1.3 How to Use This Manual............................................................................................................................14
2.1.1 Front Panel..........................................................................................................................................................21
2.1.2 LED Indications ................................................................................................................................................... 23
2.1.3 Wiring the AC Power Input ..................................................................................................................................25
2.1.4 Wiring the DC Power Input .................................................................................................................................. 25
2.1.5 Wiring the Faulty Alarm Contact ..........................................................................................................................26
2.1.6 Wiring the Digital Input / Output........................................................................................................................... 27
2.2 Installing the Managed Switch..................................................................................................................30
2.3.1 Installing the SFP Transceiver............................................................................................................................. 34
2.3.2 Removing the Module..........................................................................................................................................37
3.4 Web Management.......................................................................................................................................41
4. WEB CONFIGURATION...................................................................................................... 43
4.1 Main Web Page...........................................................................................................................................46
4.2.1 System Information..............................................................................................................................................48
4.2.2 IP Configuration...................................................................................................................................................49
4.2.3 IP Status ..............................................................................................................................................................52
4.2.7 Time Configuration .............................................................................................................................................. 59
4.2.11 CPU Load ..........................................................................................................................................................65
4.2.12 System Log .......................................................................................................................................................67
4.2.16 Digital Input/Output............................................................................................................................................72
4.2.20 Save Startup Config...........................................................................................................................................78
4.2.27 System Reboot..................................................................................................................................................85
4.3.2 SNMP System Configuration...............................................................................................................................87
4.3.4 SNMP System Information ..................................................................................................................................92
4.3.5.3 SNMPv3 Groups .......................................................................................................................................95
4.4 Port Management.....................................................................................................................................100
4.4.1 Port Configuration..............................................................................................................................................100
4.4.2 Port Statistics Overview.....................................................................................................................................103
4.4.3 Detailed Port Statistics.......................................................................................................................................104
4.4.5 Port Mirror .........................................................................................................................................................108
4.5 Link Aggregation...................................................................................................................................... 111
4.5.3 LACP System Status .........................................................................................................................................118
4.5.4 LACP Port Status............................................................................................................................................... 119
4.5.5 LACP Port Statistics ..........................................................................................................................................121
4.6.3 VLAN Port Configuration ...................................................................................................................................127
4.6.5 VLAN Port Status............................................................................................................................................... 135
4.6.7 Port Isolation .....................................................................................................................................................139
4.6.8.1 Two separate 802.1Q VLANs..................................................................................................................141
4.6.8.2 VLAN Trunking between two 802.1Q aware Switches ............................................................................146
4.6.10.3 Port Isolate ............................................................................................................................................148
4.7 Spanning Tree Protocol...........................................................................................................................155
4.7.1 Theory ...............................................................................................................................................................155
4.7.2 STP System Configuration ................................................................................................................................162
4.7.4 CIST Port Configuration ....................................................................................................................................166
4.7.8 Port Status.........................................................................................................................................................176
4.7.9 Port Statistics.....................................................................................................................................................178
4.8.6 IGMP Group Port Group Filtering ......................................................................................................................192
4.8.7 IGMP Snooping Status ...................................................................................................................................... 194
4.8.8 IGMP Group Information ...................................................................................................................................196
4.8.12 MLD Snooping Port Group Filtering................................................................................................................. 203
4.8.14 MLD Group Information ................................................................................................................................... 207
4.8.15 MLDv2 Information ..........................................................................................................................................208
4.8.17 MVR Status ..................................................................................................................................................... 213
4.8.18 MVR Groups Information.................................................................................................................................214
4.8.19 MVR SFM Information ..................................................................................................................................... 215
4.9 Quality of Service.....................................................................................................................................216
4.9.2 Port Policing ...................................................................................................................................................... 217
4.9.3 Port Shaping......................................................................................................................................................219
4.9.3.1 QoS Egress Port Schedule and Shapers ................................................................................................ 220
4.9.4 Port Classification.............................................................................................................................................. 222
4.9.4.1 QoS Ingress Port Tag Classification ........................................................................................................224
4.9.5 Port Scheduler................................................................................................................................................... 225
4.9.6 Port Tag Remarking...........................................................................................................................................226
4.9.6.1 QoS Egress Port Tag Remarking ............................................................................................................227
4.9.7 Port DSCP.........................................................................................................................................................229
4.9.11 QoS Control List ..............................................................................................................................................235
4.9.11.1 QoS Control Entry Configuration ...........................................................................................................237
6
4.9.12 QoS Status ...................................................................................................................................................... 240
4.9.13 Storm Control Configuration ............................................................................................................................242
4.10 Access Control Lists..............................................................................................................................253
4.10.1 Access Control List Status ............................................................................................................................... 253
4.10.2 Access Control List Configuration....................................................................................................................256
4.12.1 Port Limit Control............................................................................................................................................. 314
4.12.6 Port Security Status......................................................................................................................................... 322
4.12.7 Port Security Detail.......................................................................................................................................... 325
4.12.10 IP Source Guard Configuration......................................................................................................................332
4.12.11 IP Source Guard Static Table .........................................................................................................................333
4.13 MAC Address Table................................................................................................................................338
7
4.13.1 MAC Address Table Configuration...................................................................................................................338
4.13.2 MAC Address Table Status..............................................................................................................................341
4.14.6 Port Statistics...................................................................................................................................................363
4.15.3 Remote IP Ping Test ........................................................................................................................................368
4.16.2 Status ..............................................................................................................................................................373
4.17.2 RMON Alarm Status ........................................................................................................................................378
4.17.4 RMON Event Status ........................................................................................................................................380
4.17.5 RMON History Configuration ........................................................................................................................... 381
4.17.6 RMON History Status ......................................................................................................................................382
4.17.8 RMON Statistics Status ...................................................................................................................................384
4.19 Ring .........................................................................................................................................................389
4.19.3 Ethernet Ring Protocol Switch.........................................................................................................................395
4.19.4 Ethernet Ring Protocol Switch Configuration...................................................................................................397
8
4.19.5 Ring Wizard.....................................................................................................................................................401
4.19.6 Ring Wizard Example: ..................................................................................................................................... 402
Open the box of the Managed Switch and carefully unpack it. The box should contain the following items:
The NS4750-24S-4T-4X
Quick Installation Guide
User’s Manual CD
DB9 to RJ-45 Consol Cable
Rubber Feet
Rack Mount Accessory Kit
AC Power Cord
Dust Cap
If any of these are missing or damaged, please contact your dealer immediately. If possible, retain the carton including the original
x 1
x 1
x 1
x 1
x 4
x 1
x 1
x 33
packing material, and use them again to repack the product in case there is a need to return it to us for repair.
