohnbereich Funkstörungen verursachen; in
diesem Fall kann vom Betreiber verlangt werden, angemessene Maßnahmen durchzuführen
und dafür aufzukommen. Konformitätserklärung: Das Gerät erfüllt die EMV-Anforderungen nach
EN 55022 Klasse A für ITE und EN 55024. Geräte mit externer oder eingebauter
Spannungsversorgung erfüllen weiterhin die Anforderungen nach EN 61000-3-2 und EN
61000-3-3. Damit sind die grundlegenden Schutzanforderungen der EMV-Richtlinie
2004/108/EC erfüllt. Die CE-Konformität wurde nachgewiesen. Die entsprechenden Erklärungen
sind beim Hersteller hinterlegt.
www.assmann.com
ASSMANN Electronic GmbH
Auf dem Schüffel 3
58513 Lüdenscheid
Germany
93
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.