Interlogix IFS NS3550-24T/4S User Manual

Page 1
P/N 1072569 • REV 00.05 • ISS 11OCT12
IFS NS3550-24T/4S User Manual
Page 2
2
Copyright © 2012 UTC Fire & Security. All rights reserved.
This document may not be copied in whole or in part or otherwise reproduced without prior written consent from UTC Fire & Security, except where specifically permitted under US and international copyright law.
Disclaimer The information in this document is subject to change without notice. UTC Fire &
Security assumes no responsibility for inaccuracies or omissions and specifically disclaims any liabilities, losses, or risks, personal or otherwise, incurred as a consequence, directly or indirectly, of the use or application of any of the contents of this document. For the latest documentation, contact your local supplier or visit us online at www.interlogix.com.
This publication may contain examples of screen captures and reports used in daily operations. Examples may include fictitious names of individuals and companies. Any similarity to names and addresses of actual businesses or persons is entirely coincidental.
Trademarks and
patents
The Interlogix name and logo are trademarks of UTC Fire & Security.
The IFS name and logo are trademarks of UTC Fire & Security.
Other trade names used in this document may be trademarks or registered
trademarks of the manufacturers or vendors of the respective products.
Intended use Use this product only for the purpose it was designed for; refer to the data sheet
and user documentation for details. For the latest product information, contact your local supplier or visit us online at www.interlogix.com.
Manufacturer UTC Fire & Security Americas Corporation, Inc.
2955 Red Hill Avenue Costa Mesa, CA 92626-5923, USA
EU authorized manufacturing representative: UTC Fire & Security B.V., Kelvinstraat 7, 6003 DH Weert, The Netherlands
Certification
N4131
FCC compliance This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
You are cautioned that any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
ACMA compliance Notice! This is a Class A product. In a domestic environment this product may
cause radio interference in which case the user may be required to take adequate measures.
Canada This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme á la norme NMB-003du Canada.
European Union directives 2004/108/EC (EMC Directive): Hereby, UTC Fire & Security declares that this
device is in compliance with the essential requirements and other relevant provisions of Directive 2004/108/EC.
2002/96/EC (WEEE directive): Products marked with this symbol cannot be
disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: www.recyclethis.info.
Contact information For contact information see our Web site: www.interlogix.com
.
Contact support www.interlogix.com/customer support
Page 3
User’s Manual of NS3550-24T/4S
3
TABLE OF CONTENTS
IFS NS3550-24T/4S User Manual............................................................................................ 1
1. INTRODUCTION.................................................................................................................. 18
1.1 Packet Contents.........................................................................................................................................18
1.2 Product Description...................................................................................................................................18
1.3 How to Use This Manual............................................................................................................................20
1.4 Product Features........................................................................................................................................21
1.5 Product Specification................................................................................................................................24
2. INSTALLATION ...................................................................................................................26
2.1 Hardware Description................................................................................................................................26
2.1.1 Switch Front Panel ..............................................................................................................................................26
2.1.2 LED Indications ...................................................................................................................................................27
2.1.3 Switch Rear Panel...............................................................................................................................................28
2.2 Install the Switch........................................................................................................................................29
2.2.1 Desktop Installation .............................................................................................................................................29
2.2.2 Rack Mounting ....................................................................................................................................................30
2.2.3 Installing the SFP transceiver..............................................................................................................................31
2.2.4 Wiring the Power Input ........................................................................................................................................34
2.2.5 Wiring the Digital Input / Output...........................................................................................................................35
3. SWITCH MANAGEMENT.................................................................................................... 38
3.1 Requirements .............................................................................................................................................38
3.2 Management Access Overview.................................................................................................................39
3.3 Administration Console.............................................................................................................................39
3.4 Web Management.......................................................................................................................................41
3.5 SNMP-Based Network Management.........................................................................................................42
4. WEB CONFIGURATION...................................................................................................... 43
4.1 Main Web Page...........................................................................................................................................46
4.2 System.........................................................................................................................................................48
Page 4
4
4.2.1 System Information..............................................................................................................................................49
4.2.2 IP Configuration...................................................................................................................................................50
4.2.3 IPv6 Configuration ...............................................................................................................................................51
4.2.4 Users Configuration................................................................................................................................52
4.2.5 Users Privilege Levels .........................................................................................................................................56
4.2.6 NTP Configuration ...............................................................................................................................................58
4.2.7 UPnP Configuration.............................................................................................................................................58
4.2.8 DHCP Relay ........................................................................................................................................................60
4.2.9 DHCP Relay Statistics .........................................................................................................................................62
4.2.10 CPU Load..........................................................................................................................................................64
4.2.11 System Log........................................................................................................................................................65
4.2.12 Detailed Log ......................................................................................................................................................66
4.2.13 Remote Syslog ..................................................................................................................................................67
4.2.14 SMTP Configure ................................................................................................................................................67
4.2.15 Web Firmware Upgrade ....................................................................................................................................69
4.2.16 TFTP Firmware Upgrade ...................................................................................................................................70
4.2.17 Configuration Backup ........................................................................................................................................71
4.2.18 Configuration Upload.........................................................................................................................................73
4.2.19 Digital input/output.............................................................................................................................................74
4.2.20 Fault Alarm ........................................................................................................................................................75
4.2.21 Factory Default ..................................................................................................................................................77
4.2.22 System Reboot..................................................................................................................................................78
4.3 Simple Network Management Protocol ...................................................................................................79
4.3.1 SNMP Overview ..................................................................................................................................................79
4.3.2 SNMP System Configuration...............................................................................................................................80
4.3.3 SNMP System Information Configuration ............................................................................................................81
4.3.4 SNMP Trap Configuration....................................................................................................................................81
4.3.5 SNMPv3 Configuration ........................................................................................................................................84
4.3.5.1 SNMPv3 Communities Configuration ........................................................................................................84
4.3.5.2 SNMPv3 Users Configuration....................................................................................................................84
4.3.5.3 SNMPv3 Groups Configuration .................................................................................................................86
4.3.5.4 SNMPv3 Views Configuration ...................................................................................................................86
4.3.5.5 SNMPv3 Accesses Configuration..............................................................................................................87
4.4 Port Management.......................................................................................................................................89
4.4.1 Port Configuration................................................................................................................................................89
4.4.2 Port Statistics Overview.......................................................................................................................................91
4.4.3 Port Statistics Detail.............................................................................................................................................92
4.4.4 SFP Module Information......................................................................................................................................94
Page 5
User’s Manual of NS3550-24T/4S
5
4.4.5 Port Mirroring Configuration ................................................................................................................................95
4.5 Link Aggregation........................................................................................................................................98
4.5.1 Static Aggregation Configuration .......................................................................................................................100
4.5.2 LACP Configuration...........................................................................................................................................102
4.5.3 LACP System Status .........................................................................................................................................103
4.5.4 LACP Port Status...............................................................................................................................................105
4.5.5 LACP Port Statistics ..........................................................................................................................................106
4.6 VLAN..........................................................................................................................................................108
4.6.1 VLAN Overview .................................................................................................................................................108
4.6.2 IEEE 802.1Q VLAN ...........................................................................................................................................108
4.6.3 VLAN Basic Information ....................................................................................................................................112
4.6.4 VLAN Port Configuration ...................................................................................................................................113
4.6.5 VLAN Membership Configuration ...................................................................................................................... 117
4.6.6 VLAN Membership Status for User Static..........................................................................................................118
4.6.7 VLAN Port Status for User Static ....................................................................................................................... 119
4.6.8 Port Isolation Configuration ...............................................................................................................................120
4.6.9 Private VLAN Membership Configuration ..........................................................................................................122
4.6.10 VLAN setting example: ....................................................................................................................................124
4.6.10.1 Two separate 802.1Q VLAN..................................................................................................................124
4.6.10.2 VLAN Trunking between two 802.1Q aware switch...............................................................................128
4.6.10.3 Port Isolate ............................................................................................................................................129
4.7 Spanning Tree Protocol...........................................................................................................................132
4.7.1 Theory ...............................................................................................................................................................132
4.7.2 STP Bridge Configuration..................................................................................................................................138
4.7.3 Bridge Status.....................................................................................................................................................140
4.7.4 CIST Port Configuration ....................................................................................................................................140
4.7.5 MSTI Priorities...................................................................................................................................................143
4.7.6 MSTI Configuration............................................................................................................................................144
4.7.7 MSTI Ports Configuration ..................................................................................................................................145
4.7.8 Port Status.........................................................................................................................................................147
4.7.9 Port Statistics.....................................................................................................................................................148
4.8 Multicast....................................................................................................................................................150
4.8.1 IGMP Snooping .................................................................................................................................................150
4.8.2 IGMP Snooping Configuration...........................................................................................................................155
4.8.3 IGMP Port Related Configuration ......................................................................................................................155
4.8.4 VLAN Configuration...........................................................................................................................................157
4.8.5 Port Group Filtering ...........................................................................................................................................158
4.8.6 IGMP Snooping Status ......................................................................................................................................159
Page 6
6
4.8.7 MVR Configuration ............................................................................................................................................161
4.8.8 MVR Status .......................................................................................................................................................163
4.9 Quality of Service.....................................................................................................................................165
4.9.1 Understand QOS...............................................................................................................................................165
4.9.2 QCL Configuration Wizard.................................................................................................................................166
4.9.2.1 Set up Policy Rules .................................................................................................................................167
4.9.2.2 Set up Typical Network Application Rules ...............................................................................................168
4.9.2.3 Set up ToS Precedence Mapping ............................................................................................................171
4.9.2.4 Set up VLAN Tag Priority Mapping ..........................................................................................................172
4.9.3 QoS Control List Configuration..........................................................................................................................173
4.9.3.1 QoS Control Entry Configuration .............................................................................................................174
4.9.4 Port QoS Configuration .....................................................................................................................................175
4.9.5 Bandwidth Control .............................................................................................................................................177
4.9.6 Storm Control Configuration ..............................................................................................................................179
4.9.7 QoS Statistics....................................................................................................................................................180
4.9.8 DSCP Remarking ..............................................................................................................................................181
4.9.9 Voice VLAN Configuration.................................................................................................................................183
4.9.10 Voice VLAN OUI Table ....................................................................................................................................185
4.10 Access Control Lists..............................................................................................................................186
4.10.1 Access Control List Status ...............................................................................................................................187
4.10.2 Access Control List Configuration....................................................................................................................188
4.10.3 ACE Configuration ...........................................................................................................................................189
4.10.4 ACL Ports Configuration ..................................................................................................................................195
4.10.5 ACL Rate Limiter Configuration .......................................................................................................................196
4.11 Authentication ........................................................................................................................................198
4.11.1 Understanding IEEE 802.1X Port-Based Authentication..................................................................................199
4.11.2 Authentication Configuration ............................................................................................................................202
4.11.3 Network Access Server Configuration .............................................................................................................203
4.11.4 Network Access Overview ............................................................................................................................... 211
4.11.5 Network Access Statistics ................................................................................................................................212
4.11.6 Authentication Server Configuration ................................................................................................................216
4.11.7 RADIUS Overview ...........................................................................................................................................219
4.11.8 RADIUS Details ...............................................................................................................................................221
4.11.9 Windows Platform RADIUS Server Configuration............................................................................................225
4.11.10 802.1X Client Configuration...........................................................................................................................230
4.12 Security...................................................................................................................................................233
4.12.1 Port Limit Control.............................................................................................................................................233
4.12.2 Access Management .......................................................................................................................................236
Page 7
User’s Manual of NS3550-24T/4S
7
4.12.3 Access Management Statistics ........................................................................................................................237
4.12.4 HTTPs .............................................................................................................................................................238
4.12.5 SSH .................................................................................................................................................................238
4.12.6 Port Security Status.........................................................................................................................................239
4.12.7 Port Security Detail..........................................................................................................................................241
4.12.8 DHCP Snooping ..............................................................................................................................................242
4.12.9 DHCP Snooping Statistics...............................................................................................................................244
4.12.10 IP Source Guard Configuration......................................................................................................................245
4.12.11 IP Source Guard Static Table.........................................................................................................................247
4.12.12 ARP Inspection ..............................................................................................................................................248
4.12.13 ARP Inspection Static Table...........................................................................................................................249
4.13 Address Table.........................................................................................................................................251
4.13.1 MAC Address Table Configuration...................................................................................................................251
4.13.2 Static MAC Table Configuration .......................................................................................................................252
4.13.3 MAC Address Table Status ..............................................................................................................................252
4.13.4 MAC Table Learning ........................................................................................................................................254
4.13.5 Dynamic ARP Inspection Table........................................................................................................................255
4.13.6 Dynamic IP Source Guard Table .....................................................................................................................257
4.14 LLDP........................................................................................................................................................259
4.14.1 Link Layer Discovery Protocol .........................................................................................................................259
4.14.2 LLDP Configuration .........................................................................................................................................259
4.14.3 LLDPMED Configuration .................................................................................................................................262
4.14.4 LLDP-MED Neighbor.......................................................................................................................................267
4.14.5 Neighbor..........................................................................................................................................................269
4.14.6 Port Statistics...................................................................................................................................................270
4.15 Network Diagnostics..............................................................................................................................273
4.15.1 Ping .................................................................................................................................................................273
4.15.2 IPv6 Ping .........................................................................................................................................................274
4.15.3 Remote IP Ping Test ........................................................................................................................................275
4.15.4 Cable Diagnostics............................................................................................................................................277
5. COMMAND LINE INTERFACE.......................................................................................... 279
5.1 Accessing the CLI....................................................................................................................................279
Logon to the Console ..........................................................................................................................................279
Configure IP address...........................................................................................................................................280
5.2 Telnet Login..............................................................................................................................................282
6. Command Line Mode....................................................................................................... 283
Page 8
8
6.1 System Command....................................................................................................................................283
System Configuration..........................................................................................................................................283
System Name......................................................................................................................................................284
System Contact...................................................................................................................................................285
System Location..................................................................................................................................................285
System Timezone................................................................................................................................................286
System Prompt....................................................................................................................................................286
System Reboot....................................................................................................................................................287
System Restore Default ......................................................................................................................................287
System Load .......................................................................................................................................................287
System Log .........................................................................................................................................................288
6.2 IP Command ................................................................................................................. ............................289
IP Configuration...................................................................................................................................................289
IP DHCP..............................................................................................................................................................289
IP Setup ..............................................................................................................................................................290
IP Ping.................................................................................................................................................................290
IP DNS ................................................................................................................................................................291
IP DNS Proxy ......................................................................................................................................................291
IPv6 AUTOCINFIG ..............................................................................................................................................292
IPv6 Setup...........................................................................................................................................................292
IPv6 Ping.............................................................................................................................................................293
IP NTP Configuration ..........................................................................................................................................294
IP NTP Mode.......................................................................................................................................................294
IP NTP Server Add..............................................................................................................................................295
IP NTP Server IPv6 Add......................................................................................................................................295
IP NTP Server Delete..........................................................................................................................................296
6.3 Port Management Command ..................................................................................................................298
Port Configuration ...............................................................................................................................................298
Port Mode............................................................................................................................................................298
Port Flow Control ................................................................................................................................................299
Port State ............................................................................................................................................................299
Port Maximum Frame..........................................................................................................................................300
Port Power ..........................................................................................................................................................300
Port SFP..............................................................................................................................................................301
Port Excessive ....................................................................................................................................................302
Port Statistics ......................................................................................................................................................302
Port VeriPHY.......................................................................................................................................................303
6.4 MAC Address Table Command...............................................................................................................304
Page 9
User’s Manual of NS3550-24T/4S
9
MAC Configuration..............................................................................................................................................304
MAC Add .............................................................................................................................................................304
MAC Delete.........................................................................................................................................................305
MAC Look up ......................................................................................................................................................305
MAC Age Time ....................................................................................................................................................306
MAC Learning .....................................................................................................................................................306
MAC Dump..........................................................................................................................................................307
MAC Statistics.....................................................................................................................................................308
MAC Flush ..........................................................................................................................................................309
6.5 VLAN Configuration Command..............................................................................................................309
VLAN Configuration.............................................................................................................................................309
VLAV PVID..........................................................................................................................................................310
VLAN Frame Type...............................................................................................................................................311
VLAN Ingress Filter ............................................................................................................................................. 311
VLAN Mode.........................................................................................................................................................312
VLAN Link Type...................................................................................................................................................313
VLAN Q-in-Q Mode .............................................................................................................................................313
VLAN Ethernet Type............................................................................................................................................314
VLAN Add............................................................................................................................................................314
VLAN Delete .......................................................................................................................................................315
VLAN Look up .....................................................................................................................................................315
VLAN Status........................................................................................................................................................316
6.6 Private VLAN Configuration Command.................................................................................................317
PVLAN Configuration ..........................................................................................................................................317
PVLAN Add .........................................................................................................................................................318
PVLAN Delete .....................................................................................................................................................319
PVLAN Look up...................................................................................................................................................320
PVLAN Isolate.....................................................................................................................................................320
6.7 Security Command ..................................................................................................................................321
Security Switch User Configuration.....................................................................................................................321
Security Switch User Add....................................................................................................................................322
Security Switch User Delete................................................................................................................................322
Security Switch Privilege Level Configuration .....................................................................................................323
Security Switch Privilege Level Group.................................................................................................................324
Security Switch Privilege Level Current...............................................................................................................324
Security Switch Auth Configuration .....................................................................................................................324
Security Switch Auth Method...............................................................................................................................325
Security Switch SSH Configuration .....................................................................................................................326
Security Switch SSH Mode .................................................................................................................................326
Page 10
10
Security Switch HTTPs Configuration .................................................................................................................327
Security Switch HTTPs Mode..............................................................................................................................327
Security Switch HTTPs Redirect .........................................................................................................................328
Security Switch Access Configuration.................................................................................................................328
Security Switch Access Mode .............................................................................................................................329
Security Switch Access Add ................................................................................................................................329
Security Switch Access IPv6 Add........................................................................................................................330
Security Switch Access Delete ............................................................................................................................331
Security Switch Access Look up..........................................................................................................................331
Security Switch Access Clear ..............................................................................................................................331
Security Switch Access Statistics ........................................................................................................................332
Security Switch SNMP Configuration ..................................................................................................................332
Security Switch SNMP Mode ..............................................................................................................................334
Security Switch SNMP Version............................................................................................................................334
Security Switch SNMP Read Community............................................................................................................335
Security Switch SNMP Write Community ............................................................................................................336
Security Switch SNMP Trap Mode ......................................................................................................................336
Security Switch SNMP Trap Version ...................................................................................................................337
Security Switch SNMP Trap Community .............................................................................................................337
Security Switch SNMP Trap Destination .............................................................................................................338
Security Switch SNMP Trap IPv6 Destination .....................................................................................................338
Security Switch SNMP Trap Authentication Failure .............................................................................................339
Security Switch SNMP Trap Link-up....................................................................................................................339
Security Switch SNMP Trap Inform Mode ...........................................................................................................340
Security Switch SNMP Trap Inform Timeout .......................................................................................................341
Security Switch SNMP Trap Inform Retry Times .................................................................................................341
Security Switch SNMP Trap Probe Security Engine ID .......................................................................................342
Security Switch SNMP Trap Security Engine ID..................................................................................................342
Security Switch SNMP Trap Security Name........................................................................................................343
Security Switch SNMP Engine ID........................................................................................................................343
Security Switch SNMP Community Add ..............................................................................................................343
Security Switch SNMP Community Delete..........................................................................................................344
Security Switch SNMP Community Look up........................................................................................................344
Security Switch SNMP User Add.........................................................................................................................345
Security Switch SNMP User Delete.....................................................................................................................345
Security Switch SNMP User Changekey.............................................................................................................346
Security Switch SNMP User Look up ..................................................................................................................346
Security Switch SNMP Group Add ......................................................................................................................347
Security Switch SNMP Group Delete ..................................................................................................................347
Security Switch SNMP Group Look up................................................................................................................348
Page 11
User’s Manual of NS3550-24T/4S
11
Security Switch SNMP View Add.........................................................................................................................348
Security Switch SNMP View Delete ....................................................................................................................349
Security Switch SNMP View Look up..................................................................................................................349
Security Switch SNMP Access Add.....................................................................................................................350
Security Switch SNMP Access Delete.................................................................................................................350
Security Switch SNMP Access Look up ..............................................................................................................351
Security Network Psec Switch.............................................................................................................................351
Security Network Psec Port.................................................................................................................................352
Security Network Limit Configuration ..................................................................................................................353
Security Network Limit Mode...............................................................................................................................354
Security Network Limit Aging...............................................................................................................................354
Security Network Limit Agetime...........................................................................................................................355
Security Network Limit Port .................................................................................................................................355
Security Network Limit Limit ................................................................................................................................356
Security Network Limit Action..............................................................................................................................357
Security Network Limit Reopen ...........................................................................................................................357
Security Network NAS Configuration...................................................................................................................358
Security Network NAS Mode...............................................................................................................................358
Security Network NAS State................................................................................................................................359
Security Network NAS Reauthentication .............................................................................................................359
Security Network NAS ReauthPeriod ..................................................................................................................360
Security Network NAS EapolTimeout..................................................................................................................361
Security Network NAS Agetime...........................................................................................................................361
Security Network NAS Holdtime..........................................................................................................................362
Security Network NAS RADIUS_QoS .................................................................................................................362
Security Network NAS RADIUS_VLAN ...............................................................................................................363
Security Network NAS Guest_VLAN ...................................................................................................................363
Security Network NAS Authenticate ....................................................................................................................364
Security Network NAS Statistics..........................................................................................................................365
Security Network ACL Configuration ...................................................................................................................365
Security Network ACL Action...............................................................................................................................366
Security Network ACL Policy ...............................................................................................................................367
Security Network ACL Rate .................................................................................................................................368
Security Network ACL Add ..................................................................................................................................368
Security Network ACL Delete ..............................................................................................................................370
Security Network ACL Look up............................................................................................................................370
Security Network ACL Clear ................................................................................................................................370
Security Network ACL Status...............................................................................................................................371
Security Network DHCP Relay Configuration......................................................................................................371
Security Network DHCP Relay Mode ..................................................................................................................372
Page 12
12
Security Network DHCP Relay Server ................................................................................................................372
Security Network DHCP Relay Information Mode ...............................................................................................373
Security Network DHCP Relay Information Policy...............................................................................................373
Security Network DHCP Relay Statistics.............................................................................................................374
Security Network DHCP Snooping Configuration................................................................................................374
Security Network DHCP Snooping Mode ............................................................................................................375
Security Network DHCP Snooping Port Mode ....................................................................................................376
Security Network DHCP Snooping Statistics.......................................................................................................376
Security Network IP Source Guard Configuration ...............................................................................................377
Security Network IP Source Guard Mode............................................................................................................378
Security Network IP Source Guard Port Mode ....................................................................................................378
Security Network IP Source Guard Limit.............................................................................................................379
Security Network IP Source Guard Entry ............................................................................................................379
Security Network IP Source Guard Status...........................................................................................................380
Security Network ARP Inspection Configuration..................................................................................................380
Security Network ARP Inspection Mode..............................................................................................................381
Security Network ARP Inspection Port Mode ......................................................................................................381
Security Network ARP Inspection Entry ..............................................................................................................382
Security Network ARP Inspection Status .............................................................................................................382
Security AAA Configuration .................................................................................................................................383
Security AAA Timeout..........................................................................................................................................384
Security AAA Deadtime .......................................................................................................................................384
Security AAA RADIUS.........................................................................................................................................385
Security AAA ACCT_RADIUS .............................................................................................................................385
Security AAA TACACS+ ......................................................................................................................................386
Security AAA Statistics ........................................................................................................................................387
6.8 Spanning Tree Protocol Command ........................................................................................................389
STP Configuration ...............................................................................................................................................389
STP Version ........................................................................................................................................................389
STP Tx Hold ........................................................................................................................................................390
STP MaxHops .....................................................................................................................................................390
STP MaxAge .......................................................................................................................................................391
STP FwdDelay ....................................................................................................................................................391
STP CName ........................................................................................................................................................392
STP BPDU Filter .................................................................................................................................................392
STP BPDU Guard ...............................................................................................................................................393
STP Recovery .....................................................................................................................................................393
STP Status ..........................................................................................................................................................394
STP MSTI Priority................................................................................................................................................394
Page 13
User’s Manual of NS3550-24T/4S
13
STP MSTI Map....................................................................................................................................................395
STP MSTI Add.....................................................................................................................................................396
STP Port Configuration .......................................................................................................................................396
STP Port Mode....................................................................................................................................................396
STP Port Edge ....................................................................................................................................................397
STP Port AutoEdge .............................................................................................................................................398
STP Port P2P......................................................................................................................................................398
STP Port RestrictedRole .....................................................................................................................................399
STP Port RestrictedTcn .......................................................................................................................................399
STP Port bpduGuard...........................................................................................................................................400
STP Port Statistic ................................................................................................................................................400
STP Port Mcheck ................................................................................................................................................401
STP MSTI Port Configuration..............................................................................................................................401
STP MSTI Port Cost............................................................................................................................................402
STP MSTI Port Priority........................................................................................................................................402
6.9 Multicast Configuration Command ........................................................................................................403
IGMP Configuration.............................................................................................................................................403
IGMP Mode .........................................................................................................................................................404
IGMP Leave Proxy ..............................................................................................................................................404
IGMP State..........................................................................................................................................................405
IGMP Querier ......................................................................................................................................................405
IGMP Fastleave...................................................................................................................................................406
IGMP Throttling ...................................................................................................................................................407
IGMP Filtering .....................................................................................................................................................407
IGMP Router .......................................................................................................................................................408
IGMP Flooding ....................................................................................................................................................409
IGMP Groups ......................................................................................................................................................409
IGMP Status ........................................................................................................................................................409
6.10 Link Aggregation Command.................................................................................................................411
Aggregation Configuration...................................................................................................................................411
Aggregation Add.................................................................................................................................................. 411
Aggregation Delete..............................................................................................................................................411
Aggregation Look up ...........................................................................................................................................412
Aggregation Mode...............................................................................................................................................413
6.11 Link Aggregation Control Protocol Command....................................................................................414
LACP Configuration.............................................................................................................................................414
LACP Mode.........................................................................................................................................................414
LACP Key............................................................................................................................................................415
LACP Role ..........................................................................................................................................................415
Page 14
14
LACP Status........................................................................................................................................................416
LACP Statistics....................................................................................................................................................417
6.12 LLDP Command .....................................................................................................................................418
LLDP Configuration.............................................................................................................................................418
LLDP Mode .........................................................................................................................................................418
LLDP Optional TLV..............................................................................................................................................419
LLDP Interval.......................................................................................................................................................420
LLDP Hold...........................................................................................................................................................420
LLDP Delay .........................................................................................................................................................421
LLDP Reinit .........................................................................................................................................................421
LLDP Statistics ....................................................................................................................................................422
LLDP Info ............................................................................................................................................................422
LLDP CDP Aware................................................................................................................................................423
6.13 LLDPMED Command .............................................................................................................................423
LLDPMED Configuration .....................................................................................................................................423
LLDPMED Civic ..................................................................................................................................................424
LLDPMED ECS...................................................................................................................................................425
LLDPMED Policy Delete .....................................................................................................................................425
LLDPMED Policy Add..........................................................................................................................................426
LLDPMED Port Policy .........................................................................................................................................427
LLDPMED Coordinates .......................................................................................................................................427
LLDPMED Datum................................................................................................................................................428
LLDPMED Fast ...................................................................................................................................................428
LLDPMED Info ....................................................................................................................................................428
LLDPMED Debuge_med_transmit_var ...............................................................................................................429
6.14 Quality of Service Command................................................................................................................430
QoS Configuration...............................................................................................................................................430
QoS Classes .......................................................................................................................................................430
QoS Default.........................................................................................................................................................431
QoS Tag Priority ..................................................................................................................................................431
QoS QCL Port .....................................................................................................................................................432
QoS QCL Add......................................................................................................................................................432
QoS QCL Delete .................................................................................................................................................433
QoS QCL Look up...............................................................................................................................................434
QoS Mode ...........................................................................................................................................................434
QoS Weight.........................................................................................................................................................434
QoS Rate Limiter.................................................................................................................................................435
QoS Shaper ........................................................................................................................................................435
Page 15
User’s Manual of NS3550-24T/4S
15
QoS Storm Unicast..............................................................................................................................................436
QoS Strom Multicast............................................................................................................................................437
QoS Strom Broadcast..........................................................................................................................................437
QoS DSCP Remarking........................................................................................................................................438
QoS DSCP Queue Mapping................................................................................................................................438
6.15 Mirror Command ....................................................................................................................................439
Mirror Configuration.............................................................................................................................................439
Mirror Port ...........................................................................................................................................................439
Mirror SID............................................................................................................................................................440
Mirror Mode.........................................................................................................................................................440
6.16 Configuration Command.......................................................................................................................442
Configuration Save..............................................................................................................................................442
Configuration Load ..............................................................................................................................................442
6.17 Firmware Command...............................................................................................................................443
Firmware Load ....................................................................................................................................................443
Firmware IPv6 Load ............................................................................................................................................443
6.18 UPnP Command.....................................................................................................................................444
UPnP Configuration.............................................................................................................................................444
UPnP Mode.........................................................................................................................................................444
UPnP TTL............................................................................................................................................................445
UPnP Advertising Duration..................................................................................................................................445
6.19 MVR Command.......................................................................................................................................446
MVR Configuration..............................................................................................................................................446
MVR Group .........................................................................................................................................................446
MVR Status .........................................................................................................................................................447
MVR Mode ..........................................................................................................................................................447
MVR Port Mode...................................................................................................................................................448
MVR Multicast VLAN...........................................................................................................................................448
MVR Port Type....................................................................................................................................................449
MVR Immediate Leave........................................................................................................................................449
6.20 Voice VLAN Command...........................................................................................................................451
Voice VLAN Configuration...................................................................................................................................451
Voice VLAN Mode...............................................................................................................................................452
Voice VLAN ID ....................................................................................................................................................452
Voice VLAN Agetime ...........................................................................................................................................453
Voice VLAN Traffic Class ....................................................................................................................................454
Voice VLAN OUI Add...........................................................................................................................................454
Page 16
16
Voice VLAN OUI Delete ......................................................................................................................................455
Voice VLAN OUI Clear ........................................................................................................................................455
Voice VLAN OUI Look up....................................................................................................................................456
Voice VLAN Port Mode........................................................................................................................................456
Voice VLAN Security ...........................................................................................................................................457
6.21 SMTP Command.....................................................................................................................................458
SMTP Configuration ............................................................................................................................................458
SMTP Mode ........................................................................................................................................................458
SMTP Server.......................................................................................................................................................458
SMTP Auth ..........................................................................................................................................................459
SMTP Auth_user .................................................................................................................................................459
SMTP Auth_pass.................................................................................................................................................460
SMTP Mailfrom....................................................................................................................................................460
SMTP Mailsubject ...............................................................................................................................................460
SMTP Mailto1......................................................................................................................................................461
SMTP Mailto2......................................................................................................................................................461
6.22 Show Command.....................................................................................................................................462
Show ACL Configuration .....................................................................................................................................462
Show Link Aggregation Configuration .................................................................................................................462
Show IGMP Configuration...................................................................................................................................462
Show IP Configuration.........................................................................................................................................462
Show LACP Configuration...................................................................................................................................463
Show LLDP Configuration ...................................................................................................................................463
Show MAC Configuration ....................................................................................................................................463
Show Mirror Configuration...................................................................................................................................463
Show PoE Configuration .....................................................................................................................................463
Show Port Configuration .....................................................................................................................................464
Show Private VLAN Configuration.......................................................................................................................464
Show QoS Configuration.....................................................................................................................................464
Show SNMP Configuration..................................................................................................................................464
Show System Configuration ................................................................................................................................465
Show VLAN Configuration...................................................................................................................................465
Show STP Configuration .....................................................................................................................................465
6.23 DIDO Command......................................................................................................................................466
Di_act ..................................................................................................................................................................466
Di_desc ...............................................................................................................................................................466
Di_en...................................................................................................................................................................467
Do_act.................................................................................................................................................................468
Page 17
User’s Manual of NS3550-24T/4S
17
Do_en..................................................................................................................................................................468
Do_port_alr .........................................................................................................................................................469
Do_pwr_alr..........................................................................................................................................................469
fault_act...............................................................................................................................................................470
fault_en ...............................................................................................................................................................471
fault_port_alr .......................................................................................................................................................471
fault_pwr_alr........................................................................................................................................................471
7. SWITCH OPERATION....................................................................................................... 473
7.1 Address Table...........................................................................................................................................473
7.2 Learning....................................................................................................................................................473
7.3 Forwarding & Filtering.............................................................................................................................473
7.4 Store-and-Forward...................................................................................................................................473
7.5 Auto-Negotiation......................................................................................................................................474
8. TROUBLE SHOOTING...................................................................................................... 475
APPENDEX A........................................................................................................................ 477
A.1 Switch's RJ-45 Pin Assignments ...........................................................................................................477
A.2 10/100Mbps, 10/100Base-TX...................................................................................................................477
APPENDIX B: Local User Access Level Table ...................................................................479
APPENDEX C: GLOSSARY.................................................................................................. 481
Page 18
18
1. INTRODUCTION
The IFS NS3550-24T/4S is a 24 ports Gigabit Ethernet Switch with SFP fiber ports and robust layer 2 features.
The term “Managed Switch” refers to the NS3550-24T/4S Industrial
Switch.
1.1 Packet Contents
Open the box of the Managed Switch and carefully unpack it. The box should contain the following items:
Check the contents of your package for following parts:
The Managed Switch
x1
User’s Manual CD
x1
Quick Installation Guide
x1
19” Rack Mount Accessory Kit
x1
Power Cord
x1
Rubber Feet
X4
RS-232 DB9 Male Console Cable
x1
If any of these are missing or damaged, please contact your dealer immediately, if possible, retain the original carton and
packaging material in case of a need to return the product for repair/replacement.
1.2 Product Description
Environmentally Hardened Design for Industrial Networks
The IFS NS3550-24T/4S is an environmentally hardened Industrial Managed Ethernet Switch with high Port-density, Gigabit
Fiber link capability and 19” rack-mountable design. It is specifically designed to operate stable in electrically harsh and the
toughest environment with extended operating temperature ranges. The NS3550-24T/4S is equipped with advanced management functions and provides 24 10/100/1000Base-T copper ports and 4 shared 1000Base-S/LX SFP slots delivered in
a rugged strong case. It is capable of providing non-blocking switch fabric and wire-speed throughput as high as 48 Gbps in the temperature range from -40 to 75 Degree C without any packet loss and CRC error, which greatly simplifies the tasks of
upgrading the industrial and building automation LAN for adopting to increasing bandwidth demands of IP video surveillance.
The NS3550-24T/4S is the most reliable choice for highly-managed and Fiber Ethernet application in Industrial network.
Extend Operating Temperature: From -40 to 75 Degree C Robust Industrial Protection: IP30 metal case and 19” rack-mountable design Ethernet Protection: 6KV DC ESD protection Power Redundant: 1+2 RPS design, supports and dual 36~72V DC power input
Page 19
User’s Manual of NS3550-24T/4S
19
Redundant Ethernet Network: STP, RSTP and MSTP to greatly improve redundant data backup for links and guarantee
network resilience
Flexible Fiber uplink capability: Compatible with 1000Base-SX/LX and 100Base-FX SFP transceiver
Layer 2 / Layer 4 Full-functioned Managed Switch for Building Automation Networking
The NS3550-24T/4S Industrial Managed Ethernet Switch is ideal for applications in the factory data centers and distributions. It
provides advanced Layer 2 to Layer 4 data switching and redundancy, Quality of Service traffic control, network access control
and authentication, and Secure Management features to protect customer’s industrial network connectivity with reliable
switching recovery capability that is suitable for implementing fault tolerant and mesh network architectures.
Cost-effective IPv6 Managed Gigabit Switch solution for industrial
Nowadays, lots of electronic products or mobile devices can browse the Internet, which means the need of IP Address increases.
However, the current IPv4 network infrastructure is not capable enough to provide IP Address to each single users/Clients. The situation forces the ISP to build up the IPv6 (Internet Protocol version 6) network infrastructure speedily. To fulfill the demand, IFS releases the IPv6 management Gigabit Ethernet Switch. It supports both IPv4 and IPv6 management functions. It can
work with original network structure (IPv4) and also support the new network structure (IPv6) in the future. With easy and friendly
management interfaces and plenty of management functions included, the NS3550-24T/4S Managed Switch is the best choice
for you to build the IPv6 FTTx edge service and for Industrial to connect with IPv6 network.
DC Redundant Power to ensure continuous operation
IFS NS3550-24T/4S is equipped with
an additional DC 36 ~ 72V power supply unit for redundant power supply installation.
Redundant Power Systems are specifically designed to handle the demands of high tech facilities requiring the highest power
integrity. Furthermore, with the 36~ 72V DC power supply implemented, the NS3550-24T/4S can be applied as the telecom level
device that could be located at the electronic room.
Powerful Security
The Managed Switch offers comprehensive Access Control List (ACL) for enforcing security to the edge. Its protection
mechanisms also comprise of port-based 802.1x and MAC-based user and device authentication. The port-security is effective in
limit the numbers of clients pass through, so that network administrators can now construct highly secured corporate networks
with time and effort considerably less than before.
Page 20
20
1.3 How to Use This Manual
This User Manual is structured as follows:
Section 2, INSTALLATION
The section explains the functions of the Switch and how to physically install the Managed Switch.
Section 3, SWITCH MANAGEMENT
The section contains the information about the software function of the Managed Switch.
Section 4, WEB CONFIGURATION
The section explains how to manage the Managed Switch by Web interface.
Section 5, COMMAND LINE INTERFACE
The section describes how to use the Command Line interface (CLI).
Section 6, CLI CONFIGURATION
The section explains how to manage the Managed Switch by Command Line interface.
Section 7, SWITCH OPERATION
The chapter explains how to does the switch operation of the Managed Switch.
Section 8, TROUBSHOOTING
The chapter explains how to trouble shooting of the Managed Switch.
Appendix A
The section contains cable information of the Managed Switch.
Page 21
User’s Manual of NS3550-24T/4S
21
1.4 Product Features
Physical Port
NS3550-24T/4S
24-Port 10/100/1000Base-T Gigabit Ethernet RJ-45 4 100/1000Base-X SFP slots, shared with Port-21 to Port-24 RS-232 DB9 console interface for Switch basic management and setup
Industrial Conformance
36 to 72V DC, redundant power with polarity reverse protect function
-40 to 75 Degree C operating temperature
IP-30 metal case, 19-inch Rack-mountable
Relay alarm for port breakdown, power failure
Supports 6000 VDC Ethernet ESD protection
Free fall, Shock and Vibration Stability
FAN-1 Design
Layer 2 Features
Prevents packet loss with back pressure (Half-Duplex) and IEEE 802.3x PAUSE frame flow control (Full-Duplex)
High performance of Store-and-Forward architecture, broadcast storm control and runt/CRC filtering eliminates
erroneous packets to optimize the network bandwidth
Storm Control support:
Broadcast / Multicast / Unknown-Unicast
Support VLAN
IEEE 802.1Q Tagged VLAN
Up to 255 VLANs groups, out of 4094 VLAN IDs
Provider Bridging (VLAN Q-in-Q) support (IEEE 802.1ad)
Private VLAN Edge (PVE)
Voice VLAN
Support Spanning Tree Protocol
STP, IEEE 802.1D Spanning Tree Protocol
RSTP, IEEE 802.1w Rapid Spanning Tree Protocol
MSTP, IEEE 802.1s Multiple Spanning Tree Protocol, spanning tree by VLAN
BPDU Guard
Support Link Aggregation
802.3ad Link Aggregation Control Protocol (LACP)
Cisco ether-channel (Static Trunk)
Maximum 12 trunk groups, up to 16 ports per trunk group
Up to 32Gbps bandwidth(Duplex Mode)
Provide Port Mirror (many-to-1)
Page 22
22
Port Mirroring to monitor the incoming or outgoing traffic on a particular port
Quality of Service
Ingress Shaper and Egress Rate Limit per port bandwidth control
4 priority queues on all switch ports
Traffic classification:
- IEEE 802.1p CoS
- TOS / DSCP / IP Precedence of IPv4/IPv6 packets
- IP TCP/UDP port number
- Typical network application
Strict priority and Weighted Round Robin (WRR) CoS policies
Supports QoS and In/Out bandwidth control on each port
Traffic-policing policies on the switch port
QoS Control List Wizard makes QoS creation and configuration easier and more quickly
DSCP remarking
Multicast
Supports IGMP Snooping v1, v2 and v3
Querier mode support
IGMP Snooping port filtering
Multicast VLAN Registration (MVR) support
Security
IEEE 802.1x Port-Based / MAC-Based network access authentication
Built-in RADIUS client to co-operate with the RADIUS servers
TACACS+ login users access authentication
RADIUS / TACACS+ users access authentication
IP-Based Access Control List (ACL)
MAC-Based Access Control List
Source MAC / IP address binding
DHCP Snooping to filter un-trusted DHCP messages
Dynamic ARP Inspection discards ARP packets with invalid MAC address to IP address binding
IP Source Guard prevents IP spoofing attacks
Auto DoS rule to defend DoS attack
IP address access management to prevent unauthorized intruder
Management
Switch Management Interfaces
- Console / Telnet Command Line Interface
- Web switch management
Page 23
User’s Manual of NS3550-24T/4S
23
- SNMP v1, v2c, and v3 switch management
- SSH / SSL secure access
Four RMON groups (history, statistics, alarms, and events)
IPv6 IP Address / NTP / DNS management
Built-in Trivial File Transfer Protocol (TFTP) client
BOOTP and DHCP for IP address assignment
Firmware upload/download via HTTP / TFTP
DHCP Relay and Option 82
User Privilege levels control
NTP (Network Time Protocol)
Link Layer Discovery Protocol (LLDP) Protocol
Cable Diagnostic technology provides the mechanism to detect and report potential cabling issues
Reset button for system reboot or reset to factory default
IFS Smart Discovery Utility for deploy management
ICMPv6
 Redundant Power System
36~ 72V DC Dual power redundant
Active-active redundant power failure protection
Backup of catastrophic power failure on one supply
Fault tolerance and resilience.
Digital Input / Digital Output
2 Digital Input (DI)
2 Digital Output (DO)
Integrate sensors into auto alarm system
Transfer alarm to IP network via email and SNMP trap
Page 24
24
1.5 Product Specification
Product NS3550-24T/4S
Hardware Specification
Copper Ports
24 10/ 100/1000Base-T RJ-45 Auto-MDI/MDI-X ports
SFP/mini-GBIC Slots
4 1000Base-SX/LX/BX SFP interfaces, shared with Port 21 to Port 24 Compatible with 100Base-FX SFP
Console Port
1 x RS-232 DB9 serial port (115200, 8, N, 1)
Switch Processing Scheme
Store-and-Forward
Switch Throughput@64Bytes 35.7Mpps Switch Fabric
48Gbps / non-blocking
Address Table
8K entries, automatic source address learning and ageing
Share data Buffer
1392 kilobytes
Flow Control
IEEE 802.3x Pause Frame for Full-Duplex Back pressure for Half-Duplex
Jumbo Frame
10Kbytes
Reset Button
< 5 seconds: System reboot > 10 seconds: Factory Default
Dimension (W x D x H)
440 x 200 x 44.5 mm, 1U high
Weight
2.96kg
LED
Power, Link/Act and speed per Gigabit port
Power Consumption
Max. 30 Watts / 102 BTU (AC)
Power Requirement – DC
36V DC @ 0.75A, Range: 36V ~ 72V DC
ESD Protection
6KV DC
DI/DO
2 Digital Input (DI): Level 0: -24~2.1V (± 0.1V)
Level 1: 2.1~24V (± 0.1V)
Input Load Current: 10mA max.
2 Digital Output (DO): Open collector to 24VDC, 100mA max. load
Layer 2 Function
Port configuration
Port disable / enable Auto-Negotiation 10/100/1000Mbps full and half duplex mode selection Flow Control disable / enable Bandwidth control on each port Power saving mode control
Port Status
Display each port’s speed duplex mode, link status, Flow control status. Auto negotiation status, trunk status.
VLAN
802.1Q Tagged Based VLAN Port-Based VLAN Q-in-Q
Private VLAN Edge (PVE) Up to 256 VLAN groups, out of 4094 VLAN IDs
Port trunking
IEEE 802.3ad LACP / Static Trunk Support 12 groups of 16-Port trunk support
QoS
Traffic classification based, Strict priority and WRR 4-level priority for switching
- Port Number
- 802.1p priority
- 802.1Q VLAN tag DSCP/TOS field in IP Packet Policy-Based QoS
IGMP Snooping
IGMP (v1/v2) Snooping, up to 255 multicast Groups IGMP Querier mode support
Access Control List
IP-Based ACL / MAC-Based ACL Up to 256 entries
Management
Page 25
User’s Manual of NS3550-24T/4S
25
Basic Management Interfaces
Console, Telnet, Web Browser, SNMPv1, v2c and v3
Secure Management Interface
SSH, SSL, SNMP v3
SNMP MIBs
RFC-1213 MIB-II
IF-MIB
RFC-1493 Bridge MIB
RFC-1643 Ethernet MIB
RFC-2863 Interface MIB
RFC-2665 Ether-Like MIB
RFC-2819 RMON MIB (Group 1)
RFC-2737 Entity MIB
RFC-2618 RADIUS Client MIB
RFC-2933 IGMP-STD-MIB ()
RFC3411 SNMP-Frameworks-MIB
IEEE802.1X PAE
LLDP
MAU-MIB
Standards Conformance
Regulation Compliance
FCC Part 15 Class A, CE
Safety
UL, cUL
Standards Compliance
IEEE 802.3 10Base-T
IEEE 802.3u 100Base-TX/100Base-FX
IEEE 802.3z Gigabit SX/LX
IEEE 802.3ab Gigabit 1000T
IEEE 802.3x Flow Control and Back pressure
IEEE 802.3ad Port trunk with LACP
IEEE 802.1D Spanning tree protocol
IEEE 802.1w Rapid Spanning tree protocol
IEEE 802.1s Multiple Spanning tree protocol
IEEE 802.1p Class of service
IEEE 802.1Q VLAN Tagging
IEEE 802.1x Port Authentication Network Control
IEEE 802.1ab LLDP
RFC 768 UDP
RFC 793 TFTP
RFC 791 IP
RFC 792 ICMP
RFC 2068 HTTP
RFC 1112 IGMP version 1
RFC 2236 IGMP version 2
Stability
IEC60068-2-32 (Free fall)
IEC60068-2-27 (Shock)
IEC60068-2-6 (Vibration)
Environment
Operating
Temperature: -40 ~ 75 Degree C for DC power input.
Relative Humidity: 5 ~ 95% (non-condensing)
Storage
Temperature: -40 ~ 85 Degree C
Relative Humidity: 5 ~ 95% (non-condensing)
Page 26
26
2. INSTALLATION
This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount. For easier
management and control of the Managed Switch, familiarize yourself with its display indicators, and ports. Front panel
illustrations in this chapter display the unit LED indicators. Before connecting any network device to the Managed Switch, please
read this chapter completely.
2.1 Hardware Description
2.1.1 Switch Front Panel
The unit front panel provides a simple interface monitoring the Switch. Figure 2-1 shows the front panel of the Managed Switch.
NS3550-24T/4S Front Panel
Figure 2-1 NS3550-24T/4S Front Panel
Gigabit TP interface
10/100/1000Base-T Copper, RJ-45 Twist-Pair: Up to 100 meters.
Gigabit SFP slots
1000Base-SX/LX mini-GBIC slot, SFP (Small Factor Pluggable) transceiver module: From 550 meters (Multi-mode fiber), up
to 10/30/50/70 kilometers (Single-mode fiber).
Console Port
The console port is a DB9, RS-232 male serial port connector. It is an interface for connecting a terminal directly. Through the
console port, it provides rich diagnostic information includes IP Address setting, factory reset, port management, link status
and system setting. Users can use the attached RS-232 cable in the package and connect to the console port on the device.
After the connection, users can run any terminal emulation program (Hyper Terminal, ProComm Plus, Telix, Winterm, etc. to
enter the startup screen of the device.
Reset button
On the left side of front panel, the reset button is designed for rebooting the Managed Switch without a power cycle. The
following is the summary table of Reset button functions:
Page 27
User’s Manual of NS3550-24T/4S
27
Reset Button Pressed and Released Function
< 5 sec: System reboot Reboot the Managed Switch
> 5 sec: Factory Default
Reset the Managed Switch to Factory Default configuration.
The Managed Switch will then reboot and load the default
settings as below:
Default Username: admin Default Password: admin Default IP address: 192.168.0.100 Subnet mask: 255.255.255.0 Default Gateway: 192.168.0.254
2.1.2 LED Indications
The front panel LEDs indicates instant status of port links, data activity and system power; helps monitor and troubleshoot when
needed. Figure 2-2 shows the LED indications of these Managed Switch.
NS3550-24T/4S LED indication
Figure 2-2 NS3550-24T/4S LED Panel
System
LED Color Function
DC1 Green
Illuminates to indicate that the Switch is powered on by DC1 input.
DC2 Green Illuminates to indicate that the Switch is powered on by DC2 input.
Fault Green Illuminates to indicate that Switch AC/DC or port has failed. PWR Green
Illuminates to indicate that the Switch is powered on. Blink to indicate the System is running under booting procedure.
Page 28
28
10/100/1000Base-T interfaces
LED Color Function
Iluminates:
To indicate the link through that port is successfully established with speed
1000Mbps.
Blink:
To indicate that the switch is actively sending or receiving data over that port.
1000
LNK/ACT
Green
Off:
If L10/100 NK/ACT LED light-> indicates that the port is operating at 10Mbps or 100Mbps. If LNK/ACT LED Off -> indicate that the port is link down.
Illuminates:
To indicate the link through that port is successfully established with speed 10Mbps or 100Mbps.
Blink:
To indicate that the switch is actively sending or receiving data over that port.
10/100
LNK/ACT
Orange
Off:
If 1000 LNK/ACT LED light-> indicates that the port is operating at 1000Mbps If 1000 LNK/ACT LED Off -> indicates that the port is link down.
1000Base-SX/LX SFP interfaces (Shared Port-21~Port-24)
LED Color Function
Lights:
To indicate the link through that SFP port is successfully established.
LNK/ACT Green
Off:
To indicate that the SFP port is link down
2.1.3 Switch Rear Panel
The rear panel of the Managed Switch indicates an AC inlet power socket, which works with an input power range from 50-60Hz.
Figure 2-3 shows the rear panel of this Managed Switch.
NS3550-24T/4S Rear Panel
Figure 2-3 Rear Panel of the NS3550-24T/4S
1. The device requires a power connection to operate. If your networks should active all the time, please consider using UPS (Uninterrupted Power Supply) for your device. It will prevent you from network data loss or network downtime.
2. For additional protection against unregulated voltage or current surges, you may also want to consider surge suppression as part of your installation.
Page 29
User’s Manual of NS3550-24T/4S
29
2.2 Install the Switch
This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the
following topics and perform the procedures in the order being presented. To install your Managed Switch on a desktop or shelf,
simply complete the following steps.
2.2.1 Desktop Installation
To install the Managed Switch on desktop or shelf, please follows these steps:
As desktop and rackmount installation demonstration as following is an example for a GE-DSSG-244-POE, however, the installation procedure of NS3550-24T/4S is the same with a GE-DSSG-244-POE.
Step1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch. Step2: Place the Managed Switch on the desktop or the shelf near an AC power source, as shown in Figure 2-4.
Figure 2-4 Place the Managed Switch on the Desktop
Step3: Keep enough ventilation space between the Managed Switch and the surrounding objects.
When choosing a location, please keep in mind the environmental restrictions discussed in Chapter 1, Section 4, Product Specification.
Step4: Connect the Managed Switch to network devices.
Connect one end of a standard network cable to the 10/100/1000 RJ-45 ports on the front of the Managed Switch
Connect the other end of the cable to the network devices such as printer servers, workstations or routers…etc.
Page 30
30
Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. For more information, please see the Cabling Specification in Appendix A.
Step5: Supply power to the Managed Switch.
Connect one end of the power cable to the Managed Switch.
Connect the power plug of the power cable to a standard wall outlet.
When the Managed Switch receives power, the Power LED should remain solid Green.
2.2.2 Rack Mounting
To install the Managed Switch in a 19-inch standard rack, please follow the instructions described below.
Step1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the front side. Step2: Attach the rack-mount bracket to each side of the Managed Switch with supplied screws attached to the package.
Figure 2-5 shows how to attach brackets to one side of the Managed Switch.
Figure 2-5 Attach Brackets to the Managed Switch.
You must use the screws supplied with the mounting brackets. Damage caused to the parts by using incorrect screws would invalidate the warranty.
Step3: Secure the brackets tightly. Step4: Follow the same steps to attach the second bracket to the opposite side. Step5: After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the rack, as
shown in Figure 2-6.
Page 31
User’s Manual of NS3550-24T/4S
31
Figure 2-6 Mounting the Managed Switch on a Rack
Step6: Proceeds with the steps 4 and steps 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply
power to the Managed Switch.
2.2.3 Installing the SFP transceiver
The sections describe how to plug-in an SFP transceiver into an SFP slot.
The SFP transceivers are hot-swappable. You can plug-in and out the transceiver to/from any SFP port without a need to shut the
power down. SFPs and fiber cables are plugged in as shown in Figure 2-7.
Figure 2-7 Plug-in the SFP Transceiver
Page 32
32
Approved IFS SFP Transceivers
IFS Managed Switch supports both Single mode and Multi-mode SFP transceiver. Please refer to below chart, as well as the IFS
website for the latest compatible SFP modules:
We recommend using IFS SFPs on the Managed Switch. If you insert a SFP transceiver that is not supported, the Managed Switch will not recognize it.
Before connect the other Managed Switches, workstation or Media Converter.
1. Make sure both sides use the same type of SFP transceiver, for example: 1000Base-SX to 1000Base-SX, 1000Base-LX to
1000Base-LX.
2. Check the fiber-optic cable type match the SFP transceiver model.
To connect to 1000Base-SX SFP transceiver, use the Multi-mode fiber cable- with one side must be male duplex LC
connector type.
To connect to 1000Base-LX SFP transceiver, use the Single-mode fiber cable-with one side must be male duplex LC
connector type.
Page 33
User’s Manual of NS3550-24T/4S
33
Connect the fiber cable
1. Attach the duplex LC connector on the network cable into the SFP transceiver.
2. Connect the other end of the cable to a device – switches with SFP installed, fiber NIC on a workstation or a Media
Converter.
3. Check the LNK/ACT LED of the SFP slot on the front of the Managed Switch. Ensure that the SFP transceiver is operating
correctly.
4. Check the Link mode of the SFP port if the link failed.
Remove the transceiver module
1. Make sure there is no network activity. Go through the management interface of the switch to disable the port in advance.
2. Remove the Fiber Optic Cable gently.
3. Turn the handle of the MGB module to the horizontal position.
4. Pull out the module gently with the handle.
Figure 2-8 Pull out the SFP Transceiver
Never pull out the module without pull the handle or the push bolts on the module. Directly pulling out the module may damage the module and SFP module slot of the Managed Switch. MFB series SFP module remove procedure is the same with MGB series SFP Module.
Page 34
34
2.2.4 Wiring the Power Input
The 6-contact terminal block connector on the rear panel of NS3550-24T/4S is used for two DC redundant powers inputs. Please
follow the steps below to insert the power wire.
1. Insert positive / negative DC power wires into the contacts 1 and 2 for DC POWER 1, or 5 and 6 for DC POWER 2.
Figure 2-9 Wiring the Redundant Power Inputs
2. Tighten the wire-clamp screws to prevent the wires from loosening.
1 2 3 4 5 6
DC 2 DC 1
+ - + -
Figure 2-10 6-Pin Terminal Block Power Wiring Input
The wire gauge for the terminal block should be in the range between 12 ~ 24 AWG.
Page 35
User’s Manual of NS3550-24T/4S
35
2.2.5 Wiring the Digital Input / Output
The 6-contact terminal block connector on the rear panel of the NS3550-24T/4S is used for Digital Input and Digital Output.
Please follow the steps below to insert wire.
1. The NS3550-24T/4S offers two DI and DO groups. 1 and 2 are DI groups, 3 and 4 are DO groups and 5 is GND
(ground).The 6 pin is unassigned.
Figure 2-11 Wiring the Redundant Power Inputs
2. Tighten the wire-clamp screws for preventing the wires from loosing.
1 2 3 4 5 6
DI0 DI1 DO0 DO1 GND GND
Figure 2-12 6-Pin Terminal Block DI / DO Wiring Input
3. There are two Digital Input groups for you to monitor two different devices. The following topology shows how to wire DI0
and DI1.
The required voltage of 2 digital input groups is -30V DC maximum, current is 8mA maximum. The required voltage of 2 digital output groups is -30V DC maximum, current is 200mA maximum.
Page 36
36
Figure 2-13 Wires DI0 and DI1 to Open Detector
4. There are two Digital Output groups for you to be notified of if the NS3550-24T/4S port fails or power fails and issues a high
or low signal to external device. The following topology shows how to wire DO0 and DO1.
Figure 2-14 Wiring DO0 and DO1 to Open Detector
Page 37
User’s Manual of NS3550-24T/4S
37
Page 38
38
3. SWITCH MANAGEMENT
This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the
types of management applications and the communication and management protocols that deliver data between your
management device (workstation or personal computer) and the system. It also contains information about port connection
options.
This chapter covers the following topics:
Requirements
Management Access Overview
Administration Console Access
Web Management Access
SNMP Access
Standards, Protocols, and Related Reading
3.1 Requirements
Workstations of subscribers running Windows 98/ME, NT4.0, 2000/XP, 2003, Vistsa, MAC OS9 or later, Linux,
UNIX or other platform compatible with TCP/IP protocols.
Workstation installed with Ethernet NIC (Network Interface Card)  Serial Port connection (Terminal)
Above PC with COM Port (DB9 / RS-232) or USB-to-RS-232 converter
Ethernet Port connection
Network cables - Use standard network (UTP) cables with RJ45 connectors.
Above Workstation installed with WEB Browser and JAVA runtime environment Plug-in
It is recommended to use Internet Explore 7.0 or above to access Managed Switch.
Page 39
User’s Manual of NS3550-24T/4S
39
3.2 Management Access Overview
The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods:
 An administration console Web browser interface  An external SNMP-based network management application
The administration console and Web browser interface support are embedded in the Managed Switch software and are available
for immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management
methods.
Method Advantages Disadvantages
Console
No IP address or subnet needed Text-based Telnet functionality and HyperTerminal
built into Windows 95/98/NT/2000/ME/XP operating systems
Secure
Must be near switch or use dial-up connection Not convenient for remote users Modem connection may prove to be unreliable
or slow
Web Browser
Ideal for configuring the switch remotely Compatible with all popular browsers Can be accessed from any location User friendly GUI
Security can be compromised (hackers need
only know the IP address and subnet mask)
May encounter lag times on poor connections
SNMP Agent
Communicates with switch functions at
the MIB level
Based on open standards
Requires SNMP manager software Least visually appealing of all three methods Some settings require calculations Security can be compromised (hackers need
only know the community name)
Table 3-1 Management Methods Comparison
3.3 Administration Console
The administration console is an internal, character-oriented, and command line user interface for performing system
administration such as displaying statistics or changing option settings. Using this method, you can view the administration
console from a terminal, personal computer, Apple Macintosh, or workstation connected to the switch's console (serial) port.
There are two ways to use this management method: via direct access or modem port access. The following sections describe these methods. For more information about using the console, refer to Chapter 5 Command Line Interface Console Management.
Page 40
40
Figure 3-1 Console Management Diagram
Direct Access
Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a
terminal-emulation program (such as HyperTerminal) to the Managed Switch console (serial) port.
When using this management method, a straight DB9 RS-232 cable is required to connect the switch to the PC. After making
this connection, configure the terminal-emulation program to use the following parameters:
The default parameters are:
115200 bps
8 data bits
No parity
1 stop bit
Figure 3-2 Terminal Parameter Settings
You can change these settings, if desired, after you log on. This management method is often preferred because you can remain
connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of
Page 41
User’s Manual of NS3550-24T/4S
41
the interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation
program for connecting to the terminal serial port. A workstation attachment under UNIX can use an emulator such as TIP.
3.4 Web Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the
network through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the switch, you can
access the Managed Switch's Web interface applications directly in your Web browser by entering the IP address of the Managed
Switch.
Figure 3-3 Web Management Diagram
You can then use your Web browser to list and manage the Managed Switch configuration parameters from one central location,
just as if you were directly connected to the Managed Switch's console port. Web Management requires either Microsoft
Internet Explorer 6.0 or later, Safari or Mozilla Firefox 1.5 or later.
Figure 3-4 Web Main Screen of Managed Switch
Page 42
42
3.5 SNMP-Based Network Management
You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMPc Network
Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP
agent on the switch and the SNMP Network Management Station to use the same community string. This management method,
in fact, uses two community strings: the get community string and the set community string. If the SNMP Net-work
management Station only knows the set community string, it can read and write to the MIBs. However, if it only knows the get
community string, it can only read MIBs. The default gets and sets community strings for the Managed Switch are public.
Figure 3-5 SNMP Management Diagram
Page 43
User’s Manual of NS3550-24T/4S
43
4. WEB CONFIGURATION
This section introduces the configuration and functions of the Web-Based management.
About Web-based Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the
network through a standard browser such as Microsoft Internet Explorer.
The Web-Based Management supports Internet Explorer 7.0. It is based on Java Applets with an aim to reduce network
bandwidth consumption, enhance access speed and present an easy viewing screen.
By default, IE7.0 or later version does not allow Java Applets to open sockets. The user has to explicitly modify the browser setting to enable Java Applets to use network ports.
The Managed Switch can be configured through an Ethernet connection, make sure the manager PC must be set on same the IP
subnet address with the Managed Switch.
For example, the default IP address of the Managed Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x
(where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0.
If you have changed the default IP address of the Managed Switch to 192.168.1.1 with subnet mask 255.255.255.0 via console,
then the manager PC should be set at 192.168.1.x (where x is a number between 2 and 254) to do the relative configuration on
manager PC.
Figure 4-1-1 Web Management Diagram
Page 44
44
Logging on the switch
1. Use Internet Explorer 7.0 or above Web browser. Enter the factory-default IP address to access the Web interface. The
factory-default IP Address as following:
http://192.168.0.100
2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the
username/password you have changed via console) to login the main screen of Managed Switch. The login screen is
shown in Figure 4-1-2.
Figure 4-1-2 Login Screen
Default User name: admin Default Password: admin
After entering the username and password, the main screen is shown in Figure 4-1-3.
Page 45
User’s Manual of NS3550-24T/4S
45
Figure 4-1-3 Default Main Page
Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web
interface. The Switch Menu on the left of the web page let you access all the commands and statistics the Managed Switch
provides.
1. It is recommended to use Internet Explore 7.0 or above to access Managed Switch.
2. Since the changed IP address take effect immediately after you click on the Save button, you
need to use the new IP address to access the Web interface.
3. For security reason, please change and memorize the new password after this first setup.
4. The Switch only accepts command in lowercase letters in the web interface.
Page 46
46
4.1 Main Web Page
The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to
access the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s
Web browser interface to configure and manage it.
Figure 4-1-4 Main Page
Panel Display
The web agent displays an image of the Managed Switch’s ports. The Mode can be set to display different information for the ports, including Link up or Link down. Clicking on the image of a port opens the Port Statistics page.
The port states are illustrated as follows:
State Disabled Down Link
RJ-45 Ports
SFP Ports
Main Functions Menu
SFP Port Link Status
Main Screen
Help Button
Copper Port Link Status
Page 47
User’s Manual of NS3550-24T/4S
47
Main Menu
Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or
monitor network conditions. Via the Web-Management, the administrator can setup the Managed Switch by select the functions
those listed in the Main Function. The screen is shown in Figure 4-1-5.
Figure 4-1-5 NS3550-24T/4S Managed Switch Main Functions Menu
Page 48
48
4.2 System
Use the System menu items to display and configure basic administrative details of the Managed Switch. Under System the
following topics are provided to configure and view the system information: This section has the following items:
System Information The switch system information is provided here.
IP Configuration Configure the switch-managed IP information on this page.
IPv6 Configuration Configure the switch-managed IPv6 information on this page.
Users Configuration
This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser.
Users Pri vilege Levels
This page provides an overview of the privilege levels.
NTP Configuration Configure NTP on this page.
UPnP Configure UPnP on this page.
DHCP Relay Configure DHCP Relay on this page.
DHCP Relay Statistics This page provides statistics for DHCP relay.
CPU Load This page displays the CPU load, using a SVG graph.
System Log The switch system log information is provided here.
Detailed Log The switch system detailed log information is provided here.
Remote Syslog Configure remote syslog on this page.
Web Firmware Upgrade This page facilitates an update of the firmware controlling the switch.
TFTP Firmware Upgrade Upgrade the firmware via TFTP server
Configuration Backup
You can save the switch configuration. The configuration file is in XML format with a hierarchy of tags.
Configuration Upload
You can load the switch configuration. The configuration file is in XML format with a hierarchy of tags.
SMTP Configure Configure SMTP for alarm on this page.
Digital input/output This page is for you setting up digital input and digital output and what kind of
action will be done.
Fault Alarm This page is for you monitoring power and port status. If they are failed,
system will trigger alarm.
Factory Default
You can reset the configuration of the switch on this page. Only the IP configuration is retained.
System Reboot You can restart the switch on this page. After restart, the switch will boot
normally.
Page 49
User’s Manual of NS3550-24T/4S
49
4.2.1 System Information
The System Info page provides information for the current device information. System Info page helps a switch administrator to
identify the hardware MAC address, software version and system uptime. The screen is shown in Figure 4-2-1.
Figure 4-2-1 System Information Page Screenshot
The page includes the following fields:
Object Description
Contact
The system contact configured in Configuration | System | Information | System Contact.
Name
The system name configured in Configuration | System | Information | System Name.
Location
The system location configured in Configuration | System | Information | System Location.
MAC Addre ss
The MAC Address of this switch.
Power Status
Indicate DC power supply input of this switch.
Temperature
Indicate main chipset temperature.
System Date
The current (GMT) system time and date. The system time is obtained through the configured SNTP Server, if any.
Page 50
50
System Uptime
The period of time the device has been operational.
Software Version
The software version of the switch.
Software Date
The software version date of the switch.
Buttons
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
: Click to refresh the page; any changes made locally will be undone.
4.2.2 IP Configuration
The IP Configuration includes the IP Address, Subnet Mask and Gateway. The Configured column is used to view or change the
IP configuration. Fill up the IP Address, Subnet Mask and Gateway for the device. The screen is shown in Figure 4-2-2.
Figure 4-2-2 IP Configuration Page Screenshot
The Current column is used to show the active IP configuration.
Object Description
DHCP Client
Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP will retry. If DHCP fails and the configured IP address is non-zero, DHCP will stop and the configured IP settings will be used. The DHCP client will announce the configured System Name as hostname to provide DNS lookup.
IP Address
Provide the IP address of this switch in dotted decimal notation.
IP Mask
Provide the IP mask of this switch dotted decimal notation.
Page 51
User’s Manual of NS3550-24T/4S
51
IP Router
Provide the IP address of the router in dotted decimal notation.
VLAN ID
Provide the managed VLAN ID. The allowed range is 1 through 4095.
DNS Server
Provide the IP address of the DNS Server in dotted decimal notation.
DNS Proxy
When DNS proxy is enabled, DUT will relay DNS requests to the current configured DNS server on DUT, and reply as a DNS resolver to the client device on the network.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
: Click to undo any changes made locally and revert to previously saved values.
4.2.3 IPv6 Configuration
Configure the switch-managed IPv6 information on this page.
The Configured column is used to view or change the IPv6 configuration. The Current column is used to show the active IPv6
configuration. The screen is shown in Figure 4-2-3.
Figure 4-2-3 IPv6 Configuration Page Screenshot
The page includes the following fields:
Object Description
Auto Configuration
Enable IPv6 auto-configuration by checking this box. If fails, the configured IPv6 address is zero. The router may delay responding to a router solicitation for a few seconds, the total time needed to complete auto-configuration can be significantly longer.
Address
Provide the IPv6 address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It also used a following legally
Page 52
52
IPv4 address. For example, '::192.1.2.34'.
Prefix
Provide the IPv6 Prefix of this switch. The allowed range is 1 through 128.
Router
Provide the IPv6 gateway address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It also used a following legally IPv4 address. For example, '::192.1.2.34'. Provide the IPv6 SNTP Server address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It also used a following legally IPv4 address. For example, '::192.1.2.34'.
VLAN ID
Provide the managed VLAN ID. The allowed range is 1 through 4095
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.2.4 Users Configuration
It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local
authentication methods, such as telnet and Web browser. The latest UTC Managed Switch provides totally six different security
levels in 3 groups for local user management.
Group Access / Security Level Access
Master Admin Master
Master Viewer IT Admin IT
IT Viewer Security Admin Security
Security Viewer
Refer to Appendix B
This web page provide user configuration for switch management access level, the web screen is shown in Figure 4-2-4 appears.
Page 53
User’s Manual of NS3550-24T/4S
53
Figure 4-2-4: User Configuration Interface Screenshot
The page includes the following fields:
Object Description
Username: Display Username of the Managed Switch. Access Level: Display the access level of the Managed Switch. Edit: Provide edit current specific user setting.
Add New User:
Provide add new user setting of the Managed Switch, the web screen is shown in
Figure 4-2-5 appears.
Page 54
54
Add / Edit User
This page configures a user – add, edit or delete user.
Figure 4-2-5: Add New User Configuration Interface Screenshot
The page includes the following fields:
Object Description
User Name:
Assign Username for the Managed Switch.
Access Level:
Assign the access level of the Managed Switch; the available options are:
Master Admin Master Viewer IT Admin IT Viewer Security Admin
Security Viewer
Assign/Change Password:
Assign password for the Managed Switch.
Reconfirm Password:
Input password again to confirm setting.
Apply:
Press this button to take affect.
Delete User
Delete the current user. This button is not available for new configurations (Add
new user)
Once the new user is added, the new user entry shown in the Users Configuration page.
Page 55
User’s Manual of NS3550-24T/4S
55
Figure 4-2-6 User Configuration page screenshot
After change the default password, if you forget the password. Please press the “Reset” button
in the front panel of the Managed Switch over 10 seconds and then release, the current setting
includes VLAN, will be lost and the Managed Switch will restore to the default mode.
The preset user priorities for each function is listed under the section titled Appendix B.
Page 56
56
4.2.5 Users Privilege Levels
This page provides an overview of the privilege levels. After setup completed, please press “Save” button to take effect. Please
login web interface with new user name and password, The screen is shown in Figure 4-2-7.
Figure 4-2-7 Privilege Levels Configuration Page Screenshot t
The page includes the following fields:
Object Description
Group Name
The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them contains more than one. The following description defines these privilege level groups in
Page 57
User’s Manual of NS3550-24T/4S
57
details: System: Contact, Name, Location, Timezone, Log. Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection and IP source guard. IP: Everything except 'ping'. Port: Everything except 'VeriPHY'. Diagnostics: 'ping' and 'VeriPHY'. Maintenance: CLI- System Reboot, System Restore Default, System Password, Configuration Save, Configuration Load and Firmware Load. Web- Users, Privilege Levels and everything in Maintenance. Debug: Only present in CLI.
Privilege Level
Every privilege level group has an authorization level for the following sub groups: configuration read-only, configuration/execute read-write, status/statistics read-only, and status/statistics read-write (e.g. for clearing of statistics).
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 58
58
4.2.6 NTP Configuration
Configure NTP on this page.
NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses
UDP (data grams) as transport layer. You can specify NTP Servers and set GMT Time zone. The NTP Configuration screen is
shown in Figure 4-2-8.
Figure 4-2-8 NTP Configuration Page Screenshot
The page includes the following fields:
Object Description
Mode
Indicates the NTP mode operation. Possible modes are: Enabled: Enable NTP mode operation. When enable NTP mode operation, the agent forward and to transfer NTP messages between the clients and the server when they are not on the same subnet domain. Disabled: Disable NTP mode operation.
Timezone
Allow select the time zone according to current location of switch.
Server #
Provide the NTP IPv4 or IPv6 address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separates each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It also used a following legally IPv4 address. For example, '::192.1.2.34'.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.2.7 UPnP Configuration
Configure UPnP on this page.
Page 59
User’s Manual of NS3550-24T/4S
59
UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify
the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments
for simplified installation of computer components. The UPnP Configuration screen is shown in Figure 4-2-9.
Figure 4-2-9 UPnP
Configuration Page Screenshot
The page includes the following fields:
Object Description
Mode
Indicates the UPnP operation mode. Possible modes are:
Enabled: Enable UPnP mode operation. Disabled: Disable UPnP mode operation.
When the mode is enabled, two ACEs are added automatically to trap UPNP related packets to CPU. The ACEs are automatically removed when the mode is disabled.
TTL
The TTL value is used by UPnP to send SSDP advertisement messages. Valid values are in the range 1 to 255.
Advertising Duration
The duration, carried in SSDP packets, is used to inform a control point or control points how often it or they should receive a SSDP advertisement message from this switch. If a control point does not receive any message within the duration, it will think that the switch no longer exists. Due to the unreliable nature of UDP, in the standard it is recommended that such refreshing of advertisements to be done at less than one-half of the advertising duration. In the implementation, the switch sends SSDP messages periodically at the interval one-half of the advertising duration minus 30 seconds. Valid values are in the range 100 to 86400.
Page 60
60
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Figure 4-2-10 UPnP
devices shows on Windows My Network Places
4.2.8 DHCP Relay
Configure DHCP Relay on this page. DHCP Relay is used to forward and to transfer DHCP messages between the clients and
the server when they are not on the same subnet domain.
The DHCP option 82 enables a DHCP relay agent to insert specific information into DHCP request packet when forwarding
client DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server
DHCP packets to a DHCP client. The DHCP server can use this information to implement IP address or other assignment policies.
Specifically the option works by setting two sub-options:
Circuit ID (option 1)
Remote ID (option2).
The Circuit ID sub-option is supposed to include information specific to which circuit the request came in on.
The Remote ID sub-option was designed to carry information relating to the remote host end of the circuit.
Page 61
User’s Manual of NS3550-24T/4S
61
The definition of Circuit ID in the switch is 4 bytes in length and the format is "vlan_id" "module_id" "port_no". The parameter of
"vlan_id" is the first two bytes represent the VLAN ID. The parameter of "module_id" is the third byte for the module ID. The
parameter of "port_no" is the fourth byte and it means the port number.
The Remote ID is 6 bytes in length, and the value is equal the DHCP relay agent’s MAC address. The DHCP Relay Configuration
screen is shown in Figure 4-2-11.
Figure 4-2-11 DHCP Relay
Configuration Page Screenshot
The page includes the following fields:
Object Description
Relay Mode
Indicates the DHCP relay mode operation. Possible modes are: Enabled: Enable DHCP relay mode operation. When enable DHCP relay mode operation, the agent forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain. And the DHCP broadcast message won't flood for security considered. Disabled: Disable DHCP relay mode operation.
Relay Server
Indicates the DHCP relay server IP address. A DHCP relay agent is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
Relay Information
Mode
Indicates the DHCP relay information mode option operation. Possible modes are: Enabled: Enable DHCP relay information mode operation. When enable DHCP relay information mode operation, the agent insert specific information (option
82) into a DHCP message when forwarding to DHCP server and remove it from a DHCP message when transferring to DHCP client. It only works under DHCP relay operation mode enabled. Disabled: Disable DHCP relay information mode operation.
Relay Information
Policy
Indicates the DHCP relay information option policy. When enable DHCP relay information mode operation, if agent receives a DHCP message that already contains relay agent information. It will enforce the policy. And it only works under DHCP relay information operation mode enabled. Possible policies are: Replace: Replace the original relay information when receive a DHCP message that already contains it. Keep: Keep the original relay information when receive a DHCP message that already contains it. Drop: Drop the package when receive a DHCP message that already contains relay information.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 62
62
4.2.9 DHCP Relay Statistics
This page provides statistics for DHCP relay. The DHCP Relay Statistics screen is shown in Figure 4-2-12.
Figure 4-2-12 DHCP Relay Statistics Page Screenshot
The page includes the following fields:
Server Statistics
Object Description
Transmit to Server
The packets number that relayed from client to server.
Transmit Error
The packets number that packet of error sent packets to client.
Receive form Server
The packets number that received packets from server.
Receive Missing Agent
Option
The packets number that received packets without agent information options.
Receive Missing
Circuit ID
The packets number that received packets which the Circuit ID option was missing.
Receive Missing
Remote ID
The packets number that received packets which Remote ID option was missing.
Receive Bad Circuit ID
The packets number that the Circuit ID option did not match known the circuit ID.
Receive Bad Remote
ID
The packets number that the Remote ID option did not match the known Remote ID.
Client Statistics
Object Description
Transmit to Client
The number of packets relayed packets from server to client.
Transmit Error
The number of packets that sent error packets to servers.
Receive form Client
The number of packets received from the server.
Receive Agent Option
The number of packets received with relay agent information option.
Replace Agent Option
The number of packets that replaced received packets with relay agent information option.
Keep Agent Optin
The number of packets that keepped received packets with relay agent information option.
Page 63
User’s Manual of NS3550-24T/4S
63
Drop Agent Option
The number packets that dropped received packets with relay agent information option.
Buttons
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
: Click to refresh the page; any changes made locally will be undone.
: Clear all statistics.
Page 64
64
4.2.10 CPU Load
This page displays the CPU load, using a SVG graph.
The load is measured as averaged over the last 100ms, 1sec and 10 seconds intervals. The last 120 samles are graphed, and
the last numbers are displayed as text as well.
In order to display the SVG graph, your browser must support the SVG format. Consult the SVG Wiki for more information on
browser support. Specifically, at the time of writing, Microsoft Internet Explorer will need to have a plugin installed to support SVG.
The CPU Load screen is shown in Figure 4-2-13.
Figure 4-2-13 CPU Load Page Screenshot
Buttons
Auto-refresh
: Check this box to enable an automatic refresh of the page at regular intervals.
If your browser can not display this chart, please download Adobe SVG tool and install it in your
computer.
Page 65
User’s Manual of NS3550-24T/4S
65
4.2.11 System Log
The switch system log information is provided here. The System Log screen is shown in Figure 4-2-14.
Figure 4-2-14 System Log Page Screenshot
The page includes the following fields:
Object Description
ID
The ID (>= 1) of the system logging entry.
Level
The level of system logging entry. The following level types are supported:
Info: Information level of the system log. Warning: Warning level of the system log. Error: Error level of the system log. All: All levels.
Time
The time of the system log entry.
Message
The message of the system logging entry.
Buttons
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
: Click to refresh the page; any changes made locally will be undone.
: Clear all statistics.
: Hide the statistics.
: Download the statistics.
: Updates the system log entries, starting from the first available entry ID.
: Updates the system log entries, ending at the last entry currently displayed.
: Updates the system log entries, starting from the last entry currently displayed.
Page 66
66
: Updates the system log entries, ending at the last available entry ID.
4.2.12 Detailed Log
The switch system detailed log information is provided here. The Detailed Log screen is shown in Figure 4-2-15.
Figure 4-2-15 Detailed Log Page Screenshot
The page includes the following fields:
Object Description
ID
The ID (>= 1) of the system log entry.
Message
The message of system logging entry.
Buttons
: Click to refresh the page; any changes made locally will be undone.
: Updates the system log entries, starting from the first available entry ID.
: Updates the system log entries, ending at the last entry currently displayed.
: Updates the system log entries, starting from the last entry currently displayed.
: Updates the system log entries, ending at the last available entry ID.
Page 67
User’s Manual of NS3550-24T/4S
67
4.2.13 Remote Syslog
Configure remote syslog on this page. The Remote Syslog screen is shown in Figure 4-2-16.
Figure 4-2-16 Remote Syslog Page Screenshot
The page includes the following fields:
Object Description
Mode
Indicates the remote syslog mode operation. Possible modes are:
Enabled: Enable remote syslog mode operation. Disabled: Disable remote syslog mode operation.
Syslog Server IP
Fill in your remote syslog server IP address.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.2.14 SMTP Configure
This page facilitates a SMTP Configure the switch. The SMTP Configure screen is shown in Figure 4-2-17.
Page 68
68
Figure 4-2-17 Web Firmware Upgrade Page Screenshot
The page includes the following fields:
Object Description
SMTP Mode
Controls whether SMTP is enabled on this switch.
SMTP Server
Type the SMTP server name or the IP address of the SMTP server.
SMTP Port
Set port number of SMTP service.
SMTP Authentication
Controls whether SMTP authentication is enabled If authentication is required when an e-mail is sent.
Authentication User
Name
Type the user name for the SMTP server if Authentication is Enable.
Authentication
Password
Type the password for the SMTP server if Authentication is Enable.
E-mail From
Type the sender’s E-mail address. This address is used for reply e-mails.
E-mail Subject
Type the subject/title of the e-mail.
E-mail 1 To
E-mail 2 To
Type the receiver’s e-mail address.
Buttons
: Send a test mail to mail server to check this account is available or not.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 69
User’s Manual of NS3550-24T/4S
69
4.2.15 Web Firmware Upgrade
This page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen is shown in Figure
4-2-18.
Figure 4-2-18 Web Firmware Upgrade Page Screenshot
To open Firmware Upgrade screen perform the folling:
1. Click System -> Web Firmware Upgrade.
2. The Firmware Upgrade screen is displayed as in Figure 4-2-18.
3. Click the “
“button of the main page, the system would pop up the file selection menu to choose firmware.
4. Select the firmware file then click “
”, the Software Upload Progress would show the file upload status.
5. Once the software be loaded to the system successfully, the following screen. The system will load the new software after
reboot.
Figure 4-2-19 Software successfully Loaded Notice Screen
DO NOT Power OFF the Managed Switch until the update progress is complete.
Do not quit the Firmware Upgrade page without pressing the “OK” button - after the image be loaded. Or the system won’t apply the new firmware. User has to repeat the firmware upgrade processes again.
Page 70
70
4.2.16 TFTP Firmware Upgrade
The Firmware Upgrade page provides the functions to allow a user to update the Managed Switch firmware from the TFTP
server in the network. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP
server. The TFTP Firmware Upgrade screen is shown in Figure 4-2-20.
Figure 4-2-20 TFTP Firmware Update Page Screenshot
The page includes the following fields:
Object Description
TFTP Server IP
Fill in your TFTP server IP address.
Firmware File Name
The name of firmware image. (Maximum length: 24 characters)
Buttons
: Click to upgrade firmware.
1. DO NOT Turn OFF Power the Managed Switch until the update progress is complete.
2. Do not quit the Firmware Upgrade page without press the “OK” button - after the image
was loaded, or the system won’t apply to the new firmware. User has to repeat the firmware upgrade processes again.
Page 71
User’s Manual of NS3550-24T/4S
71
4.2.17 Configuration Backup
This function allows backup and reload the current configuration of the Managed Switch to the local management station. The
Configuration Backup screen is shown in Figure 4-2-21.
Figure 4-2-21 Configuration Backup Page Screenshot
You can save/view or load the switch configuration. The configuration file is in XML format with a hierarchy of tags:
Header tags:
<?xml version="1.0"?> and <configuration>. These tags are mandatory and must be present at the beginning of the file.
Section tags:
<platform>, <global> and <switch>. The platform section must be the first section tag and this section must include the correct platform ID and version. The global section is optional and includes configuration that is not related to specific switch ports. The switch section is optional and includes configuration that is related to specific switch ports.
Module tags:
<ip>, <mac>, <port> etc. These tags identify a module controlling specific parts of the configuration.
Group tags:
<port_table>, <vlan_table> etc. These tags identify a group of parameters, typically a table.
Parameter tags:
<mode>, <entry> etc. These tags identify parameters for the specific section, module and group. The <entry> tag is used for table entries.
Configuration parameters are represented as attribute values. When saving the configuration from the switch, the entire
configuration including syntax descriptions is included in the file. The file may then be modified using an editor and loaded to a
switch.
The example is as below shows ismall configuration file only including configuration of the MAC address age time and the
learning mode per port. When loading this file, only the included parameters will be changed. This means that the age time will be
set to 200 and the learn mode will be set to automatic.
Save Configuration
1. Press the Save Configuration” button to save the current configuration in manager workstation. The following screens in
Figure 4-2-22 & 4-2-23 appear
Page 72
72
Figure 4-2-22 File Download Screen
2. Chose the file save path in management workstation.
Figure 4-2-23 File Save Screen
Page 73
User’s Manual of NS3550-24T/4S
73
4.2.18 Configuration Upload
This function allows backup and reload the current configuration of the Managed Switch to the local management station. The
Configuration Upload screen is shown in Figure 4-2-24.
Figure 4-2-24 Configuration Upload Page Screenshot
Configuration Upload
1. Click the “ ” button of the main page, the system would pop up the file selection menu to choose saved
configuration. The Configuration screen is shown in Figure 4-2-25.
Figure 4-2-25 Windows File Selection Menu Popup
2. Select on the configuration file then click “
”, the bottom of the browser shows the upload status.
3. After the upload process is finished, the foloowing meassage appears; “Transfer Completed”.
Page 74
74
4.2.19 Digital input/output
Digital Input allows the user to manage external devices with customized messages for specific events, and create logs in to
system log, syslog, issue SNMP trap or issue an alarm e-mail.
Digital Output allows user to monitor the switch port and power , and let system issues a high or low signal to an external device
(such as alarm) when the monitor port or power has been failed. The Configuration screen is shown in Figure 4-2-26.
Figure 4-2-26 Windows File Selection Menu Popup
The page includes the following fields:
Object Description
Enable
Checks the Enable checkbox will enable Digital Input / output function. Unchecks the Enable checkbox will disable Digital input / output function.
Trigger
As Digital Input:
Allows user selecting to High to Low or Low to High. This is means a signal received by system is from High to Low or From Low to High, it will trigger an action that logs a customize message or issue the message from the switch.
As Digital Output:
Allows user selecting to High to Low or Low to High. This is means
that when
the switch has power failed or port failed then system will issue a High
Page 75
User’s Manual of NS3550-24T/4S
75
or Low signal to an external device (such as an alarm).
Event Description
Allows user setting a customize message for Digital Input function alarming.
Action
As Digital Input:
Allows user to record alarm message to System log, syslog or issues out via SNMP Trap or SMTP. As default SNMP Trap and SMTP are disabled, please enable them first if you want to issue alarm message via them.
As Digital Output:
Allows user to monitor and alarm from port fail or power fail.
Power Alarm
Allows user to choose which power module want to be monitored.
Port Alarm
Allows user to choose which port want to be monitored.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.2.20 Fault Alarm
The Fault Relay Alarm function provides the Power Failure and Port Link Down/Broken detection. With both power input 1 and
power input 2 installed and the check boxes of power 1/power 2 ticked, the FAULT LED indicator will then be possible to light up
when any one of the power failures occurs. As for the Port Link Down/Broken detection, the FAULT LED indicator will light up when the port failure occurs; certainly the check box beside the port must be ticked first. Please refer to the segment of ‘Wiring the Fault Alarm Contact’ for the failure detection. The Configuration screen is shown in Figure 4-2-27.
Page 76
76
Figure 4-2-27 Windows File Selection Menu Popup
The page includes the following fields:
Object Description
Enable
Allows user to enable Fault Alarm function.
Record
Allows user to record alarm message to System log, syslog or issues out via SNMP Trap or SMTP. As default SNMP Trap and SMTP are disabled, please enable them first if you want to issue alarm message via them.
Action
Allows user to monitor and alarm from port fail or power fail.
Power Alarm
Allows user to choose which power module want to be monitored.
Port Alarm
Allows user to choose which port want to be monitored.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 77
User’s Manual of NS3550-24T/4S
77
4.2.21 Factory Default
You can reset the configuration of the switch on this page. Only the IP configuration is retained. The new configuration is available
immediately, which means that no restart is necessary. The Factory Default screen is shown in Figure 4-2-28.
Figure 4-2-28 Factory Default Page Screenshot
Buttons
: Click to reset the configuration to Factory Defaults.
: Click to return to the Port State page without resetting the configuration.
After the “Reset” button is pressed and the device is rebooted, the system will load the default IP settings as following:
Default IP address: 192.168.0.100Subnet mask: 255.255.255.0Default Gateway: 192.168.0.254
The other setting value is back to disable or none.
To reset the Managed Switch to the Factory default setting, you can also press the hardware reset button at the front panel about 10 seconds. After the device be rebooted. You can login the management WEB interface within the same subnet of 192.168.0.xx.
Hardware Reset button
Page 78
78
4.2.22 System Reboot
The Reboot page enables the device to be rebooted from a remote location. Once the Reboot button is pressed, the user will
have to re-login the WEB interface about 60 seconds later. The System Reboot screen is shown in Figure 4-2-29.
Figure 4-2-29 System Reboot Page Screenshot
Buttons
: Click to reboot the system.
: Click to return the Port State page without reboot the system.
Page 79
User’s Manual of NS3550-24T/4S
79
4.3 Simple Network Management Protocol
4.3.1 SNMP Overview
The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management
information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network
growth.
An SNMP-managed network consists of three key components: Network management stations (NMSs), SNMP agents,
Management information base (MIB) and network-management protocol Network management stations (NMSs)Sometimes called consoles, these devices execute management applications
that monitor and control network elements. Physically, NMSs are usually engineering workstation-caliber computers with
fast CPUs, megapixel color displays, substantial memory, and abundant disk space. At least one NMS must be present in
each managed environment.
AgentsAgents are software modules that reside in network elements. They collect and store management information
such as the number of error packets received by a network element.
Management information base (MIB)A MIB is a collection of managed objects residing in a virtual information store.
Collections of related managed objects are defined in specific MIB modules.
network-management protocolA management protocol is used to convey management information between agents
and NMSs. SNMP is the Internet community's de facto standard management protocol.
SNMP Operations
SNMP itself is a simple request/response protocol. NMSs can send multiple requests without receiving a response.
Get -- Allows the NMS to retrieve an object instance from the agent. Set -- Allows the NMS to set values for object instances within an agent. Tra p - - Used by the agent to asynchronously inform the NMS of some event. The SNMPv2 trap message is designed to
replace the SNMPv1 trap message.
SNMP community
An SNMP community is the group that devices and management stations running SNMP belong to. It helps define where
information is sent. The community name is used to identify the group. A SNMP device or agent may belong to more than one
SNMP community. It will not respond to requests from management stations that do not belong to one of its communities. SNMP
default communities are:
Write = private Read = public
Use the SNMP Menu to display or configure the Managed Switch's SNMP function. This section has the following items:
System Configuration
Configure SNMP on this page.
System Information
The system information is provides here.
Trap Configuration
Configure SNMP trap on this page.
SNMPv3 Communities
Configure SNMPv3 communities table on this page.
Page 80
80
SNMPv3 Users
Configure SNMPv3 users table on this page.
SNMPv3 Groups
Configure SNMPv3 groups table on this page.
SNMPv3 Views
Configure SNMPv3 views table on this page.
SNMPv3 Accesses
Configure SNMPv3 accesses table on this page.
4.3.2 SNMP System Configuration
Configure SNMP on this page. The SNMP System Configuration screen is shown in Figure 4-3-1.
Figure 4-3-1 SNMP System Configuration Page Screenshot
The page includes the following fields:
Object Description
Mode
Indicates the SNMP mode operation. Possible modes are:
Enabled: Enable SNMP mode operation. Disabled: Disable SNMP mode operation.
Version
Indicates the SNMP supported version. Possible versions are:
SNMP v1: Set SNMP supported version 1. SNMP v2c: Set SNMP supported version 2c. SNMP v3: Set SNMP supported version 3.
Read Community
Indicates the community read access string to permit access to SNMP agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. The field only suits to SNMPv1 and SNMPv2c. SNMPv3 is using USM for authentication and privacy and the community string will associated with SNMPv3 communities table.
Write Community
Indicates the community writes access string to permit access to SNMP agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. The field only suits to SNMPv1 and SNMPv2c. SNMPv3 is using USM for authentication and privacy and the community string will be associated with SNMPv3 community’s table.
Engine ID
Indicates the SNMPv3 engine ID. The string must contain an even number between 10 and 64 hexadecimal digits, but all-zeros and all-'F's are not allowed. Change of the Engine ID will clear all original local users.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 81
User’s Manual of NS3550-24T/4S
81
4.3.3 SNMP System Information Configuration
The switch system information is provided here. The System Information Configuration screen is shown in Figure 4-3-2.
Figure 4-3-2 System Information Configuration Page Screenshot
The page includes the following fields:
Object Description
System Contact
The textual identification of the contact person for this managed node, together with information on how to contact this person. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126.
System Name
An administratively assigned name for this managed node. By convention, this is the node's fully-qualified domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name. The first character must be an alpha character. And the first or last character must not be a minus sign. The allowed string length is 0 to 255.
System Location
The physical location of this node (e.g., telephone closet, 3rd floor). The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.3.4 SNMP Trap Configuration
Configure SNMP trap on this page. The SNMP Trap Configuration screen is shown in Figure 4-3-3.
Page 82
82
Figure 4-3-3 SNMP Trap Configuration Page Screenshot
The page includes the following fields:
Object Description
Trap Mode
Indicates the SNMP trap mode operation. Possible modes are:
Enabled: Enable SNMP trap mode operation. Disabled: Disable SNMP trap mode operation.
Trap Version
Indicates the SNMP trap supported version. Possible versions are:
SNMP v1: Set SNMP trap supported version 1. SNMP v2c: Set SNMP trap supported version 2c. SNMP v3: Set SNMP trap supported version 3.
Trap Community
Indicates the community access string when send SNMP trap packet. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126.
Trap Destination
Address
Indicates the SNMP trap destination address.
Trap Destination IPv6
Address
Provide the trap destination IPv6 address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexadecimal digits with a colon separate each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It also used a following legally IPv4 address. For example, '::192.1.2.34'.
Trap Authentication
Failure
Indicates the SNMP entity is permitted to generate authentication failure traps. Possible modes are:
Enabled: Enable SNMP trap authentication failure. Disabled: Disable SNMP trap authentication failure.
Trap Link-up and
Link-down
Indicates the SNMP trap link-up and link-down mode operation. Possible modes are:
Enabled: Enable SNMP trap link-up and link-down mode operation. Disabled: Disable SNMP trap link-up and link-down mode operation.
Trap Inform Mode
Indicates the SNMP trap inform mode operation. Possible modes are:
Enabled: Enable SNMP trap inform mode operation. Disabled: Disable SNMP trap inform mode operation.
Trap Inform Timeout
(seconds)
Indicates the SNMP trap inform timeout. The allowed range is 0 to 2147.
Trap Inform Retry
Times
Indicates the SNMP trap informs retry times. The allowed range is 0 to 255.
Buttons
Page 83
User’s Manual of NS3550-24T/4S
83
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 84
84
4.3.5 SNMPv3 Configuration
4.3.5.1 SNMPv3 Communities Configuration
Configure SNMPv3 community’s table on this page. The entry index key is Community. The SNMPv3 Communities Configuration
screen is shown in Figure 4-3-4.
Figure 4-3-4 SNMPv3 Communities Configuration Page Screenshot
The page includes the following fields:
Object Description
Delete
Check to delete the entry. It will be deleted during the next save.
Community
Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
Source IP
Indicates the SNMP access source address.
Source Mask
Indicates the SNMP access source address mask.
Buttons
: Click to add a new community entry.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.3.5.2 SNMPv3 Users Configuration
Configure SNMPv3 users table on this page. The entry index key are Engine ID and User Name. The SNMPv3 Users
Configuration screen is shown in Figure 4-3-5.
Page 85
User’s Manual of NS3550-24T/4S
85
Figure 4-3-5 SNMPv3 Users Configuration Page Screenshot
The page includes the following fields:
Object Description
Delete
Check to delete the entry. It will be deleted during the next save.
Engine ID
An octet string identifying the engine ID that this entry should belong to. The string must contain an even number between 10 and 64 hexadecimal digits, but all-zeros and all-'F's are not allowed.
User Name
A string identifying the user name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to
126.
Security Level
Indicates the security model that this entry should belong to. Possible security models are:
NoAuth, NoPriv: None authentication and none privacy. Auth, NoPriv: Authentication and none privacy. Auth, Priv: Authentication and privacy.
The value of security level cannot be modified if entry already exist. That means must first ensure that the value is set correctly.
Authentication
Protocol
Indicates the authentication protocol that this entry should belong to. Possible authentication protocol are:
None: None authentication protocol. MD5: An optional flag to indicate that this user using MD5 authentication protocol. SHA: An optional flag to indicate that this user using SHA authentication protocol.
The value of security level cannot be modified if entry already existed. That means must first ensure that the value is set correctly.
Authentication
Password
A string identifying the authentication pass phrase. For MD5 authentication protocol, the allowed string length is 8 to 32. For SHA authentication protocol, the allowed string length is 8 to 40. The allowed content is the ASCII characters from 33 to 126.
Privacy Protocol
Indicates the privacy protocol that this entry should belong to. Possible privacy protocol are:
None: None privacy protocol. DES: An optional flag to indicate that this user using DES authentication protocol.
Privacy Password
A string identifying the privacy pass phrase. The allowed string length is 8 to 32, and the allowed content is the ASCII characters from 33 to 126.
Buttons
: Click to add a new user entry.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 86
86
4.3.5.3 SNMPv3 Groups Configuration
Configure SNMPv3 groups table on this page. The entry index keys are Security Model and Security Name. The SNMPv3
Groups Configuration screen is shown in Figure 4-3-6.
Figure 4-3-6 SNMPv3 Groups Configuration Page Screenshot
The page includes the following fields:
Object Description
Delete
Check to delete the entry. It will be deleted during the next save.
Security Model
Indicates the security model that this entry should belong to. Possible security models are:
v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM).
Security Name
A string identifying the security name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
Group Name
A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
Buttons
: Click to add a new group entry.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.3.5.4 SNMPv3 Views Configuration
Configure SNMPv3 views table on this page. The entry index key is View Name and OID Subtree. The SNMPv3 Views
Configuration screen is shown in Figure 4-3-7.
Page 87
User’s Manual of NS3550-24T/4S
87
Figure 4-3-7 SNMPv3 Views Configuration Page Screenshot
The page includes the following fields:
Object Description
Delete
Check to delete the entry. It will be deleted during the next save.
View Name
A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to
126.
View Type
Indicates the view type that this entry should belong to. Possible view type are:
included: An optional flag to indicate that this view subtree should be included. excluded: An optional flag to indicate that this view subtree should be excluded.
General, if a view entry's view type is 'excluded', it should be exist another view entry which view type is 'included' and it's OID subtree overstep the 'excluded' view entry.
OID Subtree
The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The allowed string content is digital number or asterisk(*).
Buttons
: Click to add a new view entry.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.3.5.5 SNMPv3 Accesses Configuration
Configure SNMPv3 accesses table on this page. The entry index key is Group Name, Security Model and Security Level.
The SNMPv3 Accesses Configuration screen is shown in Figure 4-3-8.
Page 88
88
Figure 4-3-8 SNMPv3 Accesses Configuration Page Screenshot
The page includes the following fields:
Object Description
Delete
Check to delete the entry. It will be deleted during the next save.
Group Name
A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to
126.
Security Model
Indicates the security model that this entry should belong to. Possible security models are:
any: Accepted any security model (v1|v2c|usm). v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM)
Security Level
Indicates the security model that this entry should belong to. Possible security models are:
NoAuth, NoPriv: None authentication and none privacy. Auth, NoPriv: Authentication and none privacy. Auth, Priv: Authentication and privacy.
Read View Name
The name of the MIB is view defining the MIB objects for which this request may request the current values. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
Write View Name
The name of the MIB is view defining the MIB objects for which this request may potentially SET new values. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126.
Buttons
: Click to add a new access entry.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 89
User’s Manual of NS3550-24T/4S
89
4.4 Port Management
Use the Port Menu to display or configure the Managed Switch's ports. This section has the following items:
Port Configuration
Configures port connection settings
Port Statistics Overview Port Statistics Detail
Lists Ethernet and RMON port statistics
SFP Module Information
Display SFP information
Port Mirror
Sets the source and target ports for mirroring
4.4.1 Port Configuration
This page displays current port configurations. Ports can also be configured here. The port settings relate to the currently
selected unit, as reflected by the page header. The table has one row for each port on the selected switch in the and a number of
columns, which are:
The Port Configuration screen is shown in Figure 4-4-1.
Figure 4-4-1 Port Configuration Page Screenshot
Page 90
90
The page includes the following fields:
Object Description
Port
This is the logical port number for this row.
Description
Indicates the per port description.
Link
The current link state is displayed graphically. Green indicates the link is up and red indicates that it is down.
Current Link Speed
Provides the current link speed of the port.
Configured Link Speed
Select any available link speed for the given switch port. Draw the menu bar to select the mode.
Auto Speed - Setup Auto negotiation. 10 Half - Force sets 10Mbps/Half-Duplex mode. 10 Full - Force sets 10Mbps/Full-Duplex mode. 100 Half - Force sets 100Mbps/Half-Duplex mode. 100 Full - Force sets 100Mbps/Full-Duplex mode. 1000 Full - Force sets 10000Mbps/Full-Duplex mode. Disable - Shutdown the port manually.
Flow Control
When Auto Speed is selected for a port, this section indicates the flow control capability that is advertised to the link partner. When a fixed-speed setting is selected, that is what is used. Current Rx column indicates whether pause frames on the port are obeyed. Current Tx column indicates whether pause frames on the port are transmitted. The Rx and Tx settings are determined by the result of the last Auto-Negotiation. Check the configured column to use flow control. This setting is related to the setting for Configured Link Speed.
Maximum Frame
Enter the maximum frame size allowed for the switch port, including FCS. The allowed range is 1518 bytes to 9600 bytes.
Excessive Collision
Mode
Configure port transmit collision behavior.
Discard: Discard frame after 16 collisions (default). Restart: Restart back off algorithm after 16 collisions.
Power Control
The Usage column shows the current percentage of the power consumption per port. The Configured column allows for changing the power savings mode parameters per port.
Disabled: All power savings mechanisms disabled. ActiPHY: Link down power savings enabled. Dynamic: Link up power savings enabled. Enabled: Link up and link down power savings enabled.
When set each port to run at 100M Full, 100M Half, 10M Full, and 10M Half-speed modes. The Auto-MDIX function will disable.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
: Click to refresh the page. Any changes made locally will be undone.
Page 91
User’s Manual of NS3550-24T/4S
91
4.4.2 Port Statistics Overview
This page provides an overview of general traffic statistics for all switch ports. The ports belong to the currently selected unit, as
reflected by the page header. The Port Statistics Overview screen is shown in Figure 4-4-2.
Figure 4-4-2 Port Statistics Overview Page Screenshot
The displayed counters are:
Object Description
Port
The logical port for the settings contained in the same row.
Packets
The number of received and transmitted packets per port.
Bytes
The number of received and transmitted bytes per port.
Errors
The number of frames received in error and the number of incomplete transmissions per port.
Drops
The number of frames discarded due to ingress or egress congestion.
Page 92
92
Filtered
The number of received frames filtered by the forwarding process.
Buttons
: Click to refresh the page immediately.
: Clears the counters for all ports.
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
4.4.3 Port Statistics Detail
This page provides detailed traffic statistics for a specific switch port. Use the port select box to select which switch port details to
display. The selected port belongs to the currently selected unit, as reflected by the page header. The displayed counters are the
totals for receive and transmit, the size counters for receive and transmit, and the error counters for receive and transmit. The
Detailed Port Statistics screen is shown in Figure 4-4-3.
Figure 4-4-3 Detailed Port Statistics Port 1 Page Screenshot
The page includes the following fields:
Receive Total and Transmit Total
Object Description
Rx and Tx Packets
The number of received and transmitted (good and bad) packets
Rx and Tx Octets
The number of received and transmitted (good and bad) bytes. Includes FCS, but excludes framing bits.
Rx and Tx Unicast
The number of received and transmitted (good and bad) unicast packets.
Page 93
User’s Manual of NS3550-24T/4S
93
Rx and Tx Multicast
The number of received and transmitted (good and bad) multicast packets.
Rx and Tx Broadcast
The number of received and transmitted (good and bad) broadcast packets.
Rx and Tx Pause
A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a PAUSE operation.
Receive and Transmit Size Counters
The number of received and transmitted (good and bad) packets split into categories based on their respective frame
sizes.
Receive and Transmit Queue Counters
The number of received and transmitted packet is per input and output queue.
Receive Error Counters
Object Description
Rx Drops
The number of frames dropped due to lack of receives buffers or egress congestion.
Rx CRC/Alignment
The number of frames received with CRC or alignment errors.
Rx Undersize
The number of short 1 frames received with valid CRC.
Rx Oversize
The number of long 2 frames received with valid CRC.
Rx Fragments
The number of short 1 frames received with invalid CRC.
Rx Jabber
The number of long 2 frames received with invalid CRC.
Rx Filtered
The number of received frames filtered by the forwarding process.
Short frames are frames that are smaller than 64 bytes. Long frames are frames that are longer than the configured maximum frame length for this port.
Transmit Error Counter s
Object Description
Tx Drops
The number of frames dropped due to output buffer congestion.
Tx Late/Exc. Coll.
The number of frames dropped due to excessive or late collisions.
Buttons
: Click to refresh the page immediately.
: Clears the counters for all ports.
Page 94
94
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
4.4.4 SFP Module Information
You can check the physical or operational status of an SFP module via the SFP Module Information page. This page shows the
operational status, such as the transceiver type, speed, and wavelength and supports distance of SFP module on a specific
interface. You can also use the hyperlink of port no. to check the statistics on a speficic interface. The SFP Module Information
screen is shown in Figure 4-4-4.
Figure 4-4-4 SFP Module Information for Switch Page Screenshot
The page includes the following fields:
Object Description
Type
Display the type of current SFP module, the possible types are:
1000Base-SX 1000Base-LX 100Base-FX
Speed
Display the spedd of current SFP module, the speed value or description is get from the SFP module. Different vendors SFP modules might shows different speed information.
Wave Length(nm)
Display the wavelength of current SFP module, the wavelength value is get from the SFP module. Use this column to check if the wavelength values of two nodes are the matched while the fiber connection is failed.
Distance(m)
Display the supports distance of current SFP module, the distance value is get from the SFP module.
Buttons
Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals.
Page 95
User’s Manual of NS3550-24T/4S
95
: Click to refresh the page immediately.
4.4.5 Port Mirroring Configuration
Configure port Mirroring on this page. This function provide to monitoring network traffic that forwards a copy of each incoming or
outgoing packet from one port of a network Switch to another port where the packet can be studied. It enables the manager to
keep close track of switch performance and alter it if necessary.
To debug network problems, selected traffic can be copied, or mirrored, to a mirror port where a frame analyzer can be
attached to analyze the frame flow.
The Managed Switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach a protocol analyzer
or RMON probe to this port to perform traffic analysis and verify connection integrity.
Figure 4-4-5 Port Mirror application
The traffic to be copied to the mirror port is selected as follows:
All frames received on a given port (also known as ingress or source mirroring).
All frames transmitted on a given port (also known as egress or destination mirroring).
Mirror Port Configuration
The Port Mirror Configuration screen is shown in Figure 4-4-6.
Page 96
96
Figure 4-4-6 Port Mirror Configuration Page Screenshot
Page 97
User’s Manual of NS3550-24T/4S
97
The page includes the following fields:
Object Description
Port to mirror to
Frames from ports that have either source or destination mirroring enabled are mirrored to this port. Disabled option disables mirroring.
Switch to mirror to
Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this switch.
Port
The logical port for the settings contained in the same row.
Select mirror mode. Rx only: Frames received at this port are mirrored to the mirroring port. Frames
transmitted are not mirrored. Tx only: Frames transmitted from this port are mirrored to the mirroring port. Frames received are not mirrored. Disabled: Neither frames transmitted nor received are mirrored.
Mode
Enabled: Frames received and frames transmitted are mirrored to the mirror port.
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Page 98
98
4.5 Link Aggregation
Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port
Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy.
Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types
(UTP/Fiber, or different fiber types), provided they operate at the same speed.
Aggregated Links can be assigned manually (Port Trunk) or automatically by enabling Link Aggregation Control Protocol (LACP)
on the relevant links.
Aggregated Links are treated by the system as a single logical port. Specifically, the Aggregated Link has similar port attributes to
a non-aggregated port, including auto-negotiation, speed, Duplex setting, etc.
The device supports the following Aggregation links :
Static LAGs (Port Trunk) – Force aggregared selected ports to be a trunk group.
Link Aggregation Control Protocol (LACP) LAGs - LACP LAG negotiate Aggregated Port links with other LACP
ports located on a different device. If the other device ports are also LACP ports, the devices establish a LAG between
them.
Figure 4-5-1 Link Aggregations
Page 99
User’s Manual of NS3550-24T/4S
99
The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner
Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single
dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode,
more detail information refer to the IEEE 802.3ad standard.
Port link aggregations can be used to increase the bandwidth of a network connection or to ensure fault recovery. Link
aggregation lets you group up to 4 consecutive ports into a single dedicated connection between any two the Switch or other
Layer 2 switches. However, before making any physical connections between devices, use the Link aggregation Configuration
menu to specify the link aggregation on the devices at both ends. When using a port link aggregation, note that:
The ports used in a link aggregation must all be of the same media type (RJ-45, 100 Mbps fiber).
The ports that can be assigned to the same link aggregation have certain other restrictions (see below).
Ports can only be assigned to one link aggregation.
The ports at both ends of a connection must be configured as link aggregation ports.
None of the ports in a link aggregation can be configured as a mirror source port or a mirror target port.
All of the ports in a link aggregation have to be treated as a whole when moved from/to, added or deleted from a VLAN.
The Spanning Tree Protocol will treat all the ports in a link aggregation as a whole.
Enable the link aggregation prior to connecting any cable between the switches to avoid creating a data loop.
Disconnect all link aggregation port cables or disable the link aggregation ports before removing a port link aggregation to
avoid creating a data loop.
It allows a maximum of 16 ports to be aggregated at the same time. The Managed Switch support Gigabit Ethernet ports (up to 12
groups). If the group is defined as a LACP static link aggregationing group, then any extra ports selected are placed in a standby
mode for redundancy if one of the other ports fails. If the group is defined as a local static link aggregationing group, then the
number of ports must be the same as the group member ports.
The aggregation code ensures that frames belonging to the same frame flow (for example, a TCP connection) are always
forwarded on the same link aggregation member port. Reording of frames within a flow is therefore not possible. The aggregation
code is based on the following information:
Source MAC Destination MAC Source and destination IPv4 address. Source and destination TCP/UDP ports for IPv4 packets
Normally, all 5 contributions to the aggregation code should be enabled to obtain the best traffic distribution among the link
aggregation member ports. Each link aggregation may consist of up to 16 member ports. Any quantity of link aggregations may
be configured for the device (only limited by the quantity of ports on the device.) To configure a proper traffic distribution, the ports
within a link aggregation must use the same link speed.
Page 100
100
4.5.1 Static Aggregation Configuration
This page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are
global, whereas the aggregation group relate to the currently selected unit, as reflected by the page header.
Hash Code Contributors
The Aggeration Mode COnfiguration screen is shown in Figure 4-5-2.
Figure 4-5-2 Aggregation Mode Configuration Page Screenshot
The page includes the following fields:
Object Description
Source MAC Address
The Source MAC address can be used to calculate the destination port for the frame. Check to enable the use of the Source MAC address, or uncheck to disable. By default, Source MAC Address is enabled.
Destination MAC
Address
The Destination MAC Address can be used to calculate the destination port for the frame. Check to enable the use of the Destination MAC Address, or uncheck to disable. By default, Destination MAC Address is disabled.
IP Address
The IP address can be used to calculate the destination port for the frame. Check to enable the use of the IP Address, or uncheck to disable. By default, IP Address is enabled.
TCP/UDP Port Number
The TCP/UDP port number can be used to calculate the destination port for the frame. Check to enable the use of the TCP/UDP Port Number, or uncheck to disable. By default, TCP/UDP Port Number is enabled.
Static Aggregation Group Configuration
The Aggregation Group Configuration screen is shown in Figure 4-5-3.
Loading...