Kyland Technology Co., Ltd. tries to keep the content in this manual as accurate and as
up-to-date as possible. This document is not guaranteed to be error-free, and we reserve the
right to amend it without notice.
View types
Switch access by console port
Switch access by Telnet
Switch access by Web
3. Device information
Switch basic information
4. Switch maintenance
Reboot
Software update (by FTP, TFTP )
5. Device basic configuration
Basic configuration (Basic configuration, clock configuration)
User management configuration
Port configuration (physical port configuration, port information)
VLAN configuration
PVLAN configuration
Port mirroring
Port storm suppression
Port isolate
Port channel
Telnet server configuration
SSH server configuration
Preface
This manual mainly introduces the access methods and software features of Aquam8512
industrial Ethernet switches, and details Web configuration methods.
Items (keywords or arguments) in [ ] are optional.
{x|y|……}
Alternative items are grouped in { } and separated by vertical bars. One is
selected.
[x|y|……]
Optional alternative items are grouped in [ ] and separated by vertical bars. One
or none is selected.
<x|y|……>
Alternative items are grouped in < > and separated by vertical bars. A minimum
of one or a maximum of all can be selected.
//
A line starting with the // sign is comments.
Format
Explanation
< >
The content in < > is a button name. For example, click <Apply> button.
[ ]
The content in [ ] is a window name or a menu name. For example, click [File] menu item.
{ }
The content in { } is a portfolio. For example, {IP address, MAC address} means IP address
and MAC address is a portfolio and they can be configured and displayed together.
→
Multi-level menus are separated by “→”. For example, Start → All Programs → Accessories.
Click [Start] menu, click the sub menu [All programs], then click the submenu [Accessories].
Conventions in the manual
2. CLI conventions
Product Introduction
2. Text format conventions
3
/
Select one option from two or more options that are separated by “/”. For example
“Addition/Deduction” means addition or deduction.
~
It means a range. For example, “1~255” means the range from 1 to 255.
Symbol
Explanation
Caution
The matters need attention during the operation and configuration, and they are
supplement to the operation description.
Note
Necessary explanations to the operation description.
Warning
The matters call for special attention. Incorrect operation might cause data loss
or damage to devices.
Name of Document
Content Introduction
Aquam8010/Aquam8020/Aquam8512 Series
Industrial Ethernet Switches Hardware Installation
Manual
Describes the hardware structure, hardware
specifications, mounting and dismounting
methods.
Aquam8512 Industrial Ethernet Switches Web
Operation Manual
Describes the switch software functions, Web
configuration methods, and steps of all functions.
3. Symbol conventions
Product Introduction
Product Documents
The documents of Aquam8512 series industrial Ethernet switches include:
Document Obtainment
Product documents can be obtained by:
CD shipped with the device
Kyland website: www.kyland.com
4
Product Introduction
1. Product Introduction
1.1 Overview
Aquam8512 includes a series of high-performance managed industrial Ethernet switches
applied in the rail transit industry. Aquam8512 conforms to EN50155 and EN50121 industrial
standards. The switch is a layer 3 switch that supports the layer 3 routing protocol, and
MSTP, RSTP, DT-Ring, IEC62439-6 redundancy protocols, guaranteeing the reliable
operation of the system. In addition, Aquam8512 supports train topology discovery protocol
(TTDP), railway network address translation (R-NAT), and Bypass power-off
direct-connection function to meet the requirements of train communication network.
1.2 Software Features
This series switches provide abundant software features, satisfying customers' various
requirements.
Redundancy protocols: STP/RSTP, MSTP, DT-Ring, VRRP, and IEC62439-6
Routing protocols: OSPFv2, static routing protocol, RIP
Multicast protocols: IGMP Snooping, GMRP, and static multicast
Switching attributes: VLAN, PVLAN, QoS, and ARP
Bandwidth management: port channel, port rate limiting, and port storm suppression
Synchronization protocols: SNTP, NTP
Security: IEEE802.1x, TACACS+, RADIUS, SSH, SSL, MAC address binding, port
Restore default configuration.
Save current configuration.
Input "config" to switch
from privileged mode to
configuration mode.
Input "exit" to return to
the general mode.
2. Switch Access
You can access the switch by:
Console port
Telnet
Web browser
Kyvision management software
Kyvision network management software is designed by Kyland. For details, refer to its user
manual.
2.1 View Types
When logging into the Command Line Interface (CLI) by the console port or Telnet, you can
enter different views or switch between views by using the following commands.
Table 1 View Types
7
Switch Access
Reboot switch.
Switch (config) #
Configuration
mode
Configure all switch functions.
Input "exit" to return to
privileged mode.
When the switch is configured through the CLI, "?" can be used to get command help. In the
help information, there are different parameter description formats. For example, <1, 255>
means a number range; <H.H.H.H> means an IP address; <H: H: H: H: H: H> means a MAC
address; word<1, 31> means a string range. In addition, ↑ and ↓ can be used to scroll
through recently used commands.
2.2 Switch Access by Console Port
You can access a switch by its console port and the hyper terminal of Windows OS or other
software that supports serial port connection, such as HTT3.3. The following example shows
how to use Hyper Terminal to access switch by console port.
1. Connect the 9-pin serial port of a PC to the console port of the switch with the M12-RJ45
console cable.
2. Run the Hyper Terminal in Windows desktop. Click [Start] → [All Programs] →
[Accessories] → [Communications] → [Hyper Terminal], as shown in Figure 1.
8
Figure 1 Starting the Hyper Terminal
Note:
To confirm the communication port in use, right-click [My Computer] and click [Property] →
3. Create a new connection "Switch", as shown in Figure 2.
Switch Access
Figure 2 Creating a New Connection
4. Connect the communication port in use, as shown in Figure 3.
Figure 3 Selecting the Communication Port
9
Switch Access
[Hardware] → [Device Manager] → [Port].
5. Set port parameters (Bits per second: 115200, Data bits: 8, Parity: None, Stop bits: 1, and
Flow control: None), as shown in Figure 4.
Figure 4 Setting Port Parameters
6. Click <OK> button to enter the switch CLI. Input password "admin" and press <Enter> to
enter the General mode, as shown in Figure 5.
10
Switch Access
Figure 5 CLI
7. Input command “enable”, default user "admin”, and password”123” to enter the privileged
mode. You can also input other created users and password, as shown in Figure 6.
11
Switch Access
Note:
To confirm the switch IP address, please refer to "6.2.1 Switch IP Address" to learn how to
obtain IP address.
Figure 6 Privileged mode
2.3 Switch Access by Telnet
The precondition for accessing a switch by Telnet is the normal communication between the
PC and the switch.
1. Enter "telnet IP address" in the Run dialog box, as shown in Figure 7. The default IP
address of a Kyland switch is 192.168.0.2.
Figure 7 Telnet Access
2. In the Telnet interface, input user "admin", and password "123" to log in to the switch. You
can also input other created users and password, as shown in Figure 8.
12
Switch Access
Note:
IE8.0 or a later version is recommended for the best Web display results.
Figure 8 Telnet Interface
2.4 Switch Access by Web
The precondition for accessing a switch by Web is the normal communication between the
PC and the switch.
1. Input "IP address" in the browser address bar. The login interface is displayed, as shown
in Figure 9. Input the default user name "admin", password "123", and the Verification. Click
<Login>. You can also input other created users and password.
13
Switch Access
Note:
To confirm the switch IP address, please refer to "6.2.1 Switch IP Address" to learn how to
obtain IP address.
Figure 9 Web Login
The English login interface is displayed by default. You can select <中文> to change to the
Chinese login interface.
2. The prompt of modifying the initial password is displayed, click <OK> button.
3. After you log in successfully, there is a navigation tree on the left of the interface, as
shown in Figure 10.
14
Switch Access
Figure 10 Web Interface
In the top right corner, you can click <中文> to change language to Chinese or <Exit> to exit
the Web interface.
15
Device Information
3. Device Information
3.1 Switch Basic Information
The switch basic information includes the prompt, MAC address, hardware version, software
version, BootROM version, device type, compilation date, and runtime. Click [Device
Information] → [Switch basic information] in the navigation tree to show the switch basic
information, as shown in Figure 11.
Figure 11 Switch Basic Information
16
Switch Maintenance
4. Switch Maintenance
In the navigation tree, you can click [Save current running-config] to save the current
configuration or [Reboot with the default configuration] to enter the page shown in Figure 12.
Then you can click <Yes> to restore the default configuration.
Figure 12 Restoring Default Configuration
4.1 Reboot
To reboot the device, click [Switch maintenance] → [Reboot] in the navigation tree to enter
the reboot interface, as shown in Figure 13.
Figure 13 Reboot
Before rebooting, please confirm whether to save current configuration. If you select "Yes",
the switch runs the current configuration after reboot. If you select "No", the switch runs the
previous saved configuration. If no configuration has been saved, the switch will restore the
default configuration after reboot.
4.2 Software Update
Software updates may help the switch to improve its performance. The series switches need
to update only one software version file. It contains not only the system software version, but
also the BootROM software version.
The software version update needs the assistance of FTP/TFTP server.
17
Switch Maintenance
4.2.1 Software Update by FTP
Install an FTP server. The following uses WFTPD software as an example to introduce FTP
server configuration and software update.
1. Click [Security] → [Users/Rights]. The "Users/Rights Security Dialog" dialog box is
displayed. Click <New User> to create a new FTP user, as shown in Figure 14. Create a
user name and password, for example, user name "admin" and password "123". Click
<OK>.
Figure 14 Creating a New FTP User
2. Input the storage path of the update file in "Home Directory", as shown in Figure 15. Click
<Done>.
18
Switch Maintenance
Figure 15 File Location
3. Click [Switch maintenance] → [FTP software update] in the navigation tree to enter the
FTP software update page, as shown in Figure 16. Enter the IP address of FTP server, FTP
user name, password, and file name on the server. Click <Update>.
Transmission type
Options: binary/ascii
Default: binary
Figure 16 Software Update by FTP
19
Switch Maintenance
Warning:
The file name must contain an extension. Otherwise, the update may fail.
Software version file is not a text file, and it must adopt the binary standard for transmission.
To guarantee normal running, please select NO for ForceUpdate. That is, do not update
software if the software and hardware version do not match
Function: Select the file transmission standard.
Explanation: ascii means using ASCII standard to transmit file; binary means using binary
standard to transmit file.
ForceUpdate
Options: YES/NO
Default: NO
Function: Select the handling method when the software version does not match the switch
hardware.
Explanation: NO means to cancel software update if software and hardware do not match.
YES means to continue software update even if software and hardware do not match.
However, it might result in system anomaly, or even boot failure.
4. Make sure the normal communication between the FTP server and the switch, as shown
in Figure 17.
20
Switch Maintenance
Caution:
To display update log information as shown in Figure 17, you need to click [Logging] → [Log
Options] in WFTPD and select Enable Logging and the log information to be displayed.
Warning:
In the software update process, keeps the FTP server software running.
When update completes, reboot the device to activate the new version.
If update fails, do not reboot the device to avoid the loss of software file and startup
anomaly.
Figure 17 Normal Communication between FTP Server and Switch
5. When the update is completed, please reboot the device and open the Switch Basic
Information page to check whether the update succeeded and the new version is active.
4.2.2 Software Update by TFTP
Install TFTP server. The following uses TFTPD software as an example to introduce TFTP
server configuration.
21
Switch Maintenance
Figure 18 TFTP Server Configuration
1. In "Current Directory", select the storage path of update file on server. Enter the server IP
address in "Server interface".
2. Click [Switch maintenance] → [TFTP software update] in the navigation tree to enter the
TFTP software update page, as shown in Figure 19. Enter the IP address of the TFTP server
and file name on server. Click <Update>, and wait for update to complete.
Figure 19 Software Update by TFTP
Transmission type
Options: binary/ascii
Default: binary
Function: Select the file transmission standard.
Explanation: ascii means using ASCII standard to transmit file; binary means using binary
22
Switch Maintenance
Warning:
The file name must contain an extension. Otherwise, the update may fail.
Software version file is not a text file, and it must adopt the binary standard for transmission.
To guarantee normal running, please select NO for ForceUpdate. That is, do not update
software if the software and hardware version do not match
standard to transmit file.
ForceUpdate
Options: YES/NO
Default: NO
Function: Select the handling method when the software version does not match the switch
hardware.
Explanation: NO means to cancel software update if software and hardware do not match.
YES means to continue software update even if software and hardware do not match.
However, it might result in system anomaly, or even boot failure.
3. Make sure the normal communication between the TFTP server and the switch, as shown
in Figure 20.
Figure 20 Normal Communication between TFTP Server and Switch
23
Switch Maintenance
Warning:
In the software update process, keeps the TFTP server software running.
When update completes, reboot the device to activate the new version.
If update fails, do not reboot the device to avoid the loss of software file and startup
anomaly.
4. When the update is completed, please reboot the device and open the Switch Basic
Information page to check whether the update succeeded and the new version is active.
24
Device Basic Configuration
5. Device Basic Configuration
5.1 Switch Basic Configuration
Switch basic configuration includes hostname, mapping between host and IP address, and
switch clock.
5.1.1 Basic Configuration
1. Setting Hostname
Click [Device Basic Configuration] → [Switch Basic Configuration] → [Basic Config] to enter
switch basic configuration page, as shown in Figure 21.
Figure 21 Setting Hostname
Hostname
Range: 1-30 characters
Default: SWITCH
Function: Set the prompt in switch CLI.
Method: Click <Apply> to activate the new hostname. Click <Reset> to cancel the current
setting and use the previous hostname.
2. Setting mapping between hostname and IP address, as shown in Figure 22.
25
Device Basic Configuration
Figure 22 Mapping between Hostname and IP Address
{Host name, IP address}
Format: {1-15 characters, A.B.C.D}
Function: According to the mapping, use hostname to access the corresponding device.
Method: Input valid hostname and IP address. Then click <Add> to set a mapping entry of
hostname and IP address or <Del> to delete the mapping entry.
Example: After setting the mapping between hostname "Switch" and IP address
"192.168.0.4" successfully, you can ping the switch by using the ping host Switch
command instead of ping 192.168.0.4.
5.1.2 Setting the Clock
You can set the system date and time. The series switches support Real-Time Clock (RTC).
Even if they are powered off, they continue timing.
To make full use of time and save energy, Daylight Saving Time (DST) can be used in
summer. To be specific, adjust clock forward one hour in summer.
Click [Device Basic Configuration] →[Switch Basic Configuration]→[Clock configuration] to
enter clock configuration page, as shown in Figure 23.
26
HH:MM:SS
Device Basic Configuration
Figure 23 Clock Configuration
Range: The value of HH ranges from 0 to 23, and that of MM and SS ranges from 0 to 59.
YYYY.MM.DD
Range: The value of YYYY ranges from 1970 to 2099, that of MM from 1 to 12, and that of
DD from 1 to 31.
Description: The range of DD varies with month. For example, the range of DD for March is
from 1 to 31, and that for April is from 1 to 30. You can configure it according to the actual
situation.
Timezone
Function: Select the local timezone.
Daylight Saving Time status
Options: Enable/Disable
Default: Disable
Function: Enable or disable DST. After DST is enabled, clock will be adjusted forward one
hour in summer.
Daylight Saving Time
Configure the time segment for DST.
27
Device Basic Configuration
Caution:
Start time should be different from end time.
Start time indicates non-DST time. End time indicates DST time.
User Level
Description
Guest
The lowest level, guest users can only view switch configuration, but cannot perform
configuration or modification.
Guest users cannot access the following functions: software update, user management,
file transmission, reboot, save current configuration, and load default.
System
Medium level, system users have certain access and configuration rights.
System users cannot access the following functions: software update, user
management, file transmission, reboot, and load default.
Note: System user can modify password of the current user.
Admin
Highest level, admin users have the rights to perform all functions.
For example, run DST from 10:00:00 April 1st to 9:00:00 October 1st.
Non-DST time will run until 10:00:00 April 1st. Then the clock jumps to 11:00:00 to start DST.
DST runs until 9:00:00 October 1st. Then the clock jumps back to 8:00:00 to run non-DST
time.
5.2 User Management Configuration
To avoid security problems caused by illegitimate users, the series switches provide
hierarchical user management. The switches provide different operation rights based on
user levels, satisfying diversified access control requirements. Three user levels are
available, as shown in Table 2.
Table 2 User Level
5.2.1 Web Configuration
1. Configure users
28
Device Basic Configuration
Click [Device Basic Configuration] →[User Configuration]→[User Configuration] to enter
user configuration page, as shown in Figure 24.
Figure 24 User Configuration
Name
Range: 1~16 characters
Service
Options: console/telnet/ssh/web
Function: Select switch access mode for the current user. One or multiple access modes can
be selected.
Level
Option: Guest/System/Admin
Default: Guest
Option: Select user level, users of different levels have different operation rights.
Authen-Type
Option: Password/Key/Password or Key
Default: Password
Function: Selected the authentication type to be used when the current user accesses the
switch. When selecting Password, you must configure the Password option. When
selecting Key, you must configure the Key name option.
Password
Range: 1~32 characters
29
Device Basic Configuration
Note:
Currently, console/telnet/web does not support the key-based authentication mode.
Therefore, when the service type is console/telnet/web, does not select key-based
authentication as the authentication type.
ssh supports two authentication modes, that is, password-based authentication and
key-based authentication.
The switch supports a maximum of nine users.
Default user admin cannot be deleted. The default service (console, telnet, ssh, web) and
level (administration level) of this user cannot be modified, but the default password (123)
can be modified.
For the switch access mode of console/telnet/web, please see the “2 Switch Access” section.
For the switch access mode of ssh, please see the “5.11 SSH Server Configuration” section.
Function: Configure the password to be used when the current user accesses the switch.
Key name
Function: Select the key name to be used when current user accesses the switch in ssh
mode.
2. Modify and delete user information
Click the user entry under user configuration list in Figure 24. You can modify and delete the
user configuration, as shown in Figure 25.
Figure 25 Modify and Delete User Information
3. Configure SSH Key
Click [Device Basic Configuration] →[User Configuration]→[SSH Key Configuration] to
enter SSH key configuration page, as shown in Figure 26.
30
Key Name
Range: 1~16 characters
Key Type
Device Basic Configuration
Figure 26 SSH Key Configuration
Mandatory configuration: RSA
This series switches only support RSA key algorithm.
Key Value
Format: {algorithm name, public key, key info}
Algorithm name: ssh-rsa | ssh-dsa
Public key: it is based on 64 codes and the length is less than 2048 bytes
Key info: more info for the key
Function: Configure the public key corresponding to the client. Generally, the public key is
generated by Puttygen software and is copied to the key value of the server, the private key
is saved in the client.
4. Modify the password of current user
Click [Device Basic Configuration] → [User Configuration]→[Modify Password] to enter
password modification page, as shown in Figure 27.
31
Device Basic Configuration
Figure 27 Modify
New password/Repeat password
Range: 1~32 characters
5. Configure timeouts for switch access modes
Click [Device Basic Configuration] → [User Configuration]→[Timeouts Configuration] to
enter password modification page, as shown in Figure 28.
Figure 28 Timeouts Configuration
Time
Range: 0~44640 min
Default: 5 min for console/ssh/telnet; 10 min for web
Function: Configure the login user timeout and disconnection time. The time starts counting
when a user finishes all configurations, and the system will automatically exit the access
mode when the time ends. When the time is set to 0, the user timeout and disconnection
function is disabled. In this case, the server will not judge whether the user login times out
and therefore the user will not exit the current login mode.
5.3 Port Configuration
5.3.1 Physical Port Configuration
5.3.1.1 Introduction
In physical port configuration, you can configure the cable type, management status,
rate/mode, and other information.
32
Device Basic Configuration
Caution:
The auto option is recommended.
5.3.1.2 Web Configuration
Click [Device Basic Configuration] → [Port configuration] → [Ethernet port configuration] →
[Physical port configuration] to enter the port configuration page, as shown in Figure 29.
Figure 29 Physical Port Configuration
Port
Options: all switch ports
Description: X/Y is the port name format; X is 1 for this switch, and Y is the port number on
the panel.
mdi
Options: auto/normal/across
Default: auto
Function: Configure the cable type for the Ethernet port.
Description: auto means auto-recognition of cable type; across means the port supports only
cross-over cable; normal means the port supports only straight-through cable.
Admin Status
Options: shutdown/no shutdown
Default: no shutdown
Function: Allow data transmission on port or not.
Description: no shutdown indicates the port is enabled and permits data transmission;
shutdown indicates the port is disabled and disallows data transmission. This option directly
affects the hardware status of the port and triggers port alarms.
Speed/duplex status
33
Device Basic Configuration
Caution:
The speed/duplex mode of a 10/100Base-TX port can be set to auto, 10M/Half, 10M/Full,
100M/Half, or 100M/Full.
The speed/duplex mode of a 100Base-FX port can be set to 100M/Full only.
The speed/duplex mode of a 10/100/1000Base-TX port can be set to auto, 10M/Half,
10M/Full, 100M/Half, 100M/Full, 1000M/Half, or 1000M/Full.
The speed/duplex mode of a Gigabit fiber port can be set to auto or 1000M/Full only.
Options: auto, 10M/Half, 10M/Full, 100M/Half, 100M/Full, 1000M/Half, 1000M/Full
Default: auto
Function: Configure the port speed and duplex mode.
Description: Port speed and duplex mode support auto-negotiation and forced configuration.
If it is set to "auto", the port speed and duplex mode will be automatically negotiated
according to port connecting status. When the port duplex mode changes from
auto-negotiation to forced full duplex or half duplex, the port speed will also be changed to
forced mode. It is recommended to set the parameter to auto to avoid the connection
problem caused by unmatched port configuration on both ends of link. If you set the port to
forced speed or duplex, please ensure the speed or duplex mode configurations on both
ends of the connection are the same.
You can view port information based on Ethernet port configuration and communication
conditions, as shown in Figure 30.
Figure 30 Port List
34
Device Basic Configuration
5.3.2 Port Information
Click [Device Basic Configuration] → [Port configuration] → [Port debug and maintenance]
→ [Show port information] to enter the port information page. It contains the port connecting
status, port type, input/output packet statistics, and other information, as shown in Figure 31.
Figure 31 Port Information
5.4 VLAN Configuration
5.4.1 Introduction
One LAN can be divided into multiple logical Virtual Local Area Networks (VLANs). A device
can only communicate with the devices on the same VLAN. As a result, broadcast packets
35
Device Basic Configuration
DA
SA
802.1Q Header
Length/Type
Data
FCS
Type
PRI
CFI
VID
Note:
VLAN 1 is the default VLAN and cannot be manually created and deleted.
Reserved VLANs are reserved to realize specific functions by the system and cannot be
manually created and deleted.
are restricted to a VLAN, optimizing LAN security.
VLAN partition is not restricted by physical location. Each VLAN is regarded as a logical
network. If a host in one VLAN needs to send data packets to a host in another VLAN, a
router or layer-3 device must be involved.
5.4.2 Principle
To enable network devices to distinguish packets from different VLANs, fields for identifying
VLANs need to be added to packets. At present, the most commonly used protocol for VLAN
identification is IEEE802.1Q. Table 3 shows the structure of an 802.1Q frame.
Table 3 802.1Q Frame Structure
A 4-byte 802.1Q header, as the VLAN tag, is added to the traditional Ethernet data frame.
Type: 16 bits. It is used to identify a data frame carrying a VLAN tag. The value is 0x8100.
PRI: three bits, identifying the 802.1p priority of a packet.
CFI: one bit. 0 indicates Ethernet, and 1 indicates token ring.
VID: 12 bits, indicating the VLAN number. The value ranges from 1 to 4093. 0, 4094, and
4095 are reserved values.
The packet containing 802.1Q header is a tagged packet; the one without 802.1Q header is
an untagged packet. All packets carry an 802.1Q tag in the switch.
5.4.3 Port-based VLAN
VLAN partition can be either port-based or MAC address-based. This series switches
support port-based VLAN partition. VLAN members can be defined based on switch ports.
36
Device Basic Configuration
Processing Received Packets
Processing Packets to Be Forwarded
Untagged packets
Tagged packets
Port Type
Packet Processing
Add PVID tags to
packets.
