Reproduction in any form or by any means without permission is prohibited.
Page 3
3
Federal Communications Commission (FCC) Statement
This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference in which case the user
will be required to correct the interference at his expense.
The user is cautioned that changes and modifications made to the equipment
without approval of the manufacturer could void the user's authority to operate
this equipment.
5.6 About Korenix ................................................................................112
Page 5
1
1 Introduction
Welcome to Korenix JetNet 4510 Series Industrial Managed Ethernet Switch User
Manual. Following topics are covered in this chapter:
1.1 Overview
1.2 Major Features
1.3 Package Checklist
1.1 Overview
JetNet 4510 series, Industrial 10-port Managed Ethernet Switches, have 7 10/100 Base-TX ports
and 3 combo ports, respectively 10/100TX /100 Base-FX. JetNet 4510 is especially designed to
operate under harsh environmental conditions. The switches provide solid foundation for a highly
fault-tolerant and easily-managed network. JetNet 4510 can be remotely configured by Telnet,
Web browser, JetView and managed by Simple Network Management Protocol (SNMP) and
Remote Monitoring (RMON). You can also connect the attached RS232 console cable to manage
the switch by Command Line Interface (CLI). CLI commands are Cisco-Like commands, your
engineers who are familiar with Cisco products don’t need to learn new rules for CLI commands.
Security is enhanced with advanced features such as 802.1Q VLAN and Port/IP security.
Performance is optimized by QoS and IGMP Snooping/Query. Korenix 3rd generation Ring
technology, Multiple Super Ring, enables superb self-healing capability for network failure. The
fastest failover time is enhanced from 300ms to 5ms for 10/100 Base-TX RJ-45 ports and to 30ms
for 100 Base-FX. This is Korenix patented ring technology, which is registered in most countries.
For interoperability with your existed network, JetNet 4510 series also come with an advanced
redundant network solution, Ring Coupling and Rapid Dual Homing technology. with an advanced
redundant network solution, Ring Coupling and Rapid Dual Homing technology. With Ring
Coupling and Rapid Dual Homing technology, Ethernet Ring can be extended more easily. No
matter with Korenix switch or other managed switches
The IP31-design aluminum case further strengthens JetNet 4510's withstand ability in harsh
industrial environment. The event warning is notified to the network administrator via e-mail,
system log, or to field engineers by relay output. JetNet 4510 Series Industrial Managed Ethernet
Switch has also passed CE/ FCC/ UL safety certifications to help ensure safe and reliable data
transmission for industrial applications. JetNet 4510 Series will be your best option for
highly-managed industrial network.
1.2 Major Features
Korenix JetNet 4510 Series products have the following features:
Secured by IEEE 802.1x, Port Security, Access IP list, SSH and HTTPS Login
Event Notification by E-mail, SNMP trap and SysLog
Cisco-Like CLI, Web, SNMP/RMON, and JetView for network Management
Redundant DC Power Inputs, Digital Input and Relay Output
1.5KV Hi-Pot Protection for ports and power
Industrial Heat dispersing design, -10~60˚C operating temperature, Rigid Aluminum Case
Complies with IP-31
Note: The detail spec is listed in Appendix 5.1.
1.3 Package List
Korenix JetNet 4510 Series products are shipped with following items:
One industrial Managed Ethernet switch
One DIN-Rail clip (attached on the switch)
One wall mounting plate and six screws
One RS-232 DB-9 to RJ-45 console cable
Documentation and Software CD
Quick Installation Guide
If any of the above items are missing or damaged, please contact your local sales
representative.
Page 7
3
2 Hardware Installation
This chapter includes hardware introduction, installation and configuration information.
Following topics are covered in this chapter:
2.1 Hardware Introduction
Dimension
Panel Layout
Bottom View
2.2 Wiring Power Inputs
2.3 Wiring Digital Input
2.4 Wiring Relay Output
2.5 Wiring Ethernet Ports
2.6 Wiring Combo Ports
2.7 Wiring RS-232 console cable
2.8 DIN-Rail Mounting Installation
2.9 Wall-Mounting Installation
Page 8
4
2.1 Hardware Introduction
Dimension
JetNet 4510 Industrial Managed Switch dimension (W x H x D) is 96mm x 137mm x
119mm
Page 9
5
Panel Layout
The front panel includes 10/100Mbps Fast Ethernet ports, SFP slot, RS232 console port,
System / Combo Port LED and Reset button.
Bottom View
The bottom view of the JetNet 4510 Industrial Managed Switch consists of three terminal
block connectors with two DC power inputs, two Digital Inputs, two Relay Outputs and 1
Earth Ground.
Page 10
6
2.2 Wiring Power Inputs
Follow below steps to wire JetNet 4510 redundant DC power inputs.
1. Insert positive and negative wires into V+ and V- contacts respectively of the
terminal block connector
2. Tighten the wire-clamp screws to prevent DC wires from being loosened.
3. Power 1 and Power 2 support power redundancy and polarity reverse protection
functions.
4. Positive and negative power system inputs are both accepted, but Power 1 and
Power 2 must apply the same mode.
Please refer following figure to see how to install the power system
Note1: It is a good practice to turn off input and load power, and unplug power terminal
block before making wire connections. Otherwise, your screwdriver blade can
inadvertently short your terminal connections to the grounded enclosure.
Note 2: The range of the suitable electric wire is from 12 to 24 AWG.
Note 3: If the 2 power inputs are connected, JetNet 4510 will be powered from the highest
connected voltage. The unit will alarm for loss of power, either PWR1 or PWR2.
Note 4: Please ensure the AC/DC power supply is UL certified.
2.3 Wiring Digital Input
JetNet 4510 provides 2 digital inputs. It allows users to connect the termination units’
digital output and manage/monitor the status of the connected unit. The Digital Input pin
can be pulled high or low; thus the connected equipments can actively drive these pins
high or low. The embedded software UI allows you to read and set the value to the
connected device.
Page 11
7
The power input voltage of logic low is 0-10VDC. Logic high is 11-30VDC.
Wire the digital input just like wiring the power input introduced in chapter 2.2.
2.4 Wiring Digital Output
JetNet 4510 provides 2 digital outputs, also known as Relay Output. The relay contacts
are energized (open) for normal operation and will close for fault conditions. The fault
conditions include power failure, Ethernet port link break or other pre-defined events
which can be configured in JetNet 4510 UI.
Wiring digital output is exactly the same as wiring power input introduced in chapter 2.2.
2.5 Wiring Earth Ground
To ensure the system will not be damaged by noise or any electrical shock, we suggest
you to make exact connection with JetNet 4510 with Earth Ground.
On the bottom side of JetNet 4510, there is one earth ground screw. Loosen the earth
ground screw by screw drive; then tighten the screw after earth ground wire is connected.
Page 12
8
2.6 Wiring Fast Ethernet Ports
JetNet 4510 includes 7 RJ45 Fast Ethernet ports. The fast Ethernet ports support
10Base-T and 100Base-TX, full or half duplex modes. All the fast Ethernet ports will
auto-detect the signal from connected devices to negotiate the link speed and duplex
mode. Auto MDI/MDIX allows users to connect another switch, hub or workstation without
changing straight through or crossover cables.
Note that crossover cables simply cross-connect the transmit lines at each end to the
received lines at the opposite end.
Note that Ethernet cables use pins 1, 2, 3, and 6 of an 8-pin RJ45 connector. The signals
of these pins are converted by the automatic MDI-X function, as shown in the table below:
Pin MDI-X
1 RD+ TD+
2 RD- TD-
3 TD+ RD+
6 TD- RD-
Connect one side of an Ethernet cable into any switch port and connect the other side to
your attached device. The LNK LED will light up when the cable is correctly connected.
Refer to the LED Indicators section for descriptions of each LED indicator. Always make
Signals MDI Signals
Page 13
9
sure that the cables between the switches and attached devices (e.g. switch, hub, or
workstation) are less than 100 meters (328 feet).
JetNet 4510 includes 3 combo ports. The speed of the RJ45 of combo port supports 10
Base-T and 100 Base-TX. The speed of the SFP port supports 100 Base-FX. The SFP
ports accept standard MINI GBIC SFP transceiver. But, to ensure system reliability,
Korenix recommends using the Korenix certificated SFP Transceiver. The certificated
SFP transceiver which JetNet 4510 supported includes 100 Base-FX single/multi mode
range from 550m to 80KM.
2.8 Wiring RS-232 Console Cable
Korenix attaches one RS-232 DB9 to RJ-45 cable in the box. Connect the DB9 connector
to the COM port of your PC, open Terminal tool and set up serial settings to 9600, N,8,1.
(Baud Rate: 9600 / Parity: None / Data Bit: 8 / Stop Bit: 1) Then you can access CLI
interface by console able.
Note: If you lost the cable, please contact with your sales or follow the pin assignment to
buy a new one. The Pin assignment spec is listed in the appendix.
Page 14
10
1. Use the screws to attach DIN
-
Rail clip to the real panel of
JetNet
2.9 DIN-Rail Mounting Installation
The DIN-Rail clip is already attached to the JetNet 4510 when packaged. If the DIN-Rail
clip is not screwed on the JetNet 4510, follow the instructions and the figure below to
attach DIN-Rail clip to JetNet 4510.
Follow the steps below to mount JetNet 4510 to the DIN-Rail track:
1. First, insert the upper end of DIN-Rail clip into the back of DIN-Rail track from its
upper side.
4510.
2. To remove DIN-Rail clip, reverse step 1.
Page 15
11
2. Lightly push the bottom of DIN-Rail clip into the track.
3. Check if DIN-Rail clip is tightly attached on the track.
4. To remove JetNet 4510 from the track, reverse the steps above.
Notes: The DIN Rail should compliance with DIN EN50022 standard.
Using wrong DIN rail may cause system install unsafe.
Page 16
12
2.10 Wall-Mounting Installation
Follow the steps below to install JetNet 4510 with the wall mounting plate.
1. To remove DIN-Rail clip from JetNet 4510, loosen the screws from DIN-Rail clip.
2. Place the wall mounting plate on the rear panel of JetNet 4510.
3. Use the screws to tighten the wall mounting plate onto JetNet 4510.
4. Use the hook holes at the corners of the wall mounting plate to hang JetNet 4510
onto the wall.
5. To remove the wall mounting plate, reverse the steps above.
Note: To avoid damage the internal circuit, be sure use the screw included in
the package to screw and tight the wall-mount kit onto the rear side of the
JetNet switch. The specification of screw is M3 in 6 mm length.
Page 17
13
3 Preparation for Management
JetNet 4510 series Industrial Managed Switch provides both in-band and out-band
configuration methods. You can configure the switch via RS232 console cable if you
don’t attach your admin PC to your network, or if you lose network connection to your
JetNet 4510. This is so-called out-band management. It wouldn’t be affected by network
performance.
The in-band management means you can remotely manage the switch via the network.
You can choose Telnet or Web-based management. You just need to know the device’s
IP address and you can remotely connect to its embedded HTTP web pages or Telnet
console.
Following topics are covered in this chapter:
3.1 Preparation for Serial Console
3.2 Preparation for Web Interface
3.3 Preparation for Telnet console
3.1 Preparation for Serial Console
In JetNet 4510 package, Korenix attached one RS-232 DB-9 to RJ-45 console cable.
Please attach RS-232 DB-9 connector to your PC COM port, connect RJ-45 to the
Console port of the JetNet 4510. If you lose the cable, please follow the console cable
PIN assignment to find one. (Refer to the appendix).
1. Go to Start -> Program -> Accessories -> Communication -> Hyper Terminal
2. Give a name to the new console connection.
3. Choose the COM name
4. Select correct serial settings. The serial settings of JetNet 4510 are as below:
5. After connected, you can see Switch login request.
6. Login the switch. The default username is “admin”, password, “admin”.
Booting...
Sun Jan 1 00:00:00 UTC 2006
Switch login: admin
Password:
Jetnet4510 (version 2.0-20080109).
Copyright 2006-2008 Korenix Technology Co., Ltd.
Switch>
Page 18
14
3.2 Preparation for Web Interface
JetNet 4510 provides HTTP Web Interface and Secured HTTPS Web Interface for web
management.
3.2.1 Web Interface
Korenix web management page is developed by JAVA. It allows you to use a standard
web-browser such as Microsoft Internet Explorer, or Mozilla, to configure and interrogate
the switch from anywhere on the network.
Before you attempt to use the embedded web interface to manage switch operation,
verify that your JetNet 4510 Series Industrial Ethernet Switch is properly installed on
your network and that every PC on this network can access the switch via the web
browser.
1. Verify that your network interface card (NIC) is operational, and that your operating
system supports TCP/IP protocol.
2. Wire DC power to the switch and connect your switch to your computer.
3. Make sure that the switch default IP address is 192.168.10.1.
4. Change your computer IP address to 192.168.10.2 or other IP address which is
located in the 192.168.10.x (Network Mask: 255.255.255.0) subnet.
5. Switch to DOS command mode and ping 192.168.10.1 to verify a normal response
time.
Launch the web browser and Login.
6. Launch the web browser (Internet Explorer or Mozilla Firefox) on the PC.
7. Type http://192.168.10.1 (or the IP address of the switch). And then press Enter.
8. The login screen will appear next.
9. Key in user name and the password. Default user name and password are both
admin.
Click on Enter or OK. Welcome page of the web-based management interface will then
appear.
Page 19
15
Once you enter the web-based management interface, you can freely change the
JetNet’s IP address to fit your network environment.
Note 1: IE 5.0 or later versions do not allow Java applets to open sockets by default.
Users have to directly modify the browser settings to selectively enable Java applets to
use network ports.
Note 2: The Web UI connection session of JetNet 4510 will be logged out automatically
if you don’t give any input after 30 seconds. After logged out, you should re-login and
key in correct user name and password again.
3.2.2 Secured Web Interface
Korenix web management page also provides secured management HTTPS login. All
the configuration commands will be secured and will be hard for the hackers to sniff the
login password and configuration commands.
Launch the web browser and Login.
1. Launch the web browser (Internet Explorer or Mozilla Firefox) on the PC.
2. Type https://192.168.10.1 (or the IP address of the switch). And then press Enter.
3. The pop-up screen will appear and request you to trust the secured HTTPS
connection distributed by JetNet 4510 first. Press Yes to trust it.
4. The login screen will appear next.
Page 20
16
5. Key in the user name and the password. The default user name and password is
admin.
6. Click on Enter or OK. Welcome page of the web-based management interface will
then appear.
7. Once you enter the web-based management interface, all the commands you see
are the same as what you see by HTTP login.
3.3 Preparation for Telnet Console
3.3.1 Telnet
Korenix JetNet 4510 supports Telnet console. You can connect to the switch by Telnet
and the command lines are the same as what you see by RS232 console port. Below
are the steps to open Telnet connection to the switch.
1. Go to Start -> Run -> cmd. And then press Enter
2. Type the Telnet 192.168.10.1 (or the IP address of the switch). And then press
Enter
3.3.2 SSH (Secure Shell)
Korenix JetNet 4510 also support SSH console. You can remotely connect to the switch
by command line interface. The SSH connection can secure all the configuration
commands you sent to the switch.
SSH is a client/server architecture while JetNet 4510 is the SSH server. When you want
to make SSH connection with the switch, you should download the SSH client tool first.
SSH Client
There are many free, sharewares, trials or charged SSH clients you can find on the
internet. Fox example, PuTTY is a free and popular Telnet/SSH client. We’ll use this
tool to demonstrate how to login JetNet by SSH. Note: PuTTY is copyright 1997-2006 Simon Tatham.
In the Session configuration, enter the Host Name (IP Address of your JetNet 4510)
and Port number (default = 22). Choose the “SSH” protocol. Then click on “Open” to
start the SSH session console.
2. After click on Open, then you can see the cipher information in the pop-up screen.
Press Yes to accept the Security Alert.
Page 22
18
3. After few seconds, the SSH connection to JetNet 4510 is opened. You can see the
login screen as the below figure.
4. Type the Login Name and its Password. The default Login Name and Password are
admin / admin.
5. All the commands you see in SSH are the same as the CLI commands you see via
RS232 console. The next chapter will introduce in detail how to use command line to
configure the switch.
Page 23
19
4 Feature Configuration
This chapter explains how to configure JetNet 4510 software features. There are 4 ways to
access the switch: Serial console, Telnet, Web browser, and SNMP.
JetNet 4510 series Industrial Managed Switch provides both in-band and out-band
configuration methods. You can configure the switch via RS232 console cable if you don’t
attach your admin PC to your network, or if you lose the network connection to your JetNet
4510. This is so-called out-band management. It wouldn’t be affected by the network
performance.
The in-band management means you can remotely manage the switch via the network.
You can choose Telnet or Web-based management. You just need to know the device’s IP
address. Then you can remotely connect to its embedded HTML web pages or Telnet
console.
Korenix web management page is developed by JAVA. It allows you to use a standard
web-browser such as Microsoft Internet Explorer, or Mozilla, to configure and interrogate
the switch from anywhere on the network.
Note: IE 5.0 or later versions do not allow Java applets to open sockets by default. Users
have to directly modify the browser settings to selectively enable Java applets to use
network ports.
Following topics are covered in this chapter:
4.1 Command Line Interface (CLI) Introduction
4.2 Basic Setting
4.3 Port Configuration
4.4 Network Redundancy
4.5 VLAN
4.6 Traffic Prioritization
4.7 Multicast Filtering
4.8 SNMP
4.9 Security
4.10 Warning
4.11 Monitor and Diag
4.12 Device Front Panel
4.13 Save
4.14 Logout
Page 24
20
4.1 Command Line Interface Introduction
The Command Line Interface (CLI) is the user interface to the switch’s embedded software
system. You can view the system information, show the status, configure the switch and
receive a response back from the system by keying in a command.
There are some different command modes. Each command mode has its own access
ability, available command lines and uses different command lines to enter and exit. These
modes are User EXEC, Privileged EXEC, Global Configuration, (Port/VLAN) Interface
Configuration modes.
User EXEC mode: As long as you login the switch by CLI. You are in the User EXEC mode.
You can ping, telnet remote device, and show some basic information.
Type enable to enter next mode, exit to logout. ? to see the command list
Switch>
enable Turn on privileged mode command
exit Exit current mode and down to previous mode
list Print command list
ping Send echo messages
quit Exit current mode and down to previous mode
show Show running system information
telnet Open a telnet connection
traceroute Trace route to destination
Privileged EXEC mode: Press enable in the User EXEC mode, then you can enter the
Privileged EXEC mode. In this mode, the system allows you to view current configuration,
reset default, reload switch, show system information, save configuration…and enter the
global configuration mode.
Type configure terminal to enter next mode, exit to leave. ? to see the command list
Switch#
archive manage archive files
clear Reset functions
clock Configure time-of-day clock
configure Configuration from vty interface
copy Copy from one file to another
debug Debugging functions (see also 'undebug')
disable Turn off privileged mode command
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
list Print command list
more Display the contents of a file
no Negate a command or set its defaults
ping Send echo messages
quit Exit current mode and down to previous mode
reboot Reboot system
reload copy a default-config file to replace the current one
show Show running system information
telnet Open a telnet connection
terminal Set terminal line parameters
traceroute Trace route to destination
write Write running configuration to memory, network, or terminal
Page 25
21
Global Configuration Mode: Press configure terminal in privileged EXEC mode. You
can then enter global configuration mode. In global configuration mode, you can configure
all the features that the system provides you.
Type interface IFNAME/VLAN to enter interface configuration mode, exit to leave. ? to
see the command list.
Available command lists of global configuration mode.
Switch# configure terminal
Switch(config)#
access-list Add an access list entry
administrator Administrator account setting
arp Set a static ARP entry
clock Configure time-of-day clock
default Set a command to its defaults
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
gvrp GARP VLAN Registration Protocol
hostname Set system's network name
interface Select an interface to configure
ip IP information
lacp Link Aggregation Control Protocol
list Print command list
log Logging control
mac Global MAC configuration subcommands
mac-address-table mac address table
mirror Port mirroring
no Negate a command or set its defaults
ntp Configure NTP
password Assign the terminal connection password
qos Quality of Service (QoS)
relay relay output type information
smtp-server SMTP server configuration
snmp-server SNMP server
spanning-tree spanning tree algorithm
super-ring super-ring protocol
trunk Trunk group configuration
vlan Virtual LAN
warning-event Warning event selection
write-config Specify config files to write to
(Port) Interface Configuration: Press interface IFNAME in global configuration mode.
You can then enter interface configuration mode. In this mode, you can configure port
settings.
The port interface name for fast Ethernet port 1 is fa1, fast Ethernet 7 is fa7, Ethernet port
8 is fa8 and Ethernet port 10 is fa10. Type interface name accordingly when you want to
enter certain interface configuration mode.
Type exit to leave.
Type ? to see the command list
Page 26
22
Available command lists of the global configuration mode.
switchport Set switching mode characteristics
Switch(config)# interface fa1
Switch(config-if)#
acceptable Configure 802.1Q acceptable frame types of a port.
auto-negotiation Enable auto-negotiation state of a given port
description Interface specific description
duplex Specify duplex mode of operation for a port
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
flowcontrol Set flow-control value for an interface
garp General Attribute Registration Protocol
ingress 802.1Q ingress filtering features
lacp Link Aggregation Control Protocol
list Print command list
loopback Specify loopback mode of operation for a port
mac MAC interface commands
mdix Enable mdix state of a given port
no Negate a command or set its defaults
qos Quality of Service (QoS)
quit Exit current mode and down to previous mode
rate-limit Rate limit configuration
shutdown Shutdown the selected interface
spanning-tree spanning-tree protocol
speed Specify the speed of a Fast Ethernet port or a Gigabit
Ethernet port.
(VLAN) Interface Configuration: Press interface VLAN VLAN-ID in global configuration
mode. You can then enter VLAN interface configuration mode. In this mode, you can
configure the settings for the specific VLAN.
The VLAN interface name of VLAN 1 is VLAN 1, VLAN 2 is VLAN 2…
Type exit to leave the mode. Type ? to see the available command list.
The command lists of the VLAN interface configuration mode.
Switch(config)# interface vlan 1
Switch(config-if)#
description Interface specific description
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
ip Interface Internet Protocol config commands
list Print command list
no Negate a command or set its defaults
quit Exit current mode and down to previous mode
shutdown Shutdown the selected interface
Page 27
23
Summary of the 5 command modes.
you to view current configuration,
reset default, reload switch, show
In global configuration mode, you
or press
VLAN Interface
Command
Mode
User EXEC This is the first level of access.
Privileged
EXEC
Global
configuration
Main Function Enter and Exit Method Prompt
User can ping, telnet remote
device, and show some basic
information
In this mode, the system allows
system information, save
configuration…and enter global
configuration mode.
can configure all the features that
the system provides you
Enter: Login successfully
Exit: exit to logout.
Next mode: Type enable to
enter privileged EXEC mode.
Enter: Type enable in User
EXEC mode.
Exec: Type disable to exit to
user EXEC mode.
Type exit to logout
Next Mode: Type configure
terminal to enter global
configuration command.
Enter: Type configure
terminal in privileged EXEC
mode
Switch>
Switch#
Switch(config)#
Port
Interface
configuration
Configuration
In this mode, you can configure
port related settings.
In this mode, you can configure
settings for specific VLAN.
Exit: Type exit or end
Ctrl-Z to exit.
Next mode: Type interface
IFNAME/ VLAN VID to enter
interface configuration mode
Enter: Type interface IFNAME
in global configuration mode.
Exit: Type exit or Ctrl+Z to
global configuration mode.
Type end to privileged EXEC
mode.
Enter: Type interface VLAN
VID in global configuration
mode.
Exit: Type exit or Ctrl+Z to
global configuration mode.
Type end to privileged EXEC
Switch(config-if)#
Switch(config-vlan)#
mode.
Page 28
24
Here are some useful commands for you to see these available commands. Save your
arp
Set a static AR
P entry
time in typing and avoid typing error.
? To see all the available commands in this mode. It helps you to see the next command
you can/should type as well.
Switch(config)# interface (?)
IFNAME Interface's name
vlan Select a vlan to configure
(Character)? To see all the available commands starts from this character.
Switch(config)# a?
access-list Add an access list entry
administrator Administrator account setting
Tab This tab key helps you to input the command quicker. If there is only one available
command in the next, clicking on tab key can help to finish typing soon.
Switch# co (tab) (tab)
Switch# configure terminal
Switch(config)# ac (tab)
Switch(config)# access-list
Ctrl+C To stop executing the unfinished command.
Ctrl+S To lock the screen of the terminal. You can’t input any command.
Ctrl+Q To unlock the screen which is locked by Ctrl+S.
Ctrl+Z To exit configuration mode.
Alert message when multiple users want to configure the switch. If the administrator is in
configuration mode, then the Web users can’t change the settings. JetNet 4510 allows only
one administrator to configure the switch at a time.
Page 29
25
4.2 Basic Setting
The Basic Setting group provides you to configure switch information, IP address, User
name/Password of the system. It also allows you to do firmware upgrade, backup and
restore configuration, reload factory default, and reboot the system.
Following commands are included in this group:
4.2.1 Switch Setting
4.2.2 Admin Password
4.2.3 IP Configuration
4.2.4 Time Setting
4.2.5 DHCP Server
4.2.6 Backup and Restore
4.2.7 Firmware Upgrade
4.2.8 Factory Default
4.2.9 System Reboot
4.2.10 CLI Commands for Basic Setting
4.2.1 Switch Setting
You can assign System name, Location, Contact and view system information.
Figure 4.2.1.1 – Web UI of the Switch Setting
System Name: You can assign a name to the device. The available characters you can
input is 64. After you configure the name, CLI system will select the first 12 characters as
the name in CLI system.
System Location: You can specify the switch’s physical location here. The available
characters you can input is 64.
System Contact: You can specify contact people here. You can type the name, mail
Page 30
26
address or other information of the administrator. The available characters you can input is
64.
System OID: The SNMP object ID of the switch. You can follow the path to find its private
MIB in MIB browser. (Note: When you attempt to view private MIB, you should compile
private MIB files into your MIB browser first.)
System Description: JetNet 4510 Industrial Management Ethernet Switch is the name of
this product.
Firmware Version: Display the firmware version installed in this device.
MAC Address: Display unique hardware address (MAC address) assigned by the
manufacturer.
Once you finish the configuration, click on Apply to apply your settings.
Note: Always remember to select Save to save your settings. Otherwise, the settings you
made will be lost when the switch is powered off.
4.2.2 Admin Password
You can change the user name and the password here to enhance security
Figure 4.2.2.1 Web UI of the Admin Password
User name: You can key in new user name here. The default setting is admin.
Password: You can key in new password here. The default setting is admin.
Confirm Password: You need to type the new password again to confirm it.
Once you finish configuring the settings, click on Apply to apply your configuration.
Figure 4.2.2.2 Pop-up alert window for Incorrect Username.
Page 31
27
4.2.3 IP Configuration
This function allows users to configure the switch’s IP address settings.
DHCP Client: You can select to Enable or Disable DHCP Client function. When DHCP
Client function is enabled, an IP address will be assigned to the switch from the network’s
DHCP server. In this mode, the default IP address will therefore be replaced by the one
assigned by DHCP server. If DHCP Client is disabled, then the IP address that you
specified will be used instead.
IP Address: You can assign the IP address reserved by your network for your JetNet. If
DHCP Client function is enabled, you don’t need to assign an IP address to the JetNet, as
it will be overwritten by DHCP server and shown here. The default IP is 192.168.10.1.
Subnet Mask: You can assign the subnet mask for the IP address here. If DHCP Client
function is enabled, you don’t need to assign the subnet mask. The default Subnet Mask is
255.255.255.0. Note: In the CLI, we use the enabled bit of the subnet mask to represent
the number displayed in web UI. For example, 8 stands for 255.0.0.0; 16 stands for
255.255.0.0; 24 stands for 255.255.255.0.
Default Gateway: You can assign the gateway for the switch here. The default gateway is
192.168.10.254. Note: In CLI, we use 0.0.0.0/0 to represent for the default gateway.
Once you finish configuring the settings, click on Apply to apply your configuration.
4.2.4 Time Setting
Time Setting source allow user to set the time manually or through NTP server Network
Time Protocol (NTP) is used to synchronize computer clocks on the internet. You can
configure NTP settings here to synchronize the clocks of several switches on the network.
JetNet 4510 also provides Daylight Saving function.
Page 32
28
Manual Setting: User can select Manual setting to change time as user want. User also
can click the button “Get Time from PC” to get PC’s time setting for switch.
NTP client: Select the Time Setting Source to NTP client can let device enable the NTP
client service. NTP client will be automatically enabled If you change Time source to NTP
Client. The system will send request packet to acquire current time from the NTP server
you assigned.
Time-zone: Select the time zone where the switch is located. Following table lists the time
zones for different locations for your reference. The default time zone is GMP Greenwich
Mean Time.
Switch(config)# clock timezone
01 (GMT-12:00) Eniwetok, Kwajalein
02 (GMT-11:00) Midway Island, Samoa
03 (GMT-10:00) Hawaii
04 (GMT-09:00) Alaska
05 (GMT-08:00) Pacific Time (US & Canada) , Tijuana
06 (GMT-07:00) Arizona
07 (GMT-07:00) Mountain Time (US & Canada)
08 (GMT-06:00) Central America
09 (GMT-06:00) Central Time (US & Canada)
10 (GMT-06:00) Mexico City
Page 33
29
11 (GMT-06:00) Saskatchewan
12 (GMT-05:00) Bogota, Lima, Quito
13 (GMT-05:00) Eastern Time (US & Canada)
14 (GMT-05:00) Indiana (East)
15 (GMT-04:00) Atlantic Time (Canada)
16 (GMT-04:00) Caracas, La Paz
17 (GMT-04:00) Santiago
18 (GMT-03:00) NewFoundland
19 (GMT-03:00) Brasilia
20 (GMT-03:00) Buenos Aires, Georgetown
21 (GMT-03:00) Greenland
22 (GMT-02:00) Mid-Atlantic
23 (GMT-01:00) Azores
24 (GMT-01:00) Cape Verde Is.
25 (GMT) Casablanca, Monrovia
26 (GMT) Greenwich Mean Time: Dublin, Edinburgh, Lisbon, London
27 (GMT+01:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
28 (GMT+01:00) Belgrade, Bratislava, Budapest, Ljubljana, Prague
29 (GMT+01:00) Brussels, Copenhagen, Madrid, Paris
30 (GMT+01:00) Sarajevo, Skopje, Sofija, Vilnius, Warsaw, Zagreb
31 (GMT+01:00) West Central Africa
32 (GMT+02:00) Athens, Istanbul, Minsk
33 (GMT+02:00) Bucharest
34 (GMT+02:00) Cairo
35 (GMT+02:00) Harare, Pretoria
36 (GMT+02:00) Helsinki, Riga, Tallinn
37 (GMT+02:00) Jerusalem
38 (GMT+03:00) Baghdad
39 (GMT+03:00) Kuwait, Riyadh
40 (GMT+03:00) Moscow, St. Petersburg, Volgograd
41 (GMT+03:00) Nairobi
42 (GMT+03:30) Tehran
43 (GMT+04:00) Abu Dhabi, Muscat
44 (GMT+04:00) Baku, Tbilisi, Yerevan
45 (GMT+04:30) Kabul
46 (GMT+05:00) Ekaterinburg
47 (GMT+05:00) Islamabad, Karachi, Tashkent
48 (GMT+05:30) Calcutta, Chennai, Mumbai, New Delhi
49 (GMT+05:45) Kathmandu
50 (GMT+06:00) Almaty, Novosibirsk
51 (GMT+06:00) Astana, Dhaka
52 (GMT+06:00) Sri Jayawardenepura
53 (GMT+06:30) Rangoon
54 (GMT+07:00) Bangkok, Hanoi, Jakarta
55 (GMT+07:00) Krasnoyarsk
56 (GMT+08:00) Beijing, Chongqing, Hong Kong, Urumqi
57 (GMT+08:00) Irkutsk, Ulaan Bataar
58 (GMT+08:00) Kuala Lumpur, Singapore
59 (GMT+08:00) Perth
60 (GMT+08:00) Taipei
61 (GMT+09:00) Osaka, Sapporo, Tokyo
62 (GMT+09:00) Seoul
63 (GMT+09:00) Yakutsk
64 (GMT+09:30) Adelaide
65 (GMT+09:30) Darwin
66 (GMT+10:00) Brisbane
67 (GMT+10:00) Canberra, Melbourne, Sydney
68 (GMT+10:00) Guam, Port Moresby
Daylight Saving Time: Set when Enable Daylight Saving Time start and end, During the
Daylight Saving Time, the device’s time is one hour earlier than the actual time.
Once you finish your configuration, click on Apply to apply your configuration.
4.2.5 DHCP Server
You can select to Enable or Disable DHCP Server function. JetNet 4510 will assign a new
IP address to link partners.
DHCP Server configuration
After selecting to enable DHCP Server function, type in the Network IP address for the
DHCP server IP pool, Subnet Mask, Default Gateway address and Lease Time for client.
Once you have finished the configuration, click Apply to apply your configuration
Excluded Address:
You can type a specific address into the IP Address field for the DHCP server reserved IP
address.
The IP address that is listed in the Excluded Address List Table will not be assigned to
the network device. Add or remove an IP address from the Excluded Address List by
clicking Add or Remove.
Page 35
31
Manual Binding: JetNet 4510 provides a MAC address and IP address binding and
removing function. You can type in the specified IP and MAC address then click Add to
add a new MAC&IP address binding rule for a specified link partner, like PLC or any device
without DHCP client function. To remove from the binding list, just select the rule to
remove and click Remove.
DHCP Leased Entries: JetNet 4510 provides an assigned IP address list for user check. It
will show the MAC and IP address that was assigned by JetNet 4510. Click the Reload
button to refresh the listing.
Page 36
32
4.2.6 Backup and Restore
With Backup command, you can save current configuration file saved in the switch’s flash
to admin PC or TFTP server. This will allow you to go to Restore command later to restore
the configuration file back to the switch. Before you restore the configuration file, you must
place the backup configuration file in the PC or TFTP server. The switch will then
download this file back to the flash.
There are 2 modes for users to backup/restore the configuration file, Local File mode and
TFTP Server mode.
Local File mode: In this mode, the switch acts as the file server. Users can browse the
target folder and then type the file name to backup the configuration. Users can also
browse the target folder and select existed configuration file to restore the configuration
back to the switch. This mode is only provided by Web UI while CLI is not supported.
TFTP Server mode: In this mode, the switch acts as TFTP client. Before you do so, make
sure that your TFTP server is ready. Then please type the IP address of TFTP Server and
Backup configuration file name. This mode can be used in both CLI and Web UI.
TFTP Server IP Address: You need to key in the IP address of your TFTP Server here.
Backup/Restore File Name: Please type the correct file name of the configuration file.
Configuration File: The configuration file of the switch is a pure text file. You can open it
by word/txt read file. You can also modify the file, add/remove the configuration settings,
and then restore back to the switch.
Startup Configuration File: After you saved the running-config to flash, the new settings
will be kept and work after power cycle. You can use show startup-config to view it in CLI.
The Backup command can only backup such configuration file to your PC or TFTP server.
Technical Tip:
Default Configuration File: The switch provides the default configuration file in the
system. You can use Reset button, Reload command to reset the system.
Running Configuration File: The switch’s CLI allows you to view the latest settings
running by the system. The information shown here is the settings you set up but
haven’t saved to flash. The settings not yet saved to flash will not work after power
recycle. You can use show running-config to view it in CLI.
Figure 4.2.5.2 Bacup/Restore Configuration - Local File mode.
Click on Folder icon to select the target file you want to backup/restore.
Note that the folders of the path to the target file do not allow you to input space key.
Figure 4.2.5.3 Backup/Restore Configuration - TFTP Server mode
Type the IP address of TFTP Server IP. Then click on Backup/Restore.
Note: point to the wrong file will cause all the configuration missed
4.2.7 Firmware Upgrade
In this section, you can update the latest firmware for your switch. Korenix provides the
latest firmware in Korenix Web site. The new firmware may include new features, bug fixes
or other software changes. We’ll also provide the release notes for the update as well. For
Page 38
34
technical viewpoint, we suggest you use the latest firmware before installing the switch to
the customer site.
Note that the system will be automatically rebooted after you finished upgrading
new firmware. Please remind the attached users before you do this.
Figure 4.2.5.1 Main UI of Firmware Upgrade
There are 2 modes for users to backup/restore the configuration file, Local File mode and
TFTP Server mode.
Local File mode: In this mode, the switch acts as the file server. Users can browse the
target folder and then type the file name to backup the configuration. Users also can
browse the target folder and select the existed configuration file to restore the
configuration back to the switch. This mode is only provided by Web UI while CLI is not
supported.
TFTP Server mode: In this mode, the switch acts as the TFTP client. Before you do so,
make sure that your TFTP server is ready. And then please type the IP address of TFTP
Server IP address. This mode can be used in both CLI and Web UI.
TFTP Server IP Address: You need to key in the IP address of your TFTP Server here.
Firmware File Name: The file name of the new firmware.
The UI also shows you the current firmware version and built date. Please check the
version number after the switch is rebooted.
Figure 4.2.6.2 Firmware Upgrade - Local File mode.
Page 39
35
Click on Folder icon to select the target firmware file you want toupgrade.
Figure 4.2.6.3 Firmware Upgrade – TFTP Server mode.
Type the IP address of TFTP Server and Firmware File Name. Then click on Upgrade to
start the process.
After finishing transmitting the firmware, the system will copy the firmware file and replace
the firmware in the flash. The CLI show …… until the process is finished.
4.2.8 Factory Default
In this section, you can reset all the configurations of the switch to default setting. Click on
Reset the system will then reset all configurations to default setting. The system will show
you pop-up message window after finishing this command. Default setting will work after
rebooting the switch.
Figure 4.2.7.1 The main screen of the Reset to Default
Page 40
36
Figure 4.2.7.2 Pop-up alert screen to confirm the command. Click on Yes to start it.
Figure 4.2.7.2 Pop-up message screen to show you that have done the command. Click
on OK to close the screen. Then please go to Reboot page to reboot the switch.
Click on OK. The system will then auto reboot the device.
Note: If you already configured the IP of your device to other IP address, when you use this
command by CLI and Web UI, our software will not reset the IP address to default IP. The
system will remain the IP address so that you can still connect the switch via the network.
4.2.9 System Reboot
System Reboot allows you to reboot the device. Some of the feature changes require you
to reboot the system. Click on Reboot to reboot your device.
Note: Remember to click on Save button to save your settings. Otherwise, the settings
you made will be gone when the switch is powered off.
Figure 4.2.8.1 Main screen for Rebooting
Page 41
37
Figure 4.2.8.2 Pop-up alert screen to request confirmation. Click on Yes. Then the switch
will be rebooted immediately.
Figure 4.2.8.3 Pop-up message screen appears when rebooting the switch..
4.2.10 CLI Commands for Basic Setting
Feature Command Line
Switch Setting
System Name
System Location
Switch(config)# hostname
WORD Network name of this system
Switch(config)# hostname JN4510
Switch(config)#
Switch(config)# snmp-server location Taipei
Page 42
38
System Contact
Display
Admin Password
User Name and
Password
Display
IP Configuration
IP Address/Mask
(192.168.10.8,
255.255.255.0
Gateway Switch(config)# ip route 0.0.0.0/0 192.168.10.254/24
Remove Gateway Switch(config)# no ip route 0.0.0.0/0 192.168.10.254/24
Show Startup
Configuration
Show Running
Configuration
Firmware Upgrade
Firmware Upgrade
Factory Default
Factory Default
System Reboot
Reboot
Switch(config)# clock timezone 26
Sun Jan 1 04:13:24 2006 (GMT) Greenwich Mean Time:
Dublin, Edinburgh, Lisbon, London
Note: By typing clock timezone ?, you can see the timezone
list. Then choose the number of the timezone you want to
select.
Switch# sh ntp associations
Network time protocol
Status : Disabled
Primary peer : N/A
Secondary peer : N/A
Switch# show clock
Sun Jan 1 04:14:19 2006 (GMT) Greenwich Mean Time:
Dublin, Edinburgh, Lisbon, London
Switch# show clock timezone
clock timezone (26) (GMT) Greenwich Mean Time: Dublin,
Edinburgh, Lisbon, London
Note 1: To backup the latest startup configuration file, you
should save current settings to flash first. You can refer to 4.12
to see how to save settings to the flash.
Note 2: 192.168.10.33 is the TFTP server’s IP and default.conf
is name of the configuration file. Your environment may use
different IP addresses or different file name. Please type target
TFTP server IP or file name in this command.
Port Configuration group enables you to enable/disable port state, or configure port
auto-negotiation, speed, duplex, flow control, rate limit control and port aggregation
settings. It also allows you to view port status and aggregation information.
Following commands are included in this group:
4.3.1 Port Control
4.3.2 Port Status
4.3.3 Rate Control
4.3.4 Port Trunking
4.3.5 Command Lines for Port Configuration
4.3.1 Port Control
Port Control commands allow you to enable/disable port state, or configure the port
auto-negotiation, speed, duplex and flow control.
Select the port you want to configure and make changes to the port.
In State column, you can enable or disable the state of this port. Once you disable the port
stop to link to the other end and stop to forward any traffic. The default setting is Enable
which means all the ports are workable when you receive the device.
In Speed/Duplex column, you can configure port speed and duplex mode of this port.
Below are the selections you can choose:
Fast Ethernet Port 1~7 (fa1~fa7): AutoNegotiation, 10M Full Duplex(10 Full), 10M Half
Duplex(10 Half), 100M Full Duplex(100 Full) and 100M Half Duplex(100 Half).
Combo Port 8~10: (fa8~fa10) : AutoNegotiation, 10M Full Duplex(10 Full), 10M Half
Page 45
41
Duplex(10 Half), 100M Full Duplex(100 Full), 100M Half Duplex(100 Half).
The default mode is Auto Negotiation mode.
In Flow Control column, “Symmetric” means that you need to activate the flow control
function of the remote network device in order to let the flow control of that corresponding
port on the switch to work. “Disable” means that you don’t need to activate the flow control
function of the remote network device, as the flow control of that corresponding port on the
switch will work anyway.
Once you finish configuring the settings, click on Apply to save the configuration.
Technical Tips: If both ends are not at the same speed, they can’t link with each other. If
both ends are not in the same duplex mode, they will be connected by Half mode.
4.3.2 Port Status
Port Status shows you current port status.
The description of the columns is as below:
Port: Port interface number.
Type: 100Base-TX -> Fast Ethernet port.
Link: Link status. Up -> Link UP. Down -> Link Down.
State: Enable -> State is enabled. Disable -> The port is disable/shutdown.
Speed/Duplex: Current working status of the port.
Flow Control: The state of the flow control.
SFP Vendor: Vendor name of the SFP transceiver you plugged.
Wavelength: The wave length of the SFP transceiver you plugged.
Distance: The distance of the SFP transceiver you plugged.
Page 46
42
Note: Most of the SFP transceivers provide vendor information which allows your switch to
read it. Korenix can display vendor name, wave length and distance of all Korenix SFP
transceiver family. If you see Unknown info, it may mean that the vendor doesn’t provide
their information or that the information of their transceiver can’t be read.
4.3.3 Rate Control
Rate limiting is a form of flow control used to enforce a strict bandwidth limit at a port. You
can program separate transmit (Egress Rule) and receive (Ingress Rule) rate limits at each
port, and even apply the limit to certain packet types as described below.
Packet type: You can select the packet type that you want to filter. The packet types of the
Ingress Rule listed here include Broadcast Only / Broadcast and multicast / Broadcast, Multicast and UnknownUnicast or All. The packet types of the Egress Rule (outgoing)
only support All packet types.
Rate: This column allows you to manually assign the limit rate of the port. Valid values are
from 1Mbps-100Mbps for fast Ethernet ports. The step of the rate is 1Mbps. Default value
of Ingress Rule is “8” Mbps; default value of Egress Rule is 0 Mbps. 0 stands for disabling
the rate control for the port.
Click on Apply to apply the configuration.
4.3.4 Port Trunking
Port Trunking configuration allows you to group multiple Ethernet ports in parallel to
increase link bandwidth. The aggregated ports can be viewed as one physical port so that
the bandwidth is higher than merely one single Ethernet port. The member ports of the
same trunk group can balance the loading and backup for each other. Port Trunking
feature is usually used when you need higher bandwidth for backbone network. This is an
inexpensive way for you to transfer more data.
Page 47
43
There are some different descriptions for the port trunking. Different manufacturers may
use different descriptions for their products, like Link Aggregation Group (LAG), Link
Aggregation Control Protocol, Ethernet Trunk, EtherChannel…etc. Most of the
implementations now conform to IEEE standard, 802.3ad.
The aggregated ports can interconnect to the other switch which also supports Port
Trunking. Korenix Supports 2 types of port trunking. One is Static Trunk, the other is
802.3ad. When the other end uses 802.3ad LACP, you should assign 802.3ad LACP to
the trunk. When the other end uses non-802.3ad, you can then use Static Trunk.
There are 2 configuration pages, Aggregation Setting and Aggregation Status.
Aggregation Setting
Trunk Size: The switch can support up to 5 trunk groups. Each trunk group can support up
to 8 member ports. Since the member ports should use same speed/duplex, max groups
for 100M ports would be 10.
Group ID: Group ID is the ID for the port trunking group. Ports with same group ID are in
the same group.
Page 48
44
Type: Static and 802.3ad LACP. Each Trunk Group can only support Static or 802.3ad
LACP. Choose the type you need here.
Aggregation Status
This page shows the status of port aggregation. Once the aggregation ports are negotiated
well, you will see following status.
Group ID: Display Trunk 1 to Trunk 5 set up in Aggregation Setting.
Type: Static or LACP set up in Aggregation Setting.
Aggregated: When LACP links well, you can see the member ports in Aggregated
column.
Individual: When LACP is enabled, member ports of LACP group which are not
connected to correct LACP member ports will be displayed in the Individual column.
Link Down: When LACP is enabled, member ports of LACP group which are not linked up
will be displayed in the Link Down column.
4.3.5 Command Lines for Port Configuration
Feature Command Line
Port Control
Port Control – State
Port Control – Auto
Negotiation
Switch(config-if)# shutdown -> Disable port state
Port1 Link Change to DOWN
interface fastethernet1 is shutdown now.
Switch(config-if)# no shutdown -> Enable port state
Port1 Link Change to DOWN
Port1 Link Change to UP
interface fastethernet1 is up now.
Switch(config-if)# Port1 Link Change to UP
Switch(config-if)# speed 100
Port1 Link Change to DOWN
set the speed mode ok!
Switch(config-if)# Port1 Link Change to UP
Switch(config-if)# duplex full
Port1 Link Change to DOWN
set the duplex mode ok!
Switch(config-if)# Port1 Link Change to UP
Switch(config-if)# flowcontrol on
Flowcontrol on for port 1 set ok!
Switch(config-if)# flowcontrol off
Flowcontrol off for port 1 set ok!
Switch# show interface fa1
Interface fastethernet1
Administrative Status : Enable
Operating Status : Connected
Duplex : Full
Speed : 100
Flow Control :off
Default Port VLAN ID: 1
Ingress Filtering : Disabled
Acceptable Frame Type : All
Port Security : Disabled
Auto Negotiation : Disable
Loopback Mode : None
STP Status: forwarding
Default CoS Value for untagged packets is 0.
Mdix mode is Disable.
Medium mode is Copper.
Note: Administrative Status -> Port state of the port. Operating
status -> Current status of the port. Duplex -> Duplex mode of
the port. Speed -> Speed mode of the port. Flow control ->
Flow Control status of the port.
Note: To enable rate control, you should select the Ingress or
Egress rule first; then assign the packet type and bandwidth.
Switch(config-if)# rate-limit ingress mode
all Limit all frames
broadcast Limit Broadcast frames
flooded-unicast Limit Broadcast, Multicast and flooded unicast frames
multicast Limit Broadcast and Multicast frames
Switch(config-if)# rate-limit ingress mode broadcast
Set the ingress limit mode broadcast ok.
Page 50
46
Rate Control -
Bandwidth
Port Trunking
LACP
Static Trunk
Display - LACP
Display - Trunk
Switch(config-if)# rate-limit ingress bandwidth
<0-100> Limit in magabits per second (0 is no limit)
Switch(config-if)# rate-limit ingress bandwidth 8
Set the ingress rate limit 8Mbps for Port 1.
Switch(config)# lacp group 1 fa8-10
Group 1 based on LACP(802.3ad) is enabled!
Note: The interface list is fa1,fa3-5,fa8-10
Note: different speed port can’t be aggregated together.
Switch(config)# trunk group 2 fa6-7
Trunk group 2 enable ok!
Switch# show lacp internal
LACP group 1 internal information:
LACP Port Admin Oper Port
Port Priority Key Key State
It is critical for industrial applications that network remains non-stop. JetNet 4510 v2.1
supports standard RSTP, Multiple Super Ring, Rapid Dual Homing and Legacy Super Ring
Client modes.
Multiple Super Ring (MSR) technology is Korenix’s 3rd generation Ring redundancy
technology. This is patented and protected by Korenix and is used in countries all over the
world. MSR ranks the fastest restore and failover time in the world, 0 ms for restore and
about 5 milliseconds for failover for copper.
Advanced Rapid Dual Homing (RDH) technology also facilitates JetNet 4510 to connect
with a core managed switch easily and conveniently. With RDH technology, you can also
couple several Rapid Super Rings or RSTP cloud together, which is also known as Auto
Ring Coupling.
To become backwards compatible with the Legacy Super Ring technology implemented in
JetNet 4000/4500 switches, JetNet 4510 also supports Super Ring Client mode. The
Super Ring ports can pass through Super Ring control packets extremely well and works
with Super Ring.
Besides Korenix ring technology, JetNet 4510 also supports 802.1D-2004 version Rapid
Spanning Tree Protocol (RSTP). New version of RSTP standard includes 802.1D-1998
STP, 802.1w RSTP.
Following commands are included in this group:
4.4.1 RSTP
4.4.2 RSTP Info
4.4.3 Multiple Super Ring
4.4.4 Ring Info
4.4.5 Command Lines for Network Redundancy
4.4.1 RSTP
RSTP is the abbreviation of Rapid Spanning Tree Protocol. If a switch has more than one
path to a destination, it will lead to message loops that can generate broadcast storms and
quickly bog down a network. The spanning tree was created to combat the negative effects
of message loops in switched networks. A spanning tree uses a spanning tree algorithm
(STA) to automatically sense whether a switch has more than one way to communicate
with a node. It will then select the best path (primary), and block the other path(s). It will
also keep track of the blocked path(s) in case the primary path fails. Spanning Tree
Protocol (STP) introduced a standard method to accomplish this. It is specified in IEEE
802.1D-1998. Later, Rapid Spanning Tree Protocol (RSTP) was adopted and represents
the evolution of STP, providing much faster spanning tree convergence after a topology
change. This is specified in IEEE 802.1w. In 2004, 802.1w is included into 802.1D-2004
version. This switch supports both RSTP and STP (all switches that support RSTP are also
backward compatible with switches that support only STP).
This page allows you to enable/disable RSTP, configure the global setting and port
settings.
Page 52
48
RSTP Mode: You must first enable STP/RSTP mode, before configuring any related
parameters. Parameter settings required for both STP and RSTP are the same. Note that
802.1d refers to STP mode, while 802.1w refers to faster RSTP mode.
Bridge Configuration
Priority (0-61440): RSTP uses bridge ID to determine the root bridge, the bridge with the
highest bridge ID becomes the root bridge. The bridge ID is composed of bridge priority
and bridge MAC address. So that the bridge with the highest priority becomes the highest
bridge ID. If all the bridge ID has the same priority, the bridge with the lowest MAC address
will then become the root bridge.
Note: The bridge priority value must be in multiples of 4096. A device with a lower number
has a higher bridge priority. Ex: 4096 is higher than 32768.
Max Age (6-40): Enter a value from 6 to 40 seconds here. This value represents the time
that a bridge will wait without receiving Spanning Tree Protocol configuration messages
before attempting to reconfigure.
If JetNet is not the root bridge, and if it has not received a hello message from the root
bridge in an amount of time equal to Max Age, then JetNet will reconfigure itself as a root
bridge. Once two or more devices on the network are recognized as a root bridge, the
devices will renegotiate to set up a new spanning tree topology.
Hello Time (1-10): Enter a value from 1 to 10 seconds here. This is a periodic timer that
drives the switch to send out BPDU (Bridge Protocol Data Unit) packet to check current
STP status.
The root bridge of the spanning tree topology periodically sends out a “hello” message to
Page 53
49
other devices on the network to check if the topology is “healthy”. The “hello time” is the
amount of time the root has waited during sending hello messages.
Forward Delay Time (4-30): Enter a value between 4 and 30 seconds. This value is the
time that a port waits before changing from Spanning Tree Protocol learning and listening
states to forwarding state.
This is the amount of time JetNet will wait before checking to see if it should be changed to
a different state.
Once you have completed your configuration, click on Apply to apply your settings.
Note: You must observe the following rule to configure Hello Time, Forwarding Delay, and
Max Age parameters.
2 × (Forward Delay Time – 1 sec) ≥ Max Age Time ≥ 2 × (Hello Time value + 1 sec)
Port Configuration
Select the port you want to configure and you will be able to view current settings and
status of the port.
Path Cost: Enter a number between 1 and 200,000,000. This value represents the “cost”
of the path to the other bridge from the transmitting bridge at the specified port.
Priority: Enter a value between 0 and 240, using multiples of 16. This is the value that
decides which port should be blocked by priority in a LAN.
Admin P2P: Some of the rapid state transitions that are possible within RSTP depend
upon whether the port of concern can only be connected to another bridge (i.e. it is served
by a point-to-point LAN segment), or if it can be connected to two or more bridges (i.e. it is
served by a shared-medium LAN segment). This function allows P2P status of the link to
be manipulated administratively. “Auto” means to auto select P2P or Share mode. “P2P”
means P2P is enabled, while “Share” means P2P is disabled.
Admin Edge: A port directly connected to the end stations cannot create a bridging loop in
the network. To configure this port as an edge port, set the port to the Enable state. When
the non-bridge device connects an admin edge port, this port will be in blocking state and
turn to forwarding state in 4 seconds.
Once you finish your configuration, click on Apply to save your settings.
Page 54
50
4.4.2 RSTP Info
This page allows you to see the information of the root switch and port status.
Root Information: You can see root Bridge ID, Root Priority, Root Port, Root Path Cost
and the Max Age, Hello Time and Forward Delay of BPDU sent from the root switch.
Port Information: You can see port Role, Port State, Path Cost, Port Priority, Oper P2P
mode, Oper edge port mode and Aggregated(ID/Type).
4.4.3 Multiple Super Ring (MSR)
The most common industrial network redundancy is to form a ring or loop. Typically, the
managed switches are connected in series and the last switch is connected back to the
first one. In such connection, you can implement Korenix Super Ring and Rapid Super and
Multiple Super Ring Ring technology.
Super Ring is Korenix 1st generation ring redundancy technology released with JetNet
4000 and 4500 series managed switches. Rapid Super Ring is Korenix 2nd generation
Ring redundancy technology released with old version of JetNet 5010G/4510.
Multiple Super Ring is Korenix 3rd generation Ring redundancy technology. This is Korenix
pattern and protected in countries all over the world. The Multiple Super Ring has
enhanced Ring Master selection and faster recovery time. It is also enhanced for more
complex ring application.
This page allows you to enable the settings for Rapid Super Ring and Dual Homing II.
New Ring: To create a Rapid Super Ring. Just fill in the Ring ID which has a range from 0
to 31. If the name field is left blank, the name of this ring will automatically named with
RingID.
Page 55
51
Ring Configuration
ID: Once a Ring is created, This appears and can not be changed.
Name: This field will show the name of the Ring. If it is not filled in when creating, it will be
automatically named by the rule “RingID”.
Version: The version of Ring can be changed here. There are three modes to choose:
Rapid Super Ring as default; Super ring for compatible with Korenix 1st general ring and
Any Ring for compatible with other version of rings.
Device Priority: The switch with highest priority (highest value) will be automatically
selected as Ring Master. Then one of the ring ports in this switch will become forwarding
port and the other one will become blocking port. If all of the switches have the same
priority, the switch with the biggest MAC address will be selected as Ring Master.
Ring Port1: In Rapid Super Ring environment, you should have 2 Ring Ports. No matter
this switch is Ring Master or not, when configuring RSR, 2 ports should be selected to be
Ring Ports. For Ring Master,one of the ring ports will become the forwarding port and the
other one will become the blocking port.
Path Cost: Change the Path Cost of Ring Port1. If this switch is the Ring Master of a Ring,
then it determines the blocking port. The Port with higher Path Cost in the two ring Port will
become the blocking port, If the Path Cost is the same, the port with larger port number will
become the blocking port.
Ring Port2: Assign another port for ring connection
Path Cost: Change the Path Cost of Ring Port2
Rapid Dual Homing: Rapid Dual Homing is an important feature of Korenix 3rd generation
Ring redundancy technology. When you want to connect multiple RSR or form redundant
topology with other vendors,RDH could allow you to have maximum 7 multiple links for
Page 56
52
redundancy without any problem.
In Dual Homing I released with JetNet 4000/4500 series, you have to configure
additional port as Dual Homing port to two uplink switches. In Rapid Dual Homing, you
don’t need to configure specific port to connect to other protocol. The Rapid Dual Homing
will smartly choose the fastest link for primary link and block all the other link to avoid loop.
If the primary link failed, Rapid Dual Homing will automatically forward the secondary link
for network redundant. Of course, if there are more connections, they will be standby links
and recover one of then if both primary and secondary links are broken.
Ring status: To enable/disable the Ring. Please remember to enable the ring after you
add it.
4.4.4 Ring Info
This page shows you RSR information.
ID: Ring ID.
Version: which version of this ring, this field could be Rapid Super Ring, Super Ring or
AnyRing.
Role: This Switch is RM or nonRM
Status: If this field is Normal which means the redundancy is approved. If any one of the
link in this Ring is broken, then the status will be Abnormal.
RM MAC: The MAC address of Ring Master of this Ring. It helps to find the redundant
path.
Blocking Port: This field shows which port of RM.is blocked.
Role Transition Count: This means how many times this switch has changed its Role
from nonRM to RM or from RM to nonRM.
Page 57
53
Role state Transition Count: This number means how many times the Ring status has
Switch
Switch
Warning: STP disable will cause Dual Homing
Switch
SpanningTree Mode change to be RST(802.1w) .
Switch
SpanningTree Mode change to be STP(802.1d) .
Switch
<0
Switch
Switch
<6
Switch
Switch
<1
Switch
Switch
<4
Switch
Switch
<1
from 1
Switch
Switch
<0
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Rapid Spanning
Spanning
Root Address 0012.7701.0386 Priority 4096
Root Path Cost : 200000 Root Port : 7
Root Times : max
Bridge Address
Bridge Times : max
Aging time : 300
Port Role Port
State Cost Prio.Nbr
been transformed between Normal and Abnormal state.
(config-multiple-super-ring)# rapid-dual-homing port
ce name, ex: fastethernet1 or fa8
-detect up link auto detection
IFNAME Interface name, ex: fastethernet1 or fa8
(config-multiple-super-ring)# rapid-dual-homing port
fa3,fa5-6
Rapid Dual Homing port success.
-detect is recommended for dual Homing..
# show multiple -ring-plus [Ring ID]
s : Abnormal
-Homing II : Disabled
display the information of the target Ring.
typed, this command will only
Page 60
56
4.5 VLAN
A Virtual LAN (VLAN) is a “logical” grouping of nodes for the purpose of limiting a
broadcast domain to specific members of a group without physically grouping the
members together. That means, VLAN allows you to isolate network traffic so that only
members of VLAN could receive traffic from the same VLAN members. Basically, creating
a VLAN from a switch is the logical equivalent of physically reconnecting a group of
network devices to another Layer 2 switch, without actually disconnecting these devices
from their original switches.
JetNet 4510 Series Industrial Ethernet Switch supports 802.1Q VLAN. 802.1Q VLAN is
also known as Tag-Based VLAN. This Tag-Based VLAN allows VLAN to be created
across different switches (see Figure 1). IEEE 802.1Q tag-based VLAN makes use of
VLAN control information stored in a VLAN header attached to IEEE 802.3 packet frames.
This tag contains a VLAN Identifier (VID) that indicates which VLAN a frame belongs to.
Since each switch only has to check a frame’s tag, without the need to dissect the contents
of the frame, this also saves a lot of computing resources within the switch.
Figure 4.5.1 802.1Q VLAN
VLAN Configuration group enables you to Add/Remove VLAN, configure port
Ingress/Egress parameters and view VLAN table.
Following commands are included in this group:
4.5.1 VLAN Port Configuration
4.5.2 VLAN Configuration
4.5.3 GVRP Configuration
4.5.4 VLAN Table
4.5.5 CLI Commands of the VLAN
4.5.1 VLAN Port Configuration
VLAN Port Configuration allows you to set up VLAN port parameters to specific port.
These parameters include PVID, Accept Frame Type and Ingress Filtering.
Page 61
57
Figure 4.5.2 Web UI of VLAN configuration.
PVID: The abbreviation of the Port VLAN ID. Enter port VLAN ID here. PVID allows the
switches to identify which port belongs to which VLAN. To keep things simple, it is
recommended that PVID is equivalent to VLAN IDs.
The values of PVIDs are from 0 to 4095. But, 0 and 4095 are reserved. You can’t input
these 2 PVIDs. 1 is the default value. 2 to 4094 are valid and available in this column. Type
the PVID you’d like to configure here.
Accept Frame Type: This column defines the accepted frame type of the port. There are 2
modes you can select, Admit All and Tag Only. Admit All mode means that the port can
accept both tagged and untagged packets. Tag Only mode means that the port can only
accept tagged packets.
Ingress Filtering: Ingress filtering helps VLAN engine to filter out undesired traffic on a
port. When Ingress Filtering is enabled, the port checks whether the incoming frames
belong to the VLAN they claimed or not. Then the port determines if the frames can be
processed or not. For example, if a tagged frame from Engineer VLAN is received, and
Ingress Filtering is enabled, the switch will determine if the port is on the Engineer VLAN’s
Egress list. If it is, the frame can be processed. If it’s not, the frame would be dropped.
4.5.2 VLAN Configuration
In this page, you can assign Management VLAN, create the static VLAN, and assign the
Egress rule for the member ports of the VLAN.
Figure 4.5.2.1 Web UI of the VLAN Configuration.
Page 62
58
Management VLAN ID: The switch supports management VLAN. The management
VLAN ID is the VLAN ID of the CPU interface so that only member ports of the
management VLAN can ping and access the switch. The default management VLAN ID is
1.
Static VLAN: You can assign a VLAN ID and VLAN Name for new VLAN here.
VLAN ID is used by the switch to identify different VLANs. Valid VLAN ID is between 1 and
4094. 1 is the default VLAN.
VLAN Name is a reference for network administrator to identify different VLANs. The
available character is 12 for you to input. If you don’t input VLAN name, the system will
automatically assign VLAN name for the VLAN. The rule is VLAN (VLAN ID).
Figure 4.5.2.2 The steps to create a new VLAN: Type
VLAN ID and NAME, and press Add to create a new
VLAN. Then you can see the new VLAN in the Static
VLAN Configuration table. Refer to Figure 4.5.2.3
After created the VLAN, the status of the VLAN will
remain in Unused until you add ports to the VLAN.
Note: Before you change the management VLAN ID by Web and Telnet, remember that
the port attached by the administrator should be the member port of the management
VLAN; otherwise the administrator can’t access the switch via the network.
Note: Currently JetNet 4510 only support max 64 group VLAN.
Page 63
59
Static VLAN Configuration
You can see the created VLANs and specify the egress (outgoing) port rule to be
Untagged or Tagged here.
Figure 4.5.2.3 Static VLAN Configuration table. You can see that new VLAN 3 is created.
VLAN name is test. Egress rules of the ports are not configured now.
Figure 4.5.2.4 Configure Egress rule of the ports.
--: Not available
U: Untag: Indicates that egress/outgoing frames are not VLAN tagged.
T: Tag: Indicates that egress/outgoing frames are to be VLAN tagged.
Steps to configure Egress rules: Select the VLAN ID. Entry of the selected VLAN turns to
light blue. Assign Egress rule of the ports to U or T. Press Apply to apply the setting. If you
want to remove one VLAN, select the VLAN entry. Then press Remove button.
4.5.3 GVRP configuration
GVRP allows users to setup VLANs automatically rather than manual configuration on
every port of every switch in the network.
Page 64
60
GVRP Protocol: Allow user to enable/disable GVRP globally.
State: After enable GVRP globally, Here still can enable/disable GVRP by port.
Join Timer: Controls the interval of sending the GVRP Join BPDU. An instance of this
timer is required on a per-Port, per-GARP Participant basis
Leave Timer: Control the time to release the GVRP reservation after received the GVRP
Leave BPDU. An instance of the timer is required for each state machine that is in the LV
state
Leave All Timer: Controls the period to initiate the garbage collection of registered VLAN.
The timer is required on a per-Port, per-GARP Participant basis
4.5.4 VLAN Table
This table shows you current settings of your VLAN table, including VLAN ID, Name,
Status, and Egress rule of the ports.
Page 65
61
VLAN ID: ID of the VLAN.
Name: Name of the VLAN.
Status: Static shows this is a manually configured static VLAN. Unused means this VLAN
is created by UI/CLI and has no member ports. This VLAN is not workable yet. Dynamic
means this VLAN is learnt by GVRP.
After created the VLAN, the status of this VLAN will remain in Unused status until you add
ports to the VLAN.
4.5.5 CLI Commands of the VLAN
Command Lines of the VLAN port configuration, VLAN configuration and VLAN table
display
Feature Command Line
VLAN Port Configuration
VLAN Port PVID Switch(config-if)# switchport trunk native vlan 2
Set port default vlan id to 2 success
Port Accept Frame
Type
disable Disable GVRP feature globally on the switch
enable Enable GVRP feature globally on the switch
Switch(config)# gvrp mode enable
Gvrp is enabled on the switch!
Configure GVRP timer
Join timer /Leave timer/
LeaveAll timer
Switch(config)# inter fa1
Switch(config-if)# garp timer
<10-10000>
Switch(config-if)# garp timer 20 60 1000
Note: The unit of these timer is centisecond
Management VLAN
Management VLAN Switch(config)# int vlan 1 (Go to management VLAN)
Switch(config-if)# no shutdown
Display Switch# show running-config
….
!
interface vlan1
ip address 192.168.10.17/24
ip igmp
no shutdown
!
….
Page 68
64
4.6 Traffic Prioritization
Quality of Service (QoS) provides traffic prioritization mechanism which allows users to
deliver better service to certain flows. QoS can also help to alleviate congestion problems
and ensure high-priority traffic is delivered first. This section allows you to configure Traffic
Prioritization settings for each port with regard to setting priorities.
JetNet QOS supports 4 physical queues, weighted fair queuing (WRR) and Strict Priority
scheme, which follows 802.1p COS tag and IPv4 TOS/DiffServ information to prioritize the
traffic of your industrial network.
Following commands are included in this group:
4.6.1 QoS Setting
4.6.2 CoS-Queue Mapping
4.6.3 DSCP-Queue Mapping
4.6.4 CLI Commands of the Traffic Prioritization
4.6.1 QoS Setting
Queue Scheduling
You can select the Queue Scheduling rule as follows:
Use an 8,4,2,1 weighted fair queuing scheme. This is also known as WRR (Weight
Round Robin). JetNet will follow 8:4:2:1 rate to process the packets in a queue from the
highest priority to the lowest. For example, the system will process 8 packets with the
highest priority in the queue, 4 with middle priority, 2 with low priority, and 1 with the lowest
priority at the same time.
Use a strict priority scheme. Packets with higher priority in the queue will always be
processed first, except that there is no packet with higher priority.
Page 69
65
Port Setting
CoS column is to indicate default port priority value for untagged or priority-tagged frames.
When JetNet receives the frames, JetNet will attach the value to the CoS field of the
incoming VLAN-tagged packets. You can enable 0,1,2,3,4,5,6 or 7 to the port.
Trust Mode is to indicate Queue Mapping types for you to select.
COS Only: Port priority will only follow COS-Queue Mapping you have assigned.
DSCP Only: Port priority will only follow DSCP-Queue Mapping you have assigned.
COS first: Port priority will follow COS-Queue Mapping first, and then DSCP-Queue Mapping rule.
DSCP first: Port priority will follow DSCP-Queue Mapping first, and then COS-Queue
Mapping rule.
Default priority type is COS Only. The system will provide default COS-Queue table to
which you can refer for the next command.
After configuration, press Apply to enable the settings.
4.6.2 CoS-Queue Mapping
This page is to change CoS values to Physical Queue mapping table. Since the switch
fabric of JetNet only supports 4 physical queues, Lowest, Low, Middle and High. Users
should therefore assign how to map CoS value to the level of the physical queue.
In JetNet, users can freely assign the mapping table or follow the suggestion of the 802.1p
standard. Korenix uses 802.p suggestion as default values. You can find CoS values 1 and
2 are mapped to physical Queue 0, the lowest queue. CoS values 0 and 3 are mapped to
physical Queue 1, the low/normal physical queue. CoS values 4 and 5 are mapped to
physical Queue 2, the middle physical queue. CoS values 6 and 7 are mapped to physical
Queue 3, the high physical queue.
After configuration, press Apply to enable the settings.
Page 70
66
4.6.3 DSCP-Queue Mapping
This page is to change DSCP values to Physical Queue mapping table. Since the switch
fabric of JetNet only supports 4 physical queues, Lowest, Low, Middle and High. Users
should therefore assign how to map DSCP value to the level of the physical queue. In
JetNet, users can freely change the mapping table to follow the upper layer 3 switch or
routers’ DSCP setting.
After configuration, press Apply to enable the settings.
4.6.4 CLI Commands of the Traffic Prioritization
Command Lines of the Traffic Prioritization configuration
Feature Command Line
QoS Setting
Queue Scheduling –
Strict Priority
Queue Scheduling WRR
Port Setting – CoS
(Default Port Priority)
Switch(config)# interface fa1
Switch(config-if)# qos cos
DEFAULT-COS Assign an priority (7 highest)
Switch(config-if)# qos cos 7
The default port CoS value is set 7 ok.
Page 71
67
Note: When change the port setting, you should Select the
specific port first. Ex: fa1 means fast Ethernet port 1.
Port Setting – Trust
Mode- CoS Only
Switch(config)# interface fa1
Switch(config-if)# qos trust cos
The port trust is set CoS only ok.
Port Setting – Trust
Mode- CoS Frist
Switch(config)# interface fa1
Switch(config-if)# qos trust cos-first
The port trust is set CoS first ok.
Port Setting – Trust
Mode- DSCP Only
Switch(config)# interface fa1
Switch(config-if)# qos trust dscp
The port trust is set DSCP only ok.
Port Setting – Trust
Mode- DSCP First
Switch(config)# interface fa1
Switch(config-if)# qos trust dscp-first
The port trust is set DSCP first ok.
Display – Queue
Scheduling
Switch# show qos queue-sched
QoS queue scheduling scheme : Weighted Round Robin (Use
an 8,4,2,1 weight)
Display – Port Setting Trust Mode
Switch# show qos trust
QoS Port Trust Mode :
Port Trust Mode
-----+----------- 1 DSCP first
2 COS only
3 COS only
4 COS only
5 COS only
6 COS only
7 COS only
8 COS only
9 COS only
10 COS only
Display – Port Setting –
CoS (Port Default
Priority)
Switch(config)# qos cos-map 1 0
The CoS to queue mapping is set ok.
Switch(config)# qos cos-map 2 0
The CoS to queue mapping is set ok.
Switch(config)# qos cos-map 3 1
The CoS to queue mapping is set ok.
Switch(config)# qos cos-map 4 2
The CoS to queue mapping is set ok.
Switch(config)# qos cos-map 5 2
The CoS to queue mapping is set ok.
Switch(config)# qos cos-map 6 3
The CoS to queue mapping is set ok.
Switch(config)# qos cos-map 7 3
The CoS to queue mapping is set ok.
Switch# sh qos cos-map
CoS to Queue Mapping :
CoS Queue
---- + ----- 0 1
1 0
2 0
3 1
4 2
5 2
6 3
7 3
Switch(config)# qos dscp-map
PRIORITY Assign an priority (63 highest)
Switch(config)# qos dscp-map 0
QUEUE Assign an queue (0-3)
Format: qos dscp-map priority_value queue_value
The TOS/DSCP to queue mapping is set ok.
Display – DSCO-Queue
mapping
Switch# show qos dscp-map
DSCP to Queue Mapping : (dscp = d1 d2)
For multicast filtering, JetNet 4510 uses IGMP Snooping technology. IGMP (Internet
Group Management Protocol) is an Internet Protocol that provides a way for internet
device to report its multicast group membership to adjacent routers. Multicasting allows
one computer on the internet to send data to a multitude of other computers that have
identified themselves as being interested in receiving the originating computers data.
Multicasting is useful for such applications as updating the address books of mobile
computer users in the field, sending out newsletters to a distribution list, and broadcasting
streaming media to an audience that has tuned into the event by setting up multicast group
membership.
In effect, IGMP Snooping manages multicast traffic by making use of switches, routers,
and hosts that support IGMP. Enabling IGMP Snooping allows the ports to detect IGMP
queries, report packets, and manage multicast traffic through the switch. IGMP has three
fundamental types of messages, as shown below:
Description
A message sent from the querier (an IGMP router or a switch) which
asks for a response from each host that belongs to the multicast group.
A message sent by a host to the querier to indicate that the host wants
to be or is a member of a given group indicated in the report message.
A message sent by a host to the querier to indicate that the host has
quit as a member of a specific multicast group.
You can enable IGMP Snooping and IGMP Query functions here. You will see the
information of the IGMP Snooping function in this section, including different multicast
groups’ VID and member ports, and IP multicast addresses that range from 224.0.0.0 to
239.255.255.255.
In this section, Force filtering can determined whether the switch flooding unknown
multicast or not.
Following commands are included in this group:
4.7.1 IGMP Snooping
4.7.2 IGMP Query
4.7.3 Force Filtering
4.7.4 CLI Commands of the Multicast Filtering
4.7.1 IGMP Snooping
This page is to enable IGMP Snooping feature, assign IGMP Snooping for specific VLAN,
and view IGMP Snooping table from dynamic learnt or static manual key-in. JetNet 4510
support IGMP snooping V1/V2/V3 automatically and IGMP query V1/V2.
IGMP Snooping, JetNet4510 support IGMP snooping V1/V2/V3 automatically. You can
select Enable or Disable here. After enabling IGMP Snooping, you can then enable IGMP
Snooping for specific VLAN. You can enable IGMP Snooping for some VLANs so that
some of the VLANs will support IGMP Snooping and others won’t.
To assign IGMP Snooping to VLAN, please select the checkbox of VLAN ID or select Select All checkbox for all VLANs. Then press Enable. In the same way, you can also
Page 74
70
Disable IGMP Snooping for certain VLANs.
IGMP Snooping Table: In the table, you can see multicast group IP address, VLAN ID it
belongs to, and member ports of the multicast group. JetNet 4510 supports 256 multicast
groups. Click on Reload to refresh the table.
Page 75
71
4.7.2 IGMP Query
This page allows users to configure IGMP Query feature. Since JetNet 4510 can only be
configured by member ports of the management VLAN, IGMP Query can only be enabled
on the management VLAN. If you want to run IGMP Snooping feature in several VLANs,
you should notice that whether each VLAN has its own IGMP Querier first.
The IGMP querier periodically sends query packets to all end-stations on the LANs or
VLANs that are connected to it. For networks with more than one IGMP querier, a switch
with the lowest IP address becomes the IGMP querier.
In IGMP Query selection, you can select V1, V2 or Disable. V1 means IGMP V1 General
Query and V2 means IGMP V2 General Query.. The query will be forwarded to all
multicast groups in the VLAN. Disable allows you to disable IGMP Query.
Query Interval(s): The period of query sent by querier.
Query Maximum Response Time: The span querier detect to confirm there are no more
directly connected group members on a LAN.
Once you finish configuring the settings, click on Apply to apply your configuration.
4.7.3 Force Filtering
The Force filtering function allows the switch to filter the unknown-multicast data flow. If
Force filtering is enabled, all the unknown multicast data will be discarded.
4.7.4 CLI Commands of the Multicast Filtering
Command Lines of the multicast filtering configuration
Page 76
72
Feature Command Line
IGMP Snooping
IGMP Snooping Global
IGMP Snooping - VLAN Switch(config)# ip igmp snooping vlan
Disable IGMP Snooping
- Global
Disable IGMP Snooping
- VLAN
Display – IGMP
Snooping Setting
Display – IGMP Table Switch# sh ip igmp snooping multicast all
IGMP Query
IGMP Query V1 Switch(config)# int vlan 1 (Go to management VLAN)
IGMP Query V2 Switch(config)# int vlan 1 (Go to management VLAN)
IGMP Query version Switch(config-if)# ip igmp version 1
Disable Switch(config)# int vlan 1
Display Switch# sh ip igmp
Switch(config)# ip igmp snooping
IGMP snooping is enabled globally. Please specify on which
vlans IGMP snooping enables
VLANLIST allowed vlan list
all all existed vlan
Switch(config)# ip igmp snooping vlan 1-2
IGMP snooping is enabled on VLAN 1-2.
Switch(config)# no ip igmp snoopin
IGMP snooping is disabled globally ok.
Switch(config)# no ip igmp snooping vlan 3
IGMP snooping is disabled on VLAN 3.
Switch# sh ip igmp
interface vlan1
ip igmp is enabled
ip igmp version 1
Switch# sh ip igmp snooping
IGMP snooping is globally enabled
Vlan1 is IGMP snooping enabled
Vlan2 is IGMP snooping enabled
Vlan3 is IGMP snooping disabled
Simple Network Management Protocol (SNMP) is a
protocol used for exchanging management
information between network devices. SNMP is a
member of the TCP/IP protocol suite. JetNet 4510
series support SNMP v1, v2c.and V3
An SNMP managed network consists of two main
components: agents and a manager. An agent is a
management software module that resides in a
managed switch. An agent translates the local
management information from the managed device
into a SNMP compatible format. The manager is the
console through the network.
Following commands are included in this group:
4.8.1 SNMP Configuration
4.8.2 SNMPv3 Profile
4.8.3 SNMP Traps
4.8.4 SNMP CLI Commands for SNMP
4.8.1 SNMP Configuration
This page allows users to configure SNMP V1/V2c Community. The community string can
be viewed as the password because SNMP V1/V2c doesn’t request you to enter password
before you try to access SNMP agent.
The community includes 2 privileges, Read Only and Read and Write.
With Read Only privilege, you only have the ability to read the values of MIB tables.
Default community string is Public.
With Read and Write privilege, you have the ability to read and set the values of MIB
tables. Default community string is Private.
JetNet 4510 allows users to assign 4 community strings. Type the community string and
select the privilege. Then press Apply.
Note: When you first install the device in your network, we highly recommend you to
change the community string. Since most SNMP management application uses Public and
Private as their default community name, this might be the leakage of the network security.
Page 79
75
4.8.2 SNMPv3 Profile
SNMP v3 can provide more security functions when the user performs remote
management through SNMP protocol. It delivers SNMP information to the administrator
with user authentication; all of data between JetNet 4510 and the administrator are
encrypted to ensure secure communication.
Security Level: Here the user can select the following levels of security: None, User
Authentication, and Authentication with privacy.
Authentication Protocol: Here the user can select either MD5 (Message-Digest algorithm
5) or SHA (Secure Hash Algorithm). MD5 is a widely used cryptographic hash function with
a 128-bit hash value. SHA (Secure Hash Algorithm) hash functions refer to five Federal
Information Processing Standard-approved algorithms for computing a condensed digital
representation. JetNet 4510 provides 2 user authentication protocols in MD5 and SHA.
You will need to configure SNMP v3 parameters for your SNMP tool with the same
Page 80
76
authentication method.
Authentication Password: Here the user enters the SNMP v3 user authentication
password.
DES Encryption Password: Here the user enters the password for SNMP v3 user DES
Encryption.
4.8.3 SNMP Traps
SNMP Trap is the notification feature defined by SNMP protocol. All the SNMP
management applications can understand such trap information. So you don’t need to
install new application to read the notification information.
This page allows users to Enable SNMP Trap, configure the SNMP Trap server IP, Community name, and trap Version V1 or V2. After configuration, you can see the
change of the SNMP pre-defined standard traps and Korenix pre-defined traps. The
pre-defined traps can be found in Korenix private MIB.
4.8.4 CLI Commands of the SNMP
Command Lines of the SNMP configuration
Feature Command Line
SNMP Community
Read Only Community Switch(config)# snmp-server community public ro
Page 81
77
community string add ok
Read Write Community Switch(config)# snmp-server community private rw
SNMP Trap Server IP
without specific
community name
SNMP Trap Server IP
with version 1 and
community
SNMP Trap Server IP
with version 2 and
community
Disable SNMP Trap Switch(config)# no snmp-server enable trap
Display Switch# sh snmp-server trap
Switch(config)# snmp-server host 192.168.10.33
SNMP trap host add OK.
Switch(config)# snmp-server host 192.168.10.33 version 1
private
SNMP trap host add OK.
Note: private is the community name, version 1 is the
SNMP version
Switch(config)# snmp-server host 192.168.10.33 version 2
private
SNMP trap host add OK.
Set SNMP trap disable ok.
SNMP trap: Enabled
SNMP trap community: public
Switch# show running-config
.......
snmp-server community public ro
snmp-server community private rw
snmp-server enable trap
snmp-server host 192.168.10.33 version 2 admin
snmp-server host 192.168.10.33 version 1 admin
……..
Page 82
78
4.9 Security
JetNet 4510 provides several security features for you to secure your connection. The
features include Port Security and IP Security.
Following commands are included in this group:
4.9.1 Port Security
4.9.2 IP Security
4.9.3 IEEE 802.1x
4.9.4 CLI Commands of the Security
4.9.1 Port Security
Port Security feature allows you to stop the MAC address learning for specific port. After
stopping MAC learning, only the MAC address listed in Port Security List can access the
switch and transmit/receive traffic. This is a simple way to secure your network
environment and not to be accessed by hackers.
This page allows you to enable Port Security and configure Port Security entry.
Port Security State: Change Port Security State of the port to Enable first.
Add Port Security Entry: Select the port, and type VID and MAC address. Format of the
MAC address is xxxx.xxxx.xxxx. Ex: 0012.7701.0101. Max volume of one port is 10. So
the system can accept 100 Port Security MAC addresses in total.
Port Security List: This table shows you those enabled port security entries. You can
click on Remove to delete the entry.
Once you finish configuring the settings, click on Apply / Add to apply your configuration.
Page 83
79
4.9.2 IP Security
In IP Security section, you can set up specific IP addresses to grant authorization for
management access to this JetNet via a web browser or Telnet.
IP Security: Select Enable and Apply to enable IP security function.
Add Security IP: You can assign specific IP addresses, and then press Add. Only these
IP addresses can access and manage JetNet via a web browser or Telnet. Max security IP
is 10.
Security IP List: This table shows you added security IP addresses. You can press
Remove to delete, Reload to reload the table.
Once you finish configuring the settings, click on Apply to apply your configuration.
4.9.3 IEEE 802.1x
4.9.3.1 IEEE 802.1x configuration.
Page 84
80
IEEE 802.1X is the protocol that performing authentication to obtain access to IEEE 802
LANs. It is port-base network access control. With the function, JetNet 4510 could control
which connection is available or not.
System Auth Control: To enable or disable the 802.1x authentication.
Authentication Method: Radius is a authentication server that provide key for
authentication, with this method, user must connect switch to server. If user select Local
for the authentication method, switch use the local user data base which can be create in
this page for authentication.
Radius Server IP: The IP address of Radius server
Shared Key: The password for communicate between switch and Radius Server.
Server Port: UDP port of Radius server.
Accounting Port: Port for packets that contain the information of account login or logout.
Secondary Radius Server IP: Secondary Radius Server could be set in case of the
primary radius server down.
802.1X Local User: Here User can add Account/Password for local authentication.
802.1X Local user List: This is a list shows the account information, User also can
remove selected account Here.
Page 85
81
4.9.3.2 802.1x Port Configuration
Port control: Force Authenorized means this port is Authenorized, the data is free to
in/out. Force unauthenorized just opposite, the port is blocked. If users want to control this
port with Radius Server, please select Auto for port control.
Reauthentication: If enable this field, switch will ask client to re-authenticate. The default
time interval is 3600 seconds.
Max Request: the maximum times that the switch allow client request.
Guest VLAN: 0 to 4094 is available for this field. If this field is set to 0, that means the port
is blocked after authentication fail. Otherwise, the port will be set to Guest VLAN.
Host Mode: if there are more than one device connected to this port, set the Host Mode to
single means only the first PC authenticate success can access this port. If this port is set
to multi, all the device can access this port once any one of them pass the authentication.
Control Direction: determined devices can end data out only or both send and receive.
Re-Auth Period: control the Re-authentication time interval, 1~65535 is available.
Quiet Period: When authentication failed, Switch will wait for a period and try to
communicate with radius server again.
Tx period: the time interval of authentication request.
Supplicant Timeout: the timeout for the client authenticating
Sever Timeout: The timeout for server response for authenticating.
Page 86
82
Once you finish configuring the settings, click on Apply to apply your configuration.
Click Initialize Selected to set the authorize state of selected port to initialize status.
Click Reauthenticate Selected to send EAP Request to supplicant to request
reauthentication.
Click Default Selected to reset the configurable 802.1x parameters of selected port to the
default values.
802.1X Port Status
Here user can observe the port status for Port control status, Authorize Status,
Authorized Supplicant and Oper Control Direction each port.
4.9.4 CLI Commands of the Security
Command Lines of the Security configuration
Feature Command Line
Port Security
Add MAC Switch(config)# mac-address-table static 0012.7701.0101
vlan 1 interface fa1
mac-address-table unicast static set ok!
Port Security Switch(config)# interface fa1
Switch(config-if)# switchport port-security
Disables new MAC addresses learning and aging activities!
Note: Rule: Add the static MAC, VLAN and Port binding first,
Page 87
83
then enable the port security to stop new MAC learning.
Disable Port Security Switch(config-if)# no switchport port-security
Enable new MAC addresses learning and aging activities!
RADIUS Server Port number NOT given. (default=1812)
RADIUS Accounting Port number NOT given. (default=1813)
RADIUS Server IP : 192.168.10.120
RADIUS Server Key : 1234
RADIUS Server Port : 1812
RADIUS Accounting Port : 1813
Switch(config)#
RADIUS Server Port number NOT given. (default=1812)
RADIUS Accounting Port number NOT given. (default=1813)
RADIUS Server IP : 192.168.10.120
RADIUS Server Key : 1234
RADIUS Server Port : 1812
RADIUS Accounting Port : 1813
Switch(config)#
radius
secondary-server-ip
Switch(config)# dot1x radius secondary-server-ip
192.168.10.250 key 5678
Port number NOT given. (default=1812)
RADIUS Accounting Port number NOT given. (default=1813)
Secondary RADIUS Server IP : 192.168.10.250
Page 88
84
User name/password
for authentication
Secondary RADIUS Server Key : 5678
Secondary RADIUS Server Port : 1812
Secondary RADIUS Accounting Port : 1813
Switch(config)# dot1x username korenix passwd korenix vlan
1
Page 89
85
4.10 Warning
JetNet 4510 provides several types of Warning features for you to remote monitor the
status of end devices or the change of your network. The features include Fault Relay,
System Log and SMTP E-mail Alert.
Following commands are included in this group:
4.10.1 Fault Relay
4.10.2 Event Selection
4.10.3 Syslog Configuration
4.10.4 SMTP Configuration
4.10.5 CLI Commands
4.10.1 Fault Relay
JetNet 4510 provides 2 digital outputs, also known as Relay Output. The relay contacts are
energized (open) for normal operation and will close under fault conditions. Fault
conditions include DI State change, Periodical On/Off, Power Failure, Ethernet port Link
Failure, Ping Failure and Super Ring Topology Change. You can configure these settings
in this Fault Relay Setting. Each Relay can be assigned 1 fault condition.
Relay 1: Click on checkbox of the Relay 1, then select the Event Type and its parameters.
Relay 2: Click on checkbox of the Relay 2, then select the Event Type and its parameters.
Event Type: DI State, Dry Output, Power Failure, Link Failure, Ping Failure and Super
Ring Failure. Each event type has its own parameters. You should also configure them.
Currently, each Relay can has one event type.
Event Type: DI State
DI Number: Select DI 1 or DI 2. Select which DI you want to monitor.
DI State: High or Low. Select the power voltage you want to monitor.
Page 90
86
How to configure: Select the DI Number you want to monitor and DI State, High or Low.
For example: When DI 1 and High are selected, it means when DI 1 is pulled high, the
system will short Relay Output and light DO LED.
Event Type: Dry Output
On Period (Sec): Type the period time to turn on Relay Output. Available range of a
period is 0-4294967295 seconds.
Off Period (Sec): Type the period time to turn off Relay Output. Available range of a
period is 0-4294967295 seconds.
How to configure: Type turn-on period and turn-off period when the time is reached, the
system will turn on or off the Relay Output. If you connect DO to DI of the other terminal
unit, the setting can help you to change DI state. If you connect DO to the power set of
other terminal units, this setting can help you to turn on or off the unit.
How to turn On/Off the other device: Type “1” into the “On period” field and “0” into “Off
Period” field and apply the setting, then it t will be trigger to form as a close circuit.
To turn off the relay, just type “0” into the “On period” field and “1” into “Off Period” field and
apply the setting, the relay will be trigger to form as a open circuit.
This function is also available in CLI, SNMP management interface. See the following
setting.
Event Type: Power Failure
Page 91
87
Power ID: Select Power 1 or Power 2 you want to monitor. When the power is shut down
or broken, the system will short Relay Out and light the DO LED.
Event Type: Like FailureLink: Select the port ID you want to monitor.
How to configure: Select the checkbox of the Ethernet ports you want to monitor. You can
select one or multiple ports. When the selected ports are linked down or broken, the
system will short Relay Output and light the DO LED.
Event Type: Ping Failure
IP Address: IP address of the target device you want to ping.
Reset Time (Sec): Waiting time to short the relay output.
Hold Time (Sec): Waiting time to re-open the relay output.
How to configure: After selecting Ping Failure event type, the system will turn Relay Output
to short state and continuously ping the target device. When the ping failure occurred, the
switch will turn the Relay Output to open state for a period of Reset Time.
After the Reset Time timeout, the system will turn the Relay Output to close state. After the
Hold Time timer is timeout, the switch system will start ping the target device.
Ex: Reset Time is 5 sec, Hold Time is 50 sec.
Page 92
88
If the ping failure occurred, the switch system will turn Relay output to open state to
emulate power switch off for 5 sec periods. After Reset Time timeout, the Switch system
will start ping target device after 50 sec periods. The period time is for target device system
booting. During the period, the switch system will not ping target device until Hold Time is
timeout.
Event Type: Super Ring Failure
Select Super Ring Failure. When the Rapid Super Ring topology is changed, the system
will short Relay Out and lengthen DO LED.
Once you finish configuring the settings, click on Apply to apply your configuration.
4.10.2 Event Selection
Event Types can be divided into two basic groups: System Events and Port Events.
System Events are related to the overall function of the switch, whereas Port Events
related to the activity of specific ports
System Event Warning Event is sent when…..
Device Cold Start Power is cut off and then reconnected.
Device Warm Start Reboot the device by CLI or Web UI.
Power 1 Failure Power 1 is failure.
Power 2 Failure Power 2 is failure.
Authentication failure An incorrect password, SNMP Community String is
entered.
Time Synchronize
Failure
Fault Relay The DO/Fault Relay is on.
Super Ring Topology
Changes
Accessing to NTP Server is failure.
Master of Super Ring has changed or backup path is
activated.
Port Event Warning Event is sent when…..
Link-Up The port is connected to another device
Link-Down The port is disconnected (e.g. the cable is pulled out,
or the opposing devices turns down)
Page 93
89
Once you finish configuring the settings, click on Apply to apply your configuration.
4.10.3 SysLog Configuration
System Log is useful to provide system administrator locally or remotely monitor switch
events history. There are 2 System Log modes provided by JetNet 4510, local mode and
remote mode.
Local Mode: In this mode, JetNet 4510 will print the occurred events selected in the Event
Selection page to System Log table of JetNet 4510. You can monitor the system logs in
[Monitor and Diag] / [Event Log] page.
Remote Mode: The remote mode is also known as Server mode in JetNet 4500 series. In
this mode, you should assign the IP address of the System Log server. JetNet 4510 will
send the occurred events selected in Event Selection page to System Log server you
assigned.
Both: Above 2 modes can be enabled at the same time.
Page 94
90
Once you finish configuring the settings, click on Apply to apply your configuration.
Note: When enabling Local or Both mode, you can monitor the system logs in [Monitor
and Diag] / [Event Log] page.
4.10.4 SMTP Configuration
JetNet 4510 supports E-mail Warning feature. The switch will send the occurred events to
remote E-mail server. The receiver can then receive notification by E-mail. The E-mail
warning is conformed to SMTP standard.
This page allows you to enable E-mail Alert, assign the SMTP Server IP, Sender E-mail,
Receiver E-mail. If SMTP server requests you to authorize first, you can also set up the
username and password in this page.
Page 95
91
Field Description
SMTP Server IP Address Enter the IP address of the email Server
Authentication Click on check box to enable password
User Name Enter email Account name (Max.40 characters)
Password Enter the password of the email account
Confirm Password Re-type the password of the email account
You can set up to 4 email addresses to receive email alarm from JetNet
Rcpt E-mail Address 1 The first email address to receive email alert from
JetNet (Max. 40 characters)
Rcpt E-mail Address 2 The second email address to receive email alert from
JetNet (Max. 40 characters)
Rcpt E-mail Address 3 The third email address to receive email alert from
JetNet (Max. 40 characters)
Rcpt E-mail Address 4 The fourth email address to receive email alert from
JetNet (Max. 40 characters)
Once you finish configuring the settings, click on Apply to apply your configuration.
4.10.5 CLI Commands
Command Lines of the Warning configuration
Feature Command Line
Relay Output
Relay Output Switch(config)# relay 1
di DI state
dry dry output
ping ping failure
port port link failure
power power failure
ring super ring failure
Note: Select Relay 1 or 2 first, then select the event types.
DI State Switch(config)# relay 1 di
<1-2> DI number
Switch(config)# relay 1 di 1
high high is abnormal
low low is abnormal
Switch(config)# relay 1 di 1 high
Dry Output Switch(config)# relay 1 dry
<0-4294967295> turn on period in second
Switch(config)# relay 1 dry 5
<0-4294967295> turn off period in second
Switch(config)# relay 1 dry 5 5
<cr>
reset reset a device
Switch(config)# relay 1 ping 192.168.10.33 reset
<1-65535> reset time
Switch(config)# relay 1 ping 192.168.10.33 reset 60
<0-65535> hold time to retry
Switch(config)# relay 1 ping 192.168.10.33 reset 60 60
Port Link Failure Switch(config)# relay 1 port
PORTLIST port list
Switch(config)# relay 1 port fa1-5
Power Failure Switch(config)# relay 1 power
<1-2> power id
Switch(config)# relay 1 power 1
Switch(config)# relay 1 power 2
Super Ring Failure Switch(config)# relay 1 ring
Disable Relay Switch(config)# no relay
<1-2> relay id
Switch(config)# no relay 1 (Relay_ID: 1 or 2)
<cr>
Display Switch# show relay 1
Relay Output Type : Port Link
Port : 1, 2, 3, 4,
Switch# show relay 2
Relay Output Type : Super Ring
Event Selection
Event Selection Switch(config)# warning-event
coldstart Switch cold start event
warmstart Switch warm start event
linkdown Switch link down event
linkup Switch link up event
all Switch all event
authentication Authentication failure event
fault-relay Switch fault relay event
power Switch power failure event
super-ring Switch super ring topology change event
JetNet 4510 provides several types of features for you to monitor the status of the switch
or diagnostic for you to check the problem when encountering problems related to the
switch. The features include MAC Address Table, Port Statistics, Port Mirror, Event Log
and Ping.
Following commands are included in this group:
4.11.1 MAC Address Table
4.11.2 Port Statistics
4.11.3 Port Mirror
4.11.4 Event Log
4.11.5 Ping
4.11.6 CLI Commands of the Monitor and Diag
4.11.1 MAC Address Table
JetNet 4510 provides 8K entries in MAC Address Table. In this page, users can change
the Aging time, add Static Unicast MAC Address, monitor the MAC address or sort them
by different packet types and ports. Click on Apply to change the value.
Aging Time (Sec)
Each switch fabric has limit size to write the learnt MAC address. To save more entries for
new MAC address, the switch fabric will age out non-used MAC address entry per Aging
Time timeout. The default Aging Time is 300 seconds. The Aging Time can be modified in
this page.
Static Unicast MAC Address
In some applications, users may need to type in the static Unicast MAC address to its MAC
address table. In this page, you can type MAC Address (format: xxxx.xxxx.xxxx), select its
VID and Port ID, and then click on Add to add it to MAC Address table.
MAC Address Table
In this MAC Address Table, you can see all the MAC Addresses learnt by the switch fabric.
The packet types include Management Unicast, Static Unicast, Dynamic Unicast, Static
Multicast and Dynamic Multicast. The table allows users to sort the address by the packet
types and port.
Packet Types:Management Unicast means MAC address of the switch. It belongs to
CPU port only. Static Unicast MAC address can be added and deleted. Dynamic Unicast
MAC is MAC address learnt by the switch Fabric. Static Multicast can be added by CLI
and can be deleted by Web and CLI. Dynamic Multicast will appear after you enabled
IGMP and the switch learnt IGMP report.
Click on Remove to remove the static Unicast/Multicast MAC address. Click on Reload to
refresh the table. New learnt Unicast/Multicast MAC address will be updated to MAC
address table.
Page 99
95
4.11.2 Port Statistics
In this page, you can view operation statistics for each port. The statistics that can be
viewed include Link Type, Link State, Rx Good, Rx Bad, Rx Abort, Tx Good, Tx Bad and
Collision. Rx means the received packet while Tx means the transmitted packets.
Note: If you see many Bad, Abort or Collision counts increased, that may mean your
network cable is not connected well, the network performance of the port is poor…etc.
Please check your network cable, Network Interface Card of the connected device, the
network application, or reallocate the network traffic…etc.
Click on Clear Selected to reinitialize the counts of the selected ports, and Clear All to
reinitialize the counts of all ports. Click on Reload to refresh the counts.
Page 100
96
4.11.3 Port Mirroring
Port mirroring (also called port spanning) is a tool that allows you to mirror the traffic from
one or more ports onto another port, without disrupting the flow of traffic on the original port.
Any traffic that goes into or out of the Source Port(s) will be duplicated at the Destination
Port. This traffic can then be analyzed at the Destination port using a monitoring device or
application. A network administrator will typically utilize this tool for diagnostics, debugging,
or fending off attacks.
Port Mirror Mode: Select Enable/Disable to enable/disable Port Mirror.
Source Port: This is also known as Monitor Port. These are the ports you want to monitor.
The traffic of all source/monitor ports will be copied to destination/analysis ports. You can
choose a single port, or any combination of ports, but you can only monitor them in Rx or
TX only. Click on checkbox of the Port ID, RX, Tx or Both to select the source ports.
Destination Port: This is also known as Analysis Port. You can analyze the traffic of all
the monitored ports at this port without affecting the flow of traffic on the port(s) being
monitored. Only one RX/TX of the destination port can be selected. A network
administrator would typically connect a LAN analyzer or Netxray device to this port.
Once you finish configuring the settings, click on Apply to apply the settings.
Once you finish configuring the settings, click on Apply to apply your configuration.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.