4.9.3TAC A C S + Server ...................................................................................................................................235
4 100/1000Base-X SFP interfaces, shared with Port-25 to Port-28.
Supports 100/1000Mbps dual mode and DDM
IEEE 802.3x pause frame for full-duplex
Back pressure for half-duplex
10K bytes
< 5 sec: System reboot
> 5 sec: Factory Default
System:
Power (Green)
Sys (Green)
10/100/1000T RJ45 Interfaces (Port 1 to Port 28):
1000Mbps (Orange), LNK/ACT (Green)
100/1000Mbps SFP Interfaces (Port 25 to Port 28):
1000Mbps (Orange), LNK/ACT (Green)
Thermal Fan Fan-less design (No Fan)
Power Requirement AC 100~240V, 50/60Hz, Auto-sensing.
ESD Protection 6KV DC
Power Consumption / Dissipation 21.4 watts / 73.0 BTU
Dimensions (W x D x H) 440 x 200 x 44.5 mm, 1U height
Weight 2.7 KG
Enclosure Metal
Layer 2 Functions
Port Mirroring
VLAN
TX / RX / Both
Many-to-1 monitor
802.1Q Tagged-based VLAN
Up to 256 VLAN groups, out of 4094 VLAN IDs
802.1ad Q-in-Q tunneling
16
Page 17
Voice VLAN
Protocol VLAN
Private VLAN (Protected port)
GVRP
Link Aggregation
Spanning Tree Protocol STP / RSTP / MSTP
IGMP Snooping
MLD Snooping
Access Control List
QoS
Security
IEEE 802.3ad LACP and static trunk
Supports 8 groups of 8-port trunk
IGMP (v2/v3) Snooping
IGMP Querier
Up to 256multicast groups
MLD (v1/v2) Snooping, up to 256 multicast groups
IPv4/IPv6 IP-based ACL / MAC-based ACL
8 mapping ID to 8 level priority queues
- Port Number
- 802.1p priority
- 802.1Q VLAN tag
- DSCP field in IP Packet
Traffic classification based, Strict priority and WRR
IEEE 802.1X – Port-based authentication
Built-in RADIUS client to co-operate with RADIUS server
RADIUS / TACACS+ user access authentication
IP-MAC port binding
MAC Filter
Static MAC Address
DHCP Snooping and DHCP Option82
STP BPDU Guard, BPDU Filtering and BPDU Forwarding
DoS Attack Prevention
ARP Inspection
IP Source Guard
Management Functions
Basic Management Interfaces
Secure Management Interfaces
SNMP MIBs
Web browser / Telnet / SNMP v1, v2c
Firmware upgrade by HTTP / TFTP protocol through Ethernet network
The front panel LEDs indicates instant status of port links, data activity and system power; helps monitor and
troubleshoot when needed. Figure 2-1-2 shows the LED indications of these Managed Switches.
LED Indication
Figure 2-1-2 NS3500-28T-4S LED panel
20
Page 21
■ System
LED Color Function
PWR Green
SYS Green
■ 10/100/1000Base-T interfaces
LED Color Function
LNK/ACT Green
1000 Orange
■ 100 / 1000Base-X SFP interfaces
LED Color Function
LNK/ACT Green
Lights to indicate that the Switch has power.
Lights to indicate the system is working.
Blink to indicate the system is booting.
Lights:
Blink:
Lights: To indicate that the port is operating at 1000Mbps.
Off: If LNK/ACT LED light-> indicate that the port is operating at 10/100Mbps
Lights:
Blink:
To indicate the link through that port is successfully established.
To indicate that the switch is actively sending or receiving data over that port.
If LNK/ACT LED Off -> indicate that the port is link down
To indicate the link through that port is successfully established.
To indicate that the switch is actively sending or receiving data over that port.
Lights: To indicate that the port is operating at 1000Mbps.
1000 Orange
Off: If LNK/ACT LED light-> indicate that the port is operating at 100Mbps
If LNK/ACT LED Off -> indicate that the port is link down
2.1.3 Switch Rear Panel
The rear panel of the Managed Switch indicates an AC inlet power socket, which accepts input power from 100 to 240V
AC, 50-60Hz. Figure 2-1-3 shows the rear panel of these Managed Switches
Rear Panel
Figure 2-1-3 Rear panel of NS3500-28T-4S
21
Page 22
■ AC Power Receptacle
For compatibility with electric service in most areas of the world, the Managed Switch’s power supply automatically
adjusts to line power in the range of 100-240V AC and 50/60 Hz.
Plug the female end of the power cord firmly into the receptacle on the rear panel of the Managed Switch. Plug the
other end of the power cord into an electric service outlet and the power will be ready.
The device is a power-required device, which means it will not work till it is powered. If your networks
Power Notice:
Power Notice:
should be active all the time, please consider using UPS (Uninterrupted Power Supply) for your
device. It will prevent you from network data loss or network downtime.
In some areas, installing a surge suppression device may also help to protect your Managed Switch
from being damaged by unregulated surge or current to the Managed Switch or the power adapter.
22
Page 23
2.2 Installing the Switch
This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read
the following topics and perform the procedures in the order being presented. To install your Managed Switch on a
desktop or shelf, simply complete the following steps.
2.2.1 Desktop Installation
To install the Managed Switch on desktop or shelf, please follow these steps:
Step1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch.
Step2: Place the Managed Switch on the desktop or the shelf near an AC power source, as shown inFigure 2-1-4.
Figure 2-1-4 Place the Managed Switch on the desktop
Step3: Keep enough ventilation space between the Managed Switch and the surrounding objects.
When choosing a location, please keep in mind the environmental restrictions discussed in Chapter 1,
Section 4, and specifications.
Step4:Connect the Managed Switch to network devices.
Connect one end of a standard network cable to the 10/100/1000 RJ-45 ports on the front of the Managed Switch.
Connect the other end of the cable to the network devices such as printer server, workstation or router.
Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. For more
information, please see the Cabling Specification in Appendix A.
Step5:Supply power to the Managed Switch.
23
Page 24
Connect one end of the power cable to the Managed Switch.
Connect the power plug of the power cable to a standard wall outlet.
When the Managed Switch receives power, the Power LED should remain solid Green.
2.2.2 Rack Mounting
To install the Managed Switch in a 19-inch standard rack, please follow the instructions described below.
Step1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the front side.
Step2: Attach the rack-mount bracket to each side of the Managed Switch with supplied screws attached to the package.
Figure 2-1-5 shows how to attach brackets to one side of the Managed Switch.
Figure 2-1-5 Attach Brackets to the Managed Switch.
You must use the screws supplied with the mounting brackets. Damage caused to the parts by
using incorrect screws would invalidate the warranty.
Step3: Secure the brackets tightly.
Step4: Follow the same steps to attach the second bracket to the opposite side.
Step5:After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the
rack, as shown inFigure 2-1-6.
24
Page 25
Figure 2-1-6 Mounting Managed Switch in a Rack
Step6: Proceeds with Steps 4 and 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply
power to the Managed Switch.
2.2.3 Installing the SFP transceiver
The sections describe how to insert an SFP transceiver into an SFP slot.
The SFP transceivers are hot-pluggable and hot-swappable. You can plug in and out the transceiver to/from any SFP
port without having to power down the Managed Switch, as the Figure 2-1-7 shows.
Figure 2-1-7 Plug in the SFP transceiver
Approved INTERLOGIX SFP Transceivers
Managed Switch supports both Single mode and Multi-mode SFP transceiver. The following list of approved IFS SFP
transceivers is correct at the time of publication:
25
Page 26
Fast Ethernet Transceiver (100Base-X SFP)
Gigabit Ethernet Transceiver (1000Base-X SFP)
It is recommended to use INTERLOGIX SFP on the Managed Switch. If you insert an SFP
transceiver that is not supported, the Managed Switch will not recognize it.
26
Page 27
In the installation steps below, this Manual uses Gigabit SFP transceiver as an example. However,
the steps for Fast Ethernet SFP transceiver are similar.
1. Before you connect Managed Switch to the other network device, you have to make sure both sides of the SFP
transceivers are with the same media type, for example: 1000Base-SX to 1000Base-SX, 1000Bas-LX to
1000Base-LX.
2. Check whether the fiber-optic cable type matches with the SFP transceiver requirement.
To connect to 1000Base-SX SFP transceiver, please use the multi-mode fiber cable with one side being the
male duplex LC connector type.
To connect to 1000Base-LX SFP transceiver, please use the single-mode fiber cable with one side being the
male duplex LC connector type.
Connect the Fiber Cable
1. Insert the duplex LC connector into the SFP transceiver.
2. Connect the other end of the cable to a device with SFP transceiver installed.
3. Check the LNK/ACT LED of the SFP slot on the front of the Managed Switch. Ensure that the SFP transceiver is
operating correctly.
4. Check the Link mode of the SFP port if the link fails. To function with some fiber-NICs or Media Converters, user
has to set the port Link mode to “1000 Force” or “100 Force”.
Remove the Transceiver Module
1. Make sure there is no network activity anymore.
2. Remove the Fiber-Optic Cable gently.
3. Lift up the lever of the MGB module and turn it to a horizontal position.
4. Pull out the module gently through the lever.
27
Page 28
Figure 2-1-8 How to Pull Out the SFP Transceiver
Never pull out the module without lifting up the lever of the module and turning it to a horizontal
position. Directly pulling out the module could damage the module and the SFP module slot of the
Managed Switch.
28
Page 29
3. SWITCH MANAGEMENT
This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types
of management applications and the communication and management protocols that deliver data between your management
device (workstation or personal computer) and the system. It also contains information about port connection options.
This chapter covers the following topics:
Requirements
Management Access Overview
Administration Console Access
Web Management Access
SNMP Access
Standards, Protocols, and Related Reading
3.1 Requirements
Workstations running Windows 2000/XP, 2003, Vista/7/8, 2008, MAC OS9 or later, Linux, UNIX or other platforms are
compatible with TCP/IP protocols.
Workstation is installed with Ethernet NIC (Network Interface Card)
Serial Port connect (Terminal)
The above PC with COM Port (DB9 / RS-232) or USB-to-RS-232 converter
Ethernet Port connection
Network cables -- Use standard network (UTP) cables with RJ45 connectors.
The above Workstation is installed with WEB Browser and JAVA runtime environment Plug-in
It is recommended to use Internet Explorer 8.0 or above to access Managed Switch.
29
Page 30
3.2 Management Access Overview
The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods:
An administration console
Web browser interface
An external SNMP-based network management application
The administration console and Web browser interface support are embedded in the Managed Switch software and are available for
immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management
methods.
Method Advantages Disadvantages
Console
Web Browser
SNMP Agent
No IP address or subnet needed
Text-based
Telnet functionality and HyperTerminal
built into Windows
95/98/NT/2000/ME/XP operating
systems
Secure
Ideal for configuring the switch remotely
Compatible with all popular browsers
Can be accessed from any location
Most visually appealing
Communicates with switch functions at
the MIB level
Based on open standards
Must be near the switch or use dial-up
connection
Not convenient for remote users
Modem connection may prove to be unreliable
or slow
Security can be compromised (hackers need
only know the IP address and subnet mask)
May encounter lag times on poor connections
Requires SNMP manager software
Least visually appealing of all three methods
Some settings require calculations
Security can be compromised (hackers need
only know the community name)
Table 3-1 Comparison of Management Methods
30
Page 31
3.3 Administration Console
The administration console is an internal, character-oriented, and command line user interface for performing system administration
such as displaying statistics or changing option settings. Using this method, you can view the administration console from a terminal,
personal computer, Apple Macintosh, or workstation connected to the Managed Switch's console port.
Figure 3-1-1: Console Management
Direct Access
Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation
program (such as HyperTerminal) to the Managed Switch console (serial) port. When using this management method, a straight RS-232 to RJ-45 cable is required to connect the switch to the PC. After making this connection, configure the terminal-emulation
program to use the following parameters:
The default parameters are:
31
Page 32
115200 bps
8 data bits
No parity
1 stop bit
Figure 3-1-2: Terminal Parameter Settings
You can change these settings, if desired, after you log on. This management method is often preferred because you can remain
connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the
interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program
for connecting to the terminal serial port. A workstation attachment under UNIX can use an emulator such as TIP.
3.4 Web Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network
through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the switch, you can access the
Managed Switch's Web interface applications directly in your Web browser by entering the IP address of the Managed Switch.
Figure 3-1-3 Web Management
32
Page 33
You can then use your Web browser to list and manage the Managed Switch configuration parameters from one central location, just
as if you were directly connected to the Managed Switch's console port. Web Management requires Microsoft Internet Explorer
8.0 or later, Google Chrome, Safari or Mozilla Firefox 1.5 or later.
Figure 3-1-4 Web Main Screen of Managed Switch
3.5 SNMP-based Network Management
You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMPc Network Manager,
HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the
switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses
two community strings: the get community string and the set community string. If the SNMP Net-work management Station only
knows the set community string, it can read and write to the MIBs. However, if it only knows the get community string, it can only
read MIBs. The default gets and sets community strings for the Managed Switch are public.
Figure 3-1-5 SNMP management
33
Page 34
4. WEB CONFIGURATION
This section introduces the configuration and functions of the Web-based management.
About Web-based Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network
through a standard browser such as Microsoft Internet Explorer.
The Web-based Management supports Internet Explorer 8.0. It is based on Java Applets with an aim to reduce network bandwidth
consumption, enhance access speed and present an easy viewing screen.
By default, IE8.0 or later version does not allow Java Applets to open sockets. The user has to
explicitly modify the browser setting to enable Java Applets to use network ports.
The Managed Switch can be configured through an Ethernet connection, making sure the manager PC must be set on the same IP
subnet address as the Managed Switch.
For example, the default IP address of the Managed Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x
(where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0.
If you have changed the default IP address of the Managed Switch to 192.168.1.1 with subnet mask 255.255.255.0 via console,
then the manager PC should be set at 192.168.1.x (where x is a number between 2 and 254) to do the relative configuration on
manager PC.
Figure 4-1-1 Web Management
Logging on the switch
1. Use Internet Explorer 8.0 or above Web browser. Enter the factory-default IP address to access the Web interface. The
34
Page 35
factory-default IP Address as following:
http://192.168.0.100
2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the
username/password you have changed via console) to login the main screen of Managed Switch. The login screen in Figure
4-1-2 appears.
Figure 4-1-2 Login screen
Default User name: admin
Default Password: admin
After entering the username and password, the main screen appears as Figure 4-1-3.
Figure 4-1-3 Default Main Page
Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web
35
Page 36
interface. The Switch Menu on the left of the web page let you access all the commands and statistics the Managed Switch provides.
It is recommended to use Internet Explorer 8.0 or above to access Managed Switch.
The changed IP address takes effect immediately after clicking on the Save button. You need to
use the new IP address to access the Web interface.
For security reason, please change and memorize the new password after this first setup.
Only accept command in lowercase letter under web interface.
36
Page 37
4.1 Main Web Page
The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access
the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s Web browser
interface to configure and manage it.
Main Functions Menu
Main Screen
SFP Port Link Status
Copper Port Link Status
Figure 4-1-4 Main Page
Panel Display
The web agent displays an image of the Managed Switch’s ports. The Mode can be set to display different information for the ports,
including Link up or Link down. Clicking on the image of a port opens the Port Statistics page.
The port states are illustrated as follows:
State Disabled Down Link
RJ-45 Ports
SFP Ports
37
Page 38
Main Menu
Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or
monitor network conditions. Via the Web-Management, the administrator can setup the Managed Switch by select the functions
those listed in the Main Function. The screen in Figure 4-1-5 appears.
Figure 4-1-5 Managed Switch Main Functions Menu
Buttons
: Click to save changes or reset to default.
: Click to logout the Managed Switch.
: Click to reboot the Managed Switch.
: Click to refresh the page.
4.1.1 Save Button
This save button allows save the running / startup / backup configuration or reset switch in default parameter. The screen in Figure
38
Page 39
4-1-6 appears.
The page includes the following fields:
Object Description
Figure 4-1-6 Save Button screenshot
Save Configuration to
FLASH
Restore to Default
Click to save the configuration. For more detail information; please refer to the
chapter 4.1.2
Click to reset switch in default parameter. For more detail information; please
refer to the chapter 4.15.1
4.1.2 Configuration Manager
The system file folder contains configuration settings. The screen in Figure 4-1-7 appears.
The page includes the following fields:
Object Description
Running Configuration
Figure 4-1-7 Save Button screenshot
Refers to the running configuration sequence use in the switch. In switch, the
running configuration file stores in the RAM. In the current version, the running
configuration sequence running-config can be saved from the RAM to FLASH by
save “Source File = Running Configuration” to “Destination File = Startup Configuration”, so that the running configuration sequence becomes the start
39
Page 40
up configuration file, which is called configuration save. To prevent illicit file
upload and easier configuration, switch mandates the name of running
configuration file to be running-config.
Startup Configuration
Backup Configuration
Buttons
: Click to save configuration.
4.1.2.1 Saving Configuration
Refers to the configuration sequence used in switch startup. Startup
configuration file stores in nonvolatile storage, corresponding to the so-called
configuration save. If the device supports multi-config file, name the configuration
file to be .cfg file, the default is startup.cfg. If the device does not support
multi-config file, mandates the name of startup configuration file to be
startup-config.
The backup configuration is empty in FLASH; please save the backup
configuration first by “Maintenance > Backup Manager”.
In the Managed Switch, the running configuration file stores in the RAM. In the current version, the running configuration sequence
of running-config can be saved from the RAM to FLASH by ”Save Configurations to FLASH” function, so that the running
configuration sequence becomes the startup configuration file, which is called configuration save.
To save all applied changes and set the current configuration as a startup configuration. The startup-configuration file will be loaded
automatically across a system reboot.
1. Click ”Save > Save Configurations to FLASH” to login “Configuration Manager” Page.
The switch system local log information is provided here. The local Log screens in Figure 4-2-12 & Figure 4-2-13
appear.
Figure 4-2-12 Logging Settings Page Screenshot
The page includes the following fields:
Object Description
Logging Service
Buttons
Enabled: Enable logging service operation.
Disabled: Disable logging service operation.
54
Page 55
: Click to apply changes.
Figure 4-2-13 Logging Information Page Screenshot
The page includes the following fields:
Object Description
Logging Service
Display the current logging service status.
4.2.6.2 Local Log
The switch system local log information is provided here. The local Log screens in Figure 4-2-14 & Figure 4-2-15
appear.
Figure 4-2-14 Local Log Target Setting Page Screenshot
The page includes the following fields:
Object Description
Target
The target of the local log entry. The following target types are supported:
Buffered: Target the buffer of the local log.
File: Target the file of the local log.
55
Page 56
Buttons
Severity
: Click to apply changes.
The severity of the local log entry. The following severity types are supported:
emerg: Emergency level of the system unusable for local log.
alert: Alert level of the immediate action needed for local log.
crit: Critical level of the critical conditions for local log.
error: Error level of the error conditions for local log.
warning: Warning level of the warning conditions for local log.
notice: Notice level of the normal but significant conditions for local log.
info: Informational level of the informational messages for local log.
debug: Debug level of the debugging messages for local log.
Figure 4-2-15 Local Log Setting Status Page Screenshot
The page includes the following fields:
Object Description
Status
Target
Severity
Action
Display the current local log state
Display the current local log target
Display the current local log severity
: Delete the current status
4.2.6.3 Remote Syslog
Configure remote syslog on this page. The Remote Syslog page allows you to configure the logging of messages that
are sent to syslog servers or other management stations. You can also limit the event messages sent to only those
messages below a specified level.
56
Page 57
The Remote Syslog screens in Figure 4-2-16 & Figure 4-2-17 appear.
Figure 4-2-16 Remote Log Target Page Screenshot
The page includes the following fields:
Object Description
Server Address
Server Port
Provide the remote syslog IP address of this switch.
Provide the port number of remote syslog server.
Default Port no.: 514
Severity
The severity of the local log entry. The following severity types are supported:
emerg: Emergency level of the system unusable for local log.
alert: Alert level of the immediate action needed for local log.
crit: Critical level of the critical conditions for local log.
error: Error level of the error conditions for local log.
warning: Warning level of the warning conditions for local log.
57
Page 58
notice: Notice level of the normal but significant conditions for local log.
info: Informational level of the informational messages for local log.
debug: Debug level of the debugging messages for local log.
Facility
Buttons
: Click to apply changes.
Figure 4-2-17 Remote Log Setting Status Page Screenshot
The page includes the following fields:
Object Description
Status
Server Info
Local0~7: local user 0~7
Display the current remote syslog state
Display the current remote syslog server information
Severity
Facility
Action
Display the current remote syslog severity
Display the current remote syslog facility
: Delete the remote server entry
4.2.6.4 Log Message
The switch log view is provided here. The Log View screens in Figure 4-2-18, Figure 4-2-19 & Figure 4-2-20 appear.
Figure 4-2-18 Log Information Select Page Screenshot
58
Page 59
The page includes the following fields:
Object Description
Target
Severity
Category
The target of the log view entry. The following target types are supported:
Buffered: Target the buffered of the log view.
File: Target the file of the log view.
The severity of the log view entry. The following severity types are supported:
emerg: Emergency level of the system unusable for log view.
alert: Alert level of the immediate action needed for log view.
crit: Critical level of the critical conditions for log view.
error: Error level of the error conditions for log view.
warning: Warning level of the warning conditions for log view.
notice: Notice level of the normal but significant conditions for log view.
info: Informational level of the informational messages for log view.
debug: Debug level of the debugging messages for log view.
The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of
management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and
solve network problems, and plan for network growth.
An SNMP-managed network consists of three key components: Network management stations (NMSs), SNMP agents,
and Management information base (MIB) and network-management protocol: 。Network management stations (NMSs) :Sometimes called consoles, these devices execute management
applications that monitor and control network elements. Physically, NMSs are usually engineering
workstation-caliber computers with fast CPUs, megapixel color displays, substantial memory, and abundant disk
space. At least one NMS must be present in each managed environment.
。Agents:Agents are software modules that reside in network elements. They collect and store management
information such as the number of error packets received by a network element.
。Management information base (MIB):A MIB is a collection of managed objects residing in a virtual information
store. Collections of related managed objects are defined in specific MIB modules.
。network-management protocol:A management protocol is used to convey management information between
agents and NMSs. SNMP is the Internet community's de facto standard management protocol.
SNMP Operations
SNMP itself is a simple request/response protocol. NMSs can send multiple requests without receiving a response.
。 Get -- Allows the NMS to retrieve an object instance from the agent.
。 Set -- Allows the NMS to set values for object instances within an agent.
。 Trap -- Used by the agent to asynchronously inform the NMS of some event. The SNMPv2 trap message is
designed to replace the SNMPv1 trap message.
SNMP community
An SNMP community is the group that devices and management stations running SNMP belong to. It helps define
where information is sent. The community name is used to identify the group. A SNMP device or agent may belong to
more than one SNMP community. It will not respond to requests from management stations that do not belong to one
of its communities. SNMP default communities are:
。 Write = private
。 Read = public
61
Page 62
4.2.7.2 SNMP System Information
Configure SNMP setting on this page. The SNMP System global setting screens in Figure 4-2-21 & Figure 4-2-22
appear.
Figure 4-2-21 SNMP Global Setting Page Screenshot
The page includes the following fields:
Object Description
Status
Buttons
: Click to apply changes.
Figure 4-2-22 SNMP Information Page Screenshot
The page includes the following fields:
Indicates the SNMP mode operation. Possible modes are:
A string identifying the view name that this entry should belong to.
The allowed string length is 1 to 16.
The OID defining the root of the subtree to add to the named view.
The allowed string content is digital number or asterisk (*).
The bitmask identifies which positions in the specified object identifier are to be
regarded as "wildcards" for the purpose of pattern-matching.
Indicates the view type that this entry should belong to. Possible view type are:
included: An optional flag to indicate that this view subtree should be included.
excluded: An optional flag to indicate that this view subtree should be
excluded.
General, if a view entry's view type is 'excluded', it should be exist another view
entry which view type is 'included' and it's OID subtree overstep the 'excluded'
view entry.
: Click to add a new view entry.
63
Page 64
Figure 4-2-24 SNMP View Table Status Page Screenshot
The page includes the following fields:
Object Description
View Name
Subtree OID
OID Mask
View Type
Action
Display the current SNMP view name
Display the current SNMP subtree OID
Display the current SNMP OID mask
Display the current SNMP view type
: Delete the view table entry.
4.2.7.4 SNMP Access Group
Configure SNMPv3 access group on this page. The entry index keys are Group Name, Security Model and Security
Level.
The SNMPv3 Access Group Setting screens in Figure 4-2-25 & Figure 4-2-26 appear.
Figure 4-2-25 SNMPv3 Access Group Setting Page Screenshot
The page includes the following fields:
64
Page 65
Object Description
Group Name
Security Model
Security Level
Read View Name
A string identifying the group name that this entry should belong to.
The allowed string length is 1 to 16.
Indicates the security model that this entry should belong to.
Possible security models are:
v1: Reserved for SNMPv1.
v2c: Reserved for SNMPv2c.
V3: Reserved for SNMPv3 or User-based Security Model (USM)
Indicates the security model that this entry should belong to.
Possible security models are:
Noauth: None authentication and none privacy security levels are
assigned to the group.
auth: Authentication and none privacy.
priv: Authentication and privacy.
Note: The Security Level applies to SNNPv3 only.
Read view name is the name of the view in which you can only view the
contents of the agent.
The allowed string length is 1 to 16.
Buttons
Write View Name
Notify View Name
: Click to add a new access entry.
: Check to delete the entry.
Figure 4-2-26 SNMP view Table Status Page Screenshot
Write view name is the name of the view in which you enter data and configure
the contents of the agent.
The allowed string length is 1 to 16.
Notify view name is the name of the view in which you specify a notify, inform,
or trap.
65
Page 66
The page includes the following fields:
Object Description
Group Name
Security Model
Security Level
Read View Name
Write View Name
Notify View Name
Action
Display the current SNMP access group name
Display the current security model
Display the current security level
Display the current read view name
Display the current write view name
Display the current notify view name
: Delete the access group entry.
66
Page 67
4.2.7.5 SNMP Community
Configure SNMP Community on this page. The SNMP Community screens in Figure 4-2-27 & Figure 4-2-28 appear.
Figure 4-2-27 Community Setting Page Screenshot
The page includes the following fields:
Buttons
Object Description
Community Name
Community Mode
Indicates the community read/write access string to permit access to SNMP
agent.
The allowed string length is 0 to 16.
Indicates the SNMP community supported mode. Possible versions are:
Basic: Set SNMP community mode supported version 1 and 2c.
Advanced: Set SNMP community mode supported version 3.
Group Name
View Name
Access Right
A string identifying the group name that this entry should belong to.
The allowed string length is 1 to 16.
A string identifying the view name that this entry should belong to.
The allowed string length is 1 to 16.
Indicates the SNMP community type operation. Possible types are:
RO=Read-Only: Set access string type in read-only mode.
RW=Read-Write: Set access string type in read-write mode.
: Click to apply changes.
67
Page 68
Figure 4-2-28 Community Status Page Screenshot
The page includes the following fields:
Object Description
Community Name
Group Name
View Name
Access Right
Delete
Display the current community type.
Display the current SNMP access group’s name.
Display the current view name.
Display the current access type.
: Delete the community entry.
4.2.7.6 SNMP User
Configure SNMPv3 users table on this page. Each SNMPv3 user is defined by a unique name. Users must be
configured with a specific security level and assigned to a group. The SNMPv3 group restricts users to a specific read,
write, and notify view. The entry index key is User Name. The SNMPv3 User Setting screens in Figure 4-2-29 & Figure
Indicates the SNMP trap destination address. It allows a valid IP address in
dotted decimal notation ('x.y.z.w'). It can also represent a legally valid IPv4
address. For example, '::192.1.2.34'.
Set the notify type in traps or informs.
Indicates the user string when send SNMP trap packet.
Indicates the SNMP trap destination port. SNMP Agent will send SNMP
message via this port, the port range is 1~65535.
Indicates the SNMP trap inform timeout. The allowed range is 1 to 300.
Indicates the SNMP trap inform retry times. The allowed range is 1 to 255.
72
Page 73
: Click to add a new SNMPv3 host entry.
Figure 4-2-34 SNMPv3 Host Status Page Screenshot
The page includes the following fields:
Object Description
Server Address
Notify Type
User Name
UDP Port
Time Out
Retries
Action
Display the current server address.
Display the current notify type.
Display the current user name.
Display the current UDP port.
Display the current time out.
Display the current retry times.
: Delete the SNMPv3 host entry.
4.2.7.10 SNMP Engine ID
Configure SNMPv3 Engine ID on this page. The entry index key is Engine ID. The remote engine ID is used to
compute the security digest for authenticating and encrypting packets sent to a user on the remote host. The SNMPv3
Engine ID Setting screens in Figure 4-2-35 & Figure 4-2-36 appear.
Figure 4-2-35 SNMPv3 Engine ID Setting Page Screenshot
The page includes the following fields:
73
Page 74
Object Description
Engine ID
Buttons
: Click to apply changes.
Figure 4-2-36 SNMPv3 Engine ID Status Page Screenshot
The page includes the following fields:
An octet string identifying the engine ID that this entry should belong to. The
string must contain an even number between 10 and 64 hexadecimal digits, but
all-zeros and all-'F's are not allowed.
Object Description
User Default
Engine ID
Display the current status
Display the current engine ID
4.2.7.11 SNMP Remote Engine ID
Configure SNMPv3 remote Engine ID on this page. The SNMPv3 Remote Engine ID Setting screens in Figure 4-2-37
& Figure 4-2-38 appear.
Figure 4-2-37 SNMPv3 Remote Engine ID Setting Page Screenshot
74
Page 75
The page includes the following fields:
Object Description
Remote IP Address
Engine ID
Buttons
: Click to apply changes.
Figure 4-2-38 SNMPv3 Remote Engine ID Status Page Screenshot
The page includes the following fields:
Object Description
Indicates the SNMP remote engine ID address. It allows a valid IP address in
dotted decimal notation ('x.y.z.w').
An octet string identifying the engine ID that this entry should belong to.
Remote IP Address
Engine ID
Action
Display the current remote IP address
Display the current engine ID
: Delete the remote IP address entry.
75
Page 76
4.3 Port Management
Use the Port Menu to display or configure the Managed Switch's ports. This section has the following items:
Port Configuration
Port Counters
Bandwidth Utilization
Port Mirroring
Jumbo Frame
Port Error Disable
Configuration
Port Error Disabled Status
Protected Ports
EEE
SFP Module Information
Configures port configuration settings
Lists Ethernet and RMON port statistics
Display current bandwidth utilization
Sets the source and target ports for mirroring
Set the jumbo frame on the switch
Configures port error disable settings
Disable port error status
Configures protected ports settings
Configures EEE settings
Display SFP module information.
4.3.1 Port Configuration
This page displays current port configurations and status. Ports can also be configured here. The table has one row for
each port on the selected switch in a number of columns, which are:
The Port Configuration screens in Figure 4-3-1&Figure 4-3-2 appear.
Figure 4-3-1 Port Settings Page Screenshot
The page includes the following fields:
Object Description
76
Page 77
Port Select
Select port number for this drop down list.
Enabled
Speed
Duplex
Indicates the port state operation. Possible state are:
Enabled - Start up the port manually.
Disabled – Shut down the port manually.
Select any available link speed for the given switch port. Draw the menu bar to
select the mode.
Auto - Setup Auto negotiation.
Auto-10M - Setup 10M Auto negotiation.
Auto-100M - Setup 100M Auto negotiation.
Auto-1000M - Setup 1000M Auto negotiation.
Auto-10/100M - Setup 10/100M Auto negotiation.
10M - Setup 10M Force mode.
100M - Setup 100M Force mode.
1000M - Setup 1000M Force mode.
Select any available link duplex for the given switch port. Draw the menu bar to
select the mode.
Auto - Setup Auto negotiation.
Full - Force sets Full-Duplex mode.
Buttons
Flow Control
: Click to apply changes.
Half - Force sets Half-Duplex mode.
When Auto Speed is selected for a port, this section indicates the flow control
capability that is advertised to the link partner.
When a fixed-speed setting is selected, that is what is used.
Current Rx column indicates whether pause frames on the port are obeyed.
Current Tx column indicates whether pause frames on the port are transmitted.
The Rx and Tx settings are determined by the result of the last
Auto-Negotiation.
Check the configured column to use flow control.
This setting is related to the setting for Configured Link Speed.
77
Page 78
The page includes the following fields:
Object Description
Figure 4-3-2 Port Status Page Screenshot
Port
Description
Enable State
Link Status
Speed
Duplex
Flow Control
Configuration
Flow Control Status
This is the logical port number for this row.
Click
Display the current port state.
Display the current link status.
Display the current speed status of the port.
Display the current duplex status of the port.
Display the current flow control configuration of the port.
Display the current flow control status of the port.
to indicate the port name.
78
Page 79
4.3.2 Port Counters
This page provides an overview of traffic and trunk statistics for all switch ports. The Port Statistics screens in Figure