Lantech IES-22812F-2P User Manual

User Manual
V1.01
Nov-2010
Lantech
12 100FX + 8 10/100TX + 2 1000 SFP Industrial Power Station L2 Plus Managed Switch
FCC Warning
This Equipment has been tested and found to comply with the limits for a Class-A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. It may cause harmful interference to radio communications if the equipment is not installed and used in accordance with the instructions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.  Increase the separation between the equipment and receiver.  Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
CE Mark Warning
This is a Class-A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures.
Content
Chapter 1 Introduction............................................ 1
1.1 Hardware Features ...................................................1
1.2 Software Features.....................................................2
1.3 Package Contents.....................................................4
Chapter 2 Hardware Description............................ 5
2.1 Physical Dimensions.................................................5
2.2 Front (LED) Panel .....................................................5
2.3 Rear Panel ................................................................6
2.4 LED Indicators...........................................................7
Chapter 3 Hardware Installation ............................ 9
3.1 Rack-mounted Installation.........................................9
3.2 Cabling....................................................................11
3.3 Wiring the Power Inputs..........................................14
3.4 Wiring the P-Fail Alarm Contact..............................15
Chapter 4 Network Application ............................ 16
4.1 X-Ring Application...................................................17
4.2 Coupling Ring Application.......................................18
4.3 Dual Homing Application.........................................19
Chapter 5 Console Management .......................... 20
5.1 Connecting to the Console Port ..............................20
5.2 Pin Assignment .......................................................20
5.3 Login in the Console Interface ................................21
5.4 CLI Management.....................................................22
5.5 Commands Level ....................................................22
Chapter 6 Web-Based Management ..................... 24
6.1 About Web-based Management .............................24
6.2 Preparing for Web Management.............................24
6.3 System Login...........................................................25
6.4 System Information .................................................26
6.5 IP Configuration ......................................................27
6.6 DHCP Server ..........................................................28
6.6.1 System configuration ..............................................29
6.6.2 Client Entries...........................................................30
6.6.3 Port and IP Bindings ...............................................31
6.7 TFTP .......................................................................32
6.7.1 Update Firmware ....................................................32
6.7.2 Restore Configuration.............................................33
6.7.3 Backup Configuration..............................................34
6.8 System Event Log...................................................35
6.8.1 Syslog Configuration...............................................35
6.8.2 System Event Log—SMTP Configuration...............37
6.8.3 System Event Log—Event Configuration................39
6.9 Fault Relay Alarm....................................................41
6.10 SNTP Configuration ................................................42
6.11 IP Security...............................................................46
6.12 User Authentication.................................................48
6.13 Advanced Configuration..........................................49
6.13.1 Broadcast Storm Filter............................................49
6.13.2 Aging Time.............................................................51
6.13.3 Jumbo Frame.........................................................52
6.14 Port Statistics ..........................................................53
6.15 Port Counters..........................................................55
6.16 Port Control.............................................................58
6.17 Port Trunk................................................................60
6.17.1. Aggregator setting.................................................60
6.17.2. Aggregator Information..........................................62
6.17.3. State Activity..........................................................66
6.18 Port Mirroring...........................................................68
6.19 Rate Limiting ...........................................................69
6.20 VLAN configuration .................................................70
6.20.1. Port-based VLAN ..................................................70
6.20.2. 802.1Q VLAN........................................................74
6.21 Rapid Spanning Tree ..............................................79
6.21.1. System Configuration............................................79
6.21.2. Port Configuration .................................................81
6.22 SNMP Configuration ...............................................83
6.22.1.
System Configuration............................................83
6.22.2. Trap Configuration.................................................85
6.22.3. SNMPV3 Configuration.........................................86
6.23 QoS Configuration...................................................89
6.24 IGMP Configuration.................................................91
6.25 Pro-Ring ..................................................................93
6.26 LLDP Configuration.................................................95
6.27 Security—802.1X/Radius Configuration..................96
6.27.1. System Configuration............................................96
6.27.2. Port Configuration .................................................97
6.27.3. Misc Configuration.................................................98
6.28 MAC Address Table..............................................100
6.28.1. Static MAC Address............................................100
6.28.2. MAC Filtering.......................................................102
6.28.3. All MAC Addresses .............................................103
6.28.4. MAC Address Table—Multicast Filtering.............104
6.29 Access Control List ...............................................106
6.30 Factory Default......................................................107
6.31 Save Configuration................................................108
6.32 System Reboot......................................................109
Troubleshooting ................................................... 110
Appendix A — RJ-45 Pin Assignment................... 111
Appendix B — Command Sets.............................. 114
Commands Set List...........................................................114
System Commands Set.....................................................114
Port Commands Set..........................................................118
Trunk Commands Set .......................................................120
VLAN Commands Set.......................................................122
Spanning Tree Commands Set.........................................124
QOS Commands Set.........................................................127
IGMP Commands Set .......................................................128
Mac / Filter Table Commands Set.....................................129
SNMP Commands Set......................................................131
Port Mirroring Commands Set...........................................134
802.1x Commands Set......................................................135
TFTP Commands Set........................................................138
SystemLog, SMTP and Event Commands Set .................139
SNTP Commands Set.......................................................142
Pro-Ring Commands Set...................................................144
LLDP Command Set .........................................................145
Access Control List Command Set....................................146
1
Chapter 1 Introduction
1.1 Hardware Features
Switch Architecture
Back-plane (Switching Fabric): 8Gbps Packet throughput ability(Full-Duplex): 11.9Mpps @64bytes
Transfer Rate
14,880pps for Ethernet port 148,800pps for Fast Ethernet port 1,488,000pps for Gigabit Fiber Ethernet port
Packet Buffer
4Mbits
Mac Address
8K MAC address table
Flash ROM
4Mbytes
DRAM
64Mbytes
Jumbo Frame
9022bytes (for Gigabit ports)
Connector
10/100TX: 8 x RJ-45 100FX : 12 x SC Gigabit Mini-GBIC: 2 x Mini-GBIC sockets Console port: RJ-45 type
Network Cable
10Base-T: 2-pair UTP/STP Cat. 3, 4, 5 cable EIA/TIA-568 100-ohm (100m)
100Base-TX: 2-pair UTP/STP Cat. 5/5E cable EIA/TIA-568 100-ohm (100m)
Optical Cable
Multi-mode: 50/125um~62.5/125um Single-mode: 9/125um
Protocol
CSMA/CD
The 8 10/100TX + 12 100FX + 2 Gigabit Mini-GBIC Managed Industrial Switch is a cost-effective solution and meets the high reliability requirements demanded by industrial applications. The 8 10/100TX + 12 100FX + 2 Gigabit Mini-GBIC Managed Industrial Switch can be easily managed through the Web GUI. Using fiber port can extend the connection distance that increases the network elasticity and performance. It provides the X-Ring function that can prevent the network connection failure, and meets the standard of IEC-61850-3 and IEEE­1613 for the substation environment applications.
LED Front Panel
Per unit: Power 1 (Green), Power 2 (Green), P-Fail (Red), R.Master (Green)
Port1~22 : Link/Activity (Green), Port13~20: 100M (Green)
Rear Panel
Per unit: Power 1 (Green), Power 2 (Green), P-Fail (Red), R.Master (Green)
Port1~22 : Link/Activity (Green), Port13~20: Full-duplex (Amber)
Reverse Polarity Protection
Present
Overload Current Protection
Present
Power Supply
AC/DC
Power Consumption
27.6 Watts max. @ 110 VDC
26.2 Watts max. @ 110 VAC
Operating Humidity
5% to 95% (Non-condensing)
Operating Temperature
Wide Operating Temperature (-40℃~85℃)
Storage Temperature
-40 to 85℃℃
Case Dimensions
Metal case. IP-30, 440mm (W) x 44mm (H) x 280mm (D)
Installation
DIN-rail and Wall-mount Design
1.2 Software Features
Management
SNMP v1 v2c, v3 / Web / Telnet / CLI
SNMP MIB
RFC 1215 Trap, RFC1213 MIBII, RFC 1157 SNMP MIB, RFC 1493 Bridge MIB, RFC 2674 VLAN MIB, RFC 1643 , RFC 1757, RSTP MIB, LLDP MIB, Private MIB
VLAN
Port Based VLAN IEEE 802.1Q Tag VLAN (256 entries)/ VLAN ID (Up to 4K, VLAN ID can be assigned from 1 to 4094.) GVRP (256 Groups)
Port Trunk with LACP
LACP Port Trunk: 13 Trunk groups/Maximum 4 trunk members
LLDP
Support LLDP to allow switch to advise its identification and capability on the LAN
2
IES-22812F-2P: 100~240V
IES-22812F-2P:
Spanning Tree
Support IEEE802.1w Rapid Spanning Tree
Pro-Ring
Support X-Ring, Dual Homing, Couple Ring Topology. Provide redundant backup feature and the recovery time
below 10ms.
Quality of Service
The quality of service determined by port, Tag and IPv4 Type of service, IPv4 Different Service
Class of Service
Support IEEE802.1p class of service, per port provides 4 priority queues
Port Security
Support 50 entries of MAC address for static MAC and another 50 for MAC filter
Port Mirror
Support 3 mirroring types: “RX, TX and Both packet”.
IGMP
Support IGMP snooping v1,v2 256 multicast groups and IGMP query
IP Security
Support 10 IP addresses that have permission to access the switch management and to prevent unauthorized intruder.
Login Security
Support IEEE802.1x Authentication/RADIUS
Bandwidth Control
Support ingress packet filter and egress packet limit The egress rate control supports all of packet type and the
limit rates are 0~100Mbps for Port1~20 and 0~1000Mbps for Port21/22.
Flow Control
Support Flow Control for Full-duplex and Back Pressure for Half-duplex
System Log
Support System log record and remote system log server
SMTP
Support SMTP Server and 6 e-mail accounts for receiving event alert
Relay Alarm
Provides one relay output for port breakdown & power failure Alarm Relay current carrying ability: 1A @ DC24V
SNMP Trap
Up to 3 Trap stations Cold start, Warm start, Port link up, Port link down,
Authentication Failure, Port fault relay alarm, X-Ring topology change
DHCP
Provide DHCP Client/ DHCP Server functions
DNS
Provide DNS client feature and support Primary and Secondary DNS server
SNTP
Support SNTP to synchronize system clock in Internet
Firmware Update
Support TFTP firmware update, TFTP backup and restore.
Configuration Upload and
Support binary configuration file for system quick installation
3
Download ifAlias
Each port allows an alphabetic string of 128-byte assigned as its own unique name via the CLI or SNMP interface.
1.3 Package Contents
Please refer to the package content list below to verify them against the checklist.
User manual x 1  Mounting plate x 2  RJ-45 to DB9-Female cable x 1
Compare the contents of the industrial switch with the standard checklist above. If any item is damaged or missing, please contact the local dealer for service.
4
12 100FX + 8 10/100TX + 2 1000 SFP Industrial Power Station L2+ Managed Switch x 1
5
Chapter 2 Hardware Description
In this paragraph, we will describe the Industrial switch’s hardware spec, port, cabling information, and wiring installation.
2.1 Physical Dimensions
Mechanical Dimensions
2.2 Front (LED) Panel
Front Panel of the industrial switch
12 100FX + 8 10/100TX + 2 1000 SFP Industrial Power Station L2+ Managed Switch dimensions (W x H x D) are 440mm x 44mm x 280mm as the figure shown below.
The figure below illustrates the front panel of the 12 100FX + 8 10/100TX + 2 1000 SFP Industrial Power Station L2+ Managed Switch.
2.3 Rear Panel
The 12 fiber ports, 8 copper ports, 2 SFP ports, console port and terminal block are located on the rear panel of the Managed Industrial Switch.
Front Panel of the industrial switch
6
2.4 LED Indicators
The diagnostic LED indicators located on the front panel & rear panel of the industrial switch provide real-time information of the system and optional status. The following table provides description of the LED status and their meanings for the switch.
Front Panel
LED Color Status Meaning
On The switch is the MASTER device of the X-Ring group
R.M.
Green
Off The switch is not the MASTER device of the X-Ring group
On
z Power1 is inactive z Power2 is inactive z Port Link-down z Port Link-broken
P-Fail
Red
Off No failure occurs On Power 1 is active
P1
Green
Off Power 1 is inactive On Power 2 is active
P2
Green
Off Power 2 is inactive
On
1000M (21, 22) 100M (1 ~ 20)
SPD
Green
Off 10M (13 ~ 20)
On The port is connected to network Blinking Packet transmitting/receiving
LNK/ACT
Green
Off Not connected to network
7
Rear Panel
LED Color Status Meaning
On The switch is the MASTER device of the X-Ring group
R.M.
Green
Off The switch is not the MASTER device of the X-Ring group
On
z Power1 is inactive z Power2 is inactive z Port Link-down z Port Link-broken
P-Fail
Red
Off No failure occurs On Power 1 is active
P1
Green
Off Power 1 is inactive On Power 2 is active
P2
Green
Off Power 2 is inactive On The port is connected to network Blinking Packet transmitting/receiving
LNK/ACT (Port 1~22)
Green
Off Not connected to network
On
Full-duplex
FDX (Port 13~20)
Amber
Off
Half-duplex
8
9
Chapter 3 Hardware Installation
3.1 Rack-mounted Installation
A. Position one bracket to align with the holes on one side of the switch and secure
it with the smaller bracket screws. Then attach the remaining bracket to the other side of the Switch.
Figure 2-4. Attach mounting brackets with screws
B.
The 12 100FX + 8 10/100TX + 2 1000 SFP Industrial Power Station L2+ Managed Switch comes with a rack-mounted kit and can be mounted in an EIA standard size, 19-inch Rack. The Switch can be placed in a wiring closet with other equipment. Perform the following steps to rack mount the switch:
After attaching the mounting brackets, position the 12 100FX + 8 10/100TX + 2
1000 SFP Industrial Power Station L2+ Managed Switch in the rack by lining
up the holes in the brackets with the appropriate holes on the rack. Secure the Switch to the rack by a screwdriver with the rack-mounting screws.
Figure 2-5. Mount the Switch in 19” Rack
Note: For proper ventilation, allows about at least 4 inches (10 cm) of clearance on the front and 3.4 inches (8 cm) on the back of the Switch. This is especially important for enclosed rack installation.
10
11
3.2 Cabling
Twisted-pair segment can be established by using unshielded twisted pair (UTP) or shielded twisted pair (STP) cabling. The cable between the link partner (switch, hub, workstation, etc.) and the switch must be less than 100 meters (328 ft.) long and comply with the IEEE 802.3ab 1000Base-T standard for Category 5e or above.
The small form-factor pluggable (SFP) is a compact optical transceiver used in optical communications for both telecommunication and data communication applications. Please note that you must use the class I optical transceivers which conform to U.S. code of federal regulation, 21 CFR 1040.
To connect the transceiver and LC cable, please follow the steps shown as below:
First, insert the transceiver into the mini-GBIC slot. Notice that the triangle mark indicates bottom of the slot.
Transceiver to the SFP slot
Make sure the transceiver is aligned correctly and then slide it into the mini-GBIC slot until a click is heard.
Transceiver Inserted
Second, insert the fiber cable of LC connector into the transceiver.
LC connector to the transceiver
12
13
To remove the LC connector from the transceiver, please follow the steps shown below:
First, press the upper side of the LC connector from the transceiver and pull it out to release.
Remove LC connector
Second, push down the metal loop and pull the transceiver out by the plastic part.
Transceiver pulled out from the SFP slot
3.3 Wiring the Power Inputs
Please follow the steps below to insert the power wires.
1. Attach AC or DC power wires to the contacts. Power 1: Pin 1 (-), Pin 3 (+) for DC power source
Pin 1 (N), Pin 3 (L) for AC power source
Power 2: Pin 5 (-), Pin 7 (+) for DC power source
Pin 5 (N), Pin 7 (L) for AC power source
Ground: Pin 2, 4, 6 and 8
2. Tighten the wire-clamp screws to prevent the wires from loosing.
14
IES-22812F-2P power inputs wiring
3.4 Wiring the P-Fail Alarm Contact
Attach the wires to form a Normally Close circuit. When power or network linking failure occurs, the system will break the circuit to Open status. Please refer to the figure illustrated below.
15
IES-22812F-2P P-Fail Alarm connectors
Chapter 4 Network Application
This chapter provides some sample applications to help the user to have more actual idea of industrial switch function application. A sample application of the industrial switch is shown as below:
16
4.1 X-Ring Application
The industrial switch supports the X-Ring protocol that can help the network system to recover from network connection failure within 20ms or less, and make the network system more reliable. The X-Ring algorithm is similar to Spanning Tree Protocol (STP) and Rapid STP (RSTP) algorithm but its recovery time is less than STP/RSTP. The figure below is a sample of X-Ring application.
17
4.2 Coupling Ring Application
In the network, it may have more than one X-Ring group. Using the coupling ring function can connect each X-Ring for the redundant backup. It can ensure the transmissions between two ring groups not to fail. The following figure is a sample of coupling ring application.
18
4.3 Dual Homing Application
Dual Homing function is to prevent the connection loss from between X-Ring group and upper level/core switch. Assign two ports to be the Dual Homing port that is backup port in the X-Ring group. The Dual Homing function only works when the X­Ring function is active. Each X-Ring group only has one Dual Homing port.
[NOTE] In Dual Homing application architecture, the upper level switches need to
enable the Rapid Spanning Tree protocol.
19
Chapter 5 Console Management
5.1 Connecting to the Console Port
The supplied cable which one end is RS-232 connector and the other end is RJ-45 connector. Attach the end of RS-232 connector to PC or terminal and the other end of RJ-45 connector to the console port of the switch. The connected terminal or PC must support the terminal emulation program.
5.2 Pin Assignment
DB9 Connector RJ-45 Connector
NC 1 Orange/White 2 2 Orange 3 3 Green/White NC 4 Blue 5 5 Blue/White NC 6 Green NC 7 Brown/White NC 8 Brown
20
5.3 Login in the Console Interface
When the connection between Switch and PC is ready, turn on the PC and run a terminal emulation program or Hyper Terminal and configure its communication
parameters to match the following default characteristics of the console port:
Baud Rate: 9600 bps Data Bits: 8 Parity: none Stop Bit: 1 Flow control: None
The settings of communication parameters
After finishing the parameter settings, click ‘OK’. When the blank screen shows up, press Enter key to have the login prompt appears. Key in ‘root’ (default value) for both User name and Password (use Enter key to switch), then press Enter key and the Main Menu of console management appears.
21
Console login interface
5.4 CLI Management
The system supports the console management—CLI command. After you log in on to the system, you will see a command prompt. To enter CLI management interface, type in “enable” command.
CLI command interface
The following table lists the CLI commands and description.
5.5 Commands Level
Modes
Access Method
Prompt
Exit Method
About This Mode
User EXEC
Begin a session with your switch.
switch>
Enter
logout or quit.
The user commands available at the user level are a subset of those available at the privileged level. Use this mode to
• Perform basic tests.
• Display system
22
information.
Privileged EXEC
Enter the enable command while in User EXEC mode.
switch#
Enter disable to exit.
The privileged command is the advanced mode. Use this mode to
• Display advanced function status
• Save configuration
Global Configuration
Enter the configure command while in privileged EXEC mode.
switch (config)#
To exit to privileged EXEC mode, enter exit or end
Use this mode to configure those parameters that are going to be applied to your switch.
VLAN database
Enter the
vlan database
command while in privileged EXEC mode.
switch (vlan)#
To exit to user EXEC mode, enter exit.
Use this mode to configure VLAN­specific parameters.
Interface configuration
Enter the interface of fast Ethernet command (with a specific interface) while in global configuration mode
switch (config-if)#
To exit to global configuratio n mode, enter exit. To exit to privileged EXEC mode, enter exit or end.
Use this mode to configure parameters for the switch and Ethernet ports.
23
24
Chapter 6 Web-Based Management
This section introduces the configuration and functions of the Web-Based management.
6.1 About Web-based Management
There is an embedded HTML web site residing in flash memory on CPU board of the switch, which offers advanced management features and allows users to manage the switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer.
The Web-Based Management supports Internet Explorer 6.0 or later version. And, it is applied for Java Applets for reducing network bandwidth consumption, enhance access speed and present an easy viewing screen.
6.2 Preparing for Web Management
Before using the web management, install the industrial switch on the network and make sure that any one of the PCs on the network can connect with the industrial switch through the web browser. The industrial switch default value of IP, subnet mask, username and password are listed as below:
 IP Address: 192.168.16.1  Subnet Mask: 255.255.255.0  Default Gateway: 192.168.16.254  User Name: root  Password: root
6.3 System Login
1. Launch the Internet Explorer on the PC
2. Key in “http:// “+” the IP address of the switch”, and then Press “Enter”.
3. The login screen will appear right after
4. Key in the user name and password. The default user name and password are the same as ‘root’.
5. Press Enter or click the OK button, and then the home screen of the Web-based management appears.
25
26
6.4 System Information
User can assign the system name, description, location and contact personnel to identify the switch. The version table below is a read-only field to show the basic information of the switch.
System Name: Assign the system name of the switch (The maximum length is
64 bytes)
System Description: Describes the switch.  System Location: Assign the switch physical location (The maximum length is
64 bytes).
System Contact: Enter the name of contact person or organization.  Firmware Version: Displays the switch’s firmware version  Kernel Version: Displays the kernel software version  MAC Address: Displays the unique hardware address assigned by manufacturer
(default)
And then, click
Apply
.
System information interface
6.5 IP Configuration
The switch is a network device which needs to be assigned an IP address for being identified on the network. Users have to decide a means of assigning IP address to the switch.
DHCP Client: Enable or disable the DHCP client function. When DHCP client
function is enabled, the switch will be assigned an IP address from the network DHCP server. The default IP address will be replaced by the assigned IP address on DHCP server. After the user clicks Apply, a popup dialog shows up to inform the user that when the DHCP client is enabled, the current IP will lose and user should find the new IP on the DHCP server.
IP Address: Assign the IP address that the network is using. If DHCP client
function is enabled, this switch is configured as a DHCP client. The network DHCP server will assign the IP address to the switch and display it in this column. The default IP is 192.168.16.1 or the user has to assign an IP address manually when DHCP Client is disabled.
Subnet Mask: Assign the subnet mask to the IP address. If DHCP client function
is disabled, the user has to assign the subnet mask in this column field.
Gateway: Assign the network gateway for the switch. If DHCP client function is
disabled, the user has to assign the gateway in this column field. The default gateway is 192.168.16.254.
DNS1: Assign the primary DNS IP address.  DNS2: Assign the secondary DNS IP address.
And then, click
Apply
.
27
IP configuration interface
6.6 DHCP Server
DHCP is the abbreviation of Dynamic Host Configuration Protocol that is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. The system provides the DHCP server function. Having enabled the DHCP server function, the switch system will be configured as a DHCP server.
28
29
6.6.1 System configuration
DHCP Server: Enable or Disable the DHCP Server function. Enable—the switch
will be the DHCP server on your local network.
Low IP Address: Type in an IP address. Low IP address is the beginning of the
dynamic IP range. For example, dynamic IP is in the range between
192.168.16.100 ~ 192.168.16.200. In contrast, 192.168.16.100 is the Low IP address.
High IP Address: Type in an IP address. High IP address is the end of the
dynamic IP range. For example, dynamic IP is in the range between
192.168.16.100 ~ 192.168.16.200. In contrast, 192.168.16.200 is the High IP address.
Subnet Mask: Type in the subnet mask of the IP configuration.  Gateway: Type in the IP address of the gateway in your network.  DNS: Type in the Domain Name Server IP Address in your network.  Lease Time (sec): It is the time period that system will reset the dynamic IP
assignment to ensure the dynamic IP will not been occupied for a long time or the server doesn’t know that the dynamic IP is idle.
And then, click
Apply
.
DHCP Server Configuration interface
6.6.2 Client Entries
When the DHCP server function is enabled, the system will collect the DHCP client information including the assigned IP address, the MAC address of the client device, the IP assigning type, status and lease time.
DHCP Client Entries interface
30
6.6.3 Port and IP Bindings
Assign the dynamic IP address bound with the port to the connected client. The user is allowed to fill each port column with one particular IP address. When the device is connecting to the port and asks for IP assigning, the system will assign the IP address bound with the port.
Port and IP Bindings interface
31
6.7 TFTP
It provides the functions allowing the user to update the switch firmware via the Trivial File Transfer Protocol (TFTP) server. Before updating, make sure the TFTP server is ready and the firmware image is located on the TFTP server.
6.7.1 Update Firmware
TFTP Server IP Address: Type in your TFTP server IP.  Firmware File Name: Type in the name of the firmware image file to be updated.
Click
Apply
.
Update Firmware interface
32
6.7.2 Restore Configuration
You can restore a previous backup configuration from the TFTP server to recover the settings. Before doing that, you must locate the image file on the TFTP server first and the switch will download back the flash image.
TFTP Server IP Address: Type in the TFTP server IP.  Restore File Name: Type in the correct file name for restoring.
Click
Apply
.
Restore Configuration interface
33
6.7.3 Backup Configuration
You can back up the current configuration from flash ROM to the TFTP server for the purpose of recovering the configuration later. It helps you to avoid wasting time on configuring the settings by backing up the configuration.
TFTP Server IP Address: Type in the TFTP server IP.  Backup File Name: Type in the file name.
Click
Apply
.
Backup Configuration interface
34
6.8 System Event Log
This page allows the user to decide whether to send the system event log, and select the mode which the system event log will be sent to client only, server only, or both client and server. What kind of event log will be issued to the client/server depends on the selection on the Event Configuration tab. There are five types of event—Device Cold Start, Device Warm Start, Authentication Failure, X-Ring Topology Change, and Port Event—available to be issued as the event log.
6.8.1 Syslog Configuration
Syslog Client Mode: Select the system log mode—Client Only, Server Only, or
Both. ‘Client Only’ means the system event log will only be sent to this interface of the
switch, but on the other hand ‘Server Only’ means the system log will only be sent to the remote system log server with its IP assigned. If the mode is set in ‘Both’, the system event log will be sent to the remote server and this interface.
System Log Server IP Address: When the ‘Syslog Mode’ item is set as Server
Only/Both, the user has to assign the system log server IP address to which the log will be sent.
Click
Reload
to refresh the event log displaying area.
Click
Clear
to clear all the current event logs.
Make sure the selected mode is correct, and click
Apply
to have the setting take
effect.
35
Syslog Configuration interface
36
37
6.8.2 System Event Log—SMTP Configuration
Simple Mail Transfer Protocol (SMTP) is the standard for email transmissions across the network. You can configure the SMTP server IP, mail subject, sender, mail account, password, and the recipient email addresses which the e-mail alert will send to. There are also five types of event—Device Cold Start, Device Warm Start, Authentication Failure, X-Ring Topology Change, and Port Event—available to be issued as the e-mail alert. Besides, this function provides the authentication mechanism including an authentication step through which the client effectively logs in to the SMTP server during the process of sending e-mail alert.
Email Alert: With this function being enabled, the user is allowed to configure the
detail settings for sending the e-mail alert to the SMTP server when the events occur.
SMTP Server IP: Assign the mail server IP address (when Email Alert is
enabled, this function will then be available).
Mail Subject: The subject of the mail. Users can modify the string.  Sender: Type in an alias of the switch in complete email address format, e.g.
switch101@123.com, to identify where the e-mail alert comes from.
Authentication: Having ticked this checkbox, the mail account, password and
confirm password column fields will then show up. Configure the email account and password for authentication when this switch logs in to the SMTP server.
Mail Account: Set up the email account, e.g. johnadmin
, to receive the email
alert. It must be an existing email account on the mail server.
Password: Type in the password for the email account.  Confirm Password: Reconfirm the password.  Rcpt e-mail Address 1 ~ 6: You can also fill each of the column fields with up to
6 e-mail accounts to receive the email alert.
Click
Apply
to have the configuration take effect.
SMTP Configuration interface
38
39
6.8.3 System Event Log—Event Configuration
Having ticked the
Syslog/SMTP
checkboxes, the event log/email alert will be sent to the system log server and the SMTP server respectively. Also, Port event log/alert (link up, link down, and both) can be sent to the system log server/SMTP server respectively by setting the trigger condition.
System event selection: There are 4 event types—Device Cold Start, Device
Warm Start, Authentication Failure, and X-ring Topology Change. The checkboxes are not available for ticking unless the Syslog Client Mode on the Syslog Configuration tab and the E-mail Alert on the SMTP Configuration tab are enabled first. ¾ Device cold start: When the device executes cold start action, the system
will issue the event log/email alert to the system log/SMTP server respectively.
¾ Device warm start: When the device executes warm start, the system will
issue the event log/email alert to the system log/SMTP server respectively.
¾ Authentication Failure: When the SNMP authentication fails, the system
will issue the event log/email alert to the system log/SMTP server respectively.
¾ X-ring topology change: When the X-ring topology has changed, the
system will issue the event log/email alert to the system log/SMTP server respectively.
Port event selection: Also, before the drop-down menu items are available, the
Syslog Client Mode selection item on the Syslog Configuration tab and the E­mail Alert selection item on the SMTP Configuration tab must be enabled first. Those drop-down menu items have 3 selections—Link UP, Link Down, and Link UP & Link Down. Disable means no event will be sent to the system log/SMTP
server. ¾ Link UP: The system will only issue a log message when the link-up event of
the port occurs.
¾ Link Down: The system will only issue a log message when the link-down
event of port occurs.
¾ Link UP & Link Down: The system will issue a log message at the time
when port connection is link-up and link-down.
Event Configuration interface
40
41
6.9 Fault Relay Alarm
The Fault Relay Alarm function provides the Power Failure and Port Link Down/Broken detection. With both power input 1 and power input 2 installed and the checkboxes of power 1/power 2 ticked, the P-Fail LED indicator will then be possible to light up when any one of the power failures occurs. As for the Port Link Down/Broken detection, the Fail LED indicator will light up when the port failure occurs; certainly the check box beside the port must be ticked first. Please refer to the segment of ‘
Wiring the P-Fail Alarm Contact
’ for the failure detection.
Power Failure: Tick the check box to enable the function of lighting up the P-Fail
LED on the panel when power fails.
Port Link Down/Broken: Tick the check box to enable the function of lighting up
P-Fail LED on the panel when Ports’ states are link down or broken.
Fault Relay Alarm interface
6.10 SNTP Configuration
SNTP (Simple Network Time Protocol) is a simplified version of NTP which is an Internet protocol used to synchronize the clocks of computers to some time reference. Because time usually just advances, the time on different node stations will be different. With the communicating programs running on those devices, it would cause time to jump forward and back, a non-desirable effect. Therefore, the switch provides comprehensive mechanisms to access national time and frequency dissemination services, organize the time-synchronization subnet and the local clock in each participating subnet peer. Daylight saving time (DST) is the convention of advancing clocks so that afternoons have more daylight and mornings have less. Typically clocks are adjusted forward one hour near the start of spring and are adjusted backward in autumn.
SNTP Client: Enable/disable SNTP function to get the time from the SNTP
server.
Daylight Saving Time: This is used as a control switch to enable/disable daylight
saving period and daylight saving offset. Users can configure Daylight Saving Period and Daylight Saving Offset in a certain period time and offset time while there is no need to enable daylight saving function. Afterwards, users can just set this item as enable without assign Daylight Saving Period and Daylight Saving Offset again.
UTC Timezone: Universal Time, Coordinated. Set the switch location time zone.
The following table lists the different location time zone for your reference.
Local Time Zone Conversion from UTC Time at 12:00 UTC
November Time Zone - 1 hour 11am
Oscar Time Zone -2 hours 10 am
ADT - Atlantic Daylight -3 hours 9 am
42
AST - Atlantic Standard EDT - Eastern Daylight
-4 hours 8 am
EST - Eastern Standard CDT - Central Daylight
-5 hours 7 am
CST - Central Standard MDT - Mountain Daylight
-6 hours 6 am
MST - Mountain Standard PDT - Pacific Daylight
-7 hours 5 am
PST - Pacific Standard ADT - Alaskan Daylight
-8 hours 4 am
ALA - Alaskan Standard -9 hours 3 am
HAW - Hawaiian Standard
-10 hours 2 am
Nome, Alaska -11 hours 1 am
CET - Central European FWT - French Winter MET - Middle European MEWT - Middle European Winter SWT - Swedish Winter
+1 hour 1 pm
EET - Eastern European, USSR Zone 1
+2 hours 2 pm
BT - Baghdad, USSR Zone 2
+3 hours 3 pm
ZP4 - USSR Zone 3 +4 hours 4 pm
ZP5 - USSR Zone 4 +5 hours 5 pm
ZP6 - USSR Zone 5 +6 hours 6 pm
43
WAST - West Australian Standard
+7 hours 7 pm
CCT - China Coast, USSR Zone 7
+8 hours 8 pm
JST - Japan Standard, USSR Zone 8
+9 hours 9 pm
EAST - East Australian Standard GST Guam Standard, USSR Zone 9
+10 hours 10 pm
IDLE - International Date Line NZST - New Zealand Standard NZT - New Zealand
+12 hours Midnight
SNTP Sever URL: Set the SNTP server IP address. You can assign a local
network time server IP address or an internet time server IP address.
Switch Timer: When the switch has successfully connected to the SNTP server
whose IP address was assigned in the column field of SNTP Server URL, the current coordinated time is displayed here.
Daylight Saving Period: Set up the Daylight Saving beginning date/time and
Daylight Saving ending date/time. Please key in the value in the format of ‘YYYYMMDD’ and ‘HH:MM’ (leave a space between ‘YYYYMMDD’ and ‘HH:MM’).
¾ YYYYMMDD: an eight-digit year/month/day specification. ¾ HH:MM: a five-digit (including a colon mark) hour/minute specification.
For example, key in ‘20070701 02:00’ and ‘20071104 02:04’ in the two column
fields respectively to represent that DST begins at 2:00 a.m. on March 11, 2007 and ends at 2:00 a.m. on November 4, 2007.
Daylight Saving Offset (mins): For non-US and European countries, specify the
amount of time for day light savings. Please key in the valid figure in the range of minute between 0 and 720, which means you can set the offset up to 12 hours.
44
Click
Apply
to have the configuration take effect.
SNTP Configuration interface
45
46
6.11 IP Security
IP security function allows the user to assign 10 specific IP addresses that have permission to manage the switch through the http and telnet services for the securing switch management. The purpose of giving the limited IP addresses permission is to allow only the authorized personnel/device can do the management task on the switch.
IP Security Mode: Having set this selection item in the Enable mode, the
Enable HTTP Server, Enable Telnet Server checkboxes and the ten security IP
column fields will then be available. If not, those items will appear in grey.
Enable HTTP Server: Having ticked this checkbox, the devices whose IP
addresses match any one of the ten IP addresses in the Security IP1 ~ IP10 table will be given the permission to access this switch via HTTP service.
Enable Telnet Server: Having ticked this checkbox, the devices whose IP
addresses match any one of the ten IP addresses in the Security IP1 ~ IP10 table will be given the permission to access this switch via telnet service.
Security IP 1 ~ 10: The system allows the user to assign up to 10 specific IP
addresses for access security. Only these 10 IP addresses can access and manage the switch through the HTTP/Telnet service once IP Security Mode is enabled.
And then, click
Apply
to have the configuration take effect.
[NOTE]
Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when the switch powers off.
IP Security interface
47
48
6.12 User Authentication
Change web management login user name and password for the management security issue.
User name: Type in the new user name (The default is ‘root’)  Password: Type in the new password (The default is ‘root’)  Confirm password: Re-type the new password
And then, click
Apply
User Authentication interface
6.13 Advanced Configuration
This page enables the user to select the filter packet type including Flooded Unicast/Multicast Packets, Control Packets, IP Multicast Packets, and Broadcast Packets for the purpose of limiting the network bandwidth not being occupied by
those storm-like packets. All the packet type filtering conditions can be active at the same time. Besides, the user can configure Broadcast Storm Rate of this switch to limit the ingress broadcast storm rate. Flooded Unicast: LAN switches use forwarding tables to direct traffic to specific ports based on the VLAN number and the destination MAC address of the frame. When there is no entry corresponding to the frame’s destination MAC address in the incoming VLAN, the unicast frame will be sent to all forwarding ports within the respective VLAN, which causes flooding. Multicast: Multicast is the delivery of information to a group of destinations simultaneously using the most efficient strategy to deliver the messages over each link of the network only once, creating copies only when the links to the destinations split. IP Multicast Packets: An IP Multicast group address is used by sources and the receivers to send and receive packets. Sources use the group address as the IP destination address in their data packets. Receivers use this group address to inform the network that they are interested in receiving packets sent to that group.
6.13.1 Broadcast Storm Filter
Flooded Unicast/Multicast Packets: When this checkbox is ticked, the switch
will filter the flooded Unicast/Multicast packets in accordance with the filter rate set in the Broadcast Storm Rate selection item.
Control Packets: Having ticked this checkbox, the switch will enable the filter of
control packets including BPDU (RSTP/LACP/GVRP), ARP, EAPOL etc. in accordance with the filter rate set in the Broadcast Storm Rate selection item.
IP multicast Packets: Having ticked this checkbox, the switch will filter the IP
multicast packets in accordance with the filter rate set in the Broadcast Storm Rate selection item.
49
Broadcast Packets: Having ticked this checkbox, the switch will filter the
broadcast packets in accordance with the filter rate set in the Broadcast Storm Rate selection item.
Broadcast Storm Filter interface
50
51
6.13.2 Aging Time
When the MAC address table is full, it won’t learn the MAC address any more. Therefore, the aging time function allows users to set aging time in seconds for each record. Once the aging time of the record matches the setting, the record (dynamic MAC address) will be removed from the MAC table. Also, the records will be removed from the MAC table when the particular port links down, which means that every record will be removed if it was learned from that port.
Aging Time interface
Aging Time of MAC Table: Set the aging time as OFF, 150 sec, 300 sec, or 600
sec to remove the record (s) whose property of aging time match this setting.
Auto Flush MAC Table When Link Down: Having enabled this function, the
switch will remove the records learned from a particular port when the port links down.
Click Apply to have the configuration take effect.
6.13.3 Jumbo Frame
Jumbo Frames are Ethernet frames with more than 1522 bytes of payload. Conventionally, jumbo frames can carry up to 9022 bytes of payload. Many, but not all, gigabit Ethernet switches and gigabit Ethernet network interface cards support jumbo frames, but all fast Ethernet switches/network interface cards support only standard­sized frames. It requires hardware and software process for each frame. With the frame size being increased, the same amount of data can be transferred with less effort.
Jumbo Frame interface
Enable Jumbo Frame: Having ticked this checkbox, the switch will allow the
jumbo packets (up to 9022 bytes) pass the gigabit port.
Click Apply to have the configuration take effect.
52
6.14 Port Statistics
The following chart provides the current statistic information which displays the real­time packet transfer status for each port. The user might use the information to plan and implement the network, or check and find the problem when the collision or heavy traffic occurs.
Port: The index column of the ports.  Type: Displays the connection media type of the port.  Link: The status of linking—‘Up’ or ‘Down’.  State: The user can set the state of the port as ‘Enable’ or ‘Disable’ via the Port
Control interface the next function. When the state is disabled, the port will not transmit or receive any packet.
Tx Good Packet: The counts of the transmitted good packets via this port. Tx Bad Packet: The counts of the transmitted bad packets (including undersize
[less than 64 bytes], oversize, CRC Align errors, fragments and jabber packets) via this port.
Rx Good Packet: The counts of the received good packets via this port.  Rx Bad Packet: The counts of the received bad packets (including undersize
[less than 64 bytes], oversize, CRC Align error, fragments and jabber packets) via this port.
Tx Abort Packet: The aborted packet while transmitting. Packet Collision: The counts of collision packet.  Packet Dropped: The counts of dropped packet.  Rx Bcast Packet: The counts of broadcast packet.  Rx Mcast Packet: The counts of multicast packet.
Click
Clear
to clean all counts.
53
Port Statistics interface
54
55
6.15 Port Counters
This chart displays the transmitted and received traffic of single port.
Select Port: Pull down the menu bar to select a particular port, and then the
counters for the port will be displayed.
RxBcastPkt: The number of good broadcast packets received.  RxOctel: The number of octels of data received (including those in bad packet,
excluding framing bits but including FCS octels, excluding RxPausePkt).
RxMcastPkt: The number of good multicast packets received except broadcast
packets).
RxFCSErr: The number of packets received that had a bad FCS or RX ER
asserted with the proper and integral octels.
RxOverSizePkt: The number of packets received that were longer than
Max_Pkt_Len (=1522 bytes) and were otherwise well formed.
RxAlignErr: The number of packets received that had a bad FCS or RX_ER
asserted with the proper and non-integral octels.
RxJabber: The number of packets received that were longer than Max_Pkt_Len
(=1522 bytes) and had a bad FCS or RX_ER asserted.
RxFragment: The number of packets received that were less than 64 octels long
and had a bad FCS or RX_ER asserted.
RxUndersizePkt: The number of packets received that were less than 64 octels
long and were otherwise well formed.
RxPkt64: The number of packets received that were 64 octels in length including
bad packets but excluding RxPausePkt.
RxPkt65to127: The number of packets received that were between 65 and 127
octels in length (including error packets).
RxPkt128to255: The number of packets received that were between 128 and
255 octels in length (including error packets).
RxPkt256to511: The number of packets received that were between 256 and
511 octels in length (including error packets).
RxPkt512to1023: The number of packets received that were between 511 and
1023 octels in length (including error packets).
RxPkt1024to1522: The number of packets received that were between 1024 and
the Max_Pkt_Len (=1522 bytes) octels in length (including error packets).
TxUcastPkt: The number of unicast packet transmitted.  TxBcastPkt: The number of broadcast packet transmitted.  TxOctel: The number of octels transmitted (only for good packets excluding
TxPausePkt).
TxSingleCollisn: The number of successfully transmitted packets which
transmission is inhibited by exactly one collision.
TxMultiCollisn: The number of successfully transmitted packets which
transmission is inhibited by more than one collision.
TxCollisn: The number of collisions on this Ethernet segment.  TxDefferTrans: The number of packets for which the first transmission attempt is
delayed because medium is busy.
DropFwdLkup: The number of unicast packets dropped after forwarding table
lookup.
DropIn: The number of packets dropped because the input FIFO overrun and the
FC violation.
TxMcst: The number of multicast packet transmitted.  TxPause: The number of Pause Packet transmitted.  RxPause: The number of Pause Packet received.
56
TxUnderrun: The number of packets dropped because the output FIFO underrun.  Click Clear to reset the figures.
57
58
6.16 Port Control
In Port control you can configure the settings of each port to control the connection parameters, and the status of each port is listed beneath.
Port: Use the scroll bar and click on the port number to choose the port to be
configured.
State: Current port state. The port can be set to disable or enable mode. If the
port state is set as ‘Disable’, it will not receive or transmit any packet.
Negotiation: Auto and Force. Being set as Auto, the speed and duplex mode are
negotiated automatically. When you set it as Force, you have to set the speed and duplex mode manually.
Speed: It is available for selecting when the Negotiation column is set as Force.
When the Negotiation column is set as Auto, this column is read-only.
Duplex: It is available for selecting when the Negotiation column is set as Force.
When the Negotiation column is set as Auto, this column is read-only.
Flow Control: Whether or not the receiving node sends feedback to the sending
node is determined by this item. When enabled, once the device exceeds the input data rate of another device, the receiving device will send a PAUSE frame which halts the transmission of the sender for a specified period of time. When disabled, the receiving device will drop the packet if too much to process.
Security: When the Security selection is set as ‘On’, any access from the device
which connects to this port will be blocked unless the MAC address of the device is included in the static MAC address table. See the segment of MAC Address Table—Static MAC Addresses.
Click
Apply
to have the configuration take effect.
Port Control interface
59
60
6.17 Port Trunk
Port trunking is the combination of several ports or network cables to expand the connection speed beyond the limits of any one single port or network cable. Link Aggregation Control Protocol (LACP), which is a protocol running on layer 2, provides a standardized means in accordance with IEEE 802.3ad to bundle several physical ports together to form a single logical channel. All the ports within the logical channel or so-called logical aggregator work at the same connection speed and LACP operation requires full-duplex mode.
6.17.1. Aggregator setting
System Priority: A value which is used to identify the active LACP. The switch
with the lowest value has the highest priority and is selected as the active LACP peer of the trunk group.
Group ID:
There are 13 trunk groups to be selected. Assign the "
Group ID
" to
the trunk group.
LACP: When enabled, the trunk group is using LACP. A port which joins an
LACP trunk group has to make an agreement with its member ports first. Please notice that a trunk group, including member ports split between two switches, has to enable the LACP function of the two switches. When disabled, the trunk group is a static trunk group. The advantage of having the LACP disabled is that a port joins the trunk group without any handshaking with its member ports; but member ports won’t know that they should be aggregated together to form a logic trunk group.
Work ports: This column field allows the user to type in the total number of
active port up to four. With LACP static trunk group, e.g. you assign four ports to be the members of a trunk group whose work ports column field is set as two; the exceed ports are standby/redundant ports and can be aggregated if working ports fail. If it is a static trunk group (non-LACP), the number of work ports must equal the total number of group member ports.
Select the ports to join the trunk group. The system allows a maximum of four
ports to be aggregated in a trunk group. Click
Add
and the ports focused in
the right side will be shifted to the left side. To remove unwanted ports, select the ports and click
Remove
.
When LACP enabled, you can configure LACP Active/Passive status for each
port on the State Activity tab.
Click
Apply
.
Use
Delete
to delete Trunk Group. Select the Group ID and click
Delete
.
Port Trunk—Aggregator Setting interface (four ports are added to the left field with LACP enabled)
61
62
6.17.2. Aggregator Information
LACP disabled
Having set up the aggregator setting with LACP disabled, you will see the local static trunk group information on the tab of Aggregator Information.
Assigning 2 ports to a trunk group with LACP disabled
Static Trunking Group information
Group Key: This is a read-only column field that displays the trunk group ID.  Port Member: This is a read-only column field that displays the members of this
static trunk group.
LACP enabled
Having set up the aggregator setting with LACP enabled, you will see the trunking group information between two switches on the tab of Aggregator Information.
Switch 1 configuration
1. Set System Priority of the trunk group. The default is 1.
2. Select a trunk group ID by pull down the drop-down menu bar.
3. Enable LACP.
4. Include the member ports by clicking the Add button after selecting the port
number and the column field of Work Ports changes automatically.
Switch 1 configuration interface
63
Aggregation Information of Switch 1
5. Click on the tab of Aggregator Information to check the trunked group
information as the illustration shown above after the two switches configured.
64
65
Switch 2 configuration
Switch 2 configuration interface
1. Set System Priority of the trunk group. The default is 1.
2. Select a trunk group ID by pull down the drop-down menu bar.
3. Enable LACP.
4. Include the member ports by clicking the Add button after selecting the port
number and the column field of Work Ports changes automatically.
Aggregation Information of Switch 2
5. Click on the tab of Aggregator Information to check the trunked group
information as the illustration shown above after the two switches configured.
6.17.3. State Activity
Having set up the LACP aggregator on the tab of Aggregator Setting, you can configure the state activity for the members of the LACP trunk group. You can tick or cancel the checkbox beside the state label. When you remove the tick mark of the
port and click
Apply
, the port state activity will change to
Passive
.
Active: The port automatically sends LACP protocol packets.  Passive: The port does not automatically send LACP protocol packets, and
responds only if it receives LACP protocol packets from the opposite device.
[NOTE]
A link having two passive LACP nodes will not perform dynamic LACP
trunk because both ports are waiting for an LACP protocol packet from the opposite device.
State Activity of Switch 1
66
State Activity of Switch 2
67
68
6.18 Port Mirroring
The Port mirroring is a method for monitoring traffic in switched networks. Traffic through ports can be monitored by one specific port, which means traffic goes in or out Monitored (source) port will be duplicated into Analysis (destination) port.
Port Trunk – Port Mirroring interface
Mode: Choose the type of being monitored packets. RX means only the received
packets of the monitored port will be copied and sent to the analysis port. TX means only the transmitted packets of the monitored port will be copied and sent to the analysis port. Both RX/TX means both received & transmitted packets of the monitored port will be copied and sent to the analysis port.
Analysis Port: There is only one port can be selected to be the analysis
(destination) port for monitoring both RX and TX traffic which come from the source port. Users can connect the analysis port to LAN analyzer or Netxray.
Monitored Port: Choose a port number to be monitored. Only one port can be
monitored during the monitoring process.
And then, click
Apply
.
6.19 Rate Limiting
All the ports support port ingress and egress rate control. The switch performs the ingress/egress rate by packet counter to meet the specified rate. When the traffic exceeds the limited transfer rate, the packets will be delayed or dropped.
Rate Limiting interface
Ingress
: Assign the port effective ingress rate (The default value is “0”).
Egress
: Assign the port effective egress rate (The default value is “0”).
And then, click
Apply
to have the configuration take effect.
69
6.20 VLAN configuration
A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which would allow you to isolate network traffic, so only the members of the same VLAN will receive traffic from the ones of the same VLAN. Basically, creating a VLAN on a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the network devices are still plugged into the same switch physically.
6.20.1. Port-based VLAN
A port-based VLAN basically consists of its members—ports, which means the VLAN is created by grouping the selected ports. This method provides the convenience for users to configure a simple VLAN easily without complicated steps. Packets can go among only members of the same VLAN group. Note all unselected ports are treated as belonging to another single VLAN. If the port-based VLAN enabled, the VLAN­tagging is ignored. The port-based VLAN function allows the user to create separate VLANs to limit the unnecessary packet flooding; however, for the purpose of sharing resource, a single port called a common port can belongs to different VLANs, which all the member devices (ports) in different VLANs have the permission to access the common port while they still cannot communicate with each other in different VLANs.
70
VLAN – Port Based interface
Pull down the selection item and focus on
Port Based
then press
Apply
to set
the VLAN Operation Mode in
Port Based
mode.
Click
Add
to add a new VLAN group (The maximum VLAN groups are up to
64).
71
VLAN—Port Based Add interface
Enter the group name and VLAN ID. Add the selected port number into the right
field to group these members to be a VLAN group, or remove any of them listed in the right field from the VLAN.
And then, click
Apply
to have the configuration take effect.
You will see the VLAN list displays.
72
VLAN—Port Based Edit/Delete interface
Use
Delete
to delete the VLAN.
Use
Edit
to modify group name, VLAN ID, or add/remove the members of the
existing VLAN group.
[NOTE]
Remember to execute the “Save Configuration” action, otherwise the new configuration will lose when switch power off.
73
74
6.20.2. 802.1Q VLAN
Virtual Local Area Network (VLAN) can be implemented on the switch to logically create different broadcast domain. When the 802.1Q VLAN function is enabled, all ports on the switch belong to default VLAN of VID 1, which means they logically are regarded as members of the same broadcast domain. The valid VLAN ID is in the range of number between 1 and 4094. The amount of VLAN groups is up to 256 including default VLAN that cannot be deleted. Each member port of 802.1Q is on either an Access Link (VLAN-tagged) or a Trunk Link (no VLAN-tagged). All frames on an Access Link carry no VLAN identification. Conversely, all frames on a Trunk Link are VLAN-tagged. Besides, there is the third mode—Hybrid. A Hybrid Link can carry both VLAN-tagged frames and untagged frames. A single port is supposed to belong to one VLAN group, except it is on a Trunk/Hybrid Link. The technique of 802.1Q tagging inserts a 4-byte tag, including VLAN ID of the destination port—PVID, in the frame. With the combination of Access/Trunk/Hybrid Links, the communication across switches also can make the packet sent through tagged and untagged ports.
802.1Q Configuration
Pull down the selection item and focus on
802.1Q
then press
Apply
to set the
VLAN Operation Mode in
802.1Q
mode.
Enable GVRP Protocol: GVRP (GARP VLAN Registration Protocol) is a protocol
that facilitates control of virtual local area networks (VLANs) within a larger network. GVRP conforms to the IEEE 802.1Q specification, which defines a method of tagging frames with VLAN configuration data. This allows network devices to dynamically exchange VLAN configuration information with other devices. For example, having enabled GVRP on two switches, they are able to automatically exchange the information of their VLAN database. Therefore, the user doesn’t need to manually configure whether the link is trunk or hybrid, the packets belonging to the same VLAN can communicate across switches. Tick this checkbox to enable GVRP protocol. This checkbox is available while the VLAN Operation Mode is in 802.1Q mode.
Management VLAN ID: Only when the VLAN members, whose Untagged VID
(PVID) equals to the value in this column, will have the permission to access the switch. The default value is ‘0’ that means this limit is not enabled (all members in different VLANs can access this switch).
Select the port you want to configure.  Link Type: There are 3 types of link type.
¾ Access Link: A segment which provides the link path for one or more
stations to the VLAN-aware device. An Access Port (untagged port), connected to the access link, has an untagged VID (also called PVID). After an untagged frame gets into the access port, the switch will insert a four-byte tag in the frame. The contents of the last 12-bit of the tag is untagged VID. When this frame is sent out through any of the access port of the same PVID, the switch will remove the tag from the frame to recover it to what it was. Those ports of the same untagged VID are regarded as the same VLAN group members.
Note: Because the access port doesn’t have an understanding of tagged frame, the column field of Tagged VID is not available.
75
¾ Trunk Link: A segment which provides the link path for one or more VLAN-
aware devices (switches). A Trunk Port, connected to the trunk link, has an understanding of tagged frame, which is used for the communication among VLANs across switches. Which frames of the specified VIDs will be forwarded depends on the values filled in the Tagged VID column field. Please insert a comma between two VIDs.
Note:
1. A trunk port doesn’t insert tag into an untagged frame, and therefore the untagged
VID column field is not available.
2. It’s not necessary to type ‘1’ in the tagged VID. The trunk port will forward the
frames of VLAN 1.
3. The trunk port has to be connected to a trunk/hybrid port of the other switch. Both
the tagged VID of the two ports have to be the same.
¾ Hybrid Link: A segment which consists of Access and Trunk links. The
hybrid port has both the features of access and trunk ports. A hybrid port has a PVID belonging to a particular VLAN, and it also forwards the specified tagged-frames for the purpose of VLAN communication across switches.
Note:
1. It’s not necessary to type ‘1’ in the tagged VID. The hybrid port will forward the
frames of VLAN 1.
2. The trunk port has to be connected to a trunk/hybrid port of the other switch. Both
the tagged VID of the two ports have to be the same.
Untagged VID: This column field is available when Link Type is set as Access
Link and Hybrid Link. Assign a number in the range between 1 an 4094.
Tagged VID:
This column field is available when Link Type is set as Trunk Link
and Hybrid Link. Assign a number in the range between 1 an 4094.
Click
Apply
to have the configuration take effect.
You can see the link type, untagged VID, and tagged VID information of each port
in the table below on the screen.
76
802.1Q VLAN interface
Group Configuration
Edit the existing VLAN Group.
Select the VLAN group in the table list.
Click
Edit
.
77
Group Configuration interface
You can modify the VLAN group name and VLAN ID.
Group Configuration interface
Click
Apply
.
78
79
6.21 Rapid Spanning Tree
The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto-detect the connected device that is running STP or RSTP protocol.
6.21.1. System Configuration
The user can view spanning tree information of Root Bridge.
The user can modify RSTP state. After modification, click
Apply
.
¾ RSTP mode: The user must enable the RSTP function first before
configuring the related parameters.
¾ Priority (0-61440): The switch with the lowest value has the highest priority
and is selected as the root. If the value is changed, the user must reboot the switch. The value must be a multiple of 4096 according to the protocol standard rule.
¾ Max Age (6-40): The number of seconds a switch waits without receiving
Spanning-tree Protocol configuration messages before attempting a reconfiguration. Enter a value between 6 through 40.
¾ Hello Time (1-10): The time that controls the switch to send out the BPDU
packet to check RSTP current status. Enter a value between 1 through 10.
¾ Forward Delay Time (4-30): The number of seconds a port waits before
changing from its Rapid Spanning-Tree Protocol learning and listening states to the forwarding state. Enter a value between 4 through 30.
[NOTE]
Follow the rule as below to configure the MAX Age, Hello Time, and Forward Delay Time.
2 x (Forward Delay Time value –1) > = Max Age value >= 2 x (Hello Time value +1)
RSTP System Configuration interface
80
81
6.21.2. Port Configuration
This web page provides the port configuration interface for RSTP. You can assign higher or lower priority to each port. Rapid spanning tree will have the port with the higher priority in forwarding state and block other ports to make certain that there is no loop in the LAN.
Select the port in the port column field.  Path Cost: The cost of the path to the other bridge from this transmitting bridge
at the specified port. Enter a number 1 through 200,000,000.
Priority: Decide which port should be blocked by setting its priority as the lowest.
Enter a number between 0 and 240. The value of priority must be the multiple of
16.
Admin P2P: The rapid state transitions possible within RSTP are dependent
upon whether the port concerned can only be connected to exactly another bridge (i.e. it is served by a point-to-point LAN segment), or can be connected to two or more bridges (i.e. it is served by a shared medium LAN segment). This function allows the P2P status of the link to be manipulated administratively. True means the port is regarded as a point-to-point link. False means the port is regarded as a shared link. Auto means the link type is determined by the auto­negotiation between the two peers.
Admin Edge: The port directly connected to end stations won’t create bridging
loop in the network. To configure the port as an edge port, set the port to “True” status.
Admin Non Stp: The port includes the STP mathematic calculation. True is not
including STP mathematic calculation. False is including the STP mathematic calculation.
Click
Apply
.
RSTP Port Configuration interface
82
83
6.22 SNMP Configuration
Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Network management systems learn of problems by receiving traps or change notices from network devices implementing SNMP.
6.22.1. System Configuration
Agent Mode:
Select the SNMP version that you want to use and then click
Change
to have the selected SNMP version mode t ake effect. The default value
is ‘
SNMP v1/v2c only
’.
Community Strings
Here you can define the new community string set and remove the unwanted community string.
¾ String: Fill the name string. ¾ RO: Read only. Enables requests accompanied by this community string to
display MIB-object information.
¾ RW: Read/write. Enables requests accompanied by this community string to
display MIB-object information and to set MIB objects.
¾
Click
A
dd
.
¾
To remove the community string, select the community string that you
defined before and click
Remove
. The strings of Public_RO and Private_RW
are default strings. You can remove them but after resetting the switch to default, the two strings show up again.
SNMP System Configuration interface
84
85
6.22.2. Trap Configuration
A trap manager is a management station that receives the trap messages generated by the switch. If no trap manager is defined, no traps will be issued. To define a management station as a trap manager, assign an IP address, enter the SNMP community strings, and select the SNMP trap version.
IP Address: Enter the IP address of the trap manager.  Community: Enter the community string for the trap station.  Trap Version: Select the SNMP trap version type—v1 or v2c.
Click
A
dd
.
To remove the community string, select the community string listed in the current
managers field and click
Remove
.
Trap Managers interface
6.22.3. SNMPV3 Configuration
Configure the SNMP V3 function.
Context Table
Configure SNMP v3 context table. Assign the context name of context table. Click
Add
to add context name. Click
Remove
to remove the unwanted context name.
User Table
Configure SNMP v3 user table..
User ID: Set up the user name.  Authentication Password: Set up the authentication password.  Privacy Password: Set up the private password.
Click
Add
to add the context name.
Click
Remove
to remove the unwanted context name.
86
SNMP V3 configuration interface
Group Table
Configure SNMP v3 group table. Security Name (User ID): Assign the user name that you have set up in user
table.
Group Name: Set up the group name.
Click
Add
to add the context name.
Click
Remove
to remove the unwanted context name.
87
Access Table
Configure SNMP v3 access table.
Context Prefix: Set up the context name.  Group Name: Set up the group.  Security Level: Set up the access level. Context Match Rule: Select the context match rule.  Read View Name: Set up the read view.  Write View Name: Set up the write view.  Notify View Name: Set up the notify view.
Click
Add
to add the context name.
Click
Remove
to remove the unwanted context name.
MIBview Table
Configure MIB view table.
ViewName: Set up the name.  Sub-Oid Tree: Fill the Sub OID.  Type: Select the type—excluded or included.
Click
Add
to add the context name.
Click
Remove
to remove the unwanted context name.
88
89
6.23 QoS Configuration
Quality of Service (QoS) is the ability to provide different priority to different applications, users or data flows, or to guarantee a certain level of performance to a data flow. QoS guarantees are important if the network capacity is insufficient, especially for real-time streaming multimedia applications such as voice over IP or Video Teleconferencing, since these often require fixed bit rate and are delay sensitive, and in networks where the capacity is a limited resource, for example in cellular data communication. In the absence of network congestion, QoS mechanisms are not required.
QoS Mode: Select the QoS policy rule.
¾ Disable Qos Priority: The default status of QoS Priority is disabled. ¾ High Empty Then Low: When all the high priority packets are empty in queue,
low priority packets will be processed then.
¾ Highest:SecHigh:SecLow:Lowest=8:4:2:1: The switch will follow 8:4:2:1 rate to
process priority queue from High to lowest queue. For example, while the system processing, 1 frame of the lowest queue, 2 frames of the low queue, 4 frames of the middle queue, and 8 frames of the high queue will be processed at the same time in accordance with the 8,4,2,1 policy rule.
¾ Highest:SecHigh:SecLow:Lowest=15:7:3:1: Having set this QoS mode, the
process order is in compliance with the transfer rate of 15:7:3:1.
¾ Highest:SecHigh:SecLow:Lowest=15:10:5:1: Having set this QoS mode, the
process order is in compliance with the transfer rate of 15:10:5:1.
¾
Click
Apply
to have the configuration take effect.
802.1p priority [7-0]: Configure per priority level. Priority 0 ~ 7: each priority has four
priority levels—Highest, SecHigh, SecLow, and Lowest.
Default Ingress Port Priority Mapping: Configure the priority level for each port. The
port ingress level is between 0 and 7.
TOS/DSCP Priority Mapping: The system provides 0 ~ 63 TOS priority level. Each
level has 8 priorities—0 ~ 7. The default priority for each port is 0. When the IP packet is received, the system will check the TOS level value in the IP packet. For example,
TOS level 25 is set as 0 and each port only follows the TOS priority policy. When the packet received through all the ports on the switch, the system will check the TOS value of the received IP packet. If the TOS value of received IP packet is 25 (priority =
0), the packet priority has the highest priority.
QoS Configuration interface
90
91
6.24 IGMP Configuration
The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite. IP manages multicast traffic by using switches, routers, and hosts that support IGMP. Enabling IGMP allows the ports to detect IGMP queries, report packets, and manage IP multicast traffic through the switch. IGMP have three fundamental types of message shown as follows:
Message Description
Query
A message sent from the querier (IGMP router or switch) asking for a response from each host belonging to the multicast group.
Report
A message sent by a host to the querier to indicate that the host wants to be or is a member of a given group indicated in the report message.
Leave Group
A message sent by a host to the querier to indicate that the host has quit being a member of a specific multicast group.
The switch supports IP multicast. You can enable IGMP protocol via setting the IGMP Configuration page to see the IGMP snooping information. IP multicast addresses are in the range of 224.0.0.0 through 239.255.255.255.
IGMP Protocol: Enable or disable the IGMP protocol.  IGMP Query: Select the IGMP query function as Enable or Auto to set the switch
as a querier for IGMP version 2 multicast networks.
Last Member Query Count: This item allows the user to specify the query
counts—1 or 2. If query count is set as 1, the switch will query whether any member is still in the IGMP group for sending one query after the query interval. With query count being set as 2, the switch will send two queries after the query interval.
Last Member Query Interval: Fill in the number in seconds as the query interval
time.
Click
Apply
.
IGMP Configuration interface
92
93
6.25 Pro-Ring
X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same. In the X-Ring topology, every switch should be enabled with X-Ring function and two ports should be assigned as the member ports in the ring. Only one switch in the X-Ring group would be set as the master switch that one of its two member ports would be blocked, called backup port, and another port is called working port. Other switches in the X-Ring group are called working switches and their two member ports are called working ports. When the failure of network connection occurs, the backup port of the master switch (Ring Master) will automatically become a working port to recover from the failure.
The switch supports the function and interface for setting the switch as the ring master or not. The ring master can negotiate and place command to other switches in the X­Ring group. If there are 2 or more switches in master mode, the software will select the switch with lowest MAC address number as the ring master. The X-Ring master ring mode can be enabled by setting the X-Ring configuration interface. Also, the user can identify whether the switch is the ring master by checking the R.M. LED indicator on the panel of the switch.
The system also supports the Couple Ring that can connect 2 or more X-Ring group for the redundant backup function; Dual Homing function that can prevent connection lose between X-Ring group and upper level/core switch.
Enable Ring: To enable the X-Ring function, tick the checkbox beside the Enable
Ring string label. If this checkbox is not ticked, all the ring functions are unavailable. ¾ Enable Ring Master: Tick the checkbox to enable this switch to be the ring
master.
¾ 1
st
& 2nd Ring Ports: Pull down the selection menu to assign the ports as the
member ports. 1st Ring Port is the working port and 2nd Ring Port is the backup port. When 1
st
Ring Port fails, the system will automatically upgrade
Loading...