Linksys SRW2016 User Manual

A Division of Cisco Systems, Inc.
®
16- or 24-Port 10/100/1000 Gigabit Switch
Model No.
with WebView
WIRED
SRW2016 or SRW2024
User Guide
Copyright and Trademarks
Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S . and certain other countries. Copyright © 2005 Cisco Systems, Inc . All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
WARNING: This product contains chemicals, including lead, known to the State of California to cause cancer, and birth defects or other reproductive harm. Wash hands after handling.
How to Use this Guide Your guide to the 16- or 24-Port 10/100/1000 Gigabit Switch with WebView has been designed to make
understanding networking with the switch easier than ever. Look for the following items when reading this User Guide:
This checkmark means there is a note of interest and is something you should pay special attention to while using the Switch.
This exclamation point means there is a caution or warning and is something that could damage your property or the Switch.
This question mark provides you with a reminder about something you might need to do while using the Switch.
In addition to these symbols, there are definitions for technical terms that are presented like this:
word: definition.
Also, each figure (diagram, screenshot, or other image) is provided with a figure number and description, like this:
Figure 0-1: Sample Figure Description
Figure numbers and descriptions can also be found in the “List of Figures” section.
SRW2016_SRW2024-UG-50429C JL
Table of Contents
Chapter 1: Introduction 1
Welcome 1 What’s in this User Guide? 2
Chapter 2: Getting to Know the Switch 3
Overview 3 The Front Panel 3 The Back Panel 4
Chapter 3: Connecting the Switch 5
Overview 5 Before You Install the Switch... 6 Placement Options 6 Connecting the Switch 7
Chapter 4: Using the Console Interface for Configuration 9
Overview 9 Configuring the HyperTerminal Application 9 Configuring the Switch through the Console Interface 10
Chapter 5: Using the Web-based Utility for Configuration 18
Overview 18 Accessing the Web-based Utility 18 Sys. Info. (System Information) Tab - System Description 18 Sys. Info. (System Information) Tab - System Mode 19 Sys. Info. (System Information) Tab - Forwarding Database 19 Sys. Info. (System Information) Tab - Time Synchronization 20 IP Conf. (Configuration) Tab - IP Addr. (Address) 21 Switch Conf. (Configuration) Tab - Interface Conf. (Configuration) 21 Switch Conf. (Configuration) Tab - VLAN 24 Switch Conf. (Configuration) Tab - VLAN Port 24 Switch Conf. (Configuration) Tab - LA Conf. (Configuration) 25 Switch Conf. (Configuration) Tab - Port Mirroring 26 Switch Conf. (Configuration) Tab - LACP 26 QoS Tab - CoS Settings 27 QoS Tab - Queue Settings 27
QoS Tab - CoS to Queue 28 Security Tab - ACL 28 Security Tab - 802.1x Users 29 Security Tab - 802.1x Port Conf. (Configuration) 29 Security Tab - Management Conf. (Configuration) 31 Security Tab - RADIUS Server 31 Security Tab - TACACS Server 33 Security Tab - Storm Control 34 Security Tab - Authenticated Users 35 Security Tab - System Password 35 SNTP Tab - Global Settings 35 SNTP Tab - Authentication 36 SNTP Tab - Servers 37 SNTP Tab - Interface Settings 38 Statistics Tab - Interface Statistics 39 Statistics Tab - Etherlike Statistics 40 Statistics Tab - RMON Statistics 41 Statistics Tab - RMON History Control 42 Statistics Tab - RMON History Log 43 Statistics Tab - RMON Alarms 44 Statistics Tab - RMON Events Control 45 Statistics Tab - RMON Events Log 46 Statistics Tab - EAP Statistics 47 Logs Tab - Message Log 47 Logs Tab - Event Log 48 Logs Tab - Global Parameters 48 Maintenance Tab - Telnet 49 Maintenance Tab - Reset 49 Maintenance Tab - File Download 49 Maintenance Tab - File Upload 50 Maintenance Tab - Restore Defaults 51 Maintenance Tab - Integrated Cable Test 51 Maintenance Tab - HTTP File Download 52 Help Tab 52
Appendix A: About Gigabit Ethernet and Fiber Optic Cabling 53
Gigabit Ethernet 53 Fiber Optic Cabling 53
Appendix B: Windows Help 54 Appendix C: Glossary 55 Appendix D: Specifications 61 Appendix E: Warranty Information 62 Appendix F: Regulatory Information 63 Appendix G: Contact Information 64
List of Figures
Figure 2-1: Front Panel of the 16-Port Switch 3 Figure 2-2: Back Panel of the 16-Port Switch 4 Figure 3-1: Typical Network Configuration for the 16-Port Switch 5 Figure 3-2: Attach the Brackets to the Switch 7 Figure 3-3: Mount the Switch in the Rack 7 Figure 4-1: Finding HyperTerminal 9 Figure 4-2: Connection Description 9 Figure 4-3: Connect To 9 Figure 4-4: COM1 Properties 10 Figure 4-5: Switch Main Menu 10 Figure 4-6: System Configuration Menu 11 Figure 4-7: System Information 11 Figure 4-8: Versions 11 Figure 4-9: General System Information 12 Figure 4-10: Management Settings 12 Figure 4-11: Serial Port Configuration 12 Figure 4-12: Telnet Configuration 13 Figure 4-13: IP Configuration 13 Figure 4-14: IP Address Configuration 13 Figure 4-15: HTTP 14 Figure 4-16: Network Configuration 14 Figure 4-17: Ping 15 Figure 4-18: Ping Test Results 15 Figure 4-19: TraceRoute 15 Figure 4-20: TraceRoute Test Results 16 Figure 4-21: File Management 16 Figure 4-22: System Configuration Menu 16 Figure 4-23: Port Status 17
Figure 4-24: Port Configuration 17 Figure 4-25: Help 17 Figure 5-1: Login Screen 18 Figure 5-2: System Information - System Description 18 Figure 5-3: System Information - System Mode 19 Figure 5-4: System Information - Forwarding Database 19 Figure 5-5: Forwarding Database - Add Entry 20 Figure 5-6: System Information - Time Synchronization 20 Figure 5-7: IP Configuration - IP Address 21 Figure 5-8: Switch Configuration - Interface Configuration 21 Figure 5-9: Interface Configuration - Change Settings 22 Figure 5-10: Switch Configuration - VLAN 24 Figure 5-11: VLAN - Add VLAN 24 Figure 5-12: Switch Configuration - VLAN Port 24 Figure 5-13: VLAN Port - Change Settings 25 Figure 5-14: Switch Configuration - LA Configuration 25 Figure 5-15: LA Configuration - Change Settings 25 Figure 5-16: Switch Configuration - Port Mirroring 26 Figure 5-17: Switch Configuration - LACP 26 Figure 5-18: LACP - Change Settings 26 Figure 5-19: QoS - CoS Settings 27 Figure 5-20: QoS - Queue Settings 27 Figure 5-21: QoS - CoS to Queue 28 Figure 5-22: Security Tab - ACL 28 Figure 5-23: ACL - Add Access Profile 28 Figure 5-24: Security - 802.1x Users 29 Figure 5-25: Security - 802.1x Port Configuration 29 Figure 5-26: 802.1x Port Configuration - Change Settings 30 Figure 5-27: Security - Management Configuration 31 Figure 5-28: Security - RADIUS Server 31
Figure 5-29: RADIUS Server - Change Settings 32 Figure 5-30: Security - TACACS Server 33 Figure 5-31: TACACS Server - Change Settings 33 Figure 5-32: Security - Storm Control 34 Figure 5-33: Security - Authenticated Users 35 Figure 5-34: Security - System Password 35 Figure 5-35: SNTP - Global Settings 35 Figure 5-36: SNTP - Authentication 36 Figure 5-37: Authentication - Modify Settings 36 Figure 5-38: SNTP - Servers 37 Figure 5-39: Servers - Change Settings 38 Figure 5-40: SNTP - Interface Settings 38 Figure 5-41: Interface Settings - Change Settings 38 Figure 5-42: Statistics - Interface Statistics 39 Figure 5-43: Statistics - Etherlike Statistics 40 Figure 5-44: Statistics - RMON Statistics 41 Figure 5-45: Statistics - RMON History Control 42 Figure 5-46: RMON History Control - Add Entry 42 Figure 5-47: Statistics - RMON History Log 43 Figure 5-48: Statistics - RMON Alarms 44 Figure 5-49: RMON Alarms - Add Entry 45 Figure 5-50: Statistics - RMON Events Control 45 Figure 5-51: RMON Events Control - Add Entry 46 Figure 5-52: Statistics - RMON Events Log 46 Figure 5-53: Statistics - EAP Statistics 47 Figure 5-54: Logs - Message Log 47 Figure 5-55: Logs - Event Log 48 Figure 5-56: Logs - Global Parameters 48 Figure 5-57: Maintenance - Telnet 49 Figure 5-58: Maintenance - Reset 49
Figure 5-59: Maintenance - File Download 49 Figure 5-60: File Download - Configuration Download 50 Figure 5-61: Maintenance - File Upload 50 Figure 5-62: File Upload - Configuration Upload 51 Figure 5-63: Maintenance - Restore Defaults 51 Figure 5-64: Maintenance - Integrated Cable Test 51 Figure 5-65: Integrated Cable Test - Perform Test 52 Figure 5-66: Maintenance - HTTP File Download 52 Figure 5-67: Help - System Description 52

Chapter 1: Introduction

Welcome
Thank you for choosing the 16- or 24-Port 10/100/1000 Gigabit Switch with WebView. This Switch will allow you to network better than ever.
This new Linksys rackmount switch delivers non-blocking, wire speed switching for your 10, 100, and 1000Mbps network clients, plus multiple options for connecting to your network backbone. 16 or 24, 10/100/1000 ports wire up your workstations or connect to other switches and the backbone. And the mini-GBIC ports allow future expansion to alternate transmission media, such as fiber optic cabling.
The Switch features WebView monitoring and configuration via your web browser , making it easy to manage your VLANs and trunking groups. Or if you prefer, you can use the Switch’s console interface to configure the Switch.
Use the instructions in this User Guide to help you connect the Switch, set it up, and configure it to bridge your different networks. These instructions should be all you need to get the most out of the 16- or 24-Port 10/100/1000 Gigabit Switch with WebView.
Chapter 1: Introduction Welcome
1
What’s in this User Guide?
This user guide covers the steps for setting up and using the Switch.
• Chapter 1: Introduction This chapter describes the Switch’s applications and this User Guide.
• Chapter 2: Getting to Know the Switch This chapter describes the physical features of the Switch.
• Chapter 3: Connecting the Switch This chapter explains how to install and connect the Switch.
• Chapter 4: Using the Console Interface for Configuration This chapter instructs you on how to use the Switch’s console interface when you configure the Switch.
• Chapter 5: Using the Web-based Utility for Configuration This chapter shows you how to configure the Switch using the Web-based Utility.
• Appendix A: About Gigabit Ethernet and Fiber Optic Cabling This appendix gives a general description of Gigabit Ethernet and fiber optic cabling.
• Appendix B: Windows Help This appendix describes how you can use Windows Help for instructions about networking, such as installing the TCP/IP protocol.
• Appendix C: Glossary This appendix gives a brief glossary of terms frequently used in networking.
• Appendix D: Specifications This appendix provides the Switch’s technical specifications.
• Appendix E: Warranty Information This appendix supplies the Switch’s warranty information.
• Appendix F: Regulatory Information This appendix supplies the Switch’s regulatory information.
• Appendix G: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support.
Chapter 1: Introduction What’s in this User Guide?
2

Chapter 2: Getting to Know the Switch

Overview
The 16- and 24-Port Switches differ in number of LEDs and ports. Pictured in this chapter is the 16-Port Switch; however, the other Switch is similar in form and function.
The Front Panel
The Switch's LEDs and ports are located on the front panel.
Figure 2-1: Front Panel of the 16-Port Switch
LEDs
SYSTEM Green. The SYSTEM LED lights up to indicate that the Switch is powered on. Link/Act Green. The Link/Act LED lights up to indicate a functional network link through the
corresponding port (1 through 16 or 1 through 24) with an attached device. It flashes to indicate that the Switch is actively sending or receiving data over that port.
Gigabit Orange. The Gigabit LED lights up to indicate a Gigabit connection on the corresponding
port (1 through 16 or 1 through 24).
Ports
1-24 The Switch is equipped with 16 or 24 auto-sensing, Ethernet network ports, which use RJ-
45 connectors. These ports support network speeds of 10Mbps, 100Mbps, and 1000Mbps. They can operate in half and full-duplex modes. Auto-sensing technology enables each port to automatically detect the speed of the device connected to it (10Mbps, 100Mbps, or 1000Mbps), and adjust its speed and duplex accordingly.
Chapter 2: Getting to Know the Switch Overview
3
For the 16-Port Switch, ports 8 and 16 are shared with miniGBIC1 and miniGBIC2, respectively. For the 24-Port Switch, ports 12 and 24 are shared with miniGBIC1 and miniGBIC2, respectively.
NOTE: If shared ports are both connected, then the miniGBIC port has priority.
miniGBIC1/2 The Switch provides two mini-GBIC ports. The mini-GBIC (gigabit interface converter) port
is a connection point for a mini-GBIC expansion module, so the Switch can be uplinked via fiber to another switch. Each mini-GBIC port provides a link to a high-speed network segment or individual workstation at speeds of up to 1000Mbps.
Use the Linksys MGBT1, MGBSX1, or MGBLH1 mini-GBIC modules with the Switch. The MGBSX1 and the MGBLH1 require fiber cabling with LC connectors, while the MGBT1 requires a Category 5e Ethernet cable with an RJ-45 connector.
Console The Console port is where you can connect a serial cable to a PC’s serial port for
configuration using your PC’s HyperTerminal program. Refer to “Chapter 4: Using the Console Interface for Configuration” for more information.
The Back Panel
The power port is located on the back panel of the Switch.
Figure 2-2: Back Panel of the 16-Port Switch
Power The Power port is where you will connect the power cord.
NOTE: If you need to reset the Switch, unplug the power cord from the back
of the Switch. Wait a few seconds and then reconnect it.
Chapter 2: Getting to Know the Switch The Back Panel
4

Chapter 3: Connecting the Switch

Overview
This chapter will explain how to connect network devices to the Switch. For an example of a typical network configuration, see the application diagram shown below.
Figure 3-1: Typical Network Configuration for the 16-Port Switch
When you connect your network devices, make sure you don’t exceed the maximum cabling distances, which are listed in the following table:
Table 1: Maximum Cabling Distances
From To Maximum Distance
Switch Switch or Hub* 100 meters (328 feet) Hub Hub 5 meters (16.4 feet) Switch or Hub Computer 100 meters (328 feet)
*A hub refers to any type of 100Mbps hub, including regular hubs and stackable hubs. A 10Mbps hub connected to another 10Mbps hub can span up to 100 meters (328 feet).
Chapter 3: Connecting the Switch Overview
5
Before You Install the Switch...
When you choose a location for the Switch, observe the following guidelines:
• Make sure that the Switch will be accessible and that the cables can be easily connected.
• Keep cabling away from sources of electrical noise, power lines, and fluorescent lighting fixtures.
• Position the Switch away from water and moisture sources.
• To ensure adequate air flow around the Switch, be sure to provide a minimum clearance of two inches (50 mm).
• Do not stack free-standing Switches more than four units high.
Placement Options
Before connecting cables to the Switch, first you will physically install the Switch. Either set the Switch on its four rubber feet for desktop placement or mount the Switch in a standard-sized, 19-inch wide, 1U high rack for rack­mount placement.
Desktop Placement
1. Attach the rubber feet to the recessed areas on the bottom of the Switch.
2. Place the Switch on a desktop near an AC power source.
3. Keep enough ventilation space for the Switch and check the environmental restrictions mentioned in the specifications.
4. Proceed to the section, “Connecting the Switch.”
Chapter 3: Connecting the Switch Before You Install the Switch...
6
Rack-Mount Placement
To mount the Switch in any standard-sized, 19-inch wide, 1U high rack, follow these instructions:
1. Place the Switch on a hard flat surface with the front panel facing you.
2. Attach a rack–mount bracket to one side of the Switch with the supplied screws. Then attach the other bracket to the other side.
3. Make sure the brackets are properly attached to the Switch.
4. Use the appropriate screws (not included) to securely attach the brackets to your rack.
5. Proceed to the section, “Connecting the Switch.”
Connecting the Switch
To connect network devices to the Switch, follow these instructions:
1. Make sure all the devices you will connect to the Switch are powered off.
2. For a 10/100Mbps devices, connect a Category 5 Ethernet network cable to one of the numbered ports on the Switch. For a 1000Mbps device, connect a Category 5e Ethernet network cable to one of the numbered ports on the Switch.
3. Connect the other end to a PC or other network device.
IMPORTANT: Make sure you use the screws supplied with the mounting brackets. Using the wrong screws could damage the Switch and would invalidate your warranty.
Figure 3-2: Attach the Brackets to the Switch
4. Repeat steps 2 and 3 to connect additional devices.
5. If you are using the mini-GBIC port, then connect the mini-GBIC module to the mini-GBIC port. For detailed instructions, refer to the module’s documentation.
6. If you will use the Switch’s console interface to configure the Switch, then connect the supplied serial cable to the Switch’s Console port, and tighten the captive retaining screws. Connect the other end to your PC’s serial port. (This PC must be running the VT100 terminal emulation software, such as HyperTerminal.)
7. Connect the supplied power cord to the Switch’s power port, and plug the other end into an electrical outlet.
IMPORTANT: Make sure you use the power cord that is supplied with the Switch. Use of a different power cord could damage the Switch.
Chapter 3: Connecting the Switch Connecting the Switch
Figure 3-3: Mount the Switch in the Rack
NOTE: If you need to reset the Switch, unplug the
power cord from the back of the Switch. Wait a few seconds and then reconnect it.
7
8. Power on the network devices connected to the Switch. Each active port’s corresponding Link/Act LED will light up on the Switch. If a port has an active Gigabit connection, then its corresponding Gigabit LED will also light up.
If you will use the Switch’s console interface to configure the Switch, proceed to “Chapter 4: Using the Console
Interface for Configuration” for directions.
If you will use the Switch’s Web-based Utility to configure the Switch, proceed to “Chapter 5: Using the Web-
based Utility for Configuration.”
Chapter 3: Connecting the Switch Connecting the Switch
8

Chapter 4: Using the Console Interface for Configuration

Overview
The Switch features a menu-driven console interface for basic configuration of the Switch and management of your network. Before you can use the console interface, you will need to configure the HyperTerminal application on your PC.
Configuring the HyperTerminal Application
1. Click the Start button. Select Programs and then Accessories. Select Communications. HyperTerminal should be one of the options listed in this menu. Select HyperTerminal.
2. On the Connection Description screen, enter a name for this connection. In the example, the name of connection is SRW2016. Select an icon for the application. Then click OK.
3. On the Connect To screen, select a port to communicate with the Switch, COM1, COM2, or TCP/IP.
Figure 4-1: Finding HyperTerminal
Figure 4-2: Connection Description
Chapter 4: Using the Console Interface for Configuration Overview
Figure 4-3: Connect To
9
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
4. Set the serial port settings as follows: Bits per second: 38400 Data bits: 8 Parity: None Stop bits: 1 Flow control: None Then click OK.
Configuring the Switch through the Console Interface
The console screens consist of a series of menus. Each menu has several options, which are listed vertically. You select a menu option when you highlight it; pressing the Enter key activates the highlighted option.
T o navigate through the menus and actions of the console interface, use the up or down arrow keys to move up or down, and use the left or right arrow keys to move left or right. Use the Enter key to select a menu option, and use the Esc key to return to the previous selection. Menu options and any values entered or present will be highlighted. The bottom of the screen lists the actions available.
Figure 4-4: COM1 Properties
Switch Main Menu
The System Main Menu screen displays these choices:
1. System Configuration Information Menu
2. Port Status
3. Port Configuration
4. Help
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-5: Switch Main Menu
10
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
System Configuration Menu
On the System Configuration Menu screen, you have these choices:
1. System Information
2. Management Settings
3. IP Configuration
4. File Management
5. Restore System Default Settings
6. Reboot System
0. Back to main menu
System Information
Using this screen, you can check the Switch’s firmware versions and general system information.
Figure 4-6: System Configuration Menu
Versions The Versions screen displays the Switch’s boot, software, and hardware firmware versions.
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-7: System Information
Figure 4-8: Versions
11
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
General System Information The General System Information screen displays the Switch’s description, System Up Time , System MAC Address,
System Contact, System Name, and System Location. Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu,
and select Save to save your changes.
Management Settings
You have a choice of Serial Port Configuration or Telnet Configuration.
Serial Port Configuration On the Serial Port Configuration screen, the Switch’s baud rate is displayed. Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu,
and select Save to save your changes.
Figure 4-9: General System Information
Figure 4-10: Management Settings
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-11: Serial Port Configuration
12
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
Telnet Configuration On the Telnet Configuration screen, the time-out is displayed. Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu,
and select Save to save your changes.
IP Configuration
The IP Configuration screen displays these choices: the Switch’s IP Address Settings, HTTP, and Network Configuration.
Figure 4-12: Telnet Configuration
IP Address Configuration The Switch’s IP information is displayed here. IP Address. The IP Address of the Switch is displayed. (The default IP address is 192.168.1.254.) Verify that the
address you enter is correct and does not conflict with another device on the network.
Subnet Mask. The subnet mask of the Switch is displayed. Default Gateway. The IP address of your network’s default gateway is displayed. Management VLAN. The VLAN ID number is displayed. DHCP client. The status of the DHCP client is displayed. If you want the Switch to be a DHCP client, then select
ENABLE. If you want to assign an static IP address to the Switch, then enter the IP settings and select DISABLE.
Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu, and select Save to save your changes.
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-13: IP Configuration
Figure 4-14: IP Address Configuration
13
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
HTTP The HTTP screen displays the status and port number of the HTTP Server. Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu,
and select Save to save your changes.
Figure 4-15: HTTP
Network Configuration The Network Configuration screen offers a choice of two tests, Ping and TraceRoute.
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-16: Network Configuration
14
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
Ping The Ping screen displays the IP address of the location you want to contact. Select Edit to change the IP address, and select Execute to begin the ping test. After the ping test is complete, the Ping screen displays the IP address, status, and statistics of the ping test.
Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu, and select Save to save your changes.
Figure 4-17: Ping
TraceRoute The TraceRoute screen displays the IP address of the address whose route you want to trace. Select Edit to change the IP address, and select Execute to begin the traceroute test. After the traceroute test is complete, the TraceRoute screen displays the IP address, status, and statistics of the
traceroute test. Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu,
and select Save to save your changes.
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-18: Ping Test Results
Figure 4-19: TraceRoute
15
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
File Management
The File Management screen allows you to upload or download files, such as the startup configuration, boot, or image file, using a TFTP server.
Select Edit to change the settings. When your changes are complete, press the Esc key to return to the Action menu, and select Execute to upload or download the designated file. After you download a file to the Switch, it may need to be rebooted.
Restore System Default Settings
T o restore the Switch back to the factory default settings, select Restor e System Default Settings and press the Enter key. You will be asked if you want to continue. Press the y key to restore the Switch’s default settings, or press the n key to cancel.
Reboot System
Select Reboot System and press the Enter key if you want to restart the Switch. You will be asked if you want to continue. Press the y key to reboot the Switch, or press the n key to cancel. After the Switch has rebooted, the Switch Main Menu screen will appear.
Figure 4-20: TraceRoute Test Results
Figure 4-21: File Management
Back to main menu Select Back to main menu and press the Enter key if you want to return to the Switch Main Menu screen.
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-22: System Configuration Menu
16
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
Port Status
On the Switch Main Menu screen, select Port Status and press the Enter key if you want to view the status information for the Switch’s ports.
The Port Status screen displays the port numbers, their status, Link status, speed and duplex mode, and status of flow control, which is the flow of packet transmissions.
If you want to change any settings for a port, you must use the Port Configuration screen.
Port Configuration
On the Switch Main Menu screen, select Port Configuration and press the Enter key if you want to configure the Switch’s ports.
The Port Configuration screen displays the port numbers, their status, auto-negotiation status, speed and duplex mode, and status of flow control, which is the flow of packet transmissions.
Select Edit to make changes. When your changes are complete, press the Esc key to return to the Action menu, and select Save to save your changes.
Figure 4-23: Port Status
Help
Select Help and press the Enter key if you want to view the help information. This screen explains how to navigate the various screens of the console interface.
Chapter 4: Using the Console Interface for Configuration Configuring the Switch through the Console Interface
Figure 4-24: Port Configuration
Figure 4-25: Help
17

Chapter 5: Using the Web-based Utility for Configuration

Overview
This chapter describes the Web-based Utilities for the 16- and 24-Port Switches, which are identical except for two screens. The Utility for the 24-Port Switch includes two additional webpages, the Security - Management Configuration screen, as well as the Security - TACACS (Terminal Access Controller Access Control System) screen.
Accessing the Web-based Utility
Open your web browser and enter 192.168.1.254 into the Address field. Press the Enter key and the login screen will appear. The first time you open the Web-based Utility, enter admin in the User Name field, and leave the Password field blank. Click the OK button. You can set a password later from the System Password screen.
The first screen that appears is the System Description screen. This allows you to access six main tabs: Sys. Info. (System Information), IP Conf. (Configuration), Switch Conf. (Configuration), QoS (Quality of Service), Security, SNTP (Simple Network Time Protocol), Statistics, Logs, Maintenance, and Help. Click one of the main tabs to view additional tabs.
At the top of each screen is a picture of the 16- or 24-Port Switch. The LEDs display status information about their corresponding ports. A green LED indicates a connection, while a blue LED indicates no connection. When you click a port’s LED, the statistics for that port are displayed.
Figure 5-1: Login Screen
NOTE: The LEDs displayed in the Web-based Utility are not the same as the LEDs on the front panel
of the Switch. The front panel LEDs display different status information, which is described in “Chapter 2: Getting to Know the Switch.”
Sys. Info. (System Information) Tab - System Description
The System Description screen lets you enter general information about the Switch.
Model Name. This is the model number and name of the Switch. System Name. Enter a name for the Switch. System Location. Describe the location of the Switch.
Chapter 5: Using the Web-based Utility for Configuration Overview
Figure 5-2: System Information - System Description
18
System Contact. Enter the name of the contact person for this Switch. System up time. This displays the amount of time that has elapsed since the Switch was last reset. IP Address. This is the IP address of the Switch. Base MAC Address. This is the MAC address of the Switch. Hardw are Version. Displayed here is the version number of the Switch’s hardware. Software Version. Displayed here is the version number of the Switch’s software. Click the Submit button to save your changes.
Sys. Info. (System Information) Tab - System Mode
The System Mode screen allows you to enable or disable the Jumbo Frames feature. Jumbo Frames enable the travel of identical data in fewer frames; this promotes faster data transmissions.
Jumbo Frames. If you want to enable this feature on the Switch, select Enabled. You will be notified that this feature will be enabled after the Switch is reset. Otherwise, select Disabled.
Click the Submit button to save your changes.
Figure 5-3: System Information - System Mode
Sys. Info. (System Information) Tab - Forwarding Database
The Forwarding Database screen lets you define the aging interval of the Switch. Aging Interval. This specifies the aging out period on the Forwarding Database. Click the Submit button to save your changes. A table of VLAN (Virtual Local Area Network) entries is listed.
VLAN ID. Displayed here is the ID number of the VLAN for this entry. MAC Address. This is the MAC address of the entry. Port. This is the port number for this entry. ifIndex. This is the interface for this entry.
Chapter 5: Using the Web-based Utility for Configuration Sys. Info. (System Information) Tab - System Mode
Figure 5-4: System Information - Forwarding Database
19
16- or 24-Port 10/100/1000 Gigabit Switch with WebView
Status. This indicates how the entry was created, Dynamic (dynamically learned) or Static (statically configured).
When you click the paper and pencil icon, you can add a forwarding interface by configuring these settings:
Interface. Select the appropriate interface, either a port number or LAG (Link Aggregation Group) number. MAC Address. Enter the MAC address for this entry. VLAN ID. If you want to use a VLAN ID, then select the radio button and enter the ID number of the VLAN. VLAN Name. If you want to use a VLAN Name, select the radio button and then enter a name here. Status. Select the status of your entry, Permanent, Delete On Reset, or Delete On Time Out. Click the Submit button to save your changes.
Sys. Info. (System Information) Tab - Time Synchronization
The Time Synchronization screen allows you to configure the time settings for the Switch.
Clock Source. If you want to set the system clock via an SNTP (Simple Network Time Protocol) server , then select SNTP. Otherwise, select None.
Local Settings
Figure 5-5: Forwarding Database - Add Entry
Date. Specify the system date here. Local Time. Specify the system time here. Time Zone Offset. Enter the difference between Greenwich Mean Time (GMT) and local time. Daylight Saving. Select Daylight Saving to enable it on the Switch. If the Switch should use US daylight
savings, then select USA. If the Switch should use EU daylight savings, then select European. If it should use another kind of daylight savings, then select Other and complete the From and To fields.
Time Set Offset. For non-US and European countries, specify the amount of time for daylight savings. The default is 60 minutes.
From. If you selected Other for the Daylight Saving setting, then enter the date and time when daylight savings begins.
To. If you selected Other for the Daylight Saving setting, then enter the date and time when daylight savings ends.
Chapter 5: Using the Web-based Utility for Configuration Sys. Info. (System Information) Tab - Time Synchronization
Figure 5-6: System Information - Time Synchronization
20
Recurring. If you selected Other for the Daylight Saving setting and daylight savings has the same start and end dates and times every year, then select Recurring.
From. If you selected Recurring, then enter the date and time when daylight savings begins. To. If you selected Recurring, then enter the date and time when daylight savings ends. Click the Submit button to save your changes.
IP Conf. (Configuration) Tab - IP Addr. (Address)
The IP Address screen allows you to assign DHCP or static IP settings to interfaces and assign default gateways. DHCP Interface. If you are using the DHCP Interface, then select the radio button and specify the VLAN on which
the DHCP IP address is configured.
Host Name. Enter the DHCP Host Name here. Static Address. If you are using a static IP address, then select the radio button and enter the IP settings. IP Address. Enter the interface IP address. Mask. Enter the subnet mask of the currently configured IP address. Default Gateway. Enter the IP address of the Default Gateway. Current Management Interface. Specify the interface used to manage the Default Gateway. Click the Submit button to save your changes.
Switch Conf. (Configuration) Tab - Interface Conf. (Configuration)
The Interface Configuration screen shows you the port settings for the Switch.
Interface#. This is the port number. Name. This is the device port ID. Port Type. This is the port type. Port Status. Displayed here is the status of the port.
Chapter 5: Using the Web-based Utility for Configuration IP Conf. (Configuration) Tab - IP Addr. (Address)
Figure 5-7: IP Configuration - IP Address
Figure 5-8: Switch Configuration - Interface Configuration
21
Port Speed. Displayed here is the configured rate for the port. The speed can be configured only when auto-
negotiation is disabled on that port. Duplex Mode. This is the port duplex mode, Full (transmission occurs in both directions simultaneously) or Half
(transmission occurs in only one direction at a time). This mode can be configured only when auto-negotiation is disabled and port speed is set to 10Mbps or 100Mbps. It cannot be configured on Link Aggregation Groups (LAGs).
Auto Negotiation. This is the status of the port’s Auto Negotiation feature. Back Pressure. Displayed here is the status of the port’s Back Pressure mode, which is used with Half Duplex
Mode to disable ports from receiving messages. This mode is used for ports in Half Duplex Mode or on LAGs.
Flow Control. This is the flow control status of the port. It is active when the port uses Full Duplex Mode. MDI/MDIX. This is the MDI/MDIX status of the port. The Auto setting is used when you want the port to
automatically detect the cable type. The MDI setting is used if the port is connected to an end station. The MDIX setting is used if the port is connected to a hub or another switch.
LAG. This indicates if the port is part of a LAG. Storm Control. When enabled, the Storm Control setting prevents an excessive number of broadcast and
multicast messages. PVE. When a port is a Private VLAN Edge (PVE) port, it bypasses the Forwarding Database and forwards all
unicast, multicast, and broadcast traffic to an uplink, except for MAC-to-me packets. Uplinks can be ports or LAGs.
If you want to reset a port’s settings to its defaults, select a port by clicking its radio button. Then click the Reset the settings of Selected Port to default button.
If you want to modify a port’s changes, select a port by clicking its radio button. Then click the Modify the settings of Selected Port button.
On the new screen that appears, you can change the port’s settings. (Some settings may not be available, depending on the other settings you have configured for the port.)
Interface. This is the port number. Description. Enter a description for this port. Port Type. This is the port type.
Chapter 5: Using the Web-based Utility for Configuration Switch Conf. (Configuration) Tab - Interface Conf. (Configuration)
Figure 5-9: Interface Configuration - Change Settings
22
Admin Status. Change the status of the port here. Current Port Status. Displayed here is the status of the port. Reactivate Suspended Port. If you want to reactivate a port that has been suspended, click the checkbox. Operational Status. This indicates whether or not the port is active. Admin Speed. Change the speed of the port here. Current Port Speed. Displayed here is the current speed of the port. Admin Duplex. Change the duplex mode here. Current Duplex Mode. This is the duplex mode of the port. Auto Negotiation. You can enable or disable the port’s Auto Negotiation feature. Current Auto Negotiation. This is the current setting of the port’s Auto Negotiation feature. Back Pressure. You can enable or disable the port’s Back Pressure feature. Current Back Pressure. Displayed here is the status of the port’s Back Pressure mode. Flow Control. You can enable or disable the port’s Flow Control feature. Current Flow Control. This is the flow control status of the port. MDI/MDIX. Select the Auto setting if you want the port to automatically detect the cable type. Select MDI if the
port is connected to an end station. Select MDIX if the port is connected to a hub or another switch. Current MDI/MDIX. This is the current MDI/MDIX status of the port. LA. This indicates if the port is part of a LAG. Storm Control. You can enable or disable the port’s Storm Control setting. PVE. You can enable a port to be a Private VLAN Edge (PVE) port if you want it to bypass the Forwarding Database
and forward all unicast, multicast, and broadcast traffic to an uplink, except for MAC-to-me packets. Click the Submit button to save your changes.
Chapter 5: Using the Web-based Utility for Configuration Switch Conf. (Configuration) Tab - Interface Conf. (Configuration)
23
Switch Conf. (Configuration) Tab - VLAN
The VLAN screen lets you create subgroups of a LAN (Local Area Network) using software. The VLAN groups are listed on this screen.
VLAN ID. This displays the VLAN ID number. VLAN Name. This displays the name of the VLAN. Type. Displayed here is the VLAN type, Dynamic (dynamically created), Static (created by user), or Default (the
Switch has one default VLAN). Member/Tagging. Each port is described as included in or excluded from the VLAN, as well as tagged (identified)
or untagged as a specific member of a VLAN. (VLAN tagging adds a tag to packet headers.) If you want to delete a current VLAN, then select the VLAN’s X icon and click the Submit button. To create a VLAN, click the paper and pencil icon. To modify a VLAN, click the VLAN’s pencil icon. On the new
screen that appears, you can modify the VLAN.
VLAN ID. Complete the VLAN ID field. VLAN Name. Complete the VLAN Name field. Member (Include/Exclude). For each port or LAG, click the Include radio button to select it as a member of the
VLAN. The default is Exclude. Tagging (Tagged/Untagged). For each port or LAG, click the Tagged radio button to enable VLAN tagging, or
click the Untagged radio button to disable VLAN tagging. Click the Submit button to save your changes.
Switch Conf. (Configuration) Tab - VLAN Port
Figure 5-10: Switch Configuration - VLAN
Figure 5-11: VLAN - Add VLAN
The VLAN Port screen allows you to manage ports that are part of a VLAN.
Port. Displayed here is the port’s physical address. PVID. Displayed here is the VLAN ID to untagged packets. Acceptable Frame Type. Displayed here is the packet type accepted on the port, Admit All (all packets are
accepted) or VLAN Only (only VLAN packets are accepted).
Chapter 5: Using the Web-based Utility for Configuration Switch Conf. (Configuration) Tab - VLAN
Figure 5-12: Switch Configuration - VLAN Port
24
To change a VLAN port’s settings, click the port number. On the new screen that appears, you can modify the settings.
Port. Displayed here is the port’s physical address. Port VLAN Mode. Select Access or Trunk from the drop-down menu. Port VLAN ID. If available, complete the Port VLAN ID field. Acceptable Frame Types. If available, select Admit All or VLAN Only from the drop-down menu. Click the Submit button to save your changes.
Switch Conf. (Configuration) Tab - LA Conf. (Configuration)
The Switch supports up to eight Link Aggregated Groups (LAGs), which maximize port usage by linking a group of ports together to form a single group. LAGs multiply the bandwidth between the network devices, increase port flexibility, and provide link redundancy. The Switch’s LAGs are listed on the LA Configuration screen, which also allows you to modify them.
LAG Port. This displays the LAG number.
Figure 5-13: VLAN Port - Change Settings
Name. This is the port name. Link State. Displayed here is the status of the link. Member. This shows the ports configured to the LAG.
If you want to delete a current LAG, then select the LAG’s X icon and click the Submit button. To modify a LAG, click the LAG’s pencil icon. On the new screen that appears, you can modify the LAG.
LAG Port. This displays the LAG number. LAG Name. Complete the LAG Name field. Port. Select the ports you want to include in this LAG. LACP. Select the ports for which you want to enable the use of Link Aggregation Control Protocol (LACP). Click the Submit button to save your changes.
Chapter 5: Using the Web-based Utility for Configuration Switch Conf. (Configuration) Tab - LA Conf. (Configuration)
Figure 5-14: Switch Configuration - LA Configuration
Figure 5-15: LA Configuration - Change Settings
25
Switch Conf. (Configuration) Tab - Port Mirroring
The Port Mirroring screen lets you configure the Switch’s port mirroring settings. Port mirroring can be used for diagnostics or debugging. It forwards copies of incoming and outgoing packets from one port to a monitoring port.
Ports to be Mirrored. Select the port number from which port traffic is mirrored. Probe Port. Select the port number to which port traffic is copied. Mode. Select the appropriate port mode configuration, RxOnly (receiving only), TxOnly (transmitting only), or
Both (receiving and transmitting).
Click the Submit button to save your changes. Your port mirroring sessions are listed in a table.
Probe Port. This is the port number to which port traffic is copied. Port To Be Mirrored. This is the port number from which port traffic is mirrored. Copy Direction. This displays the traffic direction(s) being monitored. Remove. If you want to delete a port mirroring session, click its Remove checkbox and the Remove button.
Figure 5-16: Switch Configuration - Po rt Mirroring
Switch Conf. (Configuration) Tab - LACP
The LACP screen allows you to enable the use of the Link Aggregation Control Protocol (LACP) on relevant links for LAGs. Listed on this screen are the LACP LAGs.
Port. This is the port number using LACP. Port Priority. This is the LACP priority value for the port. LACP Timeout. This is the administrative LACP timeout period, Short or Long.
Click the pencil icon to modify settings for a port. A new screen will appear, displaying the available LACP settings.
Global Parameters LACP System Priority. Select the LACP priority value for the system.
Chapter 5: Using the Web-based Utility for Configuration Switch Conf. (Configuration) Tab - Port Mirroring
Figure 5-17: Switch Configuration - LACP
Figure 5-18: LACP - Change Settings
26
Port Parameters
Port. Select the port you want. LACP Port Priority. Select the LACP priority value for the port. LACP Timeout. Select the LACP timeout period for this port, Short or Long. Click the Submit button to save your changes.
QoS Tab - CoS Settings
Quality of Service (QoS) allows you to implement priority queuing within a network, so different types of traffic are assigned different priority queues. Class of Service (CoS) services are then assigned to the queues, using one of two methods, Strict Priority, for which time-sensitive applications are forwarded using the quickest path, or Weighted Round Robin (WRR), for which no single application dominates the forwarding capacity.
The CoS Settings screen lets you enable or disable CoS for various ports.
CoS Mode. This indicates whether CoS is enabled or disabled for the Switch. Interface. This indicates the interface to be configured. Default CoS. This defines the default CoS queue for incoming untagged packets. Restore Defaults. To reset a port to its default value, select this checkbox. Click the Submit button to save your changes.
QoS Tab - Queue Settings
The Queue Settings screen lets you select the CoS method and assign bandwidth values for your queues. Queue. This is the queue number. Scheduling
Strict Priority. If you want traffic scheduling to be based on queue priority, then click this radio button. WRR. If you want to assign a WRR weight to a queue, then click this radio button. WRR Weight. If a queue uses WRR, then enter the WRR weight in this field.
Chapter 5: Using the Web-based Utility for Configuration QoS Tab - CoS Settings
Figure 5-19: QoS - CoS Settings
Figure 5-20: QoS - Queue Settings
27
% of WRR Bandwidth. This is the percentage of bandwidth used by WRR. This automatically changes if you
change the WRR Weight for a queue. Click the Submit button to save your changes.
QoS Tab - CoS to Queue
The CoS to Queue screen lets you assign CoS settings to traffic queues.
Class of Service. This specifies the CoS priority tag values (0 is the lowest and 7 is the highest). Queue. This indicates the traffic forwarding queue to which the CoS priority is mapped. You can designate up to
four traffic priority queues. Restore Defaults. To restore the factory defaults for mapping CoS values to a forwarding queue, click this
checkbox. Click the Submit button to save your changes.
Security Tab - ACL
The ACL screen lists the access profiles and allows you to configure access profiles for the Switch.
Figure 5-21: QoS - CoS to Queue
Access Profile. This is the name of the access profile. Activated. You can activate an access profile by selecting the radio button. You can deactivate an access profile
by deselecting the radio button. If you want to delete a current access profile, then select the access profile’s X icon and click the Submit button. T o create an access profile, click the paper and pencil icon. To modify an access profile, click the access profile’s
pencil icon. On the new screen that appears, you can modify the access profile.
Access Profile Name. This is the name of the access profile. Rule Priority. This is the rule priority. When a packet is matched to a rule, user groups are granted permission or
denied access.
Management Method. This is the method for which the access profile is defined. Interface. This indicates the interface type to which the rule applies.
Chapter 5: Using the Web-based Utility for Configuration QoS Tab - CoS to Queue
Figure 5-22: Security Tab - ACL
Figure 5-23: ACL - Add Access Profile
28
Source IP Address. This is the interface source IP address to which the rule applies. Network Mask. This is the IP subnetwork mask (or subnet mask). Prefix Length. This is the number of bits that comprise the source IP address prefix or network mask of the
source IP address. Action. This indicates whether to permit or deny management access per device. Click the Submit button to save your changes.
Security Tab - 802.1x Users
The 802.1x Users screen allows you to enable port-based authentication and specify the authentication method you want to use.
Port Based Network Access Control. Enable or disable port-based network access on the Switch. Authentication Method. Select the authentication method you want to use, RADIUS, None; RADIUS; or None.
For the RADIUS, None method, port authentication is performed first via RADIUS (Remote Authentication Dial In User Service). If the RADIUS server cannot be reached, then no authentication method is used. However, if a failure occurs, the port remains unauthorized and access is not granted. If you want the authentication to occur at the RADIUS server, select RADIUS. If you do not want to use an authentication method, then select None.
Figure 5-24: Security - 802.1x Users
Click the Submit button to save your changes.
Security Tab - 802.1x Port Conf. (Configuration)
The 802.1x Port Configuration screen lists the Switch’s 802.1x ports and allows you to configure the authentication settings per port. This authentication method uses a RADIUS server and the Extensible Authentication Protocol (EAP).
Port Access Entity. This is the port name. Controlled Port Control. This is the state of the port authorization. Traffic is forwarded if the state is
forceAuthorized. Traffic is discarded if the state is forceUnauthorized. If the state is Auto, then that means the controlled port state is set by the authentication method.
Quiet Period. This is the number of seconds the Switch remains in the quiet state after an authentication exchange has failed.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - 802.1x Users
Figure 5-25: Security - 802.1x Port Configuration
29
TX Period. This is the number of seconds the Switch waits for a response to an EAP request/identity frame,
before resending the request. Supplicant Timeout. This is the number of seconds that the Switch waits before EAP requests are resent to the
client. Server Timeout. This is the number of seconds that the Switch waits before it resends a request to the RADIUS
server. Max Request. This is the total number of EAP requests sent. If a response is not received in time, the
authentication process is restarted. Reauthentication Period. This is the number of seconds that the Switch waits before initiating the
reauthentication process. Reauthentication Enabled. True indicates that reauthentication is automatic, while false indicates that
reauthentication is manual. To modify the settings for an 802.1x port, click the port’s pencil icon. On the new screen that appears, you can
modify the port settings.
Port Access Entity. This is the port name. Controlled Port Control. Select forceAuthorized if you want traffic to be forwarded. Select forceUnauthorized
if you want traffic to be discarded. Select Auto if you want the controlled port state set by the authentication method.
Quiet Period. Enter the number of seconds the Switch remains in the quiet state after an authentication exchange has failed.
TX Period. Enter the number of seconds the Switch waits for a response to an EAP request/identity frame, before resending the request.
Supplicant Timeout. Enter the number of seconds that the Switch waits before EAP requests are resent to the client.
Server Timeout. Enter the number of seconds that the Switch waits before it resends a request to the RADIUS server.
Max Request. Enter the total number of EAP requests sent. If a response is not received in time, the authentication process is restarted.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - 802.1x Port Conf. (Configuration)
Figure 5-26: 802.1x Port Configuration - Change Settings
30
Reauthentication Period. Enter the number of seconds that the Switch waits before initiating the
reauthentication process. Reauthentication Enabled. If you want reauthentication to proceed automatically, then select true. Otherwise,
select false. Click the Submit button to save your changes.
Security Tab - Management Conf. (Configuration)
Available only for the 24-Port Switch, the Management Configuration screen allows you to assign authentication profiles to management methods.
HTTP Optional Methods. The choices are None, Local, RADIUS, and TACACS+. None indicates that no authentication method is used. Local indicates that authentication occurs locally, using a username and password. RADIUS uses authentication via a RADIUS server. TACACS+ uses authentication via a TACACS+ server.
Selected Methods. To select a method, select a method in the HTTP Optional Methods column. Then click the right arrow button. To deselect a method, select a method in the Selected Methods column. Then click the left arrow button.
Click the Submit button to save your changes.
Figure 5-27: Security - Management Configuration
Security Tab - RADIUS Server
The RADIUS Server screen lists the RADIUS servers used for authentication. You can use this screen to access a server’s settings.
IP Address. This is the IP address of the RADIUS server. Priority. This is the server priority, which is used to configure the server query order. Authentication Port. This is the authentication port used to verify the RADIUS server authentication. Number of Retries. This is the number of requests sent to the RADIUS server before a failure occurs. Timeout for Reply. This is the number of seconds the Switc h waits for an answer from the RADIUS server before
retrying the query or switching to the next server. Dead Time. This is the number of minutes that a RADIUS server is bypassed for service requests.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - Management Conf. (Configuration)
Figure 5-28: Security - RADIUS Server
31
Source IP Address. This is the source IP address used for communication with the RADIUS server. Usage Type. This is the RADIUS server authentication. Log in indicates that the RADIUS server is used for
authentication of usernames and passwords, while 802.1x indicates that the RADIUS server is used for 802.1x authentication. All indicates that the RADIUS server is used for authentication of usernames and passwords, as well as 802.1x authentication.
To add a RADIUS server, click the paper and pencil icon. On the new screen that appears, you can configure its settings. To modify the settings of a RADIUS server, click the server’s pencil icon. On the new screen that appears, you can modify its settings.
IP Address. Enter the IP address of the RADIUS server. Priority. Enter the server priority. Authentication Port. Enter the number of the authentication port. Number of Retries. Enter the number of retries allowed before a failure occurs. To use the default, click the Use
Default checkbox. Timeout for Reply. Enter the number of seconds the Switch waits for an answer from the RADIUS server before
retrying the query or switching to the next server. To use the default, click the Use Default checkbox. Dead Time. Enter the number of minutes that a RADIUS server is bypassed for service requests. To use the
default, click the Use Default checkbox. Key String. Enter the pre-shared key in this field. To use the default, click the Use Default checkbox.
Figure 5-29: RADIUS Server - Change Settings
Source IP Address. Enter the source IP address used for communication with the RADIUS server. To use the default, click the Use Default checkbox.
Usage Type. This is the RADIUS server authentication. Select Log in if you want the RADIUS server used for
authentication of usernames and passwords. Select 802.1x if you want the RADIUS server used for 802.1x authentication. Select All if you want the RADIUS server used for authentication of usernames and passwords, as well as 802.1x authentication.
Default Parameters
Default Retries. Enter the number of retries allowed before a failure occurs. To use the default, click the Use Default checkbox.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - RADIUS Server
32
Default Timeout for Reply. Enter the default number of seconds the Switch waits for an answer from the RADIUS
server before retrying the query or switching to the next server.
Default Dead Time. Enter the default number of minutes that a RADIUS server is bypassed for service requests. Default Key String. Enter the default pre-shared key in this field. Source IP Address. Enter the default source IP address used for communication with the RADIUS server. Click the Submit button to save your changes.
Security Tab - TACACS Server
Available only for the 24-Port Switch, the TACACS Server screen lists the TACACS+ servers used for authentication. TACACS+ performs authentication via username and password, as well as authorization. You can use this screen to access a server’s settings.
Host IP Address. This is the IP address of the TACACS+ server. Priority. This is the order in which the TACACS+ servers are used. Source IP Address. This is the source IP address used for the session between the device and the TACACS+
server.
Figure 5-30: Security - TACACS Server
Authentication Port. This is the authentication port through which the TACACS+ session occurs. Timeout for Reply. This is the number of seconds allowed before the connection between the device and the
TACACS+ server times out. Single Connection. This indicates whether you want a single connection between the device and the TACACS+
server to stay open. Status. This is the connection status between the device and the TACACS+ server. To add a TACACS+ server, click the paper and pencil icon. On the new screen that appears, you can configure its
settings. To modify the settings of a TACACS+ server, click the server’s pencil icon. On the new screen that appears, you can modify its settings.
Host IP Address. Enter the IP address of the TACACS+ server. Priority. Enter the priority number of the TACACS+ server.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - TACACS Server
Figure 5-31: TACACS Server - Change Settings
33
Source IP Address. Enter the source IP address used for the session between the device and the TACACS+ server. To use the default, click the Use Default checkbox.
Key String. Enter the key used for authentication and encryption. This must match the key used on the T ACACS+ server. To use the default, click the Use Default checkbox.
Authentication Port. Enter the number of the port through which the TACACS+ session occurs. Timeout for Reply. Enter the number of seconds allowed before the connection between the device and the
TACACS+ server times out. Single Connection. If you click the checkbox, then a single connection between the device and the TACACS+
server stays open.
Number of Retries. Enter the number of retries allowed before a failure occurs. To use the default, click the Use Default checkbox.
Default Parameters Source IP Address. Enter the default source IP address used for the session between the device and the
TACACS+ server.
Key String. Enter the default key used for authentication and encryption. Timeout for Reply. Enter the default number of seconds the Switch waits for an answer from the RADIUS server
before retrying the query or switching to the next server. Click the Submit button to save your changes.
Security Tab - Storm Control
The Storm Control screen allows you to enable or disable Storm Control, which limits the number of multicast and broadcast frames accepted and forwarded by the Switch.
Count Multicast with Broadcast. If you enable this feature, then broadcast and multicast traffic is counted. If you disable this feature, then only broadcast traffic is counted.
Broadcast Rate Threshold. Enter the maximum rate at which broadcast packets are forwarded. Click the Submit button to save your changes.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - Storm Control
Figure 5-32: Security - Storm Control
34
Security Tab - Authenticated Users
The Authenticated Users screen shows the user port access lists.
User Name. Use this drop-down list to view the users who were authenticated and are permitted on each port. Port. This is the port number. Session Time. This is the number of seconds the user was logged on the port. Authentication Method. This is the authentication method used during the most recent session. Remote
indicates that the port is forceauthorized. None indicates that no authentication method was used. RADIUS indicates authentication by a RADIUS server.
MAC Address. Displayed here is the MAC address of the user.
Security Tab - System Password
The System Password screen lets you set a password for access to the Switch.
User Name. The User Name is automatically displayed. Password. Enter the system password for this user. Confirm Password. Enter the same system password in this field. Click the Submit button to save your changes.
SNTP Tab - Global Settings
The Global Settings screen lets you set the Simple Network Time Protocol (SNTP) settings. SNTP makes possible accurate time synchronization by a network SNTP server for network devices. Using SNTP, the Switch is synchronized with the rest of the network and set with the correct time.
Figure 5-33: Security - Authenticated Users
Figure 5-34: Security - System Password
Poll Interval. Enter the interval (in seconds) at which the SNTP server is polled for unicast information. Receive Broadcast Servers Updates. If enabled, the Switch listens to the SNTP servers for broadcast server
time information on selected interfaces. Receive Anycast Servers Updates. If enabled, the Switch polls the SNTP server for anycast server time
information.
Chapter 5: Using the Web-based Utility for Configuration Security Tab - Authenticated Users
Figure 5-35: SNTP - Global Settings
35
Receive Unicast Servers Updates. If enabled, the Switch polls the SNTP server for unicast server time
information. Poll Unicast Servers. If enabled, the Switch sends SNTP unicast forwarding information to the SNTP server. Click the Submit button to save your changes.
SNTP Tab - Authentication
The Authentication screen lists the keys used to authenticate the SNTP server. SNTP Authentication. Enable or disable authentication of an SNTP session between the Switch and an SNTP
server. Click the Submit button to save your change.
Encryption Key ID. Displayed here is the encryption key used to authenticate the SNTP server and Switch. Authentication Key. This is the key used for authentication. Trusted Key. This indicates if there is an encryption key used (unicast/anycast) or elected (broadcast) to
authenticate the SNTP server. To add an entry, click the paper and pencil icon. On the new screen that appears, you can configure its settings.
To modify the settings of an entry, click its pencil icon. On the new screen that appears, you can modify its settings.
Encryption Key ID. Enter the encryption key used to authenticate the SNTP server and Switch. Authentication Key. Enter the key used for authentication. Trusted Key. If there is an encryption key used (unicast/anycast) or elected (broadcast) to authenticate the SNTP
server, then click the checkbox. Click the Submit button to save your changes.
Figure 5-36: SNTP - Authentication
Figure 5-37: Authentication - Modify Settings
Chapter 5: Using the Web-based Utility for Configuration SNTP Tab - Authentication
36
SNTP Tab - Servers
On the Servers screen, you can see a list of servers and their settings. Unicast Server
Unicast Server. Displayed here is the IP address of the unicast server. Poll Interval. This is the interval (in seconds) at which the unicast server is polled for unicast information. Encryption Key ID. This is the encryption key used to authenticate the unicast server and Switch. Preference. This is the Switch’s preference for this particular unicast server. Status. Displayed here is the status of the unicast server. Last Response. This describes the last response of the unicast server. Offset. This is the difference between the Switch’s time zone and the server’s time zone. Delay. This shows how long it takes for data from the server to travel to the Switch.
Anycast Server
Figure 5-38: SNTP - Servers
Anycast Server. Displayed here is the IP address of the anycast server. Interface. This is the interface that the anycast server uses. Preference. This is the Switch’s preference for this particular anycast server. Status. Displayed here is the status of the anycast server. Last Response. This describes the last response of the anycast server. Offset. This is the difference between the Switch’s time zone and the server’s time zone. Delay. This shows how long it takes for data from the server to travel to the Switch.
Broadcast Server
Broadcast Server. Displayed here is the IP address of the broadcast server. Interface. This is the interface that the broadcast server uses.
Chapter 5: Using the Web-based Utility for Configuration SNTP Tab - Servers
37
Preference. This is the Switch’s preference for this particular broadcast server. Last Response. This describes the last response of the broadcast server.
To add an SNTP server, click the paper and pencil icon. On the new screen that appears, you can configure its settings. To modify the settings of an SNTP server, click its pencil icon. On the new screen that appears, you can modify its settings.
SNTP Server. Enter the IP address of an SNTP server. You can have up to eight SNTP servers. Poll Interval. Enable this feature if you want the Switch to poll the SNTP server for system time information. Encryption Key ID. Select the encryption key used to communicate between the SNTP server and Switch. Click the Submit button to save your changes.
SNTP Tab - Interface Settings
The Interface Settings screen shows the SNTP settings for different interfaces.
Interface. This shows the interface on which SNTP can be enabled, either a port, LAG, or VLAN. Receive Servers Updates. This shows whether or not updates are received.
To add an interface, click the paper and pencil icon. On the new screen that appears, you can configure its settings. To modify the settings of an interface, click its pencil icon. On the new screen that appears, you can modify its settings.
Interface. Select the appropriate interface, Port, LAG, or VLAN. Then select the appropriate number from the drop-down menu.
State. If you want the interface to receive updates, select Enable. Otherwise, select Disable. Click the Submit button to save your changes.
Figure 5-39: Servers - Change Settings
Figure 5-40: SNTP - Interface Settings
Figure 5-41: Interface Settings - Change Settings
Chapter 5: Using the Web-based Utility for Configuration SNTP Tab - Interface Settings
38
Statistics Tab - Interface Statistics
The Interface Statistics screen displays statistics for received and transmitted packets. Interface. Select the appropriate interface, Port, LAG, or VLAN. Then select the appropriate number from the
drop-down menu. Refresh Rate. Select how often you want the interface statistics refreshed. Receive Statistics
Total Bytes. This is the number of octets received on the selected interface. Unicast Packets. Displayed here is the number of unicast packets received on the selected interface. Multicast Packets. Displayed here is the number of multicast packets received on the selected interface. Broadcast Packets. Displayed here is the number of broadcast packets received on the selected interface. Packets with Errors. This is the number of error packets received from the selected interface.s
Transmit Statistics
Total Bytes. This is the number of octets transmitted from the selected interface. Unicast Packets. Displayed here is the number of unicast packets transmitted from the selected interface. Multicast Packets. Displayed here is the number of multicast packets transmitted from the selected interface. Broadcast Packets. Displayed here is the number of broadcast packets transmitted from the selected interface. Click the Clear All Counters button to reset all statistics to zero.
Figure 5-42: Statistics - Interface Statistics
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - Interface Statistics
39
Statistics Tab - Etherlike Statistics
The Etherlike Statistics screen displays interface statistics. Interface. Select the appropriate interface, Port, LAG, or VLAN. Then select the appropriate number from the
drop-down menu.
Refresh Rate. Select how often you want the interface statistics refreshed. Frame Check Sequence (FCS) Errors. Displayed here is the number of FCS errors received on the selected
interface. Single Collision Frames. Displayed here is the number of single collision frames received on the selected
interface.
Late Collisions. Displayed here is the number of late collision frames received on the selected interface. Excessive Collisions. Displayed here is the number of excessive collisions received on the selected interface. Internal MAC Transmit Errors. Displayed here is the number of internal MAC transmit errors on the selected
interface.
Oversize Packets. Displayed here is the number of oversized packet errors on the selected interface. Internal MAC Receive Errors. Displayed here is the number of internal MAC received errors on the selected
interface.
Received Pause Frames. Displayed here is the number of received paused frames on the selected interface. Transmitted Pause Frames. Displayed here is the number of paused frames transmitted from the selected
interface. Click the Clear All Counters button to reset all statistics to zero.
Figure 5-43: Statistics - Etherlike Statistics
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - Etherlike Statistics
40
Statistics Tab - RMON Statistics
The RMON Statistics screen displays information about the Switch’s use and errors. (RMON stands for Remote Monitoring.)
Interface. Select the appropriate interface, Port, LAG, or VLAN. Then select the appropriate number from the drop-down menu.
Refresh Rate. Select how often you want the interface statistics refreshed. Drop Events. This is the number of dropped events that have occurred on the interface since the Switch was last
refreshed. Received Bytes. This is the number of octets received on the interface since the Switch was last refreshed. (This
number excludes framing bits.)
Received Packets. This is the number of packets received on the interface since the Switch was last refreshed. Broadcast Packets Received. This is the number of good broadcast packets received on the interface since the
Switch was last refreshed. (This number excludes multicast packets.)s Multicast Packets Received. This is the number of good multicast packets received on the interface since the
Switch was last refreshed.
Figure 5-44: Statistics - RMON Statistics
CRC & Align Errors. This is the number of CRC and Align errors that have occurred on the interface since the
Switch was last refreshed. Undersize Packets. This is the number of undersized packets (fewer than 64 octets) received on the interface
since the Switch was last refreshed. Oversize Packets. This is the number of oversized packets (over 1518 packets) received on the interface since
the Switch was last refreshed. Fragments. This is the number of fragments (packets with fewer than 64 octets, excluding framing bits) received
on the interface since the Switch was last refreshed. Jabbers. This is the total number of received packets that were longer than 1518 octets. (This number excludes
framing bits.) Collisions. This is the number of collisions received on the interface since the Switch was last refreshed.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - RMON Statistics
41
Frames of 64 Bytes. This is the number of 64-byte frames received on the interface since the Switch was last
refreshed. Frames of 65 to 127 Bytes. This is the number of 65- to 127-byte frames received on the interface since the
Switch was last refreshed. Frames of 128 to 255 Bytes. This is the number of 128- to 255-byte frames received on the interface since the
Switch was last refreshed. Frames of 256 to 511 Bytes. This is the number of 256- to 511-byte frames received on the interface since the
Switch was last refreshed. Frames of 512 to 1023 Bytes. This is the number of 512- to 1023-byte frames received on the interface since
the Switch was last refreshed. Frames of 1024 to 1518 Bytes. This is the number of 1024- to 1518-byte frames received on the interface since
the Switch was last refreshed. Click the Clear All Counters button to reset all statistics to zero.
Statistics Tab - RMON History Control
The RMON History Control screen contains information about samples of data taken from ports.
History Entry No. This is the entry number for a RMON History entry. Source Interface. This is the interface from which the history samples were taken, either a port or LAG. Sampling Interval. This is the time during which samples were taken from the ports. Sampling Requested. This is the number of samples requested. Current Number of Samples. This is the current number of samples. Owner. This is the user who requested the RMON information.
To delete an entry, click its X icon. To add an entry, click the paper and pencil icon. On the new screen that appears, you can configure its settings. New History Entry. The entry number is automatically displayed.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - RMON History Control
Figure 5-45: Statistics - RMON History Control
Figure 5-46: RMON History Control - Ad d Entry
42
Source Interface. Select the source interface, either a port or LAG. Then select the appropriate number from the
drop-down menu.
Owner. Enter the name of the user. Max No. of Samples to Keep. Specify the maximum number of samples to keep for this entry. Sampling Interval. Enter the number of seconds during which samples should be taken from the ports. Click the Submit button to save your changes.
Statistics Tab - RMON History Log
The RMON History Log screen shows interface-specific statistics involving network sampling. Each entry has statistics from a single sample.
History Entry No. Select the history entry whose statistics you want to view. Owner. This is the user who requested this sampling. Sample No. This is the sample number from which the statistics were taken. Drop Events. This is the number of dropped events that have occurred on the interface since the Switch was last
refreshed. Received Bytes. This is the number of octets received on the interface since the Switch was last refreshed. This
excludes framing bits.
Received Packets. This is the number of packets received on the interface since the Switch was last refreshed. Broadcast Packets. This is the number of good broadcast packets receive on the interface since the Switch was
last refreshed. Multicast Packets. This is the number of good multicast packets received on the interface since the Switch was
last refreshed. CRC Align Errors. This is the number of CRC and Align errors that occurred on the interface since the Switch was
last refreshed. Undersize Packets. This is the number of undersized packets (fewer than 64 octets) received on the interface
since the Switch was last refreshed.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - RMON History Log
Figure 5-47: Statistics - RMON History Log
43
Oversize Packets. This is the number of o versized packets (over 1 518 octets) received on the interface since the
Switch was last refreshed. Fragments. This is the number of fragments (packets with fewer than 64 octets, excluding framing bits) received
on the interface since the Switch was last refreshed. Jabbers. This is the total number of received packets that were longer than 1518 octets. (This number excludes
frame bits.)
Collisions. This is the number of collisions received on the interface since the Switch was last refreshed. Utilization. This is the percentage of packet utilization across the entire Switch.
Statistics Tab - RMON Alarms
The RMON Alarms screen displays the network alarms you have set. When the network experiences problems or events, such as rising and falling thresholds, then a network alarm will occur.
Alarm Entry. This identifies a specific alarm. Counter Name. This is the selected MIB (Management Information Base) variable; for example, this can be the
total number of octets received, the number of unicast packets transmitted, the number of pause frames received, the number of oversize packets.
Figure 5-48: Statistics - RMON Alarms
Interface. This is the interface for which RMON statistics are displayed, either a port or LAG. Counter Value. This is the value of the selected MIB variable. Sample Type. This is the sampling method for the selected variable, Delta, which subtracts the last sampled
value from the current value and then compares the difference to the threshold, or Absolute, which compares values directly with the thresholds at the end of the sampling interval.
Rising Threshold. This is the rising counter value that triggers the rising threshold alarm. Rising Event. This is how alarms are reported, by Log, Trap, or Log and Trap. Falling Threshold. This is the falling counter value that triggers the falling threshold alarm. Falling Event. This is how alarms are reported, by Log, Trap, or Log and Trap. Startup Alarm. This is the trigger that activates the alarm generation.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - RMON Alarms
44
Interval. This is the alarm interval, measured in seconds. Owner. This is the user who requested this alarm.
To delete an entry, click its X icon. To add an entry, click the paper and pencil icon. On the new screen that appears, you can configure its settings.
Alarm Entry. This is the number of the alarm entry. Interface. Select the interface for which RMON statistics are displayed, either a port or LAG. Then select the
appropriate number from the drop-down menu.
Counter Name. Select the MIB (Management Information Base) variable from the drop-down menu. Sample Type. Select the sampling method, Delta, which subtracts the last sampled value from the current value
and then compares the difference to the threshold, or Absolute, which compares values directly with the thresholds at the end of the sampling interval.
Rising Threshold. Enter the rising counter value that triggers the rising threshold alarm. Rising Event. Select how alarms are reported, Log, Trap, or Log and Trap. Falling Threshold. Enter the falling counter value that triggers the falling threshold alarm. Falling Event. Select how alarms are reported, Log, Trap, or Log and Trap. Startup Alarm. Select the trigger that activates the alarm generation. Interval. Enter the alarm interval, measured in seconds. Owner. Enter the name of the user who requested this alarm. Click the Submit button to save your changes.
Statistics Tab - RMON Events Control
The RMON Events Control screen shows the RMON events you have configured.
Event Entry. This identifies the event. Community. This is the community to which the event belongs.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - RMON Events Control
Figure 5-49: RMON Alarms - Add Entry
Figure 5-50: Statistics - RMON Events Control
45
Description. This is the description of the event. Type. This is the event type, Log, Trap, Log and Trap, or None. Log indicates that the event is a log entry. Trap
indicates that the event is a trap. An event can be both a log entry and a trap. None indicates that no event has occurred.
Time. This is the time at which the event occurred. Owner. This is the user that defined the event.
To delete an entry, click its X icon. To add an entry, click the paper and pencil icon. On the new screen that appears, you can configure its settings.
Event Entry. This is the number of the event. Community. Enter the name of the event’s community. Description. Describe the event in this field. Type. Select the event type, Log, Trap, Log and Trap, or None. Log indicates that the event is a log entry. Trap
indicates that the event is a trap. An event can be both a log entry and a trap. None indicates that no event has occurred.
Figure 5-51: RMON Event s Control - Add Entry
Owner. Enter the name of the user defining this event. Click the Submit button to save your changes.
Statistics Tab - RMON Events Log
The RMON Events Log screen displays a list of RMON events.
Event. This is the number of the RMON Event Log entry. Log No. This is the log number. Log Time. This is the time when the log entry was entered. Description. This is the description of the log entry.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - RMON Events Log
Figure 5-52: Statistics - RMON Events Log
46
Statistics Tab - EAP Statistics
The EAP Statistics screen displays information about EAP packets received on a specific port.
Port. Select the port you want to poll for statistics. Refresh Rate. Select how often you want the EAP statistics to be refreshed. Frames Receive. Displayed here is the number of valid EAPOL (Extensible Authentication Protocol Over Local
Area Network) frames received on the port.
Frames Transmit. Displayed here is the number of EAPOL frames transmitted on the port. Start Frames Receive. Displayed here is the number of EAPOL Start frames received on the port. Log off Frames Receive. Displayed here is the number of EAPOL Logoff frames received on the port. Respond ID Frames Receive. Displayed here is the number of EAP Respond/ID frames received on the port. Respond Frames Receive. Displayed here is the number of valid EAP Response frames received on the port. Request ID Frames Transmit. Displayed here is the number of EAP Request/ID frames transmitted on the port. Request Frames Transmit. Displayed here is the number of EAP Request frames transmitted on the port. Invalid Frames Receive. Displayed here is the number of unrecognized EAPOL frames received on the port. Length Error Frames Receive. Displayed here is the number of EAPOL frames with an invalid Packet Body
Length received on the port.
Last Frame Version. This is the protocol version number attached to the most recently received EAPOL frame. Last Frame Source. This is the source MAC address attached to the most recently received EAPOL frame.
Logs Tab - Message Log
The Message Log screen shows information about log entries saved to the Log file in flash memory. (log number). This is the number of the log entry in the Message Log.
Figure 5-53: Statistics - EAP Statistics
Log Index. This is the log number.
Chapter 5: Using the Web-based Utility for Configuration Statistics Tab - EAP Statistics
Figure 5-54: Logs - Message Log
47
Log Time. Displayed here are the date and time at which the log was generated. Severity. This is the severity level of the log. Description. Displayed here is the log message text. Click the Clear Logs button to clear the logs on this screen.
Logs Tab - Event Log
The Event Log screen shows information about all system logs that are saved in RAM. These logs are listed in chronological order.
(log number). This is the number of the log entry in the Event Log.
Log Index. This is the log number. Log Time. Displayed here are the date and time at which the log was generated. Severity. This is the severity level of the log. Description. Displayed here is the log message text. Click the Clear Logs button to clear the logs on this screen.
Figure 5-55: Logs - Event Log
Logs Tab - Global Parameters
The Global Parameters screen lets you define which events are recorded by which logs. You can enable logs for the Switch and define specific logs.
Logging. If you want the Switch to keep logs, select Enable. Otherwise, select Disable. Attribute. Displayed here is Max RAM Log Entries (20-400). This stands for the maximum number of log entries
held in RAM. The minimum number is 20, and the maximum number is 400.
Current. Displayed here is the current maximum number of log entries. After Reset. Enter the maximum number of log entries you want to allow. After you save this change, you will
need to reset the Switch so the change will take effect. Severity. This is a list of severity levels, in order of severity from highest (Emergency) to lowest (Debug).
Chapter 5: Using the Web-based Utility for Configuration Logs Tab - Event Log
Figure 5-56: Logs - Global Parameters
48
Event Log. Select the types of logs that you want to save to the Event Log. Message Log. Select the types of logs that you want to save to the Message Log. Click the Submit button to save your changes.
Maintenance Tab - Telnet
The Telnet screen lets you connect to the Switch through telnet, a terminal emulation TCP/IP protocol. Connect Via Telnet. If you use a telnet connection, click Connect Via Telnet. The HyperTerminal screen will
automatically appear.
Maintenance Tab - Reset
The Reset screen lets you reset the Switch from a remote location.
NOTE: Before you reset the Switch, you should update your startup configuration file so you will not lose your current configuration settings.
Reset the Device. If you want to reset the Switch, click Reset the Device. You will be asked to confirm the reset. Click the OK button. After the Switch is reset, you will be prompted for a user name and password before you can access the Web-based Utility.
Maintenance Tab - File Download
The File Download screen lets you download firmware or a configuration file to the Switch. You cannot download both at the same time.
Firmware Download. If you want to download firmware, click this radio button. If this is selected, then the Configuration Download fields will not be available.
Configuration Download. If you want to download a configuration file, click this radio button. If this is selected, then the Firmware Download fields will not be available.
NOTE: You can perform only one type of download at a time.
Chapter 5: Using the Web-based Utility for Configuration Maintenance Tab - Telnet
Figure 5-57: Maintenance - Telnet
Figure 5-58: Maintenance - Reset
Figure 5-59: Maintenance - File Download
49
Firmware Download
TFTP Server IP Address. Enter the IP address of the TFTP server. Source File Name. Enter the name of the firmware file you want to download. Destination File Name. Specify the file type, Software Image or Boot Code.
Configuration Download
TFTP Server IP Address. Enter the IP address of the TFTP server. Source File Name. Enter the name of the configuration file you want to download. Destination File Name. Specify the file type, Running Configuration or Startup Configuration. The Running
Configuration file holds all startup file commands and commands entered during the current session. The Startup Configuration file holds the startup file commands needed by the Switch to power on or be rebooted.
Click the Submit button to begin the download of the firmware or configuration file.
Maintenance Tab - File Upload
The File Upload screen lets you upload firmware or a configuration file to a TFTP server. You cannot upload both at the same time.
Firmware Upload. If you want to upload firmware, click this radio button. If this is selected, then the Configuration Upload fields will not be available.
Configuration Upload. If you want to upload a configuration file, click this radio button. If this is selected, then the Firmware Upload fields will not be available.
NOTE: You can perform only one type of upload at a time.
Software Image Upload
TFTP Server IP Address. Enter the IP address of the TFTP server. Destination File Name. Enter the software image file path to which the file will be uploaded.
Chapter 5: Using the Web-based Utility for Configuration Maintenance Tab - File Upload
Figure 5-60: File Download - Configuration Download
Figure 5-61: Maintenance - File Upload
50
Configuration Upload
TFTP Server IP Address. Enter the IP address of the TFTP server. Destination File Name. Enter the configuration file name to which the file will be uploaded. Transfer File Name. Specify the file type, Running Configuration or Startup Configuration. The Running
Configuration file holds all startup file commands and commands entered during the current session. The Startup Configuration file holds the startup file commands needed by the Switch to power on or be rebooted.
Click the Submit button to begin the upload of the firmware or configuration file.
Maintenance Tab - Restore Defaults
The Restore Defaults screen lets you restore the Switch’s factory defaults.
NOTE: Before you restore the Switch’s factory defaults, note any settings you may want to use later.
Restore Company Defaults. Click Restore Company Defaults to restore the factory default settings.
Maintenance Tab - Integrated Cable Test
The Integrated Cable Test screen shows you results from performance tests on copper cables. The maximum cable length that can be tested is 120 meters. Cables are tested when the ports are in the down state, except for the Approximate Cable Length test.
Port. This is the port to which the cable is connected. Test Result. This is the test result. OK indicates that the cable passed the test. No Cable means there is no cable
connected to the port. Open Cable means the cable is connected on only one side. Short Cable indicates that a short has occurred in the cable. Undefined indicates that the test could not be properly performed.
Cable Fault Distance. This is the distance from the port at which the cable error occurred. Last Update. This is the last time the port was tested.
Figure 5-62: File Upload - Configuration Upload
Figure 5-63: Maintenance - Restore Defaults
Figure 5-64: Maintenance - Integrated Cable Test
Cable Length. This is the approximate length of the cable. The Approximate Cable Length test can be performed
only when the port is up and operating at 1Gbps. Click the pencil icon of a port to test the port’s cable. A new screen will appear so you can perform the test.
Chapter 5: Using the Web-based Utility for Configuration Maintenance Tab - Restore Defaults
51
Port. Select the port you want to test. Test Result. This is the test result. OK indicates that the cable passed the test. No Cable means there is no cable
connected to the port. Open Cable means the cable is connected on only one side. Short Cable indicates that a short has occurred in the cable. Undefined indicates that the test could not be properly performed.
Cable Fault Distance. This is the distance from the port at which the cable error occurred. Last Update. This is the last time the port was tested. Test Now. Click the Test Now button to perform the test. Approximate Cable Length. This is the approximate length of the tested cable. The Approximate Cable Length
test can be performed only when the port is up and operating at 1Gbps.
Maintenance Tab - HTTP File Download
The HTTP File Download screen allows you to download a file to the Switch via HTTP. Source File Name. Enter the file path of the file you want to download, or click the Browse button to browse for
the source file. Click the Submit button to begin the download.
Help Tab
When you are viewing any screen of the Web-based Utility and you want help information about the settings on that screen, click the Help tab. The relevant help information will automatically be displayed. At the end of the help information, there is a link available to take you to an index of help information, if you want additional information.
Figure 5-65: Integrated Cable Test - Perform Test
Figure 5-66: Maintenance - HTTP File Download
Chapter 5: Using the Web-based Utility for Configuration Maintenance Tab - HTTP File Download
Figure 5-67: Help - System Description
52

Appendix A: About Gigabit Ethernet and Fiber Optic Cabling

Gigabit Ethernet
Gigabit Ethernet runs at speeds of 1Gbps (Gigabit per second), ten times faster than 100Mbps Fast Ethernet, but it still integrates seamlessly with 100Mbps Fast Ethernet hardware. Users can connect Gigabit Ethernet hardware with either fiber optic cabling or copper Category 5e cabling, with fiber optics more suited for network backbones. As the Gigabit standard gradually integrates into existing networks, current computer applications will enjoy faster access time for network data, hardware, and Internet connections.
Fiber Optic Cabling
Fiber optic cabling is made from flexible, optically efficient strands of glass and coated with a layer of rubber tubing, fiber optics use photons of light instead of electrons to send and receive data. Although fiber is physically capable of carrying terabits of data per second, the signaling hardware currently on the market can handle no more than a few gigabits of data per second.
Fiber cables come with two main connector types. The most commonly used fiber optic cable is multi-mode fiber cable (MMF), with a 62.5 micron fiber optic core. Single-mode fiber cabling is somewhat more efficient than multi-mode but far more expensive, due to its smaller optic core that helps retain the intensity of traveling light signals. A fiber connection always require two fiber cables: one transmits data, and the other receives it.
Each fiber optic cable is tipped with a connector that fits into a fiber port on a network adapter , hub, or switch. In the USA, most cables use a square SC connector that slides and locks into place when plugged into a port or connected to another cable. In Europe, the round ST connector is more prevalent.
You must use the Linksys MGBT1, MGBSX1, or MGBLH1 mini-GBIC modules with the Linksys Gigabit Switches. The MGBSX1 and the MGBLH1 require fiber cabling with LC connectors, and the MGBT1 requires a Category 5e Ethernet cable with an RJ-45 connector.
Appendix A: About Gigabit Ethernet and Fiber Optic Cabling Gigabit Ethernet
53

Appendix B: Windows Help

Almost all networking products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier . These features can be accessed through Windows Help and are described in this appendix.
TCP/IP
Before a computer can communicate within a network, TCP/IP must be enabled. TCP/IP is a set of instructions, or protocol, all PCs follow to communicate over a network. This is true for wireless networks as well. Your PCs will not be able to utilize wireless networking without having TCP/IP enabled. Windows Help provides complete instructions on enabling TCP/IP.
Shared Resources
If you wish to share printers, folder, or files over your network, Windows Help provides complete instructions on utilizing shared resources.
Network Neighborhood/My Network Places
Other PCs on your network will appear under Network Neighborhood or My Network Places (depending upon the version of Windows you're running). Windows Help provides complete instructions on adding PCs to your network.
Appendix B: Windows Help
54

Appendix C: Glossary

Adapter - A device that adds network functionality to your PC. AES (Advanced Encryption Standard) - A security method that uses symmetric 128-bit block data encryption. Backbone - The part of a network that connects most of the systems and networks together, and handles the
most data.
Bandwidth - The transmission capacity of a given device or network. Bit - A binary digit. Boot - To start a device and cause it to start executing instructions. Bridge - A device that connects different networks. Broadband - An always-on, fast Internet connection. Browser - An application program that provides a way to look at and interact with all the information on the
World Wide Web. Buffer - A shared or assigned memory area that is used to support and coordinate different computing and
networking activities so one isn't held up by the other.
Byte - A unit of data that is usually eight bits long Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the
Internet. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent
data collisions.
CTS (Clear To Send) - A signal sent by a wireless device, signifying that it is ready to receive data. Daisy Chain - A method used to connect devices in a series, one after the other. Database - A collection of data that is organized so that its contents can easily be accessed, managed, and
updated.
Appendix C: Glossary
55
DDNS (Dynamic Domain Name System) - Allows the hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP address.
Default Gateway - A device that forwards Internet traffic from your local area network. DHCP (Dynamic Host Configuration Protocol) - A networking protocol that allows administrators to assign
temporary IP addresses to network computers by “leasing” an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses.
DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be “seen” from the Internet.
DNS (Domain Name Server) - The IP address of your ISP’s server, which translates the names of websites into IP addresses.
Domain - A specific name for a network of computers. Download - To receive a file transmitted over a network. DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines. DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless
efficiency.
Dynamic IP Address - A temporary IP address assigned by a DHCP server. EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access.
Many specific authentication methods work within this framework. EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - A mutual
authentication method that uses a combination of digital certificates and another system, such as passwords. EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) - A mutual authentication method that
uses digital certificates.
Encryption - Encoding data transmitted in a network. Ethernet - A networking protocol that specifies how data is placed on and retrieved from a common transmission
medium. Finger - A program that tells you the name associated with an e-mail address.
Appendix C: Glossary
56
Firewall - A set of related programs located at a network gateway server that protects the resources of a
network from users from other networks.
Firmware - The programming code that runs a networking device. Fragmentation -Breaking a packet into smaller units when transmitting over a network medium that cannot
support the original size of the packet.
FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network. Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A device that interconnects networks with different, incompatible communications protocols. Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a
time.
Hardware - The physical aspect of computers, telecommunications, and other information technology devices. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World
Wide Web.
IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network. IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer. ISM band - Radio bandwidth utilized in wireless transmissions. ISP (Internet Service Provider) - A company that provides access to the Internet. LAN - The computers and networking products that make up your local network. LEAP (Lightweight Extensible Authentication Protocol) - A mutual authentication method that uses a username
and password system. MAC (Media Access Control) Address - The unique address that a manufacturer assigns to each networking
device. Mbps (MegaBits Per Second) - One million bits per second; a unit of measurement for data transmission.
Appendix C: Glossary
57
mIRC - An Internet Relay Chat program that runs under Windows. Multicasting - Sending data to a group of destinations at once. NAT (Network Address Translation) - NAT technology translates IP addresses of a local area network to a different
IP address for the Internet. Network - A series of computers or devices connected for the purpose of data sharing, storage, and/or
transmission between users.
NNTP (Network News Transfer Protocol) - The protocol used to connect to Usenet groups on the Internet. Node - A network junction or connection point, typically a computer or work station. Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphr ase simplifies the WEP encryption process by automatically
generating the WEP encryption keys for Linksys products. PEAP (Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination
of digital certificates and another system, such as passwords.
Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online. POP3 (Post Office Protocol 3) - A standard mail server commonly used on the Internet. Port - The connection point on a computer or networking device used for plugging in cables or adapters. Power over Ethernet (PoE) - A technology enabling an Ethernet network cable to deliver both data and power. PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication
(username and password) in addition to data transport. PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be
tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.
Preamble - Part of the wireless signal that synchronizes network traffic. RADIUS (Remote Authentication Dial-In User Service) - A protocol that uses an authentication server to control
network access. RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires.
Appendix C: Glossary
58
Roaming - The ability to take a wireless device from one access point's range to another without losing the
connection.
Router - A networking device that connects multiple networks together. RTS (Request To Send) - A networking method of coordinating large packets through the RTS Threshold setting. Server - Any computer whose function in a network is to provide user access to files, printing, communications,
and other services.
SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. Software - Instructions for the computer. A series of instructions that performs a particular task is called a
“program”.
SOHO (Small Office/Home Office) - Market segment of professionals who work at home or in small offices. SPI (Stateful Packet Inspection) Firewall - A technology that inspects incoming packets of information before
allowing them to enter the network.
Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path. Subnet Mask - An address code that determines the size of the network. Switch - 1. A data switch that connects computing devices to host computers, allowing a large number of
devices to share a limited number of ports. 2. A device for making, breaking, or changing the connections in an electrical circuit.
TCP (Transmission Control Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent.
TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network.
Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password
capability.
Appendix C: Glossary
59
Throughput - The amount of data moved successfully from one node to another in a given time period. Topology - The physical layout of a network. TX Rate - Transmission Rate. UDP (User Datagram Protocol) - A network protocol for transmitting data that does not require acknowledgement
from the recipient of the data that is sent.
Upgrade - To replace existing software or firmware with a newer version. Upload - To transmit a file over a network. URL (Uniform Resource Locator) - The address of a file located on the Internet. VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another
over the Internet.
WAN (Wide Area Network)- The Internet. WINIPCFG - A Windows 98 and Me utility that displays the IP address for a particular networking device.
Appendix C: Glossary
60

Appendix D: Specifications

Models SRW2016 - 16-Port 10/100/1000 Gigabit Switch with WebView
SRW2024 - 24-Port 10/100/1000 Gigabit Switch with WebView Standards IEEE 802.3, 802.3u, 802.3ab, 802.3x, 802.1p, 802.1q Ports SRW2016 - 16 10/100/1000 RJ-45 ports and 2 shared MiniGBIC slots
SRW2024 - 24 10/100/1000 RJ-45 ports and 2 shared MiniGBIC slots Cabling Type Cat5e or better LEDs System, Link/Activity, Gigabit Security Features ACL, 802.1x Dimensions 16.93" x 1.75" x 13.78"
(W x H x D) (430 mm x 44.45 mm x 350 mm) Unit Weight SRW2016 - 7.30 lbs. (3.31 kg)
SRW2024 - 7.35 lbs. (3.33 kg) Power 100-240V 0.5A Certifications UL (UL 1950), CSA (CSA 22.2), CE mark, EN60950 (2001) Operating Temp. 0ºC to 50ºC (32ºF to 122ºF) Storage Temp. -40ºC to 70ºC (-40ºF to 158ºF) Operating Humidity 20% to 95%, Non-Condensing Storage Humidity 5% to 90% Non-Condensing
Appendix D: Specifications
61
16- or 24-Port 10/100/1000 Gigabit Switch with WebView

Appendix E: Warranty Information

LIMITED WARRANTY Linksys warrants to You that, for a period of five years (the “Warranty Period”), your Linksys Product will be substantially
free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates. This limited warranty extends only to the original purchaser.
If the Product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a Return Authorization Number, if applicable. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING. If You are requested to return the Product, mark the Return Authorization Number clearly on the outside of the package and include a copy of your original proof of purchase. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. You are responsible for shipping defective Products to Linksys. Linksys pays for UPS Ground shipping from Linksys back to You only . Customers located outside of the United States of America and Canada are responsible for all shipping and handling charges.
ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABI LITY OR FITNESS FOR A P AR TICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above limitation may not apply to You. This warranty gives You specific legal rights, and You may also have other rights which vary by jurisdiction.
This warranty does not apply if the Product (a) has been altered, except by Linksys, (b) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Linksys, or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. In addition, due to the continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the Product will be free of vulnerability to intrusion or attack.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this Agreement fails of its essential purpose. Some juri sdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to You.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623.
Appendix E: Warranty Information
62
16- or 24-Port 10/100/1000 Gigabit Switch with WebView

Appendix F: Regulatory Information

FCC STATEMENT This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15
of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment or devices
• Connect the equipment to an outlet other than the receiver's
• Consult a dealer or an experienced radio/TV technician for assistance INDUSTRY CANADA (CANADA) This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. EC DECLARATION OF CONFORMITY (EUROPE) In compliance with the EMC Directive 89/336/EEC, Low Voltage Directive 73/23/EEC, and Amendment Directive
93/68/EEC, this product meets the requirements of the following standards:
• EN55022 Emission
• EN55024 Immunity
Appendix F: Regulatory Information
63
16- or 24-Port 10/100/1000 Gigabit Switch with WebView

Appendix G: Contact Information

Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or
ftp.linksys.com Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: 800-546-5797 (LINKSYS) Or fax your request in to: 949-823-3002
If you experience problems with any Linksys product, you can call us at: 800-326-7114 Don't wish to call? You can e-mail us at: support@linksys.com
If any Linksys product proves defective during its warranty period, you can call the Linksys Return Merchandise Authorization department for obtaining a Return Authorization Number at: 949-823-3000 (Details on Warranty and RMA issues can be found in the Warranty Information section in this Guide.)
Appendix G: Contact Information
64
Loading...