10
1.2 Product Descriptions
Multiple SFP Fiber Port Switch for Increasing Long-reach Networking of Enterprise, Telecoms and Campus
The NS4750 is equipped with advanced management functions and provides 24 100/1000Mbps dual speed SFP fiber ports, 4
10Gbps dual speed fiber ports and 4 10/100/1000Mbps TP/SFP ports delivered in a rugged strong case. It is capable of providing
non-blocking switch fabric and wire-speed throughput as high as 128Gbps in the temperature range from -10 to 60 degrees C
without any packet loss and CRC error, which greatly simplify the tasks of upgrading the enterprise LAN for catering to increasing
bandwidth demands. The NS4750 is specially designed for service provider to deliver profitable Ethernet network. The NS4750
adopts “Front Access” design, making the wiring and maintenance of the NS4750 placed in a cabinet very easy for technicians.
Support for 10Gb Ethernet
10Gb Ethernet which adopts full-duplex technology instead of low-speed, half-duplex CSMA/CD protocol, is a big leap in the
evolution of Ethernet. 10Gb Ethernet can be deployed in star or ring topologies. With 10Gb Ethernet, the NS4750 switch provides
broad bandwidth and powerful processing capacity. It is suitable for metropolitan networks and wide area networks. Using the
NS4750 switch, users can simplify network structures and reduce cost of network construction.
Optimized Design for MAN Redundant Ring, Fast Recovery for Surveillance or Industrial System
The NS4750 supports redundant ring technology and features strong rapid self-recovery capability to prevent interruptions and
external intrusions. It incorporates ITU G.8032 Ethernet Ring Protection Switching technology, Spanning Tree Protocol (802.1w
RSTP), and redundant power supply system into customer’s industrial automation network to enhance system reliability and
uptime in harsh factory environments. The NS4750 also protects customer’s industrial network connectivity with switching
recovery capability that is used for implementing fault tolerant ring and mesh network architectures. If the Industrial network is
interrupted accidentally, the fault recovery times could be less than 50ms to quickly bring the network back to normal operation.
Cost-effective IPv6 Managed Gigabit Switch Solution for Metro
Nowadays, lots of electronic products or mobile devices can browse the Internet, which means the need of IP address increases.
However, the current IPv4 network infrastructure is not capable enough to provide IP address to each single user/client. The
situation forces the ISP to come out with the IPv6 (Internet Protocol version 6) network infrastructure. To fulfill the demand, IFS
releases the IPv6 management Gigabit Ethernet Switch. It supports both IPv4 and IPv6 management functions. It can work with
the original network structure (IPv4) and also support the new network structure (IPv6). With easy and friendly management
interfaces and plenty of management functions included, the NS4750 Managed Switch is the best choice for you to build the IPv6
FTTx edge service and for Industries to connect with IPv6 network.
11
Digital Input and Digital Output for External Alarm
IFS NS4750 supports Digital Input, and Digital Output on the front panel. This external alarm offers technicians the ability to use
Digital Input to detect, and log external device status (such as door intrusion detector) for the alarm. As Digital Output could be
used to alarm if the NS4750 has port link down, link up or power failure.
12
Flexible and Extendable Solution
The 24 mini-GBIC slots built in the NS4750 support dual-speed, 100Base-FX and 1000Base-SX/LX SFP (Small Form-factor
Pluggable) fiber-optic modules, meaning the administrator now can flexibly choose the suitable SFP transceiver according to the
transmission distance or the transmission speed required to extend the network efficiently. The NS4750 supports SFP-DDM (Digital Diagnostic Monitor) function that can easily monitor real-time parameters of the SFP for network administrator, such as
Indicates that the switch is actively sending or receiving data over that port.
Indicates that the SFP port is link down.
Indicates the link through that port is successfully established with 1Gbps.
Indicates that the port is link down
Indicates the link through that SFP port is successfully established with speed
10Mbps or 100Mbps.
Indicates that the port is link down
24
10Base-SR/LR SFP+ interfaces for port25 to port28
LED Color Function
Green
Lights
Off
LNK/ACT
Lights
Orange
Off
Indicates the link through that SFP port is successfully established with
10Gbps
Indicates that the SFP port is link down
Indicates the link through that SFP port is successfully established with
1Gbps
Indicates that the SFP port is link down
2.1.3 Wiring the AC Power Input
The rear panel of the NS4750 indicates an AC inlet power socket, which accepts input power from 100 to 240V AC, 50/60Hz.
2.1.4 Wiring the DC Power Input
The 6-contact terminal block connector on the front panel of NS4750 is used for two DC redundant power input. Please follow the
steps below to insert the power wire.
1. Insert positive / negative DC power wires into contacts 1 and 2 for DC POWER 1, or 5 and 6 for DC POWER 2.
Figure 2-3: NS4750-24S-4T-4X Upper Panel
2. Tighten the wire-clamp screws for preventing the wires from loosening.
25
1 2 3 4 5 6
DC 1 DC 2
+ - + -
Figure 2-4 6-Pin Terminal Block Power Wiring Input
1. The wire gauge for the terminal block should be in the range of 12 ~ 24 AWG.
2. When performing any of the procedures like inserting the wires or tighten the wire-clamp screws,
make sure the power is OFF to prevent from getting an electric shock.
