4.4 802.1 X authentication ....................................................................................................... 111
4.5 MAC Authentication........................................................................................................... 120
4.6 The RADIUS ......................................................................................................................... 123
5 System ........................................................................................................................................... 130
5.1 Manage IP Addresses .......................................................................................................... 130
5.2 User Management ................................................................................................................ 136
Set the administrative IP address of the device
User management
Set user password
Telnet server
Turn on/off the Telnet server
SNMP
SNMPv1 /v2c
Configuration SNMPv1 / v2c
SNMPv3
Configuration SNMPv3
Date and time
Displays/sets the current system date and time
Profile
management
Download the
back up
Setup to back up configuration files to localhost
Restore
the back up
Set up a local restore profile to the device
factory
Data reset
Settings to restore the device to its factory
configuration
System upgrade
Set up upload upgrade file from local host to upgrade
system software
Log/diagnosis
Generate a diagnostic information file and open it
for viewing or saving on the localhost
Restart
Set up the reboot device
The diagnosis
Web tools
Perform the ping/trace route operation and
display the results
Dying -- Gasp
Turn on/off the gas gasp alert
Optical module information
View optical module information, such as
manufacturer information, serial number, optical
power, etc
Save
\
Save the currently set parameters to ensure the
restart is valid
Cancellation
\
Log out
P32S36GM Configuration Guide
12
2 Interface
2.1 Port Management
•
Due to the different parameters of electrical port and optical port, it is recommended to configure electrical port and optical
port separately when selecting multi-port configuration.
The port management module is used to configure and view the working parameters of the Ethernet
interface, including: name, description, port mode, media type, rate, duplex state, flow control, MTU, state,
as shown in figure 2-1.
Figure 2-1 interface management interface
Operation steps:
(1)
Select [interface] [port management] in the menu, as shown in figure 2-1.à
(2)
Check the ports to be configured (support multiple ports) and click the "edit" button to enter the
page as shown in picture 2-2.
(3)
Configure the working parameters of the port, as shown in table 2-1.
(4)
Click the "apply" button to complete the operation.
(5)
Click the "save" button in the menu to save the configuration.
Figure 2-2 interface configuration interface
Table 2-1 interface working parameters description
P32S36GM Configuration Guide
13
Configuration Items
Instructions
Describe
Set the description information for the port, using a combination of letters and Numbers.
Medium Type
Configure the media type of the multiplexing port, which is only valid for ports that support
photoelectric multiplexing (Combo).
•
RJ45: set the port to work in port mode.
•
SFP: set the port to work in port mode.
Rate
Set the rate of the port
•
10 m: 10 MBPS
•
M: 100 100 MBPS
•
M: 1000 1000 MBPS
•
AUTO: automatically negotiates port rates
Duplex State
Sets the duplex state of the port
•
AUTO: self-negotiating duplex
•
FULL duplex
•
Sheldon: HALF duplex
Port Mode
Set the working mode of the port to support different working modes, which need corresponding
optical module support.
•
100base-fx: set the port to work in 100 MB light mode.
•
1000base-x: set the port to work in gigabit light mode.
•
SGMII: set the port to work in SGMII mode, which needs to be configured when the optical port
inserts gigabit to 100 MBPS (SFP ge-fx) or light-to-electricity (mini-gbic-gt) modules.
•
2500base-x: set the port to work in 2.5g optical port mode.
•
10G base-x: set the port to work in 10G optical port mode.
•
2500base-x mode, there may be incompatibility with port interconnection of other manufacturers.
•
The optical port capability of different types of equipment is different, please refer to the specification
document corresponding to the specific product model.
•
This feature is only supported by optical ports
Flow Control
Set Enable or Disable port traffic control functions
When this end and the end of the device can enable the flow control function, if the end of the
device congestion, send a message to the end of the device, notify the end of the device to
temporarily stop sending messages;After receiving the message, the opposite device will
temporarily stop sending the message to the opposite device. And vice versa. Thus, packet loss
is avoided
Flow control can be realized only when the flow control function is turned on at both the local port and
the opposite port
P32S36GM Configuration Guide
14
MTU
Set the frame length allowed for forwarding from 64 to 10240 bytes. The default is 1526 bytes.
Manage State
Set the open/closed state of the port.
•
Shutdown: the port setting is working normally.
•
Shutdown: setting up the port is in the Shutdown state.
Configuration examples:
Case requirements: configure port eth0/9 to work in 2.5g mode, turn off flow control, set MTU to 10000
bytes, and port description to ABC.
Step 1: select "interface" and "port management" in the menu to enter the port management interface.
Step 2: select port eth0/9 and click the "edit" button to enter the port configuration interface, as shown in figure
2-3.
Step 3: as shown in figure 2-3, follow the description of "ABC", medium type "SFP", port mode "2500base-
x", flow control "OFF", MTU "10000", management state "No shutdown", and configure parameters.
Figure 2-3 interface configuration example
Step 4: click the apply button to complete the operation.
Step 5: click the "save" button in the menu to save the configuration.
P32S36GM Configuration Guide
15
2.2Port Speed Limit
Port speed limit is a port-based speed limit, which limits the total speed of port input and output messages.
Before the flow is sent from the interface, speed limit is configured on the direction of the
interface to control all outgoing message flow. Before the traffic is received from the interface, the speed limit is
configured in the direction of the interface to control all incoming message traffic.
Operation steps:
(1)
Select [interface] [port speed limit] in the menu and enter the port speed limit configuration interface, as
shown in figure 2-4.à
(2)
For ports that need to be configured with speed limit, enter corresponding values in the dialog box, and
the specific parameters are defined as shown in table 2-2.
(3)
Click the "apply" button on the corresponding port to complete the operation.
(4)
Click the "save" button in the menu to save the configuration.
•
This feature only supports single-port configuration, such as eth0/1, and if parameters are entered on other ports, when
eth0/1's apply button is clicked,
Parameters for other ports are cleared (configuration does not take effect).
Figure 2-4 port speed limit interface
•
Limit values are deterministic, such as 1M, and 1024, but burst values are derived from empirical values. When the burst
The numerical distribution is large, the flow peak is higher, the speed limit is stable, but the average speed may be higher than
the speed limit. When the burst value is small, the flow peak is low and the speed limit is limited
The average speed may be less than the speed limit. It is recommended to configure burst with a value of 4 times limit
and a small value of 16384.
Table 2-2 parameter description
P32S36GM Configuration Guide
20
Configuration Items
Instructions
Input Rate (KBPS)
Bandwidth limit per second of input direction (KBits).
Input Burst Flow (KB)
Burst traffic limits in the input direction (Kbytes).
Output Rate (KBPS)
Bandwidth limit per second in the output direction (KBits).
Output Burst Flow (KB)
Output direction burst traffic limit (Kbytes).
Application
Sets the port speed limit function that enables the specified port.
Remove
Clear the dialog box of what has been filled in.
Configuration examples:
Case requirements: suppose the port eth0/1 of the switch is connected to the Internet, the traffic limit at
the port eth0/1 outlet is required, the bandwidth limit is 102400KBits per second, and the burst traffic limit
is 256Kbytes per second.
Step 1: select [interface] [port speed limit] in the menu to enter the port speed limit configuration interface.
Step 2: fill in the corresponding parameter dialog box for port eth0/1, as shown in figure 2-5. Step 3: click the
[apply] button of port eth0/1 to complete the configuration.
Figure 2-5 port speed limit configuration interface
Step 4: click the "save" button in the menu to save the configuration.
2.3Storm Control
When there is excessive broadcast, multicast or unknown unicast data stream in local area network, the
network performance will decline, or even the phenomenon of network paralysis, called broadcast storm.
Storm control for broadcast and multicast and unicast unknown data flow speed, when the switch port
receives the broadcast and unknown unknown multicast or unicast data flow rate exceeds the bandwidth
set, the device will only be allowed through the data stream set bandwidth, beyond the bandwidth of data
flow will be discarded, so as to avoid excessive flood storms formed in the data stream into the LAN.
Storm control module for setting port suppression ratio for broadcast, multicast, unknown list
broadcast. The storm control mode based on bandwidth percentage is adopted. When the speed of
data stream received by the device port exceeds the set bandwidth, the device will only allow the data
stream passing through the set bandwidth, and the data stream exceeding the set bandwidth will be
discarded until the data stream returns to normal.
P32S36GM Configuration Guide
21
Configuration steps:
(1)
Select [interface] [storm control] in the menu and enter the storm control interface, as shown in FIG.
2-6.à
(2)
Check the ports to be configured (support multiple ports) and click [edit] to enter the page shown
in figure 2-7.
(3)
Configure storm suppression types and bandwidth suppression ratios of ports, as shown in table 2-3.
(4)
Click the "apply" button to complete the operation.
(5)
Click the "save" button in the menu to save the configuration.
Figure 2-6 interface of storm control state
Figure 2-7 port configuration interface
P32S36GM Configuration Guide
22
Configuration Items
Instructions
Name
Selected port
Type
disabled
Turn this feature off.
broadcast
Turn on the broadcast message storm suppression function to realize the traffic
limit of broadcast message.
multicast
Open unknown group broadcast text storm suppression function, can realize the
unknown group broadcast text traffic Restrictions.
unicast
Open unknown list broadcast text storm suppression function, can realize the
unknown list broadcast text traffic Restrictions.
Multicast and broadcast
Turn on the storm suppression function of group broadcast message
+ broadcast message to realize the unknown group broadcast message and
wide Traffic restrictions for broadcast text.
Unicast and broadcast
Open unknown list broadcast text + broadcast message storm suppression
function, can realize the unknown list broadcast Traffic limits for text and
broadcast messages.
all
Select suppress broadcast, multicast, unknown list broadcast.
Bandwidth ratio ( )
The maximum broadcast traffic allowed as a percentage of the port's transmission
capacity Enter a specific percentage.
Table 2-3 parameter description
Configuration examples:
Case requirements: enable storm control on port eth0/1, and set the suppression ratio of broadcast
messages to 10%.
Step 1: select [interface] [storm control] in the menu to enter the storm control interface.
Step 2: select port eth0/1 and click the "edit" button to enter the configuration screen. Step 3: select
broadcast as type and set the bandwidth ratio to 10, as shown in figure 2-8. Step 4: click the apply
button to complete the operation.
Figure 2-8 storm control configuration interface
Step 5: click the "save" button in the menu to save the configuration.
P32S36GM Configuration Guide
23
Configuration Items
Instructions
The name of the
Switch port
Receive a message
All messages received by the interface
Number of bytes
received
The number of bytes of all messages received by the interface
Number of messages
sent
All messages sent by the interface
Number of bytes sent
The number of bytes of all messages sent by an interface
Reception rate (PPS)
Interface receiving rate, unit PPS (bit per second bit/second)
Reception rate (BPS)
Packet Per Second Packet rate received by the interface, BPS (Packet Per Second)
Send rate (PPS)
Interface send rate, unit PPS (bit per second bit/second)
Sending rate (BPS)
Packet Per Second Packet Per Second Packet Packet
remove
Reset message
2.4Port Statistics
The port statistics function is used to display statistics about the number of messages received and sent
by ports.
(1)
Select [interface] -> [port statistics] in the menu and enter the port statistics page, as shown in
figure 2-9.
(2)
In the page, check the number of messages received and sent by each port of the device, the
number of bytes, and the rate of sending and receiving. The specific parameters are shown in the
table 2 to 4.
Figure 2-9 port statistics page
Table 2-4 port statistical parameter description
P32S36GM Configuration Guide
24
2.5Port Mirroring
SPAN (Local Switched Port Analyzer) is the Local mirror function.The function of SPAN will copy the packet of
the designated port to the destination port. In general, the destination port of SPAN will access data detection
equipment. Users will use these devices to analyze the packet received by the destination port for network
monitoring and troubleshooting, as shown in figure 2-10.
SPAN does not affect the message exchange between the source port and the destination port, but
simply copies a copy of all incoming and outgoing messages from the source port to the destination port.
Messages may be discarded when the mirror traffic of the source port exceeds the destination port
bandwidth, such as when the 100Mbps destination port monitors the traffic of the 1000Mbps source port.
SPAN is based on session management, configuring the source and destination ports of SPAN in the
session. There can be only one destination port in a session, but multiple source ports can be configured
simultaneously.
Figure 2-10 port mirroring
Configuration steps:
(1)
Select [interface] [port mirror] in the menu and enter the page shown in figure 2-11.à
Figure 2-11 port mirroring interface
(2)
Click the "add" button to enter the page as shown in picture 2-12.
Figure 2-12 port mirroring configuration interface
P32S36GM Configuration Guide
25
Configuration Items
Instructions
The session
Select the group number of the port mirroring group to configure, and you can create a total
of seven mirroring groups.
Purpose interface
Select mirror destination port, only one destination interface per session is allowed
The source interface
Select mirror source ports to allow multiple source ports to exist simultaneously
(3)
Select the session, destination interface and source interface, and the specific parameters
are described in table 2-5.
(4)
Click the "apply" button to complete the operation.
(5)
Click the "save" button in the menu to save the configuration.
Table 2-5 port mirroring parameters
Configuration examples:
Case requirement: monitoring eth0/1 port and eth0/2 inbound/outbound messages using port eth0/3.
Step 1: select [interface] [port image] in the menu to enter the port image configuration interface.
Step 2: click the "add" button to enter the port image configuration interface.
Step 3: select session 1, as shown in figure 2-13, eth0/3 for the destination interface, eth0/1 and eth0/2 for
the source interface.
Figure 2-13 port mirroring configuration interface
Step 4: click the "apply" button to complete the configuration and automatically return to the port mirroring
interface. You can see the successfully created mirror group 1, as shown in figure 2-14.
Figure 2-14 port mirror display interface
Step 5: click the "save" button in the menu to save the configuration.
P32S36GM Configuration Guide
26
2.6Port Isolation
In order to achieve layer isolation between messages, different ports can be added to different vlans, but
limited VLAN resources will be wasted. The isolation between ports in the same VLAN can be realized by
using the port isolation feature. The user only needs to add ports to the isolation group to realize the two-
layer data isolation between ports in the isolation group. The function of port isolation provides users with
a more secure and flexible networking scheme. The port isolation feature is independent of the VLAN to
which the port belongs. For devices that do not support uplink ports, two-way traffic interchanges between
ports in isolation group and ports outside isolation group.
Configuration steps:
(1)
Select [interface] [port isolation] in the menu to enter the port isolation interface, as shown in figure
2-15.à
(2)
Select the port to be isolated and click the "enable/disable" button.
(3)
Click the "save" button in the menu to save the configuration.
Figure 2-15 port isolation interface
Configuration examples:
Networking requirements, as shown in figure 2-16:
•
The cell User1, User2, and User3 are connected to the Switch ports eth0/2, eth0/3, and
eth0/4, respectively.
•
The device connects to the external network through the eth0/1 port.
•
Eth0/1, eth0/2, eth0/3 and eth0/4 belong to the same VLAN; Realize that cell users User1, User2 and User3
cannot communicate with each other, but can communicate with external network.
P32S36GM Configuration Guide
27
Figure 2-16 networking topology
Step 1: select [interface] -> [port isolation] in the menu to enter the port isolation interface.
Step 2: select eth0/2, eth0/3, eth0/4, and click the [disabled] button to enable port isolation, as shown in figure
2-17.
Figure 2-17 port isolation configuration interface
Step 3: click the "save" button in the menu to save the configuration.
2.7 Port Aggregation
2.7.1 Overview
2.7.1.1
Binding multiple physical links together creates a logical link, which we call an aggregate port
(port-channel).This function conforms to ieee802.3ad standard. It can be used to extend link bandwidth
and provide higher connection reliability. It is often used for port connection, as shown in figure 2-18.
Polymerization Mouth
Figure 2-18 port aggregation networking model
P32S36GM Configuration Guide
28
The polymerization port has the following characteristics:
(1)
High bandwidth, the total bandwidth of the aggregation port is the sum of the bandwidth of the physical
member ports;
(2)
Support the traffic balancing strategy, according to which traffic can be allocated to each member link;
(3)
Support link backup. When a member link in the aggregation port is disconnected, the system will
automatically allocate the traffic of the member link to other effective member links in the aggregation
port.
2.7.1.2
LACP
Link Aggregation Control Protocol (LACP) based on IEEE802.3 AD standard is a Protocol for dynamic
Link Aggregation. If the port is enabled by the LACP protocol, the port sends the LACPDU to announce its
system priority, system MAC, port priority, port number, operation key, etc. After receiving the LACP
message of the opposite end, the connected device compares the system priority of both ends according
to the system ID in the message. At one end of the system ID higher priority, will be in accordance with the
port ID, in order of priority from high to low set aggregation group within the port is in a state of
aggregation, and issue the updated LACP packets, the terminal device after receiving the message, will
set the corresponding port into the aggregation state, so that the two sides on the exit port or join
aggregation group to achieve consistently. Only when both ports have completed the dynamic
aggregation binding operation can the physical link forward the datagram.
After the LACP member port link is bound, periodic LACP message interactions are also conducted.
When the LACP message is not received for a period of time, the packet receipt timeout is considered,
the member port link is unbound, and the port is again in the non-forwarding state. There are two modes
of timeout: long timeout mode and short timeout mode. In the long timeout mode, a packet is sent at an
interval of 30 seconds. If the opposite packet is not received within 90 seconds, it will be in the packet
receiving timeout. In the short timeout mode, a packet is sent at an interval of 1 second between ports,
and if the opposite packet is not received within 3 seconds, it is in the packet receiving timeout.
Figure 2-19 port aggregation model
P32S36GM Configuration Guide
29
Configuration Items
Instructions
Global
configuration
Name
Load balancing algorithm
Value
DST - MAC
Equalize by destination MAC address.
SRC - MAC
Equalize according to the source MAC address.
SRC - DST - MAC
Balance by source MAC address and destination MAC.
DST IP -
Equalize by destination IP address.
SRT - IP
Balancing based on source IP addresses.
SRC - DST - IP
Balance based on source IP address and destination IP address.
DST - port
Equalize according to the L4 TCP/UDP destination port number.
As shown in figure 2-19, switch A and switch B are connected through three ports. The system priority of
switch A is 61440, and the system priority of switch B is 4096.Open the LACP port aggregation on the
three directly connected ports of switch A and B, set the aggregation mode of the three ports as the active
mode, and set the port priority of the three ports as the default priority 32768.
After receiving to end LACP message, switch B found their system ID is higher priority (switch B of A
higher priority than switches) system, and in accordance with the order of the port ID priority (port under
the condition of the same priority, according to the order of the port since the childhood) set port 4, 5, and
6 in the aggregation state. When switch A receives the updated LACP message from switch B, it finds that
the system ID of the opposite end has A higher priority, and the ports are set to aggregate state, and ports
1, 2 and 3 are set to aggregate state.
2.7.2Configure the Aggregation Port
Configuration steps:
(1)
select [interface] [port aggregation] in the menu, enter the port aggregation configuration interface,
and select load balancing algorithm in the global configuration interface, as shown in figure 2-20, and
parameter description is shown in table 2-6.à
Figure 2-20 global configuration interface for port aggregation
Table 2-7 global configuration parameter description
P32S36GM Configuration Guide
30
SRC - port
Equalize according to the L4 TCP/UDP source port number.
SRC - DST port
The L4 TCP/UDP source and destination port Numbers are
balanced.
Application
Click on the enable
Configuration Items
Instructions
Aggregate
member port
Name
Corresponding port number
ID
The ID of the aggregation port member
Model
Manual
Set to manual mode
The Active
This port initializes the LACP aggregation operation
Passive
The port will not initiate the LACP aggregation operation actively, but
passively participate in the LACP calculation after receiving the neighbor's
LACP packet.
Application
Click on the enable
Remove
Click clear the physical port
(2) in the aggregation port member, configure the "ID" and "mode" of the corresponding port, and
click "apply" to complete the configuration, as shown in FIG. 2-21 and table 2-8 of parameter
description.
Figure 2-21 aggregation port member configuration interface
Table 2-8 parameter description of aggregation member port configuration
After the configuration is completed, the aggregation port ID and member port information that have been
successfully created will be displayed in the interface of the aggregation port, as shown in figure 2-22,
and the parameter description table 2-9.
P32S36GM Configuration Guide
31
Configuration Items
Instructions
The
aggregation
mouth
ID
The ID of the aggregation port.
Name
Name of polymerization port
Members
The specific aggregator member name.
Figure 2-22 aggregation interface display
Table 2-9 parameters of polymerization port
2.7.3Configuration Examples
1.
Networking requirements
•
Switch A and Switch B connect to each other through their layer 2 Ethernet ports eth0/1 through eth/0/3,
as shown in figure 2-23.
•
Switch A and Switch B are connected by three physical links.On Switch A and Switch B, ports are
configured as port aggregation groups, so that the outgoing/incoming load is Shared among member
ports.
Figure 2-23 port aggregation example
2.
Configuration steps
Load sharing can be achieved using both static and dynamic aggregation groups. The configuration
methods for both groups are described below.
(1)
method 1: configure static aggregation groups
Step 1: select [interface] [port aggregation] in the menu to enter the port aggregation
configuration interface.à
Step 2: in the global configuration item, select "load balancing algorithm" as src-ip, and click "apply"
button to save the configuration, as shown in figure 2-24.
Figure 2-24 global configuration
Step 3: from the aggregation port member, select eth0/1, ID is "1", mode select "Manual", and click
"apply" to save the configuration.
P32S36GM Configuration Guide
32
Figure 2-25 aggregation member port static configuration
After configuration, you can see the successful aggregation port 1 created in the aggregation port, as
shown in figure 2-26.
Figure 2-26. Create a successful static aggregation port
Step 4: click the "save" button in the menu to save the current configuration.
(2)
method 2: configure dynamic aggregation groups
Step 1: select [interface] [port aggregation] in the menu to enter the port aggregation
configuration interface.à
Step 2: in the global configuration item, select "load balancing algorithm" as src-ip, and click "apply"
button to save the configuration, as shown in figure XXX.
Figure 2-27 global configuration
Step 3: from the aggregation port member, select eth0/1, ID is "1", mode select "Manual", click "apply" to
save the configuration, and use the same operation to complete the configuration of eth0/2 and eth0/3
successively, as shown in figure XXX.
Figure 2-28 aggregate member port dynamic configuration
After configuration, you can see the successful aggregation port 1 created in the aggregation port, as
shown in figure 2-29.
Figure 2-26. Create a successful dynamic aggregation port
Step 4: click the "save" button in the menu to save the current configuration.
P32S36GM Configuration Guide
33
2.8 Management of PoE
• Switches with PoE modules only support PoE features.
• Non-PoE switches, PoE functions are displayed in Web pages, but no configuration is allowed.
2.8.1 Introduction of PoE
The PoE (Power over Ethernet) refers to the remote Power supply of the equipment via the Ethernet port
by connecting the twisted pair of wires to the external PD (Powered Device).
PoE system composition
The PoE system is shown in figure 2-27, including PoE Power supply, PSE (Power Sourcing Equipment),
PI (Power Interface) and PD.
Figure 2-27 PoE system
1.
The PoE power supply
PoE power supplies the entire PoE system.
2.
The PSE
PSE is the device that directly powers the PD. PSE comes in two flavors: Endpoint (Endpoint) and Midspan
(Endpoint): PSE integrates with the switch, and PSE and the switch are independent. PSE of our company
adopts built-in methods. PSE supports main functions including finding and detecting PD, classifying PD,
supplying power to it, power management, and detecting whether the connection with PD is disconnected,
etc.
3.
The PI,
PI refers to Ethernet interfaces with PoE power supply capability, also known as PoE interfaces, including
FE and GE interfaces.
PoE interface remote power supply has two modes:
Signal line power supply mode: PSE USES 3/5 type twisted pair (1, 2, 3, 6) to transmit data to PD and
direct current at the same time. Idle line power supply mode: PSE USES 3/5 type twisted pair of wires (4,
5, 7, 8) that are not used for data transmission to transmit direct current to PD.
P32S36GM Configuration Guide
34
Configuration Items
Explanation
4.
PD
PD is the device that receives PSE power, such as IP phone, wireless AP (Access Point), portable device
charger, card reader, network camera and so on.
PD equipment can be connected to other power sources while receiving PoE power supply for power
redundancy backup.
2.8.2 Configuration PoE
Before configuring PoE functions, make sure that the PoE power supply or PSE is in a normal operating state, otherwise
you may not be able to configure or configure the PoE
The function does not work.
PoE configuration steps:
(1)
Select [interface] -> [PoE management] in the menu to enter the PoE management interface.
(2)
Set the maximum power in PoE global configuration, and click "apply" to complete the
configuration, as shown in figure 2-28.
Figure 2-28 PoE global configuration
PoE global configuration parameters are described in table 2-10.
Table 2-10 PoE global configuration parameter descriptions
P32S36GM Configuration Guide
35
The most powerful
By default, the default power provided by the device is 15.4w * port number. For example,
the maximum power provided by 8-port device is 123.2w.
If the maximum power of PoE power supply is less than the maximum output powerof the
equipment, the maximum output power of PoE power supply should be set to-10w (mainboard
power consumption) in order to prevent the power of the equipment from exceeding the PoE
power rating and causing overcurrent of PoE power supply.
Consumed
power
Shows the total power consumed by the PoE.
Power supply
management
The default is energy saving mode, and the power allocated for each port is calculated by
the actual consumed power. PSE will allocate the excess power to other ports by default.
Port mode
The default is DC disconnect mode.
Number of power
supply ports
Displays the number of ports currently powered.
Compatibility mode
ON/OFF, default to OFF.
OFF: only standard PD devices are supported. The detected resistance is between 19k
and 26.5k, and the detected capacitance is less than 150nF.
ON: supports non-standard PD devices, which can supply power to some PD devices
whose detected resistance and capacitance values exceed the standard values.
This function belongs to the global mode and is effective for all ports. It is necessary to
confirm that the device with port access is PD product, otherwise it is easy to cause wrong
power supply to the access device and cause damage to the device.
(3)
Select the port to be configured, click [edit] to enter the interface configuration interface, and
select "enable/disable" the PoE function of this port, as shown in figure 2-29.
Figure 2-29 PoE interface configuration
(4)
Click the "apply" button to complete the operation and return to the PoE main interface, as shown
in figure 2-30.
P32S36GM Configuration Guide
36
Configuration Items
Instructions
Enable/disable
Set enable or disable PoE power on ports
State
PoE current power supply state, OFF power supply shutdown state, ON power supply state.
Why
-sheldon: the port is Short of power.
Current
Current operating current of the device.
Power
The power consumed by the current device.
Figure 2-30 PoE interface configuration main interface
(5)
Click the "save" button in the menu to save the configuration. The
PoE port status parameters are described in table 2-11.
Table 2-11 PoE parameter description
• The default power supply priority of the system is: the priority decreases with the increase of port number
• When the external power supply of the equipment is insufficient, the PoE interface with high power supply priority shall
be given priority to power supply.
•If PSE power is low, no matter the priority of newly connected PD, it will not close the port that has been supplied, and no
power will be supplied to newly connected PD.
3 Exchange
3.1 A VLAN
3.1.1 Overview
VLAN is short for Virtual Local Area Network, which is a logical Network divided on a physical Network.
This network corresponds to the second layer of the ISO model. Vlans are not partitioned by the physical
location of the network ports. A VLAN has the same properties as a normal physical network, except that
there are no physical location restrictions. The second layer of unicast, broadcast, and multicast frames
are forwarded and diffused within one VLAN without directly entering into other vlans.
Port-based VLAN is the simplest VLAN partition method. Users can divide the ports on the device into
different vlans, and then the messages received from a certain port can only be transmitted in the
corresponding VLAN, so as to realize the isolation of broadcast domain and the division of virtual working
group.
3.1.2Link Type
P32S36GM Configuration Guide
37
Link connection types of ports can be divided into two types according to different processing methods of
VLAN Tag by ports when forwarding messages:
Access:
Messages sent by the port do not carry VLAN Tag, which is generally used to connect with terminal
devices that cannot recognize VLAN Tag, or when different VLAN members do not need to be
distinguished.
Trunk:
For messages sent by the port, messages in the default VLAN do not carry Tag, while messages in other
vlans must carry Tag. Usually used for interconnection between network transmission devices.
Hybrid:
Messages sent by the port can be set with Tag in some vlans and without Tag in some vlans as required.
Hybrid type ports are used for both interconnection between network transport devices and direct
connection to terminal devices.
3.1.3Default VLAN (PVID)
In addition to the vlans that ports allow to pass, you can set the default VLAN for ports. By default,
the default VLAN for all ports is VLAN 1, but the user can configure it as needed.
•
The default VLAN for an Access port is the VLAN to which it belongs.
•
Trunk ports and Hybrid ports allow multiple vlans to pass through and configure the default VLAN.
•
When removing a VLAN, if the VLAN is the default VLAN of a port, the default VLAN of the port will
revert to VLAN 1 for Access port; For Trunk or Hybrid ports, the default VLAN configuration for ports does
not change, meaning they can use a VLAN that no longer exists as the default VLAN.
P32S36GM Configuration Guide
38
Port Type
Processing of received messages
Processing of sending messages
When a packet is received
without Tag
When a message is
received with Tag
The
Access
Adds the default
VLAN to the message
The Tag
•
Receive this
message when the
VLAN is identical to
the default VLAN
•
When the VLAN is
different from the
default VLAN, the
newspaper is
discarded
Remove Tag and send the text
Trunk
•
VLAN columns
allowed when the
default VLAN is on
the port When the
table is in, it
receives the
message and adds
the Tag of the
default VLAN to the
message
•
When the default
VLAN is not in the
list of vlans that the
port allows to pass,
the message is
discarded
•
The VLAN receives
the message when it is
in the list of vlans that
the port allows to
pass through
•
When the VLAN is
not in the list of vlans
that the port allows to
pass, the message is
discarded
•
When the VLAN is the same as the
default VLAN and in the list of vlans that
ports allow to pass through, remove the
Tag and send the text
•
When the VLAN is different from the
default VLAN and the port is allowed to
pass through the VLAN list, keep the
original Tag and send the text
Hybrid
When the VLAN is in the list of vlans that
the port allows to pass, the user can
manually configure whether to remove the
Tag or not by sending the message
•It is recommended that the default VLAN for this end device port be the same as the default VLAN for the connected
end device port.
•It is recommended to ensure that the default VLAN for the port is the VLAN that the port is allowed to pass through. If a
port does not allow a VLAN to pass through, but the default VLAN of the port is that VLAN, the port discards the received
message of the VLAN or the message without VLAN Tag.
3.1.3.1
Port Processing of Messages
After configuring the port connection type and the default VLAN, there are several different conditions for
the port to receive and send messages, as shown in table 3-1.
Table 3-1 port mail message processing
3.1.4 Configuration VLAN
3.1.4.1
Configure the Access port-based VLAN
Table 3-2 VLAN configuration steps based on Access ports
Introduction to VLAN Configuration
P32S36GM Configuration Guide
39
Steps
Configuration Tasks
Instructions
1
Configure the
connection type of the
port
optional
The connection type for the configured port is Access, and by
default, the connection type for the port is Access
2
Create a VLAN
Optionally create one or more vlans
3
Configure the default
VLAN for the port
Configure the default VLAN for Access ports
Steps
Configuration Tasks
Instructions
1
Configure the connection
type of the port
Will choose
The connection type
for the configured port
is Trunk
By default, the port's
connection type is
Access
By default, the Trunk port is
Tagged VLAN (the default VLAN) is VLAN 1
When a Trunk port's Untagged VLAN is changed, the Trunk
port's Untagged VLAN will be automatically Tagged
2
Create a VLAN that needs
to be added to
this Trunk
Optionally create one or more vlans
3
Configure the Trunk to
which the VLAN belongs
Select the Trunk and
add the VLAN
Will choose
Trunk port has only one Untagged VLAN, which is its default
VLAN.
Steps
Configuration Tasks
Instructions
1
Configure the connection
type of the port
Will choose
Configure the
port's
connection type as
Hybrid
By default, the port's
connection type is
Access
Hybrid ports can have multiple Untagged vlans. So,
configure the Hybrid port multiple times through these
two steps
Tagged VLAN will also be available
By default, the Hybrid port's Untagged VLAN is
VLAN 1
2
Create a VLAN that
needs to be added to the
Hybrid port
Optionally create one or more vlans
3
Configure the Trunk to
which the VLAN belongs
Select the Trunk and
add the VLAN
The Hybrid port can have multiple Tagged vlans.
Therefore, Tagged VLAN configured multiple times for
Hybrid ports through these two steps will be valid at the
same
time
Configure a VLAN based on Trunk ports
Table 3-3 VLAN configuration steps based on Trunk ports
Configure vlans based on Hybrid ports
Table 3-4 VLAN configuration steps based on Hybrid ports
3.1.4.2
Configure Ports in the VLAN
P32S36GM Configuration Guide
40
Configuration Items
Instructions
ID
Select the group number of the port mirroring group to configure, and you can create a total of
seven mirroring groups.
The name of the
VLAN name, not configurable, default VLAN 1 is default, VLAN 2 is VLAN0002.
Tagged member port
A port member sends a VLAN message with a Tag.
Tagged member port
A port member sends a VLAN message without a Tag.
The editor
Select the VLAN ID to edit and click this button to enter the edit interface.
Add
Click this button to enter the VLAN add interface.
Delete
Select the VLAN ID to edit, and click this button to remove the VLAN.
The VLAN configuration interface is shown in figure 3-1, and the detailed description of each parameter is
shown in table 3-5.
Figure 3-1 VLAN configuration interface
Table 3-5 VLAN configuration parameters
Configuration steps:
(1)
Select [switch] -> [VLAN] in the menu to enter the VLAN configuration interface, as shown in figure
3-2.
Figure 3-2 VLAN display interface
Figure 3-3 VLAN configuration interface
(2)
Click the "add" button to enter the page as shown in picture 3-3.
(3)
Configure the port members of VLAN, click the "apply" button to complete the operation.
(4)
Click the "save" button in the menu to save the configuration.
3.1.4.3
Configure the VLAN to Which the Port Belongs
The interface configuration interface is shown in figure 3-4, and the detailed description of each
parameter is shown in table 3-6.
P32S36GM Configuration Guide
41
Configuration Items
Instructions
Name
Corresponding port name.
VLAN mode
The Access
Configure the port type to be an Access port.
Trunk
Configure the port type to be Trunk.
Hybrid
Configure the port type to be the Hybrid port.
PVID
PORT-BASE VLAN ID, suitable for Access PORT.
Native Vlan
Native vlans (Native vlans) are Native to the Trunk.
The editor
Select the port to edit and click this button to enter the edit interface.
Figure 3-4 interface display interface
Table 3-6 interface configuration parameters
Configuration steps:
(1)
Select [switch] -> [VLAN] in the menu to enter the interface configuration interface, as shown in
figure 3-4.
(2)
Select the port to be configured and click the "edit" button to enter the interface configuration page.
(3)
Configure the VLAN mode of the port, PVID or Native VLAN. In general, it is recommended
to configure the Native VLAN in the Trunk as 1. The configuration interface is shown in figure 3-
6.
Figure 3-6 VLAN configuration interface
(4)
Click the "save" button in the menu to save the configuration.
3.1.5VLAN Configuration Example
Configuration example:
P32S36GM Configuration Guide
42
Case requirements: Switch A and Switch B connect with each other through trunk. PCS of the same
VLAN can exchange visits, and PCS of different VLANs are forbidden to exchange visits. The network
topology is shown in FIG. 3-7.
Figure 3-7 network topology diagram
Switch A configuration:
Step 1: configure eth0/9 as a Trunk and Native VLAN as a default of 1.
Select [VLAN] in the menu [switch] to enter the interface configuration interface. Select port eth0/9 and
click the "edit" button to enter configuration mode, as shown in figure 3-8.Select Trunk for VLAN mode,
Native VLAN default is 1.
Figure 3-8 interface configuration interface
Step 2: create VLAN 10, VLAN 20, and add VLAN 10 and VLAN 20 to Trunk eth0/9.
Under the Tagged member port, click "add" button to enter the VLAN editing interface, as shown in figure
3-9. Enter "10,20" in the dialog box, select port eth0/9 from Tagged member port, and click "apply" button
to complete the configuration.
Figure 3-9 VLAN configuration interface
Step 3: configure port eth0/1 VLAN mode for Access and PVID 10.
Switch Web Configuration Guide
43
Under the “Interface” section, select eth0/1 and click the "edit" button to enter the interface configuration
interface, as shown in figure 3-10. VLAN mode is the default Access and PVID is configured at 10.Click
the "apply" button to complete the configuration.
Figure 3-10 VLAN configuration interface
Step 4: configure port eth0/2 VLAN mode for Access and PVID 20.
In step 3, set eth0/2's VLAN mode to Access and PVID to 20.Click [apply] to complete the configuration,
and the VLAN interface is shown in figure 3-11:
Figure 3-11 VLAN interface
Step 5: click the "save" button in the menu to save the configuration.
Switch B configuration:
Eth0/9 and eth0/10 are configured with the Switch A. Create VLAN 10 and VLAN 20 and complete the
corresponding port configuration. After configuration, the VLAN interface is shown in figure 3-12.
Figure 3-12 VLAN interface
Switch Web Configuration Guide
44
3.2 ERPS
3.2.1 ERPS Function Overview
ERPS (Ethernet Ring Protection Switching protocol) is a network Protection protocol developed for the ITU,
also known as g.8032.It is a link layer protocol for Ethernet ring networks. It can prevent broadcast storms
caused by the data loop when the Ethernet is complete and quickly restore communication between the nodes
of the Ethernet when one link is disconnected.
At present, STP is another technology to solve the problem of two-layer network loop. STP is more mature, but
its convergence time is longer (second level). ERPS is a link-layer protocol specially used in Ethernet ring
networks. The two-layer convergence performance is up to 50ms, which has a faster convergence rate than
STP.
Figure 3-13 typical ERPS networking
3.2.2Introduction to ERPS Principle
ERPS is a standard ring network protocol dedicated to Ethernet link layer. Only two ports can join the same
ERPS ring on each layer switching device. In an ERPS ring, to prevent a loop from appearing, you can start a loop
breaking mechanism that blocks the RPL owner port and eliminates the loop. When link failure occurs in the ring
network, the equipment running ERPS protocol can quickly release blocking ports, perform link protection
switching, and restore link communication between nodes in the ring network. This section mainly
introduces the basic implementation principle of ERPS under single-ring networking in the form of example
according to the process of link normal-> link fault-> link recovery (including protection switching operation).
3.2.2.1
As shown in figure 3-14, all devices on the Switch A ~ Switch E circuit communicate normally.
FIG. 3-14 normal ERPS link
Normal Links
Switch Web Configuration Guide
45
To prevent loop generation, ERPS first blocks the RPL owner port, which is also blocked if the RPL neighbor
port is configured, so that other ports can normally forward traffic.
3.2.2.2 Link Fault
As shown in figure 3-15, when the link between Switch D and Switch E fails, the ERPS protocol starts the
protection switching mechanism, blocks the ports at both ends of the fault link, and then releases the RPL
owner port. The two ports resume the receiving and sending of user traffic, thus ensuring the uninterrupted
traffic.
Figure 3-15 ERPS link failure
Switch Web Configuration Guide
46
3.2.2.3 Link Recovery
When the link returns to normal, ERPS rings are configured with a backcut mode by default, and the device
that owns the RPL owner port re-blocks traffic on the RPL link, and the original fault link is reused to complete
the transfer of user traffic.
3.2.2.4 ERPS Ring Types
Single Ring:
For example, in figure 3-16, there is only one ring in the network topology; only one RPL Owner; only one RPL
link; All nodes need to have the same RAPS managed VLAN
= All devices in the ring need to support ERPS.
= Links between devices in the ring network must be directly connected, without intermediate equipment.
Figure 3-16 ERPS single-loop model
Tangent Ring:
An application scenario in which two or more rings sharing a single device in a network topology needs
protection. For example, in figure 3-17, two rings in the network topology share one device. Each ring has
one and only one blocking point, and each ring has one and only one RPL link. Different rings need to
have different RAPS management VLANs.
= All devices in the ring need to support ERPS.
= Links between devices in the ring network must be directly connected, without intermediate
equipment.
FIG. 3-17 ERPS tangential ring model
Switch Web Configuration Guide
47
Intersecting Rings:
In a network topology, two or more rings share a link (the two intersecting nodes must be directly connected,
and no other nodes are allowed).Take figure 3-18 as an example, there are two rings in the network
topology. Each ring has one RPL owner node and each ring has one RPL link. Different rings need to have
different RAPS management VLANs.
= All devices in the ring need to support ERPS。
= Links between devices in the ring network must be directly connected, without intermediate
equipment。
Figure 3-18 ERPS intersecting ring model
3.2.3 ERPS configuration profile
•
The spanning tree protocol and the ERPS protocol cannot be turned on at the same time.
3.2.3.1 ERPS Management Interface
Click [exchange] -> [ERPS] in the menu to enter the ERPS overview interface, as shown in figure 3-19, and
the specific description of parameter information is shown in table 3-8.
Figure 3-19 ERPS overview interface
Switch Web Configuration Guide
48
Configuration Item
instructions
Naming
The name of the ERPS ring
Ring Number
Number of ERPS rings
State
The current state of the ERPS ring, including:
Idle: idle state, no fault, cutback already
Pending: no fault Pending backcut
Protection: failure condition Protection
Previous Event
Recent state machine events, including:
RAPS-NR: remote fault recovery event
RAPS-NR-RB: remote backcut event
RAPS-SF: remote fault event
LOCAL-SF: LOCAL fault event
LOCAL-CLEAR-SF: local fault recovery event
WTR-EXP: local callback event
East interface
Eastward interface of ERPS ring
West Interface
Westward interface of ERPS ring
Cut Back
When the fault link resumes, you can choose to manually cut back immediately,
otherwise the system will automatically cut back after 5 minutes
Table 3-7 description of ring configuration parameters
Switch Web Configuration Guide
49
Configuration
Items
instructions
Ring number
ERPS ring ID, which can be any number. Each ERPS ring must have a unique ring
number.
East interface
Specifies that a port on the switch is an
eastbound port
East port and west port are relatively
defined, without strict distinction, that
is, the loop can enter and exit at this
point.
West interface
Specifies that a port on the switch is a
westbound port
3.2.3.2 ERPS Ring Configuration
In the ERPS interface, click the "configure" button in the upper left corner to enter the ERPS ring
configuration interface. Click the "add" button to add ERPS ring. After the configuration is completed, click
the "apply" button, as shown in FIG. 3-20.
Figure 3-20 ERPS ring configuration
Table 3-8 configuration parameters
After the configuration is completed, return to the ERPS ring configuration interface. Click the "delete"
button after the ring entry to delete the ERPS ring, as shown in figure 3-21.
Figure 3-21 ERPS ring configuration
Switch Web Configuration Guide
50
Configuration
items
instructions
Naming
Instance names, string format, need to be unique, such as number "1", character
"aa"
ID
Configure VLAN Instance for ERPS Instance protection; All VLANs belong to
Instance 0 by default; The default id is 0.
Ring Number
The associated ring ID must be the ring already created
Level
ERPS priority, default is 0
RAPS Management
VLAN
Each switch in the same ring must be configured with the same RAPS management
VLAN for transmitting ERPS protocol messages.
A RAPS management VLAN can be a virtual VLAN, requiring a distinction from a
data VLAN, without the need for actual creation.
Data VLAN
ERPS data VLANs, setting up the VLANs that are allowed to transfer in the ERPS
ring. Must be an existing VLAN if
It does not exist please add in VLAN configuration;
Support VLAN Range class configuration, such as "1-3,5" for VLAN 1,2,3,5;
The Owner
Interface
Main ring ERPS Owner node, can choose east interface or west interface as Owner
node.
Each ERPS ring has only one device configured as an RPL owner node that controls
the end that needs to be blocked
Sub - Ring
Blocking Mouth
Sub - ring blocking mouth, a sub - ring only a blocking mouth, you can choose east
or west.
This parameter needs to be configured only when the ring is tangential, and the subring of the two devices whose rings are tangential must have a
3.2.3.3 ERPS Instance Configuration
Click the "+ add" button of ERPS instance configuration to enter the interface. After the configuration is
completed, click the "apply" button, as shown in figure 3-22. Specific parameters of the instance
configuration are described in table 3-9.
Figure 3-22 ERPS instance configuration
Table 3-9 Ring Configuration Parameters
Switch Web Configuration Guide
51
sub-ring blocking port.
Associated
Instance
Only need to configure the sub-ring blocking port, set to the ring ID tangent to the
current sub-ring
3.2.4 Examples of Single Ring Configuration
Case requirements:
A ring network with 3 switches, as shown in Figure 3-21, the default blocking port is configured to be the
eth0/9 port of S1. When a failure occurs, the link can be restored in time to ensure that the network is
available. The data VLAN is 1, 2, 3.
Figure 3-23 ERPS network topology
3.2.4.1 Configure Switch S1
Step 1: configure ports 9 and 10 for trunk ports and Native VLAN for default value 1.
Select [VLAN] from the sub-item of [switch] in the menu to enter the interface configuration interface,
select ports eth0/9 and eth0/10, and click the [edit] button to enter the configuration mode, as shown in
figure 3-24.Select "Trunk" for VLAN mode, Native VLAN defaults to "1".
Figure 3-24 port configuration interface
Click the "apply" button, and the interface returned is shown in figure 3-25.
Figure 3-25 port status display interface
Switch Web Configuration Guide
52
Step 2: create VLAN 2, 3, 4 and add VLAN 2, 3, 4 to Trunk ports eth0/9, eth0/10.
In the VLAN interface, as shown in Figure 3-26, click the [Add] button, enter "2-4" in the ID, and check eth0/9
and eth0/10 for the Tagged member port
Figure 3-36 create VLAN 2, 3, and 4
Click the "apply" button, and the interface returned is shown in figure 3-27.
Figure 3-27 port status display interface
Step 3: Create ERPS ring ID, set east-west interface.
Select [ERPS] in the menu [exchange] and enter the ERPS configuration interface. Click the button [+
add] to enter the ERPS ring configuration interface, as shown in figure 3-28.The ring number is set to "1",
the east interface to "eth0/9", and the west interface to "eth0/10".
Figure 3-28 ERPS ring configuration interface
Click the "apply" button to return to the following page, as shown in picture 3-29.
Figure 3-29 ERPS ring configuration display interface
Switch Web Configuration Guide
50
Step 4: create an ERPS instance and set the ring name, number, blocking port and other parameters.
In the ERPS configuration interface, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration interface, as shown in figure 3-30.Name "1", ring number "1", level "0", RAPS
management VLAN "1000", Owner interface "East", sub ring blocking port "None".
Figure 3-30 ERPS instance configuration interface
Click the "apply" button to return to the following page:
Step 5: select the "save" button on the navigation bar and save the configuration.
•
In the case of single ring, only one blocking point needs to be set, and the choice of blocking point is generally
considered in the middle of the ring.
3.2.4.2 Configure Switch S2 and S3
Step 1: configure ports 9 and 10 for trunk and Native VLAN for default value 1.
Select [VLAN] in the menu [switch] to enter the interface configuration interface, select ports "eth0/9" and
"eth0/10", click the "edit" button to enter the configuration mode, as shown in the figure. Select "Trunk" for
VLAN mode, Native VLAN defaults to "1".
Step 2: Create VLAN 2, VLAN 3, and add VLAN 2 and VLAN 3 to Trunk ports eth0/9 and eth0/10.
In the VLAN interface, click the [Add] button, enter "2-3" in the ID, and check eth0/9 and eth0/10 for the
tagged member ports.
Switch Web Configuration Guide
51
Step 3: create the ERPS ring and set up the thing interface.
Select [ERPS] in the menu [exchange] and enter the ERPS configuration interface. Click the button [+ add] to
enter the ERPS ring configuration interface, as shown in figure 3-27.The ring number is set to "1", the
eastern interface to "eth0/9", and the western interface to "eth0/10".
Step 4: create an ERPS instance.
In the ERPS configuration interface, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration interface, as shown in figure 3-32.Name "1", ring number "1", level "0", RAPS
management VLAN "1000", Owner interface "None", sub ring blocking port "None". Figure 3-32 ERPS
instance configuration display interface
Unlike S1, S2 and S3 are in the break point Owner interface =None.
Step 5: select the "save" button on the navigation bar and save the configuration.
3.2.5 Examples of Tangential Ring Configuration
The topology diagram is shown in Figure 3-33. S1 is located in the central computer room and can be
supervised and maintained by the administrator in real time. It has high reliability; S2-S5 is distributed in
various deployment points. In order to improve the reliability of the network, avoid single The single-point
failure risk of the link external connection, while avoiding the single-machine failure risk that may occur
when the dual-link external single-machine is connected, the dual-link external connection forms a ring
network. The data VLANs are 1, 2, 3, and 4, and each ring network is required to converge quickly when
a single point of failure occurs to avoid user network interruption.
Figure 3-33 network topology
3.2.5.1 Divide Main Ring and Sub-Ring
Switch Web Configuration Guide
52
parameter
equipmen
t
Ring
numbe
r
RAPS VLAN
The
Own
er interface
Sub - ring
blocking
mouth
Associated instance
Switch S2
1
1000
Eth0/9
None
\
Switches S3
1
1000
None
None
\
Switch S1
1
1000
None
None
\21001
None
None
\
Switches S4
2
1001
Eth0/9
None
\
Switch the S5
2
1001
None
None
\
•
The ring ID of the primary and subring must be different.
•
The RAPS management VLANs within the primary and subring must be different.
There is no strict distinction between the main ring and the sub-ring. Generally once one of the main rings
is assumed, and the other is a sub-ring. In this example, the ring composed of S1, S2 and S3 is defined as
the main ring, the ring number is "1", the blocking port is "eth0/9" of S2, the RAPS management VLAN is
"1000", the ring composed of S1, S4 and S5 is a sub-ring, the ring number is "2", the blocking port is
"eth0/9" of S4, and the RAPS management VLAN is "1001", the specific parameters are shown in table 3-
10.
Table 3-10 equipment parameters chart
3.2.5.2 Configure Switch S1
Step 1: configure ports 9, 10, 11, 12 as trunk ports and Native VLAN as default value 1.
Select [VLAN] from the sub-item of [switch] in the menu to enter the VLAN configuration interface. In the
interface configuration item, select ports eth0/9, eth0/10, eth0/11, eth0/12, and click the edit button to enter
the configuration mode, as shown in figure 3-34.Select "Trunk" for VLAN mode, Native VLAN defaults to
"1".
Figure 3-34 port configuration interface
Click the "apply" button, and the return to the Interface as shown in figure 3-35.
Figure 3-35 port status display interface
Switch Web Configuration Guide
53
Step 2: create VLAN 2, 3, 4 and add VLAN 2, 3, 4 to Trunk ports eth0/9, eth0/10, eth0/11, and eth0/12.
Tagged member ports are Tagged with eth0/9, eth0/10, eth0/11, and eth0/12.
Figure 3-36 create VLAN 2, 3, and 4
Click the "apply" button, and the interface returned is shown in figure 3-37.
Figure 3-37 port status display interface
Step 3: create the ERPS main ring and subring and set up the east-west interface.
(1)
Create the main ring
Select [ERPS] in the menu [exchange] and enter the ERPS configuration interface. Click the button [+
add] to enter the ERPS ring configuration interface, as shown in figure 3-38.The ring number is set to "1",
the eastern interface to "eth0/9", and the western interface to "eth0/10".
Figure 3-38 creates the ERPS main ring
(2)
Create subrings
Switch Web Configuration Guide
54
Select [ERPS] in the menu [exchange] and enter the ERPS configuration interface. Click the button [+
add] to enter the ERPS ring configuration interface, as shown in figure 3-39.The ring number is set to "2",
the eastern interface to "eth0/11", and the western interface to "eth0/12".
Figure 3-39 creates an ERPS subring
Click the "apply" button to return to the following page:
Figure 3-40 ERPS ring configuration display interface
Step 4: create an ERPS instance
(1)
Create ERPS instance 1
In the ERPS interface, select the instance configuration and click [+ add] button to enter the ERPS
instance configuration interface, as shown in figure 3-41.Name "1", ring number "1", level "0", RAPS
management VLAN "1000", Owner interface "None", sub ring blocking port "None".
Figure 3-41 ERPS instance configuration interface
(2)
Create ERPS instance 2
In the ERPS configuration interface, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration interface, as shown in figure 3-42.Name "2", ring number "2", level "0", RAPS
management VLAN "1001", Owner interface "None", sub ring blocking port "None".
Figure 3-42 ERPS instance configuration interface
Switch Web Configuration Guide
55
Click the "apply" button to return to the following page, as shown in picture 3-43:
Step 5: select the "save" button on the navigation bar and save the configuration.
3.2.6 Intersecting Ring Configuration Example
As shown in Figure 3-60, S1, S2, S3, and S4 form an intersecting ring, and the data VLAN is 1, 2, 3, and
4. It is required that rapid convergence can be achieved when a single point of failure occurs in each ring;
the network can at most have two failure points (different rings) without user disconnection, achieving
optimal reliability.
Figure 3-60 ERPS intersecting ring
3.2.6.1 Divide Main Ring and Sub-Ring
Switch Web Configuration Guide
60
parameter
equipmen
t
Ring
numbe
r
RAPS VLAN
The
Own
er interface
Sub - ring
blocking
mouth
Associated instance
Switch S1
1
1000
None
None
\21001
None
Eth0/9
1
Switch S2
1
1000
None
None
\21001
None
Eth0/10
1
Switches S3
1
1000
Eth0/9
None
\
Switches S4
2
1001
Eth0/9
None
\
•
The ring ID of the primary and subring must be different.
•
The RAPS management VLAN within the primary and subring must be different
•
In the sub-ring, the port corresponding to the link where the main ring intersects with the sub-ring must be set as the blocking
port, and the associated instance is set as the main ring.
There is no strict distinction between the main ring and the sub-ring. Generally one of the main rings is
assumed, and the other is a sub-ring. In this example, the ring composed of S1, S2 and S3 is defined as
the main ring, the ring number is "1", the blocking point is S3 eth0/9 port, and the RAPS management
VLAN is "1000".The ring composed of S1, S2 and S4 is a sub-ring, the ring number is "2", the breaking
point is eth0/9 port of S4, the RAPS management VLAN is "1001", and the intersecting link of the two rings
is eth0/9 of S1 to eth0/10 of S2.Specific parameters are described in table 3-11.
Table 3-11 equipment parameters list
3.2.6.2 Configure Switch S1
Step 1: Configure ports 9, 10 and 11 as trunk ports and Native VLAN as default value 1.
Select [VLAN] from the sub-item of [switch] in the menu to enter the VLAN configuration interface. Under the
interface configuration option, check ports eth0/9, eth0/10 and eth0/11, and click the edit button to enter the
configuration mode, as shown in figure 3-61.Select "Trunk" for VLAN mode, Native VLAN defaults to "1".
Figure 3-61 port configuration interface
Click the "apply" button, and return to the “Interface” section as shown in figure 3-62.
Figure 3-62 port status display interface
Switch Web Configuration Guide
61
Step 2: Create VLAN 2, VLAN 3, and VLAN 4, and add VLAN 2, 3, and 4 to Trunk ports eth0/9, eth0/10, and
eth0/11.
In the VLAN interface, click the [Add] button, enter "2-4" in the ID, and select eth0/9, eth0/10, and eth0/11 for
the tagged member ports.
Figure 3-63 create VLAN 2, 3, and 4
Click the "apply" button, and the interface returned is shown in figure 3-64.
Figure 3-64 VLAN state display interface
Step 3: Create the ERPS main ring and subring and set up the thing interface.
(1)
Create the main ring
Select [ERPS] in the menu [exchange] and enter the ERPS configuration interface. Click the button [+
add] to enter the ERPS ring configuration interface, as shown in figure 3-65.The ring number is set to "1",
the eastern interface to "eth0/9", and the western interface to "eth0/10".
Figure 3-65 ERPS ring configuration interface
(2)
Create subrings
Select "ERPS" from the "switch" sub-item in the menu and enter the ERPS configuration interface. Click "+
add" button to enter the ERPS ring configuration interface, as shown in figure 3-66.The
Switch Web Configuration Guide
62
ring number is set to "2", the eastern interface to "eth0/9", and the western interface to "eth0/11".Note that
the eth0/9 (eastern interface) of the subring needs to be configured as a subring interrupter.
Figure 3-66 ERPS ring configuration interface
Click the "apply" button to return to the following page:
Figure 3-67 ERPS ring configuration display interface
Step 4: create an ERPS instance and set up the blocking port.
(1)
create ERPS instance 1
In the ERPS configuration interface, select the instance configuration and click [+ add] button to enter the ERPS
instance configuration interface.
Figure 3-68 ERPS instance configuration interface
As shown in figure 3-68, name "1", ring number "1", level "0", RAPS management VLAN "1000", Owner
interface "None", sub ring blocking port "None".
(2)
Create ERPS instance 2
In the ERPS configuration interface, select the instance configuration and click [+ add] button to enter the
ERPS instance configuration interface, as shown in figure 3-69.Name "2", ring number "2", level "0", RAPS
management VLAN "1001", Owner interface "None", sub ring blocking port "East", associated instance
select "1".
Figure 3-69 ERPS instance configuration interface
Switch Web Configuration Guide
63
Click the "apply" button to return to the following page:
Step 5: select the "save" button on the navigation bar and save the configuration.
Switch Web Configuration Guide
68
3.3 IGMP Snooping
3.3.1 Overview
IGMP Snooping is the abbreviation of Internet Group Management Protocol Snooping. It is a multicast
restriction mechanism running on Layer 2 devices and used to manage and control multicast groups.
The Layer 2 device running IGMP Snooping analyzes the received IGMP messages, establishes a
mapping relationship between ports and MAC multicast addresses, and forwards multicast data according
to this mapping relationship. When the Layer 2 device is not running IGMP Snooping, the multicast data is
broadcast at Layer 2. When the Layer 2 device is running IGMP Snooping, it is known that the multicast
data of the multicast group will not be broadcast at Layer 2, but at Layer 2. It is multicast to the designated
receiver.
As shown in Figure 3-83, when the Layer 2 multicast device is not running IGMP Snooping, IP multicast
packets are broadcast in the VLAN; when the Layer 2 multicast device is running IGMP Snooping, IP
multicast packets are only sent To group member recipients..
Figure 3-83 how IGMP Snooping works
3.3.2 IGMP Snooping configuration
3.3.2.1 IGMP global configuration instructions
(1)
Select "IGMP Snooping" in the menu, and click the "configuration" TAB to enter the global
configuration page of IGMP Snooping, as shown in figure 3-84.
(2)
Click the IGMP Snooping "disabled" button to enable the global IGMP Snooping function.
(3)
Click the "disabled" button to enable discarding unknown multicast function.
Figure 3-84 IGMP global configuration interface
Switch Web Configuration Guide
69
Configuration items
instructions
IGMP Snooping
IGMP Snooping
Turns on/off the IGMP Snooping function, which is turned off by
default.
Discard unknown
multicast
Turn on/off discard unknown multicast function
An unknown multicast data packet is defined as a forwarding item that
does not exist in an IGMP Snooping forwarding those multicast data
packets:
• When enable discards the unknown multicast datagram function, the
switch discards all received unknown groups
Broadcast data message
• Switch will be in the location of unknown multicast datagram when
discarding unknown multicast datagram functionality is forbidden
Belong to the VLAN broadcast within the paper
Topological
change suppression
Turn on/off topology change suppression
Configuration items
instructions
IGMP routing
mouth
VID
The ID of the VLAN to which the multicast table entry belongs
Interface
All member ports
Delete
Delete the IGMP route
Table 3-11 global configuration parameter description
3.3.2.2 IGMP Routing Port Configuration Instructions
(1)
select > [IGMP Snooping] in the menu, and click the "configuration" TAB to enter the IGMP routing
port display page, as shown in figure 3-85.
Figure 3-85 IGMP routing port display interface
Table 3-12 IGMP routing port parameters
Switch Web Configuration Guide
70
Configuration items
instructions
IGMP static
group
VID
The ID of the VLAN to which the multicast table entry belongs
Group address
Multicast group address
Source address
Multicast source address
Interface
All member ports
Delete
Delete the IGMP static group
(2)
Click the "add" button to enter the interface of setting IGMP routing port, as shown in figure 3-86.
Configure Vid and select the port to be applied. Click the "apply" button to complete the configuration.
Figure 3-86 IGMP routing interface configuration
3.2.2.3 IGMP Static Group Configuration Instructions
(1)
Select [switch] -> [IGMP Snooping] in the menu, and enter the IGMP static group display page, as shown
in figure 3-87.
Figure 3-87 IGMP static group display interface
Table 3-13 IGMP static group parameter description
(2)
click the "add" button to enter the IGMP static group setting interface, as shown in figure 3-88.Configure
vids, group addresses, source addresses, and interface names. Click the "apply" button to complete the
configuration.
Figure 3-88 IGMP static group configuration interface
3.3.3 Examples of Configuration
Configuration example
Case requirements:
Video server uses 225.0.0.1 as the multicast source and applies multicast data stream to play video. Users click
to play video as needed. Video message flow exists in the network only in the server-on-demand client channel,
and no duplicate or invalid flow is allowed to maximize the utilization of network bandwidth. The network topology
is shown in figure 3-89, in which the three-layer switch is used as the multicast routing device to directly connect
Switch Web Configuration Guide
71
the multicast source, enable the multicast routing forwarding function, and configure the multicast routing
protocol (see the corresponding three-layer switch product configuration manual for details).The two-layer
access switch is the user access device. The data VLAN is the default VLAN 1, the upper port is eth0/9, the
lower port is eth0/1 and eth0/2 respectively.
Figure 3-89 IGMP network topology
Step 1: enable the IGMP Snooping function on Switch B.
Select "IGMP Snooping" from the "switch" sub-item in the menu, and enter the configuration screen. Click the
"disable" button after "IGMP Snooping" to enable the IGMP Snooping function, as shown in figure 3-90.
Figure 3-90 IGMP enable configuration interface
Step 2: Enable the function of discarding unknown name multicasts on Switch B (optional)
Select "IGMP Snooping" in the "switch" subitem in the menu, enter the configuration interface, and click "disable"
button after "discard unknown multicast" to enable the function of discarding unknown multicast, as shown in
figure 3-91.
Step 3: configure the IGMP routing port on Switch B (optional)
Select "IGMP Snooping" from the "switch" subitem in the menu, and enter the configuration interface. Click
"add" button under "IGMP routing port" to enter the interface of routing port adding, as shown in figure 3-92.:
Figure 3-92 IGMP routing interface configuration
Click the "ok" button to return to the interface as shown in FIG. 3-93.
Switch Web Configuration Guide
72
Figure 3-93 IGMP routing port display interface
Step 4: configure IGMP static groups under Switch B (optional)
Select "IGMP Snooping" from the "switch" subitem in the menu, and enter the configuration interface. Click
the "add" button under "IGMP routing port" to enter the interface of routing port adding, as shown in figure
xx.:
Figure 3-94 IGMP static group configuration interface
Click the "ok" button to return to the interface as shown in FIG. 3-95.
Figure 3-95 IGMP static group display interface
Step 5: select the "save" button on the navigation bar and save the configuration.
3.4 Spanning Tree
3.4.1 Overview
Spanning tree protocol is a two-layer management protocol, which eliminates the two-layer loop by
selectively blocking redundant links in the network, and has the function of link backup.
Spanning Tree protocols, like many others, are constantly being updated as the network evolves, from the
original STP (Spanning Tree Protocol) to the RSTP (Rapid Spanning Tree Protocol) to the latest MSTP
(Multiple Spanning Tree Protocol).
With layer 2 Ethernet, there can only be one active path between the two LANs, otherwise there will be
a broadcast storm. However, in order to enhance the reliability of a LAN, it is necessary to establish
redundant links, some of which must be in a backup state. If the network fails and another link fails, the
Switch Web Configuration Guide
73
Configuration items
instructions
General Situation
Naming
The name of the interface
The instance
Hardware instance ID
Version
Interface spanning tree protocol version
Role
Interface spanning tree roles, including
Root: Root port, the interface connects to the direction of the Root bridge
Designated: specifies the port that connects to the root port Alternate:
Alternate port, Alternate root port
Backup: Backup port
Disable: interfaces Down or Disable the ports of the spanning tree protocol
State
Interface spanning tree state, including:
Forwarding: forward
Discarding: discard
Learning: Learning
Listening: listen to
The Root Bridge
ID
The root bridge ID
Region Root
Bridge ID
Domain ID root bridge
Designate Bridge
ID
Specify the bridge ID
Remove
Clear negotiated protocol version information
redundant links must be promoted to active state. Controlling such a process manually is obviously a lot of
hard work, and the STP protocol does it automatically. It enables a device in a LAN to do the following:
•
discover and launch an optimal tree topology for the LAN.
•
discover failures and then recover, automatically update the network topology so that the best tree
structure possible is selected at all times.
3.4.2 Spanning Tree Configuration
The spanning tree module provides global configuration, MST configuration, instance, interface and other
configurations of the spanning tree. The state and configuration interface are shown in figure 3-96~101,
and the detailed parameters are shown in table 3-14~18:
Figure 3-96 spanning tree overview
Table 3-14 overview parameter description of spanning tree
Switch Web Configuration Guide
74
Configuration items
instruction
s
Global
configuration
Mode
Set the working mode of STP, including STP, RSTP, and MSTP
STP: in STP mode, each port of the device will send out STP BPDU
messages
RSTP: in the RSTP mode, each port of the device will send out RSTP
BPDU messages. When it is found to be connected with the device
running STP, the port will automatically migrate to the STP
mode
MSTP: in MSTP mode, each port of the device will send out MSTP
BPDU messages. When it is found to be connected with the device
running STP, the port will automatically migrate to STP mode
State
Set whether to enable global STP functionality
BPDU Protection
Set whether to enable global BPDU protection
Enable BPDU protection function can prevent artificial forged
configuration messages malicious attack devices, avoid network
shock
BPDU Filter
Turn on/off BPDU filtering
The Largest Hop
Sets the maximum number of hops for the MST domain, which
determines the size of the MST domain
This parameter will only take effect in the domain if configured
on the domain root, not on the non-domain root
The Forward Delay
Set the delay time for device state migration
Hello Time
Set the period of sending hello message to detect link fault
Max Age
Sets the maximum length of time messages are held on the device
priority
The bridge priority
Forward Threshold
The maximum number of BPDU messages per second sent by the
bridge
Wrong port disable
timeout
Configure the wrong port auto disable feature
Figure 3-97 global configuration interface
Table 3-15 global configuration parameter description
Switch Web Configuration Guide
75
Error port disables
timeout
Time to release the disabled port automatically triggered by wrong
configuration
Configuration items
instructions
The MST
Configuratio
n
Domain name
Set the domain name for the MST domain
By Default, the domain name for the MST domain is "Default"
Revision level
Sets the revision level for the MST domain
Configuration Items
instructions
The Instance
ID
Instance ID
VLAN list
All VLANs associated with the instance, shown as a list
Priority
The priority of the bridge in the current instance
The editor
Click to edit the instance
Delete
Click delete this instance
Figure 3-98 MST configuration interface
Table 3-16 MST configuration parameters
Figure 3-99 instance configuration interface
Table 3-17 example configuration parameter description