This Equipment has been tested and found to comply with the limits for a Class-A digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against
harmful interference in a residential installation. This equipment generates, uses, and can radiate radio
frequency energy. It may cause harmful interference to radio communications if the equipment is not
installed and used in accordance with the instructions. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
The wiring cable types for data transmission and power delivery in any speed are Cat. 5 or above.
SFP Installation
1. Insert the SFP module. A triangle is available on the switch and SFP module.
2. Push the SFP module down.
10
Page 15
II. Preparing for Management
This section will guide your how to manage this product via serial console, management web page, and
Telnet/SSH interface.
The switch provides both out-of-band and in-band managements.
Out-of-band Management: You can configure the switch via RS232 console cable without having the switch or
your PC connecting to a network. Out-of-band management provides a dedicated and secure way for switch
management.
In-Band Management: In-band management allows you to manage your switch with a web browser (such as
Microsoft IE, Mozilla Firefox, or Google Chrome) as long as your PC and the switch are connected to the same
network.
Preparation for Serial Console
Preparation for Web Interface
Preparation for Telnet/SSH Interface
11
Page 16
II-1. Preparation for Serial Console
Inside the product package, you can find an RS-232 console cable. Before managing your switch via
out-of-band management, please attach this cable’s RJ45 connector to your switch’s console port and its
RS-232 female connector to your PC’s COM port.
To access this switch’s out-of-band management CLI (Command Line Interface), your PC must have
terminal emulator software such as HyperTerminal or PuTTY installed. Some operating systems (such as
Microsoft Windows XP) have HyperTerminal already installed. If your PC does not have any terminal
emulator software installed, please download and install a terminal emulator software on your PC.
The following section will use HyperTerminal as an example.
1. Run HyperTerminal on your PC.
2. Give a name to the new console connection.
3. Choose the COM port that is connected to the switch.
12
Page 17
4.Set the serial port settings as: Baud Rate: 115200, Data Bit: 8, Parity: None, Stop Bit: 1, Row
Control: None.
5. The system will prompt you to login the out-of-band management CLI. The default
username/password is admin/admin.
13
Page 18
II-2. Preparation for Web Interface
The management web page allows you to use a web browser (such as Microsoft IE, Google Chrome, or
Mozilla Firefox) to configure and monitor the switch from anywhere on the network.
Before using the web interface to manage your switch, please verify that your switch and your PC are on
the same network. Please follow the steps down below to configure your PC properly:
1. Verify that the network interface card (NIC) of your PC is operational and properly installed, and
that your operating system supports TCP/IP protocol.
2. Connect your PC with the switch via an RJ45 cable.
3. The default IP address of the switch is 192.168.2.1. The switch and your PC should locate within
the same IP Subnet. Change your PC's IP address to 192.168.2.X, where X can be any number from
2 to 254. Please make sure that the IP address you’ve assigned to your PC cannot be the same with
the switch.
4. Launch the web browser (IE, Firefox, or Chrome) on your PC.
5. Type 192.168.2.1 (or the IP address of the switch) in the web browser’s URL field, and press Enter.
14
Page 19
6. The web browser will prompt you to sign in. The default username/password for the configuration
web page is admin/admin.
For more information, please refer to Appendix B: IP Configuration for Your PC.
15
Page 20
II-3. Preparation for Telnet/SSH Interface
Both telnet and SSH (Secure Shell) are network protocols that provide a text-based command line
interface (CLI) for in-band system management. However, only SSH provides a secure channel over an
un-secured network, where all transmitted data are encrypted.
This switch support both telnet and SSH management CLI. In order to access the switch’s CLI via telnet or
SSH, both your PC and the switch must be in the same network. Before using the switch’s telnet/SSH
management CLI, please set your PC’s network environment according to the previous chapter (II-2.
Preparation for Web Interface).
Telnet interface can be accessed via Microsoft “CMD” command. However, SSH interface can only be
accessed via dedicated SSH terminal simulator. The following section will use PuTTY as an example to
demonstrate how to connect to the switch’s SSH CLI, since both telnet and SSH uses the same way
(though using different terminal simulator software) to access in-band management CLI.
Access SSH via Putty:
A “PuTTY Configuration” window will pop up after you run PuTTY.
1. Input the IP address of the switch in the “Host Name (or IP address)” field. The default IP address
of the switch is 192.168.2.1.
2. Choose “SSH” on the “Connection type” section, then press “Enter”.
16
Page 21
3. If you’re connecting to the switch via SSH for the first time, a “PuTTY Security Alert” window will
pop up. Please press “Yes” to continue. This window won’t pop up if you’re using telnet to connect
to the in-band management CLI.
4. PuTTY will prompt you to login after the telnet/SSH connection is established. The default
username/password is admin/admin.
17
Page 22
III. Web Management
As mentioned in Chapter II-2 Preparation for Web Interface, This switch provides a web-based management
interface. You can make all settings and monitor system status with this management web page.
III-1. Web Management - Overview
When you log in, the configuration web page will display current system status.
1. Hide/Show Model Information
When a low-resolution environment is used to configure the system via the web console, the "Model
Information" field can be hidden to have a better view.
Show Model Information:
Hide Model Information:
18
Page 23
2. Save Configuration
After configuring, click the icon to save the configurations to the "startup-config" file. The configurations
are retained in the system until a factory reset default is done.
3. Restore Factory Default
Removes the configurations saved in the system. After restoring factory default, all the settings will be
set to default values.
4. Reboot System
Reboots the device and restarts the system.
5. System Logout
This option enables you to sign out from the system. Users have to login again if they want to configure
the settings.
The system will auto-logout after the "timeout" timer expires. The "timeout" timer is configured in the
CLI mode by using the "exec-timeout" command.
The maximum value of the timer in the web console is 30 minutes.
AUSER-FRIENDLYDATA TABLE
A user-friendly data table is provided on the“IPv6 Neighbor Table”, “IGMP Snooping Table”, “VLAN
Table”, “ LLDP Neighbor Table”, and “MAC Address Table”. The following section details how to use the
data table functions to help the users to observe the information easily.
The following example is “MAC Address Table”.
•
Users will be able to select a value to display the number of entries in one page. The following values
can be selected - “10”, “ 25”, “50”, and “100” selections. By default, “10” is selected.
•
The search option enables you to search a key word in the data. It will search all the columns and
identify the data rows that match the search criteria.
•
It displays the total number of entries and the current entry number.
•
and
This option orders the field from smaller to larger or from larger to smaller.
19
Page 24
•
Changes to “First”, “Previous”, “Next”, or “Last” page.
In addition to the above functions, “Refresh” and “Auto Refresh” function are available for all status
page including “IPv6 Neighbor Table”, “RSTP Port Status”, “Port Status”, “ IGMP Snooping Table”,
“VLAN Table”, “ Trunking Status”, “ LLDP Neighbor Table”, and “MAC Address Table”.
•
Selecting this checkbox enables the “Auto Refresh” function and deselecting the checkbox disables
the “Auto Refresh” function.
•
The Refresh Rate option is a global configurable variable. When the Auto Refresh option is enabled,
the status will refresh automatically based on the Refresh Rate interval.
The range of the Refresh Rate is from 5 to 300 second(s).
The default Refresh Rate is 5 seconds.
•
(Refresh Button)
You can click the “Refresh” button to manually refresh the status.
20
Page 25
III-2. Web Management – Basic Settings
III-2-1.BASIC SETTINGS -SYSTEM
CONFIGURE SYSTEM INFORMATION
Host Name
•
It is useful to identify the difference between the switches, for example: CoreSwitch01.
The max length for the Host Name is 32 alphanumeric characters.
Device Description
•
The Device Description is fixed and defined by the system.
It contains the copper port number, fiber port number, and PoE information (if supported).
Switch Location
•
It is useful to find the location of the switches, for example: Area01.
The max length for the Switch Location is 32 alphanumeric characters.
Contact Information
•
Information of the person responsible for this device and the contact details. Only alphanumeric
characters can be used here.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
21
Page 26
III-2-2.BASIC SETTINGS –IPV4SETTINGS
Internet Protocol Version 4 (IPv4) is the fourth version of the Internet Protocol. It is used on the
packet-switched networks and with connectionless communication. IPv4 has four bytes (32 bits) address
and the address space is limited to 4,294,967,296 (232) unique addresses. On the local area network
(LAN), the “Private Network” is used. It starts from 192.168.0.0 and the address space contains 65,025
(216) IP addresses. The frames can only be sent to the host in the same subnet. For example, the default
IP Address of the switch is “192.168.2.1”.When the users want to connect to the web console of the
switch, an IP address from “192.168.2.2” to “192.168.2.254” must be assigned to the host.
CONFIGURE IPV4INFORMATION
IPv4 Mode
•
There are 2 ways to configure IPv4 address - one is to configure a static IP address manually and
another one is to get an IP address by DHCP.
If the IPv4 mode is "DHCP Client", IPv4 information fields will be set to "Disabled".
IP Address
•
Assigns a unique static IP Address in the subnet to access the system.
The default IP Address is "192.168.2.1".
Subnet Mask
•
Defines the type of network, to which this device is connected to.
The default Subnet Mask is "255.255.255.0".
Default Gateway
•
The IP address of the router used to connect a LAN to a WAN.
DNS Server
•
Specifies the IP address of the DNS Server so that the users can connect to another device based on
the URL instead of the IP address.
The default DNS Server is "8.8.8.8". It is provided by Google.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
22
Page 27
III-2-3.BASIC SETTINGS –IPV6SETTINGS
Internet Protocol Version 6 (IPv6) is a solution to deal with the address space limitation of IPv4 and it is
the most recent version of Internet Protocol. It is intended to replace IPv4. IPv6 is a Layer 3 (Internet
Layer) protocol, which is used on the packet-switched networks and with connectionless communication.
There are 16 bytes (128 bits) for an IPv6 address and the address space is up to 2
The IPv6 address is usually represented in hexadecimal digits, 8 groups of 4 digits, and each group is
separated by a “:” (colon). For example, the DNS server address in IPv6 is
“2001:4860:4860:0000:0000:0000:0000:8888”.
CONFIGURE IPV6INFORMATION
128
unique addresses.
IPv6 Mode
•
"Enable" or "Disable" IPv6. When the IPv6 Mode is enabled, other devices can connect to this unit.
Default Address
•
This is the Default IPv6 Address for this device. It is a Link-Local address and is automatically
generated from the MAC Address of the device.
IPv6 Addresses
•
Enables the users to define other IPv6 addresses for this device.
The IPv6 address contains 2 sections - IPv6 address and prefix. The default Prefix is 64-bit.
: Click the plus icon to add an IPv6 Address row.
: Click the remove icon to delete the IPv6 Address row.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
23
Page 28
IPV6NEIGHBOR TABLE
IPv6 Address
•
This filed displays the IPv6 address of the neighbor.
MAC Address
•
This filed displays the MAC address of the neighbor.
State
•
The connection state can be “DELAY”, “REACHABLE”, “STALE”, “FAILED”, or “PROBE”.
24
Page 29
III-2-3.BASIC SETTINGS –SYSTEM TIME
The System Time represents the date and time. The system uptime defines the passing time after the
system boots up. There is no battery on the switch and hence the system time cannot be saved in the
system. Users can configure the time zone and system time manually by synchronizing the time with the
browser or by enabling the “NTP” service to get the time from a NTP Server.
NTP
Network Time Protocol (NTP) is a clock synchronization protocol, which is used to synchronize the
system time with the NTP server. NTP is one of the oldest Internet Protocols in use from 1985 until now.
It works based on a client-server model, but it can also be used in peer-to-peer relationships. The NTP
application on the switch is follows the client-server model and the switch plays a role in the NTP Client.
CONFIGURE SYSTEM TIME INFORMATION
YSTEM TIME INFORMATION
S
•
。 Current Time: The current date time of the system.
。 System Uptime: The system boot up duration.
NTP Settings
•
。 NTP Mode
"Enable" or "Disable" NTP Service. If NTP Mode is enabled, the system will sync time with NTP
Server on an hourly basis.
。 NTP Server
This field displays the URL or the IP address of the host that provides the NTP Service.
Manual Time Settings
•
。 Time Zone
Select the Time Zone to define the local time offset from GMT.
。 Date Selector
Select the system date manually. The format is "year/month/day".
。 Time Setting
Define the system time manually. The format is "hour:minute:second".
。 Sync with Browser
Select the checkbox to synchronize the system time with the browser time.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
25
Page 30
III-3. Web Management – Redundancy
III-3-1.REDUNDANCY –SPANNING TREE
The Spanning-Tree Protocol is a standard protocol that is defined in IEEE 802.1D. It is used to build
a logical loop-free topology for layer-2 Networks. The basic function of the protocol is to prevent loops
and broadcast flooding around the switches. STP allows spare links in the network design to
provide backup paths when the active link fails and requires a convergence time of 30-50 seconds to
recover the topology when the topology is changed. This prompted the use of Rapid Spanning-Tree
Protocol as it provides a faster convergence when the topology is changed.
RSTP was introduced by IEEE as 802.1w. It can respond within 3 x "Hello Time" when a topology is
changed. The "Hello Time" is a configurable value and it is very important for RSTP. The default RSTP
value is 2 seconds and typically, the convergence time for RSTP is under 6 seconds. RSTP is much faster
than STP. RSTP should be used instead of STP.
The Multiple Spanning-Tree Protocol defined in the IEEE 802.1s is an extension to RSTP for Virtual LANs.
MSTP provides a better alternate path than STP/RSTP for different VLANs. It can make a group of VLANs
more systemized in the topology.
C
ONFIGURE RSTPBASIC INFO R M AT ION
System Time Information
•
RSTP: Enable STP and run "RSTP" for redundancy.
MSTP: Enable STP and run "MSTP" for redundancy.
Disable: Disable STP. Users have to enable another protocol to prevent from loop.
Root Priority
•
It is used to define the "Root Bridge". The bridge with the lowest Root Priority is the "Root Bridge".
If all the bridges are set to the same Root Priority value, the system will select the Root Bridge based
on the MAC Addresses.
The range of Root Priority is from 0 to 61440(multiple of 4096).
The default Root Priority is 32768.
Hello Time
•
It is very important and used to determine the interval to send BPDU (management frame) to check
the RSTP topology and status.
The range of Hello Time is from 1 to 10 second(s).
The default Hello Time is 2 seconds.
Forward Delay
•
A delay/timer is used to determine when to change the Path State from Learning/Listening to
Forwarding.
The range of Forward Delay is from 4 to 30 seconds.
The default Forward Delay is 15 seconds.
26
Page 31
Maximum Age
•
A timer that is used to wait for the Hello BPDU from the Root Bridge. If this device receives the BPDU
before the timer expires, the timer will be reset. Else, the device will send the topology changed
BPDU to notify other devices.
The range of Maximum Age is from 6 to 40 seconds.
The default Maximum Age is 20 seconds.
Note: The relationship between "Hello Time", "Forward Delay", and "Maximum Age" is:
2 x (Forward Delay - 1 sec) >= Max Age >= 2 x (Hello Time + 1 sec)
27
Page 32
CONFIGURE RSTPPORT IN FORM AT I O N
No.
•
Port1 to PortN, where N is based on the total port number.
Path Cost
•
The cost from the current node to another device.
The range of Path Cost is from 0 to 200000000.
The default Path Cost is 0. This implies that the Path Cost is decided by the system.
Port Priority
•
Used to decide the port to be blocked in the Ring topology.
The range of Root Priority is from 0 to 240 and are in multiple of 16.
The default Root Priority is 128.
Admin P2P
•
The Admin P2P is the link-type for each port.
P2P: It is a full-duplex link.
Shared: It is a half-duplex link.
Edge
•
A port that can connect to a non-STP device is called an Edge port. Users can manually fix a port to
non-Edge or Edge.
Auto: The system automatically identifies an Edge or Non-Edge.
Edge: The port is forced to be an Edge port. An edge port will directly be transitioned to the
"Forwarding" state and is not required to wait for the "Forward Delay". If a port is directly connected
to a non-STP device, users can manually set it to "Edge" and enable it to transmit faster.
Non-Edge: The port is forced to be a Non-Edge port. This implies that the port will go through
Learning/Listening to Forwarding state even though it is connected to an end device or not.
Admin STP
•
"Enable" or "Disable" the Spanning-tree protocol that is running on the specific port.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
28
Page 33
RSTPSTATU S
Bridge ID
•
This field shows the unique identity of this node when it is part of a network. It contains 8 bytes the first 2 bytes are for Bridge Priority (configurable) and the remaining 6 bytes are for the MAC
Address (unique).
Root Bridge
•
It is elected from the switches in the STP topology via several STP messages (BPDU). The Root Bridge
is the node with the lowest Root Priority. If all of the nodes are with the same Root Priority, the
Root Bridge will be selected based on their MAC Addresses.
Root Priority
•
It is used to define the "Root Bridge". The bridge with the lowest Root Priority is the "Root Bridge".
If all bridges are set to the same Root Priority value, the system will select the Root Bridge based on
the MAC Addresses.
Root Port
•
It is the port that is connected to the Root Bridge and with the lowest cost. If the Root Port shows
"none", it implies this node is the Root Bridge.
Root Path Cost
•
It is the cost from the current node to the Root Bridge.
Hello Time
•
It is used to determine the interval to send BPDU (management frame) to check the RSTP topology
and status.
Forward Delay
•
It is used to determine when to change the Path State from Learning/Listening to Forwarding.
Max Age
•
It is used during waiting for Hello BPDU from the Root Bridge.
29
Page 34
Speed
RSTP Path Cost
Speed
RSTP Path Cost
4 Mbps
5,000,000
1000 Mbps (1 Gbps)
20,000
10 Mbps
2,000,000
2000 Mbps (2 Gbps)
10,000
16 Mbps
1,250,000
10000 Mbps (10 Gbps)
2,000
100 Mbps
200,000
No.
•
Port 1 to Port N, N is based on the total port number.
Role
•
This field shows the role of the STP port.
Root: This is the root port, which is connected to the Root Bridge with the lowest cost.
Designated: This is the designated port, which can send the best BPDU on the segment to other
connected nodes.
Alternate: This is the alternate port, which is blocked. This port can still receive useful BPDU from another bridge. When it receives a useful BPDU, it will help to forward it on the segment.
Backup: This is the backup port, which is blocked. It corresponds with “Alternate Port” to the
blocking state. This port also receives useful BPDU, but the BPDU is from the same bridge. When it
receives a useful BPDU, it will help to forward it on the segment.
Disabled: The port is not linked up.
Path State
•
This field shows the path state of this STP port.
Discarding: The port state can be “Disabled”, “Blocking”, or “Listening”. The incoming frames are
dropped and learning MAC addresses are stopped.
Learning: The port is learning MAC addresses, but the incoming frames are dropped.
Forwarding: The port in the forwarding state forwards the incoming frames based on the learned
MAC address table.
Port Cost
•
This is the cost from the port to the Root Bridge. Spanning-tree Protocol assumes the path cost is
determined by the access speeds of the links. The default RSTP path cost is shown in the following
table:
•
Port Priority
The Port Priority is used to determine the Root Port on a non-root bridge. The port with the lowest
Port Priority value gets the higher priority.
30
Page 35
Oper. P2P
•
This field shows the link-type of the STP port. P2P means “point-to-point” and Shared means
“point-to-multiple”.
Oper. Edge
•
This field shows the edge state of this STP port.
C
ONFIGURE MSTIINFORMATION
Basic Settings
•
。 Region Name
The Region Name is the name of the MST Region. The switches in the same MST Region must be
set to the same Region Name.
The max length for the Region Name is 32 characters.
Note:#, \, ', ", ? are invalid characters.
。 Revision Number
The Revision Number is the level of the MST Revision. The switches in the same MST Region must
be set to the same Revision Number.
The range of the Revision Number is from 0 to 65535.
The default Revision Number is 0.
31
Page 36
Instance Settings
•
。 Instance No.
The Instance No. is from 1 to 15.
。 Included VLAN
The configured VLANs are involved in the specific Instance.
The format is: 10, 20, 30…. “Comma” is used to separate VLAN IDs.
。 Priority
The priority is used to define the “Root Bridge” that is used to communicate with other MSTI
Region.
The range of the Root Priority is from 0 to 61440 (multiple of 4096).
The default Root Priority is 32768.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
32
Page 37
CONFIGURE MSTIPORT IN FOR M AT I O N
Instance Selector
•
Select the instance to configure the ports. The Instance No. is from 1 to 15.
No.
•
Port1 to PortN, where N is based on the total port number.
Path Cost
•
The Path Cost is the cost from the current node to another device.
The range of the Path Cost is from 0 to 200000000.
The default Path Cost is 0. This implies that the Path Cost is decided by the system.
Port Priority
•
This is used to identify the port to be blocked in the Ring topology.
The range of the Root Priority is from 0 to 240 and is in multiples of 16.
The default Root Priority is 128.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
33
Page 38
III-3-2.REDUNDANCY –ERPS
Ethernet Ring Protection Switching (ERPS) applies the protection switching mechanism for Ethernet
traffic in a ring topology. This mechanism is defined in ITU-T G8032. You can avoid the possible loops in
a network by implementing the ERPS function. This is done by blocking the flow of traffic to the Ring
Protection Link (RPL) for protecting the entire Ethernet ring.
When an ERPS is implemented in a ring topology, only one switch is allocated as the owner. This
switch is in charge of blocking the traffic in the RPL to avoid loops. The switch adjacent to the RPL owner
is called the RPL neighbor node and it is responsible for blocking the end of the RPL during normal
condition. The participating switches that are adjacent to the RPL owner or neighbor in a ring are called
the members or RPL next-neighbor nodes. The primary function of these switches is to forward the
received traffic.
To make sure that a ring is up and loop-free, Ring Automatic Protection Switching message is sent
regularly as control messages by nodes on the ring. The RPL owner identifies a signal failure (SF) in a
ring when the RPL owner misses the poll packets or reads from the fault detection packets. When the
fault is identified, the RPL owner unblocks the ring protection link (RPL) and permits the protected VLAN
traffic through.
ERPS, similar to STP, provides a loop-free network by using polling packets to detect faults. If a fault
occurs, ERPS restores itself by sending traffic over a protected reverse path rather than making a
calculation to identify the forwarding path. The fault detection mechanism in the ERPS enables the ERPS
to join in less than 50 milliseconds and recovers quickly to forward traffic.
34
Page 39
Role
Description
There is only one “Owner” in the ERPS ring topology. The Owner is
responsible for blocking the traffic in RPL and protects one side of the RPL.
There is only one “Neighbor” in the ERPS ring topology. The Neighbor is the
port connected with the Owner port and protects another side of the RPL.
The Interconnection port connects a major-ring and a sub-ring. If one of the
set to “Disabled” automatically.
None
The “None” implies that the port is other than an Owner or a Neighbor.
CONFIGURE ERPSINFORMATION
For more information, hover the mouse over the icon in the system.
ERPS Ring
•
There are three rings supported on a device. Using the dropdown select to change the ERPS Rings.
Basic Settings
•
。 ERPS Status
“Enable” or “Disable” ERPS protocol running on the switch. By default, the ERPS protocol is
enabled.
。 Ring Type
Configure the Ring to be a “Major-ring” or a “Sub-ring”.
。 ERPS Port 0
The ERPS Port 0 is also called “West Port”. Select one of the switch ports to be the Port 0 of ERPS
and decide the role of the port.
。 ERPS Port 1
The ERPS Port 1 is also called “East Port”. Select one of the switch ports to be the Port 1 of ERPS
and decide the role of the port.
Note: Only one of the switch ports can be configured as ERPS Port 0 or ERPS Port 1.
Owner
Neighbor
Interconnection
。 ERPS Ring ID
ports on the switch is set to “Interconnection” role, the other port will be
35
Page 40
The ID is the identifier of the ring. The members in the same ring must be set to the same ERPS
Ring ID.
The range of the ERPS Ring ID is from 1 to 239.
The default ERPS Ring ID is 1.
。 R-APS Channel
The R-APS Channel is used to forward ERPS information and is mapped to the VLAN IDs. These
VLAN IDs cannot be set as traffic VLANID. The members in the same ring must be set to the same
R-APS Channel.
The range of the R-APS Channel is from 1 to 4094.
The default R-APS Channel is 1000.
Advanced Settings
•
The Advanced Settings field is only displayed when the “Advanced Settings” checkbox is selected in
the Basic Settings.
。 Major-Ring Virtual Channel
This field is used to configure the specific virtual channel for transmitting the management
packets of the sub-ring through the major-ring.
。 Sub-Ring Virtual Channel
“Enable” or “Disable” using virtual channel in the sub-ring. When the Sub-Ring Virtual Channel is
enabled, ERPS protocol will transmit management packets by the configured virtual channel.
。 Revertive Mode
“Enable” or “Disable” the ERPS Revertive Mode. If the Revertive Mode is enabled, the blocked link
will revert to the RPL link after the failed link is recovered.
By default, the ERPS Revertive Mode is enabled.
。 MEL Value
MEL field is for the compliance with other devices which are running ITU-T G.8031from
third-party. The MEL implies the MEG Level. It is a field in the R-APS PDU. A large MEL value
involves more devices. For example, level 7 contains levels 0 to 6.
The range of the MEL Value is from 0 to 7.
The default MEL Value is 7.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
36
Page 41
State
Description
Initial
The ERPS protocol is disabled in the selected ring.
The ERPS protocol is enabled in the selected ring and the ERPS ring is
under control by the RPL Owner.
The ERPS protocol is enabled in the selected ring. The ERPS ring is
recovery from Protection state and is waiting for the wtr timer expired.
The ERPS protocol is enabled in the selected ring but one of the links in
the ring is broken. The RPL changes to forward to keep the ring working.
ERPSSTAT U S
ERPS Ring
•
There are three rings supported on a device. Using the dropdown select to change the ERPS Rings.
Basic Information
•
。 Ring Type
The type of the selected ERPS Ring shows “Major-ring”, “Sub-ring with virtual channel”, or
“Sub-ring without virtual channel”.
。 ERPS Status
The status of ERPS is “Enable” or “Disable” in the selected ERPS Ring.
。 Ring State
There are two states for ERPS Rings: Normal and Abnormal.
。 Node State
There are three states for ERPS Nodes: Initial, Idle, Pending, and Protection.
Idle
Pending
Protection
。 ERPS Ring ID
The ID is the identity for the selected ERPS Ring.
。 R-APS Channel
This field shows the configured R-APS Channel.
。 Virtual Channel
This field shows the virtual channel of sub-ring. If the field shows “default” implies the virtual
channel follows the R-APS Channel.
37
Page 42
。 Revertive Mode
Show the Revertive Mode is enabled (Yes) or disabled (No).
。 MEL Value
The field is the configured MEL value.
Port Status
•
。 Interface
The configured port presents the ERPS port 0/1 in the ERPS protocol.
。 Role
Display the configured role for the configured port.
38
Page 43
Version
Web Setting
Authentication
Encryption
Method
Read Only Community
Community String
No
String match for authentication
Read-Write Community
Community String
No
String match for authentication
Security Level –
Privacy
Access by an account (admin or
or SHA
Access by an account (admin or
to 32 characters.
III-4. Web Management – Management
III-4-1.MANAGEMENT –SNMP
Simple Network Management Protocol (SNMP) is a standard for collecting and structuring information
on the managed devices of the IP network. It can also modify some of the information to change the
behavior of the devices. SNMP is usually used in monitoring the network. The users can remotely query
the information provided by the devices running SNMP.
The switches support SNMP v1, v2c, and v3. SNMP v1 and v2c authenticates with a community string
for “read-only” or “read-write” permission. The SNMP v3 authentication requires the user to select an
authentication level (MD5 or SHA) and also supports data encryption to make the data safer.
For the SNMP version and authentication method relationship, refer to the table below:
v1 & v2c
v3
No Authentication, No
Security Level –
Authentication, No
Privacy
Security Level –
Authentication, Privacy
No No
MD5 / SHA No
MD5 / SHA
Yes
AES / DES
Access by an account (admin or
user)
user) and password with more than
8 characters, which is based on MD5
user) and password more than 8
characters, which is based on MD5
or SHA. The data encryption is based
on AES or DES and the key requires 8
39
Page 44
CONFIGURE SNMPSERVER IN FORM AT I O N
Basic Settings
•
。 SNMP Version
The system enables the SNMP “v1, v2c and v3” authentication by default. The users can enable
the SNMP server on only “v1 and v2c” or “v3”. “None” refers to disabling the SNMP server.
。 Read Only Community
The community used to access the SNMP server with the “read-only” privilege.
The max length for the Read Only Community is 32 characters.
Note:#, \, ', ", ? are invalid characters.
。 Read-Write Community
The community used to access the SNMP server with the “read-write” privilege.
The max.length for the Read-Write Community is 32 characters.
Note: #, \, ', ", ? are invalid characters.
SNMPv3 Settings
•
This section is displayed only when the SNMP Version is set to “v3” or “v1, v2c and v3”. Two
accounts are provided – Admin and User to access the SNMP agent. The users can set different levels
for the 2 accounts.
。 Security Level
No Authentication, No Privacy: Access by an account “admin” or “user”.
Authentication, No Privacy: Access by an account “admin” or “user” with password.
40
Page 45
Authentication, Privacy: Access by an account “admin” or “user” with password and the data will
be encrypted.
。 Authentication Type
Two algorithms are provided - MD5 and SHA for authentication password.
。 Authentication Password
A string/key is used to authenticate the SNMP Server and obtain the access permission. It will be
hashed by MD5 or SHA before authentication.
The min length for the Read-Write Community is 8 characters.
The max length for the Read-Write Community is 32 characters.
Note:#, \, ', ", ? are invalid characters.
。 Encryption Type
Two algorithms are provided - AES and DES for data encryption.
。 Encryption Password
A string/key is used to encrypt the data that is sent to the SNMP server.
The min length for the Read-Write Community is 8 characters.
The max length for the Read-Write Community is 32 characters.
Note:#, \, ', ", ? are invalid characters.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
41
Page 46
CONFIGURE SNMPTRAP INFORMATION
Basic Settings
•
。 Trap M ode
The system enables the SNMP “v1, v2c and v3” authentication by default. Users can enable the
SNMP server only on “v1 and v2c” or “v3”. “None” indicates disabling the SNMP server.
。 Inform Retry
The SNMP trap will send “Retry” times when the trap set to “v2 Inform” or “v3 Inform” mode.
The range of the Inform Retry is from 1 to 100.
The default Inform Retry is 5.
。 Inform Timeout
The interval is used to send trap when the trap set to “v2 Inform” or “v3 Inform” mode.
The range of the Inform Retry is from 1 to 300 second(s).
The default Inform Retry is 1 second.
。 Trap Receiver IP
The IP address is the IP address of the trap server to receive the trap information.
。 Community
The string in the SNMP trap is the identity of the device.
The max length for the Community is 32 characters.
Note: #, \, ', ", ? are invalid characters.
SNMPv3 Trap/Inform Settings
•
This section is displayed only when Trap Mode are set to “v3 Trap” or “v3 Inform”.
。 Username
42
Page 47
Specify the username for authentication with the SNMP trap server.
。 Engine ID
The Engine ID is the identifier for the given SNMP application.
。 Security Level
No Authentication, No Privacy: Access using the username assigned to the users.
Authentication, No Privacy: Access using the username assigned to the users with password.
Authentication, Privacy: Access using the username assigned to the users with password and the
data will be encrypted.
。 Authentication Type
Two algorithms are provided - MD5 and SHA for authentication password.
。 Authentication Password
A string/key is used to authenticate the SNMP trap server and obtain the permission. It will be
hashed by MD5 or SHA before authentication.
The min length for the Read-Write Community is 8 characters.
The max length for the Read-Write Community is 32 characters.
Note:#, \, ', ", ? are invalid characters.
。 Encryption Type
Two algorithms are provided - AES and DES for data encryption.
。 Encryption Password
A string/key is used to encrypt the data sent to the SNMP trap server.
The min length for the Read-Write Community is 8 characters.
The max length for the Read-Write Community is 32 characters.
Note:#, \, ', ", ? are invalid characters.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
43
Page 48
III-4-2.MANAGEMENT –DHCP
DHCPSERVER/CLIENT
DHCP, Dynamic Host Configuration Protocol, is a standardized protocol used in the IP networks. The
DHCP Server holds an IP address pool and when a DHCP Client request for an IP address, the DHCP
Server picks an IP address from the pool and assigns it to the client. DHCP Server also manages other IP
information such as Default Gateway and DNS Server. DHCP is very useful to configure the IP
information for a number of devices. Only the administrator can enable the DHCP Client for each device
and setup the DHCP Server. The clients will then obtain a unique IP address and other IP settings to
connect to the network.
DHCP
SERVER BINDING
Apart from dynamically allocating an IP address to a DHCP Client, the DHCP Server also provides a
function to manually assign a static IP address to the device with a specific MAC Address. This is called
as DHCP Server Binding.
DHCP
RE L AY/OPTION82
In a large network, there might be several subnets existed and the DHCP Client is not able to serve by
DHCP Servers directly. In this case, we need a relay agent to help to transmit the request frames to the
DHCP Servers. When a relay agent receives the broadcast request frame from a DHCP Client, the relay
agent will transmit the frame to the DHCP Servers, which are in the same subnet by unicast.
Option 82 is an information option to identify the clients by Circuit ID and Remote ID. The Circuit ID is
an identity containing the interface name and/or VLAN information, and the Remote ID is to identify
the remote host (the relay agent). The DHCP Server can distribute an IP address to the DHCP Client
according to Option 82 information and make the IP addresses more controllable.
The frame format for the Circuit ID is as below:
VLAN
•
The VLAN field is for the management VLAN ID, which is natively set to 1.
Module
•
The stack number for the device sending the DHCP request is on. For industrial switches, this byte is
always filled as0.
Port
•
The port number identifies the incoming DHCP request frame/DHCP Client.
The frame format for the Remote ID is as below:
MAC Address
•
By default, the MAC address is set to the MAC address of DHCP relay agent.
44
Page 49
CONFIGURE DHCPCLIENT
IPv4 Mode
•
Set the IPv4 Mode to “DHCP Client” to enable the DHCP Client. The system sends a discovery frame
to the network and tires to obtain an IP address from the DHCP Server.
After enabling the DHCP Client, users need to connect to the Console Port to get the IP address by
using “show ip address” on the CLI.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
45
Page 50
CONFIGURE DHCPSERVER INFORMATION
Server Status
•
Shows the status of the DHCP server: Down or Up.
Server Mode
•
“Enable” or “Disable” the DHCP Server function.
Start IP Address
•
Set the range of the IP pool. The “Start IP Address” is the starting.
“Start IP Address” must be in the same subnet as that of the switch itself.
End IP Address
•
Set the range of IP pool. The “End IP Address” is the end.
“End IP Address” must be in the same subnet as that of the switch itself.
Default Gateway
•
Set the Default Gateway for the DHCP Clients to make them connect to the WAN.
“Default Gateway” must be in the same subnet as that of the switch itself.
DNS Server
•
Set the DNS Server for the DHCP Clients to make them connect to another device based on the URL
instead of IP address.
Lease Time
•
DHCP Server leases an IP address to a device for a period of time. When the lease time expires, the
DHCP server may assign a different IP address in the pool to the device.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
46
Page 51
CONFIGURE DHCPSERVER BINDING INFORMATION
Binding ID
•
An ID used to identify the binding.
The range of the Binding ID is from 1 to 32.
MAC Address
•
The device with the specified MAC Address will be assigned to the static Binding IP Address.
Binding IP Address
•
A static IP Address will be assigned to the specified MAC Address.
•
•
•
: Click the plus icon to add a DHCP Binding row.
: Click the remove icon to delete the DHCP Binding row.
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
47
Page 52
CONFIGURE DHCPRELAY INFORMATION
Relay Basic Settings
•
。 Relay Mode
“Enable” or “Disable” the DHCP Relay function.
。 Relay Option82
“Enable” or “Disable” the DHCP Relay with Option82 tag.
。 Helper Address 1 - 4
The IP Addresses of the DHCP Servers provide IP addresses to the DHCP Clients. A backup of Four
Helper Addresses are available during breakdown.
Relay Untrust
•
。 No.
Port1 to PortN, where N is based on the total port number.
。 Untrust Status
“Enable” or “Disable” to untrust the specific port. If the untrusted status is enabled on a port, the
system will drop the DHCP management frames on the port.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
48
Page 53
III-4-3.MANAGEMENT –POE
The PoE, or Power over Ethernet, allows switches to provide electric power along with data on the
twisted pair Ethernet cables. The Power over Ethernet defined in IEEE 802.3af provides up to 15.4 W
and IEEE 802.3at provides up to 25.5 W. It requires category 5 cables or better to support high power
levels. PoE is helpful when the AC power is not available or is available with high cost. It is usually used
in surveillance IP cameras, I/O sensors, wireless access points, and IP telephones.
CONFIGURE POWER OVER ETHERNET (POE)
No.
•
Port 1 to Port N, where N is based on the total PoE port number.
Mode
•
“Enable” or “Disable” PoE function on the specific port.
Force
•
Turn on or turn off the function to provide power forcedly on the specific port. When the forced
mode is turned on, the system will provide power to that port even there is no device connected to
this port.
Status
•
The field shows the PoE status of the specific port.
On: PoE is enabled on the port and power is delivered on the port.
Off: PoE is enabled on the port but no Powered Device (PD) is connected.
Disabled: PoE is disabled on the port.
Class
•
The field shows the class followed by the PD. The acceptable power of the class is defined in the
IEEE 802.3af/at.
Voltage
•
This field shows the output voltage that PSE provided. The power output of the boost switch will be
boosted to 53V.
Power
•
The Consumption field contains provided power in watts. The PSE can provide up to 30Watts and
the PDs can receive up to 25.5Watts.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
49
Page 54
CONFIGURE POEKEEP ALIVE
No.
•
Port1 to PortN, where N is based on the total PoE port number.
Detect
•
“Enable” or “Disable” to detect the Powered Device (PD) on the specific port. When the detection is
enabled, the system pings the configured IP Address on every Ping Interval.
IP Address
•
The field is the IP Address of the Powered Device (PD).
Ping Interval
•
The Ping Interval is the duration to ping the Powered Device (PD).
The range of the Ping Interval is from 1 to 65535 seconds.
The default Ping Interval is 30seconds.
Hold Time
•
The Hold Time is used when the ping fails. The system will wait for the Hold Time to expire and then
try to ping the PD again.
The range of the Hold Time is from 1 to 65535 seconds.
The default Hold Time is 60seconds.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
50
Page 55
CONFIGURE POESCHEDULE
Port Selector
•
Select the port number to configure the PoE Schedule.
Port1 to PortN, where N is based on the total PoE port number.
Schedule Mode
•
“Enable” or “Disable” to provide power by the schedule on the specific port.
Enable (for each day)
•
The week is from Sunday to Saturday.
Week (The x-ray of the table)
•
The week is from Sunday to Saturday.
Hour (The y-ray of the table)
•
The hour is from 00 (00:00) to 23 (23:00).
Users can select the checkbox with the Week and Hour in the table to enable the PoE Schedule on
the specific time. For example, if the user wants the PoE to be enabled only on Monday from 6:00 to
7:00 and on Wednesday from 13:00 to 15:00, the following checkboxes must be selected–“Mon-06 ”,
“Mon-07”, “ We d-13 ”, “ We d-14”, and “Wed-15”.
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
51
Page 56
CONFIGURE POEPRIORITY
Basic Setting
•
。 Priority Mode
Configure the priority mode to provide the power to PDs. There are three modes: Actual, Class,
and Static.
Actual: Provide the power according to the requirement from the PD.
Class: Follow the IEEE 802.3at/af classes to provide power. For example, the PD follows class 4 so
the PSE will provide 30 Watt to it.
Static: Provide the fixed power that configured in the “Limit” fields by the user to the PDs.
。 Power Budget
This field defines the maximum power that can provide to all the connected PDs.
The range of Power Budget is from 0 to 5000 Watt.
The default Power Budget is 1600 Watt.
Power Settings
•
。 No.
Port1 to PortN, where N is based on the total PoE port number.
。 Priority
Assign the PoE priority to high, middle, or low for the specific port.
。 Limit
Set the power limitation for the specific port. The system will provide the limited watts to the PD
without detecting how many watts the PD needs. This field only works when the priority mode is
set to “Static”.
The range of Limit is from 4 to 35 Watt.
The default Limit is 35 Watt.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
52
Page 57
Data Access Type
Function Code
Function Name
Physical Discrete Inputs
2
Read Discrete Inputs
Internal Bits or Physical Coils
1
Read Coils
Word Access
(16-bit Access)
Physical Input Registers
4
Read Input Registers
Physical Output Registers
3
Read Holding Registers
III-4-4.MANAGEMENT –INDUSTRIAL PROTOCOL
There are two industrial protocols provided in the switch – EtherNet/IP and Modbus/TCP.
EtherNet/IP is an industrial network protocol that linked up the Common Industrial Protocol (CIP) with
standard Ethernet. EtherNet/IP takes advantage of both of the Internet Protocol suite and IEEE 802
standard, which are the most widely deployed collections of Ethernet standards, to define the features
and functions for its transportation, networking, data link and physical layers. CIP makes use of
object-oriented design to provide EtherNet/IP with the services and device profiles needed for real-time
control applications. The object-oriented design of the CIP is also used to promote consistent
implementation of automation functions into a diverse ecosystem of products. EtherNet/IP defines how
to organize the data in a TCP/UDP packet and transfers the packet in the application layer.
Modbus is a popular communication protocol used for the industrial serial devices. It is usually working
as “master-slave” architecture and working with programmable logic controllers which are also called
PLCs. The Modbus/TCP implies to provide Modbus Messaging service on the TCP/IP, so that the devices
which are running Modbus can communicate with each other with Modbus messages. The Modbus
messages are encapsulated with an Ethernet TCP/IP wrapper on the basis of the standard. During the
transmission, the switches can only acquire the encapsulated information when the Modbus/TCP is
enabled. If users would like to understand the real content of Modbus message, users have to install
other utilities such as “ModScan”. Our switches implements the Modbus/TCP registers including system
information, firmware information, port information, and packet information. The details refer to the
“Modbus Data MAPPING INFORMATION” section”.
MODBUS DATA FORMAT A N D FUNCTION CODE
The primary four types of Modbus/TCP data format are as following:
Bit Access
53
Page 58
Address Offset
Data Type
Interpretation
Description
System Information
Port 1 to Port 8 Status
0x0000:
Disable
0x0001:
Enable
Port 1 to Port 8 Status Configuration
0x0000:
Disable
0x0001:
Enable
Address Offset
Data Type
Interpretation
Description
System Information
Product Name = “SWITCH”
Word 0 Hi byte =
‘S’
Word 0 Lo byte =
‘W’
Word 1 Hi byte =
‘I‘
Word 1 Lo byte =
‘T’
Word 2 Hi byte =
‘C’
Word 2 Lo byte =
‘H’
0x0050
1 word
Product Serial Number
Firmware Version
For example:
Word 0 =
0x0103
Word 1 =
0x0200
Firmware version is 1.3.2
Firmware Release Date
For example:
Word 0 =
0x1719
Word 1 =
0x1506
Firmware was released on 2015-06-17 at 19
o’clock
Ethernet MAC Address
Ex: MAC = 01:02:03:0A:0B:0C
Word 0 Hi byte =
0x01
Word 0 Lo byte =
0x02
Word 1 Hi byte =
0x03
Word 1 Lo byte =
0x0A
Word 2 Hi byte =
0x0B
Word 2 Lo byte =
0x0C
Power 1
0x0000:
Off
0x0001:
On
Modbus Data Mapping Information
In the following tables, we assume the total port number is 8.
The following table is for Function Code 3 (Holding Registers) / Function Code 6.
0x0000 to
0x0008
1 word HEX
The following table is for Function Code 4 (Input Registers). The data map addresses in the following
table starts from Modbus address 30001. For example, the address offset 0x0000H equals Modbus
address 30001, and the address offset 0x0030H equals Modbus address 30049. All the information read
from our switches is in the HEX mode and users can refer to the ASCII table for the translation (e.g.
0x4B=’K’, 0x74=’t’).
0x0030 20 words ASCII
0x0051 2 words HEX
0x0053 2 words HEX
0x0055 3 words HEX
0x0058 1 word HEX
54
Page 59
Power 2
0x0000:
Off
0x0001:
On
Fault LED Status
0x0000:
Boot error
0x0001:
Normal
0x0002:
Fault
DO1
0x0000:
Off
0x0001:
On
Port Information
Port 1 to Port 8 Status
0x0000:
Link down
0x0001:
Link up
0x0002:
Disable
0xFFFF:
No port
Port 1 to Port 8 Speed
0x0000:
10M-Half
0x0001:
10M-Full
0x0002:
100M-Half
0x0003:
100M-Full
0xFFFF:
No port
Port 1 to Port 8 Flow Ctrl
0x0000:
Off
0x0001:
On
0xFFFF:
No port
Port 1 to Port 8 Description
Port Description = “100Tx,RJ45.”
Word 0 Hi byte =
‘1’
Word 0 Lo byte =
‘0’
Word 1 Hi byte =
‘0’
Word 1 Lo byte =
‘T’ …
Word 4 Hi byte =
‘4’
Word 4 Lo byte =
‘5’
Word 5 Hi byte =
‘.’
Word 5 Lo byte =
‘\0’
Packet Information
Port 1 to Port 8 Tx Packets
0x13248635
Word 0 =
1324
Word 1 =
8635
Port 1 to Port 8 Tx Bytes
0x13248635
Word 0 =
1324
Word 1 =
8635
Port 1 to YY Rx Packets
0x13248635
Word 0 =
1324
Word 1 =
8635
0x0059 1 word HEX
0x005A 1 word HEX
0x0082 1 word HEX
0x1000 to
0x1008
0x1100 to
0x1108
0x1200 to
0x1208
0x1300 to
0x1313 (Port 1)
0x1314 to
0x1327 (Port 2)
…
0x138C to
0x139F (Port 8)
1 word HEX
1 word HEX
1 word HEX
20 words ASCII
0x2000 to
0x200F
0x2080 to
0x208F
0x2100 to
0x21(YY*2-1)
2 words HEX
2 words HEX
2 words HEX
Ex: port 1 Tx Packet Amount = 13248635
Received Modbus response:
Ex: port 1 Tx Btyes Amount = 13248635
Received Modbus response:
Ex: port 1 Rx Packet Amount = 13248635
Received Modbus response:
55
Page 60
Port 1 to Port 8 Rx Bytes
0x13248635
Word 0 =
1324
Word 1 =
8635
Ex: port 1 Rx Btyes Amount = 13248635
0x2180 to
0x218F
2 words HEX
Received Modbus response:
Configure Industrial Protocols Information
Modbus Mode
•
“Enable” or “Disable” the Modbus/TCP function.
Ethernet/IP Mode
•
“Enable” or “Disable” the Ethernet/IP function.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
56
Page 61
III-4-5.MANAGEMENT –UPNP
UPnP is Universal Plug and Play, a set of networking protocols that permit the network devices to
seamlessly discover each other in the networks. It is promoted by the UPnP Forum, but since 2016, all
UPnP efforts are managed by the Open Connectivity Foundation.
UPnP extends “plug and play” to connect to a network device without configuration. When an UPnP
device such as printer, Wi-Fi AP, or mobile device connects to a network, it will automatically establish
the working configurations with other devices.
CONFIGURE UPNPINFORMATION
UPnP Mode
•
“Enable” or “Disable” the UPnP function.
Advertisement Interval
•
A time period used to send the UPnP advertisement frame.
The range of the Advertisement Interval is from 300 to 86400 seconds.
The default Advertisement Interval is 1800seconds.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
57
Page 62
III-5. Web Management – L2 Switching
III-5-1.L2SWITCHING –PORT MANAGEMENT
Port Management contains a “Description” field that is used to describe the port, “Enable” or “Disable”
option to turn on or turn off a specific port, configure the speed-duplex for the port, and Flow Control
on the port. In the Port Status page, the users can obtain information such as Link Status, Speed, Duplex,
Flow Control, Tx and Rx in Bytes, and PoE status. These are very helpful for the administrator to manage
the interfaces on the switch.
Configure Port Information
No.
•
Port 1 to Port N, where N is based on the total port number.
Description
•
The description for the port is helpful for the administrator to identify the difference between the
ports.
The max length for the Description is 32 characters.
Note: #, \, ', ", ? are invalid characters.
Link Status
•
Link Status shows “Up”, “Down”, or “Disable” to reflect the link status of the port.
Admin Status
•
“Enable” or “Disable” the Admin Status of the port to restrict the transmission on the port.
Note: Administrator can turn off the un-used port to secure the network with unexpected device.
Speed
•
The users are able to manually fix the speed and duplex or automatically run auto-negotiation to
58
Page 63
determine the speed and duplex.
。 Auto: The port follows IEEE 802.3u protocol to auto-negotiate with connected device.
。 100M-Full: The port transmits frames with 100Mbits per second speed and full duplex.
。 100M-Half: The port transmits frames with 100Mbits per second speed and half duplex.
。 10M-Full: The port transmits frames with 10Mbits per second speed and full duplex.
。 10M-Half: The port transmits frames with 10Mbits per second speed and half duplex.
Flow Control
•
“Enable” or “Disable” the Flow Control when the speed is set to “Auto”. Enabling Flow Control helps
to prevent the traffic from losing when the network is in congestion.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
SFPDDMSTATUS
SFP Port Selector
•
Select the SFP port number to display SFP DDM information.
Transceiver Info
•
If there is no SFP module inserted or the information cannot be read, the field will show “-“. If a SFP
module is plugged into the SFP slot, the following information will be shown:
。 Vendor Name
This field shows the brand or vendor name of the SFP module.
。 Part Number
This field shows the model name (part number) of the SFP module.
。 Transceiver Type
This field shows the transceiver type of the SFP module including transmitting speedand the type
of fiber. If there is no SFP module inserted or the transceiver type cannot be read, the field will show “Unknown“.
。 Laser Wavelength
This field shows the laser operating wavelength of the SFP module.
。 Link Length
This field shows the maximum link length of the SFP module.
59
Page 64
DDM Module
•
This section only shows when the SFP DDM is supported on the inserted SFP module.
。 Real Time Value
The current operating information including temperature, voltage, current, Tx power, and Rx
power.
。 Alarm Warning
The default configured threshold for triggering the alarm and system warning. There are 5 types
of information (temperature, voltage, current, Tx power, and Rx power) and 4 levels of alarm
and warning (high alarm/warning, low alarm/warning).
Detailed Port Status
There are two methods to link to detailed port status (RMON). One is from menu and the other is from
the front panel picture. Users can directly click the port on the front panel and then the page will
redirect to the detailed port status page of the specific port. The RMON is a set of standard Simple
Network Management Protocol (SNMP) and it is useful to monitor and manage the incoming and
outgoing traffic.
60
Page 65
Port Selector
•
Select the port number to monitor the RMON information.
Port 1 to N, where N is based on the total port number.
Received Packets
•
。 Rx Octets: the total received traffic in bytes
。 Rx Unicast: the number of received unicast packets
。 Rx Multicast: the number of received multicast packets
。 Rx Broadcast: the number of received broadcast packets
。 Rx Pause: the number of MAC Control packets received on the specific interface with an opcode
indicating the PAUSE operation.
Received Size Counter
•
。 Rx 64 Bytes: the number of received packets that were 64 octets
。 Rx 65-127 Bytes: the number of received packets that were from 65 to 127 octets
。 Rx 128-255 Bytes: the number of received packets that were from 128 to 255 octets
。 Rx 256-511 Bytes: the number of received packets that were from 256 to 511 octets
。 Rx 512-1023 Bytes: the number of received packets that were from 512 to 1023 octets
。 Rx 1024-1518 Bytes: the number of received packets that were from 1024 to 1518 octets
61
Page 66
Received Error Counter
•
。 Rx Collision: the total number of collisions on the Ethernet segment.
。 Rx CRC/Alignment: the total number of received packets that have either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral
number of octets (Alignment Error).
。 Rx Drop: the total number of dropped packets due to lack of resources.
。 Rx Fragment: the total number of received packets that are less than 64 octets and had either a
bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error).
。 Rx Jabber: the total number of received packets that are longer than 1518 octets and had either a
bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error).
。 Rx Oversize: the total number of received packets that are longer than 1518 octets.
。 Rx Undersize: the total number of received packets that are less than 64 octets.
Transmitted Packets
•
。 Tx Octets: the total transmitted traffic in bytes.
。 Tx Unicast: the number of transmitted unicast packets
。 Tx Multicast: the number of transmitted multicast packets
。 Tx Broadcast: the number of transmitted broadcast packets
。 Tx Pause: the number of MAC Control packets transmitted on the specific interface with an
opcode indicating the PAUSE operation.
Transmitted Error Counter
•
。 Tx Discard: the number of outbound packets which are chosen to be discarded even though no
errors had been detected. One possible reason for discarding such a packet could be to free up
buffer space.
。 Tx Error: the number of outbound packets that could not be transmitted because of errors.
62
Page 67
PORT STATUS
Port
•
Port 1 to N, where N is based on the total port number.
Link Status
•
Link Status displays the link state (“Up” or “Down”) of the port. If the port is disabled, it displays
“Disabled”.
Speed
•
Speed displays the access speed in bit per second of the port. If the port is linked down, it
displays“-“.
Duplex
•
Duplex displays the link-type (Full or Half) of the port. If the port is linked down, it displays“-“.
Flow Control
•
It is the state (On or Off) of the Flow Control.
Rx Byte
•
This is the total received frames formatted in byte.
Tx Byte
•
This is the total transmitted frames formatted in byte.
PoE
•
PoE displays the PoE state (Delivery, No PD, Disabled, None) of the port. If the port does not support
PoE function, it displays “None”.
Note: This information is displayed on the system that supports the PoE function.
Clear Rx/Tx
•
Select the specific ports and click the “Click Selected” button to clear the Tx/Rx Byte information or
click “Click All” button to clear all ports’ Tx/Rx Byte information.
63
Page 68
III-5-2.L2SWITCHING –IGMPSNOOPING
Internet Group Management Protocol (IGMP) is used in communicating among hosts and establishing a
multicast group membership on the IPv4 networks (Layer 3). IGMP provides the ability to prune
multicast traffic to those who need this kind of traffic and reduce the amount of traffic on the network.
However, switches work on the MAC Layer (Layer 2) and are unable to obtain IGMP information. IGMP Snooping allows the switch to listen to the IGMP communication between hosts and routers, and
maintains a table of multicast IPs and group members. IGMP Snooping can prevent the hosts on the LAN
from receiving traffic from a non-joined multicast group and save bandwidth of the network.
Configure IGMP Snooping Information
Basic Setting
•
。 Mode
“Enable” or “Disable” the IGMP Snooping function.
。 Last-Member Count
The count is the number of times that the router sends IGMP query messages to receive the leave
message.
The range of the Last-Member Count is from 2 to 10.
The default Last-Member Count Interval is 2.
。 Last-Member Interval
The interval is the period to send IGMP query messages.
The range of the Last-Member Interval is from 1 to 25 seconds.
The default Last-Member Interval is 1 second.
64
Page 69
Fast-Leave Setting
•
。 No.
Port 1 to N, where N is based on the total port number.
。 Fast-Leave Mode
“Enable” or “Disable” the fast-leave function on the specific port. If the fast-leave mode is enabled
on the port, the switch will close the multicast stream when receiving a leave message on this
port without further action.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
65
Page 70
CONFIGURE IGMPSNOOPING QUERIER INFORMATION
Basic Settings
•
。 Mode
“Enable” or “Disable” the IGMP Snooping Querier function. If it is enabled, the system sends IGMP
snooping version 1 and 2 queries.
。 Querier Interval
This period is the interval to send the IGMP snooping queries.
The range of the Querier Interval is from 1 to 3600 seconds.
The default Querier Interval is 125 seconds.
。 Query Max Response Time
This is a timer to wait for the member response of the IGMP groups. It is used in removing the
information of the IGMP groups if no member responds to the query.
Query Version Settings
•
The Query Version Settings is configured for per-VLAN query.
。 VLAN ID
The field is to fill in the VLAN ID to configure the IGMP Snooping query version.
。 State
“Enable” or “Disable” the IGMP Snooping query on the configured VLAN ID.
。 Version
Set the IGMP Snooping version (v1, v2c, v3) on the specific VLAN.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
66
Page 71
Configure Unknown Multicast Information
Action Settings
•
。 Unknown-Multicast
Configure the action when the system receives an unknown-multicast packet.
Flooding: flood the unknown-multicast packet to all other ports.
Discarding: discard the unknown-multicast packet.
Router: forward the unknown-multicast packet to the router port.
Router Port Settings
•
。 No.
Port 1 to N, where N is based on the total port number.
。 Router Port
Set the specific port to router port or not.
。 Status
The status field shows the port’s status which “-“ implies not a router port and “static” implies set
to router port.
67
Page 72
IGMPSNOOPING TABLE
Multicast IP
•
The Multicast IP is the IP address of the multicast group.
Group
•
The group shows the port number, which joined the group.
68
Page 73
III-5-3.L2SWITCHING –802.1QVLAN
802.1Q VLAN
Virtual Local Area Network (VLAN) is a structure that can ease Network planning. The devices in a VLAN
can be located anywhere without the restriction of physical connections, but work like they are on the
same physical segment.
IEEE 802.1Q defines VLAN tagging conception for the Ethernet frames. VLAN tagging supports frames in
the different VLAN groups transmitting on a link (called VLAN trunk). The maximum number of VLANs
on the Ethernet network is 4096. The VLAN 0 and VLAN 4095are for specific use and hence the usable
VLAN number is 4094.
VLAN Q-in-Q
VLAN Q-in-Q, also called Stacked VLAN, is an extension for 802.1Q VLAN. It supports a maximum of
4096*4096 VLAN groups. VLAN Q-in-Q can apply a port to a provider, customer, or tunnel for different
applications. The header of the stacked VLAN frame contains two 802.1Q Headers with different
Ethertype (TPID). The TPID “0x88A8” is the outer tag by default and the TPID “0x8100” is the inner tag
for 802.1Q VLAN. Customized ethertype called Specific Provider Ethertype are supported if one or more
ports are set to “Specific Provider”.
69
Page 74
Configure 802.1Q VLAN Information
Management VLAN
•
。 VLAN ID
The VLAN ID is for the native VLAN. Only the ports in the same VLAN as Management VLAN can
access the switch configuration console via Ethernet.
The range of the VLAN ID is from 1 to 4094.
The default Management VLAN ID is 1.
VLAN Member Settings
•
。 VLAN ID
Assigns a unique VLAN ID to this VLAN group.
The range of the VLAN ID is from 1 to 4094.
。 Name
Assigns a name to this VLAN group to identify the different VLANs.
The max.length for the Name is 32 characters.
Note:#, \, ', ", ? are invalid characters.
。 Untagged Ports
Sets the untagged ports for this VLAN group. The system removes the VLAN tag before
transmitting from the port that is set to “untagged”. Usually, this port is connected to the end
device that belongs to this VLAN.
。 Tagged Ports
Sets the tagged ports for this VLAN group. The system keeps the VLAN tag when transmitting
from the port that is set to “tagged”. Usually this port is connected to another switch and uses the
VLAN tag to transfer the VLAN information.
。
。
: Click the plus icon to add a VLAN Member row.
: Click the remove icon to delete the VLAN Member row.
70
Page 75
802.1QVLANTABLE
VLAN ID
•
This is the assigned unique VLAN ID for this VLAN group.
VLAN Name
•
This is the assigned VLAN Name for this VLAN group.
Untag Member
•
These ports are assigned as VLAN untagged ports.
Tag Member
•
These ports are assigned as VLAN tagged ports.
71
Page 76
Configure 802.1Q VLAN PVID & Accept Type
VLAN PVID
•
。 No.
Port1 to PortN, where N is based on the total port number.
。 PVID
Assign a VLAN ID to the frames without a VLAN tag that come into the specific port.
Accept Type
•
。 No.
Port1 to PortN, where N is based on the total port number.
。 Filter
Three types of filters are provided: All, Tagged Only, Untagged Only.
All: Accept both tagged and untagged frames that come into the port.
Tagged Only: Accept only tagged frames that come into the port.
UNTAGGED ON LY:ACCEPT ONLY UNTAGGED FRAMES THAT COME INTO THE PORT.
•
(Apply Button)
After configuring the above fields, click "Apply" button to make it effective.
72
Page 77
CONFIGURE VLANQ-IN-Q
Specific Provider Ethertype
•
This is a global configuration and an Ethertype is assigned for all ports, which are configured as
“Specific Provider”. This field is locked (disabled) until at least one port is configured to the “Specific Provider” in the “Q-in-Q Port Settings” section.
The range of the Provider Ethertype is from 0x0000 to 0xFFFF, but 0x8100 is invalid.
The default Provider Ethertype is 0x88A8.
73
Page 78
Mode
Ingress
Q-in-Q Tunnel
Untagged Frames: Add TPID: 0x88A8 tag and forward.
TPID: 0x88A8: Forward the frames.
Mode
Ingress
Customer
A port set to “Customer” runs typically 802.1Q VLAN.
TPID:0x88A8: Discard the frames.
Provider
Untagged Frames: Add TPID: 0x88A8 tag and forward.
Different VLAN ID: Discard the frames.
Specific Provider
Users define the Ethertype for the Provider service.
Different VLAN ID: Discard the frames.
Q-in-Q Port Settings
•
。 No.
Port1 to PortN, where N is based on the total port number.
。 Mode
Set the port to one of the Q-in-Q mode.
The Egress is dependent on the connected device and hence the egress action is skipped.
Tagged Frames:
TPID: 0x8100: Add TPID: 0x88A8 tag and forward.
Untagged Frames: Add TPID: 0x8100 tag and forward.
Tagged Frames:
TPID:0x8100:
Same VLAN ID: Forward the frames.
Different VLAN ID: Discard the frames.
Tagged Frames:
TPID: 0x8100: Discard the frames.
TPID:0x88A8:
Same VLAN ID: Forward the frames.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
Untagged Frames: Add the user-defined TPID tag and forward.
Tagged Frames:
TPID: 0x8100: Discard the frames.
TPID: 0x88A8: Discard the frames.
TPID:[user-defined]:
Same VLAN ID: Forward the frames.
74
Page 79
Queue
0 1 2 3 4 5 6
7
Weight
1 2 3 4 5 6 7
8
III-5-4.L2SWITCHING –QUALITY OF SERVICE
Quality of Service which known as QoS provides a stable and predictable transmitting service. It is
useful to manage the bandwidth more efficiently based on the requirement of applications. Users are
able to set different priorities for different traffics to satisfy the services which need a fixed bandwidth
and have more sensitive of delay. Quality of Service can also optimize the restrict bandwidth resource
and control the network traffic of the switches.
Configure QoS Information
Queue Scheduling
•
。 Scheduling Mode
Select the scheduling mode for the Quality of Service.
WRR: Weighted Round Robin. WRR ensures that every queue takes turns to transmit the traffic by
its weight.
Strict: Strict Priority Queue. The traffic is transmitted based on the priority, which is from highest
to lowest.
Queue Weight
•
。 Queue
Eight queues from queue 0 to queue 7 are supported.
。 Weight
Enables you to configure a specific weight for the port.
The range of the Weight is from 1 to 100. There is no need to sum all queues to 100.
The default Weight for each queue is displayed in the table:
75
Page 80
Configure QoS Trust Mode and Default CoS
Trust Mode
•
。 No.
Port1 to PortN, where N is based on the total port number.
。 Mode
CoS: Class of Service. Use the 3-bit “PRI” field in the VLAN tag. It enables you to assign traffic to 8
different classes from 0 to 7.
DSCP: Use 6-bit field “DSCP” in the Type of Service (ToS) tag. It enables you to assign traffic to 64
different types from 0 to 63.
Default CoS
•
。 No.
Port1 to PortN, where N is based on the total port number.
。 Class
You can assign a default class to the port. The system follows the assigned CoS classes to transmit
frames if there is no VLAN tag in the frame header.
The default Class for each port is 0.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
76
Page 81
Class
0 1 2 3 4 5 6 7 Queue
1 0 2 3 4 5 6
7
CONFIGURE COSMAPPING
Class / Priority
•
There are 3 bits for the “Class of Service” field called “PRI” in the VLAN tag and there are 8 classes
from 0 to 7.
Queue
•
The chipset supports 8 queues from queue 0 to queue 7. The queue 0 is the lowest priority queue
and the queue 7 is the highest priority queue.
The default Queue for each class is displayed in the table:
77
Page 82
Type
0-7
8-15
16-23
24-31
32-39
40-47
48-55
56-63
Queue
0 1 2 3 4 5 6
7
CONFIGURE TOSMAPPING
DSCP
•
There are 6 bits for the “DSCP” in ToS tag and hence there are 64 classes from 0 to 63.
Queue
•
The chipset supports 8 queues from queue 0 to queue 7. The queue 0 is the least priority queue and
the queue 7 is the highest priority queue.
The default Queue for each type is displayed in the table:
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
78
Page 83
III-5-5.L2SWITCHING –PORT TRUNK
Port Trunk is also known as Link Aggregation, and it is a protocol to group links to a trunk. A total of 8
trunk groups are provided. It is a good method to reach load balance and link backup. For example,
when port 1 to port 4 are combined to trunk 1 and all ports support 100Tx and set to full-duplex, the
bandwidth of the trunk will be 800Mbps. The traffic transmitting on the trunk is distributed to one of
the link by the source MAC address to reach the load balance. When the trunk mode is set to LACP and
when one of the link is broken, the traffic will transmit on another link on the group.
Configure Port Trunk Information
Group
•
Eight trunk groups from Trunk 1 to Trunk 8 are supported.
Trunking Mode
•
Two trunking modes are available: “LACP” and “Static”.
Static: The traffic is transmitted on one of the links in the group. The link is determined by the MAC
Address in the frame header. If the link is broken, the traffic cannot transmit on the other links in
the group.
LACP: It is also known as “Dynamic” trunking. If the current transmitting link is broken, the traffic
can be transmitted on another link in the group.
79
Page 84
Member Ports
•
Select member ports to be joined in the specified Trunk group. A port can only be in one of the
Trunk group. Each Trunk group supports maximum 8 member ports.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
PORT TRUNK STAT U S
Group
•
The supported trunk groups are from Trunk 1 to Trunk 8.
Type
•
The trunk mode set for this group maybe “LACP” or “Static”. This field displays“-“ if no members are
in the group.
Ports
•
The selected member ports in the group will be displayed in this column.
Link Status
•
This field displays the link state (Up or Down) for the specific port.
80
Page 85
III-6. Web Management – Security
III-6-1.SECURITY –STORM CONTROL
A traffic storm happens when there is excessive packets flood to the LAN and decreases the
performance. The Storm Control function is used to prevent the system from breaking down by the
broadcast, multicast, or unknown unicast traffic storm. When the Storm Control is enabled on the
specific traffic type, the system will monitor the incoming traffic. If the traffic is more than the
configured level, the traffic will be dropped to avoid the storm.
Configure Storm Control Information
Traffic Type
•
Three types of traffics are supported in the Storm Control: Broadcast, Multicast, and Unknown
Unicast.
Mode
•
“Enable” or “Disable” Storm Control function in the specific traffic type.
Level
•
Three frame levels are available: High, Middle, and Low. If the frames of specific traffic type are
more than the set level, the system will drop the type of frames to prevent the system from
breaking down.
o HIGH: MORE THAN 2500 FRAME PER SECOND.
o MID: MORE THAN 1000 FRAME PER SECOND.
o LOW: MORE THAN 500 FRAME PER SECOND.
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
81
Page 86
III-6-2.SECURITY –802.1X
802.1X is an IEEE standard defined Port-based Network Access Control. It provides a more secured
authentication mechanism for the devices, which would like to connect to a LAN or a WAN. The
Port-based Network Access Control protocol is a convenient method for the users because the
authentication is per-port and once the port passes the authentication, it is not required to authenticate
again when changing to another device, i.e., without security. Therefore, MAC-based access control is
provided. It is a more secure, but less convenient method for authentication. Only the device with the
MAC Address that has passed the authentication can be added to the networks. These two methods are
optional on each port and the users can select one of them on different ports.
CONFIGURE 802.1XBASIC INFORMATION
Basic Settings
•
。 802.1X Mode
“Enable” or “Disable” 802.1X function on the switch.
。 Server Type
Select the 802.1X server type to “Local Database” or “RADIUS Server”.
Local Database: The database is maintained in a table stored in the switch. The client has to send
the username and password to authenticate with the switch’s database.
RADIUS Server: The database is maintained in other devices running RADIUS service. The
authentication follows the RADIUS protocol including communication and encryption.
82
Page 87
Configure 802.1X Port Information
Port Settings
•
。 No.
Port 1 to Port N, where N is based on the total port number.
。 Enable
“Enable” or “Disable” 802.1X function on the port. “Yes” means 802.1X is enabled on the port and
the port is locked until it passes the authentication.
。 Mode
Select the 802.1X mode to “Mac-based” or “Port-based”.
Mac-based: Only the MAC Address, which passed the authentication can connect to the networks.
Port-based: If the port had passed the authentication, every device connected to the port can
connect to the networks.
。 Re-Auth
“Enable” or “Disable” re-authentication on the port. “Yes” means re-authentication is enabled on
the port and the port has to re-authenticate with the server every re-auth period.
。 Re-Auth Period
This is a time interval, which is used in re-authenticating the server.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
83
Page 88
CONFIGURE LOCAL DATABASE INFORMATION
User Name
•
The User Name is used in authentication.
The max length for the User Name is 32 characters.
Note: #, \, ', ", ? are invalid characters.
Password
•
The Password is used in authentication.
The max length for the Password is 20 characters.
Note: #, \, ', ", ? are invalid characters.
Confirm Password
•
The Confirm Password field must be the same as Password field.
•
•
•
: Click the plus icon to add a Username/Password row.
: Click the remove icon to delete the Username/Password row.
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
84
Page 89
Configure RADIUS Server Information
Server IP
•
The Server IP is the IP address of the server.
Service Port
•
The Service Port is the listening port on the RADIUS server.
Shared Key
•
The key is used in establishing the connection between the server and the authenticator before
authentication.
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
85
Page 90
III-6-3.SECURITY –SERVICE CONTROL
We provide 4 types of interface which are HTTP, HTTPS, SSH, and Tel ne t to access the management
interface of the switch. Users can configure the authority for each type of service to be enabled or
disabled. All services are enabled by default and users can disable unused service to make the system
more secure.
CONFIGURE SERVICE CONTROL INFORMATION
HTTP
•
Enable or Disable to access management interface by HTTP which is the foundation of data
communication for the World Wide Web (WWW).
HTTPS
•
Enable or Disable to access management interface by HTTPS which is an adaptation of HTTP for
security. The communication will be encrypted in HTTPS.
SSH
•
Enable or Disable to access management interface by SSH which is a cryptographic network
protocol. SSH provides a secure channel over an unsecured network in the client-server architecture.
The switch plays the role of SSH server and hosts plays the role of SSH client.
Telnet
•
Enable or Disable to access management interface by Telnet which is a text-oriented virtual
terminal connection. It’s less secure than SSH because it doesn’t encrypt any data even password
when the data is transmitting.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
86
Page 91
III-7. Web Management – Diagnostics
III-7-1.DIAGNOSTICS –PORT MIRRORING
Port Mirroring is a feature that copies the incoming or outgoing packets on one or more ports to
another destination port. It is very useful to monitor the network traffic and analyze the copied traffic.
Port Mirroring helps network management to keep a close eye on the network and debug when some
issues arise.
Configure Port Mirroring Information
Mirroring Mode
•
“Enable” or “Disable” the Port Mirroring function. If the user enables Port Mirroring function, the
system will transmit the traffic of the specific “Sniffer Mode” from “Source Port” to “Destination
Port”.
Source Port
•
The traffic on the Source Ports will be sniffed to the Destination Port.
Sniffer Mode
•
Both Tx and Rx: Sniffs both transmitting and receiving traffics.
Tx Only: Sniffs only the transmitting traffic.
Rx Only: Sniffs only the receiving traffic.
Destination Port
•
The traffic will sniff to the Destination Port. This port is usually connected to a host running the
software to observe the packets.
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
87
Page 92
III-7-2.DIAGNOSTICS –PING
Ping is a tool used to test the reachability of a device on the IP network. Ping is enabled by sending
Internet Control Message Protocol (ICMP) request to the target device and waits for the response
packet from the target device to check the connection.
Ping Another Device with IPv4/IPv6
Type
•
Ping a connected device with “IPv4” or “IPv6” protocol.
IP Address
•
The IP address of the connected device is verified based on the type.
Count
•
Sets the count times. The system will send “Count” number ICMP packets to the specific IP address
and wait for the response.
The range of the Count is from 3 to 50.
The default Count is 3.
Result
•
The result of the ping shows the response from the specific IP address. If the specific IP address does
not respond, “No Response” will be displayed.
“Start” Button
•
Click the “Start” Button to start the ping to the IP address.
“Stop” Button
•
Click the “Stop” Button to stop the ping to the IP address before the count is completed.
“Clear” Button
•
Click the “Clear” Button to clear the “Result”.
“Reset” Button
•
Click the “Reset” Button to clear the “Result” and reset the “IP Address” and “Count” number.
88
Page 93
III-8. Web Management – Monitoring
III-8-1.MONITORING –LLDP
LLDP is Link Layer Discovery Protocol and it is a vendor-neutral layer 2 protocol that is defined by IEEE
802.1AB. LLDP is used in advertising identity of the devices, capabilities and neighbors on the LAN. The
information from the neighbors enables the switch to quickly identify the devices and interoperate with
each other more smoothly and efficiently. The neighbor table shows the information about the device
that is next to the port. The LLDP can only get information from the device that is close to it. If the users
want to know the topology of the LAN, they can collect all information from the device and analysis the
neighbor table.
Configure LLDP Information
LLDP Mode
•
“Enable” or “Disable” the LLDP function.
LLDP Timer
•
The LLDP Timer is a time interval to send LLDP messages.
The range of the LLDP Timer is from 5 to 32767 seconds.
The default LLDP Timer is 30 seconds.
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
89
Page 94
LLDPNEIGHBOR TABLE
Local Port
•
The port connected to the LLDP neighbor on the local switch.
Remote System Name
•
This is the system name of the LLDP neighbor. This value is set and provided by the remote device.
Chassis ID
•
The Chassis ID defines the MAC Address of the LLDP neighbor.
Remote Port
•
This field displays the port information received from the LLDP neighbor.
Port ID
•
The Port ID displays the port identity of the connected port on the LLDP neighbor.
Address
•
The Address displays the IP address of the LLDP neighbor.
90
Page 95
III-8-2.MONITORING –SYSTEM WARNING
System Warning contains “System Event Log”, “SMTP Settings”, and “Event Selection” for different types
of services such as “Fault Alarm”, “System Log”, “SMTP”, and “SNMP Trap”. These logs are very useful for
the administrator to manage and debug the system. When the system is powered off or when someone
tries to login the system or the system reboots abnormally, or when some of the interfaces are linked
down, the system sends log messages to notify specific users and record the events on the server or
assigned platform. Users can also connect an alarm buzzer to the relay alarm pins. When the configured
“Fault Alarm” events are triggered, the alarm buzzer will ring to notify the users.
Configure System Warning Information
System Log Mode
•
The port connected to the LLDP neighbor on the local switch.
Remote Server IP Address
•
The field contains the IP Address of the remote server. If the “Remote” mode is enabled, users have
to assign this IP Address to receive the system logs.
Service Port
•
The port is used to listen to the system log packets on the remote server.
The range of the Service Port is from 1 to 65535.
The default Service Port is 514.
•
After configuring above fields, click "Apply" button to make the changes effective.
(Apply Button)
91
Page 96
SYSTEM EVENT LOG
Log Text Area
•
The system event information displays if the “Local” system log mode is enabled and the configured
events are triggered.
•
Click the “Clear” button to clear the system event log in the text area.
•
Click the “Refresh” button to refresh the system event log in the text area.
(Clear Button)
(Refresh Button)
92
Page 97
Configure SMTP Information
Server Settings
•
。 SMTP Status
“Enable” or “Disable” the SMTP function.
。 Server Address
This is the IP address or URL of the SMTP Server. For example, the SMTP server address provided
by Google is “smtp.gmail.com”.
。 Server Port
This field is the port listening on the server for the SMTP request. For security, we suggest users
configure the server port to 465 for SSL or 587 for TLS.
The range of the Service Port is from 1 to 65535.
The default Service Port is 25. Port 25 is the default port for e-mail server.
。 Sender E-mail
The Sender E-mail is the e-mail address used to send the notifications to Recipients.
。 Mail Subject
The Mail Subject is a string that is displayed in the E-mail title.
Note:#, \, ', ", ? are invalid characters.
。 SMTP Authentication
“Enable” or “Disable” to authenticate the SMTP server with the configured username and
password.
。 User Name
The username is used in authentication with the SMTP server.
The max length for the User Name is 32 characters.
93
Page 98
Note: #, \, ', ", ? are invalid characters.
。 Password
The password is used in authentication with the SMTP server.
The max length for the Password is 32 characters.
Note: #, \, ', ", ? are invalid characters.
Recipient Settings
•
。 E-mail Address 1-4
The configured e-mail address will receive the notifications if the SMTP is enabled and the events
set on “Event Selection” are triggered.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
94
Page 99
CONFIGURE SYSTEM EVENT SELECTION
Event
•
There are 5 events on the System Events.
Authentication Failure: Login failed on the web console or CLI. It may be caused due to incorrect
username or password.
ERPS Change: The ERPS function is working and the topology is changed.
Power 1 or 2: The power 1 or 2 is powered off.
Cold Start: The system reboots due to interruption of power supply.
Warm Start: The system reboots by issuing “reboot” command on CLI or clicking the “reboot icon”
on the web console.
Digital Input: The signal from the digital input is changed from high to low or low to high.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
95
Page 100
Configure Interface Event Selection
Event
•
The events on the “Interface Events” display the link status for each port. Fault Alarm is triggered
only during link down and other system log types support both link up and link down.
Fault Alarm
•
The Fault LED will turn on red and relay will turn ON, if the configured events are triggered. By
default, the Fault LED is green and relay is turned OFF in the normal situation.
System Log
•
When the configured events are triggered, the logs will be displayed in the “System Event Log” page,
remote server, or saved to a USB file named “message”. This is based on the settings of the “System
Log Mode” in the “System Log Settings” page.
SMTP
•
If the SMTP is enabled and the configured events are triggered, the system will send an e-mail
notification to the e-mail addresses of the assigned recipient set in the “SNMP Settings” page.
SNMP Trap
•
If the SNMP Trap is enabled and the configured events are triggered, the system will send event
information to the assigned “Trap Receiver IP”, which is set in the “SNMP Trap” page.
•
(Apply Button)
After configuring above fields, click "Apply" button to make the changes effective.
96
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.