While reading through the User Guide you may encounter
various icons designed to call attention to a specific item.
Below is a description of these icons:
NOTE: This check mark indicates that there is
a note of interest and is something that you
should pay special attention to while using the
product.
WARNING: This exclamation point indicates
that there is a caution or warning and it is
something that could damage your property or
product.
WEB: This globe icon indicates a noteworthy
website address or e-mail address.
This product may contain material licensed to you under
the GNU General Public License or other open-source
software licenses. Upon request, open-source software
source code is available at cost from Linksys for at least
three years from the product purchase date.
WEB: For detailed license terms and additional
information visit: www.linksys.com/gpl
Online Resources
Website addresses in this document are listed without
http:// in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add http:// in front of the web address.
ResourceWebsite
Linksyswww.linksys.com
Linksys International www.linksys.com/international
Thank you for choosing the 24-Port 10/100 + 2-Port
10/100/1000 Gigabit Advanced Smart Switch with 2
Combo SFPs.
The 24-Port 10/100 + 2-Port 10/100/1000 Gigabit Advanced
Smart Switch brings a whole new level of intelligence and
security to the network infrastructure at a cost effective
price. It offers 24 10/100 Ethernet (copper) ports with two
10/100/1000 Gigabit Ethernet copper or optional optical
(SFP) interfaces for uplinking connected users to the core
network.
The 24-Port 10/100 + 2-Port 10/100/1000 Gigabit
Advanced Smart Switch is able to secure the network
through 802.1X port authentication and MAC filtering.
802.1X requires clients to authenticate themselves before
the port will pass data.
Introduction
The Switch’s extensive QoS features makes the solution
ideal for real-time applications like voice and video. The
four priority queues together with Weighted Round Robin
and Strict Priority scheduling techniques let network
administrators quickly prioritize real-time voice and video
traffic over data traffic. Individual users or applications
can also be prioritized above others using various Class of
Service options - by port, Layer 2 priority (802.1p), and Layer
3 priority (IP Precedence or DSCP). Intelligent broadcast,
multicast, and unknown unicast storm control minimizes
and contains the effects that these types storms have on
regular traffic. IGMP Snooping limits bandwidth-intensive
video traffic to only the requestors without flooding to all
users. Incoming traffic can be policed and outgoing traffic
can be shaped allowing network administrators to control
network access and traffic flow.
The Switch also includes features for network expansion
and faster throughput performance. Link aggregation
enables network administrators to create multiple highbandwidth trunks between switches. This provides a level
of reliability because the system will continue to operate if
one of the links breaks. Spanning Tree (STP), Fast Spanning
Tree, and Rapid Spanning Tree (RSTP) allow admins to
build a mesh of switches increasing the availability of the
system.
The simplified user interface provides an intuitive, secure
management platform enabling admins to better utilize
the comprehensive feature-set of the switch, resulting in
a better optimized, more secure network.
The LEDs and ports are located on the front panel of the
Switch.
Front Panel
System (Green) Lights up green to indicate that
power is being supplied to the Switch.
Link/Act (1-24) (Green) Lights up green to
indicate a functional 10/100 Mbps network link
through the corresponding port with an attached
device. Blinks green to indicate that the Switch is
actively sending or receiving data over that port.
Link/Act (Gigabit/miniGBIC 1-2) (Green) Lights
up green to indicate a functional 10/100/1000
Mbps network link through the corresponding
port with an attached device. Blinks to indicate
that the Switch is actively sending or receiving
data over that port.
Gigabit (Amber) Lights to indicate a
functional 1000 Mbps network link through the
corresponding port with an attached device.
Ethernet 1-24 These RJ-45 ports support
network speeds of either 10 Mbps or 100 Mbps,
and can operate in half and full-duplex modes.
Auto-sensing technology enables each port to
automatically detect the speed of the device
connected to it (10 Mbps or 100 Mbps), and
adjust its speed and duplex accordingly.
To connect a device to a port, you will need to
use Category 5 (or better) network cable.
Ethernet G1-G2 The Switch is equipped with
two Gigabit RJ-45 ports that are shared with
two miniGBIC ports. If a Gigabit miniGBIC port is
being used, the associated RJ-45 port (Gigabit 1
or Gigabit 2) cannot be used.
Both ports support auto-negotiation, so the
optimum transmission mode (half or full duplex)
and data rate (10, 100, or 1000 Mbps) can be
selected automatically, if this feature is also
supported by the attached device. If a device
connected to one of these ports does not support
auto-negotiation, the communication mode of
that port can be configured manually.
Each port also supports IEEE 802.3.x
auto-negotiation of flow control, so the Switch
can automatically prevent port buffers from
becoming saturated.
These ports support automatic MDI/MDI-X
operation, so you can use straight-through cables
for all network connections to PCs, servers, or
additional switches.
MiniGBIC (1-2) The Switch is equipped with
two miniGBIC ports that have shared Gigabit
Ethernet ports (Gigabit 1 and Gigabit 2) which
provide for the installation of one expansion
module. These ports provide links to high-speed
network segments or individual workstations at
speeds of up to 1000 Mbps (Gigabit Ethernet).
To establish a Gigabit Ethernet connection using
a miniGBIC port, you will need to install a MGBT1,
MGBSX2, or MGBLH1 Gigabit expansion module
and use Category 5e cabling or fiber optic
cabling.
To establish a Fast Ethernet connection using a
miniGBIC port, you will need to install a MFEFX1
(100BASE-FX) or MFELX1 (100BASE-LX) 100SFP
Transceiver and use fiber optic cabling.
Reset The reset button can be accessed with
a straightened paper clip or similar object. The
reset button has two functions:
Switch to the factory default settings, press
the Reset button for 10 seconds. When you
let go of the button, the LEDs on the front
of the Switch will flash and then return to a
normal state when the Switch is ready.
Restart Device Press the Reset button on
•
the Switch for less than 3 seconds and the
device will restart.
2
Page 8
Chapter 2
Back Panel
The console and power ports are located on the back
panel of the Switch.
Back Panel
Power The Power port is where you will
connect the AC power.
Console The Switch is equipped with a serial
port labeled Console (located on the back
of the switch) that allows you to connect to
a computer’s serial port (for configuration
purposes) using the provided serial cable. You
can use HyperTerminal to manage the Switch
using the console port.
Product Overview
Side Panel
The security slot is located on a side panel of the Switch.
This chapter will explain how to connect network devices
to the Switch. The following diagram shows a typical
network configuration.
Cable./DSL
Internet
ModemRouterWireless Access Point
Pre-Installation Considerations
Full-Duplex Considerations
The Switch provides full-duplex support for its RJ-45
ports. Full-duplex operation allows data to be sent and
received simultaneously, doubling a port’s potential data
throughput. If you will be using the Switch in full-duplex
mode, the maximum cable length using Category 5 cable
is 328 feet (100 meters).
1000BASE-T Cable Requirements
All Category 5 UTP cables that are used for 100BASE-TX
connections should also work for 1000Base-T, providing
that all four wire pairs are connected. However, it is
recommended that for all critical connections, or any
new cable installations, Category 5e (enhanced Category
5) or Category 6 cable should be used. The Category
5e specification includes test parameters that are only
recommendations for Category 5. Therefore, the first
step in preparing existing Category 5 cabling for running
1000BASE-T is a simple test of the cable installation to be
sure that it complies with the IEEE 802.3ab standards.
Desktop NotebookServer
Typical Network Configuration
When you connect your network devices, make sure you
don’t exceed the maximum cabling distance of 100 meters
(328 feet).
Positioning the Switch
Before you choose a location for the Switch, observe the
following guidelines:
Make sure that the Switch is accessible and that the
•
cables can be connected easily.
Keep cabling away from sources of electrical noise,
•
power lines, and fluorescent lighting fixtures.
Position the Switch away from water and moisture
•
sources.
To ensure adequate air flow around the Switch, be
•
sure to provide a minimum clearance of two inches
(50mm).
Do not stack free-standing Switches more than four
•
units high.
Placement Options
There are two ways to physically install the Switch, either
set the Switch on its four rubber feet for desktop placement
or mount the switch in a standard-sized, 19-inch high rack
for rack-mount placement.
Attach the rubber feet to the recessed areas on the
•
bottom of the Switch.
Place the Switch on a desktop near an AC power
•
source.
Keep enough ventilation space for the switch and
•
check the environmental restrictions mentioned in the
Specifications Appendix as you are placing the Switch.
Connect the Switch to network devices according to
•
the Hardware Installation instructions below.
Rack-Mount Placement
When rack-mounting the Switch, please observe the
following guidelines:
Elevated Operating Ambient If installed in a closed
•
or multi-unit rack assembly, the operating ambient
temperature of the rack environment may be greater
than room ambient. Therefore, consideration should
be given to installing the equipment in an environment
compatible with the maximum ambient temperature
(Tma) specified by the manufacturer.
Installation
Attaching the Brackets
Follow the same steps to attach the other bracket to
3.
the opposite side.
After the brackets are attached to the Switch, use
4.
suitable screws to securely attach the brackets to any
standard 19-inch rack.
Reduced Air Flow Installation of the equipment
•
in a rack should be such that the amount of air flow
required for safe operation of the equipment is not
compromised.
Mechanical Loading Mounting of the equipment in
•
the rack should be such that a hazardous condition is
not achieved due to uneven mechanical loading.
Circuit Overloading Consideration should be given
•
to the connection of the equipment to the supply
circuit and the effect that overloading of the circuits
might have on overcurrent protection and supply
wiring. Appropriate consideration of equipment
nameplate ratings should be used when addressing
this concern.
Reliable Earthing Reliable earthing of rack-mounted
•
equipment should be maintained. Particular attention
should be given to supply connections other than
direct connections to the branch circuit (e.g. use of
power strips).
To rack-mount the Switch in any standard 19-inch rack,
follow the instructions described below.
Place the Switch on a hard flat surface with the front
1.
panel faced towards your front side.
Attach a rack–mount bracket to one side of the Switch
2.
with the supplied screws and secure the bracket
tightly.
Mounting in Rack
Connect the Switch to network devices according to
5.
the Hardware Installation instructions below.
Hardware Installation
To connect network devices to the Switch, follow these
instructions:
Make sure all the devices you will connect to the Switch
1.
are powered off.
Connect a Category 5 Ethernet network cable to one
2.
of the numbered ports on the Switch.
Connect the other end to a PC or other network
3.
device.
Repeat steps 2 and 3 to connect additional devices.
4.
If you are using a miniGBIC port, then connect a
5.
miniGBIC module to the miniGBIC port. For detailed
instructions, refer to the module’s documentation.
Connect the supplied power cord to the Switch’s
6.
power port, and plug the other end into an electrical
outlet. When connecting power, always use a surge
protector.
Power on the devices connected to the Switch. Each
7.
active port’s corresponding LED will light up on the
Switch.
Uplinking the Switch
To uplink the Switch, connect one end of a Cat 5 (or better)
Ethernet network cable into one of the gigabit ports, and
then connect the other end of the cable into the peripheral
device’s uplink port. MDI/MDIX will automatically detect
the speed and cable type.
Daylight Enable or disable the daylight saving time
Syntax: time daylight <on | off>
9
Page 15
Chapter 5
Chapter 5:
Advanced Configuration
Open your web browser and enter http://192.168.1.254
into the address field. Press the Enter key and the Password
screen will appear.
Address Bar
NOTE: The default IP address is 192.168.1.254.
If the IP address has been changed using DHCP
or via the console interface, enter the assigned
IP address instead of the default.
Advanced Configuration
Setup > Summary
Device Name Displays the name for the Switch.
Hardware version The current hardware version is
displayed.
The first time you open the web-based utility, enter
admin (the default username) in the username field and
leave the password blank. Click the OK button. You can
set a password later from the Admin tab’s User Accounts
screen.
Login Screen
Setup
The first screen displayed is the Setup > Summary screen.
There are 11 tabs across the top of the screen: Setup, Port
Management, VLAN Management, Statistics, Security,
QoS, Spanning Tree, Multicast, SNMP, Admin, and a Logout
tab. Each tab contains screens that will help you configure
and manage the Switch.
Boot Version The current boot version is displayed.
Firmware Version The current software version is
displayed.
Build Date Displays the build date for the firmware.
MAC Address The MAC address of the Switch is
displayed.
IP Address The IP address assigned to the Switch is
displayed. (The default IP address is 192.168.1.254)
Subnet Mask The subnet mask assigned to the Switch is
displayed. (The default is 255.255.255.0)
Default Gateway IP address of the gateway router
between this device and management stations that exist
on other network segments. (Default: 0.0.0.0)
Switch Time Displays the current date and time.
Setup > Network Settings
Setup > Summary
The Summary screen displays a summary of Switch
information. The settings cannot be modified from the
Summary screen. Many of the settings can be modified
from the Setup > Network Settings screen.
The Network Settings screen allows you to edit the
following information.
10
Page 16
Chapter 5
Advanced Configuration
Web Admin Timeout
Enable Web Admin Timeout (Web/Console) When this
option is enabled, the admin will be logged out of the
web-based utility after the idle time specified in the Web Admin Timeout field has been reached.
Web Admin Timeout Defines the amount of idle
time (in seconds) required before the admin account is
automatically logged out of the web-based utility.
NOTE: Entering 0 in the Web Admin Timeout
field disables the Web Admin Timeout.
Identification
System Name Specifies the name of the Switch. Enter
the name into the text field provided. By default, a system
name is not defined.
System Location This field is used for entering a
description of where the Switch is located, such as 3rd
floor.
System Contact Enter the name of the administrator
responsible for the system.
System Object ID The system object identifier is
displayed here.
can be attached to a port belonging to any VLAN, as long
as that VLAN has been assigned an IP address.
IP Address Address of the VLAN interface that is allowed
management access. Valid IP addresses consist of four
numbers, 0 to 255, separated by periods. (Default:
192.168.1.254)
Subnet Mask This mask identifies the host address
bits used for routing to specific subnets. (Default:
255.255.255.0)
Default Gateway IP address of the gateway router
between this device and management stations that exist
on other network segments. (Default: 0.0.0.0)
Setup > Time
Simple Network Time Protocol (SNTP) allows the Switch
to set its internal clock based on periodic updates from a
time server (SNTP or NTP). Maintaining accurate time on
the Switch enables the system log to record meaningful
dates and times for event entries. If the clock is not set, the
Switch will only record the time from the factory default
set at the last boot up. When the SNTP client is enabled,
the Switch periodically sends a request for a time update
to a configured time server.
MAC Address Physical address of a device mapped to
this interface.
IP Configuration
IP Address Mode Specifies whether IP functionality is
enabled via manual configuration (Static) or dynamically
using Dynamic Host Configuration Protocol (DHCP).
NOTE: If DHCP is enabled, IP will not function
until a reply has been received from the server.
Requests will be broadcast periodically by the
Switch for an IP address. If the mode is set to
DHCP and a server is not available, you can
reconfigure the settings by connecting the
console interface directly to a computer.
Select the IP Address Mode using the drop-down
menu. Selecting Static will allow you to enter a static
IP address, subnet mask and default gateway using the
text field provided. Selecting DHCP disables these text
fields and the Switch attempts to obtain an IP address
automatically from a DHCP server. The default setting is
Static.
Management VLAN ID of the configured VLAN (1-4094,
no leading zeroes). By default, all ports on the Switch are
members of VLAN 1. However, the management station
Setup > Time
Current Time
Current Time The current time of the Switch is displayed
here.
Local Time
Configure Local Time This option allows you to set the
Use Browser Time This option allows you to set time by
using the local host’s time settings.
Time Zone
Time Zone Set the time zone by selecting it from the
drop-down menu.
Enable Daylight Saving Enable daylight saving time by
checking the check box. Then set USA, Europe, or Custom
daylight saving time by clicking the appropriate option.
Advanced Configuration
SNTP Server
Use SNTP Server This option allows you to set time
based on SNTP server.
IP Address Set the IP address of the SNTP server.
Polling Interval The value entered here determines the
interval between each time the Switch contacts the SNTP
server for an update.
Last Connection Status Displays the connection status
with the SNTP server.
Click Save Settings to save the changes.
Port Management
Port functionality can be controlled using the Port
Management settings. Speeds, duplex, and grouping can
be defined.
Port Management > Port Settings
You can manually configure the speed, duplex mode, and
flow control used on specific ports, or use autonegotiation
to detect the connection settings used by the attached
device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connections.
Flow control should also be enabled to control network
traffic during periods of congestion and prevent the loss
of packets when port buffer thresholds are exceeded. The
Switch supports flow control based on the IEEE 802.3x
standard.
Port Management > Port Settings
Port Displays the port number. Click the appropriate port
number to configure the desired port.
Link Status Displays the link status of the port.
Speed Duplex Displays the current speed and duplex
mode of the port.
Flow Control Indicates the type of flow control currently
in use.
Click on the port number to open the Port Configuration
screen for the desired port.
Port Configuration
The Port Configuration screen allows you to enable/disable
an interface, set and interface capability advertisements,
or manually force the speed, duplex mode, and flow
control.
The Port Settings screen displays the current connection
status, including the link status, speed duplex mode, and
flow control.
Port Management > Port Settings > Port Configuration
Medium This option is only available on the Gigabit ports
(G1 and G2). It allows you to select the type of medium
connected to the port.
Admin This option allows you to enable or disable the
specific port.
Autonegotiate Enables or disables autonegotiation.
When autonegotiation is enabled, you do not need to
specify the capabilities that will be advertised. When
12
Page 18
Chapter 5
Advanced Configuration
autonegotiation is disabled, you must specify the speed,
mode, and flow control settings. Autonegotiation is
enabled by default.
NOTE: Autonegotiation is not available for fiber
connections (G1 and G2 ports).
Speed Duplex Used to manually set the port speed and
duplex mode when autonegotiation is disabled.
The following capabilities are supported.
10M Half Supports 10 Mbps half-duplex operation.
•
10M Full Supports 10 Mbps full-duplex operation.
•
100M Half Supports 100 Mbps half-duplex
•
operation.
100M Full Supports 100 Mbps full-duplex operation.
•
NOTE: Speed and duplex settings for fiber
connections are determined by the medium
selection (G1 and G2 ports).
Flow Control Allows automatic or manual selection of
flow control.
Port Member Displays the ports that are members of the
selected LAG.
Link Status Displays the status of the link.
Speed/Duplex Displays the connection speed/duplex.
LAG Mode Displays the LAG status, LACP or Static.
Detail Click the appropriate link to configure the desired
LAG.
NOTE: LAG01 and LAG02 are for Fast Ethernet
ports, and LAG03 is for the Gigabit ports.
LAG Displays the LAG number.
After you modify the required port settings, click Save
Settings.
Port Management > Link Aggregation
You can create multiple links between devices that work
as one virtual, aggregate link (LAG). An aggregated link
offers a dramatic increase in bandwidth for network
segments where bottlenecks exist, as well as providing a
fault-tolerant link between two devices. You can create up
to three LAGs on the Switch. Each LAG can contain up to
four ports.
Port Management > Link Aggregation > Add Ports
Add Port Click the check box under each port to add that
port to the selected LAG.
Port Management > LACP
Ports can be statically grouped into an aggregate link
(that is, LAG) to increase the bandwidth of a network
connection or to ensure fault recovery. Or you can use the
Link Aggregation Control Protocol (LACP) to automatically
negotiate a LAG link between the Switch and another
network device.
LACP System Priority Indicates the global LACP priority
value. (Range: 0 – 65535; Default: 30610)
13
Page 19
Chapter 5
Advanced Configuration
Port Indicates the port number to which admin key and
priority value are assigned.
Priority Displays the LACP priority value for the port.
Admin Key A channel will only be formed between ports
having the same admin key. This only applies to ports
located on the same switch.
LAG ID Displays the LAG ID to which the port belongs to.
LAG Type Displays the LAG Type.
LACP Status Displays the LACP Status.
LACP Properties
You can click on the port number to change the LACP
properties on each port.
VLAN Management > Create VLAN
Create VLAN
VLAN Management > Create VLAN
Single VLAN
To create a single VLAN, enter the VLAN ID and VLAN
Name, up to 32 characters long, and click Add.
VLAN ID ID of configured VLAN (1-4094, no leading
zeroes).
VLAN Name Name of the VLAN. (1 to 32 characters)
VLAN Range
Click Save Settings to save the changes.
VLAN Management
A VLAN is a group of ports that can be located anywhere
in the network, but communicate as though they belong
to the same physical segment.
VLANs help to simplify network management by allowing
you to move devices to a new VLAN without having
to change any physical connections. VLANs can be
easily organized to reflect departmental groups (such
as Marketing or R&D), usage groups (such as e-mail), or
multicast groups (used for multimedia applications such
as videoconferencing). You can create up to 256 VLANs on
the Switch.
To create a range of VLANs, enter the range of the VLAN
IDs to be created in to the VLAN Range fields and then click Add Range.
To remove a VLAN or a range of VLANs, select the VLANs in
the VLAN list, then click Remove.
VLAN Management > Port Settings
VLAN Management > Port Settings
You can configure the VLAN identifier (PVID), and change
protected port setting for each interface on this screen.
untagged frames received on the interface. (Default: 1)
Protected Port Click the check box to indicate the
selected ports as protected ports. Ports in the same
VLAN can forward traffic to each other. By enabling the
Protected Port feature on selected ports, Protected Ports
cannot forward traffic to each other in the same VLAN.
Click Save Settings to save the changes.
VLAN Management > Ports to VLAN
Use the Ports to VLAN screen to configure port members
for the selected VLAN index. Assign ports as tagged if
they are connected to 802.1Q VLAN compliant devices,
or untagged if they are not connected to any VLAN-aware
devices.
VLAN Management > VLAN to Ports
VLAN Management > VLAN to Ports
Use the VLAN to Ports screen to assign VLAN group to the
selected interface.
Port Select a Port to assign a VLAN group.
•
Exclude The interface is forbidden from joining the
•
VLAN.
Untagged The interface is a member of the VLAN. All
•
packets transmitted by the port will be untagged, that
is, not carry a tag and therefore not carry VLAN or CoS
information.
VLAN Management > Ports to VLAN
VLAN Select a VLAN index to configure the port
member.
Exclude The interface is forbidden from joining the
•
VLAN.
Untagged The interface is a member of the VLAN. All
•
packets transmitted by the port will be untagged, that
is, not carry a tag and therefore not carry VLAN or CoS
information.
NOTE: An interface must be assigned to at least
one group as an untagged port.
Tagged The interface is a member of the VLAN.
•
All packets transmitted by the port will be tagged,
that is, carry a tag and therefore carry VLAN or CoS
information.
Click Save Settings to save the changes.
NOTE: An interface must be assigned to at least
one group as an untagged port.
Tagged The interface is a member of the VLAN.
•
All packets transmitted by the port will be tagged,
that is, carry a tag and therefore carry VLAN or CoS
information.
Click Save Settings to save the changes.
Statistics
You can display standard statistics on network traffic from
the Interfaces Group and Ethernet-like MIBs, as well as a
detailed breakdown of traffic based on the RMON MIB.
Interfaces and Ethernet-like statistics display errors on the
traffic passing through each port.
To view the interface statistics for a port, click on Source Interface ID. Click Enable Counter to enable statistics on
this interface.
RMON Statistics
Source Interface Click on Source Interface to get detail
statistics on each port.
Owner The name of the person who created this entry.
Status Displays the status for RMON Statistics counter.
To refresh the interface statistics, click Refresh.
To clear the interface statistics, click Clear.
Statistics > RMON History
The RMON History screen allows you to monitor your
network for common errors and overall traffic rates. The
History Control Table allows you to add, edit and delete
collection entries, or to select a specific index entry and
then view the historical data in table form.
History Control Index Select a specific index entry and
then view the historical data
History Table Displays statistics for each sample index.
Index Displays the history index number. You can click on
the index number to edit the settings for each index.
RMON History Control
Index Displays the history index number.
Source Interface The selected interface on the Switch.
Sampling Requested The number of samples to record.
Interval (Sec.) Defines the interval (in seconds) between
taking samples. (Default: 1800)
Owner Defines the name of the person who created this
entry. (Default: monitor)
Status Displays the status of RMON History Control.
Sample Index Indicates the sample index from which
the statistics were taken.
Drop Events Displays the number of dropped events
that have occurred on the interface since the device was
last refreshed.
Octets Displays the number of octets received on the
interface since the device was last refreshed. This number
includes bad packets and FCS octets, but excludes framing
bits.
Packets Displays the number of packets received on the
interface since the device was last refreshed, including
bad packets, Multicast and Broadcast packets.
Broadcast Packets Displays the number of good
Broadcast packets received on the interface since the
device was last refreshed. This number does not include
Multicast packets.
frame bits, but includes FCS octets that had either a bad
Frame Check Sequence (FCS) with an integral number of
octets (FCS Error) or a bad FCS with a non-integral octets
(Alignment Error) number. The field range to detect
jabbers is between 20 ms and 150 ms.
Collisions Displays the number of collision received on
the interface since the device was last refreshed.
Utilization Displays the percentage of the interface
utilized.
Index Displays the history index number.
Source Interface The selected interface on the Switch.
Sampling Requested The number of samples to record.
Current Number of Samples The number of current
samples.
Sampling Interval Displays the interval between taking
samples.
Owner Displays the name of the person who created this
entry.
Status Displays the status of RMON History Control.
Statistics > RMON Events
An RMON Event determines the action to take when an
alarm is triggered. The response to an alarm can include
logging the alarm or sending an SNMP trap message. If
the response corresponding to an alarm has not yet been
defined, use the RMON Event screen to configure the Event
Settings table.
Multicast Packets Displays the number of good Multicast
packets received on the interface since the device was last
refreshed.
CRC Align Errors Displays the number of CRC and Align
errors that have occurred on the interface since the device
was last refreshed.
Undersize Packets Displays the number of undersized
packets (less than 64 octets) received on the interface
since the device was last refreshed.
Oversize Packets Displays the number of oversized
packets (over 1518 octets) received on the interface since
the device was last refreshed.
Fragments Displays the number of fragments (packets
with less than 64 octets, excluding framing bits, but
including FCS octets) received on the interface since the
device was last refreshed.
Jabbers Displays the total number of received packets
that were longer than 1518 octets. This number excludes
Description Text comments that describes the entry in
the Event Log.
Type Describes the event type. Possible values are:
None Indicates that no event occurred.•
17
Page 23
Chapter 5
Log Indicates that the event is a log entry.
•
SNMP Trap Indicates that the event is a SNMP trap.
•
Log and Trap Indicates that the event is both a log
•
entry and a trap.
Community Enters the community to which the event
belongs to.
Owner Enters the name of the person who creates this
event.
Click Save Settings to save the changes.
Advanced Configuration
Statistics > RMON Event Log
The RMON Event Log screen shows the log index number,
the time of an event, and the name of the person who
created this entry.
Statistics > RMON Event Log
Overview
Event Index Displays the event index.
Event Type Displays the event type.
Last time Sent Displays the time that the event was
occurred and sent.
Owner Displays the device or user that defined the
alarm.
Statistics > RMON Alarm
Statistics > RMON Alarm
Create New Alarm
Index Indicates a specific alarm.
Interval (Sec.) Defines the time interval in seconds over
which data is sampled and compared with the rising or
falling threshold.
Interface The selected interface on the Switch
Counter Selects the counter variables.
Sample Type The method of sampling data, either
Absolute or Delta.
Startup Alarm Indicates how the alarm is activated when
the variable is compared to the thresholds. This can be set
to Rising, Falling, and Rising or Falling.
Rising Threshold An alarm threshold for the sampled
variable. If the current value is greater than or equal to
the threshold, and the last sample value was less than the
threshold, then an alarm will be generated. (After a rising
event has been generated, another such event will not be
generated until the sampled value has fallen below the
Rising Threshold and reaches the Falling Threshold.)
Falling Threshold An alarm threshold for the sampled
variable. If the current value is less than or equal to the
threshold, then an alarm will be generated. (After a falling
event has been generated, another such event will not be
generated until the sampled value has risen above the
Falling Threshold and reaches the Rising Threshold.)
The RMON Alarms screen allows you to record important
events and critical network problems. The RMON Alarm
and Event Control Tables are used together to define
specific criteria that will generate response events.
Alarms can be set to test data over any specified time
interval and monitor changing values, such as a statistical
counter reaching a specific value, or a statistic changing
by a certain amount over a set interval. Alarms can be set
to respond to either rising or falling thresholds.
Rising Event The index of the Event that will be used if a
rising alarm is triggered. If there is no corresponding entry
in the Event Control Table, or if this number is zero, then
no event will be generated.
Falling Event The index of the Event that will be used if
a falling alarm is triggered. If there is no corresponding
entry in the Event Control Table, or if this number is zero,
then no event will be generated.
Owner Defines the name of the person who created this
entry.
18
Page 24
Chapter 5
Advanced Configuration
Click Save Settings to save the changes.
Statistics > 802.1X Statistics
The 802.1X Statistics screen contains information about
EAP packets received on a specific port.
Statistics > 802.1X Statistics
Port No. Indicates the port number, which is polled for
statistics.
Session Octet Received The number of octets received
in user data frames on this port during the session.
Session Octet Transmitted The number of octets
transmitted in user data frames on this port during the
session.
Session Time Displays the duration time of the session
in seconds.
Security
Security > RADIUS Settings
Remote Authorization Dial-In User Service (RADIUS)
servers provide additional security for networks. RADIUS
servers provide a centralized authentication method for
web access.
Security > RADIUS Settings
Server IP Address Enter the IP address of the server.
UDP Port Number Enter the UDP Port of the server. The
UDP port is used to verify the RADIUS server authentication.
(Default: 1812)
Key String Enter the secret key string as defined on
the RADIUS server. The secret key string is used for
authenticating and encrypting communications between
the device and the RADIUS server.
Network switches can provide open and easy access
to network resources by simply attaching a client PC.
Although this automatic configuration and access is a
desirable feature, it also allows unauthorized personnel
to easily intrude and possibly gain access to sensitive
network data.
The IEEE 802.1X (dot1X) standard defines a port-based
access control procedure that prevents unauthorized
access to a network by requiring users to first submit
credentials for authentication. Access to all switch ports in
a network can be centrally controlled from a server, which
means that authorized users can use the same credentials
for authentication from any point within the network.
This Switch uses the Extensible Authentication Protocol
over LANs (EAPOL) to exchange authentication protocol
messages with the client, and a remote RADIUS
authentication server to verify user identity and access
rights. When a client connects to a switch port, the Switch
responds with an EAPOL identity request. The client
provides its identity (such as a user name) in an EAPOL
response to the Switch, which it forwards to the RADIUS
server. The RADIUS server verifies the client identity and
sends an access challenge back to the client. The EAP packet
from the RADIUS server contains not only the challenge,
but the authentication method to be used. The client can
reject the authentication method and request another,
depending on the configuration of the client software
and the RADIUS server. The authentication method must
be MD5. The client responds to the appropriate method
with its credentials, such as a password or certificate.
The RADIUS server verifies the client credentials and
responds with an accept or reject packet. If authentication
is successful, the Switch allows the client to access the
network. Otherwise, network access is denied and the
port remains blocked.
The operation of 802.1X on the Switch requires the
following:
The Switch must have an IP address assigned.
•
RADIUS authentication must be enabled on the Switch
•
and the IP address of the RADIUS server specified.
802.1X must be enabled globally for the Switch.
•
Each Switch port that will be used must be set to dot1X
•
“Auto” mode.
Each client that needs to be authenticated must
•
have dot1X client software installed and properly
configured.
The RADIUS server and 802.1X client support EAP. (The
•
Switch only supports EAPOL in order to pass the EAP
packets from the server to the client.)
The RADIUS server and client also have to support the
•
same EAP authentication type – MD5. (Some clients
have native support in Windows, otherwise the dot1x
client must support it.)
Enable 802.1X Enables or disables 802.1X mode.
NOTE: This option must be enabled to configure
802.1X settings.
802.1X Settings
Port Displays the port number.
Set Status Enables or disables port authentication. By
default, port authentication is enabled which means
all the forwarding traffic needs to be authorized by the
RADIUS server.
Show Client MAC Displays the MAC address of the last
client who sends out EAPOL control frame.
Authorization Displays the authentication status of an
enabled port.
Click Save Settings to apply the changes.
20
Page 26
Chapter 5
Advanced Configuration
Security > Management Access List
Management Access List specifies which Source IP
addresses can manage the device.
Security > Management Access List
Mode Enable or Disable Management Access List.
Management Address 1 Enter the designated IP address
to allow accessing the device.
Management Address 2 Enter the designated IP address
to allow accessing the device.
Management Address 3 Enter the designated IP address
to allow accessing the device.
Security > Storm Control
Security > Storm Control
Apply Settings to all ports Click the check box to apply
Storm Control settings to all ports.
Port Indicates the port number for which storm control
is enabled.
Storm Control Type Specifies the Storm Control Type
currently enabled on the device. The possible field values
are:
Disabled Disable Storm Control.
•
Broadcast Only Counts only Broadcast traffic.
•
Management Address 4 Enter the designated IP address
to allow accessing the device.
Management Address 5 Enter the designated IP address
to allow accessing the device.
Management Address 6 Enter the designated IP address
to allow accessing the device.
Management Address 7 Enter the designated IP address
to allow accessing the device.
Management Address 8 Enter the designated IP address
must be learned by the Switch first; otherwise,
it will be treated as unknown unicast traffic.
Broadcast and Unknown Unicast Counts Broadcast
•
and Unknown Unicast traffic.
Broadcast, Multicast, and Unknown Unicast Counts
•
Broadcast, Multicast, and Unknown Unicast traffic.
Storm Control Rate Specifies the Storm Control Rate.
Click Save Settings to save the changes.
Security > Port Security
Network security can be increased by limiting access on
a specific port only to users with specific MAC addresses.
MAC addresses can be dynamically learned or statically
configured. Locked port security monitors both received
and learned packets that are received on specific ports.
Access to the locked port is limited to users with specific
MAC addresses. These addresses are either manually
defined on the port, or learned on that port up to the
point when it is locked. When a packet is received on a
locked port, and the packet source MAC address is not tied
to that port (either it was learned on a different port, or it
21
Page 27
Chapter 5
Advanced Configuration
is unknown to the system), the protection mechanism is
invoked, and can provide various options.
Security > Port Security
Port Selects a port from the pull-down window to assign
lock mode.
Lock Mode Selects the lock mode to lock the specified
port.
None Disables lock mode.
•
Static Lock Allows you to manually configure a switch
•
port with one or more device MAC addresses that are
authorized to access the network through that port.
All the unauthorized MAC address will not be able to
access network through that port.
Limited Dynamic Lock Allows the Switch to
•
dynamically learn the MAC addresses for a selected
port. When the port has reached the maximum entries
of MAC addresses, the selected port will stop learning.
The MAC addresses already in the address table will be
retained and will not be age out.
Max Entries Specifies the number of MAC addresses
that can be learned on the port. The Max Entries field is
enabled only if Limited Dynamic Lock is selected. The Max
Entry is 24.
Security MAC Address
Item Displays the index of the security MAC address.
Source MAC Displays the security MAC address.
Port Displays the port associated with the security MAC
address.
Delete Click Delete to remove the security MAC address.
Add Source MAC Address Click Add Source MAC to add
static MAC address to the selected port.
Static MAC Address Enters the Static Security MAC
Address that you would like to add.
QoS
Network traffic is usually unpredictable, and the only
basic assurance that can be offered is best effort traffic
delivery. To overcome this challenge, Quality of Service
(QoS) is applied throughout the network. This ensures that
network traffic is prioritized according to specified criteria,
and that specific traffic receives preferential treatment.
QoS in the network optimizes network performance and
entails two basic facilities:
Classifying incoming traffic into handling classes, based
on an attribute, including:
The ingress interface
•
Packet content
•
A combination of these attributes
•
Providing various mechanisms for determining the
allocation of network resources to different handling
classes, including:
The assignment of network traffic to a particular
•
hardware queue
The assignment of internal resources
•
Traffic shaping
•
The terms Class of Service (CoS) and QoS are used in the
following context:
CoS provides varying Layer 2 traffic services. CoS refers to
classification of traffic to traffic-classes, which are handled
as an aggregate whole, with no per-flow settings. CoS is
usually related to the 802.1p service that classifies flows
according to their Layer 2 priority, as set in the VLAN
header.
QoS refers to Layer 2 traffic and above. QoS handles perflow settings, even within a single traffic class.
QoS > CoS Settings
Class of Service (CoS) allows you to specify which data
packets have greater precedence when traffic is buffered
in the Switch due to congestion. The Switch supports CoS
with four priority queues for each port. Data packets in
a port’s high-priority queue will be transmitted before
those in the lower-priority queues. You can set the default
priority for each interface, and configure the mapping of
frame priority tags to the Switch’s priority queues.
Port Number Indicates the port number associated with
the Static Security MAC Address that you would like to
add.
The priority levels recommended in the IEEE 802.1p
standard for various network applications are shown in the
following table. However, you can map the priority levels
to the Switch’s output queues in any way that benefits
application traffic for your own network.
Priority Level Mappings
Priority LevelTraffic Type
1Background
2(Spare)
0(Default) Best Effort
3Excellent Effort
4Controlled Load
5Video, less than 100 ms latency and jitter
6Voice, less than 10 ms latency and jitter
7Network Control
Priority Specifies the CoS priority tag values, where zero
is the lowest and 7 is the highest.
Queue Defines the traffic forwarding queue to which the
CoS priority is mapped. Four traffic priority queues are
supported.
QoS > Queue Settings
Scheduling Method
You can set the Switch to service the queues based on
a strict rule that requires all traffic in a higher priority
queue to be processed before lower priority queues are
serviced, or use Weighted Round-Robin (WRR) queuing
that specifies a relative weight of each queue. WRR uses a
predefined relative weight for each queue that determines
the percentage of service time the Switch services each
queue before moving on to the next queue. This prevents
the head-of-line blocking that can occur with strict priority
queuing.
Strict Priority Services the egress queues in sequential
•
order, transmitting all traffic in the higher priority
queues before servicing lower priority queues.
WRR Weighted Round-Robin shares bandwidth at the
•
egress ports by using scheduling weights 1, 2, 4, 8 for
queues 1 through 4 respectively.
Click Save Settings to save the changes.
QoS > Port Based Mode
The Port-Based Settings enables mapping port to specific
priority level. By default, all ports are set to low priority
level.
Click Save Settings to save the changes.
QoS > Queue Settings
The Switch prioritizes each packet based on the required
level of service, using four priority queues with strict or
Weighted Round Robin Queuing. It uses IEEE 802.1p and
802.1Q tags to prioritize incoming traffic based on input
from the end-station application. These functions can be
used to provide independent priorities for delay-sensitive
data and best-effort data.
This function allows the network manager to control the
maximum rate for traffic transmitted or received on an
interface. Rate limiting is configured on interfaces at the
edge of a network to limit traffic coming out of the Switch.
Traffic that falls within the rate limit is transmitted, while
packets that exceed the acceptable amount of traffic are
dropped.
Rate limiting can be applied to individual ports or
LAGs. When an interface is configured with this feature,
the traffic rate will be monitored by the hardware to
verify conformity. Non-conforming traffic is dropped,
conforming traffic is forwarded without any changes.
Rapid Spanning Tree Protocol (RSTP detects and uses
network topologies that allow a faster STP convergence
without creating forwarding loops.
QoS > Bandwidth
Port Indicates the port for which the bandwidth settings
are displayed.
Ingress Rate Indicates if rate limiting is enabled on the
interface.
Egress Rate Indicates if rate limiting is enabled on the
interface.
Click Save Settings to save the changes.
Spanning Tree
The Spanning Tree Algorithm (STA) can be used to detect
and disable network loops, and to provide backup links
between switches, bridges or routers. This allows the
Switch to interact with other bridging devices (that is, an
STA-compliant switch, bridge or router) in your network
to ensure that only one route exists between any two
stations on the network, and provide backup links which
automatically take over when a primary link goes down.
Spanning Tree > RSTP
While the classic spanning tree prevents Layer 2 forwarding
loops in a general network topology, convergence can take
between 30-60 seconds. This time may delay detecting
possible loops, and propagating status topology changes.
Spanning Tree > RSTP
RSTP Switch Settings
Enable RSTP Enables Rapid Spanning Tree Protocol.
Designated Root Bridge The bridge identifier of the root
of the spanning tree is determined by the RSTP protocol.
Priority Displays the priority value for the root device.
User can also specify the priority value for the bridge
settings. The default value is 32768. The range is 0 to
61440.
Max Age Displays the maximum age time for the root
device. User can also specify the maximum age time for
the bridge device. The default max age is 20 seconds. The
range is 6 to 40 seconds.
Forward Delay Displays the forward delay time for the
root device. User can also specify the forward delay time
for the bridge device. The Forward Delay Time indicates
the amount of time in seconds a bridge remains in a
listening and learning state before forwarding packets.
The default is 15 seconds. The range is 4 to 30 seconds.
Participate Indicates the port is not participating in the
Spanning Tree.
Cost Displays the cost path between devices.
Priority Displays the priority value of the port.
Port Fast Indicates if the port has been designated as a
port fast port. If the port has been designated port fast,
the port immediately transitions to the forwarding state.
Force Point-to-Point Link Mode Displays the Point-to-
Point Link Status.
Status Displays current state of this port within the
Spanning Tree:
Discarding Port receives STA configuration messages,
•
but does not forward packets.
Learning Port has transmitted configuration messages
•
for an interval set by the Forward Delay parameter
without receiving contradictory information. Port
address table is cleared, and the port begins learning
addresses.
Forwarding Port forwards packets, and continues
•
learning addresses.
Role Indicates the port role assigned by the STP algorithm
in order to provide to STP paths. The possible field values
are:
Root Provides the lowest cost path to forward packets
•
to root switch.
Designated Indicates the port via which the
•
designated switch is attached to the LAN.
Alternate Provides an alternate path to the root
•
switch from the root interface.
Backup Provides a backup path to the designated
•
port path forward the Spanning Tree leaves. Backup
ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur
when a LAN has two or more connections connected
to a shared segment.
Disabled Indicates the port is not participating in the
•
Spanning Tree.
Click Save Port Settings to save the changes.
Edit RSTP Port Settings
Spanning Tree > RSTP > Edit RSTP Port Settings
Port Select the port range to configure.
Cost By default this value is set to Auto. When auto is
disabled, a value between 1 and 200,000,000 can be
entered. Cost is the contribution value of this port to
the patch cost of paths to the spanning tree root which
include this port.
Priority This is the value of the priority field contained in
the first octet of the port ID. The default value is 0. The
value can range from 0-240.
Port Fast To designate as port fast, click Yes from the
drop-down menu. If a port has been designated port fast,
the port immediately transitions to the forwarding state.
Force Point-to-Point Link Mode Indicates if a point-
to-point links are established, or permits the device to
establish a point-to-point link. The possible field values
are:
Yes Enables the device to establish a point-to-point
•
link. To establish communications over a point-topoint link, the originating PPP first sends Link Control
Protocol (LCP) packets to configure and test the data
link. After a link is established and optional facilities
are negotiated as needed by the LCP, the originating
PPP sends Network Control Protocols (NCP) packets
to select and configure one or more network layer
protocols. When each of the chosen network layer
protocols has been configured, packets from each
network layer protocol can be sent over the link. The
link remains configured for communications until
explicit LCP or NCP packets close the link, or until some
external event occurs. This is actual switch port link
type. It may differ from the administrative state.
Auto Point-to-point links are automatically established
•
by the device.
Click Save Settings to save the changes.
26
Page 32
Chapter 5
Advanced Configuration
Spanning Tree > MSTP Properties
When using STP or RSTP, it may be difficult to maintain
a stable path between all VLAN members. Frequent
changes in the tree structure can easily isolate some of
the group members. MSTP (which is based on RSTP for
fast convergence) is designed to support independent
spanning trees based on VLAN groups. Using multiple
spanning trees can provide multiple forwarding paths and
enable load balancing. One or more VLANs can be grouped
into a Multiple Spanning Tree Instance (MSTI). MSTP builds
a separate Multiple Spanning Tree (MST) for each instance
to maintain connectivity among each of the assigned
VLAN groups. MSTP then builds an Internal Spanning Tree
(IST) for the Region containing all commonly configured
MSTP bridges.
An MST Region consists of a group of interconnected
bridges that have the same MST Configuration
Identifiers (including the Region Name, Revision Level
and Configuration Digest). An MST Region may contain
multiple MSTP Instances. An Internal Spanning Tree (IST)
is used to connect all the MSTP switches within an MST
region. A common Spanning Tree (CST) interconnects all
adjacent MST Regions, and acts as a virtual bridge node
for communications with STP or RSTP nodes in the global
network.
Bridge Setting
Max Age (6-40 sec) Specifies the device Maximum Age
Time. The Maximum Age Time indicates the amount of time
in seconds a bridge waits before sending configuration
messages. The default max age is 20 seconds. The range
is 6 to 40 seconds.
Forward Delay (4-30 sec) Specifies the device forward
delay time. The Forward Delay Time indicates the amount
of time in seconds a bridge remains in a listening and
learning state before forwarding packets. The default is
15 seconds. The range is 4 to 30 seconds.
Max Hops (1-40) Specifies the maximum number of hops
allowed in the MST region before a BPDU is discarded
(Range: 1-40; Default: 20)
Click Save Settings to save the changes.
Spanning Tree > MSTP Port Settings
MSTP connects all bridges and LAN segments with a
single Common and Internal Spanning Tree (CIST). The
CIST is formed as a result of the running spanning tree
algorithm between switches that support the STP, RSTP,
MSTP protocols.
Spanning Tree > MSTP Properties
MSTP Settings
Enable MSTP Enables MSTP.
Region Name (Max. 32 chars.) The name for this MSTI.
Revision Level (0-65535) The revision for this MSTI.
(Default: 0)
Spanning Tree > MSTP Port Settings
Port Displays the port number.
Port Fast Indicates if the port is the edge of the network.
Force Point-to-Point Link Mode Displays the Point-to-
Point Link Status.
Migration Check Displays the Migration Check Status.
Change Settings
Port Indicates the port on which Multiple STP is enabled.
Port Fast Indicates if the port has been designated as a
port fast port. If the port has been designated port fast,
the port immediately transitions to the forwarding state.
Force Point-to-Point Link Mode Indicates if a point-
to-point links are established, or permits the device to
establish a point-to-point link. The possible field values
are:
Auto Point-to-point links are established by the
•
device automatically.
Yes Enables the device to establish a point-to-point
•
link. To establish communications over a point-topoint link, the originating PPP first sends Link Control
Protocol (LCP) packets to configure and test the data
link. After a link is established and optional facilities
are negotiated as needed by the LCP, the originating
PPP sends Network Control Protocols (NCP) packets
to select and configure one or more network layer
protocols. When each of the chosen network layer
protocols has been configured, packets from each
network layer protocol can be sent over the link. The
link remains configured for communications until
explicit LCP or NCP packets close the link, or until some
external event occurs. This is actual switch port link
type. It may differ from the administrative state.
No Disables point-to-point link.
•
Migration Check If at any time the Switch detects STP
BPDUs, including Configuration or Topology Change
Notification BPDUs, it will automatically set the selected
interface to forced STP-compatible mode. However, you
can also use the Migration Check Protocol to manually
verify the appropriate BPDU format (RSTP or STPcompatible) to send on the selected interfaces.
Click Save Settings to save the changes.
Spanning Tree > MSTP Instance Settings
MSTP operation maps VLANs into STP instances. Packets
assigned to various VLANs are transmitted along different
paths within Multiple Spanning Tree Regions (MST
Regions). Regions are one or more Multiple Spanning
Tree bridges by which frames can be transmitted. In
configuring MST, the MST region to which the device
belongs is defined. A configuration consists of the name,
revision, and region to which the device belongs.
