1.3 How to Use This Manual............................................................................................................................16
2.1.1 Switch Front Panel ..............................................................................................................................................24
2.1.2 LED Indications ...................................................................................................................................................25
2.2 Installing the Switch...................................................................................................................................28
3.4 Web Management.......................................................................................................................................37
4. WEB CONFIGURATION...................................................................................................... 39
4.1 Main Web Page...........................................................................................................................................42
4.2.1 System Information..............................................................................................................................................45
3
4.2.2 IP Configuration...................................................................................................................................................46
4.2.3 IP Status ..............................................................................................................................................................48
4.2.7 Time Configuration ..............................................................................................................................................55
4.2.11 CPU Load ..........................................................................................................................................................63
4.2.12 System Log........................................................................................................................................................64
4.2.16 Web Firmware Upgrade.....................................................................................................................................69
4.2.17 Save Startup Config...........................................................................................................................................71
4.2.25 System Reboot ..................................................................................................................................................76
4.3.2 SNMP System Configuration ...............................................................................................................................79
4.3.4 SNMP System Information ..................................................................................................................................84
4.4 Port Management .......................................................................................................................................92
4
4.4.1 Port Configuration................................................................................................................................................92
4.4.2 Port Statistics Overview.......................................................................................................................................94
4.4.3 Port Statistics Detail.............................................................................................................................................95
4.4.4 SFP Module Information ......................................................................................................................................98
4.4.5 Port Mirror..........................................................................................................................................................100
4.5 Link Aggregation......................................................................................................................................102
4.5.3 LACP System Status .........................................................................................................................................109
4.5.4 LACP Port Status............................................................................................................................................... 110
4.5.5 LACP Port Statistics........................................................................................................................................... 111
4.6.7 VLAN Port Status...............................................................................................................................................126
4.6.8 Port Isolation......................................................................................................................................................128
4.6.10.1 Two Separate 802.1Q VLANs................................................................................................................130
4.6.10.2 VLAN Trunking between two 802.1Q aware switches ...........................................................................133
4.6.10.3 Port Isolate ............................................................................................................................................135
4.6.12 MAC-based VLAN Status ................................................................................................................................138
4.7 Spanning Tree Protocol...........................................................................................................................143
4.7.1 Theory ...............................................................................................................................................................143
4.7.2 STP System Configuration ................................................................................................................................149
4.7.3 Bridge Status .....................................................................................................................................................152
4.7.4 CIST Port Configuration.....................................................................................................................................152
4.7.8 Port Status.........................................................................................................................................................160
4.7.9 Port Statistics.....................................................................................................................................................161
4.8.6 IGMP Snooping Port Group Filtering .................................................................................................................175
4.8.7 IGMP Snooping Status ......................................................................................................................................176
4.8.8 IGMP Group Information....................................................................................................................................178
4.8.12 MLD Snooping Port Group Filtering................................................................................................................. 185
4.8.14 MLD Group Information ...................................................................................................................................188
4.8.15 MLDv2 Information ..........................................................................................................................................190
4.8.18 MVR Groups Information .................................................................................................................................196
4.8.19 MVR SFM Information .....................................................................................................................................197
4.9 Quality of Service.....................................................................................................................................199
4.9.2 Port Policing ......................................................................................................................................................200
4.9.3 Port Classification..............................................................................................................................................201
4.9.4 Port Scheduler...................................................................................................................................................204
4.9.5 Port Shaping......................................................................................................................................................205
4.9.5.1 QoS Egress Port Schedule and Shapers ................................................................................................206
4.9.6 Port Tag Remarking...........................................................................................................................................207
4.9.6.1 QoS Egress Port Tag Remarking.............................................................................................................209
4.9.7 Port DSCP .........................................................................................................................................................210
4.9.11 QoS Control List...............................................................................................................................................216
4.9.11.1 QoS Control Entry Configuration ...........................................................................................................219
4.9.12 QCL Status ......................................................................................................................................................221
4.9.13 Storm Control Configuration ............................................................................................................................223
4.10 Access Control Lists..............................................................................................................................234
4.10.1 Access Control List Status ...............................................................................................................................234
4.10.2 Access Control List Configuration ....................................................................................................................236
4.11.3 Network Access Server Configuration..............................................................................................................259
4.12.1 Port Limit Control.............................................................................................................................................303
4.12.6 Port Security Status......................................................................................................................................... 311
4.12.7 Port Security Detail..........................................................................................................................................314
4.12.10 IP Source Guard Configuration......................................................................................................................317
4.12.11 IP Source Guard Static Table.........................................................................................................................319
4.13.1 MAC Table Configuration.................................................................................................................................324
4.13.2 MAC Address Table Status .............................................................................................................................. 326
4.14.3 LLDP MED Configuration ................................................................................................................................335
4.14.6 Port Statistics...................................................................................................................................................349
4.15.3 Remote IP Ping Test ........................................................................................................................................355
4.16 Power over Ethernet ..............................................................................................................................359
4.16.1 Power over Ethernet Powered Device.............................................................................................................359
4.16.2 System Configuration ......................................................................................................................................360
4.16.3 Power Over Ethernet Configuration.................................................................................................................361
4.16.4 Port Sequential ................................................................................................................................................363
4.16.5 Port Configuration............................................................................................................................................364
4.16.10 Port Power Consumption...............................................................................................................................374
4.18.5 RMON History Configuration ...........................................................................................................................384
4.18.6 RMON History Status.......................................................................................................................................386
4.19.3 Ethernet Ring Protocol Switch .........................................................................................................................397
4.19.4 Ethernet Ring Protocol Switch Configuration...................................................................................................400
4.19.5 Ring Wizard .....................................................................................................................................................403
4.19.6 Ring Wizard Example: .....................................................................................................................................404
APPENDIX B : GLOSSARY .................................................................................................. 414
9
1. INTRODUCTION
NS4702-24P-4S-4X is a 24-Port 10/100/1000Mbps 802.3at PoE + 4-Port 10G SFP+ Managed Switch with Hardware Layer3
IPv4/IPv6 Static Routing, NS4702-24P-4S-4X, comes with the multi-port Gigabit Ethernet Switch and SFP fiber optic connectibility
and robust layer 2 features. The description of this model is shown below:
NS4702-24P-4S-4X
“Managed Switch” is used as an alternative name in this user’s manual.
1.1 Packet Contents
Open the box of the Managed Switch and carefully unpack it. The box should contain the following items:
Managed Switch
24-Port 10/100/1000Mbps 802.3at PoE +, 4 Shared Gigabit Ports (RJ45 and SFP) and 4-Port 10G SFP+
Managed Switch with Hardware Layer3 IPv4/IPv6 Static Routing,
x 1
User’s Manual CD
Quick Installation Guide
RJ-45 to RS232 Cable
SFP Dusty Cap
Rubber Feet
Rack-mount Accessory Kit
Power Cord
If any of these are missing or damaged, please contact your dealer immediately; if possible, retain the carton including the original
packing material, and use them again to repack the product in case there is a need to return it to us for repair.
x 1
x 1
x 1
x 8
x 4
x 1
x 1
10
1.2 Product Description
Cost-effective 10Gbps Uplink Capacitated Managed High Power PoE Switch for Large Surveillance Applications
The NS4702 is the latest generation of Interlogix Managed Gigabit PoE Switches featuring Interlogix intelligent PoE functions to
improve the availability of critical business applications. It provides IPv6/IPv4 Layer 3 static routing and built-in L2/L4 Gigabit
Switching engine along with 24 10/100/1000Base-T ports featuring 30-watt 802.3at PoE+, 4 Gigabit SFP fiber slots and 4 10Gbps
SFP+ fiber slots. With total shared power budget up to 440 watts for different kinds of PoE applications, it provides a quick safe and
cost-effective Power over Ethernet network solution to IP security surveillance for small businesses and enterprises.
Flexible and Extendable 10Gbps Ethernet Solution
10G Ethernet is a big leap in the evolution of Ethernet. Each of the SFP+ slot supports Dual-Speed, 10GBase-SR/LR or
1000Base-SX/LX, meaning the administrator now can flexibly choose the suitable SFP/SFP+ transceiver according to the
transmission distance or the transmission speed required to extend the network efficiently. With its 4-port, 10G Ethernet link
capability, the NS4702 provides broad bandwidth and powerful processing capacity.
Centralized Power Management for Gigabit Ethernet PoE Networking
To fulfill the needs of higher power required PoE network applications with Gigabit speed transmission, the NS4702 features
high-performance Gigabit IEEE 802.3af PoE (up to 15.4 watts) and IEEE 802.3at PoE+ (up to 30 watts) on all ports. It perfectly
meets the power requirement of PoE VoIP phone and all kinds of PoE IP cameras such as IR, PTZ, speed dome cameras or even
box type IP cameras with built-in fan and heater for high power consumption.
The NS4702 PoE capabilities also help to reduce deployment costs for network devices as a result of freeing from restrictions of
power outlet locations. Power and data switching are integrated into one unit, delivered over a single cable and managed centrally. It
thus eliminates cost for additional AC wiring and reduces installation time.
Built-in Unique PoE Functions for Surveillance Management
As a managed PoE Switch for surveillance network, the NS4702 features intelligent PoE Management functions:
The NS4702 can be configured to monitor connected PD (Powered Device) status in real-time via ping action. Once the PD stops
working and it is without response, the NS4702 will resume the PoE port power and bring the PD back to work. It will greatly
enhance the network reliability through the PoE port resetting the PD’s power source and reduce administrator management
burden.
Schedule Power Recycle
The NS4702 allows each of the connected PD (Powered Device) to reboot in a specific time each week. Therefore, it will reduce the
chance of PD (Powered Device) crash resulting from buffer overflow.
SMTP/SNMP Trap Event alert
Though most NVR or camera management software offers SMTP email alert function, the NS4702 further provides event alert
function to help to diagnose the abnormal device owing to whether or not there is a break of the network connection, loss of PoE
power or the rebooting response by PD Alive Check process.
12
PoE Schedule for Energy Saving
Besides being used for IP surveillance, theNS4702 is certainly applicable to construct any PoE network including VoIP and wireless
LAN. Under the trend of energy saving worldwide and contributing to the environmental protection on the Earth, the NS4702 can
effectively control the power supply besides its capability of giving high watts power. The “PoE schedule” function helps you to
enable or disable PoE power feeding for each PoE port during specified time intervals and it is a powerful function to help SMB or
Enterprise save power and money.
Solution for IPv6 Networking
Faced with the increasingly large number of IP cameras and Wireless APs installed and deployed in all kinds of applications, more
and more network facilities start to support the IPv6 protocol for the next-generation networking. By supporting both the IPv4 and
IPv6 and plenty of management functions with easy and friendly management interfaces, the NS4702 is the best choice for IP
surveillance and wireless service providers to connect with the IPv6 network.
IPv6 / IPv4 Dual St ack
By supporting IPv6 management features and also backward compatible with IPv4, the NS4702 helps the SMB to step in the IPv6
era with the lowest investment but not need to replace the network facilities while the ISP constructs the IPv6 FTTx edge network.
13
IPv4 and IPv6 VLAN Routing for Secure and Flexible Management
To help customers stay on top of their businesses, the NS4702 switch not only provides ultra high transmission performance and
excellent layer 2 technologies, but also offers IPv4/IPv6 VLAN routing feature which allows to cross over different VLANs and
different IP addresses for the purpose of having a highly secured, flexible management and simpler networking application.
Enhanced Security
The NS4702 offers a comprehensive Layer 2 to Layer 4 Access Control List (ACL) for enforcing security to the edge. It can be
used to restrict network access by denying packets based on source and destination IP address, TCP/UDP ports or defined typical
network applications. Its protection mechanism also comprises 802.1X Port-based and MAC-based user and device authentication.
With the private VLAN function, communication between edge ports can be prevented to ensure user privacy. Furthermore, the
NS4702 provides DHCP Snooping, IP Source Guard and Dynamic ARP Inspection functions to prevent IP snooping from attack
and discard ARP packets with invalid MAC address. The network administrators can now construct highly secured corporate
networks with considerably less time and effort than before.
Robust Layer 2 Features
The NS4702 can be programmed for advanced switch management functions such as dynamic port link aggregation, Q-in-Q VLAN,
private VLAN, Multiple Spanning Tree Protocol (MSTP), Layer 2/4 QoS, bandwidth control and IGMP/MLD Snooping. The
NS4702 also provides 802.1Q Tagged VLAN, and the VLAN groups allowed will be maximally up to 256. Via aggregation of
supporting ports, the NS4702 allows the operation of a high-speed trunk combining multiple ports. It enables up to 14 groups of 8
ports for trunk maximum and supports connection fail-over as well.
Excellent Traffic Control
The NS4702 is loaded with powerful traffic management and QoS features to enhance connection services by SMBs. The QoS
features include wire-speed Layer 4 traffic classifiers and bandwidth limiting that are particular useful for multi-tenant unit, multi
business unit, Telco, or Network Service Provide applications. It also empowers the enterprises to take full advantages of the limited
network resources and guarantees the best performance in VoIP and Video conferencing transmission.
Efficient and Secure Management
The NS4702 Managed Switch is equipped with console, WEB and SNMP management interfaces. With the built-in Web-based
management interface, the NS4702 offers an easy-to-use, platform-independent management and configuration facility. The
NS4702 supports standard Simple Network Management Protocol (SNMP) and can be managed via any management software that
supports SNMP protocol. For text-based management, the NS4702 can be accessed via Telnet and the console port. Moreover, the
NS4702 offers secure remote management by supporting SSH, SSL and SNMPv3 connection which encrypt the packet content at
each session.
Flexibility and Extension Solution
The NS4702 provides 4 extra Gigabit TP/SFP combo interfaces supporting 10/100/1000Base-T RJ-45 copper to connect with
surveillance network devices such as NVR, Video Streaming Server or NAS to facilitate surveillance management. Or through these
dual-speed fiber SFP slots, it can also connect with the 100Base-FX / 1000Base-SX/LX SFP (Small Form-factor Pluggable) fiber
transceiver to backbone switch and monitoring center in long distance. The distance can be extended from 550 meters to 2
kilometers (multi-mode fiber) and up to above 10/20/30/40/50/70/120 kilometers (single-mode fiber or WDM fiber). They are well
suited for applications within the enterprise data centers and distributions.
14
Intelligent SFP Diagnosis Mechanism
The NS4702 supports SFP-DDM (Digital Diagnostic Monitor) function that greatly helps network administrator to easily monitor
real-time parameters of the SFP, such as optical output power, optical input power, temperature, laser bias current, and transceiver
supply voltage.
15
1.3 How to Use This Manual
This User’s Manual is structured as follows:
Section 2, INSTALLATION
The section explains the functions of the Managed Switch and how to physically install the Managed Switch.
Section 3, SWITCH MANAGEMENT
The section contains the information about the software function of the Managed Switch.
Section 4, WEB CONFIGURATION
The section explains how to manage the Managed Switch by Web interface.
Section 5, SWITCH OPERATION
The chapter explains how to do the switch operation of the Managed Switch.
Section 6, POWER over ETHERNET OVERVIEW
The chapter introduces the IEEE 802.3af / 802.3at PoE standard and PoE provision of the Managed Switch.
Section 7, TROUBLESHOOTING
The chapter explains how to do troubleshooting of the Managed Switch.
Appendix A
The section contains cable information of the Managed Switch.
16
1.4 Product Features
Physical Port
24-Port 10/100/1000Base-T RJ-45 copper with IEEE 802.3at / 802.3af Power over Ethernet Injector function
4 100/1000Base-X mini-GBIC/SFP slot, shared with Port-21 to Port-24 compatible with 100Base-FX SFP
4 10GBase-SR/LR SFP+ slot, compatible with 1000Base-SX/LX/BX SFP
RJ45 to RS-232 DB9 console interface for basic management and setup
Power over Ethernet
■ Complies with IEEE 802.3at High Power over Ethernet End-Span PSE
■ Complies with IEEE 802.3af Power over Ethernet End-Span PSE
■ Up to 24 ports of IEEE 802.3af / 802.3at devices powered
■ Supports PoE Power up to 30.8 Watts for each PoE ports
■ Auto detects powered device (PD)
■ Circuit protection prevents power interference between ports
■ Remote power feeding up to 100 meters
■ PoE Management
Total PoE power budget control
Per port PoE function enable/disable
PoE Port Power feeding priority
Per PoE port power limitation
PD classification detection
PD alive-check
PoE schedule
PD power recycling schedule
Layer 2 Features
Prevents packet loss with back pressure (half-duplex) and IEEE 802.3x pause frame flow control (full-duplex)
High performance of Store-and-Forward architecture and runt/CRC filtering eliminates erroneous packets to optimize the
network bandwidth
Storm Control support
Broadcast / Unicast / Unknown-unicast
Supports VLAN
IEEE 802.1Q Tagged VLAN
Up to 255 VLANs groups, out of 4095 VLAN IDs
Provider Bridging (VLAN Q-in-Q) support (IEEE 802.1ad)
Private VLAN Edge (PVE)
Protocol-based VLAN
MAC-based VLAN
IP Subnet-based VLAN
Voice VLAN
17
Supports Spanning Tree Protocol
STP, IEEE 802.1D Spanning Tree Protocol
RSTP, IEEE 802.1w Rapid Spanning Tree Protocol
MSTP, IEEE 802.1s Multiple Spanning Tree Protocol, spanning tree by VLAN
BPDU Guard
Supports Link Aggregation
802.3ad Link Aggregation Control Protocol (LACP)
Cisco ether-channel (Static Trunk)
Maximum 14 trunk groups, up to 8 ports per trunk group
Up to 16Gbps bandwidth (full duplex mode)
Provides Port Mirror (many-to-1)
Port Mirroring to monitor the incoming or outgoing traffic on a particular port
Loop protection to avoid broadcast loops
Layer 3 IP Routing Features
Supports maximum 128 static routes and route summarization
Quality of Service
Ingress Shaper and Egress Rate Limit per port bandwidth control
8 priority queues on all switch ports
Traffic classification
- IEEE 802.1p CoS
- TOS / DSCP / IP Precedence of IPv4/IPv6 packets
- IP TCP/UDP port number
- Typical network application
Strict priority and Weighted Round Robin (WRR) CoS policies
Built-in RADIUS client to cooperate with the RADIUS servers
RADIUS / TACACS+ users access authentication
IP-based Access Control List (ACL)
MAC-based Access Control List (ACL)
Source MAC / IP address binding
DHCP Snooping to filter distrusted DHCP messages
Dynamic ARP Inspection discards ARP packets with invalid MAC address to IP address binding
IP Source Guard prevents IP spoofing attacks
IP address access management to prevent unauthorized intruder
Management
Switch Management Interfaces
- Console / Telnet Command Line Interface
- Web switch management
- SNMP v1, v2c, and v3 switch management
- SSH / SSL secure access
Four RMON groups (history, statistics, alarms and events)
IPv6 Address / NTP management
Built-in Trivial File Transfer Protocol (TFTP) client
BOOTP and DHCP for IP address assignment
Firmware upload / download via HTTP / TFTP
DHCP Relay and Option 82
User Privilege levels control
NTP (Network Time Protocol)
Link Layer Discovery Protocol (LLDP)
SFP-DDM (Digital Diagnostic Monitor)
Cable Diagnostic technology provides the mechanism to detect and report potential cabling issues
ICMPv6 / ICMPv4 Remote Ping
Reset button for system reboot or reset to factory default
SMTP / Syslog / SNMP Trap remote alarm
System Log
Interlogix Smart Discovery Utility for deploy management
IEEE 802.3 10Base-T
IEEE 802.3u 100Base-TX/100Base-FX
IEEE 802.3z Gigabit SX/LX
IEEE 802.3ab Gigabit 1000T
IEEE 802.3ae 10Gb/s Ethernet
IEEE 802.3x Flow Control and Back pressure
IEEE 802.3ad Port trunk with LACP
IEEE 802.1D Spanning tree protocol
IEEE 802.1w Rapid spanning tree protocol
IEEE 802.1s Multiple spanning tree protocol
IEEE 802.1p Class of service
IEEE 802.1Q VLAN Tagging
IEEE 802.1X Port Authentication Network Control
IEEE 802.3af Power over Ethernet
IEEE 802.3at Power over Ethernet PLUS
IEEE 802.1ab LLDP
RFC 768 UDP
RFC 793 TFTP
RFC 791 IP
RFC 792 ICMP
RFC 2068 HTTP
RFC 1112 IGMP version 1
RFC 2236 IGMP version 2
RFC 3376 IGMP version 3
RFC 2710 MLD version 1
FRC 3810 MLD version 2
The front panel LEDs indicate instant status of power and system status, fan status, port links / PoE in-use and data activity; they
help monitor and troubleshoot when needed. Figure 2-1-2 shows the LED indications of the Managed Switch.
NS4702-24P-4S-4X LED Indication
Figure 2-1-2: NS4702-24P-4S-4X LED at Front Panel
NS4702-24P-4S-4X LED Indication Table
LED definition
System
LED Color Function
SYS Green
PWR Green Lights to indicate that the Switch has power.
Lights to indicate the system is working.
25
Ring
R.O.
Alert
LED Color Function
FAN1~2 Green
PWR1~2 Green
Per 10/100/1000Mbps RJ45 port (Port-1 to Port-24)
LED Color Function
Green
Green
Lights Indicates that ring state is in idle.
Blink Indicates that ring state is in protected.
Lights Indicates that the switch is set to ring owner.
Off Indicates that the switch doesn’t set to ring owner.
Lights to indicate fan1~2 failure.
Lights to indicate power1~2 failure.
1000
LNK/ACT
10/100
LNK/ACT
Per 100/1000Base-X SFP Interface (Port-23 to Port-24)
LED Color Function
1000
LNK/ACT
100
LNK/ACT
Per 10G SFP+ interface (Port-25 to Port-28)
LED Color Function
10G
LNK/ACT
1G
LNK/ACT
Green
Orange
Green
Orange
Green
Orange
Lights: To indicate the port is running in 1000Mbps speed and successfully established.
Blink: To indicate that the switch is actively sending or receiving data over that port.
Lights: To indicate the port is running in 10/100Mbps speed and successfully established.
Blink: To indicate that the switch is actively sending or receiving data over that port.
Lights. To indicate the port is successfully established at 1000Mbps.
Blink: To indicate that the Switch is actively sending or receiving data over that port.
Lights: To indicate the port is successfully established at 100Mbps.
Blink: To indicate that the Switch is actively sending or receiving data over that port.
Lights to indicate the port is running in 10Gbps speed and successfully established.
Blink: indicate that the switch is actively sending or receiving data over that port.
Lights to indicate the port is running in 1Gbps speed and successfully established.
Blink: indicate that the switch is actively sending or receiving data over that port.
26
2.1.3 Switch Rear Panel
The rear panel of the Managed Switch indicates an AC inlet power socket, which accepts input power from 100 to 240V AC,
50-60Hz. Figure 2-1-3 shows the rear panel of the Managed Switch.
NS47 02-24P-4S-4X Rear Panel
Figure 2-1-3: Rear Panel of NS4702-24P-4S-4X
■ AC Power Receptacle
For compatibility with electric service in most areas of the world, the Managed Switch’s power supply automatically adjusts
line power in the range of 100-240V AC and 50/60 Hz.
Plug the female end of the power cord firmly into the receptalbe on the rear panel of the Managed Switch. Plug the other end of
the power cord into an electric service outlet and the power will be ready.
Power Notice:
The device is a power-required device, which means it will not work till it is powered. If your networks
should be active all the time, please consider using UPS (Uninterrupted Power Supply) for your device.
It will prevent you from network data loss or network downtime. In some areas, installing a surge
suppression device may also help to protect your Managed Switch from being damaged by unregulated
surge or current to the Switch or the power adapter.
27
2.2 Installing the Switch
This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the following
topics and perform the procedures in the order being presented. To install your Managed Switch on a desktop or shelf, simply
complete the following steps.
2.2.1 Desktop Installation
To install the Managed Switch on desktop or shelf, please follow these steps:
Step 1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch.
Step 2: Place the Managed Switch on the desktop or the shelf near an AC power source, as shown inFigure 2-2-1.
Figure 2-2-1: Place the Managed Switch on the Desktop
Step 3: Keep enough ventilation space between the Managed Switch and the surrounding objects.
When choosing a location, please keep in mind the environmental restrictions discussed in Chapter 1,
Section 4, and specifications.
Step 4:Connect the Managed Switch to network devices.
Connect one end of a standard network cable to the 10/100/1000 RJ-45 ports on the front of the Managed Switch.
Connect the other end of the cable to the network devices such as printer server, workstation or router.
28
Connection to the Managed Switch requires UTP Category 5e network cabling with RJ-45 tips. For
more information, please see the Cabling Specification in Appendix A.
Step 5:Supply power to the Managed Switch.
Connect one end of the power cable to the Managed Switch.
Connect the power plug of the power cable to a standard wall outlet.
When the Managed Switch receives power, the Power LED should remain solid Green.
2.2.2 Rack Mounting
To install the Managed Switch in a 19-inch standard rack, please follow the instructions described below.
Step 1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the front side.
Step 2: Attach the rack-mount bracket to each side of the Managed Switch with supplied screws attached to the package.
Figure 2-2-2 shows how to attach brackets to one side of the Managed Switch.
Figure 2-2-2: Attach Brackets to the Managed Switch.
You must use the screws supplied with the mounting brackets. Damage caused to the parts by
using incorrect screws would invalidate the warranty.
Step 3: Secure the brackets tightly.
Step 4: Follow the same steps to attach the second bracket to the opposite side.
Step 5: After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the rack, as
shown in Figure 2-2-3.
29
Figure 2-2-3: Mounting Managed Switch in a Rack
Step 6: Proceed with Steps 4 and 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply power to the
Managed Switch.
2.2.3 Installing the SFP/SFP+ Transceiver
The sections describe how to insert an SFP/SFP+ transceiver into an SFP/SFP+ slot. The SFP/SFP+ transceivers are hot-pluggable
and hot-swappable. You can plug in and out the transceiver to/from any SFP/SFP+ port without having to power down the Managed
Switch, as the Figure 2-2-4 shows..
Figure 2-2-4: Plug-in the SFP/SFP+ Transceiver
30
Approved Interlogix SFP/SFP+ Transceivers
Interlogix Managed Switch supports both single mode and multi-mode SFP/SFP+ transceiver. The following list of approved
Interlogix SFP/SFP+ transceivers is correct at the time of publication:
1. It is recommended to use Interlogix SFP on the Managed Switch. If you insert an SFP transceiver
that is not supported, the Managed Switch will not recognize it.
2. Port 21 to Port 24 are a shared SFP slot that supports the Gigabit and Fast Ethernet SFP
transceiver.
3. Port 25 to Port 28 are a shared SFP+ slot that supports the 10 Gigabit SFP+ transceiver and
Gigabit SFP transceiver.
1. Before we connect the NS4702-24P-4S-4X to the other network device, we have to make sure both sides of the SFP
transceivers are with the same media type, for example: 1000Base-SX to 1000Base-SX, 1000Bas-LX to 1000Base-LX.
2. Check whether the fiber-optic cable type matches with the SFP transceiver requirement.
To connect to 1000Base-SX SFP transceiver, please use the multi-mode fiber cable with one side being the male duplex
LC connector type.
To connect to 1000Base-LX SFP transceiver, please use the single-mode fiber cable with one side being the male duplex
LC connector type.
Connect the Fiber Cable
1. Insert the duplex LC connector into the SFP/SFP+ transceiver.
2. Connect the other end of the cable to a device with SFP/SFP+ transceiver installed.
3. Check the LNK/ACT LED of the SFP/SFP+ slot on the front of the Managed Switch. Ensure that the SFP/SFP+ transceiver is
operating correctly.
4. Check the Link mode of the SFP/SFP+ port if the link fails. To function with some fiber-NICs or Media Converters, user has to
set the port Link mode to “10GForce”, “1000 Force” or “100 Force”.
32
Remove the Transceiver Module
1. Make sure there is no network activity anymore.
2. Remove the Fiber-Optic Cable gently.
3. Lift up the lever of the MGB module and turn it to a horizontal position.
4. Pull out the module gently through the lever.
Figure 2-2-5: How to Pull Out the SFP/SFP+ Transceiver
Never pull out the module without lifting up the lever of the module and turning it to a horizontal
position. Directly pulling out the module could damage the module and the SFP/SFP+ module
slot of the Managed Switch.
33
3. SWITCH MANAGEMENT
This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the types
of management applications and the communication and management protocols that deliver data between your management
device (workstation or personal computer) and the system. It also contains information about port connection options.
This chapter covers the following topics:
Requirements
Management Access Overview
Administration Console Access
Web Management Access
SNMP Access
Standards, Protocols, and Related Reading
3.1 Requirements
Workstations running Windows 2000/XP, 2003, Vista/7/8, 2008, MAC OS9 or later, or Linux, UNIX , or other platforms
compatible with TCP/IP protocols.
Workstation is installed with Ethernet NIC (Network Interface Card)
Serial Port connect (Terminal)
The above PC with COM Port (DB9 / RS-232) or USB-to-RS-232 converter
Ethernet Port connect
Network cables - Use standard network (UTP) cables with RJ45 connectors.
The above workstation is installed with WEB Browser and JAVA runtime environment Plug-in
It is recommended to use Internet Explore 7.0 or above to access Managed Switch.
34
3.2 Management Access Overview
The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods:
An administration console
Web browser interface
An external SNMP-based network management application
The administration console and Web browser interface support are embedded in the Managed Switch software and are available for
immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management
methods.
Method Advantages Disadvantages
Console
Web Browser
SNMP Agent
No IP address or subnet needed
Text-based
Telnet functionality and HyperTerminal
built into Windows
95/98/NT/2000/ME/XP operating
systems or higher.
Secure
Ideal for configuring the switch remotely
Compatible with all popular browsers
Can be accessed from any location
Most visually appealing
Communicates with switch functions at
the MIB level
Based on open standards
Must be near the switch or use dial-up
connection
Not convenient for remote users
Modem connection may prove to be unreliable
or slow
Security can be compromised (hackers need
only know the IP address and subnet mask)
May encounter lag times on poor connections
Requires SNMP manager software
Least visually appealing of all three methods
Some settings require calculations
Security can be compromised (hackers need
only know the community name)
Table 3-1 Comparison of Management Methods
35
3.3 Administration Console
The administration console is an internal, character-oriented, and command line user interface for performing system administration
such as displaying statistics or changing option settings. Using this method, you can view the administration console from a terminal,
personal computer, Apple Macintosh, or workstation connected to the Managed Switch's console (serial) port.
Figure 3-1-1: Console Management
Direct Access
Direct access to the administration console is achieved by directly connecting a terminal or a PC equipped with a terminal-emulation
program (such as HyperTerminal) to the Managed Switch console (serial) port. When using this management method, a straight DB9 RS-232 cable is required to connect the switch to the PC. After making this connection, configure the terminal-emulation
program to use the following parameters:
The default parameters are:
115200 bps
8 data bits
No parity
1 stop bit
Figure 3-1-2: Terminal Parameter Settings
You can change these settings, if desired, after you log on. This management method is often preferred because you can remain
36
connected and monitor the system during system reboots. Also, certain error messages are sent to the serial port, regardless of the
interface through which the associated action was initiated. A Macintosh or PC attachment can use any terminal-emulation program
for connecting to the terminal serial port. A workstation attachment under UNIX can use an emulator such as TIP.
3.4 Web Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network
through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the switch, you can access the
Managed Switch's Web interface applications directly in your Web browser by entering the IP address of the Managed Switch.
Figure 3-1-3: Web Management
You can then use your Web browser to list and manage the Managed Switch configuration parameters from one central location, just
as if you were directly connected to the Managed Switch's console port. Web Management requires either Microsoft Internet
Explorer 7.0 or later, Safari or Mozilla Firefox 1.5 or later.
Figure 3-1-4: Web Main Screen of Managed Switch
37
3.5 SNMP-based Network Management
You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMP Network Manager,
HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the
switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses
two community strings: the get community string and the set community string. If the SNMP Net-work management Station only
knows the set community string, it can read and write to the MIBs. However, if it only knows the get community string, it can only
read MIBs. The default getting and setting community strings for the Managed Switch is public.
Figure 3-1-5: SNMP Management
38
4. WEB CONFIGURATION
This section introduces the configuration and functions of the Web-based management from Managed Switch.
About Web-based Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the network
through a standard browser such as Microsoft Internet Explorer.
The Web-based Management supports Internet Explorer 7.0. It is based on Java Applets with an aim to reduce network bandwidth
consumption, enhance access speed and present an easy viewing screen.
By default, IE7.0 or later version does not allow Java Applets to open sockets. The user has to explicitly
modify the browser setting to enable Java Applets to use network ports.
The Managed Switch can be configured through an Ethernet connection, making sure the manager PC must be set on the same IP
subnet address with the Managed Switch.
For example, the default IP address of the Managed Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x
(where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0.
If you have changed the default IP address of the Managed Switch to 192.168.1.1 with subnet mask 255.255.255.0 via console,
then the manager PC should be set at 192.168.1.x (where x is a number between 2 and 254) to do the relative configuration on
manager PC.
Figure 4-1-1: Web Management
Logging on the Managed Switch
1. Use Internet Explorer 7.0 or above Web browser. Enter the factory-default IP address to access the Web interface. The
factory-default IP Address is shown as follows:
http://192.168.0.100
2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the
39
username/password you have changed via console) to login the main screen of Managed Switch. The login screen in Figure
4-1-2 appears.
Figure 4-1-2: Login Screen
Default User name: admin
Default Password: admin
After entering the username and password, the main screen appears as shown in Figure 4-1-3.
Figure 4-1-3: Web Main Page
40
Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web
interface. The Switch Menu on the left of the web Page lets you access all the commands and statistics the Managed Switch
provides.
1. It is recommended to use Internet Explore 7.0 or above to access Managed Switch.
2. The changed IP address takes effect immediately after clicking on the Save button. You need to
use the new IP address to access the Web interface.
3. For security reason, please change and memorize the new password after this first setup.
4. Only accept command in lowercase letter under web interface.
41
4.1 Main Web Page
The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access
the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s Web browser
interface to configure and manage it.
Main Functions Menu
Copper Port Link Status
SFP/SFP+ Port Link
Help Button Main Screen
Panel Display
The web agent displays an image of the Managed Switch’s ports. The Mode can be set to display different information for the ports,
including Link up or Link down. Clicking on the image of a port opens the Port Statistics Page.
The port status are illustrated as follows:
State Disabled Down Link
RJ-45 Ports
SFP Ports
Main Menu
Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or
Figure 4-1-4: Web Main Page
42
monitor network conditions. Via the Web-Management, the administrator can set up the Managed Switch by selectingthe functions
those listed in the Main Function. The screen in Figure 4-1-5 appears.
Figure 4-1-5: Managed Switch Main Functions Menu
43
4.2 System
Use the System menu items to display and configure basic administrative details of the Managed Switch. Under the System, the
following topics are provided to configure and view the system information. This section has the following items:
■ System Information The Managed Switch system information is provided here.
■ IP Configuration Configures the Managed Switch-managed IPv4/IPv6 interface and IP routes
on this Page.
■ IP Status This page displays the status of the IP protocol layer. The status is defined
by the IP interfaces, the IP routes and the neighbour cache (ARP cache)
status.
■ Users Configuration
This Page provides an overview of the current users. Currently the only way
to login as another user on the web server is to close and reopen the
browser.
■ Privilege Levels
■ NTP Configuration Configure NTP server on this Page.
■ Time Configuration Configure time parameter on this Page.
■ UPnP Configure UPnP on this Page.
■ DHCP Relay Configure DHCP Relay on this Page.
■ DHCP Relay Statistics This Page provides statistics for DHCP relay.
■ CPU Load This Page displays the CPU load, using an SVG graph.
■ System Log The Managed Switch system log information is provided here.
■ Detailed Log The Managed Switch system detailed log information is provided here.
■ Remote Syslog Configure remote syslog on this Page.
■ SMTP Configuration Configuration SMTP parameters on this Page.
■ Web Firmware Upgrade This Page facilitates an update of the firmware controlling the Managed
■ TFTP Firmware Upgrade Upgrade the firmware via TFTP server
■ Save Startup Config
■ Configuration Download
This Page provides an overview of the privilege levels.
Switch.
This copies running-config to startup-config, thereby ensuring that the
currently active configuration will be used at the next reboot.
You can download the files on the switch.
■ Configuration Upload
■ Configuration Activate
■ Configuration Delete
■ Image Select
■ Factory Default
■ System Reboot You can restart the Managed Switch on this Page. After restarting, the
You can upload the files to the switch.
You can activate the configuration file present on the switch.
You can delete the writable files which stored in flash.
Configuration active or alternate firmware on this Page.
You can reset the configuration of the Managed Switch on this Page. Only
the IP configuration is retained.
Managed Switch will boot normally.
44
4.2.1 System Information
The System Infomation Page provides information for the current device information. System Information Page helps a switch
administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears.
The Page includes the following fields:
Object Description
Contact
Name
Location
MAC Address
Temperature
System Date
System Up time
Software Version
Software Date
The system contact configured in SNMP | System Information | System Contact.
The system name configured in SNMP | System Information | System Name.
The system location configured in SNMP | System Information | System Location.
The MAC Address of this Managed Switch.
Indicates chipset temperature.
The current (GMT) system time and date. The system time is obtained through the
configured NTP Server, if any.
The period of time the device has been operational.
The software version of the Managed Switch.
The date when the Managed Switch software was produced.
Figure 4-2-1: System Information Page Screenshot
Buttons
Auto-refresh
: Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds.
45
: Click to refresh the Page; any changes made locally will be undone.
4.2.2 IP Configuration
The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the
IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 32.
The screen in Figure 4-2-2 appears.
Figure 4-2-2: IP Configuration Page Screenshot
The current column is used to show the active IP configuration.
Object Description
IP Configurations
Mode
DNS Server
Configure whether the IP stack should act as a Host or a Router. In
Host mode, IP traffic between interfaces will not be routed. In Router
mode traffic is routed between all interfaces.
This setting controls the DNS name resolution done by the switch. The
following modes are supported:
From any DHCP interfaces
The first DNS server offered from a DHCP lease to a DHCP-enabled
interface will be used.
46
No DNS server
No DNS server will be used.
Configured
Explicitly provide the IP address of the DNS Server in dotted decimal
notation.
From this DHCP interface
Specify from which DHCP-enabled interface a provided DNS server
should be preferred.
IP Address
DNS Proxy
Delete
VLAN
IPv4
DHCP
IPv4
IPv6
Enabled
Fallback
Current Lease
Address
Mask Length
Address
When DNS proxy is enabled, system will relay DNS requests to the
currently configured DNS server, and reply as a DNS resolver to the client
devices on the network.
Select this option to delete an existing IP interface.
The VLAN associated with the IP interface. Only ports in this VLAN will be
able to access the IP interface. This field is only available for input when
creating an new interface.
Enable the DHCP client by checking this box.
The number of seconds for trying to obtain a DHCP lease.
For DHCP interfaces with an active lease, this column show the current
interface address, as provided by the DHCP server.
Provide the IP address of this Managed Switch in dotted decimal notation.
The IPv4 network mask, in number of bits (prefix length). Valid values are
between 0 and 30 bits for a IPv4 address.
Provide the IP address of this Managed Switch. A IPv6 address is in
128-bit records represented as eight fields of up to four hexadecimal
IP Routes
Mask Length
Delete
Network
Mask Length
Gateway
Next Hop VLAN
digits with a colon separating each field (:).
The IPv6 network mask, in number of bits (prefix length). Valid values are
between 1 and 128 bits for a IPv6 address.
Select this option to delete an existing IP route.
The destination IP network or host address of this route. Valid format is
dotted decimal notationor a valid IPv6 notation. A default route can use
the value 0.0.0.0or IPv6 :: notation.
The destination IP network or host mask, in number of bits (prefix length).
The IP address of the IP gateway. Valid format is dotted decimal notation
or a valid IPv6 notation. Gateway and Network must be of the same type.
The VLAN ID (VID) of the specific IPv6 interface associated with the
gateway.
47
Buttons
: Click to add a new IP interface. A maximum of 128 interfaces is supported.
: Click to add a new IP route. A maximum of 32 routes is supported.
: Click to apply changes.
: Click to undo any changes made locally and revert to previously saved values.
4.2.3 IP Status
IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour
cache (ARP cache) status. The screen in Figure 4-2-3 appears.
Figure 4-2-3: IP Status Page Screenshot
The Page includes the following fields:
Object Description
IP Interfaces
Interface
Type
Address
The name of the interface.
The address type of the entry. This may be LINK or IPv4.
The current address of the interface (of the given type).
48
Status
The status flags of the interface (and/or address).
IP Routes
Neighbor Cache
Buttons
Auto-refresh
: Click to refresh the Page.
Network
Gateway
Status
IP Address
Link Address
: Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds.
The destination IP network or host address of this route.
The gateway address of this route.
The status flags of the route.
The IP address of the entry.
The Link (MAC) address for which a binding to the IP address given exist.
4.2.4 Users Configuration
This Page provides an overview of the current users. Currently the only way to login as another user on the web server is to close
and reopen the browser. After setup is completed, press “Apply” button to take effect. Please login web interface with new user
name and password, the screen in Figure 4-2-4 appears.
The Page includes the following fields:
Object Description
User Name
Privilege Level
Figure 4-2-4: Users Configuration Page Screenshot
The name identifying the user. This is also a link to Add/Edit User.
The privilege level of the user.
The allowed range is 1 to 15. If the privilege level value is 15, it can access all
groups, i.e. that is granted the fully control of the device. But others value need to
refer to each group privilege level. User's privilege should be same or greater
than the group privilege level to have the access of that group.
By default setting, most groups privilege level 5 has the read-only access and
privilege level 10 has the read-write access. And the system maintenance
(software upload, factory defaults and etc.) need user privilege level 15.
49
Generally, the privilege level 15 can be used for an administrator account,
privilege level 10 for a standard user account and privilege level 5 for a guest
account.
Buttons
: Click to add a new user.
Add / Edit User
This Page configures a user – add, edit or delete user.
Figure 4-2-5: Add / Edit User Configuration Page Screenshot
The Page includes the following fields:
Object Description
Username
Password
Password (again)
Privilege Level
A string identifying the user name that this entry should belong to. The allowed
string length is 1 to 31. The valid user name is a combination of letters, numbers
and underscores.
The password of the user. The allowed string length is 1 to 31.
Please enter the user’s new password here again to confirm.
The privilege level of the user.
The allowed range is 1 to 15. If the privilege level value is 15, it can access all
groups, i.e. that is granted the fully control of the device. But others value need to
refer to each group privilege level. User's privilege should be same or greater
than the group privilege level to have the access of that group.
50
By default setting, most groups privilege level 5 has the read-only access and
privilege level 10 has the read-write access. And the system maintenance
(software upload, factory defaults and etc.) need user privilege level 15.
Generally, the privilege level 15 can be used for an administrator account,
privilege level 10 for a standard user account and privilege level 5 for a guest
account.
Buttons
: Click to apply changes.
: Click to undo any changes made locally and revert to previously saved values.
: Click to undo any changes made locally and return to the Users.
: Delete the current user. This button is not available for new configurations (Add new user)
Once the new user is added, the new user entry shown in the Users Configuration Page.
Figure 4-2-6: User Configuration Page Screenshot
If you forget the new password after changing the default password, please press the “Reset”
button on the front panel of the Managed Switch for over 10 seconds and then release it. The
current setting including VLAN will be lost and the Managed Switch will restore to the default
mode.
51
4.2.5 Privilege Levels
This Page provides an overview of the privilege levels. After setup is completed, please press “Apply” button to take effect. Please
login web interface with new user name and password and the screen in Figure 4-2-7 appears.
When the mode is enabled, two ACEs are added automatically to trap UPnP
related packets to CPU. The ACEs are automatically removed when the mode is
disabled.
The TTL value is used by UPnP to send SSDP advertisement messages.
Valid values are in the range of 1 to 255.
The duration, carried in SSDP packets, is used to inform a control point or control
points how often it or they should receive a SSDP advertisement message from
this switch. If a control point does not receive any message within the duration, it
will think that the switch no longer exists. Due to the unreliable nature of UDP, in
the standard it is recommended that such refreshing of advertisements to be
done at less than one-half of the advertising duration. In the implementation, the
switch sends SSDP messages periodically at the interval one-half of the
advertising duration minus 30 seconds. Valid values are in the range 100 to
86400.
Buttons
: Click to apply changes
57
: Click to undo any changes made locally and revert to previously saved values.
Figure 4-2-11: UPnP
devices show on Windows My Network Place
58
4.2.9 DHCP Relay
Configure DHCP Relay on this Page. DHCP Relay is used to forward and to transfer DHCP messages between the clients and the
server when they are not on the same subnet domain.
The DHCP option 82 enables a DHCP relay agent to insert specific information into a DHCP request packets when forwarding client
DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server DHCP
packets to a DHCP client. The DHCP server can use this information to implement IP address or other assignment policies.
Specifically the option works by setting two sub-options:
Circuit ID (option 1)
Remote ID (option2).
The Circuit ID sub-option is supposed to include information specific to which circuit the request came in on.
The Remote ID sub-option was designed to carry information relating to the remote host end of the circuit.
The definition of Circuit ID in the switch is 4 bytes in length and the format is "vlan_id" "module_id" "port_no". The parameter of
"vlan_id" is the first two bytes representing the VLAN ID. The parameter of "module_id" is the third byte for the module ID (in
standalone switch it always equals 0; in stackable switch it means switch ID). The parameter of "port_no" is the fourth byte and it
means the port number.
The Remote ID is 6 bytes in length, and the value equals the DHCP relay agent’s MAC address. The DHCP Relay Configuration
screen in Figure 4-2-12 appears.
Figure 4-2-12 DHCP Relay
The Page includes the following fields:
Object Description
Relay Mode
Indicates the DHCP relay mode operation. Possible modes are:
Configuration Page Screenshot
Enabled: Enable DHCP relay mode operation. When enabling DHCP relay
mode operation, the agent forwards and transfers DHCP messages between
the clients and the server when they are not on the same subnet domain.
And the DHCP broadcast message won't flood for security considered.
Disabled: Disable DHCP relay mode operation.
59
Relay Server
Indicates the DHCP relay server IP address. A DHCP relay agent is used to
forward and transfer DHCP messages between the clients and the server when
they are not on the same subnet domain.
Relay Information
Mode
Relay Information
Policy
Indicates the DHCP relay information mode option operation. Possible modes
are:
Enabled: Enable DHCP relay information mode operation. When enabling
DHCP relay information mode operation, the agent inserts specific
information (option82) into a DHCP message when forwarding to DHCP
server and removing it from a DHCP message when transferring to DHCP
client. It only works under DHCP relay operation mode enabled.
Disabled: Disable DHCP relay information mode operation.
Indicates the DHCP relay information option policy. When enabling DHCP relay
information mode operation, if agent receives a DHCP message that already
contains relay agent information. It will enforce the policy. And it only works under
DHCP relay information operation mode enabled. Possible policies are:
Replace: Replace the original relay information when receiving a DHCP
message that already contains it.
Keep: Keep the original relay information when receiving a DHCP message
that already contains it.
Drop: Drop the package when receiving a DHCP message that already
Buttons
contains relay information.
: Click to apply changes
: Click to undo any changes made locally and revert to previously saved values.
60
4.2.10 DHCP Relay Statistics
This Page provides statistics for DHCP relay. The DHCP Relay Statistics screen in Figure 4-2-13 appears.
The Page includes the following fields:
Server Statistics
Object Description
Transmit to Server
Transmit Error
Receive from Server
Receive Missing Agent
Option
Rec eive Missing
Circuit ID
Rec eive Missing
Remote ID
Receive Bad Circuit ID
Figure 4-2-13: DHCP Relay
The packets number that relayed from client to server.
The packets number that errors sending packets to clients.
The packets number that received packets from server.
The packets number that received packets without agent information options.
The packets number that received packets which the Circuit ID option was
missing.
The packets number that received packets which Remote ID option was missing.
The packets number that the Circuit ID option did not match known circuit ID.
Statistics Page Screenshot
Receive Bad Remote ID
The packets number that the Remote ID option did not match known Remote ID.
61
Client Statistics
Object Description
Transmit to Client
Transmit Error
Receive from Client
Receive Agent Option
Replace Agent Option
Keep Agent Option
Drop Agent Option
Buttons
Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds.
: Click to refresh the Page immediately.
The packets number that relayed packets from server to client.
The packets number that erroneously sent packets to servers.
The packets number that received packets from server.
The packets number that received packets with relay agent information option.
The packets number that replaced received packets with relay agent information
option.
The packets number that kept received packets with relay agent information
option.
The packets number that dropped received packets with relay agent information
option.
: Clears all statistics.
62
4.2.11 CPU Load
This Page displays the CPU load, using a SVG graph. The load is measured as average over the last 100ms, 1sec and 10 seconds
intervals. The last 120 samles are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph,
your browser must support the SVG format. Consult the SVG Wiki for more information on browser support.
Specifically, at the time of writing, Microsoft Internet Explorer will need to have a plugin installed to support SVG. The CPU Load
screen in Figure 4-2-14 appears.
Buttons
Auto-refresh
Figure 4-2-14: CPU Load Page Screenshot
: Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds.
If your browser cannot display anything on this Page, please download Adobe SVG tool and
install it in your computer.
63
4.2.12 System Log
The Managed Switch system log information is provided here. The System Log screen in Figure 4-2-15 appears.
Figure 4-2-15: System Log Page Screenshot
The Page includes the following fields:
Object Description
ID
Level
The ID (>= 1) of the system log entry.
The level of the system log entry. The following level types are supported:
Info: Information level of the system log.
Warning: Warning level of the system log.
Error: Error level of the system log.
All: All levels.
Clear Level
To clear the system log entry level. The following level types are supported:
Info: Information level of the system log.
Warning: Warning level of the system log.
Error: Error level of the system log.
All: All levels.
Time
Message
The time of the system log entry.
The message of the system log entry.
64
Buttons
Auto-refresh
: Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds.
: Updates the system log entries, starting from the current entry ID.
: Flushes the selected log entries.
: Hides the selected log entries.
: Downloads the selected log entries.
: Updates the system log entries, starting from the first available entry ID.
: Updates the system log entries, ending at the last entry currently displayed.
: Updates the system log entries, starting from the last entry currently displayed.
: Updates the system log entries, ending at the last available entry ID.
65
4.2.13 Detailed Log
The Managed Switch system detailed log information is provided here. The Detailed Log screen in Figure 4-2-16 appears.
Figure 4-2-15: Detailed Log Page Screenshot
The Page includes the following fields:
Buttons
Object Description
ID
Message
: Download the system log entry to the current entry ID.
: Updates the system log entry to the current entry ID.
: Updates the system log entry to the first available entry ID.
: Updates the system log entry to the previous available entry ID.
: Updates the system log entry to the next available entry ID.
: Updates the system log entry to the last available entry ID.
: Print the system log entry to the current entry ID.
The ID (>= 1) of the system log entry.
The message of the system log entry.
66
4.2.14 Remote Syslog
Configure remote syslog on this Page. The Remote Syslog screen in Figure 4-2-17 appears.
Figure 4-2-17: Remote Syslog Page Screenshot
The Page includes the following fields:
Object Description
Buttons
Mode
Syslog Server IP
Syslog Level
Indicates the server mode operation. When the mode operation is enabled, the
syslog message will send out to syslog server. The syslog protocol is based on
UDP communication and received on UDP port 514 and the syslog server will not
send acknowledgments back sender since UDP is a connectionless protocol and
it does not provide acknowledgments. The syslog packet will always send out
even if the syslog server does not exist. Possible modes are: