This manual covers the ESML6-FL2 series management software. This software supports
Telnet, SNMP protocols and is compliant with networking regulations. This switch can be
managed and monitored using third party software. Configuration of the switch,
monitoring and other network management features can be achieved in 3 ways:
• via the console port (HyperTerminal)
• using Telnet
• using a web browser
2 Logging in
2.1 Log in via the Console Port – Hyper Terminal
The Hyper Terminal in Microsoft Windows can be used to log into the switch management
software. If there is no Hyper Terminal, the user can install it in Windows. After finishing
installation, access the RS232 console software as follows:
• Connect the RS232 console port of the ESML6-FL2 to the serial port of a computer
using the console cable provided.
• In Windows, start Hyper Terminal as shown below in Fig 2-1:
3. In the user interface screen, enter the default user name “admin” and password
“123” and press the enter key, the user will be presented with the main menu.
The user can also use Telnet to log into the switch management software. Use a crossover or straight-through cable to attach an RJ45 port of the switch to the RJ45 port of a
PC. Access as follows:
1. In the “Run” page in Windows, enter “telnet 192.168.0.2” and click on “OK” as shown
in Fig 2-7:
Fig 2-7 Run Telnet Commands
2. Enter the user name: “admin” and password: “123” and press the ‘OK’ key to
access the main menu of the Telnet console management as shown Fig 2-8:
To access the switch via a web browser, the switch needs to be connected from one of its
RJ45 ports by a straight-through cable to the computer. The user can view or modify the
IP address once in the management software.
MAC address:000060006000
IP address:192.168.0.2
Subnet mask:255.255.255.0
Default gateway:192.168.0.1
Access the web in the following way:
1. Start a web browser and enter the appropriate IP address, press the enter key to
open the connection as shown in Fig 2-10:
Fig 2-10 Start Web Management
2. Enter the user name “admin” and password “123” in the presented page and
This page is used to change the administration password.
Fig 3-11 Change Password
e) MAC Configuration
The user can configure the MAC address of the switch; this is not recommended as it
could potentially cause conflicts among the other switches in the network.
This menu option is used to modify each port’s status and configure the link aggregation
groups. The user can switch to other data items with the space key. The descriptions of
each configuration are as shown in Table 3-2.
Fig 3-13 Port / Trunk Configuration
Enable
Auto-negotiation
Port rate/transmission
Flow control
Group
Alarm Enable or disable the alarm function of the port
Enable or disable the port
To enable or disable the auto-negotiation function of each port
Set the port rate to 10Mbps or 100Mbps, half or full duplex
Enable or disable the flow control function
Configure the link aggregation group. There are 4 groups that can be
configured.
Table 3-2 Port aggregation/alarm configuration
3. Port Mirroring Configuration
Port mirroring is used to monitor the network traffic of one port via another selected
port. The descriptions of each configuration are as shown in Table 3-4:
Enable or disable port mirroring
The port used to monitor the communication of all ports.
Ports to be monitored. The flow of all monitored ports is copied to the
sniffer port. You can select up to 7 monitored ports in the switch.
From the Action item, you can choose to monitor the receiving frame,
transmitting frame or both.
4. VLAN Configuration
Within this option there are 3 further sub-menus.
Table 3-4 Port Mirroring Configuration
Fig 3-15 VLAN Configuration
a) VLAN Configure
This menu option is used to configure the VLAN parameters of each port.
Select the ways to create VLANs based on port, 802.1Q with GVRP and
802.1Q without GVRP.
To specify the VLAN ID associated with untagged frames on the port. Eg. if
the default PVID of port 3 is 100, all untagged frames on port 3 are
associated with VLAN100. The default PVID of all ports is 1. When the user
wants to configure the devices which don’t support tagging and add them
to a VLAN, this feature is used. Only one untagged VLAN is permitted for
each port.
This rule is corresponding to the ingress rule 1 of web management: only
forward the frames with the appropriate VID to the port. With the space
key, the user chooses to forward or drop the frames that have no
appropriate VID.
This rule is corresponding to the ingress rule 1 of web management: drop
the untagged frames. With the space key, the user chooses to forward or
drop the untagged frames.
Table 3-5 VLAN Descriptions
Fig 3-17 Create a VLAN Group
From this option, the user can create a VLAN and add tagged/untagged members to it.
The specific descriptions of each item are shown in Table 2-6:
VLAN Name Enter new VLAN name
VLAN ID Enter number to identify the VLAN group from 2-4094, the default value
is 1.
VLAN Protocol Press the space key to select protocol.
Press the space key to select VLAN members including 3 types:
Members
Tagged: the port is tagged member.
Untagged: the port is untagged member.
None: the port is not the member of the VLAN.
This menu option allows the user to choose a priority class from 0 to 7, (0 being lowest
and 7 being highest). It is used to specify the weighting algorithm for transmitting
different priority frames.
From this page, the user can add, edit or delete the static MAC address.
Fig 3-22 Static MAC Address
When a static MAC address is added, no matter whether the physical device is connected
to the switch or not, the address will be kept in the switch’s address table. The switch
does not need to learn the MAC address of the device again if the networking device is
re-connected after power off or disconnection.
<Add> - Add a static MAC address
• Select <Add> then in the next screen select <Edit> to add a static MAC address.
• Enter the MAC address, whose frames will be always forwarded by the switch’s
port regardless of the networking status.
• Enter the port number.
• If the IEEE802.1Q VLAN is set in the switch, the static MAC address must be
associated with the unique VLAN. Enter the VID appropriate to the MAC address.
• Select <Save> and press <Enter> to save all changes.
• <Ctrl + A> will return you to the main menu.
<Edit> - Edit a static MAC address
• Select <Edit> and press the enter key to modify the static MAC address.
• Select the desired MAC address and press <Enter>.
• Select <Edit> and press <Enter> to be able to modify any items.
• Select <Save> and press <Enter> to save all changes.
• <Ctrl + A> will return you to the main menu.
<Delete> - Delete a static MAC address
• Select <Delete> to delete a static MAC address.
• Select the desired MAC address and press <Enter> key.
• Select <Save> and press <Enter> to save all changes.
By MAC address filtering, the switch can discard undesired frames. The filtered frames
are based on the destination addresses. The user can add, edit or delete MAC address
from this page.
Fig 3-23 Filtering MAC Address
<Add> - Add a filtered MAC address
• Select <Add> then <Edit> and press <Enter> to add a MAC address.
• Enter the MAC address to be filtered.
• Enter the VID associated with the MAC address if there is IEEE802.1Q VLAN in the
switch.
• Select <Save> and press <Enter> to save all changes.
• <Ctrl + A> will return you to the main menu.
<Edit> - Edit a filtered MAC address
• Select <Edit> and press <Enter>.
• Select the desired MAC address and press <Enter>.
• Select <Edit> and press <Enter> to modify all items.
• Select <Save> to save all changes.
• <Ctrl + A> will return you to the main menu.
<Delete> - Delete a filtered MAC address
• Select <Delete> and press <Enter>.
• Select the desired MAC address and press <Enter>.
If the security feature is enabled, the port will not learn any MAC addresses and only the
received frames with the static MAC address existing in the table will be forwarded
normally. This prevents the access of illegal terminal devices.
This feature is used to specify the time to keep an inactive MAC address in the switch
address table. The valid range of time is 300-765 seconds. The default value is 300
seconds.
Fig 3-26 MAC Age Interval
c)Broadcast Storm Filtering
This feature is used to configure the broadcasting storm control. When this feature is
enabled the threshold value can be set for the port. The threshold value set is the
percentage of the bandwidth of the broadcasting flow for the port. When the threshold
value is exceeded the control becomes enabled. The options are: 5%,10%,15%,
20%,25%.
To set the desired values select <Edit> and press the enter key to configure the filtering
mode. Press the space key to select the value.
The max queuing time of frames in the switch. If enabled, a frame whose
queuing time exceeds the limit will be dropped.
This sets whether the limit of queuing time for low-priority frames is enabled or
disabled. If the queuing time exceeds the limit (see Max Delay Time below) the
low-priority frames will be transmitted.
The queuing time of the low-priority frames in the switch. The default latency
time 255ms. The valid range is 0-255ms.
The bridge STP parameters are displayed on the left of the page. The user can set new
STP parameters on the right. For more detailed descriptions of the settings refer to
Chapter 5.
Fig 3-32 STP System Configuration
c) Perport Configuration
The parameters of each port are shown in Table 3-7:
Fig 3-33 Per Port Configuration
Port Status Shows the Spanning Tree status of each port
The path cost of designated port. The port with the lowest path cost is used to
Path Cost
Priority
forward data. The value range of the path cost is 1~ 65535. The default values of
IEEE802.1D specifications are 10Mb/s = 50-600;100Mb/s = 10-60;1000Mb/s =
3-10. Any changes to the values require the switch to be reset.
By this value, the port can be set as the root port. The value range is 0 ~ 255,
the default value is 128. The smaller value, the higher priority. To change the
value, the switch must be reset.
The trap manager is the host station that receives traps. The trap is generated by the
alarm system of the switch. If no trap manager is defined, there will be no traps sent. To
create a new trap manager enter an IP address and a group name. Use <Add> and
<Edit> to change settings.
Note: Before configuring LACP, first configure the trunking group in the Port/Trunk
configuration menu.
Fig 3-42 LACP Group Configuration
Item
Description
LACP
LACP Port
Number
group.
group, the extra port is used as backup for the failure. If it is local static
trunking group, the port number must be identical to the trunk ports.
b) State Activity
Table 3-10 LACP Descriptions
Fig 3-43 State Activity
Select <Edit> and press <Enter>, then use the space key to edit the properties of each
port.
The passive end: the ports won’t send the LACP frames automatically, the port will
respond only after it receives frames from the corresponding switch.
The active end: the ports will send the LACP frames automatically.
lacp [on|off]: on - the group is LACP static trunking.
off - the group is LACP local trunking.
<number>:to assign the working port of the trunking group.
configure the transmission time of spanning tree protocol
config stp hellotime <number>
config stp maxage <number>
config stp fwdly <number>
config stp prioriy <number>
information.
<number>: valid values are 1~10
configure the time that the gate bridge waits for a messge
before it attempts to re-configure.
<number>: valid values are 6~40
configure the time that the port waits for before its status
switches from learning and monitoring to forwarding.
<number>: valid values 4~30.
identify the value of root bridge. The bridge of the lowest
number has the highest priority and will be the root bridge.
To change this number, the user needs to reset the switch.
<number>: valid values are 1~65535.
show stp portstatus display spanning tree status of each port
show stpstate display whether STP is enabled or disabled
show stp info display the STP configuration
show stp rootbridge display the STP root bridge information
4.9 Commands for the Port Sniffer
enable port sniffer & configure the monitored & sniffer port.
<portid>: to configure the analyzer port with valid values
The main menu can also be accessed using a web browser, as shown below, see section
2 for details of how to log in. Within the main menu there are 8 options.
Fig 5-1 Home
5.1.1 Port Status
To view the status of all the ports select the “Port Status” option in the main menu.
To view the port statistics select the “Port Statistics” option in the main menu.
Fig 5-3 Port Statistics
5.1.3 Administrator
There are 11 sub-menus available from this menu option.
Fig 5-4 Administrator
1. IP Address
This menu option displays the switch’s IP address, subnet mask & gateway address and
allows details to be updated. To enter a new IP address change the IP address field and
select “Apply”.
Note: To make the new IP parameters effective, the switch must be reset.
The time to keep the inactive MAC address in the address table.
The valid values are 300~765s, the default is 300s.
The queuing time of the restricted frames. When this feature is
enabled and the queuing time exceeds the limit, the frames will
be dropped. The valid values are 1s, 2s, 4s and close. The
default time is 1s.
When this feature is enabled and threshold value is set for the
port, the broadcasting storm filter can be configured. The
threshold value is the percentage of the broadcasting flow in the
port bandwidth. When the threshold value is exceeded, the
control is enabled. The valid values are 5%, 10%, 15%, 20%,
25% & disabled.
4. Priority Queue Service
First come first service First come first service.
Higher priority first
All higher priority frames are transmitted before all lower priority
frames.
Table 5-1 Other Configurations
Weighting round robin
Enable latency limit
QoS policy:
High priority classes
To assign priority in the high priority queue. This item decides
the quantity of high priority frames to be transmitted before low
priority frames. Eg. 5 high priority: 1 low priority means 5
frames of high priority are sent out before 1 frame of low
priority.
To limit the queuing time of the low priority frames. The max
default is 255ms. If the queuing time of low priority frames
exceeds the limit, they will be sent. The valid range is 1~255ms.
Note: before enabling latency limit, make sure the “max bridge
transmission latency limit” is enabled.
The priority 0-7 can be mapped to high or low queues.
Support for 802.1Q tagged, but no GVRP dynamic VLAN.
Support for 802.1Q tagged and GVRP dynamic VLAN.
GVRP allows automatic VLAN configurations between switches
and/or nodes. If the switch is connected to a GVRP-enabled device,
it will be automatically added to the VLAN.
6. Console Info
Table 5-3 Protocol Configuration
Choose this menu option to display the basic information of the switch console serial
port.
To specify the LACP value. The switch with the smallest value has the
highest priority and is chosen as the active LACP.
The user can link aggregation for two or more ports, and select “Group ID”,
and then click on the “Get” button.
If enabled, the group is set as a LACP static trunking group. If disabled, it is
set as a local static trunking group. All ports support LACP dynamic trunking.
If the connected switch supports LACP as well, a LACP dynamic trunking
group will be created automatically. If LACP is enabled, it can be set as
passive or active on each port.
Note: When link aggregation is being configured, STP must be enabled,
otherwise, the ring network may form a redundant link which could cause a
network storm.
The max ports that can be aggregated simultaneously. If it is a static LACP
trunking group, the extra port is used as backup in case of a port failure. If
it is set as a local static trunking group, the port number must be identical to
the trunking port number.
b) Aggregator information
Table 5-4 Aggregator
This menu option allows the user to view the information after the LACP is configured.
The options within this menu allow a port to be set as “Active” which means that LACP
frames are sent automatically. If the port is not set to “Active” it remains in “Passive”
mode and will only respond after receiving LACP frames.
Dynamic LACP trunking can only occur if one or two ports are LACP active. When the user
selects port trunking this state is activated automatically.
a
Fig 5-12 Aggregator – State Activity
9. Filter
There are 4 options within this menu.
a) IGMP Snooping
The switch supports IP multicasting, from this page IGMP snooping information such as
the multicasting group, VID and member port can be viewed. The IP multicasting address
is from 224.0.0.0 to 239.255.255.255.
IGMP is the internal protocol in the IP stack. IP manages the multicasting
communication via the switch, router or computer supporting IGMP. If IGMP is enabled,
the port can detect the IGMP query frames and report frames, and manages the IP
multicasting traffic via the switch. There are three basic IGMP messages:
Query : the message sent by the querier to the router or switch and requests all hosts in
the multicasting group to send a response.
Report: the message sent by the host to the querier and used to identify the member.
Leave: the message sent the by host to the querier to specify the host has left the
multicasting group.
b) Static MAC Address
Fig 5-14 Filter – Static MAC Address
When a static MAC address is added, no matter whether the physical device is connected
to the switch, the address will be kept in the address table of the switch. When the
switch is reset after power off or disconnection, the switch won’t need to re-learn the
MAC address. To add an address do as follows:
• Enter the address, whose traffic will be forwarded by switch regardless of its
activity.
• Enter a port number.
• If a VLAN (based on port or IEEE802.1Q), the static address shall be associated
with the unique VLAN. Enter the VLAN name.
• Click on the “Add” button.
c) Port Security
If security is enabled, the port will be locked and cannot learn any new MAC addresses.
Only the received frames, whose addresses have been in the address table, can be
forwarded normally. The user can stop the port being able to learn any new MAC address
and from the “Static MAC Address” option define the address table that can use the
secure port.
A VLAN is a logical network which restricts general broadcasting. It is set up to separate
information and only the VLAN member can receive information from another VLAN
member. Logically, to create a VLAN using a switch, a group of networking devices are
connected to another switch. Actually, all networking devices are still physically
connected to one switch.
Note: Before configuring a VLAN, the VLAN mode must be enabled in the ‘Configuration’
‘Advanced’ menu see Page 39.
In the default configuration, a VLAN is enabled and all ports belong to the default VLAN,
whose VID is 1.
Port-based VLAN(IEEE802.1Q)
• Port-based VLAN is compliant with IEEE802.1Q .It is possible to create a VLAN for
the switches from different manufacturers by employing tag technology. The tag
contains a VID which specifies the VLAN number.
Protocol-based VLAN
• To make the end device send frames to different VLANs, the device either adds a
VLAN tag to the frames or is connected to the gate bridge of an identifiable VLAN,
the bridge can not only be based on the default PVID but also on other frames
information like protocol, so as to classify the VLAN ID.
Fig 5-17 VLAN Config
a) Basic
To create GVRP aware or unaware 802.1Q and add a tagged member port:
• Click on the “Administrator” from the main menu and select “VLAN”.
• Click on the “Add”.
• Enter a name for the new VLAN.
• Enter a VID number between 2-4094, the default is 1.
• The “Protocol VLAN” can be set as “None”.
• Select the added port and click on the “Add”.
• Click on the “Next” and select “Tag” in the list.
Use this option to configure the VLAN ID for all untagged frames of the port.
Fig 5-18 VLAN
Config – Port ID
Example: if the default PVID of port 2 is 3, all untagged frames of port 2 belong to
VLAN3. The default PVID for all ports is 1. If the user wants to change a device that does
not support tagged frames and add it to a VLAN, this feature can be applied. Each port
can only have one untagged VLAN.
Ingress Filter
If the port belongs to the VLAN, the frames that belong to the VLAN will be forwarded.
There are two ingress rules:
Ingress rule 1: only forward the frames whose VID is appropriate to the ports.
Ingress rule 2 : drop the untagged frames.
Advanced Info
The user can configure the VLAN in two ways: dividing the VLAN on one switch or on
different switches in ring network. It is easy to divide a VLAN on one switch, and three
VLAN modes can be applied, by assigning different VIDs to the port.
The user needs to apply 802.1Q GVRP-aware or GVRP-unaware VLAN when dividing a
VLAN on ring network with different switches.
To form a VLAN as shown, follows the instructions below:
Fig 5-19 VLAN Diagram in
Ring Network
• Log in to the WEB management interface of Switch 1, select VLAN mode in the
“Advanced” menu: 802.1Q GVRP-aware or 802.1Q GVRP-unaware.
• Configure VLAN1, containing port 4 and 8, VID is 2, tagged.
• Configure VLAN2, containing port 4 and 8, VID is 3, tagged.
• In the “Port VID” menu, configure port 6 PVID as 3, port 7 PVID as 2.
• Log in to the WEB management interface of Switch 2, select VLAN mode in the
“Advanced” menu: 802.1Q GVRP-aware or 802.1Q GVRP-unaware.
• Configure VLAN1, containing port 4 and 8, VID is 2, tagged.
• Configure VLAN2, containing port 4 and 8, VID is 3, tagged.
• In the “Port VID” menu, configure port 6 PVID as 2, port 7 PVID as 3.
11. Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP) is a standard method (IEEE 802.1D)to prevent a loop in
a switching network. The purpose of activating STP is to ensure only one path exists
between any two nodes. The user can enable and activate the STP in the advanced page
of “Switch Configuration” see Page 39.
The root port is set by configuring this value with a range from 0 to
Priority
255, the default is 128. The smaller value, the higher priority. To
change this value, the switch must be reset.
This shows the cost of a specified port. The switch identity and which
port is used as a forwarding port is set according to this value. The
Path cost
port with the smallest value acts as the forwarding port, the range is
from 1 to 65535. The defaults values are 10Mb/s = 50-600; 100Mb/s
= 10-60;1000Mb/s = 3-10. To change this value, the switch must be
reset.
Table 5-6 STP Port Parameters
12. Analysis Port
A port sniffer is a method used to monitor network traffic. The port traffic can be
monitored by a designated port. All traffic received or transmitted will be copied to the
mirror port.
Fig 5-22 Analysis Port
Each item is described as follows:
Roving analyzer Enable or disable the sniffer feature.
Analyzer port
Monitored port
Monitor Rx The receiving frames of the monitored port.
Monitor Tx The transmitting frames of the monitored port.
The port used to view all communications of all monitored ports. The user can
connect the sniffer port to a LAN analyzer or netxray.
The monitored ports. All traffic from these ports will be copied onto the sniffer
port. To disable this feature, the user must select “no monitored port”.
If the MIB is installed correctly at the management end, any SNMP-running management
software can manage the switch. SNMP is a protocol to control the transmission between
manager and agent. SNMP V1 is supported.
This page is used to define host pc as trap manager and enter the SNMP group name.
The user can also define a name, location and contact for the switch.
Name Enter the switch name.
Location Enter the switch location
Contact Enter the group name
Table 5-8 SNMP Parameters
Fig 5-23 SNMP
The group name can be used as a password in the following way:
Read onlyEnable the request with this name to display the MIB information.
Read write
The trap manager is the host station to receive traps which are generated by the switch.
If a trap manager is not defined, a trap won’t be issued. To create a trap manager enter
an IP address and a group name.
Manual_sw-ESML6-FL2-Rev1106
Enable the request with this name to display and configure the MIB
information.
The users can the administration user name and password. The default is:
User name: admin
Password: 123
Fig 5-24 Security Management
5.1.4 Configuration Backup
1. TFTP Restore Configuration
To restore the TFTP configuration, the user also needs to run TFTP Turbo98 or other TFTP
server software. Set the TFTP server address using this page. In this page, the user can
restore the configuration, but before that, the backup mirroring must be in the TFTP
server, the default is flash.dat, and then the switch can download the backup mirror.
Note: the backup file name can be maximum of 11 English characters plus .dat.
Configure the TFTP server address and file name. The user can also save the EEPROM
value and enter the page of TFTP restoring configuration to restore EEPROM value.