2.1.5 Wiring the Faulty Alarm Contact
The fault alarm contacts are in the middle (3 & 4) of the terminal block connector as the picture shows below. Inserting the wires,
the Managed Switch will detect the fault status of the power failure, or port link failure (available for managed model) when Fault Alarm function has been enabled. The following illustration shows an application example for wiring the fault alarm contacts
Insert the wires into the faulty alarm contacts
1. The wire gauge for the terminal block should be in the range of 12 ~ 24 AWG.
2. When performing any of the procedures like inserting the wires or tighten the wire-clamp screws, make
sure the power is OFF to prevent from getting an electric shock.
26
2.1.6 Wiring the Digital Input / Output
The 6-contact terminal block connector on the front panel of NS4750-24S-4T-4X is used for Digital Input and Digital Output.
Please follow the steps below to insert wire.
1. The NS4750-24S-4T-4X offers two DI and DO groups. 1 and 2 are DI groups, 3 and 4 are DO groups and 5 and 6 are GND
(ground).
Figure 2-5 Wiring the Redundant Power Inputs
DIDO GND
27
Tighten the wire-clamp screws for preventing the wires from loosening.
1 2 3 4 5 6
DI0 DI1 DO0 DO1 GND GND
Figure 2-6 6-Pin Terminal Block DI / DO Wiring Input
2. There are two Digital Input groups for you to monitor two different devices. The following topology shows how to wire DI0
and DI1. We use the NS4750-24S-4T-4X to be an example for describing DI application.
Figure 2-7 Wires DI0 and DI1 to Open Detector
28
3. There are two Digital Output groups for you to sense NS4750-24S-4T-4X port failure or power failure and issue a high or low
signal to external device. The following topology shows how to wire DO0 and DO1.
Figure 2-8 Wires DO0 and DO1 to Open Detector
29
2.2 Installing the Managed Switch
This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the
following topics and perform the procedures in the order being presented. To install your Managed Switch on a desktop or shelf,
simply complete the following steps.
In this paragraph, we will describe how to install the Managed Switch and the installation points attended to it.
2.2.1 Desktop Installation
To install the Managed Switch on desktop or shelf, please follow these steps:
Step1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch.
Step2: Place the Managed Switch on the desktop or the shelf near an AC/DC power source as shown inFigure 2-4.
Figure 2-4 Place the Managed Switch on the Desktop
Step3: Keep enough ventilation space between the Managed Switch and the surrounding objects.
Step4: Connect the Managed Switch to network devices.
Connect one end of a standard network cable to the 10/100/1000 RJ-45 ports on the front of the Managed Switch.
Connect the other end of the cable to the network devices such as printer servers, workstations or routers, etc.
30
Connecting to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. For more
information, please see the Cabling Specification in Appendix A.
Step5:Supply power to the Managed Switch.
Connect one end of the power cable to the Managed Switch.
Connect the power plug of the power cable to a standard wall outlet.
When the Managed Switch receives power, the Power LED should remain solid Green.
2.2.2 Rack Mounting
To install the Managed Switch in a 19-inch standard rack, please follow the instructions described below.
Step1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the front side.
Step2: Attach the rack-mount bracket to each side of the Managed Switch with supplied screws attached to the package.
Figure 2-5 shows how to attach brackets to one side of the Managed Switch.
Figure 2-5 Attach Brackets to the Managed Switch.
You must use the screws supplied with the mounting brackets. Damage caused to the parts by
using incorrect screws would invalidate the warranty.
Step3: Secure the brackets tightly.
Step4: Follow the same steps to attach the second bracket to the opposite side.
Step5: After the brackets are attached to the Managed Switch, use suitable screws to securely attach the brackets to the rack as
shown in Figure 2-6.
31
Figure 2-6 Mounting the Managed Switch on a Rack
Step6: Proceeds with steps 4 and 5 of session 2.2.1 Desktop Installation to connect the network cabling and supply power to the
Managed Switch.
32
2.3 Cabling
10/100/1000Base-T and 100Base-FX / 1000Base-SX/LX
All 10/100/1000Base-T ports come with auto-negotiation capability. They automatically support 1000Base-T, 100Base-TX
and 10Base-T networks. Users only need to plug a working network device into one of the 10/100/1000Base-T ports, and
then turn on the Managed Switch. The port will automatically run in 10Mbps, 20Mbps, 100Mbps or 200Mbps and 1000Mbps
or 2000Mbps after the negotiation with the connected device. The Managed Switch has eight SFP interfaces that support
* 62.5/125um fiber only supports 33meter, for 300m use OM3 50/125um.
1000Base-SX/LX:
Before connecting the other switches, workstation or media converter.
1. Make sure both sides of the SFP transceiver are with the same media type, for example, 1000Base-SX to 1000Base-SX,
1000Base-LX to 1000Base-LX.
1. It is recommended to use INTERLOGIX SFPs on the Managed Switch. If you insert an SFP
transceiver that is not supported, the Managed Switch will not recognize it.
2. Please choose the SFP transceiver which can be operated under -40~75 degrees C
temperature if the switch device is working in an 0~50 degrees C temperature environment.
35
2. Check the fiber-optic cable type that matches the SFP transceiver model.
To connect to 1000Base-SX SFP transceiver, use the multi-mode fiber cable with one side being the male duplex LC
connector type.
To connect to 1000Base-LX SFP transceiver, use the single-mode fiber cable with one side being the male duplex LC
connector type.
Connecting the fiber cable
1. Insert the duplex LC connector on the network cable into the SFP transceiver.
2. Connect the other end of the cable to a device – switches with SFP installed, fiber NIC on a workstation or a media
converter.
3. Check the LNK/ACT LED of the SFP slot on the front of the Managed Switch. Ensure that the SFP transceiver is operating
correctly.
100Base-FX:
Before connecting the other switches, workstation or media converter.
1. Make sure both sides of the SFP transceiver are with the same media type or WDM pair, for example, 100Base-FX to
100Base-FX, 100Base-BX20-U to 100Base-BX20-D.
2. Check the fiber-optic cable type that matches the SFP transceiver model.
To connect to MFB-FX SFP transceiver, use the multi-mode fiber cable with one side being the male duplex LC
connector type.
To connect to MFB-F20/F40/F60/FA20/FB20 SFP transceiver, use the single-mode fiber cable with one side being the
male duplex LC connector type.
Connecting the fiber cable
1. Attach the duplex LC connector on the network cable into the SFP transceiver.
2. Connect the other end of the cable to a device – switches with SFP installed, fiber NIC on a workstation or a media
converter.
3. Check the LNK/ACT LED of the SFP slot of the switch/converter. Ensure that the SFP transceiver is operating correctly.
4. Check the Link mode of the SFP port if the link fails. Co works with some fiber-NICs or media converters. Set the Link mode
to “100 Force” when needed.
36
2.3.2 Removing the Module
1. Make sure there is no network activity by checking with the network administrator, or through the management interface of
the switch/converter (if available) to disable the port in advance.
2. Remove the Fiber Optic Cable gently.
3. Lift up the lever of the MGB module and turn it to a horizontal position.
4. Pull out the module gently through the lever.
Figure 2-10: How to Pull Out the SFP Transceiver Module
Never pull out the module without lifting up the lever of the module and turning it to a horizontal
position. Directly pulling out the module could damage the module and the SFP module slot of the
Managed Switch.
37
3. SWITCH MANAGEMENT
This chapter explains the methods that you can use to configure management access to the Managed Switch. It describes the
types of management applications and the communication and management protocols that deliver data between your
management device (workstation or personal computer) and the system. It also contains information about port connection
options.
This chapter covers the following topics:
Requirements
Management Access Overview
Remote Telnet Access
Web Management Access
SNMP Access
Standards, Protocols, and Related Reading
3.1 Requirements
Workstations of subscribers running Windows XP/2003, Vista, Windows 7, MAC OS X, Linux, Fedora, Ubuntu or
other platform compatible with TCP/IP protocols.
Workstation installed with Ethernet NIC (Network Interface Card)
Ethernet Port connect
Network cables - Use standard network (UTP) cables with RJ45 connectors.
The above Workstation is installed with WEB Browser and JAVA runtime environment Plug-in
It is recommended to use Internet Explore 7.0 or above to access Managed Switch.
38
3.2 Management Access Overview
The Managed Switch gives you the flexibility to access and manage it using any or all of the following methods:
Remote Telnet Interface
Web browser Interface
An external SNMP-based network management application
The Remote Telnet and Web browser interface support are embedded in the Managed Switch software and are available for
immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management
methods.
Method Advantages Disadvantages
Remote
Telnet
Web Browser
SNMP Agent
Text-based
Telnet functionality built into Windows
XP/2003, Vista, Windows 7 operating
systems
Can be accesses from any location
Ideal for configuring the switch remotely
Compatible with all popular browsers
Can be accessed from any location
Most visually appealing
Communicates with switch functions at
the MIB level
Based on open standards
Table 3-1: Comparison of Management Methods
Security can be compromised (hackers need
only know the IP address)
Security can be compromised (hackers need
only know the IP address and subnet mask)
May encounter lag times on poor connections
Requires SNMP manager software
Least visually appealing of all three methods
Some settings require calculations
Security can be compromised (hackers need
only know the community name)
39
3.3 CLI Mode Management
There are two ways for CLI mode management, one is remote telnet, and the other is operating from console port. Remote telnet
is an IP-based protocol, and console port is for user to operate the NS4750-24S-4T-4X on local only, however their operation is
the same.
The command line user interface is for performing system administration, such as displaying statistics or changing option settings.
Using this method, you can access the Managed Switch remote telnet interface from personal computer, or workstation in the
same Ethernet environment as long as you know the current IP address of the Managed Switch.
Figure 3-1: Remote Telnet and Console Port Interface Management
In Windows system, you may click “Start”, then choose “Accessories”and “Command Prompt”. Please input “telnet
192.168.0.100” and press “enter’ from your keyboard. You will see the following screen (see Figure 3-2) appear.
Figure 3-2: Remote Telnet Interface Main Screen of Managed Switch
For more information about using the Remote Telnet interface, refer to Chapter 5 Remote Telnet Interface Management.
40
3.4 Web Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the
network through a standard browser such as Microsoft Internet Explorer. After you set up your IP address for the Managed Switch, you can access the Managed Switch’s Web interface applications directly in your Web browser by entering the IP
address of the Managed Switch.
Figure 3-3: Web Management
You can then use your Web browser to list and manage the Managed Switch configuration parameters from one central location;
the Web Management requires Microsoft Internet Explorer 7.0 or later.
Figure 3-4: Web Main Screen of Managed Switch
41
3.5 SNMP-based Network Management
You can use an external SNMP-based application to configure and manage the Managed Switch, such as SNMP Network
Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP
agent on the Managed Switch and the SNMP Network Management Station to use the same community string. This
management method, in fact, uses two community strings: the get community string and the set community string. If the SNMP
Net-work management Station only knows the set community string, it can read and write to the MIBs. However, if it only knows
the get community string, it can only read MIBs. The default getting and setting community strings for the Managed Switch is
public.
Figure 3-5: SNMP Management
42
4. WEB CONFIGURATION
This section introduces the configuration and functions of the Web-based management.
About Web-based Management
The Managed Switch offers management features that allow users to manage the Managed Switch from anywhere on the
network through a standard browser such as Microsoft Internet Explorer.
The Web-Based Management supports Internet Explorer 7.0. It is based on Java Applets with an aim to reduce network
bandwidth consumption, enhance access speed and present an easy viewing screen.
By default, IE8.0 or later version does not allow Java Applets to open sockets. The user has to
explicitly modify the browser setting to enable Java Applets to use network ports.
The Managed Switch can be configured through an Ethernet connection, making sure the manager PC must be set on the same
IP subnet address with the Managed Switch.
For example, the default IP address of the Managed Switch is 192.168.0.100, then the manager PC should be set at 192.168.0.x
(where x is a number between 1 and 254, except 100), and the default subnet mask is 255.255.255.0.
If you have changed the default IP address of the Managed Switch to 192.168.1.1 with subnet mask 255.255.255.0 via console,
then the manager PC should be set at 192.168.1.x (where x is a number between 2 and 254) to do the relative configuration on
manager PC.
Figure 4-1-1: Web Management
43
Logging on the Managed Switch
1. Use Internet Explorer 7.0 or above Web browser. Enter the factory-default IP address to access the Web interface. The
factory-default IP Address is shown as follows:
http://192.168.0.100
2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the
username/password you have changed via console) to login the main screen of Managed Switch. The login screen in
Figure 4-1-2 appears.
Default User name: admin
Default Password: admin
Figure 4-1-2: Login Screen
44
After entering the username and password, the main screen appears as shown inFigure 4-1-3.
Figure 4-1-3: Default Main Page
Now, you can use the Web management interface to continue the switch management or manage the Managed Switch by Web
interface. The Switch Menu on the left of the web page let you access all the commands and statistics the Managed Switch
provides.
1. It is recommended to use Internet Explore 7.0 or above to access Managed Switch.
2. The changed IP address take effect immediately after clicking on the Save button, you need
to use the new IP address to access the Web interface.
3. For security reason, please change and memorize the new password after this first setup.
4. Only accept command in lowercase letter under web interface.
45
4.1 Main Web Page
The Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to
access the Managed Switch using the Web browser of your choice. This chapter describes how to use the Managed Switch’s
Web browser interface to configure and manage it.
Main Functions Menu
Copper Port Link Status
SFP Port Link Status
Panel Display
The web agent displays an image of the Managed Switch’s ports. The Mode can be set to display different information for the
ports, including Link up or Link down. Clicking on the image of a port opens the Port Statistics page.
The port states are illustrated as follows:
Help Button
Figure 4-1-4: Main Page
State Disabled Link Down Link Up
RJ-45 Ports
SFP Ports
46
Main Screen
Main Menu
Using the onboard web agent, you can define system parameters, manage and control the Managed Switch, and all its ports, or
monitor network conditions. Via the Web-Management, the administrator can setup the Managed Switch by selecting the
functions those listed in the Main Function. The screen in Figure 4-1-5 appears.
Figure 4-1-5:Managed Switch Main Functions Menu
47
4.2 System
Use the System menu items to display and configure basic administrative details of the Managed Switch. Under the System the
following topics are provided to configure and view the system information.
4.2.1 System Information
The System Info page provides information for the current device information. System Info page helps a switch administrator to
identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears.
The page includes the following fields:
Object Description
Contact
Name
Location
MAC Address
The system contact configured in Configuration | System | Information | System Contact.
The system name configured in Configuration | System | Information | System Name.
The system location configured in Configuration | System | Information | System
Location.
The MAC Address of this Managed Switch.
Figure 4-2-1: System Information Page Screenshot
48
Power
Temperature
System Date
System Uptime
Software Version
Software Date
Buttons
Auto-refresh
The AC Power, Power 1 and Power 2 ON/OFF Status display.
The temperature shows current of the switch inside temperature status.
The current (GMT) system time and date. The system time is obtained through the
configured SNTP Server, if any.
The period of time the device has been operational.
The software version of the Managed Switch.
The date when the switch software was produced.
: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
: Click to refresh the page.
4.2.2 IP Configuration
The IP Configuration includes the IP Address, Subnet Mask and Gateway. The Configured column is used to view or change the
IP configuration. Fill up the IP Address, Subnet Mask and Gateway for the device. The screen in Figure 4-2-2 appears.
Figure 4-2-2: IP Configuration Page Screenshot
49
The Current column is used to show the active IP configuration.
Object Description
IP Configurations
Mode
DNS Server
DNS Proxy
Configure whether the IP stack should act as a Host or a
Router. In Host mode, IP traffic between interfaces will not be
routed. In Router mode traffic is routed between all interfaces.
This setting controls the DNS name resolution done by the
switch. The following modes are supported:
From any DHCP interfaces
The first DNS server offered from a DHCP lease to a
DHCP-enabled interface will be used.
No DNS server
No DNS server will be used.
Configured
Explicitly provide the IP address of the DNS Server in
dotted decimal notation.
From this DHCP interface
Specify from which DHCP-enabled interface a provided
DNS server should be preferred.
When DNS proxy is enabled, system will relay DNS requests to
IP Address
Delete
VLAN
IPv4
DHCP
IPv4
IPv6 Address
Enabled
Fallback
Current
Lease
Address
Mask
Length
the currently configured DNS server, and reply as a DNS
resolver to the client devices on the network.
Select this option to delete an existing IP interface.
The VLAN associated with the IP interface. Only ports in this
VLAN will be able to access the IP interface. This field is only
available for input when creating an new interface.
Enable the DHCP client by checking this box.
The number of seconds for trying to obtain a DHCP lease.
For DHCP interfaces with an active lease, this column show the
current interface address, as provided by the DHCP server.
Provide the IP address of this Managed Switch in dotted decimal
notation.
The IPv4 network mask, in number of bits (prefix length). Valid
values are between 0 and 30 bits for a IPv4 address.
Provide the IP address of this Managed Switch. A IPv6 address
is in 128-bit records represented as eight fields of up to four
hexadecimal digits with a colon separating each field (:).
50
IP Routes
Buttons
Mask
Length
Delete
Network
Mask Length
Gateway
Next Hop VLAN
: Click to add a new IP interface. A maximum of 128 interfaces is supported.
The IPv6 network mask, in number of bits (prefix length). Valid
values are between 1 and 128 bits for a IPv6 address.
Select this option to delete an existing IP route.
The destination IP network or host address of this route. Valid
format is dotted decimal notationor a valid IPv6 notation. A
default route can use the value 0.0.0.0or IPv6 :: notation.
The destination IP network or host mask, in number of bits
(prefix length).
The IP address of the IP gateway. Valid format is dotted decimal
notation or a valid IPv6 notation. Gateway and Network must be
of the same type.
The VLAN ID (VID) of the specific IPv6 interface associated with
the gateway.
: Click to add a new IP route. A maximum of 32 routes is supported.
: Click to apply changes.
: Click to undo any changes made locally and revert to previously saved values.
51
4.2.3 IP Status
IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour
cache (ARP cache) status. The screen in Figure 4-2-3 appears.
Figure 4-2-3: IPv6 Configuration Page Screenshot
The page includes the following fields:
ObjectDescription
The name of the interface.
The address type of the entry. This may be LINK or IPv4.
The current address of the interface (of the given type).
The status flags of the interface (and/or address).
The destination IP network or host address of this route.
The gateway address of this route.
The status flags of the route.
The IP address of the entry.
The Link (MAC) address for which a binding to the IP address given
exist.
IP Interfaces
IP Routes
Neighbor Cache
Interface
Type
Address
Status
Network
Gateway
Status
IP Address
Link Address
52
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
: Click to renew IPv6 Auto Configuration. This button is only available if IPv6 Auto Configuration is enabled.
4.2.4 Users Configuration
This page provides an overview of the current users. Currently the only way to login as another user on the web server is to close
and reopen the browser. After setup is completed, please press “Save” button to take effect. Please login web interface with new
user name and password, the screen in Figure 4-2-4 appears.
The page includes the following fields:
Object Description
User Name
Privilege Level
Figure 4-2-4: Users Configuration Page Screenshot
The name identifying the user.
The privilege level of the user. The allowed range is 1 to 15. If the privilege level
value is 15, it can access all groups, i.e. that is granted the fully control of the
device. But others value need to refer to each group privilege level. User's
privilege should be same or greater than the group privilege level to have the
access of that group. By default setting, almost group privilege level 5 has the
read-only access and privilege level 10 has the read-write access. And the
system maintenance (software upload, factory defaults and etc.) need user
privilege level 15. Generally, the privilege level 15 can be used for an
administrator account, privilege level 10 for a standard user account and privilege
level 5 for a guest account.
53
Buttons
: Click to add a new user.
Add / Edit User
This page configures a user – add, edit or delete user.
Figure 4-2-5: Add / Edit User Configuration Page Screenshot
The page includes the following fields:
Object Description
User Name
Password
Privilege Level
A string identifying the user name that this entry should belong to. The allowed
string length is 1 to 32. The valid user name is a combination of letters, numbers
and underscores.
The password of the user. The allowed string length is 0 to 32.
The privilege level of the user. The allowed range is 1 to 15. If the privilege level
value is 15, it can access all groups, i.e. that is granted the fully control of the
device. But others value need to refer to each group privilege level. User's
privilege should be same or greater than the group privilege level to have the
access of that group. By default setting, most groups privilege level 5 has the
read-only access and privilege level 10 has the read-write access. And the
Buttons
system maintenance (software upload, factory defaults and etc.) need user
privilege level 15. Generally, the privilege level 15 can be used for an
administrator account, privilege level 10 for a standard user account and privilege
level 5 for a guest account.
54
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
: Click to undo any changes made locally and return to the Users.
: Delete the current user. This button is not available for new configurations (Add new user)
Figure 4-2-6: User Configuration Page Screenshot
If you forget the new password after changing the default password, please press the “Reset”
button on the front panel of the Managed Switch for over 10 seconds and then release it. The
current setting including VLAN will be lost and the Managed Switch will restore to the default
mode.
4.2.5 Privilege Levels
This page provides an overview of the privilege levels. After setup is completed, please press “Save” button to take effect. Please
login web interface with new user name and password and the screen in Figure 4-2-7 appears.
The number of packets that are relayed from client to server.
The number of packets that resulted in errors while being sent to clients.
The number of packets received from server.
The number of packets received without agent information options.
The number of packets received with the Circuit ID option missing.
The number of packets received with the Remote ID option missing.
64
Remote ID
Receive Bad Circuit ID
Receive Bad Remote
ID
Client Statistics
Object Description
Transmit to Client
Transmit Error
Receive form Client
Receive Agent Option
Replace Agent Option
Keep Agent Optin
Drop Agent Option
The number of packets whose Circuit ID option did not match known circuit ID.
The number of packets whose Remote ID option did not match known Remote
ID.
The number of relayed packets from server to client.
The number of packets that resulted in error while being sent to servers.
The number of received packets from server.
The number of received packets with relay agent information option.
The number of packets which were replaced with relay agent information option.
The number of packets whose relay agent information was retained.
The number of packets that were dropped which were received with relay agent
information.
Buttons
Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
: Click to refresh the page immediately.
: Clear all statistics.
4.2.11 CPU Load
This page displays the CPU load, using a SVG graph.
The load is measured as average over the last 100ms, 1sec and 10 seconds intervals. The last 120 samles are graphed, and the
last numbers are displayed as text as well.
