EtherWan EX26262F User Guide

iv
User’s Guide - GUI
EX26262F PoE Managed Switch
EX26262F Managed Switch Users Guide - GUI
v
Contents
INTRODUCTION ............................................................................................................................................. 10
WEB-BASED MANAGEMENT .......................................................................................................................... 11
SYSTEM CONFIGURATION ................................................................................................................................ 5
2-1 SYSTEM .................................................................................................................................................. 5
2-1.1 Information .................................................................................................................................. 5
2-1.2 IP ................................................................................................................................................ 18
2-1.3 NTP ............................................................................................................................................. 20
2-1.4 Time ............................................................................................................................................ 22
2-1.5 Log .............................................................................................................................................. 24
2-2 GREEN ETHERNET .................................................................................................................................. 25
2-3 PORT CONFIGURATION ........................................................................................................................... 27
2-3.1 Ports ........................................................................................................................................... 27
2-3.2 Port Description ......................................................................................................................... 29
2-4 DHCP ................................................................................................................................................. 30
2-4.1 Server .......................................................................................................................................... 30
2-4.2 Snooping .................................................................................................................................... 34
2-4.3 Relay ........................................................................................................................................... 35
2-5 SECURITY .............................................................................................................................................. 37
2-5.1 Switch ......................................................................................................................................... 37
2-5.2 Network ...................................................................................................................................... 59
2-5.3 AAA ............................................................................................................................................ 83
2-6 AGGREGATION ....................................................................................................................................... 88
2-6.1 Static ........................................................................................................................................... 88
2-6.2 LACP ........................................................................................................................................... 90
2-7 LOOP PROTECTION ................................................................................................................................ 91
2-8 SPANNING TREE .................................................................................................................................... 93
2-8.1 Bridge Setting ............................................................................................................................. 93
2-8.2 MSTI Mapping ............................................................................................................................ 95
2-8.3 MSTI Priorities ............................................................................................................................ 97
2-8.4 CIST Ports ................................................................................................................................... 98
2-8.5 MSTI Ports ................................................................................................................................ 100
2-9 IPMC PROFILE .................................................................................................................................... 101
2-9.1 Profile Table ............................................................................................................................. 101
2-9.2 Address Entry............................................................................................................................ 104
2-10MVR ................................................................................................................................................ 105
2-11 IPMC .............................................................................................................................................. 108
2-11.1 IGMP Snooping ...................................................................................................................... 108
2-11.2 MLD Snooping ........................................................................................................................ 113
2-12 LLDP ............................................................................................................................................... 119
2-12.1 LLDP Configuration ................................................................................................................ 119
2-12.2 LLDP-MED Configuration ...................................................................................................... 122
2- 13 POE ................................................................................................................................................ 128
2- 13.1 Configuration ........................................................................................................................ 129
2- 13.2 Power Delay .......................................................................................................................... 131
2- 13.3 Scheduling ............................................................................................................................. 132
2- 13.4 Auto Checking ....................................................................................................................... 133
2-14 MAC TABLE ...................................................................................................................................... 135
2-15 VLANS ............................................................................................................................................ 137
2-16 PRIVATE VLANS ................................................................................................................................ 140
2-16.1 Port Isolation .......................................................................................................................... 140
vi
2-17 VCL ................................................................................................................................................. 141
2-17.1 MAC-based VLAN .................................................................................................................. 141
2-17.2 Protocol -based VLAN ............................................................................................................ 143
2-17.3 IP Subnet-based VLAN ........................................................................................................... 146
2-18 VOICE VLAN................................................................................................................................... 147
2-18.1 Configuration ......................................................................................................................... 147
2-18.2 OUI ......................................................................................................................................... 149
2-19 QOS ................................................................................................................................................ 149
2-19.1 Port Classification .................................................................................................................. 150
2-19.2 Port Policing ........................................................................................................................... 151
2-19.4 Port Schedulers....................................................................................................................... 152
2-19.5 Port Shaping........................................................................................................................... 156
2-19.6 Port Tag Remarking ............................................................................................................... 158
2-19.7 Port DSCP ............................................................................................................................... 162
2-19.8 DSCP-Based QoS.................................................................................................................... 163
2-19.9 DSCP Translation ................................................................................................................... 165
2-19.10 DSCP Classification .............................................................................................................. 166
2-19.11 QoS Control List Configuration............................................................................................ 167
2-19.12 Storm Control ....................................................................................................................... 171
2-20 MIRROR ........................................................................................................................................... 172
2-21 UPNP .............................................................................................................................................. 173
2-22. GVRP ............................................................................................................................................. 174
2-22.1 Global Config ......................................................................................................................... 175
2-22.2 Port Config ............................................................................................................................. 176
2-23. SFLOW ............................................................................................................................................. 177
2-24 SMTP CONFIGURATION ..................................................................................................................... 179
MONITORING............................................................................................................................................... 181
3-1 SYSTEM .............................................................................................................................................. 181
3-1.1 Information .............................................................................................................................. 181
3-1.2 IP Status ................................................................................................................................... 183
3-1.3 Log ............................................................................................................................................ 185
3-1.4 Detailed Log ............................................................................................................................. 186
3-1.5 Overview .................................................................................................................................. 187
3-2 GREEN ETHERNET ................................................................................................................................ 188
3-2.1 Port Power Savings .................................................................................................................. 188
3-3 PORTS ................................................................................................................................................ 189
3-3.1 Traffic Overview ....................................................................................................................... 189
3-3.2 QoS Statistics ............................................................................................................................ 190
3-3.3 QCL Status ................................................................................................................................ 191
3-3.4 Detailed Statistics ..................................................................................................................... 193
3-3.5 SFP Port Info ............................................................................................................................. 195
3-4 DHCP ............................................................................................................................................... 197
3-4.1 Server ........................................................................................................................................ 197
3-4.2 Snooping Table ........................................................................................................................ 200
3-4.3 Relay Statistics.......................................................................................................................... 201
3-4.4 Detailed Statistics ..................................................................................................................... 202
3-5 SECURITY ............................................................................................................................................ 204
3-5.1 Access Management Statistics ................................................................................................. 204
3-5.2 Network .................................................................................................................................... 205
3-5.3 AAA .......................................................................................................................................... 216
3-5.4 Switch ....................................................................................................................................... 222
3-6 LACP................................................................................................................................................. 229
3-6.1 System Status ........................................................................................................................... 229
3-6.2 Port Status ................................................................................................................................ 230
3-6.3 Port Statistics ............................................................................................................................ 231
vii
3-7 LOOP PROTECTION .............................................................................................................................. 231
3-8 SPANNING TREE .................................................................................................................................. 232
3-8.1 Bridge Status ............................................................................................................................ 232
3-8.2 Port Status ................................................................................................................................ 233
3-8.3 Port Statistics ............................................................................................................................ 234
3-9 MVR ................................................................................................................................................. 235
3-9.1 Statistics ................................................................................................................................... 235
3-9.2 MVR Channels Groups ............................................................................................................. 235
3-9.3 MVR SFM Information .............................................................................................................. 237
3-10 IPMC .............................................................................................................................................. 239
3-10.1 IGMP Snooping ...................................................................................................................... 239
3-10.2 MLD Snooping ........................................................................................................................ 243
3-11 LLDP ............................................................................................................................................... 247
3-11.1 Neighbor ................................................................................................................................ 247
3-11.2 LLDP-MED Neighbor .............................................................................................................. 249
3-11.3 PoE.......................................................................................................................................... 252
3-11.4EEE ........................................................................................................................................... 253
3-11.5 Port Statistics .......................................................................................................................... 255
3-12 POE ................................................................................................................................................. 257
3-13 MAC TABLE ...................................................................................................................................... 258
3-14 VLANS ............................................................................................................................................ 259
3-14.1 VLAN Membership ................................................................................................................. 259
3-13.2 VLAN Port .............................................................................................................................. 262
3-15 VCL ................................................................................................................................................. 264
3-15.1 MAC-based VLAN .................................................................................................................. 264
3-15.2 Protocol-based VLAN ............................................................................................................. 264
3-15.3 IP Subnet-based VLAN ........................................................................................................... 266
3-16 SFLOW ............................................................................................................................................. 267
DIAGNOSTICS ............................................................................................................................................... 269
4-1 PING .................................................................................................................................................. 269
4-2 PING6 ................................................................................................................................................ 271
4-3 CABLE DIAGNOSTICS ............................................................................................................................ 273
4-4 TRACEROUTE ....................................................................................................................................... 274
MAINTENANCE ............................................................................................................................................ 275
5-1 RESTART DEVICE .................................................................................................................................. 275
5-2 FACTORY DEFAULTS .............................................................................................................................. 276
5-3 FIRMWARE .......................................................................................................................................... 276
5-3.1 Firmware upgrade .................................................................................................................... 276
5-3.2 Firmware Selection ................................................................................................................... 277
5-4 CONFIGURATION ................................................................................................................................. 278
5-4.1 Save startup-config .................................................................................................................. 279
5-4.2 Upload ...................................................................................................................................... 279
5-4.3 Download ................................................................................................................................. 280
5-4.5 Delete ....................................................................................................................................... 281
DMS-MANAGEMENT ................................................................................................................................... 282
6-1 DMS MODE ....................................................................................................................................... 282
6-2 MAP API KEY ...................................................................................................................................... 282
6-3 DEVICE LIST ........................................................................................................................................ 283
DMS-GRAPHIC MONITORING ....................................................................................................................... 284
7-1 TOPOLOGY VIEW ................................................................................................................................. 284
7-2 FLOOR VIEW ....................................................................................................................................... 285
7-3 MAP VIEW .......................................................................................................................................... 286
viii
DMS-MAINTENANCE .................................................................................................................................... 287
8-1 FLOOR IMAGE ...................................................................................................................................... 287
8-2 DIAGNOSTICS ...................................................................................................................................... 288
CONTACT INFORMATION ............................................................................................................................. 290
ix
Revision History
Release
Date
Comment
Version 1
2017/07/25
Initial release
Version 2
2019/07/30
Corrections to GUI images and
corresponding text content to reflect
changes in new firmware
10
INTRODUCTION
Overview
EtherWAN's EX26262F provides a 26-port switching platform with support for IEEE802.3at Power over Ethernet, high performance switching, and the advanced management features required for enterprise environments.
Equipped with 24 10/100/1000BASE-TX PoE ports, in combination with 2 100/1000 SFP Combo options, the EX26262F is feature-rich, with 9216 Bytes Jumbo Frame support, full wire speed Gigabit throughput, and QoS support.
The PoE ports provide up to 30 Watts per port, with a total power budget of 370 Watts, allowing the switch to operate a wide variety of Powered Devices with different bandwidth and power consumption requirements, such as IP cameras.
Robust management features include port security, IGMP snooping, VLANs, GARP protocols, and LACP, as well as SNMP & RMON interfaces. An intuitive GUI for web management simplifies switch configuration, status monitoring, and maintenance activities.
The EX26262F provides the following features:
Supports IPv4/IPv6 dual stack management Supports SSH/SSL secured management Supports SNMP v1/v2c/v3 Supports RMON groups 1,2,3,9 Supports IGMP v1/v2/v3 Snooping Supports MLD v1/v2 Snooping Supports RADIUS and TACACS+ authentication Supports IP Source Guard Supports DHCP Relay (Option 82) Supports DHCP Snooping Supports ACL and QCL for traffic filtering Supports 802.1d(STP), 802.1w(RSTP) and 802.1s(MSTP) Supports LACP and static link aggregation Supports Q-in-Q double tag VLAN Supports GVRP dynamic VLAN
11
Web-based Management
Initial Configuration
This chapter instructs you how to configure and manage the EX26262F through the web user interface. With this facility, you can easily access and monitor through any one port of the switch all the status of the switch, including MIBs status, each port activity, Spanning tree status, port aggregation status, multicast traffic, VLAN and priority status, even illegal access record and so on.
The default values of the EX26262F are listed in the table below:
IP Address
192.168.1.10
Subnet Mask
255.255.255.0
Username
root
Password
Connect to the switch console by connecting the RJ45 to DB9 console cable to the RJ45 console port of the switch and to the serial port of the computer running a terminal emulation application (such as HyperTerminal or Putty).
The configuration settings of the terminal-emulation program are: Baud rate: 115,200bps, Data bits: 8, Parity: none, Stop bit: 1, Flow control: none.
The default username is root”, no password. Enter the default username and password, and then click the <Login> button.
NOTE: When you login to the Switch webpage to manage, you must first type the username of the
admin. The password is blank, so press ENTER after entering the username. To optimize the display effect, we recommend you use Microsoft IE 6.0 or above, Netscape V7.1 or above or Firefox V1.00 or above, with resolution 1024 x 768.
NOTE: DHCP is enabled on the switch by default, so if you have a DHCP server, the switch will be
assigned an IP address. If there is no DHCP server, the switch will use the default IP address of
192.168.1.10
Figure 1 Figure 1 Login page
5
System Configuration
This chapter describes the basic configuration tasks which include the System Information and switch management functions (e.g. Time, Account, IP, Syslog and NTP.)
2-1 System
You can identify the system by configuring the contact information, name, and location of the switch.
2-1.1 Information
The switch system’s contact information is provided here.
Web interface
To configure System Information in the web interface:
1. Click Configuration, System, and Information.
2. Enter System Contact, System Name, System Location information in the corresponding
fields.
3. Click Apply
Figure 2-1.1: System Information
Parameter description: System Contact:
The textual identification of the contact person for this managed node, together with information on how to contact this person. The allowed string length is 0 to 128, and the allowed content is ASCII characters from 32 to 126.
System name:
An administratively assigned name for this managed node. By convention, this is the node's fully-qualified domain name. A domain name is an alphanumeric text string. No space characters are permitted. The first character must be an alphanumeric character, and the first or last character must not be a dash. The allowed string length is 0 to 128.
System Location:
The physical location of this node (e.g., telephone closet, 3rd floor). The allowed string length is 0 to 128, and the allowed content is the ASCII characters from 32 to 126.
18
2-1.2 IP
The IPv4 address for the switch can be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to change the switch's default settings to values that are compatible with your network. You may also need to establish a default gateway between the switch and management stations that exist on another network segment.
Configure the switch-managed IP information on this page
Configure IP basic settings, control IP interfaces and IP routes.
The maximum number of interfaces supported is 8 and the maximum number of routes is 32.
Web Interface
To configure an IP address in the web interface:
1. Click Configuration, System, IP.
2. Click Add Interface to create new Interface on the switch.
3. Click Add Route to create new Route on the switch
4. Click Apply
Figure 2-1.2: IP configuration
Parameter description:
IP Configuration
19
Mode:
Configure whether the IP stack should act as a Host or a Router. In Host mode, IP traffic between interfaces will not be routed. In Router mode traffic is routed between all interfaces.
DNS Server
This setting controls the DNS name resolution done by the switch. The following modes are supported:
From any DHCP interfaces
The first DNS server offered from a DHCP lease to a DHCP-enabled interface will be used.
No DNS server
No DNS server will be used.
Configured
Explicitly provide the IP address of the DNS Server in dotted decimal notation.
From this DHCP interface
Specify from which DHCP-enabled interface a provided DNS server should be preferred.
DNS Proxy
When DNS proxy is enabled, system will relay DNS requests to the currently configured DNS server, and reply as a DNS resolver to the client devices on the network.
IP Interfaces
Delete
Select this option to delete an existing IP interface.
VLAN
The VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface. This field is only available for input when creating a new interface.
IPv4 DHCP Enabled
Enable the DHCP client by checking this box. If this option is enabled, the system will configure the IPv4 address and mask of the interface using the DHCP protocol. The DHCP client will announce the configured System Name as hostname to provide DNS lookup.
IPv4 DHCP Fallback Timeout
The number of seconds for trying to obtain a DHCP lease. After this period expires, a configured IPv4 address will be used as IPv4 interface address. A value of zero disables the fallback mechanism, such that DHCP will keep retrying until a valid lease is obtained. Legal values are 0 to 4294967295 seconds.
IPv4 DHCP Current Lease
For DHCP interfaces with an active lease, this column shows the current interface address, as provided by the DHCP server.
IPv4 Address
The IPv4 address of the interface in dotted decimal notation. If DHCP is enabled, this field is not used. The field may also be left blank if IPv4 operation on the interface is not desired.
IPv4 Mask
The IPv4 network mask, in number of bits (prefix length). Valid values are between 0 and 30 bits for an IPv4 address. If DHCP is enabled, this field is not used. The field may also be left blank if IPv4 operation on the interface is not desired.
20
IPv6 Address
The IPv6 address of the interface. A IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, fe80::215:c5ff:fe03:4dc7. The symbol ‘::’ is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can appear only once. It can also represent a legally valid IPv4 address. For example, ‘::192.1.2.34’. The field may be left blank if IPv6 operation on the interface is not desired.
IPv6 Mask
The IPv6 network mask, in number of bits (prefix length). Valid values are between 1 and 128 bits for a IPv6 address. The field may be left blank if IPv6 operation on the interface is not desired.
IP Routes Delete
Select this option to delete an existing IP route.
Network
The destination IP network or host address of this route. Valid format is notation or a valid IPv6 notation. A default route can use the value 0.0.0.0 or IPv6:: notation.
Mask Length
The destination IP network or host mask, in number of bits (prefix length). It defines how much of a network address that must match, in order to qualify for this route. Valid values are between 0 and 32 bits respectively 128 for IPv6 routes. Only a default route will have a mask length of 0 (as it will match anything).
Gateway
The IP address of the IP gateway. Valid format is dotted decimal notation or a valid IPv6 notation. Gateway and Network must be of the same type.
Next Hop VLAN (Only for IPv6)
The VLAN ID (VID) of the specific IPv6 interface associated with the gateway. The given VID ranges from 1 to 4094 and will be effective only when the corresponding IPv6 interface is valid. If the IPv6 gateway address is link-local, it must specify the next hop VLAN for the gateway. If the IPv6 gateway address is not link-local, system ignores the next hop VLAN for the gateway.
Buttons Add Interface:
Click to add a new IP interface. A maximum of 8 interfaces is supported.
Add Route:
Click to add a new IP route. A maximum of 32 routes is supported.
Apply:
Click to save changes.
Reset:
Click to undo any changes made locally and revert to previously saved values.
2-1.3 NTP
NTP is Network Time Protocol and is used to sync the network time-based Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manually specify a user-defined NTP server as well as Time Zone, the switch will sync the time in a short after
21
pressing <Apply> button. Though it synchronizes the time automatically, NTP does not update the time periodically without user’s processing.
Time Zone is an offset time off GMT. You must select the time zone first and then perform time sync via NTP because the switch will combine this time zone offset and updated NTP time to come out the local time, otherwise, you will not able to get the correct time. The switch supports configurable time zone from –12 to +13 in increments of 1 hour.
Default Time zone: +8 Hrs.
Web Interface
To configure NTP in the web interface:
1. Click Configuration, System, NTP.
2. Specify the Time parameter in manual parameters.
3. Click Apply.
Figure 2-1.3: NTP configuration
Parameter description: Automatic:
Indicates the NTP mode operation. Possible modes are:
Enabled: Enable NTP client mode operation. The switch will look for a time server using DHCP.
Disabled: Disable NTP client mode operation.
NTP Time-Sync Interval
Interval at which the switch will poll the time server.
Server 1 to 5:
Provide the NTP IPv4 or IPv6 address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It can also represent a legally valid IPv4 address. For example, '::192.1.2.34'.
22
Buttons
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
2-1.4 Time
The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple, and you just input “Year”, “Month”, “Day”, “Hour” and “Minute” within the valid value range indicated in each item.
Web Interface
To configure Time in the web interface:
1. Click Configuration, System and Time
2. Specify the Time parameter.
3. Click Apply.
Figure 2-1.4: Time Configuration
23
Parameter description:
Time Configuration
Clock Source:
There are two modes for configuring how the Clock Source from. Select "Use Local Settings" to set Clock Source from Local Time. Select "Use NTP Server" to set Clock Source from NTP Server.
System Date:
Shows the current system time.
Time Zone Configuration
Time Zone:
Select appropriate Time Zone from the drop down and click Apply to set.
Acronym:
Set the acronym of the time zone. This is a User configurable acronym to identify the time zone. (Range: Up to 16 characters)
Daylight Saving Time Configuration
Daylight Saving Time:
This is used to set the clock forward or backward according to the configurations set below for a defined Daylight Saving Time duration. Select 'Disable' to disable the Daylight Saving Time configuration. Select 'Recurring' and configure the Daylight Saving Time duration to repeat the configuration every year. Select 'Non-Recurring' and configure the Daylight Saving Time duration for single time configuration. (Default: Disabled).
24
Recurring Configuration
Start time settings:
Week - Select the starting week number.
Day - Select the starting day.
Month - Select the starting month.
Hours - Select the starting hour.
Minutes - Select the starting minute.
End time settings:
Week - Select the ending week number.
Day - Select the ending day.
Month - Select the ending month.
Hours - Select the ending hour.
Minutes - Select the ending minute.
Offset settings:
Offset - Enter the number of minutes to add during Daylight Saving Time. (Range: 1 to
1440)
Buttons
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
2-1.5 Log
The log is a standard for logging program messages . It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational, analysis and debugging messages. It is supported by a wide variety of devices and receivers across multiple platforms.
Web Interface
To configure log configuration in the web interface:
1. Click Configuration, System and log.
2. Specify the syslog parameters include IP Address of Syslog server and Port number.
3. Evoke the Syslog to enable it.
4. Click Apply.
Figure2-1.5: System Log configuration
25
Parameter description: Server Mode:
Indicate the server mode operation. When the mode operation is enabled, the syslog message will send out to syslog server. The syslog protocol is based on UDP communication and received on UDP port 514 and the syslog server will not send acknowledgments back sender since UDP is a connectionless protocol and it does not provide acknowledgments. The syslog packet will always send out even if the syslog server does not exist. Possible modes are:
Enabled: Enable server mode operation.
Disabled: Disable server mode operation.
Server Address:
Indicates the IPv4 hosts address of syslog server. If the switch provides DNS feature, it also can be a host name.
Server Port:
The port used by the server.
Buttons
These buttons are displayed on the NTP page:
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
2-2 Green Ethernet
EEE is a power saving option that reduces the power usage when there is low or no traffic utilization.
EEE works by powering down circuits when there is no traffic. When a port gets data to be transmitted all circuits are powered up. The time it takes to power up the circuits is named wakeup time. The default wakeup time is 17 us for 1Gbit links and 30 us for other link speeds. EEE devices must agree upon the value of the wakeup time in order to make sure that both the receiving and transmitting device has all circuits powered up when traffic is transmitted. The devices can exchange wakeup time information using the LLDP protocol.
EEE works for ports in auto-negotiation mode, where the port is negotiated to either 1G or 100 Mbit full duplex mode.
For ports that are not EEE-capable the corresponding EEE checkboxes are grayed out and thus impossible to enable EEE for.
When a port is powered down for saving power, outgoing traffic is stored in a buffer until the
26
port is powered up again. Because there is some overhead in turning the port down and up, more power can be saved if the traffic can be buffered up until a large burst of traffic can be transmitted. Buffering traffic will give some latency in the traffic.
Web Interface
To configure a Port Power Saving Configuration in the web interface:
1. Click Configuration, Green Ethernet, Port Power Savings
2. Evoke to enable or disable the ActiPHY, PerfectReach, EEE and EEE Urgent Queues.
3. Click Apply.
Figure 2-2.1: Port Power Saving Configuration
Parameter description:
Optimize EEE for
The switch can be set to optimize EEE for either best power saving or least traffic latency.
Port:
The switch port number of the logical port.
ActiPHY:
Link down power savings enabled.
ActiPHY works by lowering the power for a port when there is no link. The port is power up for short moment in order to determine if cable is inserted.
PerfectReach:
Cable length power savings enabled.
27
PerfectReach works by determining the cable length and lowering the power for ports with short cables.
EEE:
Controls whether EEE is enabled for this switch port.
For maximizing power savings, the circuit isn't started at once when transmit data is ready for a port but is instead queued until a burst of data is ready to be transmitted. This will give some traffic latency.
If desired it is possible to minimize the latency for specific frames, by mapping the frames to a specific queue (done with QOS), and then mark the queue as an urgent queue. When an urgent queue gets data to be transmitted, the circuits will be powered up at once and the latency will be reduced to the wakeup time.
2-3 Port Configuration
The section describes to configure the Port detail parameters of the switch. Others you could using the Port configure to enable or disable the Port of the switch. Monitor the ports content or status in the function.
2-3.1 Ports
This page displays current port configurations. Ports can also be configured here.
Web Interface
To configure a Current Port Configuration in the web interface:
1. Click Configuration, Ports Configuration, and Ports
2. Specify the Speed Configured, Flow Control, Maximum Frame size, Excessive Collision
mode and Power Control.
3. Click Apply.
Figure 2-3.1: Port Configuration
28
Parameter description: Port:
This is the logical port number for this row.
Link:
The current link state is displayed graphically. Green indicates the link is up and red that it is down.
Current Link Speed:
Provides the current link speed of the port.
Configured Link Speed:
Selects any available link speed for the given switch port. Only speeds supported by the specific port is shown. Possible speeds are:
Disabled - Disables the switch port operation.
Auto - Port auto negotiating speed with the link partner and selects the highest speed that is compatible with the link partner.
10Mbps HDX - Forces the cu port in 10Mbps half-duplex mode.
10Mbps FDX - Forces the cu port in 10Mbps full duplex mode.
100Mbps HDX - Forces the cu port in 100Mbps half-duplex mode.
100Mbps FDX - Forces the cu port in 100Mbps full duplex mode.
1Gbps FDX - Forces the port in 1Gbps full duplex
2.5Gbps FDX - Forces the Serdes port in 2.5Gbps full duplex mode.
SFP_Auto_AMS - Automatically determines the speed of the SFP. Note: There is no standardized way to do SFP auto detect, so here it is done by reading the SFP rom. Due to the missing standardized way of doing SFP auto detect some SFPs might not be detectable. The port is set in AMS mode. Cu port is set in Auto mode.
100-FX - SFP port in 100-FX speed. Cu port disabled.
100-FX_AMS - Port in AMS mode. SFP port in 100-FX speed. Cu port in Auto mode.
1000-X - SFP port in 1000-X speed. Cu port disabled.
1000-X_AMS - Port in AMS mode. SFP port in 1000-X speed. Cu port in Auto mode. Ports in AMS mode with 1000-X speed has Cu port preferred. Ports in AMS mode with 100-FX speed has fiber port preferred.
Flow Control:
When Auto Speed is selected on a port, this section indicates the flow control capability that is advertised to the link partner. When a fixed-speed setting is selected, that is what is used. The Current Rx column indicates whether pause frames on the port are obeyed, and the Current Tx column indicates whether pause frames on the port are transmitted. The Rx and Tx settings are determined by the result of the last Auto-Negotiation.
Check the configured column to use flow control. This setting is related to the setting for
29
Configured Link Speed.
Maximum Frame Size:
Enter the maximum frame size allowed for the switch port, including FCS.
Buttons
Apply – Click to save changes.
Reset- Click to undo any changes made locally and revert to previously saved values.
2-3.2 Port Description
The section describes to configure the Port’s alias or any descriptions for the Port Identity. It provides user to write down an alphanumeric string describing the full name and version identification for the system’s hardware type, software version, and networking application
Web Interface
To configure a Port Description in the web interface:
1. Click Configuration, Port, then Port Description
2. Specify the detail Port alias or description an alphanumeric string describing the full name
and version identification for the system’s hardware type, software version, and networking application.
3. Click Apply.
Figure 2-3.1: Port Configuration
Parameter description: Port:
This is the logical port number for this row.
Description:
Enter up to 47 characters to be descriptive name for identifies this port.
30
Buttons
Apply – Click to save changes.
Reset- Click to undo any changes made locally and revert to previously saved values.
2-4 DHCP
The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from adding their own DHCP servers to the network.
2-4.1 Server
2-4.1.1 Mode
This page configures global mode and VLAN mode to enable/disable DHCP server per system and per VLAN.
Web Interface
To configure DHCP server mode in the web interface:
1. Click Configuration, DHCP, Server, Mode
2. Add VLAN range.
3. Click Apply.
Figure 2-4.1.1: DHCP server Mode
31
Parameter description: Mode:
Configure the operation mode per system. Possible modes are:
Enable: Enable DHCP server per system. Disable: Disable DHCP server per system.
VLAN Range:
Indicate the VLAN range in which DHCP server is enabled or disabled. The first VLAN ID must be smaller than or equal to the second VLAN ID. BUT, if the VLAN range contains only 1 VLAN ID, then you can just input it into either one of the first and second VLAN ID or both.
On the other hand, if you want to disable existed VLAN range, then you can follow the steps.
1. press “ADD VLAN Range” to add a new VLAN range.
2. Input the VLAN range that you want to disable.
3. Choose Mode to be disabled.
4. Press Apply to apply the change.
Then, you will see the disabled VLAN range is removed from the DHCP Server mode configuration page.
Mode:
Indicate the operation mode per VLAN. Possible modes are:
Enable: Enable DHCP server per VLAN. Disable: Disable DHCP server pre VLAN.
Buttons
Add VLAN Range - Click to add a new VLAN range.
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
32
2-4.1.2 Excluded IP
This page configures excluded IP addresses. DHCP server will not allocate these excluded IP addresses to DHCP client.
Web Interface
To configure DHCP server excluded IP in the web interface:
1. Click Configuration, DHCP, Server, Excluded IP
2. Click Add IP Range then you can create new IP Range on the switch.
3. Click Apply.
Figure 2-4.1.2: DHCP server excluded IP
Parameter description: IP Range:
Define the IP range to be excluded IP addresses. The first excluded IP must be smaller than or equal to the second excluded IP. BUT, if the IP range contains only 1 excluded IP, then you can just input it to either one of the first and second excluded IP or both.
Buttons
Add IP Range - Click to add a new excluded IP range.
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
33
2-4.1.3 Pool
This page manages DHCP pools. According to the DHCP pool, DHCP server will allocate IP address and deliver configuration parameters to DHCP client.
Web Interface
To configure DHCP server pool in the web interface:
1. Click Configuration, DHCP, Server, Pool
2. Click Add New Pool then you can create new Pool on the switch.
3. Click Apply.
Figure 2-4.1.1: DHCP server pool
Parameter description:
Pool Setting
Add or delete pools.
Adding a pool and giving a name creates a new pool with "default" configuration. If you want to configure all settings including type, IP subnet mask and lease time, click the pool name to go into the configuration page.
Name:
Configure the pool name that accepts all printable characters, except spaces. To configure detailed settings, click the pool name to go into the configuration page.
Type:
Display type of pool.
Network: the pool defines a pool of IP addresses to service more than one DHCP client.
Host: the pool services for a specific DHCP client identified by client identifier or hardware address.
“-” displayed indicates not defined.
34
IP:
Display network number of the DHCP address pool.
“-” displayed indicates not defined.
Subnet Mask:
Display subnet mask of the DHCP address pool.
“-” displayed indicates not defined.
Lease Time:
Display lease time of the pool.
Buttons
Add New Pool - Click to add a new DHCP pool.
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
2-4.2 Snooping
DHCP Snooping is used to block intruders on untrusted ports of the switch when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server.
The section describes to configure the DHCP Snooping parameters of the switch. The DHCP Snooping can prevent attackers from adding their own DHCP servers to the network.
Web Interface
To configure DHCP snooping in the web interface:
1. Click Configuration, DHCP, Snooping
2. Select “Enabled” in the Mode of DHCP Snooping Configuration.
3. Select “Trusted” of the specific port in the Mode of Port Mode Configuration.
4. Click Apply.
Figure 2-4.2: DHCP Snooping Configuration
35
Parameter description: Snooping Mode:
Indicates the DHCP snooping mode operation. Possible modes are:
Enabled: Enable DHCP snooping mode operation. When DHCP snooping mode operation is enabled, the DHCP request messages will be forwarded to trusted ports and only allow reply packets from trusted ports.
Disabled: Disable DHCP snooping mode operation.
Port Mode Configuration
Indicates the DHCP snooping port mode. Possible port modes are:
Trusted: Configures the port as trusted source of the DHCP messages.
Untrusted: Configures the port as untrusted source of the DHCP messages.
Buttons
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
2-4.3 Relay
A DHCP relay agent is used to forward and to transfer DHCP messages between the clients and the server when they are not in the same subnet domain. It stores the incoming interface IP address in the GIADDR field of the DHCP packet. The DHCP server can use the value of GIADDR field to determine the assigned subnet. For such condition, please make sure the switch configuration of VLAN interface IP address and PVID(Port VLAN ID) correctly.
Web Interface
To configure DHCP Relay in the web interface:
1. Click Configuration, DHCP, Relay
2. Specify the Relay Mode, Relay server, Relay Information Mode, Relay Information police.
3. Click Apply.
Figure 2-4.3: DHCP Relay Configuration
36
Parameter description: Relay Mode:
Indicates the DHCP relay mode operation.
Possible modes are:
Enabled: Enable DHCP relay mode operation. When DHCP relay mode operation is enabled, the agent forwards and transfers DHCP messages between the clients and the server when they are not in the same subnet domain. DHCP broadcast messages won't be flooded.
Disabled: Disable DHCP relay mode operation.
Relay Server
Indicates the DHCP relay server IP address.
Relay Information Mode
Indicates the DHCP relay information mode option operation. The option 82 circuit ID format as "[vlan_id][module_id][port_no]". The first four characters represent the VLAN ID, the fifth and sixth characters are the module ID(in standalone device it always equal 0, in stackable device it means switch ID), and the last two characters are the port number. For example, "00030108" means the DHCP message receive form VLAN ID 3, switch ID 1, port No 8. And the option 82 remote ID value is equal the switch MAC address.
Possible modes are:
Enabled: Enable DHCP relay information mode operation. When DHCP relay information mode operation is enabled, the agent inserts specific information (option 82) into a DHCP message when forwarding to DHCP server and removes it from a DHCP message when transferring to DHCP client. It only works when DHCP relay operation mode is enabled.
Disabled: Disable DHCP relay information mode operation.
Relay Information Policy:
Indicates the DHCP relay information option policy. When DHCP relay information mode operation is enabled, if the agent receives a DHCP message that already contains relay agent information it will enforce the policy. The 'Replace' policy is invalid when relay information mode is disabled. Possible policies are: Replace: Replace the original relay information when a DHCP message that already contains it is received. Keep: Keep the original relay information when a DHCP message that already contains it is received. Drop: Drop the package when a DHCP message that already contains relay information is received.
Buttons
Apply – Click to save changes.
37
Reset - Click to undo any changes made locally and revert to previously saved values.
2-5 Security
This section shows you to configure the Port Security settings of the Switch. You can use the Port Security feature to restrict input to an interface by limiting and identifying MAC addresses.
2-5.1 Switch
2-5.1.1 Users
This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser
Web Interface
To configure User in the web interface:
1. Click Configuration, Security, Switch, Users.
2. Click Add new user
3. Specify the User Name.
4. Click Apply.
Figure 2-5.1.1: Users Configuration
Parameter description: User Name:
38
The name identifying the user. This is also a link to Add/Edit User.
Password
Allowed string length is 0 to 255, and allowed content is ASCII characters from 32 to 126.
Password (again)
Enter the password again.
Privilege Level:
The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully control of the device. But others value need to refer to each group privilege level. User's privilege should be same or greater than the group privilege level to have the access of that group. By default setting, most groups privilege level 5 has the read-only access and privilege level 10 has the read-write access. And the system maintenance (software upload, factory defaults and etc.) need user privilege level 15. Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account.
Buttons
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
Cancel - Click to undo any changes made locally and return to the Users.
Delete User - Delete the current user. This button is not available for new configurations
(Add new user)
2-5.1.2 Privilege Level
This page provides an overview of the privilege levels. The switch provides user set Account, Aggregation, Diagnostics, EEE, GARP, GVRP, IP, IPMC Snooping, LACP, LLDP, MED, MAC Table, MRP, MVR, MVRP, Maintenance, Mirroring, POE Ports, Private VLANs, QoS, SMTP, SNMP, Security, Spanning Tree, System Trap Event, VCL, VLANs, and Voice VLAN Privilege Levels from 1 to 15.
Web Interface
To configure Privilege Level in the web interface:
1. Click Configuration, Security, Switch, Privilege Levels.
2. Specify the Privilege parameters.
3. Click Apply.
Figure2-5.1.2: Privilege Level configuration
Loading...
+ 252 hidden pages