Advanced Configuration
Spanning Tree > MSTP Instance Settings
Bridge MSTP Config Name Displays the Bridge MSTP
Config Name.
Bridge MSTP revision level Displays the Bridge MSTP
revision level.
Bridge MSTP Config Digest Displays the Bridge MSTP
Config digest.
MST Instance Displays the MST Instance
MSTI ID Displays the MST ID.
Remove the last MST instance Use this button to remove
the last MST instance.
VLAN Set to / Remove from MST instance
Instance Indicates the instance to configure. The Switch
supports up to 16 Spanning Tree instances.
MST ID Instance identifier to configure. Select the
required MST instance to display the current spanning
tree values. Range: 0-4049; Default: 0)
VLAN Range Map the selected VLAN range to the
selected instance. Each VLAN belongs to one instance.
Modify the required attributes for MSTP Instance Settings.
Click Save Settings to save the changes.
Network Administrator can assign MSTP Interface settings
using the MSTP Interface Settings screen.
Spanning Tree > MSTP Interface Settings
Instance Instance to configure. Select the required MST
instance to display the current spanning tree values.
(Range: 0-4094; Default: 0)
Port Displays the port number.
Cost Displays the port’s path cost.
Priority Displays port’s priority value.
Port Fast Indicates if the port has been designated as a
port fast port. If the port has been designated port fast,
the port immediately transitions to the forwarding state.
Force Point-to-Point Link Indicates if this port is a
point-to-point link. If you connect a port to another port
using a point-to-point link and the local port becomes a
designated port, it negotiates a rapid transition with the
other port to ensure a loop-free topology.
Advanced Configuration
Alternate Provides an alternate path to the root
•
switch from the root interface.
Backup Provides a backup path to the designated
•
port path forward the Spanning Tree leaves. Backup
ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur
when a LAN has two or more connections connected
to a shared segment.
Disabled Indicates the port is not participating in the
•
Spanning Tree.
Multicast
The Internet Group Management Protocol (IGMP) runs
between hosts and their immediately adjacent multicast
router/switch. IGMP is a multicast host registration
protocol that allows any host to inform its local router that
it wants to receive transmissions addressed to a specific
multicast group.
A router, or multicast-enabled switch, can periodically ask
their hosts if they want to receive multicast traffic. If there
is more than one router/switch on the LAN performing IP
multicasting, one of these devices is elected “querier” and
assumes the role of querying the LAN for group members.
It then propagates the service requests on to any adjacent
multicast switch/router to ensure that it will continue to
receive the multicast service.
Based on the group membership information learned
from IGMP, a router/switch can determine which (if any)
multicast traffic needs to be forwarded to each of its ports.
At Layer 3, multicast routers use this information, along
with a multicast routing protocol such as DVMRP or PIM,
to support IP multicasting across the Internet.
Status Displays current state of this port within the
Spanning Tree:
Discarding Port receives STA configuration messages,
•
but does not forward packets.
Learning Port has transmitted configuration messages
•
for an interval set by the Forward Delay parameter
without receiving contradictory information. Port
address table is cleared, and the port begins learning
addresses.
Forwarding Port forwards packets, and continues
•
learning addresses.
Role Indicates the port role assigned by the STP algorithm
in order to provide to STP paths. The possible field values
are:
Root Provides the lowest cost path to forward packets
multicast packets. A multicast routing protocol
must be used to deliver IP multicast packets
across different subnetworks.
29
Page 35
Chapter 5
Multicast > IGMP Snooping
Advanced Configuration
Multicast > IGMP Snooping > Dynamic Router Port Information
Multicast > IGMP Snooping
Enable IGMP Snooping Enables IGMP Snooping
Router Ports Click the check box under each port to
assign router ports.
IGMP Timer Parameters
Robustness Variable The IGMP robustness variable
provides fine-tuning to allow for expected packet loss on
a subnet. The default robustness variable is set to 2. You
might want to increase this value if the subnet is expected
to be lossy.
Query Interval Set the frequency at which the Switch
Query Response Interval Set the time between receiving
an IGMP Report for an IP multicast address on a port
before the Switch sends an IGMP Query out of that port
and removes the entry from its list. (Range: 5-25; Default:
10)
Last member Query Interval Set the maximum amount
of time between group-specific query messages, including
those sent in response to leave-group messages. You can
lower this interval to reduce the amount of time it takes a
router to detect the loss of the last member of a group.
Last Member Query Count Set the maximum number
of queries issued for which there has been no response
before the Switch takes action to drop a client from the
multicast group. (Range: 2-10; Default: 2)
Dynamic Router Port
VLAN ID Displays the VLAN ID
Dynamic Port(s) Displays the port(s) that can receive the
IGMP query traffic.
Multicast > IGMP Snooping > Multicast Group Member Information
Group Membership
Group Address Displays the multicast group address of
The Static Multicast group allows you add or delete
multicast addresses in the Layer 2 address table.
Multicast > Static Multicast
Group Name Defines the name of the multicast group.
VLAN ID Indicates the VLAN ID for the multicast group.
MAC Address Indicates the layer 2 multicast addresses.
Port Click the check box under each port to assign
multicast port members.
as well as to monitor them to evaluate performance or
detect potential problems.
The Switch can be configured to accept management
commands from Simple Network Management Protocol
(SNMP) applications. You can configure the Switch to
respond to SNMP requests or generate SNMP traps.
When SNMP management stations send requests to the
Switch (either to return information or to set a parameter),
the Switch provides the requested data or sets the specified
parameter. The Switch can also be configured to send
information to SNMP managers (without being requested
by the managers) through trap messages, which inform
the manager that certain events have occurred.
SNMP > Global Settings
Click Create to add the static multicast address into the
Layer 2 address table.
Maximum number of multicast groups is 128.
Group ID Displays the index of the static multicast
group.
Group Name Displays the name of the static multicast
group.
VLAN Group Displays the VLAN ID of the static multicast
group.
L2 Multicast Address Displays the layer 2 multicast
address of the static multicast group.
Port Membership Displays the port membership of the
static multicast group.
Modify Click to change the settings of the port members
for the static multicast group.
Delete Delete the static multicast group.
Click Save Settings to save the changes.
SNMP
Simple Network Management Protocol (SNMP) is a
communication protocol designed specifically for
managing devices on a network. Equipment commonly
managed with SNMP includes switches, routers and host
computers. SNMP is typically used to configure these
devices for proper operation in a network environment,
The Group Profile screen provides information for creating
SNMP groups and assigning SNMP access control privileges
to SNMP groups. Groups allow network managers to
assign access rights to specific device features, or features
aspects.
Community String Indicates the community string of
the SNMP Trap Station.
Boot Up Trap Enables or disables the Boot Up Trap.
Link Change Trap Enables or disables the Link Change
Trap.
Trap Version Indicates the trap version.
Admin
The Admin tab provides access to system administration
settings and tools. It includes the following screens:
Admin > User Authentication
The User Authentication screen is used to modify user
passwords.
Advanced Configuration
Admin > Static Address
Address Lookup
MAC Physical address of a device mapped to this
interface.
VLAN ID ID of configured VLAN (1-4094)
Admin > User Authentication
Old Password Specifies the old password. The password
is not displayed. As it entered an “˙” corresponding to each
character is displayed in the field.
New Password Specifies the new password.
Confirm New Password Confirms the new password.
The password entered into this field must be exactly the
same as the password entered in the Password field.
Click Save Settings to save the changes.
Admin > Static Address
Switches store the addresses for all known devices in a
forwarding database. This information is used to forward
traffic directly between the inbound and outbound ports.
The Static Address screen allows you to manually configure
static addresses that are bound to a specific port.
Specify the static MAC address, and VLAN, then click
Lookup. The current static addresses on the Switch are all
displayed in a list. To delete a static MAC address from the
forwarding database, select the entry in the displayed list,
then click Delete.
Static Address
Item Index of the displayed source MAC addresses.
Source MAC Displays the static MAC address mapped to
this interface.
VLAN ID Displays the VLAN ID associated with the static
MAC address.
Port Displays the port associated with the static MAC
Static MAC Address Indicates the static MAC address
entry.
34
Page 40
Chapter 5
Advanced Configuration
VLAN ID Indicates the VLAN ID associated with the static
MAC address.
Port ID Indicates the port associated with the static MAC
address.
Admin > MAC Address Table
Switches store the addresses for all known devices in a
forwarding database. This information is used to forward
traffic directly between the inbound and outbound ports.
All the addresses learned by monitoring traffic are stored
in the dynamic address table.
Admin > MAC Address Table
L2 Table Aging
Sets the aging time for entries in the forwarding database.
The aging time is used to age out dynamically learned
forwarding information.
Enable L2 Table Aging Click the check box to enable L2
Table Aging.
Aging Time This is the amount of time after which
dynamic address table entries are discarded. Set the Aging
Time by entering the number of seconds into the text field
provided. (Default: 300 seconds)
Click Save Settings to save the changes.
MAC Address Table
Item Index of the displayed source MAC addresses.
Source MAC Displays the source MAC address mapped
to this interface.
VLAN ID Displays the VLAN ID associated with the source
MAC address
Port Displays the port associated with the source MAC
address.
Admin > Logging
The system allows you to enable or disable event logging,
and specify which even levels are logged to RAM or flash
memory. Severe error messages that are logged to flash
memory are permanently stored in the Switch to assist in
troubleshooting network problems.
Admin > Logging
Logging Target
Memory Click Memory to display log messages stored in
the Switch’s RAM memory.
Flash Click Flash to display log messages stored in the
Switch’s Flash memory.
Console Use console to display log messages.
Add Server
Allows you configure the logging of messages that are
sent to remote Syslog servers.
Name Define a name for identifying this Syslog server.
IP Address IP Address of the Syslog server.
Port UDP port of the Syslog server.
Facility The Facility value to be used when logs are
recorded in the remote server.
Click Add to add the Syslog Server.
Click the appropriate check boxes under Error, Warning,
Info, and Debug to indicate what kind of events you want
the logging target to record.
Click CLEAR to clear the log messages stored in RAM
memory and Flash memory.
Click Save Settings to save the changes.
Status Displays the status of the source MAC addresses.
Click Reload Address Table to retrieve the current L2
address table
Enter the Host IP Address of the device you want to ping,
then click Ping.
Admin > Server Logs
Allows you configure the logging of messages that are
sent to remote Syslog servers.
Admin > Server Logs
Name Define a name for identifying this Syslog server.
IP Address IP Address of the Syslog server.
Port UDP port of the Syslog server.
Facility The Facility value to be used when logs are
recorded in the remote server.
Time Displays the time at which the log was generated
Message Displays the log message text.
Admin > Flash Logs
The Flash Log screen contains information about log
entries saved to the Log File in Flash, including the time
the log was generated, the log severity, and a description
of the log message.
Admin > Flash Logs
No. Displays the log number.
Index Indicates the global sequence number for the log.
Level Indicates the severity of the log.
Click Add to add the Syslog Server.
Admin > Memory Logs
The Memory Log screen contains all system logs in a
chronological order that are saved in RAM (Cache).
Admin > Memory Logs
No. Displays the log number.
Index Indicates the global sequence number for the log.
Level Indicates the severity of the log.
Category Indicates the category which the log belongs
to.
Time Displays the time at which the log was generated
Message Displays the log message text.
Category Indicates the category which the log belongs
Appendix A:
About Gigabit Ethernet
and Fiber Optic Cabling
Gigabit Ethernet
Gigabit Ethernet runs at speeds of 1Gbps (Gigabit per
second), ten times faster than 100Mbps Fast Ethernet, but
it still integrates seamlessly with 100Mbps Fast Ethernet
hardware. Users can connect Gigabit Ethernet hardware
with either fiber optic cabling or copper Category
5e cabling, with fiber optics more suited for network
backbones. As the Gigabit standard gradually integrates
into existing networks, current computer applications will
enjoy faster access time for network data, hardware, and
Internet connections.
About Gigabit Ethernet and Fiber Optic Cabling
Fiber Optic Cabling
Fiber optic cabling is made from flexible, optically efficient
strands of glass and coated with a layer of rubber tubing,
fiber optics use photons of light instead of electrons to
send and receive data. Although fiber is physically capable
of carrying terabits of data per second, the signaling
hardware currently on the market can handle no more
than a few gigabits of data per second.
Fiber cables come with two main connector types. The
most commonly used fiber optic cable is multi-mode
fiber cable (MMF), with a 62.5 micron fiber optic core.
Single-mode fiber cabling is somewhat more efficient
than multi-mode but far more expensive, due to its smaller
optic core that helps retain the intensity of traveling light
signals. A fiber connection always require two fiber cables:
one transmits data, and the other receives it.
Each fiber optic cable is tipped with a connector that fits
into a fiber port on a network adapter, hub, or switch.
In the USA, most cables use a square SC connector that
slides and locks into place when plugged into a port or
connected to another cable. In Europe, the round ST
connector is more prevalent.
For Gigabit Ethernet, you must use the Linksys MGBT1,
MGBSX1, or MGBLH1 miniGBIC modules with the Linksys
Gigabit Switches. The MGBSX1 and the MGBLH1 require
fiber cabling with LC connectors, and the MGBT1 requires
a Category 5e Ethernet cable with an RJ-45 connector.
For Fast Ethernet, you must use the MFEFX1 (100BASE-FX)
or MFELX1 (100BASE-LX) SFP transceivers.
This glossary contains some basic networking terms you
may come across when using this product.
WEB: For additional terms, please visit the
glossary at www.linksys.com/glossary
Access Mode
is granted to the system.
Access Point A device that allows wireless-equipped
computers and other devices to communicate with a
wired network. Also used to expand the range of a wireless
network.
Access Profiles Allows network managers to define
profiles and rules for accessing the device. Access to
management functions can be limited to user groups,
which are defined by the following criteria:
Ingress interfaces
•
Source IP address and/or Source IP subnets.
•
ACE Filters in Access Control Lists (ACL) that determine
which network traffic is forwarded. An ACE is based on the
following criteria:
Protocol
•
Protocol ID
•
Source Port
•
Destination Port
•
Wildcard Mask
•
Source IP Address
•
Destination IP Address
•
ACL (Access Control List) Access Control Lists are
used to grant, deny, or limit access devices, features, or
applications.
Auto-negotiation Allows 10/100 Mbps or 10/100/1000
Mbps Ethernet ports to automatically establish the
optimal duplex mode, flow control, and speed.
Back Pressure A mechanism used with Half Duplex mode
that enables a port not to receive a message.
Bandwidth The transmission capacity of a given device
or network.
Bandwidth Assignments Indicates the amount of
bandwidth assigned to a specific application, user, and/or
interface.
Specifies the method by which user access
Baud Indicates the number of signaling elements
transmitted each second.
Best Effort Indicates that traffic is assigned to the lowest
priority queue, and packet delivery is not guaranteed.
Bit A binary digit.
Boot To start a device and cause it to start executing
instructions.
Browser An application program that provides a way to
look at and interact with all the information on the World
Wide Web.
Bridge A device that connect two networks. Bridges are
hardware specific, however they are protocol independent.
Bridges operate at Layer 1 and Layer 2 levels.
Broadcast Domain Devices sets that receive broadcast
frames originating from any device within a designated
set. Routers bind Broadcast domains, because routers do
not forward broadcast frames.
Broadcast Storm An excessive amount of broadcast
messages simultaneously transmitted across a network
by a single port. Forwarded message responses are
heaped onto the network, overloading network resources
or causing the network to time out.
Burst A packet transmission at faster than normal rates.
Bursts are limited in time and only occur under specific
conditions.
Burst Size Indicates the burst size transmitted at a faster
than normal rate.
Byte A unit of data that is usually eight bits long
Cable Modem A device that connects a computer to the
cable television network, which in turn connects to the
Internet.
CBS (Committed Burst Size) Indicates the maximum
number of data bits transmitted within a specific time
interval.
CIR (Committed Information Rate) The data rate is
averaged over a minimum time increment.
Class Maps An aspect of Quality of Service system that is
comprised of an IP ACL and/or a MAC ACL. Class maps are
configured to match packet criteria, and are matched to
packets in a first-fit fashion.
Combo Ports A single logical port with two physical
connections, including an RJ-45 connection and a SFP
connection.
Communities Specifies a group of users which retain the
same system access rights.
CoS (Class of Service) The 802.1p priority scheme. CoS
provides a method for tagging packets with priority
information. A CoS value between 0-7 is added to the
Layer II header of packets, where zero is the lowest priority
and seven is the highest.
DDNS (Dynamic Domain Name System) Allows the
hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP
address.
Default Gateway A device that forwards Internet traffic
from your local area network.
DHCP (Dynamic Host Configuration Protocol) A
networking protocol that allows administrators to assign
temporary IP addresses to network computers by “leasing”
an IP address to a user for a limited amount of time, instead
of assigning permanent IP addresses.
DHCP Clients An Internet host using DHCP to obtain
configuration parameters, such as a network address.
DHCP Server An Internet host that returns configuration
parameters to DHCP clients.
DNS (Domain Name Server) The IP address of your ISP’s
server, which translates the names of websites into IP
addresses.
Domain A specific name for a network of computers.
Download To receive a file transmitted over a network.
DSL (Digital Subscriber Line) An always-on broadband
connection over traditional phone lines.
DSCP (DiffServ Code Point) Provides a method of
tagging IP packets with QoS priority information.
Dynamic IP Address A temporary IP address assigned by
a DHCP server.
EIGRP (Enhanced Interior Gateway Routing
Protocol) Provides fast convergence, support for variable-
length subnet mask, and supports multiple network layer
protocols.
Encryption Encoding data transmitted in a network.
Ethernet IEEE standard network protocol that specifies
how data is placed on and retrieved from a common
transmission medium.
Firmware The programming code that runs a networking
device.
Flow Control Enables lower speed devices to
communicate with higher speed devices. This is
implemented by the higher speed device refraining from
sending packets.
Full Duplex The ability of a networking device to receive
and transmit data simultaneously.
GARP (General Attributes Registration
Protocol) Registers client stations into a multicast
domain.
Gateway A device that interconnects networks with
different, incompatible communications protocols.
GBIC (GigaBit Interface Converter) A hardware module
used to attach network devices to fiber-based transmission
systems. GBIC converts the serial electrical signals to serial
optical signals and vice versa.
GVRP (GARP VLAN Registration Protocol) Registers
client stations into a VLANs.
Half Duplex Data transmission that can occur in two
directions over a single line, but only one direction at a
time.
HTTP (HyperText Transport Protocol) The
communications protocol used to connect to servers on
the World Wide Web.
HTTPS (HyperText Transport Protocol Secure) An
extension to the standard HTTP protocol that provides
confidentiality by encrypting the traffic from the website.
By default this protocol uses TCP port 443.
ICMP (Internet Control Message Protocol) Allows the
gateway or destination host to communicate with the
source host. For example, to report a processing error.
IGMP (Internet Group Management Protocol) Allows
hosts to notify their local switch or router that they want
to receive transmissions assigned to a specific multicast
group.
IP (Internet Protocol) A protocol used to send data over
a network.
IP Address The address used to identify a computer or
device on a network.
IPCONFIG A Windows 2000 and XP utility that displays
the IP address for a particular networking device.
IPSec (Internet Protocol Security) A VPN protocol used
to implement secure exchange of packets at the IP layer.
ISP (Internet Service Provider) A company that provides
access to the Internet.
Jumbo Frames Enable transporting identical data in
fewer frames. Jumbo Frames reduce overhead, lower
processing time, and ensure fewer interrupts.
LAG (Link Aggregated Group) Aggregates ports or
VLANs into a single virtual port or VLAN.
FTP (File Transfer Protocol) A protocol used to transfer
files over a TCP/IP network.
LAN The computers and networking products that make
up your local network.
41
Page 47
Appendix B
Glossary
MAC (Media Access Control) Address The unique
address that a manufacturer assigns to each networking
device.
Mask A filter that includes or excludes certain values, for
example parts of an IP address.
Mbps (MegaBits Per Second) One million bits per
second; a unit of measurement for data transmission.
MD5 (Message Digest 5) An algorithm that produces a
128-bit hash. MD5 is a variation of MD4, and increases MD4
security. MD5 verifies the integrity of the communication
and authenticates the origin of the communication.
MDI (Media Dependent Interface) A cable used for end
stations.
MDIX (Media Dependent Interface with Crossover) A
cable used for hubs and switches.
MIB (Management Information Base) MIBs contain
information describing specific aspects of network
components.
Multicast Transmits copies of a single packet to multiple
ports.
Network A series of computers or devices connected for
the purpose of data sharing, storage, and/or transmission
between users.
NMS (Network Management System) An interface that
provides a method of managing a system.
RADIUS (Remote Authentication Dial-In User
Service) A protocol that uses an authentication server to
control network access.
RJ-45 (Registered Jack-45) An Ethernet connector that
holds up to eight wires.
RMON (Remote Monitoring) Provides network
information to be collected from a single workstation.
Router A networking device that connects multiple
networks together.
RSTP (Rapid Spanning Tree Protocol) Detects and uses
network topologies that allow a faster convergence of the
spanning tree, without creating forwarding loops.
Server Any computer whose function in a network is to
provide user access to files, printing, communications,
and other services.
SMTP (Simple Mail Transfer Protocol) The standard email protocol on the Internet.
SNMP (Simple Network Management Protocol) A
widely used network monitoring and control protocol.
SSH Secure Shell. A utility that uses strong authentication
and secure communications to log in to another computer
over a network.
SSL (Secure Socket Layer) Encryption technology for
the Internet used to provide secure transactions, such as
the transmission of credit card numbers for e-commerce.
OID (Object Identifier) Used by SNMP to identify
managed objects. In the SNMP Manager/Agent network
management paradigm, each managed object must have
an OID to identify it.
Packet A unit of data sent over a network.
Ping (Packet INternet Groper) An Internet utility used
to determine whether a particular IP address is online.
Policing Determines if traffic levels are within a specified
profile. Policing manages the maximum traffic rate used
to send or receive packets on an interface.
Port The connection point on a computer or networking
device used for plugging in cables or adapters.
Port Mirroring Monitors and mirrors network traffic by
forwarding copies of incoming and outgoing packets
from one port to a monitoring port.
Power over Ethernet (PoE) A technology enabling an
Ethernet network cable to deliver both data and power.
QoS (Quality of Service) Provides policies that contain
sets of filters (rules). QoS allows network managers
to decide how and what network traffic is forwarded
according to priorities, application types, and source and
destination addresses.
Static IP Address A fixed address assigned to a computer
or device that is connected to a network.
STP (Spanning Tree Protocol) Prevents loops in network
traffic. The Spanning Tree Protocol (STP) provides tree
topography for any arrangement of bridges. STP provides
one path between end stations on a network, eliminating
loops.
Subnet (Sub-network) Subnets are portions of a
network that share a common address component. In
TCP/IP networks, devices that share a prefix are part of
the same subnet. For example, all devices with a prefix of
157.100.100.100 are part of the same subnet.
Subnet Mask An address code that determines the size
of the network.
Switch Filters and forwards packets between LAN
segments. Switches support any packet protocol type.
TACACS+ (Terminal Access Controller Access Control
System Plus) Proprietary Cisco enhancement to Terminal
Access Controller Access Control System (TACACS). Provides
additional support for authentication, authorization, and
accounting.
TCP (Transmission Control Protocol) A network protocol
for transmitting data that requires acknowledgement
from the recipient of data sent.
TCP/IP (Transmission Control Protocol/Internet
Protocol) A set of instructions PCs use to communicate
over a network.
Telnet A user command and TCP/IP protocol used for
accessing remote PCs.
TFTP (Trivial File Transfer Protocol) A version of the
TCP/IP FTP protocol that has no directory or password
capability.
Throughput The amount of data moved successfully
from one node to another in a given time period.
Trunking Link Aggregation. Optimizes port usage by
linking a group of ports together to form a single trunk
(aggregated groups).
TX Rate Transmission Rate.
Glossary
UDP (User Data Protocol) Communication protocol that
transmits packets but does not guarantee their delivery.
Upgrade To replace existing software or firmware with a
newer version.
Upload To transmit a file over a network.
URL (Uniform Resource Locator) The address of a file
located on the Internet.
VLAN (Virtual Local Area Networks) Logical subgroups
that constitute a Local Area Network (LAN). This is done in
software rather than defining a hardware solution.
WAN (Wide Area Network) Networks that cover a large
geographical area.
Wildcard Mask Specifies which IP address bits are
used, and which bits are ignored. A wild card mask
of 255.255.255.255 indicates that no bit is important.
A wildcard of 0.0.0.0 indicates that all the bits are
important.
For example, if the destination IP address is 149.36.184.198
and the wildcard mask is 255.36.184.00, the first two bits
of the IP address are used, while the last two bits are
ignored.
RMON Embedded Remote Monitoring
(RMON) software agent
supports four RMON groups
(history, statistics, alarms, and
events) for enhanced traffic
management, monitoring, and
analysis.
Firmware Upgrade Web Browser upgrade (HTTP)
and TFTP
Port Mirroring Traffic on a port can be
mirrored to another port for
analysis with a network
analyzer or RMON probe.
Other Management
Port Mirroring
DHCP/BootP Client
SNTP
Cable Diagnostics
PING
System Log
Configuration upload and
backup via HTTP or TFTP
Security
802.1X - RADIUS
Authentication. MD5
Encryption
Port Security - MAC-Based
Filtering
Management Access Control
Availability
Link Aggregation Link Aggregation using IEEE
802.3ad LACP
Up to 2 groups with up to 4
ports per group for FE ports,
1 group for GE ports
Storm Control Broadcast, Multicast and
Unknown Unicast
Spanning Tree IEEE 802.1D Spanning Tree,
IEEE 802.1w Rapid Spanning
Tree, IEEE 802.1s Multiple
Spanning Tree
IGMP Snooping IGMP (v1/v2) snooping
provides for fast client joins
and leaves of multicast streams
and limits bandwidth-intensive
video traffic to only the
requestors. Support 128
44
Page 50
Appendix C
multicast groups.
QoS
Priority levels 4 Hardware queues
Scheduling Priority Queueing and
Weighted Round Robin (WRR)
Class of Service Port-based
802.1p VLAN priority based
IPv4/v6 IP Precedence/DSCP
based
Diffserv
Rate Limiting Ingress rate limiting
Egress rate control
Standards
Dimensions 16.93" x 7.97" x 1.75"
W x H x D (430 x 203 x 44 mm)
Unit Weight 5.11 lb (2.32 kg)
Power Internal Power, 100-240V
Certification FCC Part15 Class A, CE Class A,
UL, cUL, CE mark, CB
Operating Temp. 32 to 104ºF (0 to 40ºC)
Storage Temp. -4 to 158ºF (-20 to 70ºC)
Operating Humidity 10 to 90%
Storage Humidity 10 to 95%
Linksys warrants to You that, for a period of five years
(the "Warranty Period"), your Linksys Product will be
substantially free of defects in materials and workmanship
under normal use. Your exclusive remedy and Linksys’
entire liability under this warranty will be for Linksys at
its option to repair or replace the Product or refund Your
purchase price less any rebates. This limited warranty
extends only to the original purchaser.
If the Product proves defective during the Warranty
Period call Linksys Technical Support in order to obtain
a Return Authorization Number, if applicable. BE SURE
TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN
CALLING. If You are requested to return the Product, mark
the Return Authorization Number clearly on the outside
of the package and include a copy of your original proof
of purchase. RETURN REQUESTS CANNOT BE PROCESSED
WITHOUT PROOF OF PURCHASE. You are responsible
for shipping defective Products to Linksys. Linksys pays
for UPS Ground shipping from Linksys back to You only.
Customers located outside of the United States of America
and Canada are responsible for all shipping and handling
charges.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT
WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING
OUT OF OR RELATED TO THE USE OF OR INABILITY TO
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
The foregoing limitations will apply even if any warranty or
remedy provided under this Agreement fails of its essential
purpose. Some jurisdictions do not allow the exclusion or
limitation of incidental or consequential damages, so the
above limitation or exclusion may not apply to You.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623.
ALL IMPLIED WARRANTIES AND CONDITIONS OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE ARE LIMITED TO THE DURATION OF
THE WARRANTY PERIOD. ALL OTHER EXPRESS OR
IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions
do not allow limitations on how long an implied warranty
lasts, so the above limitation may not apply to You. This
warranty gives You specific legal rights, and You may also
have other rights which vary by jurisdiction.
This warranty does not apply if the Product (a) has been
altered, except by Linksys, (b) has not been installed,
operated, repaired, or maintained in accordance with
instructions supplied by Linksys, or (c) has been subjected
to abnormal physical or electrical stress, misuse,
negligence, or accident. In addition, due to the continual
development of new techniques for intruding upon and
attacking networks, Linksys does not warrant that the
Product will be free of vulnerability to intrusion or attack.
This product has been tested and complies with the
specifications for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in
a residential installation. This equipment generates,
uses, and can radiate radio frequency energy and, if not
installed and used according to the instructions, may
cause harmful interference to radio communications.
However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception,
which is found by turning the equipment off and on, the
user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna
•
Increase the separation between the equipment or
•
devices
Industry Canada Statement
This device complies with Industry Canada ICES-003 rule.
Operation is subject to the following two conditions:
This device may not cause interference and
1.
This device must accept any interference, including
2.
interference that may cause undesired operation of
the device.
Avis d’Industrie Canada
Cet appareil est conforme à la norme NMB003 d’Industrie
Canada.
Le fonctionnement est soumis aux conditions suivantes :
Ce périphérique ne doit pas causer d’interférences;
1.
Ce périphérique doit accepter toutes les interférences
2.
reçues, y compris celles qui risquent d’entraîner un
fonctionnement indésirable.
Connect the equipment to an outlet other than the
•
receiver’s
Consult a dealer or an experienced radio/TV technician
•
for assistance
Safety Notices
Caution: To reduce the risk of fire, use only No.26 AWG
•
or larger telecommunication line cord.
Do not use this product near water, for example, in a
•
wet basement or near a swimming pool.
Avoid using this product during an electrical storm.
•
There may be a remote risk of electric shock from
lightning.
WARNING: This product contains lead, known
to the State of California to cause cancer, and
birth defects or other reproductive harm. Wash
hands after handling.
User Information for Consumer Products
Covered by EU Directive 2002/96/EC on
Waste Electric and Electronic Equipment
(WEEE)
This document contains important information for users
with regards to the proper disposal and recycling of
Linksys products. Consumers are required to comply with
this notice for all electronic products bearing the following
symbol:
English - Environmental Information for Customers in
the European Union
European Directive 2002/96/EC requires that the equipment
bearing this symbol on the product and/or its packaging must
not be disposed of with unsorted municipal waste. The symbol
indicates that this product should be disposed of separately
from regular household waste streams. It is your responsibility to
dispose of this and other electric and electronic equipment via
designated collection facilities appointed by the government or
local authorities. Correct disposal and recycling will help prevent
potential negative consequences to the environment and
human health. For more detailed information about the disposal
of your old equipment, please contact your local authorities,
waste disposal service, or the shop where you purchased the
product.
Български (Bulgarian) - Информация относно
опазването на околната среда за потребители в
Европейския съюз
Европейска директива 2002/96/EC изисква уредите, носещи
този символ върху изделието и/или опаковката му, да не
се изхвърля т с несортирани битови отпадъци. Символът
обозначава, че изделието трябва да се изхвърля отделно от
сметосъбирането на обикновените битови отпадъци. Ваша
е отговорността този и другите електрически и електронни
уреди да се изхвърлят в предварително определени от
държавните или общински органи специализирани пунктове
за събиране. Правилното изхвърляне и рециклиране
ще спомогнат да се предотвратят евентуални вредни за
околната среда и здравето на населението последствия. За
по-подробна информация относно изхвърлянето на вашите
стари уреди се обърнете към местните власти, службите за
сметосъбиране или магазина, от който сте закупили уреда.
Ceština (Czech) - Informace o ochraně životního
prostředí pro zákazníky v zemích Evropské unie
Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené
tímto symbolem na produktu anebo na obalu bylo likvidováno
s netříděným komunálním odpadem. Tento symbol udává,
že daný produkt musí být likvidován odděleně od běžného
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu
a dalších elektrických a elektronických zařízení prostřednictvím
určených sběrných míst stanovených vládou nebo místními
úřady. Správná likvidace a recyklace pomáhá předcházet
potenciálním negativním dopadům na životní prostředí a lidské
zdraví. Podrobnější informace o likvidaci starého vybavení si
laskavě vyžádejte od místních úřadů, podniku zabývajícího se
likvidací komunálních odpadů nebo obchodu, kde jste produkt
zakoupili.
Dansk (Danish) - Miljøinformation for kunder i EU
EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol
på produktet og/eller emballagen ikke må bortskaffes som
usorteret kommunalt affald. Symbolet betyder, at dette produkt
skal bortskaffes adskilt fra det almindelige husholdningsaffald.
Det er dit ansvar at bortskaffe dette og andet elektrisk og
elektronisk udstyr via bestemte indsamlingssteder udpeget
af staten eller de lokale myndigheder. Korrekt bortskaffelse
og genvinding vil hjælpe med til at undgå mulige skader for
miljøet og menneskers sundhed. Kontakt venligst de lokale
myndigheder, renovationstjenesten eller den butik, hvor du
har købt produktet, angående mere detaljeret information om
bortskaffelse af dit gamle udstyr.
Deutsch (German) - Umweltinformation für Kunden
innerhalb der Europäischen Union
Die Europäische Richtlinie 2002/96/EC verlangt, dass technische
Ausrüstung, die direkt am Gerät und/oder an der Verpackung mit
diesem Symbol versehen ist , nicht zusammen mit unsortiertem
Gemeindeabfall entsorgt werden darf. Das Symbol weist darauf
hin, dass das Produkt von regulärem Haushaltmüll getrennt
entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses
Gerät und andere elektrische und elektronische Geräte über
die dafür zuständigen und von der Regierung oder örtlichen
Behörden dazu bestimmten Sammelstellen zu entsorgen.
Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,
potentielle negative Folgen für Umwelt und die menschliche
Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur
Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an
die örtlichen Behörden oder städtischen Entsorgungsdienste
oder an den Händler, bei dem Sie das Produkt erworben haben.
Eesti (Estonian) - Keskkonnaalane informatsioon
Euroopa Liidus asuvatele klientidele
Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on
seadmeid, millel on tootel või pakendil käesolev sümbol ,
keelatud kõrvaldada koos sorteerimata olmejäätmetega. See
sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest
olmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva
ja ka muud elektri- ja elektroonikaseadmed riigi või kohalike
ametiasutuste poolt ette nähtud kogumispunktide kaudu.
Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältida
võimalikke negatiivseid tagajärgi keskkonnale ning inimeste
tervisele. Vanade seadmete kõrvaldamise kohta täpsema
informatsiooni saamiseks võtke palun ühendust kohalike
ametiasutustega, jäätmekäitlusfirmaga või kauplusega, kust te
toote ostsite.
Español (Spanish) - Información medioambiental para
clientes de la Unión Europea
La Directiva 2002/96/CE de la UE exige que los equipos que
lleven este símbolo en el propio aparato y/o en su embalaje
no deben eliminarse junto con otros residuos urbanos no
seleccionados. El símbolo indica que el producto en cuestión
debe separarse de los residuos domésticos convencionales con
vistas a su eliminación. Es responsabilidad suya desechar este y
cualesquiera otros aparatos eléctricos y electrónicos a través de
los puntos de recogida que ponen a su disposición el gobierno y
las autoridades locales. Al desechar y reciclar correctamente estos
aparatos estará contribuyendo a evitar posibles consecuencias
negativas para el medio ambiente y la salud de las personas. Si
desea obtener información más detallada sobre la eliminación
segura de su aparato usado, consulte a las autoridades locales,
al servicio de recogida y eliminación de residuos de su zona o
pregunte en la tienda donde adquirió el producto.
ξλληνικά (Greek) - Στοιχεία περιβαλλοντικής
προστασίας για πελάτες εντός της Ευρωπαϊκής
Ένωσης
Η Κοινοτική Οδηγία 2002/96/EC απαιτεί ότι ο εξοπλισμός ο οποίος
φέρει αυτό το σύμβολο στο προϊόν και/ή στη συσκευασία
του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικά
απορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θα
πρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακά
απορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντος
και άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω των
καθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οι
οποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές.
Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη
πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία.
Για περισσότερες πληροφορίες σχετικά με την απόρριψη του
παλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικές
αρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο
αγοράσατε το προϊόν.
Français (French) - Informations environnementales
pour les clients de l’Union européenne
La directive européenne 2002/96/CE exige que l’équipement
sur lequel est apposé ce symbole sur le produit et/ou son
emballage ne soit pas jeté avec les autres ordures ménagères. Ce
symbole indique que le produit doit être éliminé dans un circuit
distinct de celui pour les déchets des ménages. Il est de votre
responsabilité de jeter ce matériel ainsi que tout autre matériel
électrique ou électronique par les moyens de collecte indiqués
par le gouvernement et les pouvoirs publics des collectivités
territoriales. L’élimination et le recyclage en bonne et due forme
ont pour but de lutter contre l’impact néfaste potentiel de ce
type de produits sur l’environnement et la santé publique. Pour
plus d’informations sur le mode d’élimination de votre ancien
équipement, veuillez prendre contact avec les pouvoirs publics
locaux, le service de traitement des déchets, ou l’endroit où vous
avez acheté le produit.
Italiano (Italian) - Informazioni relative all’ambiente
per i clienti residenti nell’Unione Europea
La direttiva europea 2002/96/EC richiede che le apparecchiature
contrassegnate con questo simbolo sul prodotto e/o
sull’imballaggio non siano smaltite insieme ai rifiuti urbani
non differenziati. Il simbolo indica che questo prodotto non
deve essere smaltito insieme ai normali rifiuti domestici. È
responsabilità del proprietario smaltire sia questi prodotti sia
le altre apparecchiature elettriche ed elettroniche mediante
le specifiche strutture di raccolta indicate dal governo o dagli
enti pubblici locali. Il corretto smaltimento ed il riciclaggio
aiuteranno a prevenire conseguenze potenzialmente negative
per l’ambiente e per la salute dell’essere umano. Per ricevere
informazioni più dettagliate circa lo smaltimento delle vecchie
apparecchiature in Vostro possesso, Vi invitiamo a contattare gli
enti pubblici di competenza, il servizio di smaltimento rifiuti o il
negozio nel quale avete acquistato il prodotto.
Latviešu valoda (Latvian) - Ekoloģiska informācija
klientiem Eiropas Savienības jurisdikcijā
Direktīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienota
zīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst
izmest nešķirotā veidā kopā ar komunālajiem atkritumiem
(tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmē
to, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar
parastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šo
un citas elektriskas un elektroniskas ierīces izmest atkritumos,
izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, ko
nodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos
un pārstrāde tiek veikta pareizi, tad mazinās iespējamais
kaitējums dabai un cilvēku veselībai. Sīkākas ziņas par
novecojuša aprīkojuma izmešanu atkritumos jūs varat saņemt
vietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,
kur iegādājāties šo izstrādājumu.
Lietuvškai (Lithuanian) - Aplinkosaugos informacija,
skirta Europos Sąjungos vartotojams
Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir
kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį),
negalima šalinti kartu su nerūšiuotomis komunalinėmis
atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai
nuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad
ši ir kita elektros ar elektroninė įranga būtų šalinama per tam
tikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimo
sistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengta
galimos žalos aplinkai ir žmonių sveikatai. Daugiau informacijos
apie jūsų senos įrangos šalinimą gali pateikti vietinės valdžios
institucijos, atliekų šalinimo tarnybos arba parduotuvės, kuriose
įsigijote tą gaminį.
Malti (Maltese) - Informazzjoni Ambjentali għal Klijenti
fl-Unjoni Ewropea
Id-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun fih issimbolu fuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema
ma’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika
li dan il-prodott għandu jintrema separatament minn ma’ liskart domestiku regolari. Hija responsabbiltà tiegħek li tarmi
dan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettroniku
permezz ta’ faċilitajiet ta’ ġbir appuntati apposta mill-gvern jew
mill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin
jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent u
għas-saħħa tal-bniedem. Għal aktar informazzjoni dettaljata
dwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattja
lill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jew
il-ħanut minn fejn xtrajt il-prodott.
Nederlands (Dutch) - Milieu-informatie voor klanten
in de Europese Unie
De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die
is voorzien van dit symbool op het product of de verpakking,
niet mag worden ingezameld met niet-gescheiden huishoudelijk
afval. Dit symbool geeft aan dat het product apart moet worden
ingezameld. U bent zelf verantwoordelijk voor de vernietiging
van deze en andere elektrische en elektronische apparatuur via de
daarvoor door de landelijke of plaatselijke overheid aangewezen
inzamelingskanalen. De juiste vernietiging en recycling van
deze apparatuur voorkomt mogelijke negatieve gevolgen voor
het milieu en de gezondheid. Voor meer informatie over het
vernietigen van uw oude apparatuur neemt u contact op met
de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de
winkel waar u het product hebt aangeschaft.
Norsk (Norwegian) - Miljøinformasjon for kunder i EU
EU-direktiv 2002/96/EF krever at utstyr med følgende symbol
avbildet på produktet og/eller pakningen, ikke må kastes
sammen med usortert avfall. Symbolet indikerer at dette
produktet skal håndteres atskilt fra ordinær avfallsinnsamling
for husholdningsavfall. Det er ditt ansvar å kvitte deg med
dette produktet og annet elektrisk og elektronisk avfall via egne
innsamlingsordninger slik myndighetene eller kommunene
bestemmer. Korrekt avfallshåndtering og gjenvinning vil
være med på å forhindre mulige negative konsekvenser for
miljø og helse. For nærmere informasjon om håndtering av
det kasserte utstyret ditt, kan du ta kontakt med kommunen,
en innsamlingsstasjon for avfall eller butikken der du kjøpte
produktet.
Magyar (Hungarian) - Környezetvédelmi információ az
európai uniós vásárlók számára
A 2002/96/EC számú európai uniós irányelv megkívánja, hogy
azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán
az alábbi címke megjelenik, tilos a többi szelektálatlan lakossági
hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott
termék kidobásakor a szokványos háztartási hulladékelszállítási
rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön
felelõssége, hogy ezt, és más elektromos és elektronikus
berendezéseit a kormányzati vagy a helyi hatóságok által
kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ
hulladékfeldolgozás segít a környezetre és az emberi egészségre
potenciálisan ártalmas negatív hatások megelõzésében. Ha
elavult berendezéseinek felszámolásához további részletes
információra van szüksége, kérjük, lépjen kapcsolatba a helyi
hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal
üzlettel, ahol a terméket vásárolta.
Polski (Polish) - Informacja dla klientów w Unii
Europejskiej o przepisach dotyczących ochrony
środowiska
Dyrektywa Europejska 2002/96/EC wymaga, aby sprzęt
oznaczony symbolem znajdującym się na produkcie i/lub jego
opakowaniu nie był wyrzucany razem z innymi niesortowanymi
odpadami komunalnymi. Symbol ten wskazuje, że produkt
nie powinien być usuwany razem ze zwykłymi odpadami z
gospodarstw domowych. Na Państwu spoczywa obowiązek
wyrzucania tego i innych urządzeń elektrycznych oraz
elektronicznych w punktach odbioru wyznaczonych przez władze
krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób
i jego recykling pomogą zapobiec potencjalnie negatywnym
konsekwencjom dla środowiska i zdrowia ludzkiego. W celu
uzyskania szczegółowych informacji o usuwaniu starego sprzętu,
prosimy zwrócić się do lokalnych władz, służb oczyszczania
miasta lub sklepu, w którym produkt został nabyty.
Português (Portuguese) - Informação ambiental para
clientes da União Europeia
A Directiva Europeia 2002/96/CE exige que o equipamento
que exibe este símbolo no produto e/ou na sua embalagem
não seja eliminado junto com os resíduos municipais não
separados. O símbolo indica que este produto deve ser
eliminado separadamente dos resíduos domésticos regulares.
É da sua responsabilidade eliminar este e qualquer outro
equipamento eléctrico e electrónico através das instalações
de recolha designadas pelas autoridades governamentais ou
locais. A eliminação e reciclagem correctas ajudarão a prevenir
as consequências negativas para o ambiente e para a saúde
humana. Para obter informações mais detalhadas sobre a
forma de eliminar o seu equipamento antigo, contacte as
autoridades locais, os serviços de eliminação de resíduos ou o
estabelecimento comercial onde adquiriu o produto.
Română (Romanian) - Informaţii de mediu pentru
clienţii din Uniunea Europeană
Directiva europeană 2002/96/CE impune ca echipamentele care
prezintă acest simbol pe produs şi/sau pe ambalajul acestuia să
nu fie casate împreună cu gunoiul menajer municipal. Simbolul
indică faptul că acest produs trebuie să fie casat separat de
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi
acest produs şi alte echipamente electrice şi electronice prin
intermediul unităţilor de colectare special desemnate de guvern
sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta
la prevenirea potenţialelor consecinţe negative asupra sănătăţii
mediului şi a oamenilor. Pentru mai multe informaţii detaliate
cu privire la casarea acestui echipament vechi, contactaţi
autorităţile locale, serviciul de salubrizare sau magazinul de la
care aţi achiziţionat produsul.
Slovenčina (Slovak) - Informácie o ochrane životného
prostredia pre zákazníkov v Európskej únii
Podľa európskej smernice 2002/96/ES zariadenie s týmto
symbolom na produkte a/alebo jeho balení nesmie byť
likvidované spolu s netriedeným komunálnym odpadom.
Symbol znamená, že produkt by sa mal likvidovať oddelene
od bežného odpadu z domácností. Je vašou povinnosťou
likvidovať toto i ostatné elektrické a elektronické zariadenia
prostredníctvom špecializovaných zberných zariadení určených
vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia
pomôže zabrániť prípadným negatívnym dopadom na životné
prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie
informácie o likvidácii starého zariadenia, obráťte sa, prosím, na
miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov
alebo obchod, v ktorom ste si produkt zakúpili.
Slovenčina (Slovene) - Okoljske informacije za stranke
v Evropski uniji
Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,
označene s tem simbolom – na izdelku in/ali na embalaži – med
običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba
izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.
Vaša odgovornost je, da to in preostalo električno in elektronsko
opremo odnesete na posebna zbirališča, ki jih določijo
državne ustanove ali lokalna uprava. S pravilnim odlaganjem
in recikliranjem boste preprečili morebitne škodljive vplive na
okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare
opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer
ste izdelek kupili.
Suomi (Finnish) - Ympäristöä koskevia tietoja EUalueen asiakkaille
EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä
symboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoa
ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.
Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään
tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää
tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet
viemällä tuote tai tuotteet viranomaisten määräämään
keräyspisteeseen. Laitteiston oikea hävittäminen estää
mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten
terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta
saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä
myymälästä, josta ostit tuotteen.
Svenska (Swedish) - Miljöinformation för kunder i
Europeiska unionen
Det europeiska direktivet 2002/96/EC kräver att utrustning med
denna symbol på produkten och/eller förpackningen inte får
kastas med osorterat kommunalt avfall. Symbolen visar att denna
produkt bör kastas efter att den avskiljts från vanligt hushållsavfall.
Det faller på ditt ansvar att kasta denna och annan elektrisk och
elektronisk utrustning på fastställda insamlingsplatser utsedda
av regeringen eller lokala myndigheter. Korrekt kassering och
återvinning skyddar mot eventuella negativa konsekvenser
för miljön och personhälsa. För mer detaljerad information om
kassering av din gamla utrustning kontaktar du dina lokala
myndigheter, avfallshanteringen eller butiken där du köpte
produkten.