In order to display the SVG graph, your browser must support the SVG format. Consult the SVG Wiki for more information on
browser support. Specifically, at the time of writing, Microsoft Internet Explorer will need to have a plugin installed to support SVG.
The CPU Load screen in Figure 4-2-14 appears.
65
Buttons
Auto-refresh
Figure 4-2-13: CPU Load Page Screenshot
: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
If your browser cannot display anything on this page, please download Adobe SVG tool and
install it in your computer.
66
4.2.12 System Log
The switch system log information is provided here. The System Log screen in Figure 4-2-15 appears.
The page includes the following fields:
Object Description
ID
Level
Time
Message
Buttons
Figure 4-2-15: System Log Page Screenshot
The ID (>= 1) of the system log entry.
The level of the system log entry. The following level types are supported:
Info: Information level of the system log.
Warning: Warning level of the system log.
Error: Error level of the system log.
All: All levels.
The time of the system log entry.
The message of the system log entry.
Auto-refresh
: Flushes the selected log entries.
: Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds.
: Click to updates the system log entries, starting from the current entry ID.
67
: Hide system log according to entry page. As default System Log Information shows 20 entries for one page. Hide button
can hide the system log entry that has been over one page.
: Click this button could download system log with CSV format file.
: Updates the system log entries, starting from the first available entry ID.
: Updates the system log entries, ending at the last entry currently displayed.
: Updates the system log entries, starting from the last entry currently displayed.
: Updates the system log entries, ending at the last available entry ID.
4.2.13 Detailed Log
The switch system detailed log information is provided here. The Detailed Log screen in Figure 4-2-16 appears.
The page includes the following fields:
Object Description
ID
Message
Buttons
: Click this button could download system log with CSV format file.
Figure 4-2-16: Detailed Log Page Screenshot
The ID (>= 1) of the system log entry.
The message of the system log entry.
68
: Updates the system log entry to the current entry ID.
: Updates the system log entry to the first available entry ID
: Updates the system log entry to the previous available entry ID.
: Updates the system log entry to the next available entry ID.
: Updates the system log entry to the last available entry ID.
: Click this button to print out system log.
4.2.14 Remote Syslog
Configure remote syslog on this page. The Remote Syslog screen in Figure 4-2-17 appears.
The page includes the following fields:
Object Description
Server Mode
Server Address
Syslog Level
Figure 4-2-17: Remote Syslog Page Screenshot
Indicates the server mode operation. When the mode operation is enabled, the
syslog message will send out to syslog server. The syslog protocol is based on
UDP communication and received on UDP port 514 and the syslog server will not
send acknowledgments back sender since UDP is a connectionless protocol and
it does not provide acknowledgments. The syslog packet will always send out
even if the syslog server does not exist. Possible modes are:
Enabled: Enable server mode operation.
Disabled: Disable server mode operation.
Indicates the IPv4 host address of syslog server. If the switch provide DNS
feature, it also can be a host name.
Indicates what kind of message will send to syslog server. Possible modes are:
Info: Send information, warnings and errors.
69
Buttons
Warning: Send warnings and errors.
Error: Send errors.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
70
4.2.15 SMTP Configuration
Configure SMTP Configuration on this page. The SMTP Configuration screen in Figure 4-2-18 appears.
The page includes the following fields:
Object Description
SMTP Mode Enabled
SMTP Server
SMTP Port
SMTP Authentication Enabled
Figure 4-2-18: SMTP Configuration Page Screenshot
It is for you to enable SMTP mode function. This mode offers you to configure
SMTP server and SMTP account information, system will refer it to send an
E-mail for alarm noticing
It is for you to set up a specify SMTP server DNS name or IP address. If it is
inputted a DNS name, please remember to input DNS server IP address at IP
configuration page.
It is for you to input the SMTP server port number. As default is "25".
As usual SMTP server is denied to relay a mail from a different domain, so you
have to enable this option and input your mail account and password for SMTP
sever authorizing to forward a mail from different domain.
For example, you want a SMTP server which located on mail.123.com send a
mail to mail.456.net.com.
If you want to send the mail to a SMTP server which located on the same domain
or the same SMTP server, you don't have to enable SMTP authentication.
Authentication User
Name
It is for you to input your mail account name.
71
Authentication
Password
E-mail From
E-mail Subject It is for you to input mail subject.
E-mail 1 To
E-mail 2 To It is for you to input secondary recipient mail address.
Buttons
: Click to test SMTP server address.
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
It is for you to input your mail account password.
It is for you to input who send this mail.
It is for you to input recipient mail address.
4.2.16 Digital Input/Output
Digital Input allows user can log external device (such as industrial cooler) dead or alive or something else, system will logs a
user cistomize message into system log, syslog, issue SNMP trap or issue an alarm E-mail.
Digital Output allows user to monitor the switch port and power , and let system issue a high or low signal to an external device
(such as alarm) when the monitor port or power has been failed. The Configuration screen in Figure 4-2-19 appears.
72
The page includes the following fields:
Object Description
Enable
Condition
Figure 4-2-19 Windows File Selection Menu Popup
Checks the Enable checkbox will enable Digital Input / output function.
Unchecks the Enable checkbox will disable Digital input / output function.
As Digital Input:
Allows user selecting to High to Low or Low to High. This is means a signal
received by system is from High to Low or From Low to High, it will trigger an
action that logs a customize message or issue the message from the switch.
As Digital Output:
Allows user selecting to High to Low or Low to High. This is means
that when
the switch has power failed or port failed then system will issue a High
or Low signal to an external device (such as an alarm).
Event Description
Event
Allows user setting a customize message for Digital Input function alarming.
As Digital Input:
Allows user to record alarm message to System log, syslog or issues out via
SNMP Trap or SMTP.
As default SNMP Trap and SMTP are disabled, please enable them first if you
want to issue alarm message via them.
73
As Digital Output:
Allows user to monitor and alarm from port fail, power fail, Digital Input 0 (DI 0)
and Digital Input 1(DI 1) which means if Digital Output has detected these
event then Digitial Output would be triggered according to the setting of
Condition.
Buttons
Power Alarm
Port Alarm
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
Allows user to choose which power module want to be monitored.
Allows user to choose which port want to be monitored.
74
4.2.17 FaultyAlarm
The Faulty Relay Alarm function provides the Power Failure and Port Link Down/Broken detection. With both power input 1 and
power input 2 installed and the check boxes of power 1/power 2 ticked, the FAULTY LED indicator will then be possible to light up
when any one of the power failures occurs. As for the Port Link Down/Broken detection, the FAULT LED indicator will light up
when the port failure occurs; certainly the check box beside the port must be ticked first. Please refer to the segment of ‘Wiring the Fault Alarm Contact’ for the failure detection. The Configuration screen in Figure 4-2-20 appears.
The page includes the following fields:
Object Description
Enable
Record
Action
Power Alarm
Port Alarm
Figure 4-2-20 Windows File Selection Menu Popup
Allows user to enable Fault Alarm function.
Allows user to record alarm message to System log, syslog or issues out via
SNMP Trap or SMTP.
As default SNMP Trap and SMTP are disabled, please enable them first if you
want to issue alarm message via them.
Allows user to monitor and alarm from port fail or power fail.
Allows user to choose which power module want to be monitored.
Allows user to choose which port want to be monitored.
Buttons
75
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.2.18 Web Firmware Upgrade
This page facilitates an update of the firmware controlling the Managed Switch. The Web Firmware Upgrade screen in Figure
4-2-21 appears.
Figure 4-2-21: Web Firmware Upgrade Page Screenshot
To open Firmware Upgrade screen perform the folling:
1. Click System -> Web Firmware Upgrade.
2. The Firmware Upgrade screen is displayed as in Figure 4-2-21.
3. Click the “
4. Select on the firmware and then click “
5. Once the software be loaded to the system successfully, the following screen appears. The system will load the new software
after reboot.
“button of the main page, the system would pop up the file selection menu to choose firmware.
”. The Software Upload Progress would show the file upload status.
: Click to choose Alternate Image as Activate Image.
The flash index name of the firmware image. The name of primary (preferred)
image is image, the alternate image is named image.bk.
The version of the firmware image.
The date where the firmware was produced.
83
4.2.26 Factory Default
You can reset the configuration of the stack switch on this page. Only the IP configuration is retained. The new configuration is
available immediately, which means that no restart is necessary. The Factory Default screen in Figure 4-2-31 appears.
Figure 4-2-31: Factory Default Page Screenshot
Buttons
: Click to reset the configuration to Factory Defaults.
: Click to return to the Port State Page without resetting the configuration.
To reset the Managed Switch to the Factory default setting, you can also press the hardware reset button
at the front panel about 10 seconds. After the device be rebooted. You can login the management WEB
interface within the same subnet of 192.168.0.xx.
84
4.2.27 System Reboot
The Reboot page enables the device to be rebooted from a remote location. Once the Reboot button is pressed, user will
re-access the WEB interface about 60 seconds later, the System Reboot screen in Figure 4-2-32 appears.
Figure 4-2-32: System Reboot Page Screenshot
Buttons
: Click to reboot the system.
: Click to return to the web main page without reboot the system.
85
4.3 Simple Network Management Protocol
4.3.1 SNMP Overview
The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management
information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network
growth.
An SNMP-managed network consists of three key components: Network management stations (NMSs), SNMP agents,
Management information base (MIB) and network-management protocol: 。Network management stations (NMSs):Sometimes called consoles, these devices execute management applications
that monitor and control network elements. Physically, NMSs are usually engineering workstation-caliber computers with
fast CPUs, megapixel color displays, substantial memory, and abundant disk space. At least one NMS must be present in
each managed environment.
。Agents:Agents are software modules that reside in network elements. They collect and store management information
such as the number of error packets received by a network element.
。Management information base (MIB):A MIB is a collection of managed objects residing in a virtual information store.
Collections of related managed objects are defined in specific MIB modules.
。network-management protocol :A management protocol is used to convey management information between agents and
NMSs. SNMP is the Internet community's de facto standard management protocol.
SNMP Operations
SNMP itself is a simple request/response protocol. NMSs can send multiple requests without receiving a response.
。 Get -- Allows the NMS to retrieve an object instance from the agent.
。 Set -- Allows the NMS to set values for object instances within an agent.
。 Trap -- Used by the agent to asynchronously inform the NMS of some event. The SNMPv2 trap message is designed to
replace the SNMPv1 trap message.
SNMP community
An SNMP community is the group that devices and management stations running SNMP belong to. It helps define where
information is sent. The community name is used to identify the group. A SNMP device or agent may belong to more than one
SNMP community. It will not respond to requests from management stations that do not belong to one of its communities. SNMP
default communities are:
。 Write = private
。 Read = public
Use the SNMP Menu to display or configure the Managed Switch's SNMP function. This section has the following items:
System Configuration
Configure SNMP on this page.
86
System Information
SNMPv3 Communities
SNMPv3 Users
SNMPv3 Groups
SNMPv3 Views
SNMPv3 Accesses
The system information is provided here.
Configure SNMPv3 communities table on this page.
Configure SNMPv3 users table on this page.
Configure SNMPv3 groups table on this page.
Configure SNMPv3 views table on this page.
Configure SNMPv3 accesses table on this page.
4.3.2 SNMP System Configuration
Configure SNMP on this page. The SNMP System Configuration screen in Figure 4-3-1 appears.
Figure 4-3-1: SNMP System Configuration Page Screenshot
The SNMP System Configuration page includes the following fields:
Object Description
Mode
Indicates the SNMP mode operation. Possible modes are: