Lantech LES-2400-RPS User Manual

Lantech
LES-2400-RPS
3-slot Modularized Fast Ethernet L2 + 2 Gigabit
Copper / Mini-GBIC Combo Managed Switch
User Manual
v1.03
May-2010
Contents
1. INTRODUCTION ...................................................................................................... 1
Features ....................................................................................................................... 1
Software Features ........................................................................................................ 2
Package Contents ........................................................................................................ 4
Ethernet Switching Technology .................................................................................... 5
2. HARDWARE DESCRIPTION ................................................................................... 7
Physical Dimension ...................................................................................................... 7
Front Panel ................................................................................................................... 7
LED Indicators ................................................................ ................................ .............. 7
Rear Panel .................................................................................................................... 8
Desktop Installation ...................................................................................................... 8
Attaching Rubber Feet ........................................................................................... 9
Rack-mounted Installation ............................................................................................ 9
Power On .................................................................................................................... 10
Redundant power ....................................................................................................... 11
3. NETWORK APPLICATION .................................................................................... 12
Connecting to the Switch ............................................................................................ 13
4. CONSOLE MANAGEMENT ................................................................................... 14
Login in the Console Interface .................................................................................... 14
Module Hot-Swapping ......................................................................................... 15
5. WEB-BASED MANAGEMENT ............................................................................... 16
About Web-based Management ................................ ................................ ................. 16
Preparing for Web Management ................................................................................. 16
System Login ................................ ................................ .............................................. 17
Main interface ................................................................................................ ............. 18
Main interface ................................................................................................ ............. 18
System Information ..................................................................................................... 19
IP Configuration .......................................................................................................... 19
DHCP Server – System configuration ......................................................................... 20
DHCP Client – System Configuration ......................................................................... 21
DHCP Server - Port and IP Bindings .......................................................................... 22
TFTP - Update Firmware ............................................................................................ 23
TFTP – Restore Configuration .................................................................................... 23
TFTP - Backup Configuration ..................................................................................... 24
System Event Log – Syslog Configuration .................................................................. 24
System Event Log - SMTP Configuration ................................................................... 25
System Event Log - Event Configuration .................................................................... 26
SNTP Configuration .................................................................................................... 28
IP Security .................................................................................................................. 31
User Authentication .................................................................................................... 32
Advanced Configuration-Broadcast Storm Filter ......................................................... 33
Advanced Configuration-Aging Time .......................................................................... 34
Advanced Configuration-Jumbo Frame ...................................................................... 35
Port Statistics .............................................................................................................. 36
Port Control ................................................................................................................ 36
Port Trunk ................................................................................................................... 37
Aggregator setting ............................................................................................... 38
Aggregator Information ........................................................................................ 39
State Activity ........................................................................................................ 40
Port Mirroring .............................................................................................................. 41
Rate Limiting ............................................................................................................... 41
VLAN configuration ..................................................................................................... 43
VLAN configuration - Port-based VLAN ............................................................... 43
802.1Q VLAN ...................................................................................................... 46
802.1Q Configuration ................................................................................... 46
Group Configuration ..................................................................................... 47
Rapid Spanning Tree .................................................................................................. 48
RSTP - System Configuration.............................................................................. 49
RSTP - Port Configuration ................................................................................... 50
Pro-Ring System......................................................................................................... 52
SNMP Configuration ................................................................................................... 54
System Configuration .......................................................................................... 54
Trap Configuration ............................................................................................... 55
SNMPV3 Configuration ....................................................................................... 56
Context Table ........................................................................................ 56
User Profile ........................................................................................... 56
Group Table .......................................................................................... 58
Access Table ......................................................................................... 58
MIBview Table ....................................................................................... 58
QoS Configuration ...................................................................................................... 59
IGMP Configuration .................................................................................................... 61
802.1X/Radius Configuration ............................................................................... 62
System Configuration ................................ ................................ ................... 63
802.1x Port Configuration ............................................................................. 63
Misc Configuration ........................................................................................ 65
MAC Address Table ............................................................................................ 65
Static MAC Address ..................................................................................... 66
MAC Filtering ................................................................................................ 67
All MAC Addresses ...................................................................................... 67
Access Control List ..................................................................................................... 68
Factory Default ........................................................................................................... 69
Save Configuration ..................................................................................................... 70
System Reboot ................................ ................................ ................................ ........... 70
6. TROUBLESHOOTING ........................................................................................... 71
Incorrect connections .................................................................................................. 71
Faulty or loose cables ........................................................................... 71
Non-standard cables ............................................................................. 71
Improper Network Topologies ............................................................... 71
Diagnosing LED Indicators ......................................................................................... 72
Cabling .................................................................................................. 72
7. TECHNICAL SPECIFICATION .............................................................................. 73
1. Introduction
The 3-slot Modularized Fast Ethernet L2 plus + 2 Gigabit Copper / Mini-GBIC Combo Managed Switch is a modular switch that can be used to build high-performance switched workgroup networks. This switch is a store-and-forward device that offers low latency for high-speed networking. The Switch is targeted at workgroup, department or backbone computing environment.
The 3-slot Modularized Fast Ethernet L2 plus + 2 Gigabit Copper / Mini-GBIC Combo Managed Switch features a ―store-and-forward switching scheme. This allows the switch to auto-learn and store source address in an 8K-entry MAC address table.
(Medium Dependent Interface) Port is also called an "uplink port". The MDI port
MDI
does not cross transmit and receive lines, which is done by the regular ports (MDI-X ports) that connect to end stations. In general, or Switch while
MDI/MDIX
changing non-crossover or crossover cabling.
means that you can connect to another Switch or workstation without
MDIX
means connecting to a workstation or PC. Therefore,
means connecting to another Hub
MDI
The 3-slot Modularized Fast Ethernet L2 plus + 2 Gigabit Copper / Mini-GBIC Combo Managed Switch has 3-module slots. User can purchase the modules in accordance with their needs which give elasticity on network application.
Features
Conforms to IEEE802.3 10BASE-T, 802.3u 100BASE-TX/FX, 802.3ab
Auto
1000BASE-T, 802.3z Gigabit SX/LX
3 slots for 8 ports 10/100TX, 8 ports 100Mbps multi mode fiber module, 8 ports
100Mbps single mode fiber module, or 8 ports 100Mbps SFP module
IEEE802.3x Flow control
Flow control for full duplex
1
Management
SNMP v1/v2c/v3, Web, Telnet, CLI, RMON1
Software Upgrade
TFTP and Console firmware upgradeable
Backpressure for half duplex  High back-plane bandwidth 8.8Gbps  Supports IEEE802.3ad Port trunk with LACP  Broadcast storm filter supported  IGMP supports for Multi Media application  Supports IEEE 802.1p class of service  Port security supported  Port bandwidth control supported  Supports IEEE 802.1d Spanning tree protocol  Supports GVRP function  Port Base VLAN/802.1Q VLAN supported  IEEE 802.1X user authentication  Supports DHCP client  Web/ SNMP / Telnet / CLI management  Pro-Ring System:
X-Ring
Dual Homing
Couple Ring  Optional Module for slot:
8 ports 10/100TX module
8 ports 100SFP module
Software Features
2
MIB
RFC 3418 SNMP MIB RFC 1213 MIBII RFC 2011 MIB RFC 1493 Bridge MIB RFC 2674 VLAN RFC 1215 Trap MIB RFC 1643 Ethernet like RMON1 Private MIB
SNMP Trap
Cold/warm start trap, link down/link up trap, authorization fail trap, fan fail trap. power event trap
Port Trunk
Supports IEEE802.3ad with LACP function. Up to 13 trunk groups, trunk member up to 4 ports and include 2 uplink ports
Spanning Tree
IEEE802.1d spanning tree, IEEE 802.1w Rapid Spanning tree protocol
Pro-Ring
Supports X-Ring, Dual Homing, and Couple Ring
VLAN
Port based VLAN, up to 24 groups IEEE802.1Q Tag VLAN Static VLAN groups up to 256, Dynamic VLAN group up to 2048, VLAN ID from 1 to 4094. GVRP up to 256 groups
QOS Policy
Port based, Tag based, IPv4 Type of service, IPv4 Different service.
Class of Service
Per port 4 queues, High/ low queue. Service rule: first come first service; all High before Low, WRR for High or low weight. Weight round ratio (WRR): 8:4:2:1
3
IGMP
It supports IGMP V1 and V2 snooping; IGMP Snooping for Multi-Media application, IGMP group supports 256 groups and IGMP query
Port Security
Supports 50 entries of MAC address for static MAC and another 50 for MAC filter
Port Mirror
Supports 3 mirroring types: RX, TX and Both packet
Bandwidth Control
Per port supports ingress rate limiting and egress rate shaping control. The rate limiting and rate shaping can be setting from 0~100Mbps
802.1x Authentication
Supports IEEE802.1x User-Authentication and can report to RADIUS server.
Reject  Accept  Authorize  Disable
DHCP
DHCP Client/Server
Packet filter
Broadcast storm control
Package Contents
Unpack the contents of the 3 the checklist below.
3-slot intelligent chassis switch
  Power Cord
Four Rubber Feet RS-232 cable
-slot intelligent chassis switch
4
and verify them against
Rack-mounted kit User Guide CD-ROM
3-slot intelligent chassis switch
Rack-mounted Kit Power Cord User Guide CD-ROM
Four Rubber Feet
Package Contents
RS-232 Cable
Compare the contents of your 3-slot intelligent chassis switch package with the standard checklist above. IF any item is missing or damaged, please contact your local dealer for service.
Ethernet Switching Technology
Ethernet Switching Technology dramatically boosted the total bandwidth of a network, eliminated congestion problems inherent with CSMA/CD (Carrier Sense multiple access with Collision Detection) protocol, and greatly reduced unnecessary transmissions.
This revolutionized networking. First, by allowing two-way simultaneous transmissions over the same port (Full-duplex) essentially doubled the bandwidth. Second, by reducing the collision domain to a single switch-port eliminated the need for carrier sensing. Third, by using the store-and-forward technology‘s approach of inspecting each packet to intercept corrupt or redundant data eliminated unnecessary transmission that slow the network. By employing address learning replaced the inefficient receiving port.
5
Auto-negotiation regulates the speed and duplex of each port, based on the capability of both devices. Flow-control allows transmission from a 100Mbps node to a 10Mbps node without loss of data. Auto-negotiation and flow-control may require disablement for some networking operations involves legacy equipment. Disabling the auto-negotiation is accomplished by fixing the speed or duplex of a port.
Ethernet Switching Technology supplied higher performance at costs lower than other solutions. Wider bandwidth, no congestion, and the reduction in traffic is why switching is replacing expensive routers and inefficient hubs as the ultimate networking solution. Switching brought a whole new way of thinking to networking.
6
2. Hardware Description
LED
Status
Description
LK/ACT
Green
The port is connecting with the device.
Blinks
The port is receiving or transmitting data.
Off
No device attached.
This Section mainly describes the hardware of the 3-slot intelligent chassis switch, and gives a physical and functional overview of the switch.
Physical Dimension
The 3-slot intelligent chassis switch physical dimension is
44mm(H)
.
440mm(W) x 280mm(D) x
Front Panel
The Front Panel of the 3-slot intelligent chassis switch supports up to 4 kinds of module. Please refer to the module user guide for further information.
LED Indicators
Accompanying the Copper/SFP combo ports, four LED indicators are located on the rear panel beside each combo port. The LEDs indicate the status of Link/Activity, Full-Duplex/Collision, and transmission speed for the respective ports. The table below gives definition for each LED indicator.
7
FD/COL
Yellow
The port is operating in Full-duplex mode.
Blinks
Collision of Packets occurs in the port.
Off
In half-duplex mode
1000
Green
The port is operating at the speed of 1000Mbps
100
Green
The port is operating at the speed of 100Mbps (for RJ-45 port only)
Rear Panel
The Description of LED Indicators
The 3-pronged power plug, 2 fans, DC power input, 2 Gigabit Copper/mini-GBIC combo port, and one RS-232 console port are located at the rear Panel of the 3-slot intelligent chassis switch as shown in Figure 2-1. The Switch will work with AC power in the range of 100-240V AC, 50-60Hz.
The Rear Panel of the 3-slot intelligent chassis switch
Desktop Installation
Set the Switch on a sufficiently large flat space with a power outlet nearby. The surface where you put your Switch should be clean, smooth, level and sturdy. Make sure there is enough clearance around the Switch to allow attachment of cables, power cord and allow air circulation.
8
Attaching Rubber Feet
A. Make sure mounting surface on the bottom of the Switch is grease and dust free. B. Remove adhesive backing from your Rubber Feet. C. Apply the Rubber Feet to each corner on the bottom of the Switch. These footpads
can prevent the Switch from shock/vibration.
Attaching Rubber Feet to each corner on the bottom of the Switch
Rack-mounted Installation
The 3-slot intelligent chassis switch come with a rack-mounted kid and can be mounted in an EIA standard size, 19-inch Rack. The Switch can be placed in a wiring closet with other equipment.
Perform the following steps to rack mount the switch:
A. Position one bracket to align with the holes on one side of the switch and secure it
with the smaller bracket screws. Then attach the remaining bracket to the other
side of the Switch.
Attach mounting brackets with screws
9
B. After attached both mounting brackets, position the switch in the rack by lining up
the holes in the brackets with the appropriate holes on the rack. Secure the Switch
to the rack with a screwdriver and the rack-mounting screws.
Mount the Switch in 19‖ Rack
Note:
the front and 3.4 inches (8 cm) on the back of the Switch. This is especially
important for enclosed rack installation.
For proper ventilation, allow about at least 4 inches (10 cm) of clearance on
Power On
Connect the power cord to the power socket on the rear panel of the Switch. The other side of power cord connects to the power outlet. The internal power supply of the Switch works with voltage range of AC in the 100-240VAC, frequency 50~60Hz. Check the power indicator on the front panel to see if power is properly supplied.
10
Redundant power
Connect the optional redundant power cord to the redundant power socket on the rear panel of the Switch. The other side of redundant power cord connects to the power supply. The Switch works with power supply of 12-48 VDC.
Please make sure the connection on power supply is correct when using the optional redundant power cord. Red cord should be connected to ―+‖ and black cord should be connect to ―-‖.
11
3. Network Application
This section provides you a few samples of network topology in which the Switch is used. In general, the 3-slot intelligent chassis switch is designed as a segment switch. That is, with its large address table (8000 MAC address) and high performance, it is ideal for interconnecting networking segments.
PC, workstations, and servers can communicate each other by directly connecting with 3-slot intelligent chassis switch. The switch automatically learns nodes address, which are subsequently used to filter and forward all traffic based on the destination address.
By using Gigabit copper/mini-GBIC combo port (on the rear side of the switch), 10/100Mbps copper, or Ethernet Fiber port the Switch can connect with another switch or hub to interconnect other small-switched workgroups to form a larger switched network. Meanwhile, you can also use Ethernet or fiber ports to connect switches. The following figure is an example of the 3-slot intelligent chassis switch application topology.
The example of application topology
12
Connecting to the Switch
The Console port is a female DB-9 connector that enables a connection to a PC or terminal for monitoring and configuring the Switch. Use the supplied RS-232 cable with a male DB-9 connector to connect a terminal or PC to the Console port.
The Console configuration (out of band) allows you to set Switch for remote terminal as if the console terminal were directly connected to it.
13
4. Console Management
Login in the Console Interface
When the connection between Switch and PC is ready, turn on the PC and run a terminal emulation program or
parameters
Baud Rate: 9600 bps Data Bits: 8 Parity: none Stop Bit: 1 Control flow: None
to match the following default characteristics of the console port:
The settings of communication parameters
Hyper Terminal
and configure its
communication
After finishing the parameter settings, click ―OK―. When the blank screen shows up, press Enter key to bring out the login prompt. Key in the both User name and Password (use Main Menu of console management appears. Please see below figure for login screen.
Enter
key to switch), then press Enter key and the
14
(default value) for the
root
Console login screen
Module Hot-Swapping
The 3-slot Modularized Fast Ethernet L2 plus + 2 Gigabit Copper / Mini-GBIC Combo Managed Switch supports module hot-swapping. User can insert or pull the module out of the slot without powering down the switch. Once the module is not fully inserted, the LEDs on the module panel will all light on at the same time. Meanwhile, the switch also sends warning message to the connected PC, work station or terminal via console port. Please see the picture as below for reference.
Warning message interface
15
5. Web-Based Management
This section introduces the configuration and functions of the Web-Based management.
About Web-based Management
Inside the CPU board of the switch, there exists an embedded HTML web site residing in flash memory. It offers advanced management features and allow users to manage the switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer.
The Web-Based Management supports Internet Explorer 6.0. It is based on Java Applets with an aim to reduce network bandwidth consumption, enhance access speed and present an easy viewing screen.
Preparing for Web Management
Before use web management, you can use console to login the switch checking the default IP of the Switch. Please refer to login. If you need change IP address in first time, you can use console mode to modify it. The default value is as below:
IP Address: Subnet Mask: Default Gateway:
192.168.16.1
255.255.255.0
192.168.16.254
Console Management
Chapter for console
User Name:
Password:
root
root
16
System Login
1. Launch the Internet Explorer on the PC
2. Key in ―http:// ―+‖ the IP address of the switch, and then Press ―Enter‖.
3. The login screen will appear right after
4. Key in the user name and password. The default user name and password are the
same as root
Login screen
5. Press Enterkey or click OK button, and then the home screen of the Web-based
management appears as below:
17
Main interface
Main interface
18
System Information
Assigning the system name, location and view the system information
System Name: Assign the name of switch. The maximum length is 64 bytes  System Description: Display the description of switch. Read only cannot be
modified System Location: Assign the switch physical location. The maximum length is 64
bytes
System Contact: Enter the name of contact person or organization  Firmware Version: Display the switch‘s firmware version Kernel Version: Display the kernel software version  MAC Address: Display the unique hardware address assigned by manufacturer
(default)
System information interface
IP Configuration
User can configure the IP Settings and DHCP client function DHCP Client: To enable or disable the DHCP client function. When DHCP client
function is enabled, the industrial switch will be assigned an IP address from the
network DHCP server. The default IP address will be replaced by the IP address
which assigned by DHCP server. After user click Apply button, a popup dialog
show up. It is to inform the user that when the DHCP client is enabled, the current
IP will lose and user should find the new IP on the DHCP server.
19
Apply
IP Address: Assign the IP address that the network is using. If DHCP client
function is enabled, and then user neednt assign the IP address manually. And,
the network DHCP server will assign the IP address for the industrial switch and
display it here. The default IP is 192.168.16.1 Subnet Mask: Assign the subnet mask of the IP address. If DHCP client function
is enabled, and then user neednt assign the subnet mask manually. Gateway: Assign the network gateway for the industrial switch. The default
gateway is 192.168.16.254
DNS1: Assign the primary DNS IP address  DNS2: Assign the secondary DNS IP address
And then, click
IP configuration interface
DHCP Server – System configuration
The system provides the DHCP server function. Enable the DHCP server function, the switch system will be a DHCP server. DHCP Server: Enable or Disable the DHCP Server function. Enable the switch
will be the DHCP server on your local network. Low IP Address: the dynamic IP assign range. Low IP address is the beginning
of the dynamic IP assigns range. For example: dynamic IP assign range is from
192.168.1.100 ~ 192.168.1.200. 192.168.1.100 will be the Low IP address.
20
High IP Address: the dynamic IP assign range. High IP address is the end of the
Apply
dynamic IP assigns range. For example: dynamic IP assign range is from
192.168.1.100 ~ 192.168.1.200. 192.168.1.200 will be the High IP address.
Subnet Mask: the dynamic IP assign range subnet mask.  Gateway: the gateway in your network.  DNS: Domain Name Server IP Address in your network.  Lease Time (sec): It is the time period that system will reset the dynamic IP
assignment to ensure the dynamic IP will not been occupied for a long time or the
server doesnt know that the dynamic IP is idle. And then, click
DHCP Server Configuration interface
DHCP Client – System Configuration
When the DHCP server function is active, the system will collect the DHCP client information and display in here.
DHCP Client Entries interface
21
DHCP Server - Port and IP Bindings
You can assign the specific IP address that is one of the IP in dynamic IP pool to the specific port. When the device is connected to the port and asks for dynamic IP assignment, the system will assign the IP address that had been assigned before to the connected device.
Port and IP Bindings interface
22
TFTP - Update Firmware
Apply
Apply
The functions allow a user to update the switch firmware. Before updating, make sure you have your TFTP server ready; and the firmware image is on the TFTP server.
1. TFTP Server IP Address: fill in your TFTP server IP.
2. Firmware File Name: the name of firmware image.
3. Click
.
Update Firmware interface
TFTP – Restore Configuration
You can restore EEPROM value of the switch from TFTP server. Before doing this, you must have a prior backup of configuration in TFTP server then switch can restore the backup file to its EEPROM.
1. TFTP Server IP Address: fill in the TFTP server IP.
2. Restore File Name: fill in the correct restore file name.
3. Click
.
Restore Configuration interface
23
Apply
Reload
Clear
Apply
TFTP - Backup Configuration
You can save current EEPROM value from the switch to TFTP server for restoring again afterward.
1. TFTP Server IP Address: fill in the TFTP server IP
2. Backup File Name: fill the file name
3. Click
.
Backup Configuration interface
System Event Log – Syslog Configuration
Configure the system event mode, that you want to collect, and system log server IP.
1. Syslog Client Mode: select the system log mode – client only, server only, or
both S/C.
2. System Log Server IP Address: assigned the system log server IP.
3. Click
4. Click
5. After configuring, Click
to refresh the events log.
to clear all current events log.
.
24
Syslog Configuration interface
System Event Log - SMTP Configuration
You can set up the mail server IP, mail account, account password, and forwarded email account for receiving the event alert.
1. Email Alert: enable or disable the email alert function.
2. SMTP Server IP: set up the mail server IP address (when Email Alert enabled,
this function will then be available).
3. Authentication: mark the check box to enable and configure the email account
and password for authentication (when Email Alert enabled, this function will then
be available).
4. Mail Account: set up the email account, e.g. johnadmin@123.com, to receive the
alert. It must be an existing email account on the mail server, which you had set up
in SMTP Server IP Address column.
5. Password: The email account password.
25
Apply
Apply
6. Confirm Password: reconfirm the password.
7. Rcpt e-mail Address 1 ~ 6: you can assign up to 6 e-mail accounts also to
receive the alert.
8. Click
.
SMTP Configuration interface
System Event Log - Event Configuration
You can select the system log events and SMTP events. When selected events occur, the system will send out the log information. Also, per port log and SMTP events can
be selected. After configure, Click System event selection: 4 selections Device cold start, Device warm start,
SNMP Authentication Failure, and X-ring topology change. Mark the checkbox to
select the event. When selected events occur, the system will issue the logs.
Device warm start: when the device executes warm start, the system will
.
26
issue a log event.
Authentication Failure: when the SNMP authentication fails, the system will
issue a log event.
Port event selection: select the per port events and per port SMTP events. It has
3 selections – Link UP, Link Down, and Link UP & Link Down. Disable means no
event is selected.
Link UP: the system will issue a log message when port connection is up
only.
Link Down: the system will issue a log message when port connection is
down only.
Link UP & Link Down: the system will issue a log message when port
connection is up and down.
27
Event Configuration interface
SNTP Configuration
You can configure the SNTP (Simple Network Time Protocol) settings. The SNTP allows you to synchronize switch clocks in the Internet.
1. SNTP Client: enable or disable SNTP function to get the time from the SNTP
server.
2. Daylight Saving Time: enable or disable daylight saving time function. When
28
daylight saving time is enabling, you need to configure the daylight saving time
Local Time Zone
Conversion from UTC
Time at 12:00 UTC
November Time Zone
- 1 hour
11am
Oscar Time Zone
-2 hours
10 am
ADT - Atlantic Daylight
-3 hours
9 am
AST - Atlantic Standard EDT - Eastern Daylight
-4 hours
8 am
EST - Eastern Standard CDT - Central Daylight
-5 hours
7 am
CST - Central Standard MDT - Mountain Daylight
-6 hours
6 am
MST - Mountain Standard PDT - Pacific Daylight
-7 hours
5 am
PST - Pacific Standard ADT - Alaskan Daylight
-8 hours
4 am
ALA - Alaskan Standard
-9 hours
3 am
HAW - Hawaiian Standard
-10 hours
2 am
Nome, Alaska
-11 hours
1 am
period..
3. UTC Timezone: set the switch location time zone. The following table lists the
different location time zone for your reference.
29
CET - Central European FWT - French Winter MET - Middle European MEWT - Middle European Winter SWT - Swedish Winter
+1 hour
1 pm
EET - Eastern European, USSR Zone 1
+2 hours
2 pm
BT - Baghdad, USSR Zone 2
+3 hours
3 pm
ZP4 - USSR Zone 3
+4 hours
4 pm
ZP5 - USSR Zone 4
+5 hours
5 pm
ZP6 - USSR Zone 5
+6 hours
6 pm
WAST - West Australian Standard
+7 hours
7 pm
CCT - China Coast, USSR Zone 7
+8 hours
8 pm
JST - Japan Standard, USSR Zone 8
+9 hours
9 pm
EAST - East Australian Standard GST Guam Standard, USSR Zone 9
+10 hours
10 pm
IDLE - International Date Line NZST - New Zealand Standard NZT - New Zealand
+12 hours
Midnight
4. SNTP Sever URL: set the SNTP server IP address.
30
5. Daylight Saving Period: set up the Daylight Saving beginning time and Daylight
Apply
Saving ending time. Both will be different in every year.
6. Daylight Saving Offset (mins): set up the offset time.
7. Switch Timer: display the switch current time.
8. Click
.
SNTP Configuration interface
IP Security
IP security function allows user to assign 10 specific IP addresses that have permission to access the switch through the web browser for the securing switch management.
IP Security Mode: When this option is in Enable mode, the Enable HTTP Server
and Enable Telnet Server check boxes will then be available. Enable HTTP Server: When this check box is checked, the IP addresses among
Security IP1 ~ IP10 will be allowed to access via HTTP service. Enable Telnet Server: When checked, the IP addresses among Security IP1 ~
IP10 will be allowed to access via Telnet service. Security IP 1 ~ 10: Assign up to 10 specific IP address. Only these 10 IP address
can access and manage the switch through the Web browser
31
Apply
Apply
And then, click
button to apply the configuration
[NOTE]
Remember to execute the Save Configuration action, otherwise the new
configuration will lose when switch powers off.
IP Security interface
User Authentication
Change web management login user name and password for the management security issue
1. User name: Key in the new user name(The default is root)
2. Password: Key in the new password(The default is root)
3. Confirm password: Re-type the new password
4. And then, click
32
Apply
User Authentication interface
Advanced Configuration-Broadcast Storm Filter
This page enables user to select the filter packet type. All the packet types filtering conditions could be selected at the same time.
1. Flooded Unicast/Multicast Packets: When this check box is marked, the switch
will filter the packet type of Flooded Unicast/Multicast.
2. Control Packets: When this check box is marked, the switch will filter the packet
type of Control.
3. IP Multicast Packets: When this check box is marked, the switch will filter the
packet type of IP Multicast.
4. Broadcast Packets: When this check box is marked, the switch will filter the
packet type of Flooded Unicast/Multicast.
5. Broadcast Storm Rate: User can set the filtering rate range from 1/2 of ingress to
1/16 of ingress.
6. And then, click
33
Apply
Broadcast Storm Filter
Advanced Configuration-Aging Time
This tab is used to assign the aging time of MAC table.
Aging Time of MAC Table
: Select the aging time as OFF, 150 sec, 300 sec, or 600 sec. When MAC table is not used within the aging time, the MAC address table will then be cleared.
Auto Flush MAC Table When Link Down
will flush its MAC address table when link down.
Click
button to make the setting effective.
: When this item is enabled, the switch
Aging Time Setting
34
Advanced Configuration-Jumbo Frame
Apply
This tab is used to enable the jumbo frame function.
Enable Jumbo Frame
: When this item is marked, the Gigabit port of the switch
(on the rear panel) extends the frame to 9022bytes.
Click
button to make the setting effective.
Jumbo Frame Setting
35
Clear
Port Statistics
The following information provides the current port statistic information Click
button to clean all counts
Port Statistics interface
Port Control
In Port control, you can view every port status that depended on user setting and the negotiation result.
1. Port: select the port that you want to configure.
2. State: Current port status. The port can be set to disable or enable mode. If the port setting is disable then will not receive or transmit any packet.
3. Negotiation: set auto negotiation status of port.
4. Speed: set the port link speed.
36
5. Duplex: set full-duplex or half-duplex mode of the port.
Apply
6. Flow Control: set flow control function is Symmetric or Asymmetric in Full Duplex mode. The default value is Disable.
7. Security: When its state is On, means this port accepts only one MAC address.
8. Click
.
Port Control interface
Port Trunk
The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems on a link to allow their Link
37
Select
Add
Remove
Apply
Delete
Delete
Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs, move the link to that Link Aggregation Group, and enable its transmission and reception functions in an orderly manner. Link aggregation lets you group up to seven consecutive ports into two dedicated connections. This feature can expand bandwidth to a device on the network.
operation requires full-duplex mode,
more detail information refers to IEEE
LACP
802.3ad.
Aggregator setting
1. System Priority: a value used to identify the active LACP. The switch with the lowest value has the highest priority and is selected as the active LACP.
2.
Group ID:
" and click
ID
3. LACP: If enable, the group is LACP static trunk group. If disable, the group is local static trunk group. All ports support LACP dynamic trunk group. If connecting to the device that also supports LACP, the LACP dynamic trunk group will be created
There are three trunk groups to provide configure. Choose the "
.
Group
automatically.
4. Work ports: allow max four ports can be aggregated at the same time. With LACP static trunk group, the exceed ports are standby and can be aggregated if work ports fail. If it is local static trunk group, the number of ports must be the same as the group member ports.
5. Select the ports to join the trunk group. Allow max four ports can be aggregated at the same time. Click
select the port and click
button to add the port. To remove unwanted ports,
button.
6. If LACP enabled, you can configure LACP Active/Passive status in each ports on State Activity page.
7. Click
8. Use
.
button to delete Trunk Group. Select the Group ID and click
button.
38
Port TrunkAggregator Setting interface
Aggregator Information
When you have set the LACP aggregator, you will see the related information here.
Port Trunk – Aggregator Information interface
39
Apply
State Activity
When you have set up the LACP aggregator, you can configure port state activity. You can mark or un-mark the port. When you mark the port and click port state activity will change to
Active
. Opposite is
Passive
.
button the
Active: The port automatically sends LACP protocol packets.  Passive: The port does not automatically send LACP protocol packets, and
responds only if it receives LACP protocol packets from the opposite device.
[NOTE]
1. A link having either two active LACP ports or one active port can perform
dynamic LACP trunk.
2. A link has two passive LACP ports will not perform dynamic LACP trunk
because both ports are waiting for an LACP protocol packet from the opposite device.
3. If you are active LACP‘s actor, after you have selected trunk port, the active
status will be created automatically.
Port Trunk – State Activity interface
40
Apply
Port Mirroring
The Port mirroring is a method for monitoring traffic in switched networks. Traffic through ports can be monitored by one specific port. That means traffic goes in or out monitored (source) ports will be duplicated into analysis (mirror) port.
Mode: Select the mirroring mode by pulling down the selection item menu: RX, TX
or Both RX TX.
Analysis Port: Select one port to be the analysis (mirror) port for monitoring RX
only, TX only or both RX and TX traffic which come from source port. User can connect analysis port to LAN analyzer or Netxray
Monitored Port: The ports that user wants to monitor. All monitored port traffic will
be copied to analysis (mirror) port. User can select one monitored port by pulling down the selection item menu.
And then, click
button.
Port Trunk – Port Mirroring interface
Rate Limiting
You can set up every ports bandwidth rate here.
41
Apply
Rate Limiting interface
All the ports support packet ingress and egress rate control. For example, assume
port 1 is 10Mbps, users can set it‘s effective egress rate is 2Mbps, ingress rate is 1Mbps. The switch performs the ingress rate by packet counter to meet the specified rate
InRate: Enter the port effective ingress rate(The default value is 0)  OutRate: Enter the port effective egress rate(The default value is 0)
And then, click
to apply the settings
42
VLAN configuration
A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain, which would allow you to isolate network traffic, so only the members of the VLAN will receive traffic from the members of the same VLAN. Basically, creating a VLAN from a switch is logically equivalent of reconnecting a group of network devices to another Layer 2 switch. However, all the network devices are still plugged into the same switch physically.
The industrial switch supports port-based and 802.1Q (tagged-based) VLAN. The default configuration of VLAN operation mode is
VLAN Configuration interface
Disable
‖.
VLAN configuration - Port-based VLAN
Packets can go among only members of the same VLAN group. Note all unselected ports are treated as belonging to another single VLAN. If the port-based VLAN enabled, the VLAN-tagging is ignored.
In order for an end station to send packets to different VLAN groups, it itself has to be either capable of tagging packets it sends with VLAN tags or attaches to a VLAN-aware bridge that is capable of classifying and tagging the packet with different VLAN ID based on not only default PVID but also other information about the packet, such as the protocol.
43
Add
Apply
VLAN – Port Based interface
Click
to add a new VLAN group(The maximum VLAN group is up to 64
VLAN groups)
Entering the VLAN name, group ID and grouping the members of VLAN group  And then, click
44
Delete
Edit
VLANPort Based Add interface
You will see the VLAN displays.  Use
Use
button to delete unwanted VLAN.
button to modify existing VLAN group.
[NOTE]
Remember to execute the Save Configuration action, otherwise the new
configuration will lose when switch powers off.
45
Apply
802.1Q VLAN
Tagged-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch venders. IEEE 802.1Q VLAN uses a technique to insert a ―tag‖ into the Ethernet frames. Tag contains a VLAN Identifier (VID) that indicates the VLAN numbers. You can create Tag-based VLAN, and enable or disable GVRP protocol. There are 256 VLAN groups to provide configuration. Enable 802.1Q VLAN, the all ports on the switch belong to default VLAN, VID is 1. The default VLAN can‘t be deleted.
GVRP allows automatic VLAN configuration between the switch and nodes. If the switch is connected to a device with GVRP enabled, you can send a GVRP request using the VID of a VLAN defined on the switch; the switch will automatically add that device to the existing VLAN.
802.1Q Configuration
1. Enable GVRP Protocol: check the check box to enable GVRP protocol.
2. Select the port that you want to configure.
3. Link Type: there are 3 types of link type. Access Link: single switch only, allow user to group ports by setting the
same VID.
Trunk Link: extended application of Access Link, allow user to group ports
by setting the same VID with 2 or more switches.
Hybrid Link: Both Access Link and Trunk Link are available.
4. Untagged VID: assign the untagged frame VID.
5.
Tagged VID:
6. Click
assign the tagged frame VID.
46
Edit
802.1q VLAN interface
Group Configuration
Edit the existing VLAN Group.
1. Select the VLAN group in the table list.
2. Click
47
Apply
Group Configuration interface
3. You can Change the VLAN group name and VLAN ID.
4. Click
.
Group Configuration interface
Rapid Spanning Tree
The Rapid Spanning Tree Protocol (RSTP) is an evolution of the Spanning Tree Protocol and provides for faster spanning tree convergence after a topology change. The system also supports STP and the system will auto detect the connected device that is running STP or RSTP protocol.
48
RSTP - System Configuration
Apply
User can view spanning tree information about the Root Bridge  User can modify RSTP state. After modification, click
button
RSTP mode: user must enable or disable RSTP function before configure the
related parameters
Priority (0-61440): a value used to identify the root bridge. The bridge with
the lowest value has the highest priority and is selected as the root. If the value changes, user must reboot the switch. The value must be multiple of 4096 according to the protocol standard rule
Max Age (6-40): the number of seconds a bridge waits without receiving
Spanning-tree Protocol configuration messages before attempting a reconfiguration. Enter a value between 6 through 40
Hello Time (1-10): the time that controls switch sends out the BPDU packet
to check RSTP current status. Enter a value between 1 through 10
Forward Delay Time (4-30): the number of seconds a port waits before
changing from its Rapid Spanning-Tree Protocol learning and listening states to the forwarding state. Enter a value between 4 through 30
[NOTE]
Follow the rule to configure the MAX Age, Hello Time, and Forward Delay Time.
2 x (Forward Delay Time value –1) > = Max Age value >= 2 x (Hello Time value +1)
49
RSTP System Configuration interface
RSTP - Port Configuration
You can configure path cost and priority of every port.
1. Select the port in Port column.
1. Path Cost: The cost of the path to the other bridge from this transmitting bridge at
the specified port. Enter a number 1 through 200000000.
2. Priority: Decide which port should be blocked by priority in LAN. Enter a number 0
through 240. The value of priority must be the multiple of 16.
3. Admin P2P: Some of the rapid state transactions that are possible within RSTP are
dependent upon whether the port concerned can only be connected to exactly one other bridge (i.e. it is served by a point-to-point LAN segment), or can be connected to two or more bridges (i.e. it is served by a shared medium LAN segment). This function allows the P2P status of the link to be manipulated administratively. True is P2P enabling. False is P2P disabling.
50
Apply
RSTP Port Configuration interface
4. Admin Edge: The port directly connected to end stations cannot create bridging
loop in the network. To configure the port as an edge port, set the port to True status.
5. Admin Non Stp: The port includes the STP mathematic calculation. True is not
including STP mathematic calculation. False is including the STP mathematic calculation.
6. Click
.
51
Pro-Ring System
X-Ring provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms not the same.
In the X-Ring topology, every switch should enable X-Ring function and assign two member ports in the ring. Only one switch in the X-Ring group would be set as a master switch that would be blocked, called backup port, and another port is called working port. Other switches in the X-Ring group are called working switches and their two member ports are called working ports. When the failure of network connection occurs, the backup port will automatically become a working port to recovery the failure.
The switch supports the function and interface for setting the switch as the ring master or slave mode. The ring master can negotiate and place command to other switches in the X-Ring group. If there are 2 or more switches in master mode, then software will select the switch with lowest MAC address number as the ring master. The X-Ring master ring mode will be enabled by the X-Ring configuration interface. Also, user can identify the switch as the ring master from the R.M. LED panel of the LED panel on the switch.
The system also supports the coupling ring that can connect 2 or more X-Ring group for the redundant backup function and dual homing function that prevent connection lose between X-Ring group and upper level/core switch.
Enable X-Ring: To enable the X-Ring function. Marking the check box to enable
the X-Ring function.
Enable Ring Master: Mark the check box for enabling this machine to be a ring
master.
1st & 2nd Ring Ports: Pull down the selection menu to assign two ports as the
member ports. 1st Ring Port is the working port and 2nd Ring Port is the backup port. When 1st Ring Port fails, the system will automatically upgrade the 2nd Ring Port to be the working port.
52
Enable Coupling Ring: To enable the coupling ring function. Marking the check
box to enable the coupling ring function.
Coupling port: Assign the member port.  Control port: Set the switch as the master switch in the coupling ring.  Enable Dual Homing: Set up one of port on the switch to be the Dual Homing
port. In an X-Ring group, maximum Dual Homing port is one. Dual Homing only work when the X-Ring function enable.
And then, click to apply the configuration.
X-ring Interface
[NOTE]
1. When the X-Ring function enable, user must disable the RSTP. The X-Ring
function and RSTP function cannot exist at the same time.
2. Remember to execute the Save Configuration action, otherwise the new
configuration will lose when switch power off.
53
Change
Add
Remove
SNMP Configuration
Simple Network Management Protocol (SNMP) is the protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Network management systems learn of problems by receiving traps or change notices from network devices implementing SNMP.
System Configuration
Community Strings
You can define new community string set and remove unwanted community string.
Agent Mode:
Select the SNMP version that you want to use it. And then click
to switch to the selected SNMP version mode.
1. String: fill the name of string.
2. RO: Read only. Enables requests accompanied by this string to display MIB-object information.
3. RW: Read write. Enables requests accompanied by this string to display MIB-object information and to set MIB objects.
1. Click
.
2. To remove the community string, select the community string that you have defined and click
. You cannot remove the default community string set.
54
Add
Remove
SNMP System Configuration interface
Trap Configuration
A trap manager is a management station that receives traps, the system alerts generated by the switch. If no trap manager is defined, no traps will issue. Create a trap manager by entering the IP address of the station and a community string. To define management stations as trap manager and enter SNMP community strings and selects the SNMP version.
1. IP Address: enter the IP address of trap manager.
2. Community: enter the community string.
3. Trap Version: select the SNMP trap version type – v1 or v2.
4. Click
.
5. To remove the community string, select the community string that you have defined
and click
. You cannot remove the default community string set.
55
Add
Remove
Add
Remove
SNMPV3 Configuration
Trap Managers interface
Configure the SNMP V3 function including
Access Table
and
MIBView Table
.
Context Table, User Profile, Group Table
Context Table
Configure SNMP v3 context table. Assign the context name of context table. Click
to add context name. Click
to remove unwanted context name.
User Profile
Configure SNMP v3 user table..
User ID: set up the user name.  Authentication Password: set up the authentication password.
,
Privacy Password: set up the private password.  Click
Click
to add context name.
to remove unwanted context name.
56
SNMP V3 configuration interface
57
Add
Remove
Add
Remove
Add
Remove
Group Table
Configure SNMP v3 group table. Security Name (User ID): assign the user name that you have set up in user
table.
Group Name: set up the group name.  Click
Click
to add context name.
to remove unwanted context name.
Access Table
Configure SNMP v3 access table.
Context Prefix: set up the context name.  Group Name: set up the group.  Security Level: select the access level.  Context Match Rule: select the context match rule.  Read View Name: set up the read view.  Write View Name: set up the write view.  Notify View Name: set up the notify view.
Click
to add context name.
Click
to remove unwanted context name.
MIBview Table
Configure MIB view table.
ViewName: set up the name.  Sub-Oid Tree: fill the Sub OID.  Type: select the type – exclude or included.
Click
Click
to add context name.
to remove unwanted context name.
58
QoS Configuration
Apply
You can configure
Priority
setting and
Qos mode, 802.1p priority [7-0]
setting.
TOS
setting,
Static Port Ingress
Select the Qos Mode: Select the Qos policy rule
Disable QoS Priority: The default status of Qos Priority is disabled.  High Empty Then Low: When all the high priority packets are empty in
queue, low priority packets will be processed then.
Highest:SecHigh:SecLow:Lowest:8:4:2:1: The switch will follow 8:4:2:1
rate to process priority queue from Highest to lowest queue.
Use an 8,4,2,1 weighted fair queuing scheme: The switch will follow 8:4:2:1
rate to process priority queue from High to Lowest queue. For example, as the system processes 1 frames of the lowest queue, 2 frames of the low queue, 4 frames of the middle queue, and 8 frames of the high queue will be processed at the same time in accordance with the 8,4,2,1 policy rule.
Highest:SecHigh:SecLow:Lowest:15:7:3:1: The process order is in
compliance with the transfer rate of 15:7:3:1.
Highest:SecHigh:SecLow:Lowest:15:10:5:1: The process order is in
compliance with the transfer rate of 15:10:5:1.
802.1p priority [7-0]: Configure per priority level.
Priority 0 ~ 7: each priority has 4 priority levels – Highest, SecHigh, SecLow,
and Lowest.
Static Port Ingress Priority: The port ingress level is from 0 to 7.
TOS: the system provides 0~63 TOS priority level. Each level has 8 priorities –
0~7. The default value is 0 priority for each level. When the IP packet is received, the system will check the TOS level value in the IP packet that has received. For example: user set the TOS level 25 is 0. The port 1 is following the TOS priority policy only. When the port 1 packet received, the system will check the TOS value of the received IP packet. If the TOS value of received IP packet is 25(priority = 0), and then the packet priority will have highest priority.
Click
59
.
QoS Configuration interface
60
IGMP Configuration
Message
Description
Query
A message sent from the querier (IGMP router or switch) asking for a response from each host belonging to the multicast group.
Report
A message sent by a host to the querier to indicate that the host wants to be or is a member of a given group indicated in the report message.
Leave Group
A message sent by a host to the querier to indicate that the host has quit being a member of a specific multicast group.
Apply
The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol (IP) suite. IP manages multicast traffic by using switches, routers, and hosts that support IGMP. Enabling IGMP allows the ports to detect IGMP queries and report packets and manage IP multicast traffic through the switch. IGMP have three fundamental types of message as follows:
The switch support IP multicast, you can enable IGMP protocol on web management‘s switch setting advanced page, then display the IGMP snooping information. IP multicast addresses range from 224.0.0.0 through 239.255.255.255.
IGMP Protocol: enable or disable the IGMP protocol.  IGMP Query: Select the IGMP query function as Enable or Auto to set the switch
as a querier for IGMP version 2 multicast network.
Click
.
61
Apply
LLDP
IGMP Configuration interface
LLDP (Link Layer Discovery Protocol) function allows the switch to advertise its information to other nodes on the network and store the information it discovers.
LLDP Protocol: Disable or enable LLDP function.  LLDP Interval: Set the interval of learning the information time in second.
Click
.
LLDP Configuration interface
Security
In this section, you can configure 802.1x and MAC address table.
802.1X/Radius Configuration
62
802.1x is an IEEE authentication specification that allows a client to connect to a
Apply
wireless access point or wired switch but prevents the client from gaining access to the Internet until it provides authority, like a user name and password that are verified by a separate server.
System Configuration
After enabling the IEEE 802.1X function, you can configure the parameters of this function.
1. IEEE 802.1x Protocol: .enable or disable 802.1x protocol.
2. Radius Server IP: set the Radius Server IP address.
3. Server Port: set the UDP destination port for authentication requests to the specified Radius Server.
4. Accounting Port: set the UDP destination port for accounting requests to the specified Radius Server.
5. Shared Key: set an encryption key for using during authentication sessions with the specified radius server. This key must match the encryption key used on the Radius Server.
6. NAS, Identifier: set the identifier for the radius client.
7. Click
.
802.1x System Configuration interface
802.1x Port Configuration
You can configure 802.1x authentication state for each port. The State provides
63
Apply
Disable, Accept, Reject and Authorize. Use
Space‖
key change the state value.
Reject: the specified port is required to be held in the unauthorized state.  Accept: the specified port is required to be held in the Authorized state.  Authorized: the specified port is set to the Authorized or Unauthorized state in
accordance with the outcome of an authentication exchange between the Supplicant and the authentication server.
Disable: The specified port is required to be held in the Authorized state  Click
.
802.1x Per Port Setting interface
64
Misc Configuration
Apply
1. Quiet Period: set the period during which the port doesn‘t try to acquire a supplicant.
2. TX Period: set the period the port wait for retransmit next EAPOL PDU during an authentication session.
3. Supplicant Timeout: set the period of time the switch waits for a supplicant response to an EAP request.
4. Server Timeout: set the period of time the switch waits for a server response to an authentication request.
5. Max Requests: set the number of authentication that must time-out before authentication fails and the authentication session ends.
6. Reauth period: set the period of time after which clients connected must be re-authenticated.
7. Click
.
802.1x Misc Configuration interface
MAC Address Table
Use the MAC address table to ensure the port security.
65
Add
Delete
Static MAC Address
You can add a static MAC address; it remains in the switch's address table, regardless of whether the device is physically connected to the switch. This saves the switch from having to re-learn a device's MAC address when the disconnected or powered-off device is active on the network again. You can add / modify / delete a static MAC address.
Add the Static MAC Address You can add static MAC address in switch MAC table.
1. MAC Address: Enter the MAC address of the port that should permanently forward traffic, regardless of the device network activity.
2. VID: Type in VID of the MAC address.
3. Port No.: pull down the selection menu to select the port number.
4. Click
.
5. If you want to delete the MAC address from filtering table, select the MAC address and click
.
Static MAC Addresses interface
66
MAC Filtering
Add
Delete
Clear MAC Table
By filtering MAC address, the switch can easily filter pre-configure MAC address and reduce the un-safety. You can add and delete filtering MAC address.
MAC Filtering interface
1. MAC Address: Enter the MAC address that you want to filter.
2. VID: Type in the VID of the MAC address.
3. Click
.
4. If you want to delete the MAC address from filtering table, select the MAC address and click
.
All MAC Addresses
You can view the port that connected devices MAC address and related devices MAC address.
1. Select the port.
2. The selected port of static MAC address information will display.
3. Click
to clear the current port static MAC address information
on screen.
67
All MAC Address interface
Access Control List
Group Id: Type in the Group ID from 1 to 255.  Action: Permit and Deny.  VLAN: Select any or a particular VID.  Packet type: Select packet type – IPv4 or Non-IPv4  Src IP Address: Select any or assign an IP address with Subnet Mask for source
IP address.
Dst IP Address: Select any or assign an IP address with Subnet Mask for
destination IP address.
Ether Type: Pull down the select menu for Any, ARP or IPX.  IP Fragment: Set this item as to whether the fragment is checked or not.  L4 Protocol: Assign the L4 protocol from among ICMP(1), IGMP(2), TCP or UDP.  Current List: Display the current list information.
68
Reset
Access Control List interface
Factory Default
Reset switch to default configuration. Click default value.
to reset all configurations to the
Factory Default interface
69
Save
Reboot
Save Configuration
Save all configurations that you have made in the system. To ensure the all configuration will be saved. Click memory.
Save Configuration interface
System Reboot
Reboot the switch in software reset. Click
to save the all configuration to the flash
to reboot the system.
System Reboot interface
70
6. Troubleshooting
This section is intended to help you solve the most common problems on the 3-slot intelligent chassis switch.
Incorrect connections
The switch port can auto-detect straight or crossover cable when you link switch with other Ethernet device. For the RJ-45 connector should use correct UTP or STP cable, 10/100Mbps port use 2-pair twisted cable and Gigabit 1000T port use 4-pair twisted cable. If the RJ-45 connector is not correct pin on right position then the link will fail. For fiber connection, please notice that fiber cable mode and fiber module should be match.
Faulty or loose cables
Look for loose or obviously faulty connections. If they appear to be OK, make sure the connections are snug. IF that does not correct the problem, try a different cable.
Non-standard cables
Non-standard and miss-wired cables may cause numerous network collisions and other network problem, and can seriously impair network performance. A category 5 cable tester is a recommended tool for every 100Base-T network installation.
Improper Network Topologies
It is important to make sure that you have a valid network topology. Common topology faults include excessive cable length and too many repeaters (hubs) between end nodes. In addition, you should make sure that your network topology contains no data path loops. Between any two ends nodes, there should be only one active cabling path
71
at any time. Data path loops will cause broadcast storms that will severely impact your network performance.
Diagnosing LED Indicators
The Switch can be easily monitored through panel indicators to assist in identifying problems, which describes common problems you may encounter and where you can find possible solutions.
IF the power indicator does turn on when the power cord is plugged in, you may have a problem with power outlet, or power cord. However, if the Switch powers off after running for a while check for loose power connections, power losses or surges at power outlet. IF you still cannot resolve the problem, contact your local dealer for assistance.
Cabling
RJ-45 ports:
RJ-45 connections: 100Ω Category 3, 4 or 5 cable for 10Mbps connections, 100Ω Category 5 cable for 100Mbps or 100Ω Category 5e cable for 1000Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100
meters (328 feet). The length does not exceed 100 meters.
use unshielded twisted-pair (UTP) or shield twisted-pair ( STP ) cable for
72
7. Technical Specification
Standard
IEEE802.3 10BASE-T IEEE802.3u 100BASE-TX/100BASE-FX IEEE802.3z Gigabit SX/LX IEE802.3ab Gigabit 1000T IEEE802.3x Flow Control and Back pressure IEEE802.3ad Port trunk with LACP IEEE802.1d Spanning tree protocol IEEE802.1w Rapid Spanning tree protocol IEEE802.1p Class of service IEEE802.1q VLAN Tagging IEEE802.1x User authentication
Switch architecture
Store and forward switch architecture.
Back plane
8.8Gbps
LED Indicators
System Power(Green ) 8 10/100TX module: Link/Activity (Green), Full duplex/collision (Yellow) 8 100Base-FX module: Link (Green)/Activity (Green Blinking) 8 100SFP module: Link (Green)/Activity (Green Blinking) Gigabit Copper: Link/Activity (Green), 1000Mbps (Green), 100Mbps (Green), Full duplex/collision
This section provides the specifications of the 3-slot intelligent chassis switch, and the following table lists these specifications.
73
(Yellow) MINI GBIC: Link/Activity(Green), 1000Mbps (Green)
Connector
RS-232 console: Female DB-9 8-port 10/100TX module: RJ-45 8-port 100FX(Multi /Single Mode) module: SC 8-port 100SFP module: SFP 2 Gigabit Copper + 2 MINI GBIC Combo: 2 x RJ-45 + 2 x 3.3v MINI GBIC
Expansion module
8 port 10/100TX module with RJ-45 connector  8 port 100Mbps multi mode fiber module with SC
connector
8 port 100Mbps single mode fiber module with SC
connector
8 port 100Mbps SFP module
MAC address
8K MAC address table with Auto learning function
Packet Buffer
4Mbits for packet buffer
Flash ROM
4Mbytes
DRAM
16Mbytes
Jumbo Frame
9022bytes (only for Gigabit ports)
Power Consumption
50Watts (Maximum)
Dimensions
440mm (W) x 280mm (D) x 44mm (H)
Power Supply
100~240VAC, 50 /60Hz, 0.8A (maximum)
74
Ventilation
2 x DC cooling fan with auto-detect function
Operating temperature
-0℃~45℃, 5%~95%RH
Storage temperature
-40℃~70℃, 5% ~ 95% RH
EMI
FCC Class A, CE
Safety
UL, cUL, CE/EN60950-1
75
Loading...