If the VLAN ID in a
packet is in the list of
Untag
Forward the packet after
removing the tag.
After a port is added to a specified VLAN, the port can forward the packets with the tag for
the VLAN.
1. Port Type
Ports fall into two types according to how they handle VLAN tags when they forward packets.
Untag port: Packets forwarded by an Untag port do not have VLAN tags. Untag ports are
usually used to connect to terminals that do not support 802.1Q. By default, all switch
ports are Untag ports and belong to VLAN1.
Tag port: All packets forwarded by a Tag port carry a VLAN tag. Tag ports are usually
used to connect network transmission devices.
2. Port Mode
Access: In access mode, the port must be untag and added to one VLAN; the port
cannot be tag and added to any VLAN.
Trunk: In trunk mode, the port must be untag and added to the PVID VLAN; the port can
be tag/untag and added to any other VLAN.
3. PVID
Each port has a PVID. When receiving an untagged packet, a port adds a tag to the packet
according to the PVID. The default PVID of all ports is 1.
The PVID of an Access port is the ID of VLAN that the port belongs to, and it cannot be
configured.
The PVID of a Trunk port can be configured as one of the VLAN IDs allowed through the
port.
Table 4 shows how the switch processes received and forwarded packets according to the
port mode, port type and PVID.
Table 4 Different Processing Modes for Packets
37
Device Basic Configuration
VLANs allowed through,
accept the packet.
If the VLAN ID in a
packet is not in the list of
VLANs allowed through,
discard the packet.
Tag
Keep the tag and forward the
packet.
5.4.4 Web Configuration
1. Create or delete a VLAN.
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN configuration] →
[Create/Remove VLAN] → [VLAN ID allocation] to enter the VLAN configuration page, as
shown in Figure 32.
Figure 32 Creating/Deleting a VLAN
VLAN ID
Range: 2~4093. The default VLAN ID is 1.
Function: Use different VLAN IDs to distinguish VLANs.
Description: The series switches support a maximum of 4093 VLANs.
Method: Click <Add> to create a VLAN; click <Remove> to delete the specified VLAN.
2. Configure a VLAN name.
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN configuration] →
[Create/Remove VLAN] → [VLAN ID attribution configuration] to enter the VLAN name
configuration page, as shown in Figure 33.
38
Figure 33 VLAN Configuration
VLAN ID
Range: all created VLANs
Function: Input the ID of the VLAN whose name is to be modified.
VLAN Name
Range: 1~11 characters
Device Basic Configuration
Function: Input the name of the VLAN with the specified ID.
VLAN Type
Options: universal
Default: universal
After setting is completed, the "VLAN ID Information" page lists the attribute information of all
created VLANs, as shown in Figure 34.
Figure 34 VLAN List
3. Configure port mode
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN configuration] → [Port
type configuration] → [Set port mode (Trunk/Access)] to enter the port type configuration
page, as shown in Figure 35.
39
Device Basic Configuration
Figure 35 Port Type Configuration
Port
Options: all switch ports
Type
Options: access/trunk
Default: access
Function: Select the mode for the specified port. Each port supports only one mode.
After setting is completed, the "Port mode configuration" page lists all port types, as shown in
Figure 36.
Figure 36 Port Type Information
4. Allocate ports to the created VLANs.
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN configuration] →
[Allocate ports for VLAN] → [Allocate ports for VLAN] to enter the Access port VLAN
configuration page, as shown in Figure 37.
40
Device Basic Configuration
Caution:
In access mode, the port must be untag and added to one VLAN.
In trunk mode, the port must be untag and added to the PVID VLAN; the port can be
tag/untag and added to any other VLAN.
Figure 37 Allocating Access Ports to VLANs
Tag Type
Option: Tag/Untag
Function: Select the type of the port to be added to the VLAN.
5. Configure the PVID for a Trunk port.
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN configuration] → [Trunk
port configuration] → [VLAN setting for trunk port] to enter the Trunk port VLAN configuration
page, as shown in Figure 38.
41
Figure 38 Trunk Port PVID Configuration
Trunk Port
Options: all Trunk ports
Trunk Native VLAN (pvid)
Options: all created VLANs
Default: 1
Function: Configure the PVID for a Trunk port.
Device Basic Configuration
Description: No matter whether a port does not exist in a VLAN or exists in a VLAN in the
form of Untag/tag, after the PVID is specified, this port will be added to the VLAN in the form
of Untag.
Method: Click <Default> to restore the PVID of selected Trunk port to 1.
6. Configure VLANs for a Trunk port, as shown in Figure 39.
Figure 39 Configuring VLANs for a Trunk Port
Trunk Port
Options: all Trunk ports
Tag Type
Option: Tag/Untag
Function: Select the type of the trunk port to be added to the VLAN.
Trunk Allow VLAN List
Options: all created VLANs
42
Device Basic Configuration
Default: all created VLANs
Function: Configure VLANs for the selected Trunk port.
After setting is completed, the VLAN information of all Trunk ports is displayed, as shown in
Figure 40.
Figure 40 VLAN Configuration of Trunk Ports
7. Configure VLAN ingress rule for a port.
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN configuration] →
[Enable/Disable VLAN ingress rule] → [Enable/Disable VLAN ingress rule] to enter the
VLAN ingress rule configuration page, as shown in Figure 41.
Figure 41 Configuring VLAN Ingress Rule
Options: Enable/Disable
Default: Enable
Function: Enable or disable the VLAN ingress rule for a port.
Description: If this function is enabled, the port checks the VLAN ID of a packet against its
allowed VLAN list upon receiving the packet. If a match is found, the port forwards the
packet; otherwise, the packet is discarded. If this function is disabled, the port forwards all
packets without checking their VLAN IDs.
After setting is completed, all VLAN ingress rules information is displayed, as shown in
Figure 42.
[VLAN-aware] → [VLAN-aware] to enter the VLAN ingress rule configuration page, as shown
in Figure 43.
Figure 43 VLAN-aware Configuration
Option: Aware/Unaware
Default: Aware
Function: When Aware is selected, the device identifies and judges the VLAN according to
the IEEE802.1Q protocol and forwards packets properly. When Unaware is selected, the
device does not judge the VLAN ID of an unknown unicast packet and forwards the packet to
any port (broadcast); the device does not judge the VLAN ID of a known unicast packet and
forwards the packet to a relevant port according to the MAC address table.
9. View the information about all created VLANs.
Click [Device Basic Configuration] → [VLAN configuration] → [VLAN debug and
maintenance] → [Show VLAN] to enter the VLAN information page, as shown in Figure 44.
44
Figure 44 VLAN Information
VLAN
Configuration
VLAN2
Set port 1/1 and port 1/2 of Switch A and B to untag ports, and port 1/7 to tag port.
VLAN100
Set port 1/3 and port 1/4 of Switch A and B to untag ports, and port 1/7 to tag port.
VLAN200
Set port 1/5 and port 1/6 of Switch A and B to untag ports, and port 1/7 to tag port.
Device Basic Configuration
5.4.5 Typical Configuration Example
As shown in Figure 45, the entire LAN is divided into 3 VLANs: VLAN2, VLAN100, and
VLAN200. It is required that the devices in the same VLAN can communicate with each
other, but different VLANs are isolated. The terminal PCs cannot distinguish tagged packets,
so the ports connecting Switch A and Switch B with PCs are set to access port. VLAN2,
VLAN100, and VLAN200 packets need to be transmitted between Switch A and Switch B, so
the ports connecting Switch A and Switch B should be set to trunk port, permitting the
packets of VLAN 2, VLAN 100, and VLAN 200 to pass through. Table 5 shows specific
configuration.
Table 5 VLAN Configuration
45
Device Basic Configuration
Figure 45 VLAN Application
Configurations on Switch A and Switch B:
1. Create VLAN2, VLAN100, and VLAN200, as shown in Figure 32.
2. Configure ports 1/1, 1/2, 1/3, 1/4, 1/5, 1/6 as Access ports, and port 1/7 as Trunk port, as
shown in Figure 35.
3. Add ports 1/1 and 1/2 to VLAN2 as untag ports; ports 1/3 and 1/4 to VLAN100 as untag
ports; ports 1/5 and 1/6 to VLAN200 as untag ports; port 1/7 to VLAN2, VLAN100, VLAN200
as tag port, as shown in Figure 37.
5.5 PVLAN Configuration
5.5.1 Introduction
PVLAN (Private VLAN) uses two layers isolation technologies to realize the complex port
traffic isolation function, achieving network security and broadcast domain isolation.
The upper VLAN is a shared domain VLAN in which ports are uplink ports. The lower VLANs
are isolation domains in which ports are downlink ports. Downlink ports can be assigned to
different isolation domains and they can communicate with uplink port at the same time.
Isolation domains cannot communicate to each other.
46
Device Basic Configuration
Figure 46 PVLAN Application
As shown in Figure 46, the shared domain is VLAN100 and the isolation domains are VLAN
10 and VLAN 30; the devices in the isolation domains can communicate with the device in
the share domain, such as VLAN 10 can communicate with VLAN 100; VLAN 30 can also
communicate with VLAN 100, but the devices in different isolation domains cannot
communicate with each other, such as VLAN 10 cannot communicate with VLAN 30.
5.5.2 Explanation
PVLAN function can be implemented through special configuration on ports.
The PVID of uplink ports are the same as shares domain VLAN ID; the PVID of downlink
ports are the same as their own isolation domain VLAN ID.
The uplink ports are set to untag and are assigned to the shares domain VLAN and all
isolation domains; the downlink ports are set to untag and are assigned to the shared
domain VLAN and own isolation domain.
5.5.3 Typical Configuration Example
Figure 47 shows PVLAN application. VLAN300 is a shared domain and port 1 and port 2 are
uplink ports; VLAN100 and VLAN200 are isolation domains and ports 3, 4, 5, and 6 are
downlink ports.
47
Device Basic Configuration
Figure 47 PVLAN Configuration Example
Switch configuration:
1. Create VLAN300, VLAN 100, and VLAN 200, as shown in Figure 32.
2. Configure ports 1, 2, 3, 4, 5, 6 as trunk ports, as shown in Figure 35.
3. Add ports 1~6 to VLAN300 as untag ports; ports 1~4 to VLAN100 as untag ports; ports 1,
2, 5, 6 to VLAN200 as untag ports, as shown in Figure 37.
4. Configure the PVID of ports 1 and 2 to 300; the PVID of ports 3 and 4 to 100; the PVID of
ports 5 and 6 to 200, as shown in Figure 38.
5.6 Port Mirroring
5.6.1 Introduction
With port mirroring function, the switch copies all received or transmitted data frames in a
port (mirroring source port) to another port (mirroring destination port). The mirroring
destination port is connected to a protocol analyzer or RMON monitor for network monitoring,
management, and fault diagnosis.
48
Device Basic Configuration
Caution:
Mirroring destination port and port channel are mutually exclusive. The mirroring destination
port cannot be added to a port channel, and the port in a port channel cannot be set to a
mirroring destination port.
5.6.2 Explanation
A switch supports only one mirroring destination port but multiple source ports.
Multiple source ports can be either in the same VLAN, or in different VLANs. Mirroring
source port and destination port can be in the same VLAN or in different VLANs.
The source port and destination port cannot be the same port.
5.6.3 Web Configuration
1. Select the mirroring source port and mirroring mode.
Click [Device Basic Configuration] → [Port mirroring configuration] → [Mirror configuration]
to enter the mirroring source port configuration page, as shown in Figure 48.
Figure 48 Mirroring Source Port Configuration
Session
Option: 1~7
Default: 1
Function: Select a mirroring group.
Mirror Direction
Options: rx/tx/both
Default: both
Function: Select the data to be mirrored in the mirroring source port.
49
Device Basic Configuration
Description: rx indicates only the received packets are mirrored in the source port.
tx indicates only the transmitted packets are mirrored in the source port.
Both indicates both transmitted and received packets are mirrored in the source port.
Source port
Options: all switch ports
Function: Select the mirroring source port. You can select multiple source ports.
2. Select the mirroring destination port, as shown in Figure 49.
Figure 49 Mirroring Destination Port Configuration
Session
Option: 1~7
Default: 1
Function: Select a mirroring group.
Destination port
Options: all ports other than the source port
Function: Select the mirroring destination port.
Description: Set a port to a mirroring destination port. There is only one mirroring destination
port. The mirroring destination port cannot be a member of a port channel. It is better that the
throughput of the destination port is larger than or equal to the total throughputs of its source
ports.
5.6.4 Typical Configuration Example
As shown in Figure 50, the mirroring destination port is port 2 and the mirroring source port
is port 1. Both transmitted and received packets on port 1 are mirrored to port 2.
50
Device Basic Configuration
Figure 50 Port Mirroring Example
Configuration process:
1. Set port 2 to the mirroring destination port, as shown in Figure 49.
2. Set port 1 to the mirroring source port and the port mirroring mode to both, as shown in
Figure 48.
5.7 Port Storm Control
5.7.1 Introduction
Port storm control is to limit the port-received broadcast/multicast/unknown unicast packets.
When the rate of broadcast/multicast/unknown unicast packets received on the port exceeds
the configured threshold, the system will discard excess broadcast/multicast/unknown
unicast packets to keep the broadcast/multicast/unknown unicast traffic within the allowable
range, ensuring normal network operation.
5.7.2 Web Configuration
1. Configure the port storm control threshold.
Click [Device Basic Configuration] → [Port Storm Suppression configuration] → [Port Storm
Suppression configuration] to enter the configuration page, as shown in Figure 51.
Figure 51 Port Storm Control Threshold Configuration
51
Device Basic Configuration
Port Rate
Threshold Unit
Step
Value Range
10M
bps
512
512~10000000
kbps
Not recommended
Not recommended
100M
bps
5120
5120~100000000
kbps
5
5~100000
1000M
bps
51200
51200~1000000000
kbps
50
50~1000000
Port name
Options: all switch ports
Function: Select the ports that need rate limiting.
Rate Unit:
Options: bps/kbps/percent
Function: Select the unit of the threshold.
Rate Value:
Range: 1~1000000kbps/1~1000000000bps/1~100 Percent
Default: 0, when the value is 0, port storm control is disabled.
Function: Configure the threshold for port rate limiting and the packets that exceed the
threshold will be dropped. The value range depends on the actual port speed. For details,
see Table 6.
Description: The threshold of Fast Ethernet port is in the range of
1~100000kbps/1~100000000bps; the threshold of Gigabit Ethernet port is in the range of
1~1000000kbps/1~1000000000bps. Percent corresponds to the port bandwidth, for
example, if the rate limiting value of a 100M port is 60%, the port begins to discard data after
receiving 60M data traffic.
Table 6 Value Range of Port Rate Threshold
2. Select the type of packets to be controlled, as shown in Figure 52.
52
Figure 52 Configuring the Packets to Be Controlled
Note:
On each port, only one threshold can be configured. The threshold takes effect on the
configured packet type.
Port name
Options: all ports on which port storm control is enabled
Suppression Type
Options: Multicast/broadcast/dlf
Function: Select the type of packets to be controlled.
Function
Options: Enable/Disable
Device Basic Configuration
Default: Disable
Function: Enable or disable the control on the type of packets.
5.7.3 Typical Configuration Example
Enable the unknown multicast storm control on port 1/1 with the bandwidth threshold of
1000kbps.
Configuration process:
1. Select port 1/1 and set rate unit to kbps and rate value to 1000kbps, as shown in Figure
51.
2. Set packet type to multicast, as shown in Figure 52.
5.8 Port Isolation
5.8.1 Introduction
To implement isolation of packets on layer 2, you can add ports to different VLANs. However,
53
Device Basic Configuration
Note:
Ports of the isolation group can only be ports from the same switch.
One device supports a maximum of 14 isolation groups, and there is no limit to the number
of Ethernet ports in each group.
Following the configuration of the isolation group, only the packets among the ports of the
isolation group could not exchange with each other, the communication between the ports
within the isolation group and the ports outside the isolation group would not affected.
Isolated port and port channel are mutually exclusive. The port of isolation group cannot be
added to a port channel, and the port in a port channel cannot be added to an isolation
group.
this method will cause a waste of limited VLAN resources. By adopting the port isolation
feature, you can isolate ports in the same VLAN from each other. User only needs to add
port to isolation group, and the isolation of data in layer 2 among ports of the isolation group
would be realized because the ports in the isolation group would not forward packets to other
ports of the isolation group. The port isolation function provides users with a more secure
and flexible networking solution.
5.8.2 Web Configuration
Enable the port isolation, as shown in Figure 53.
Figure 53 Port Isolation Configuration
Port isolate
Options: Enable/Disable
Default: Disable
54
Device Basic Configuration
Caution:
One port is added to only one isolation group.
Function: Enable or disable the port isolate.
5.8.3 Typical Configuration Example
Connect PC1, PC2, and PC3 to the Ethernet port 1, 2, and 3 of the switch, and connect port
4 to the external network. Ports 1, 2, 3, and 4 are in the VLAN 1. PC1, PC2, and PC3 cannot
communicate with each other, but they can access the external network, as shown in Figure
54.
Figure 54 Port Isolation configuration Instance
Add port 1, 2, and 3 to the isolation group to isolate PC1, PC2, and PC3, as shown in Figure
53.
5.9 Port Channel
5.9.1 Introduction
Port channel is to bind a group of physical ports that have the same configuration to a logical
port to increase bandwidth and improve transmission speed. The member ports in a same
group share traffic and serve as dynamic backups for each other, improving connection
55
Device Basic Configuration
reliability.
Port group is a physical port group on the configuration layer. Only the physical ports that
join in port group can participate in link aggregation and become a member of port channel.
When physical ports in a port group meet certain conditions, they can conduct port
aggregation and form a port channel and become an independent logical port, thereby
increasing network bandwidth and providing link backup.
5.9.2 Implementation
As shown in Figure 55, three ports on Switch A and Switch B aggregate to form a port
channel. The bandwidth of the port channel is the total bandwidth of these three ports.
Figure 55 Port Channel
If Switch A sends packets to Switch B by way of the port channel, Switch A determines the
member port for transmitting the traffic based on the calculation result of load sharing. When
one member port of the port channel fails, the traffic transmitted through the port is taken
over by another normal port based on load sharing algorithm.
5.9.3 Explanation
The series switches support a maximum of 8 port groups and each group contains a
maximum of 8 member ports.
56
Device Basic Configuration
Caution:
A port can be added to only one port group.
Port channel and isolated port are mutually exclusive. The port in a port channel cannot be
added to an isolation group; the port of isolation group cannot be added to a port channel.
Port channel and mirroring destination port are mutually exclusive. The port in a port channel
cannot be configured as a mirroring destination port; the mirroring destination port cannot be
added to a port channel.
5.9.4 Web Configuration
1. Configure load sharing mode of port channel.
Click [Device Basic Configuration] → [Port channel configuration] → [LACP port group
configuration] to enter the configuration page, as shown in Figure 56.
Figure 56 Load Sharing Mode Configuration
Load balance mode
Options: mac-only/ip-only/mac-ip/ip-l4/mac-ip-l4
Default: mac-only
Function: Set the load sharing mode of port channel.
Description: mac-only indicates MAC address-based load sharing.
ip-only indicates IP address-based load sharing.
mac-ip indicates load sharing based on MAC address and IP address.
ip-I4 indicates load sharing based on IP address and TCP/UDP port number.
mac-ip-14 indicates load sharing based on MAC address, IP address, and TCP/UDP port
number.
Explanation: If load sharing mode needs to be changed after a port channel is formed, the
change will take effect after the next aggregation.
57
Device Basic Configuration
2. Create or delete a port group, as shown in Figure 57.
Figure 57 Port Channel Configuration
LACP group number
Range: 1~8
Function: Set the port group number with a maximum of 8 port groups.
Operation type
Options: add port group/remove port group
Default: add port group
Function: Create or delete a port group.
After setting is completed, the "port group table" page lists all created port groups and load
sharing modes, as shown in Figure 58.
Figure 58 Port Group List
3. Configure a port group member.
Click [Device Basic Configuration] → [Port channel configuration] → [LACP port
configuration] to enter the configuration page, as shown in Figure 59.
Figure 59 Port Group Member Configuration
58
Device Basic Configuration
LACP group number
Options: all created port group numbers
Port
Options: all switch ports
Function: Select the port to be added to or deleted from a port group.
Description: The member ports in a same port group have the same port attributes.
Operation type
Options: Add port to group/Remove port from group
Default: Add port to group
Function: Add a port to or remove a port from a port group.
5.9.5 Typical Configuration Example
As shown in Figure 55, add three ports (port 1, 2, and 3) of Switch A to port group 1 and
three ports (port 1, 2, and 3) of switch B to port group 2. Use network cables to connect
these ports to form a port channel, realizing load sharing among ports. (It is assumed that
the three ports on Switch A and B have the same attributes respectively.)
Configuration on switches:
1. Add port group 1 on Switch A, as shown in Figure 57.
2. Add port 1, 2, and 3 to port group 1, as shown in Figure 58.
3. Add port group 2 on Switch B, as shown in Figure 57.
4. Add port 1, 2, and 3 to port group 2, as shown in Figure 58.
5.10 Telnet Server Configuration
5.10.1 Introduction
Telnet is a protocol for accessing remote terminals. You can log in to a remote host by using
the IP address or host name through Telnet. Telnet can transmit your commands to the
remote host and return the output of the remote to your display through TCP.
Telnet adopts the client/server mode. The local system is the client, while the remote host is
59
Device Basic Configuration
Note:
The switch can work as a Telnet client to log in to a remote host regardless of whether the
function is enabled.
the server. This series switches can serve as a Telnet server or client.
When a switch serves as a Telnet server, you can log in to the switch by using the Telnet
client software in the Windows or other OSs. When the switch serves as a Telnet server, it
can establish TCP connections with a maximum of 5 Telnet clients.
When the switch serves as a Telnet client, you can use Telnet commands in the general view
to log in to other remote hosts. When serving as a Telnet client, the switch can establish TCP
connection with only one remote host. To establish TCP connection with another host, the
switch must disconnect the connected host first.
5.10.2 Web Configuration
1. Enable the Telnet server function.
Click [Device Basic Configuration] → [Telnet server configuration] → [Telnet server user
configuration] to enter telnet server configuration page, as shown in Figure 60.
Figure 60 Telnet Server Configuration
Telnet server state
Configuration items: open/close
Default: open
Function: Enable or disable the Telnet server function.
Description: Open means that Telnet clients can log in to the switch. Close means that Telnet
clients cannot log in to the switch.
2. Configure security IP address for Telnet client login.
60
Device Basic Configuration
Click [Device Basic Configuration] → [Telnet server configuration] → [Telnet security IP] to
enter security IP address configuration page, as shown in Figure 61.
Figure 61 Telnet Server Security IP
Security IP address
Format: A.B.C.D
Function: Configure security IP address for Telnet client login when the switch works as a
Telnet server.
Description: If the security IP is not set, there is not restriction on Telnet client's IP address.
After the security IP addresses are set, only the client with a security IP address can log in to
and configure the switch by Telnet.
A switch allows a maximum of 32 security IP addresses. By default, no security IP address is
configured.
After setting is completed, the "Telnet server Security IP list" displays Telnet client IP
addresses that can log in to the switch, as shown in Figure 62.
Figure 62 Security IP Address List
5.11 SSH Server Configuration
5.11.1 Introduction
SSH (Secure Shell) is a network protocol for secure remote login. It encrypts all transmitted
data to prevent information disclosure. When data is encrypted by SSH, users can only use
61
Device Basic Configuration
command lines to configure switches.
The switch supports the SSH server function and allows the connection of multiple SSH
users that log in to the switch remotely through SSH, but a maximum of two users can
connect to the switch at a time.
5.11.2 Secret Key
The unencrypted message is called plaintext, and the encrypted message is called cipher
text. Encryption or decryption is under the control of the secret key. A secret key is a specific
character string and is the only parameter to control the transformation between plain text
and cipher text, working as a Key. Encryption can change plain text to cipher text, while
decryption can change cipher text to plain text.
The key-based security authentication needs secret keys, and each end of the
communication has a pair of secret keys, private key and public key. Public key is used to
encrypt data, and the legal owner of private key can use the private key to decrypt the date
to guarantee the data security.
5.11.3 Implementation
In order to realize the SSH secure connection in the communication process, the server and
the client experience the following five stages:
Version negotiation stage: currently, SSH consists of two versions: SSH1 and SSH2. The
two parties negotiate a version to use.
Key and algorithm negotiation stage: SSH supports multiple types of encryption algorithms.
The two parties negotiate an algorithm to use.
Authentication state: the SSH client sends an authentication request to the server and the
server authenticates the client.
Session request stage: the client sends a session request to the server after passing the
authentication.
Session stage: the client and the server start communication after passing the session
request.
62
Device Basic Configuration
5.11.4 Web Configuration
SSH server configuration steps:
Click [Device Basic Configuration] → [SSH Server Configuration] → [SSH server
configuration] to enter the SSH server configuration page.
1. Disable SSH status.
2. Click <Destroy> to destroy the old key pair, as shown in Figure 63.
Figure 63 Destroy the Old Key Pair
3. Click <Create> to create a new key pair.
4. Enable SSH protocol and configure the SSH server, as shown in Figure 64.
Server state
Figure 64 SSH Server Configuration
63
Device Basic Configuration
Option: Open/Close
Default: Close
Function: Enable/Disable SSH protocol. If it is enabled, the switch works as the SSH server.
Authentication Retry Times
Configuration range: 1~10
Default: 10
Function: set the number of attempts to log into SSH server.
Local Key Pair
Configuration options: Create/Destroy
Function: create or destroy the local key pair of the SSH server. Please create a local key
pair before enabling SSH server; destroy the old key pair before creating a new key pair.
Local Key Value
Function: show the local key value. Click <Create> to automatically generate the key value.
Configure security IP address for SSH client login.
Click [Device Basic Configuration] → [SSH Server Configuration] → [SSH security IP] to
enter security IP address configuration page, as shown in Figure 65.
Figure 65 SSH Sever Security IP Configuration
Security IP Address
Format: A.B.C.D
Function: Configure security IP address for SSH client login when the switch works as a
SSH server. If the security IP is not set, there is not restriction on SSH client's IP address.
After the security IP addresses are set, only the client with a security IP address can log in to
64
Device Basic Configuration
and configure the switch by SSH.
Explanation: A switch allows a maximum of 6 security IP addresses. By default, no security
IP address is configured.
5.11.5 Typical Configuration Example
The Host works as the SSH client to establish a local connection with switch, as shown in
Figure 66.
Figure 66 SSH Configuration Example
SSH user chooses the authentication type of “password”.
1. Destroy the old key pair of the server, create a new key pair and start SSH server, see
Figure 63, Figure 64.
2. Set SSH user name to 333, service to SSH, authen-type to password, password to 333,
see Figure 24.
3. Establish the connection with the SSH server. First, run the PuTTY.exe software, as
shown in Figure 67; input the IP address of the SSH server "192. 168.0.2" in the space of
Host Name (or IP address).
65
Device Basic Configuration
Figure 67 SSH Client Configuration
4. Click <Open> button and following warning message appears shown in Figure 68, click
the <是(Y)> button.
Figure 68 Warning Message
66
Device Basic Configuration
5. Input the user name "333" and the password "333" to enter the switch configuration
interface, as shown in Figure 69.
Figure 69 Login Interface of the SSH Password Authentication
SSH user chooses the authentication type of "Key".
1. Destroy the old key pair of the server, create a new key pair and start SSH server, see
Figure 63, Figure 64.
2. Configure SSH client, see Figure 26, run PuTTYGen.exe in the client, click <Generate>
button to generate the client key pair, as shown in Figure 70.
67
Device Basic Configuration
Figure 70 Generate the Client Key
3. In the generation process, please move the mouse in the screen, otherwise, the progress
bar does not move forward and the generation stops, as shown in Figure 71.
68
Device Basic Configuration
Figure 71 Key Generation
4. As Figure 72 shows, click <Save private key> to save the private key as 444.ppk, and
copy the public key to the space of Key Value in the SSH Key Configuration interface and
input the key name 444, as shown in Figure 26.
69
Device Basic Configuration
Figure 72 Generate the Key Value
5. Set SSH user name to 444, service to SSH, authen-type to key, key name to 444, see
Figure 24
6. Establish a connection with the SSH server. First, run the PuTTY.exe software, as shown
in Figure 73; input the IP address of the SSH server "192.168.0.2" in the space of Host
Name (or IP address).
70
Device Basic Configuration
Figure 73 SSH Client Configuration of the “key” Authentication
7. Click [SSH] →[Auth] in the left side of the Figure 73, and the screen shown in Figure 74
appears, click <Browse> and choose the private file saved in the step 4.
71
Device Basic Configuration
Figure 74 Choose the Key File
8. Click <Open> button; input the user name to enter the switch configuration interface, as
shown in Figure 75.
72
Device Basic Configuration
Figure 75 Login Interface of the SSH Public Key Authentication
5.12 SSL Configuration
5.12.1 Introduce
SSL (Secure Socket Layer) is a security protocol and provides the security link for the
TCP-based application layer protocol, such as HTTPS. SSL encrypts the network
connection at the transport layer and uses the symmetric encryption algorithm to guarantee
the data security, and uses the secret key authentication code to ensure the information
reliability. This protocol is widely used in Web browser, receiving and sending emails,
network fax, real time communication, and so on, providing an encryption protocol for the
security transmission in the network.
Once a switch enables SSL, users must use the secure link https, such as
https://192.168.0.2, to access the switch.
5.12.2 Web Configuration
1. Enable HTTPS protocol
73
Device Basic Configuration
Caution:
The default certificate and private key provided by the company have already been imported to
the switch. Users can enable SSL protocol directly and access the switch in HTTPS mode.
Click [Device Basic Configuration] → [SSH configuration] → [SSH Configuration] to enter the
SSL configuration page, as shown in Figure 76.
Figure 76 Enable HTTPS Protocol
Server state
Option: Enable/Disable
Default: Disable
Function: Enable or disable the SSL protocol.
Explanation: After enabling SSL, users must use the secure link https://ip address to access
the switch.
Certificate/Private key
Function: Input correct certificate and private key, then click <Add> button to import them to
switch.
2. Input the username and password to successfully log into switch through HTTPS.
74
Device Basic Configuration
5.13 File Transmission Service
File transmission service enables mutual file backup between the server and the client.
When a file on the server (or client) is changed, you can obtain the backup file from the client
(or server) through FTP or TFTP.
The switch can serve as the client or server to upload and download files through FTP or
TFTP.
5.13.1 TFTP Service
1. The switch works as the TFTP client.
First, install TFTP server, as shown in Figure 77. In Current Directory, browse the file
storage path in use. Input the server IP address in Server interface.
service] to enter TFTP client configuration page, as shown in Figure 78.
75
Figure 78 TFTP Client Service
Server IP address
Format: A.B.C.D
Description: Input the server IP address.
Local file name
Device Basic Configuration
Range: 1~100 characters
Description: Input the file name of the switch.
Server file name
Range: 1~100 characters
Description: Input the file name of the server.
Transmission type:
Configuration items: binary/ascii
Default: binary
Function: Select the file transmission standard.
Explanation: ascii means using ASCII standard to transmit file; binary means using binary
standard to transmit file.
Method: Click <Upload to PC> to upload the file from switch to server or <Download to
Device> to download file from server to switch.
When file transmission succeeds, the following information appears on the Web
interface, as shown in Figure 79 and Figure 80.
76
Figure 79 Successful File Upload through TFTP
Caution:
In the file transmission process, keeps the TFTP server running.
Software version file is not a text file, and it must adopt the binary standard for transmission
Figure 80 Successful File Download through TFTP
Device Basic Configuration
2. The switch works as the TFTP server.
Click [Device Basic Configuration] → [File transmit] → [TFTP Service] → [TFTP server
service] to enter the TFTP server configuration page, as shown in Figure 81.
Figure 81 TFTP Server Service
Server state
Configuration items: Close/Open
Default: Close
Function: Enable/Disable the TFTP server function.
TFTP Timeout
77
Device Basic Configuration
Caution:
During file transmission, keep TFTP client software running.
Range: 5~3600s
Default: 20s
Function: Configure the timeout of TFTP server connection.
TFTP Retransmit times
Range: 1~20
Default: 5
Function: Configure the retransmission times of TFTP server during timeout.
Install TFTP client software, as shown in Figure 82. Input switch IP address in Host; select
the client file storage path in Local File; input the file name saved in switch in Remote File;
click <Get> to download file from switch to client; click <Put> to upload client file to switch.
Figure 82 TFTP Client Configuration
5.13.2 FTP Service
1. The switch works as the FTP client.
First, install FTP server. Click [Security] → [users/rights] to open the dialog box. Click
<new user> to create a new FTP user, as shown in Figure 83. Input username and
78
Device Basic Configuration
password, for example, username: admin; password: 123. Click <OK>.
Figure 83 Creating a New FTP User
Input the file storage path in server in Home Directory, as shown in Figure 84. Click
In the file transmission process, keep FTP server software running.
Software version file is not a text file, and it must adopt the binary standard for transmission.
Explanation: ascii means using ASCII standard to transmit file; binary means using binary
standard to transmit file.
Method: Click <Upload to PC> to upload the file from switch to server. Click <Download to
Device> to download file from server to switch.
When file transmission succeeds, the following information appears on the Web interface,
as shown in Figure 86 and Figure 87.
Figure 86 Successful File Upload through FTP
Figure 87 Successful File Download through FTP
2. The switch works as an FTP server.
Click [Device Basic Configuration] → [File transmit] → [FTP Service] → [FTP server
service] to enter FTP server configuration page, as shown in Figure 88.
81
Figure 88 TFTP Server Service
FTP Server state
Options: Close/open
Default: close
Function: Enable or disable the FTP server function.
FTP Timeout
Range: 5~3600s
Device Basic Configuration
Default: 600s
Function: Configure the timeout of FTP server connection.
Description:
If no data is transmitted between the FTP server and client within the timeout, the connection
between them is disconnected.
Configure the username and password used for logging in to the FTP server, as shown in
Figure 89.
Figure 89 FTP Server User Name and Password Configuration
{Username, Password}
Range: {1~16 characters, 1~8 characters}
Default: {admin, 123}
Function: Configure the username and password used for logging in to the FTP server.
Description: When the switch works as an FTP server, it can be connected to multiple FTP
82
Device Basic Configuration
clients at the same time.
State
Options: Plain text/Encrypted text
Default: Plain text
Function: Select the password display mode.
Click [Start] → [Run] in the Windows OS. The Run dialog box is displayed. Input "cmd"
and press Enter. The following page is displayed.
Figure 90 CLI
The file transmission path can be changed. Log in to the FTP server, as shown in Figure
91.
83
Device Basic Configuration
Figure 91 FTP Server Connection
Use the configured user name "admin" and password "123" to log in to the FTP server, as
shown in Figure 92.
Figure 92 Logging in to the FTP Server
Use the "get" command to download the file to the designated path on client, as shown in
Figure 93. Input the "get" command and press Enter. Input the name of file on switch to be
84
Device Basic Configuration
downloaded in Remote file and the file name saved in client in Local file.
Figure 93 Downloading File from Switch to Client
Use the "put" command to upload the file in the designated path in the client to the server,
as shown in Figure 94. Run the "put" command and press Enter. Input the file name in
switch in Remote file and the name of file in the client to be uploaded in Local File.
Figure 94 Uploading File from Client to Switch
85
Device Basic Configuration
5.14 MAC Address Configuration
5.14.1 Introduction
When forwarding a packet, the switch searches for the forwarding port in the MAC address
table based on the destination MAC address of the packet.
A MAC address can be either static or dynamic.
A static MAC address is configured by a user. It has the highest priority (not overridden by
dynamic MAC addresses) and is permanently valid.
Dynamic MAC addresses are learned by the switch in data forwarding. They are valid only
for a certain period. The switch periodically updates its MAC address table. When receiving
a data frame to be forwarded, the switch learns the source MAC address of the frame,
establishes a mapping with the receiving port, and queries the forwarding port in the MAC
address table based on the destination MAC address of the frame. If a match is found, the
switch forwards the data frame from the corresponding port. If no match is found, the switch
broadcasts the frame in its broadcast domain.
Aging time starts from when a dynamic MAC address is added to the MAC address table. If
no port receives a frame with the MAC address within one to two times the aging time, the
switch deletes the entry of the MAC address from the dynamic forwarding address table.
Static MAC addresses do not involve the concept of aging time.
The switch supports a maximum of 1024 static unicast entries.
5.14.2 Web Configuration
1. Configure MAC binding
Click [Device Basic Configuration] → [MAC address table configuration] → [MAC bind
Configuration] to enter MAC binding configuration page, as shown in Figure 95.
86
Device Basic Configuration
Figure 95 MAC Bind Configuration
MAC bind state
Option: Enable/Disable
Default: Disable
Function: Enable or disable MAC binding function. When enable is selected, for a packet
whose source MAC address and VLAN ID are consistent with the MAC address and VLAN
ID of a static unicast MAC address entry, the switch checks whether the inlet port is
consistent with the port of this static unicast MAC address entry. If yes, the switch receives
and forwards the packet. If no, the switch discards the packet. When disable is selected, the
preceding check is not performed.
2. Add a static unicast MAC address.
Click [Device Basic Configuration] → [MAC address configuration] → [Unicast address
configuration] to enter unicast MAC address configuration page, as shown in Figure 96.
Figure 96 Adding a Static FDB Entry
MAC address
Format: HH-HH-HH-HH-HH-HH (H is a hexadecimal number)
Function: Configure the unicast MAC address. The lowest bit in the first byte is 0.
VLAN ID
Options: all created VLAN IDs
Default: VLAN1
Configuration type
Options: static/blackhole
Default: static
87
Device Basic Configuration
Function: Select the type of the MAC address entry.
Description: Static means establishing mapping between the designated MAC address and
port number or VLAN ID.
Blackhole is to drop the packet whose source MAC address or destination MAC address is
the designated MAC address.
Port list
Options: all switch ports
Function: Select ports to forward the packets with this destination MAC address. The
selected ports must be in the specified VLAN.
3. Delete a unicast address.
Click [Device Basic Configuration] → [MAC address configuration] → [Delete unicast
address] to enter the configuration page, as shown in Figure 97.
Figure 97 Deleting a Unicast MAC Address
Select the criterion for deleting the unicast address. If multiple criteria are selected, their
relationship is logical "And".
4. Configure MAC address aging time.
Click [Device Basic Configuration] → [MAC address configuration] → [MAC address aging
time setting] to enter the aging time configuration page, as shown in Figure 98.
88
Device Basic Configuration
Figure 98 MAC Address Aging Time Configuration
Aging time
Range: 10~100000s
Default: 300s
Function: Set the aging time for the dynamic MAC address entry.
Description: When aging time is set to 0, aging is prohibited. In this case, the address
dynamically learned does not age with time.
5. Query unicast MAC addresses.
Click [Device Basic Configuration] → [MAC address configuration] → [MAC address query]
to enter the unicast MAC address query page, as shown in Figure 99.
Figure 99 Unicast MAC Address Query
Select the criterion for unicast MAC address query. If multiple criteria are selected, their
relationship is logical "And". For example: If you query the unicast address of port Ethernet
1/1, the following page is displayed.
Figure 100 Unicast MAC Address List
6. View unicast address entries.
Click [Device Basic Configuration] → [MAC address configuration] → [Show mac-address
table] to enter the unicast MAC address query page. All dynamic and static entries are
displayed, as shown in Figure 101.
89
Device Basic Configuration
Figure 101 Unicast Address Query
5.15 Basic Configuration Maintenance and Debugging Information
When configuring the switch, you may need to check the correctness of various
configurations to ensure normal running; or when certain anomalies occur, you may need to
locate the fault. In these cases, you can perform the following operations to view system
configurations and running status.
1. Ping operation.
Click [Device Basic Configuration] → [Basic configuration debug] → [Ping and Traceroute] to
enter ping operation page, as shown in Figure 102.
Figure 102 Ping Operation
IP address
Format: A.B.C.D
Description: Input the IP address of the remote device.
Hostname
Range: 1~30 characters
90
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.