Specifications are subject to change without notice.
Linksys, the Cisco Systems logo, the Linksys Logo, and the Linksys One logo are registered trademarks of Cisco
Systems, Inc. All other trademarks mentioned in this document are the property of their respective owners.
Defining MAC Based ACL37
Adding Rule to MAC Based ACL38
Defining IP Based ACL38
Adding an IP Based Rule40
Defining ACL Binding40
Modifying ACL Binding41
Federal Communications Commission Interference Statement152
Industry Canada Statement152
Règlement d’Industry Canada153
EC Declaration of Conformity (Europe)153
User Information for Consumer Products Covered by EU Directive 2002/96/EC on
Waste Electric and Electronic Equipment (WEEE)153
This publication is designed for people who have some experience installing networking equipment
such as routers, hubs, servers, and switches. We assume the person installing and troubleshooting
the SFE1000P is familiar with electronic circuitry and wiring practices and has experience as an
electronic or electromechanical technician.
Purpose
This guide documents the features of the Linksys Business Series SFE1000P Gigabit Ethernet Switch
(SFE1000P). It describes the administration of the SFE1000P, explains how to install the SFE1000P,
and provides configuration information.
Organization
1
This guide is organized into the following chapters:
•Chapter 2, "Getting Started,"is an introduction to the user interface.
•Chapter 3, "Managing Device Information,"provides information for defining both basic
and advanced system information.
•Chapter 13, "Configuring Quality of Service," shows how to define Quality of Service
general settings, advanced mode settings, and basic mode settings. It also describes
configuring policy tables.
•Chapter 14, "Managing System Files," describes working with file management, logs, and
diagnostics.
•Chapter 15, "Managing System Logs," shows how to enable system logs, view device
memory logs, flash logs, and remote logs.
•Chapter 16, "Configuring System Time," provides information for configuring the system
time, and includes defining system time, SNTP settings, and SNTP authentication.
•Chapter 17, "Viewing Statistics," describes viewing and managing device statistics for
RMON, interfaces, GVRP, EAP, and Etherlike statistics.
•Chapter 18, "Managing Device Diagnostics," contains information for configuring port
mirroring, running cable tests, and viewing device operational information.
•Appendix B, "Contacts," is a listing of support resources and contact information for such.
1
•Appendix C, "Warranty Information," is the Linksys warranty.
3. Enter a user name and password. The default user name is "admin"
configured with a default password, and can be configured without entering a password.
Passwords are both case sensitive and alpha-numeric.
4. Click Login The Embedded Web System Home Page opens:
NOTE: If you have logged in automatically via the Service
Router user interface, the Tree and Device views appear
and allow you to navigate through the various areas of
the web interface. However, the following page will
appear within the frame provided by the Service Router
user interface.
. The device is not
Chapter 2: Getting Started
Starting the Application
The following table lists the interface components with their corresponding numbers:
Interface Components
Component Description
Tree ViewThe Tree View provides easy navigation through the configurable
1
device features.The main branches expand to provide the subfeatures.
2 Device ViewThe device view provides information about device ports, current
configuration and status, table information, and feature
components.The device view also displays other device information
and dialog boxes for configuring parameters.
3 Table AreaThe Table area enables navigating through the different device
features. Click the tabs to view all the components under a specific
feature.
4 EWS InformationThe EWS information tabs provide access to the online help, contains
information about the EWS.
Chapter 2: Getting Started
Understanding the Interface
4. Click the Delete button. The information is deleted, and the device is updated.
Resetting the Device
The Reset page enables the device to be reset from a remote location. Save all changes to the
Running Configuration file before resetting the device. This prevents the current device configuration
from being lost. To reset the device:
1. Click System > General > Reset. The Reset page opens.
Reset Page
2
2. Click the Reset button. The device is reset, and a prompt for a user name and password is
displayed.
3. Enter a user name and password to reconnect to the Web Interface, if the device is not part of a
full Linksys One system. If the device is part of a Linksys One system, login is automatically done
from the Service Router.
Logging Off The Device
Click . The system logs off. The Embedded Web System Home Page closes.
The System Information Page contains parameters for configuring general device information.
1. Click the System > System Management > System Information. The System Information Page
opens:
System Information Page
3
2. Enter information into the appropriate fields and press Apply.
Resetting the Device
The Reset page enables the device to be reset from a remote location. Save all changes to the
Startup Configuration file before resetting the device. This prevents the current device configuration
from being lost.
To reset the device:
1. Click System > General > Reset. The Reset page opens.
Chapter 3: Managing Device Information
Defining General System Information
3. Enter a user name and password to reconnect to the Web Interface. If the device is part of a
Linksys One system, login is automatically done from the Service Router.
Chapter 3: Managing Device Information
Resetting the Device
Power-over-Ethernet (PoE) provides power to devices over existing LAN cabling, without updating or
modifying the network infrastructure. Power-over-Ethernet removes the necessity of placing network
devices next to power sources.
Power-over-Ethernet can be used in the following applications:
•IP Phones
•Wireless Access Points
•IP Gateways
•PDAs
•Audio and video remote monitoring
Defining PoE Settings
4
Powered Devices are devices which receive power from the device power supplies, for example IP
phones. Powered Devices are connected to the device via Ethernet ports. Guard Band protects the
device from exceeding the maximum power level. For example, if 400W is maximum power level,
and the Guard Band is 20W, if the total system power consumption exceeds 380W no additional
PoE components can be added. The accumulated PoE components power consumption is rounded
down for display purposes, therefore remove value after decimal point.
NOTE: Due to hardware limitations, the power
measurement accuracy is 4%.
The PoE Settings Page contains system PoE information for enabling PoE on the device, monitoring
the current power usage, and enabling PoE traps.
1. Click Bridging > Port Management > PoE Settings. The PoE Settings Page opens:
Authentication profiles allow network administrators to assign authentication methods for user
authentication. User authentication can be performed locally or on an external server. User
authentication occurs in the order the methods are selected. If the first authentication method is not
available, the next selected method is used. For example, if the selected authentication methods are
RADIUS and Local, and the RADIUS server is not available, then the user is authenticated locally.
1. Click Security Suite > Authentication > Profiles. The Profiles Page opens:
Profiles Page
5
2. Click the Add button. The Add Authentication Profile Page opens:
Add Authentication Profile Page
3. Define the relevant fields.
4. Click Apply. The settings are modified, and the device is updated.
1. Click Security Suite > Authentication > Profiles. The Profiles Page opens:
2. Click the Edit Button. The Edit Authentication Profile Page opens:
Edit Authentication Profile Page
Chapter
5
3. Define the relevant fields.
4. Click Apply. The authentication profile is defined, and the device is updated.
Mapping Authentication Profiles
After authentication profiles are defined, they can be applied to management access methods. For
example, console users can be authenticated by one authentication profile, while Telnet users are
authenticated by another authentication profile.
Authentication methods are selected using arrows. The order in which the methods are selected is
the order by which the authentication methods are used.
The Mapping Profiles Page contains parameters for mapping authentication methods.
1. Click Security Suite > Authentication > Mapping Profiles. The Mapping Profiles Page opens:
3. Click Apply. Mapping Profiles is defined, and the device is updated.
Defining TACACS+
The devices provide Terminal Access Controller Access Control System (TACACS+) client support.
TACACS+ provides centralized security for validation of users accessing the device. TACACS+
provides a centralized user management system, while still retaining consistency with RADIUS and
other authentication processes. TACACS+ provides the following services:
•Authentication — Provides authentication during login and via user names and user-
defined passwords.
•Authorization — Performed at login. Once the authentication session is completed, an
authorization session starts using the authenticated user name. The TACACS server checks
the user privileges.
The TACACS+ protocol ensures network integrity through encrypted protocol exchanges between
the device and TACACS+ server.
The TACACS+ default parameters are user-assigned defaults. The default settings are applied to
newly defined TACACS+ servers. If default values are not defined, the system defaults are applied to
the new TACACS+ new servers. The TACACS+ Page contains fields for assigning the Default
Parameters for the TACACS+ servers.
1. Click Security Management > Security Suite > Authentication. The TACACS+ Page opens:
2. Click the Edit Button. The TACACS+ Page opens:
TACACS+ Page
5
3. Define the relevant fields.
4. Click Apply. The TACACS+ settings are modified, and the device is updated.
DefiningRADIUS
Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for
networks. RADIUS servers provide a centralized authentication method for web access. The default
parameters are user-defined, and are applied to newly defined RADIUS servers. If new default
parameters are not defined, the system default values are applied to newly defined RADIUS servers.
To d ef ine RA DIU S :
1. Click Security Suite > Authentication > RADIUS. The RADIUS Page opens: