DE: Bedienungsanleitung - de.startech.com
FR: Guide de l'utilisateur - fr.startech.com
ES: Guía del usuario - es.startech.com
IT: Guida per l'uso - it.startech.com
NL: Gebruiksaanwijzing - nl.startech.com
PT: Guia do usuário - pt.startech.com
For the latest information, technical specications, and support for
this product, please visit www.startech.com/IES101002SFP.
Manual Revision: 05/25/2015
FCC Compliance Statement
This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses and can radiate radio frequency energy and,
if not installed and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a residential area is
likely to cause harmful interference in which case the user will be required to correct the
interference at his own expense.
This device complies with part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation.
Changes or modications not expressly approved by StarTech.com could void the user’s
authority to operate the equipment.
Use of Trademarks, Registered Trademarks, and other Protected Names and Symbols
This manual may make reference to trademarks, registered trademarks, and other
protected names and/or symbols of third-party companies not related in any way to
StarTech.com. Where they occur these references are for illustrative purposes only and do not
represent an endorsement of a product or service by StarTech.com, or an endorsement of the
product(s) to which this manual applies by the third-party company in question. Regardless
of any direct acknowledgement elsewhere in the body of this document, StarTech.com hereby
acknowledges that all trademarks, registered trademarks, service marks, and other protected
names and/or symbols contained in this manual and related documents are the property of
their respective holders.
Front view ....................................................................................................................................................1
Features ........................................................................................................................................................2
LED indicators ............................................................................................................................................. 5
Web management ..................................................................................6
Congure the switch for the rst time .............................................................................................. 6
Change your password ........................................................................................................................... 7
About the setting options in the Web management UI..............................................................7
Changing the Conguration settings .................................................23
Change the System Information settings .........................................................................................23
Change the System IP settings ............................................................................................................. 23
Change the System IPv6 settings ........................................................................................................ 24
Change the NTP Conguration settings ........................................................................................... 25
Change the Time settings ......................................................................................................................25
Change the Log settings ........................................................................................................................ 27
Change the LED settings ........................................................................................................................ 27
Change the EEE settings ......................................................................................................................... 28
Change the Port settings ........................................................................................................................ 29
Change the User settings ....................................................................................................................... 30
Change the Privilege Levels settings ................................................................................................. 31
Change the Authentication Method settings ................................................................................. 31
Instruction Manual
i
Set up the Secure Shell management interface ............................................................................ 32
Change the Port Isolation settings ..................................................................................................... 92
Change the MAC-based VLAN settings .............................................................................................92
Change the Protocol to Group settings ............................................................................................93
Change the Group to VLAN settings ..................................................................................................94
Change the IP subnet-based VLAN settings ....................................................................................95
Change the Voice VLAN Conguration settings ............................................................................ 96
Change the OUI settings ........................................................................................................................ 97
Change the Port Classication settings ............................................................................................ 98
Change the Port Policing settings.......................................................................................................99
Change the Port Scheduler settings .................................................................................................. 100
Change the Port Shaping settings ...................................................................................................... 101
Change the Port Tag Remarking settings ......................................................................................... 101
Change the Port DSCP settings ............................................................................................................ 102
Change the DSCP-Based QoS settings .............................................................................................. 103
Change the DSCP Translation settings ..............................................................................................104
Change the DSCP Classication settings .......................................................................................... 105
Instruction Manual
iii
Change the QoS Control List settings ................................................................................................ 105
Change the Storm Control settings .................................................................................................... 107
Change the Mirror Conguration settings .......................................................................................108
Change the UPnP settings ..................................................................................................................... 108
Change the sFlow settings.....................................................................................................................109
Changing the Monitor settings ............................................................112
Change the Information settings ........................................................................................................ 112
Change the CPU Load settings .............................................................................................................113
Change the Log settings ........................................................................................................................ 113
Change the Detailed Log settings ...................................................................................................... 114
Change the Detailed Log settings ...................................................................................................... 115
Change the Trac Overview settings ................................................................................................115
Change the QoS Statistics settings ..................................................................................................... 116
Change the QCL Status settings .......................................................................................................... 117
Change the Detailed Statistics settings ............................................................................................ 118
Change the ACL Status settings ...........................................................................................................120
Change the Switch settings................................................................................................................... 121
Change the Port settings ........................................................................................................................ 122
Change the Switch settings................................................................................................................... 123
Change the NAS Statistics Port settings ........................................................................................... 124
Change the ACL Status settings ...........................................................................................................128
Change the Snooping Statistics settings .......................................................................................... 130
Change the Relay Statistics settings...................................................................................................131
Change the ARP Inspection settings .................................................................................................. 132
Change the IP Source Guard settings ................................................................................................ 133
Change the RADIUS Overview settings ............................................................................................ 133
Change the RADIUS Details settings .................................................................................................. 134
Change the RMON Statistics settings ................................................................................................ 135
Change the RMON History settings.................................................................................................... 137
Change the Alarm settings .................................................................................................................... 138
Instruction Manual
iv
Change the System Status settings .................................................................................................... 139
Change the Port Status settings .......................................................................................................... 140
Change the Port Statistics settings ..................................................................................................... 141
Change the Loop Protection settings ................................................................................................ 141
Change the Bridge Status settings ..................................................................................................... 142
Change the Port Status settings .......................................................................................................... 144
Change the Port Statistics settings ..................................................................................................... 144
Change the Statistics settings .............................................................................................................. 145
Change the MVR Channel Groups settings ..................................................................................... 146
Change the MVR SFM Information settings .................................................................................... 146
Change the Snooping Status settings ............................................................................................... 147
Change the Groups Information settings ........................................................................................ 148
Change the IPv4 SFM Information settings ..................................................................................... 149
Change the MLD Status settings ......................................................................................................... 150
Change the Groups Information settings ........................................................................................ 151
Change the IPv6 SFM Information settings ..................................................................................... 151
Change the Neighbours settings ........................................................................................................ 152
Change the LLDP-MED Neighbours settings .................................................................................. 153
Change the EEE settings ......................................................................................................................... 157
Change the Port Statistics settings ..................................................................................................... 159
Change the MAC Table settings ........................................................................................................... 160
Change the VLAN Membership settings .......................................................................................... 160
Change the VLAN Port settings ............................................................................................................ 162
Change the MAC-Based VLAN settings .............................................................................................163
Change the sFlow settings.....................................................................................................................164
Testing the connectivity of the network ............................................166
Change the Ping settings ....................................................................................................................... 166
Change the Ping6 settings.....................................................................................................................166
About device maintenance...................................................................167
Restart the device ..................................................................................................................................... 167
Instruction Manual
v
Restore the factory default settings ................................................................................................... 167
Update your rmware .............................................................................................................................167
Change the Image Select settings ...................................................................................................... 168
Save the switch conguration to an XML le..................................................................................168
Restore the switch to a backup conguration ................................................................................168
Technical Support .................................................................................. 169
Warranty Information ............................................................................169
Instruction Manual
vi
Product diagram
Front view
Gigabit Ethernet RJ45 ports
LED indicators
Rear view
Instruction Manual
Reset button
Console RJ45 port
DC power
1
Gigabit Open SFP slots
Cooling fan
Introduction
This switch is a Web Smart switch equipped with 8 ports 10/100/1000BaseT(X)
and 2 ports Gigabit SFP open slots, and provides a broad range of features for
Layer2 switching. It was designed for easy installation and high performance in an
environment where the trac is on the network and the number of users increases
continuously. The smart and ecient power design is designed to improve power
usage.
Packaging contents
• 1 x 10-port Gigabit Ethernet switch with 2 open SFP slots
• 2 x mounting brackets (1 set)
• 3 x power cords (NA/UK/EU)
• 1 x instruction manual
Features
FeatureDescription
Dual imagesPrevents any kind of upgrading process failure
IPv4Supports IPv4 addressing, management, and Quality of
IPv6Supports IPv6 addressing, management, and Multicast
Power savingLED power management
SecurityPrivate VLAN (static)
Service (QoS)
Listener Discovery (MLD) snooping
Supports local and remote Syslog Server with 3 levels (Info,
Warning, and Error)
802.3az EEE
Access Control Lists (ACLs) for ltering, policing, and port
copy, including an ACL wizard
Instruction Manual
2
AuthenticationTelnet, Web - user name and password
The LED indicators present real-time information about systematic operation status.
The following table provides descriptions of LED statuses and meanings.
LEDStatusDescription
PowerOnSystem is on
OSystem is o
Link or activityBlinkingActivating link and data
OPort is disabled or
disconnected
Instruction Manual
5
Web management
The following section describes the features of the Web Smart switch, including
instructions on how to congure each feature using the Web interface.
Congure the switch for the rst time
Note: You can use the LED activity to check the status of the switch while you
congure it.
To congure the switch, complete the following steps:
1. Place the switch close to the computer that you’re using to complete the
conguration.
2. Connect an Ethernet cable from the port of your computer to any of the ports on
the front panel of the switch.
3. Turn on the switch and observe the LED activity to conrm that the switch is
connected.
4. Change your computer’s IP address so that it’s the same subnet as the switch’s.
The following table describes the default login information:
IP address192.168.2.1
IP mask255.255.255.0
IP router0.0.0.0
Usernameadmin
Password
5. On your computer, open a Web browser and navigate to 192.168.2.1.
6. In the Username eld, type admin.
7. Leave the Password eld blank, and click OK.
Instruction Manual
6
Change your password
After you set up the switch for the rst time, before you congure the switch, you
should change the password.
To change your password, complete the following steps:
1. On your computer, open a Web browser and navigate to 192.168.2.1.
2. In the Username eld, type admin.
3. Leave the Password eld blank, and click OK.
4. Click Security.
5. Click Switch.
6. On the Password tab, enter the old and new passwords.
About the setting options in the Web management UI
The Web management UI includes several elements that you can use to congure the
settings for your switch. These UI elements include text elds, drop-down lists, radio
buttons, and check boxes.
Note: When you change any of the setting options, remember to click Save to apply
your changes.
The following table describes some of the options that are available on the main
screen of the Web management UI:
ButtonDescription
SaveApply your changes to the switch.
ResetRestore the settings to what they were before you saved the changes.
View the Help information for the screen that you’re currently on.
Log out of the Web management UI.
Instruction Manual
7
When you log in to the Web management UI, the default screen that you see is the Port
State Overview screen:
Ports 1 to 8 are Gigabit Ethernet ports, and ports 9 and 10 are the SFP slots. When the
port image is green, it means that the port is connected.
By default, Auto-refresh mode is turned o. When Auto-refresh mode is turned on, the
state of the ports is automatically refreshed every 5 seconds. To turn on Auto-refresh
mode, select the Auto-refresh check box. To manually update the state of the ports,
click Refresh.
To view detailed statistics about any of the ports, click the corresponding image of the
port.
There is a menu located on the left side of the main Web management screen that
includes numerous menu options organized under four categories: Conguration,
Monitor, Diagnostic, and Maintenance.
About the menu options in the Conguration drop-down list
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > System > <menu option>.
Menu optionDescription
InformationSpecify the system contact, name, location, and time zone oset.
IPCongure the IPv4 (static IP address and DHCP client), and the
VLAN ID settings.
IPv6Congure the IPv6 (static IP address and DHCP client) settings.
NTPCongure the NTP server setting (maximum: 5).
TimeSet the time zone and daylight saving time.
LogCongure the Remote System Log Server, including the 3 levels:
Info, Warning, and Error.
Instruction Manual
8
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Power Reduction > <menu option>.
Menu optionDescription
LEDReduce the LED intensity during specied hours, and
congure the link change at error settings.
EEE (Energy Ecient
Ethernet)
Turn on and turn o EEE, and congure the EEE urgent
queues.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > <menu option>.
Menu optionDescription
PortsCongure the connection settings of the ports.
Loop ProtectionSet the ports to shut down if the ports are stuck in a loop.
MVRCongure the Multicast VLANs Registration.
MAC TableCongure the aging time, dynamic learning, and static
addresses.
MirroringSpecify the source and destination port for mirroring.
UPnPTurn on and turn o the UPnP, and congure the TTL and AD
settings.
sFlowTurn on sFlow and congure the ow and counter samplers
for each port.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Switch <menu option>.
Menu optionDescription
UsersCreate user accounts and passwords, and set privilege levels.
Aud MethodCongure the authentication method for console and web
access using the local database and RADIUS.
SSHTurn on and turn o SSH.
Instruction Manual
9
HTTPSTurn on and turn o HTTPS and specify the auto-redirect
setting.
Access Management Turn on and turn o Access Management, set the IP address
range for HTTP and HTTPS, and specify the SNMP and
TELNET/SSH access.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Switch > SNMP > <menu option>.
Menu optionDescription
SystemCongure SNMP, version (v1, v2c, and v3), read and write
community, and Trap.
CommunitiesSpecify the community for SNMPv3 and the source IP
address.
UsersCongure the SNMPv3 user.
GroupsCongure the SNMP group.
ViewsCongure the View Name and type.
AccessCongure the access authority.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Switch > RMON > <menu option>.
Menu optionDescription
StatisticsCongure the RMON statistics table.
HistoryCongure the RMON history table.
AlarmCongure the RMON alarm table.
EventCongure the RMON event table.
Instruction Manual
10
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Network > <menu option>.
Menu optionDescription
Limit ControlLimit the numer of users on a specic port.
NASCongure the Network Access Server.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Network > ACL > <menu option>.
Menu optionDescription
PortsSpecify the ACL parameters of each switch port.
Rate LimitersSpecify the rate limiters for the switch ACL.
Access Control ListView the Access Control List.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Network > DHCP > <menu option>.
Menu optionDescription
SnoopingTurn on and turn o DHCP snooping.
RelayTurn on and turn o DHCP relay and set up the relay server.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Network > IP Source Guard >
<menu option>.
Menu optionDescription
CongurationTurn on and turn o the IP Source guard and set up the
maximum number of dynamic clients for each port.
Static TableManually insert the IP Source guard table.
Instruction Manual
11
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Security > Network > ARP Inspection >
<menu option>.
Menu optionDescription
CongurationTurn on and turn o the Global ARP inspection.
Static TableManually insert the ARP Inspection table.
To access the menu option, on the left side of the main screen of the Web
management UI, click Conguration > Security > AAA.
Menu optionDescription
AAACongure the Authentication Servers.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Aggregation > <menu option>.
Menu optionDescription
StaticCongure the aggregation mode and group.
LACPView the current LACP port congurations and if neccesary,
change them.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Spanning Tree > <menu option>.
Menu optionDescription
Bridge SettingsCongure the global bridge setting for STP and RSTP, and
congure the edge port setting for BPDU ltering, BPDU
guard, and port error recovery.
MSTI MappingMap VLANs to a specic MSTP instance.
MSTI PrioritiesSpecify the priority for each MSTI.
VLAN MembershipCongure the VLAN groups.
Instruction Manual
12
PortsSpecify the default PVID and VLAN attributes.
CIST PortsCongure the interface settings for STA.
MSTI PortsCongure the interface settings for an MST instance.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > IPMC > IGMP Snooping > <menu option>.
Menu optionDescription
Basic congurationCongure the global and port settings for multicast ltering.
VLAN CongurationCongure the IGMP Snooping for each VLAN interface.
Port Group FilteringCongure ports to a specic ltering group.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > IPMC > MLD Snooping > <menu option>.
Menu optionDescription
Basic congurationCongure the global and port settings for multicast ltering.
VLAN CongurationCongure the IGMP Snooping for each VLAN interface.
Port Group FilteringCongure ports to a specic ltering group.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > LLDP > <menu option>.
Menu optionDescription
LLDPCongure the global parameters and the optional TLVs for
a port.
LLDP-MEDCongure the LLDP-MED attributes.
Instruction Manual
13
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > VLANs > <menu option>.
Menu optionDescription
VLAN MembershipsSpecify the VLAN groups.
PortsCongure the VLAN setting for each port.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > PrivateVLANs > <menu option>.
Menu optionDescription
PVLAN MembershipSpecify the PVLAN groups.
Port isolationCongure the port isolation.
To access the menu option, on the left side of the main screen of the Web
management UI, click Conguration > VCL > <menu option>.
Menu optionDescription
MAC-based VLANsMap a specic source MAC Address to a VLAN.
IP Subnet-based
Assign a subnet IP to a specic VLAN.
VLAN
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > VCL > Protocol-based VLAN > <menu option>.
Menu optionDescription
Protocol to GroupCreate a specic protocol group.
Group to VLANMap a specic protocol group to a VLAN.
Instruction Manual
14
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > Voice VCL > <menu option>.
Menu optionDescription
CongurationCongure the global settings, allow or block Voice VLAN by
port setting.
OUICongure the Voice VLAN and OUI mapping table.
To access the menu options, on the left side of the main screen of the Web
management UI, click Conguration > QoS > <menu option>.
Menu optionDescription
Port ClassicationCongure the QoS Ingress Classication settings for all ports.
Port PolicingCongure the QoS Ingress Port policers to limit trac ows
by a specic rate.
Port SchedulerSee an overview of the egress priority status for each port,
and set the egress queue mode and sharper.
Port ShapingSee an overview of the egress sharper for each port, and set
the egress queue mode and sharper.
Port Tag RemarkingSee an overview of the egress tag remarking, and set the tag
remarking mode.
Port DSCPCongure the egress translation and classication, and set
the egress DSCP rewrite value.
DSCP-Based QoSCongure the Ingress classication setting for DSCP-based
QoS.
DSCP TranslationSet the translation of Ingress classication and the egress
DP Iv.
DSCP ClassicationMap the DSCP value to the QoS class and DP level.
QoS Control ListCongure the QoS Control Entry based on parameters such
as VLAN ID, UDP/TCP port, IPv4 DSCP, or tag priority.
Storm ControlSet the limitation for broadcast, unicast, and multicast trac.
Instruction Manual
15
About the menu options in the Monitor drop-down list
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > System > <menu option>.
Menu optionDescription
InformationView the system contact, name, location, system time, rmware
version, and the MAC address for the switch.
CPU loadView the CPU load by realtime SVG graph.
LogView logged messages with the selected level (Info, Warning,
Error, and All).
Detailed LogView the fully logged message.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Ports > <menu option>.
Menu optionDescription
StateView a graphic image of the front panel of the switch to see the
current port states.
Trac OverviewView the basic port statistics.
QoS StatisticsView the total of incoming and outgoing egress queues.
QCL StatusView the status of the QoS Control Lists.
Detailed Statistics View the detailed port statistics.
To access the menu option, on the left side of the main screen of the Web
management UI, click Monitor > Security > <menu option>.
Menu optionDescription
Access Management
Statistics
View the incoming management packets, including HTTP,
HTTPS, SNMP, TELNET, and SSH.
Instruction Manual
16
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Security > Network > Port Security > <menu option>.
Menu optionDescription
SwitchView the module legend and the status of each port, including the
MAC address learning and the maximum allowed MAC count.
PortView the MAC address, VLAN ID, state, time of addition, and the age
and hold of the timer for each port.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Security > Network > NAS > <menu option>.
Menu optionDescription
SwitchView the authentication service status and information for
each port.
PortView the authentication statistics, port status, and
authentication method.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Security > Network > <menu option>.
Menu optionDescription
ACL StatusView the ACL status by dierent ACL users.
ARP InspectionView the dynamic ARP inspection table, sorted by port
number, VLAN ID, MAC address, and IP address.
IP Source GuardView the IP Source Guard table, sorted by port number,
VLAN ID, and IP address.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Security > Network > DHCP > <menu option>.
Menu optionDescription
Snooping StatisticsView the statistics for each packet type.
Relay StatisticsView the DHCP relay statistics.
Instruction Manual
17
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Security > AAA > <menu option>.
Menu optionDescription
RADIUS OverviewView the status of the associated authentication RADIUS
servers.
RADIUS DetailsView the trac and status of each of the associated
RADIUS servers.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Security > Switch > RMON > <menu option>.
Menu optionDescription
StatisticsView an overview of the RMON Statistics entries.
HistoryView an overview of the RMON History entries.
AlarmView an overview of the RMON Alarm entries.
EventView an overview of the RMON Event table entries.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > LACP > <menu option>.
Menu optionDescription
System StatusView the LACP information for each local port, including
the Aggr ID, Partner system ID, and Partner key.
Port StatusView the key, Aggr ID, Partner system ID, and Partner port
for each local port.
Port StatisticsView the statistics for LACP protocol messages.
Instruction Manual
18
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > <menu option>.
Menu optionDescription
Loop ProtectionView the loop status for each port.
MAC TableView the Dynamic and Static MAC address table.
sFlowView the receiver and per-port sFlow statistics.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > Spanning Tree > <menu option>.
Menu optionDescription
Bridge StatusView the STP detailed bridge status, CIST Ports, and
Aggregations state.
Port StatusView the CIST role, State, and uptime for each port.
Port StatisticsView the statistics for the RSTP, STP, and TCN packets.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > MVR > <menu option>.
Menu optionDescription
StatisticsView the IGMP/MLD statistics used by the MVR.
MVR Channel GroupsView the MVR channel information, including the VLAN ID
groups and port members.
MVR SFM InformationView the Source-Filtered Multicast information, including
the Source-Specic Multicast information.
Instruction Manual
19
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > IPMC > IGMP Snooping > <menu option>.
Menu optionDescription
StatusView the statistics related to IGMP packets passed
upstream to the IGMP Querier or downstream to multicast
clients.
Groups InformationView information about the IGMP snooping groups.
IPv4 SFM InformationView information about the IGMP Source-Filtered
Multicast, including Source-Specic Multicast.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > IPMC > MLD Snooping > <menu option>.
Menu optionDescription
StatusView the MLD snooping status and statistics.
Groups InformationView the MLD group table, which is sorted by VLAN ID and
then by group.
IPv6 SFM InformationView the MLD Source-Filtered Multicast information table,
including the Source-Specic Multicast information.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > LLDP > <menu option>.
Menu optionDescription
NeighboursView the LLDP information for the remote device that is
connected to a port on the switch.
LLDP-MED Neighbours View the information for the remote device that is
advertising LLDP-MED.
EEEView an overview of the EEE information exchanged by
LLDP.
Port StatisticsSee an overview of all of the LLDP trac.
Instruction Manual
20
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > VLANs > <menu option>.
Menu optionDescription
VLAN MembershipView the port members for a specic VLAN ID.
VLAN PortView the VLAN Port Status for a Static user.
To access the menu options, on the left side of the main screen of the Web
management UI, click Monitor > VCL > <menu option>.
Menu optionDescription
MAC-based VLANView the MAC-based VLAN entries congured by various
MAC-based VLAN users.
About the menu options in the Diagnostics drop-down list
To access the menu options, on the left side of the main screen of the Web
management UI, click Diagnostics > <menu option>.
Menu optionDescription
PingTest a specic IP address by using the ping function.
Ping6Test a specic IPv6 address by using the ping function.
About the menu options in the Maintenance drop-down list
To access the menu options, on the left side of the main screen of the Web
management UI, click Maintenance > <menu option>.
Menu optionDescription
Restart DeviceRestart the switch.
Factory DefaultsRestore all of the settings to the factory default settings.
Instruction Manual
21
About the menu options in the Maintenance drop-down list
To access the menu options, on the left side of the main screen of the Web
management UI, click Maintenance > Software > <menu option>.
Menu optionDescription
UploadUse the Web UI to update the rmware for the switch.
Image SelectSelect a recovery rmware to use to start the switch.
About the menu options in the Maintenance drop-down list
To access the menu options, on the left side of the main screen of the Web
management UI, click Maintenance > Conguration > <menu option>.
Menu optionDescription
SaveSave the conguration to your local PC.
UploadRestore the previous conguration from a le.
Instruction Manual
22
Changing the Conguration settings
Change the System Information settings
1. On the main screen of the Web management UI, click Conguration > System >
Information.
2. Do any of the following:
• To specify an administrator for the switch, in the System Contact eld, enter a
name (maximum length is 255 characters).
• To specify a name for the switch, in the System Name eld, enter a name
(maximum length is 255 characters).
• To specify the location that the switch is in, in the System Location eld, enter a
location (maximum length is 255 characters).
Change the System IP settings
The following table describes the System IP settings that you can change:
OptionDescription
DHCP ClientEnable the DHCP client or disable the DHCP client and use a static
IP AddressSets the static IP address of the switch, if not acting as a DHCP
IP MaskThe mask used to determine which subnet the switch belongs to.
IP RouterThe IP address of the gateway.
VLAN IDThe VLAN that the switch is associated with. The VLAN ID needs to
DNS ServerA domain name server that resolves client host name to IP address
DNS ProxyEnable this feature to maintain a DNS database.
RenewUse to renew a DHCP lease.
IP address.
client. The default IP is 192.168.2.1.
match your management’s PC/NB VLAN ID. The range is between 1
and 4096 and the default VLAN ID is 1.
requests.
Instruction Manual
23
To congure the static IP address and enable the DHCP client, do the following:
1. On the main screen of the Web management UI, click Conguration > System > IP.
2. Do one of the following:
• To enable the DHCP client, select the DHCP check box.
• To disable the DHCP client and use a static IP address, clear the DHCP check box.
3. In the Congured column, complete the IP Address, IP Mask, IP Router, and SNTP Server IP elds.
4. To renew the IP Address, click Renew.
5. To maintain a local DNS database, select the DNS Proxy check box.
6. To apply the changes that you made, click Save.
To restore the previous settings, click Restore.
Change the System IPv6 settings
The following table describes the System IPv6 settings that you can change:
OptionDescription
Auto CongurationEnable the DHCP client, or disable the DHCP client and use a
AddressThe IPv6 address must adhere to the IPv6 Addressing
PrexSpecify the IPv6 prex for your switch. The allowed range is
RouterSpecify the IPv6 gateway for your switch.
static IP address.
Architecture format. The IPv6 address is in 128-bit records
represented as 8 elds of up to 4 hexadecimal digits with a
colon separating each eld.
between 1 and 128.
1. On the main screen of the Web management UI, click Conguration > System >
IPv6.
2. Do one of the following:
• To enable Auto Conguration, select the Auto Conguration check box.
• To disable Auto Conguration, clear the Auto Conguration check box.
3. In the Congured column, complete the Address eld.
Instruction Manual
24
4. If necessary, complete the Router eld.
5. To renew the IPv6 Address, click Renew.
6. To apply the changes that you made, click Save.
To restore the previous settings, click Restore.
Change the NTP Conguration settings
The following table describes the NTP Conguration settings that you can change:
OptionDescription
ModeEnable or disable NTP Client mode.
Server 1 to 5Specify the IPv4 or IPv6 of up to 5 NTP servers.
1. On the main screen of the Web management UI, click Conguration > System >
NTP.
2. Do one of the following:
• To enable NTP Client mode, in the Mode drop-down list, click Enabled.
• To disable NTP Client mode, in the Mode drop-down list, click Disabled.
3. In the Server elds, enter the IP address of the NTP Server.
4. To save your changes, click Save.
To restore the previous settings, click Reset.
Change the Time settings
The following table describes the Time settings that you can change:
OptionDescription
Time ZoneSelect a time zone from a list of world-wide time zones.
AcronymEnter an acronym for the time zone that you selected. You
Daylight Saving Time Set the daylight saving time to recur every year or to just
MonthSpecify the month to start and end daylight saving time.
can use up to 16 alphanumeric characters and the acronym
can contain “-”, “_”, and “.”.
occur once.
Instruction Manual
25
DateSpecify the day to start and end daylight saving time.
YearSpecify the year to start and end daylight saving time.
HoursSpecify the hour to start and end daylight saving time.
MinutesSpecify the minute to start and end daylight saving time.
OsetSpecify the number of minutes to add during daylight
saving time. The range is between 1 and 1440 minutes.
To congure the time settings, do the following:
1. On the main screen of the Web management UI, click Conguration > System >
Time.
2. In the Time Zone drop-down list, click a time zone.
3. In the Acronym eld, enter an acronym to describe the time zone that you selected.
4. To enable daylight saving time, in the Daylight Saving Time drop-down list, click
Enabled.
5. Do one of the following:
• To set the daylight saving time to repeat every year, in the Daylight Saving Time
drop-down list, click Recurring.
• To set the daylight saving time to only occur once, click Non-Recurring.
6. To congure the date to start daylight saving time, do the following:
• In the Month drop-down list, click a month.
• In the Date drop-down list, click a day of the month.
• In the Year drop-down list, click a year.
• In the Hours drop-down list, click an hour.
• In the Minutes drop-down list, click a numeric value.
7. To congure the date to end daylight saving time, repeat step 6.
8. To enter the number of minutes to add during daylight saving time, in the Oset
eld, enter a numeric value.
9. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
26
Change the Log settings
The following table describes the Log settings that you can change:
OptionDescription
Server ModeEnable or disable remote system logging.
Server AddressSpecify the IP address of the server used for remote system
Syslog LevelSelect one of the following logging event levels: Info, Warning,
1. On the main screen of the Web management UI, click Conguration > System >
Log.
2. Do one of the following:
• To enable Server mode, in the Server Mode drop-down list, click Enabled.
• To disable Server mode, in the Server Mode drop-down list, click Disabled.
3. In the Server Address eld, enter the IP address of the server.
4. Do one of the following:
• To send info, warnings, and errors, in the Syslog Level drop-down list, click Info.
• To send warnings and errors, in the Syslog Level drop-down list, click Warning.
• To send errors, in the Syslog Level drop-down list, click Error.
5. To save your changes, click Save.
To restore the previous settings, click Reset.
logging.
or Error.
Change the LED settings
The following table describes the LED settings that you can change to reduce the LED
intensity during specied hours to save power.
OptionDescription
TimeSpecify the length of time to change the LED itensity for.
IntensitySet the LED intensity percentage level. There are 10 levels of
Instruction Manual
LED intensity, increasing by 10% intensity with each level. 0%
intensity level means the LED is turned o and 100% intensity
means the LED is at full power.
27
On time at link
change
On at errorsSet the LED to operate at full power when an error occurs.
1. On the main screen of the Web management UI, click Conguration > Power Reduction > LED.
2. In the Time drop-down list, click a time.
3. In the Intensity drop-down list, click a percentage value.
4. To add the LED rule to the switch, click Add.
5. To set the duration of time that the LED operates at full power when a link change
occurs, in the Sec. eld, enter a numeric value.
6. To set the LED to operate at full power when an error occurs, select the On at errors
check box.
7. To save your changes, click Save.
To restore the previous settings, click Reset.
Set the duration of time that the LED operates at full power
when a link change occurs.
Change the EEE settings
The following table describes the EEE (Energy Ecient Ethernet) settings that you can
change:
OptionDescription
EnableEnable or disable EEE for each port.
EEE Urgent Queue Set queues to activate the transmission of frames as soon as
Note: If a port is greyed out on the EEE Conguration screen, it means that the port
isn’t EEE capable and can’t be set.
1. On the main screen of the Web management UI, click Conguration > Power Reduction > EEE.
2. To enable EEE for a port, select the Enabled check box next to the port that you
want to enable.
3. If necessary, select the EEE Urgent Queues check box next to a port.
4. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
any data is available. If not set, the queue will postpone the
transmission until 3 000 bytes are ready to be transmitted.
28
Change the Port settings
On the Port Conguration screen, you can specify the parameters for each port,
including enabling and disabling ports, setting port speeds such as auto, half-duplex,
full-duplex, and more. You can also set the frame size, specify the collision policy and
power control. See the table below for more information about the settings that you
can change.
OptionDescription
LinkView the status of each port.
SpeedView the current speed in the Current column. Choose
Flow ControlView the ow control state of Rx and Tx in the Current
Maximum Frame SizeSpecify the maximum frame size allowance to transfer for
Excessive Collision
Mode
Power ControlSet the options for automatic power saving mode.
1. On the main screen of the Web management UI, click Conguration > Ports.
2. Do one of the following:
• To disable the port interface, in the Congured drop-down list, click Disabled.
• To enable auto-negotiation, in the Congured drop-down list, click Auto.
• To set the switch to support 10 Mbps half-duplex, in the Congured drop-down
list, click 10Mbps HDX.
• To set the switch to support 10 Mbps full-duplex, in the Congured drop-down
list, click 10Mbps FDX.
• To set the switch to support 100 Mbps half-duplex, in the Congured dropdown list, click 100Mbps HDX.
• To set the switch to support 100 Mbps full-duplex, in the Congured drop-down
list, click 100Mbps FDX.
• To set the switch to support 1 Gbps full-duplex, in the Congured drop-down
list, click 1Gbps FDX.
between seven options in the Congured column.
columns. You can also enable Flow Control to eliminate
packet loss.
each port.
Congure the behavior for port transmit collisions.
Instruction Manual
29
3. To enable ow control, select the Congured check box.
4. To specify the maximum frame size allowance to transfer for each port, in the
Maximum Frame Size eld, enter a numeric value.
5. To change the settings for the excessive collision mode, in the Excessive Collision Mode drop-down list, click an option.
6. To change the options for the automatic power saving mode, do one of the
following:
• To set the switch to detect unused Ethernet ports on network devices and power
them down, in the Power Control drop-down list, click ActiPHY.
• To use an intelligent algorithm that actively adjusts the power level needed
based on cable length, in the Power Control drop-down list, click PerfectReach.
• To enable both ActiPHY and PerfectRead, in the Power Control drop-down list,
click Enabled.
• To disable the power saving mode, in the Power Control drop-down list, click
Disabled.
7. To save your changes, click Save.
8. To manually reload the information on the screen, click Refresh.
To restore the previous settings, click Reset.
Change the User settings
On the User Conguration screen, you can congure the user name and password
authority for dierent privilege levels. See the table below for more information about
the settings that you can change.
OptionDescription
User NameEnter a user name that is up to 31 characters long (letters,
PasswordEnter a password that is up to 31 characters long for a
Privilege LevelSet a privilege level for a user between the range of 1 and
numbers, and underscores are allowed).
user.
15.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > Users.
2. Complete the User Name, Password, and Password (again) elds.
Instruction Manual
30
3. In the Privilege Level drop-down list, click a level option.
4. To save your changes, click Save.
5. To cancel your changes, click Cancel.
To restore the previous settings, click Reset.
Change the Privilege Levels settings
On the Privilege Levels screen, you can set the privilege level required to read
or congure a software module or system setting. See the table below for more
information about the settings that you can change.
OptionDescription
Group NameThe name used to identify the privilege group.
Privilege LevelSet a privilege level for a user between the range of 1 and
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > Privilege Levels.
2. Do any of the following:
• For any of the group names, in the Conguration Read-only drop-down list,
click a privilege level.
• For any of the group names, in the Conguration/Execute Read/Write drop-
down list, click a privilege level.
• For any of the group names, in the Status/Statistics Read-only drop-down list,
click a privilege level.
• For any of the group names, in the Status/Statistics Read/Write drop-down list,
click a privilege level.
3. To save your changes, click Save.
To restore the previous settings, click Reset.
15.
Change the Authentication Method settings
On the Authentication Method Conguration screen, you can specify the
authentication method for access management using console, telnet, ssh, and Web.
Access can be controlled by local (password) or remote access authentication (RADIUS
server). See the table below for more information about the settings that you can
change.
Instruction Manual
31
OptionDescription
ClientSpecify the authentication method for the administrator.
Authentication Method Select 1 of 4 authentication methods.
FallbackSet the switch to check by local password if fallback is
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > Auth Methods.
2. For any of the client types, do the following:
• To disable access via specied management interface, in the Authentication Method drop-down list, click None.
• To check by password, in the Authentication Method drop-down list, click
Local.
• To authenticate using the RADIUS server, in the Authentication Method dropdown list, click RADIUS.
• To authenticate using the TACACS+ server, in the Authentication Method dropdown list, click TACACS+.
3. If necessary, select the Fallback check box for any of the client types.
4. To save your changes, click Save.
To restore the previous settings, click Reset.
checked when radius server authentication fails.
Set up the Secure Shell management interface
On the SSH Conguration screen, you can enable SSH. SSH service on this switch only
supports password authentication. It can be authenticated by RADIUS, TACACS+, or
locally.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SSH.
2. Do one of the following:
• To enable SSH, in the Mode drop-down list, click Enabled.
• To disable SSH, in the Mode drop-down list, click Disabled.
3. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
32
Enable HTTPS
On the HTTPS Conguration screen, you can enable or disable HTTPS and Automatic
Redirect mode. When Automatic Redirect mode is enabled, the Web browser is
automatically redirected to an HTTPS connection when both HTTPS and Automatic
Redirect modes are enabled.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > HTTPS.
2. Do one of the following:
• To enable HTTPS, in the Mode drop-down list, click Enabled.
• To disable HTTPS, in the Mode drop-down list, click Disabled.
3. If HTTPS is enabled, do one of the following:
• To enable Automatic Redirect, in the Mode drop-down list, click Enabled.
• To disable Automatic Redirect, in the Mode drop-down list, click Disabled.
4. To save your changes, click Save.
To restore the previous settings, click Reset.
Congure the access management settings
On the Access Management Conguration screen, you can create a list of up to 16
IP addresses or IP address groups that allow access management through the HTTP/
HTTPS/SNMP/TELNET/SSH.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > Access Management.
2. Do one of the following:
• To enable access management, in the Mode drop-down list, click Enabled.
• To disable access management, in the Mode drop-down list, click Disabled.
3. If access management is enabled, click Add New Entry.
4. Set up a list of rules for HTTP/HTTPS, SNMP, TELNET/SSH.
5. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
33
Congure the SNMP settings
On the SNMP System Conguration screen, you can congure the SNMP settings,
including community name, trap host, public traps, and so on. See the table below for
more information about the settings that you can change.
OptionDescription
ModeEnable or disable the SNMP service.
VersionSpecify the SNMP version (SNMP v1, SNMP v2c, or SNMP
Read CommunitySpecify the community that has read access.
Write CommunitySpecify the community that has read/write access.
Engine IDView the SNMP v3 engine ID (only available for SNMP v3).
Trap ModeEnable or disable the SNMP traps.
Trap VersionSpecify the trap version (SNMP v1, SNMP v2c, or SNMP v3).
Trap CommunitySpecify the community string for SNMP trap packets.
Trap Destination
Address
Trap Authentication
Failure
Trap Link-up and Linkdown
Trap Inform ModeEnable trap inform mode to send a notication as
Trap Inform TimeoutSet the length of time in seconds to wait for ACK.
Trap Inform Retry
Times
Trap Probe Security
Engine ID
v3).
Specify the IP address of the server to receive trap packets.
Enable trap authentication failure to issue a notication
message to the trap destination address whenever a
SNMP request fails.
Enable trap link-up and link-down to issue a notication
message to the trap destination address whenever a port
link is established or broken.
an inform message (only available for SNMP v2c and
SNMP v3). This mode can guarantee that the message is
received.
Set the maximum number of retry times before timeout.
Specify whether or not to use the engine ID of the SNMP
trap probe in trap and inform messages (only available for
SNMP v3).
Instruction Manual
34
Trap Security Engine ID View the SNMP trap security engine ID (only available for
Trap Security NameView the trap security name (only available for SNMP v3).
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SNMP > System.
2. To enable SNMP mode, in the Mode drop-down list, click Enabled.
3. In the Version drop-down list, click a version.
4. If required, in the Read Community and Write Community elds, change the
community access.
5. To enable the switch to send SNMP traps, in the Trap Mode drop-down list, click
Enabled.
6. In the Trap Version drop-down list, click a version.
7. Complete the Trap Community, Trap Destination Address, and Trap Destination
IPv6 Address elds.
8. To enable the switch to send a notication message to trap destination address
when an SNMP request fails, in the Trap Authentication Failure drop-down list,
click Enabled.
9. To enable the switch to send a notication message to trap destination address
when a port link is established or broken, in the Trap Link-up and Link-down dropdown list, click Enabled.
10. To enable the switch to send a notication as an inform message, in the Trap
Inform Mode drop-down list, click Enabled.
11. Complete the Trap Inform Timeout (seconds) and Trap Inform Retry Times elds.
12. To save your changes, click Save.
To restore the previous settings, click Reset.
SNMP v3).
Change the SNMPv3 community conguration settings
The table below describes the settings that you can change on the SNMPv3
Community Conguration screen.
OptionDescription
CommunitySpecify the community string to allow access to the SNMP
Instruction Manual
agent (range is between 1 and 32).
35
Source IPSpecify the IP address of the SNMP client.
Source MaskSpecify the subnet mask of the SNMP client.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SNMP > Communities.
2. Do any of the following:
• Complete the Source IP and Source Mask elds.
• To delete a community, select the Delete check box next to the community that
you want to remove.
• To add a new community string, click Add New Entry and complete the
instructions on the screen.
3. To save your changes, click Save.
To restore the previous settings, click Reset.
Change the SNMPv3 User settings
On the SNMPv3 User Conguration screen, you can specify an engine ID, user name,
and security level, as well as set the authentication and privacy level for each SNMPv3
user. See the table below for more information about the settings that you can change.
OptionDescription
Engine IDView the engine identier for the SNMP agent (only
User NameSpecify a unique user name (between 1 and 32
Security LevelSet 1 of 3 security levels:
Authentication ProtocolSet the method for authentication (None, MD5, or SHA).
Authentication Password Set a password between 1 and 32 text characters long.
available for SNMPv3).
characters long) for the SNMP.
• NoAuth, NoPriv (no authentication and encryption
applied during the communication).
• Auth, NoPriv (the communication has authentication
applied to it, but not encryption).
• Auth, Priv (both authentication and encryption are
applied during the communication).
Instruction Manual
36
Privacy ProtocolSet the encryption algorithm (none or 56-bit DES).
Privacy PasswordSet a privacy passphrase between 8 and 40 characters
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SNMP > Users.
2. Click Add New User.
3. In the Engine ID eld, enter a remote engine ID.
4. Complete the User Name, Security Level, Authentication Password, Privacy Protocol, and Privacy Password elds.
5. To save your changes, click Save.
6. To delete a user conguration, in the Delete column, select the check box next to
the entry that you want to remove.
To restore the previous settings, click Reset.
long).
Change the SNMPv3 Group settings
On the SNMPv3 Group Conguration screen, you can dene a specic SNMPv3 group
and restrict the access policy to read and write views. See the table below for more
information about the settings that you can change.
OptionDescription
Security ModelSelect 1 of 3 user security models: v1, v2, and USM
Security NameSet a security name between 1 and 32 characters in
Group NameEnter a name for the SNMP group.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SNMP > Groups.
2. To create a new group, click Add New Entry.
3. In the Security Model column, select a model type.
4. In the Security Name column, select a name.
5. In the Group Name eld, enter a name for the group.
6. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
(User-based Security Model).
length that is used to connect to the SNMP agent.
37
Change the SNMPv3 View settings
On the SNMPv3 View Conguration screen, you can dene the restricts access policy
for a specic MIB tree. The default_view includes access ability for the whole MIB tree.
See the table below for more information about the settings that you can change.
OptionDescription
View NameSpecify a name between 1 and 32 characters long for the SNMP
View TypeSet whether the OID is included or excluded for a specic SNMP
OID SubtreeSpecify the object identiers of branches within the MIB tree.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SNMP > Views.
2. To create a new view, click Add New Entry.
3. In the View Name column, enter a name for the SNMP view.
4. In the View Type drop-down list, click a view type.
5. In the OID Subtree column, enter an identier of the OID subtree.
6. To save your changes, click Save.
To restore the previous settings, click Reset.
view.
view.
Change the SNMPv3 Access settings
On the SNMPv3 Access Conguration screen, you can dene the access rights for a
portion of the MIB tree. See the table below for more information about the settings
that you can change.
OptionDescription
Group NameSpecify a name between 1 and 32 characters long for the SNMP
Security ModelSelect 1 of 3 user security models: v1, v2, and USM (User-based
group.
Security Model).
Instruction Manual
38
Security LevelSet 1 of 3 security levels:
• NoAuth, NoPriv (no authentication and encryption applied
during the communication).
• Auth, NoPriv (the communication has authentication applied
to it, but not encryption).
• Auth, Priv (both authentication and encryption are applied
during the communication).
Read View NameSelect a view name for read access.
Write View NameSelect a view name for write access.
Note: You can have more than one access policy for an SNMPv3 group.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > SNMP > Access.
2. To create a new access prole, click Add New Entry.
3. In the Group Name column, enter a name for the SNMP group.
4. In the Security Model column, select a security model type.
5. In the Security Level column, select a security level type.
6. In the Read View Name drop-down list, click a view name.
7. In the Write View Name drop-down list, click a view name.
8. To save your changes, click Save.
9. To delete an access conguration, in the Delete column, select the check box next
to the conguration that you want to remove.
To restore the previous settings, click Reset.
Change the RMON Statistics settings
On the RMON Statistics Conguration screen, you can congure the page to set the
ID for MIBs and to store real-time LAN statistics, including utilization, collisions, and
CRC errors. See the table below for more information about the settings that you can
change.
OptionDescription
DeleteDelete the entry of MIBs.
IDCongure the index for the statistics. The index range is
Data SourceView the port ID that you want to monitor. The number
Instruction Manual
between 1 and 65535.
corresponds to the port number.
39
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > RMON > Statistics.
2. To create a new MIBs, click Add New Entry.
3. In the ID eld, enter an ID number.
4. In the Data Source eld, enter a port number.
5. To delete the MIBs entry, click Delete next to the MIBs that you want to delete.
6. To save your changes, click Save.
To restore the previous settings, click Reset.
Change the RMON History settings
On the RMON History Conguration screen, you can see an overview of the history of
selected LAN statistics, including utilization, collisions, and CRC errors. See the table
below for more information about the settings that you can change.
OptionDescription
DeleteDelete the History conguration entry.
IDCongure the index for the group of statistics. The index range
Data SourceView the port ID that you want to monitor. The number
IntervalSpecify the interval in seconds for sampling the History
BucketsThe maximum number of entries to collect.
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > RMON > History.
2. To create a new rule, click Add New Entry.
3. In the ID eld, enter an ID number.
4. In the Data Source eld, enter the port ID of the port that you want to monitor.
5. In the Interval eld, enter a numeric value.
6. In the Buckets eld, enter a numeric value.
7. To save your changes, click Save.
8. To delete a rule, click Delete next to the rule that you want to delete.
To restore the previous settings, click Reset.
Instruction Manual
is between 1 and 65535.
corresponds to the port number.
statistics data. The range is from 1 to 3600 and the default value
is 1800 seconds.
40
Change the RMON Alarm settings
On the RMON Alarm Conguration screen, you can set the threshold to use for sending
the SNMP trap. See the table below for more information about the settings that you
can change.
OptionDescription
IDCongure index of the entry. The index range is between 1 and 65535.
IntervalSet the interval in seconds for sampling and comparing the rising and
Variable Specify the variable to be sampled. Choose from the following variables:
falling threshold. The range is 1 to 2^31-1.
• InOctets (the number of the octets received on the interface, including
framing characters).
• InUcastPkts (the number of the unicast packets delivered to a highlayer protocol).
• InNUcastPkts (the number of the broadcast and multicast packets
delivered to a higher-layer protocol).
• InDiscards (the number of inbound packets that are discarded, even if
the packets are normal).
• InErrors (the number of inbound packets that contained errors
preventing them from being deliverable to a higher-layer protocol).
• InUnknown Protocols (the number of the inbound packets that were
discarded because of the unknown or unsupported protocols).
• OutOctets (the number of octets transmitted out of the interface,
including framing characters).
• OutUcastPakts (the number of unicast packets that request to
transmit).
• OutNUcastPkts (the number of broadcast and multicast packets that
request to transmit).
• OutDiscards (the number of outbound packets that are discarded even
if the packets are normal).
• OutErrors (the number of outbound packets that couldn’t be
transmitted because of errors).
• OutQlen (the length, in packets, of the output packet queue).
Instruction Manual
41
DeleteDelete the RMON Alarm conguration entry.
Sample
Type
Select the method of sampling the selected variable and calculating
the value to be compared against the threshold. Possible sample types
include Absolute (directly get the sample) and Delta (calculate the
dierence between samples).
ValueView the value of the statistic during the last sampling period.
Startup
Alarm
Specify the method of sampling the selected variable and calculating the
value to be compared against the thresholds.
Sample types include the following:
• Rising (the alarm is triggered when the rst value is larger than the
rising threshold).
• Falling (the alarm is triggered when the rst value is less than the
falling threshold).
• RisingOrFalling (the alarm is triggered when the rst value is larger
than the rising threshold or less than the falling threshold).
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > RMON > Alarm.
2. To create a new rule, click Add New Entry.
3. Complete the ID, Interval, Variable, Rising Threshold, Rising Index, Falling Threshold, and Falling Index elds.
4. In the Sample Type drop-down list, click a sample type.
5. In the Startup Alarm drop-down list, click a sample type.
6. To save your changes, click Save.
7. To delete a rule, click Delete next to the rule that you want to delete.
To restore the previous settings, click Reset.
Instruction Manual
42
Change the RMON Event settings
On the RMON Event Conguration screen, you can set up a trigger when an alarm
trigger occurs. See the table below for more information about the settings that you
can change.
Menu optionDescription
DeleteDelete the Event conguration entry.
IDCongure the index of the entry. The index range is between 1
DescView the event identier. The string length is between 0 and
TypeIndicates the notication of the event.
CommunitySpecify the community when the trap is sent. The string length
Event Last TimeView the value of sysUpTime at the time the event entry last
1. On the main screen of the Web management UI, click Conguration > Security >
Switch > RMON > Event.
2. To create a new rule, click Add New Entry.
3. Complete the ID, Desc, and Community elds.
4. In the Type drop-down list, click an event type.
5. To save your changes, click Save.
6. To delete a rule, click Delete next to the rule that you want to delete.
To restore the previous settings, click Reset.
Instruction Manual
and 65535.
127, and the default is null string.
Notication types include the following:
• none (the total number of octets received on the interface,
including framing characters).
• log (the number of unicast packets delivered to a higherlayer protocol).
• snmtrap (the number of broadcast and multicast packets
delivered to a higher-layer protocol).
• logandtrap (the number of inbound packets that are
discarded even if the packets are normal).
is from 0 to 127 and the default is Public.
generated an event.
43
Change the Port Security Limit Control settings
On the Port Security Limit Control Conguration screen, you can limit the number of
users who are accessing a specic port. Users are identied by a MAC address or VLAN
ID. If Limit Control is enabled on a port, the limit species the maximum number of
users that can be on a port, and if the number is exceeded, action is taken. See the
table below for more information about the settings that you can change.
Menu optionDescription
ModeEnable or disable limit control.
Aging Enabled When selected, secure MAC addresses are subject to aging.
Aging PeriodSpecify the aging period. Set a value between 10 and 10,000,000
PortView the port number.
ModeEnable or disable Limit Control for a specic port. Note: This eld
LimitSet the maximum number of MAC addresses that can be secured
ActionIf the limit is reached, the switch can take one of the following
Instruction Manual
seconds.
and the Global Mode must be set to Enabled for Limit Control to
be enabled.
on the port. The number can’t exceed 1024 and if the limit is
exceeded, the corresponding action is taken. The switch is “born”
with a total number of MAC addresses from which all ports draw
whenever a new MAC address is seen on a port enabled with Port
Security. Since all ports draw from the same pool, it may happen
that a congured maximum can’t be granted if the remaining ports
have already used all of the available MAC addresses.
actions:
• none (doesn’t allow more than Limit MAC addresses on the port,
but takes no further action).
• Trap (if Limit +1 MAC addresses is seen on the port, send an
SNMP trap. If Aging is disabled, only one SNMP trap will be sent,
but with Aging enabled, new SNMP traps will be sent every time
the limit is exceeded.)
• Shutdown (if Limit+1 MAC addresses is seen on the port, shut
down the port. This implies that all secured MAC addresses will
be removed from the port, and no new address will be learned.
Even if the link is physically disconnected and reconnected on
the port by disconnecting the cable, the port will remain shut
down.)
44
ActionThere are three ways to reopen a port:
1. Turn on the switch.
2. Disable and enable the Limit Control on the port or the switch
again.
3. Click the Re-open button.
• Trap&Shutdown (if Limit+ 1 MAC address is seen on the port,
both the Trap and the Shutdown actions described above will
be taken).
StateView the current state of the port as seen from the Limit Control’s
point of view. The state can be one of four values:
• Disabled (Limit Control is either globally disabled or disabled on
the port).
• Ready (the limit isn’t reached yet). This can be shown for all
actions.
• Limit Reached (indicates that the limit is reached on this port,
and this state can only be shown if Action is set to None or
Trap).
• Shutdown (indicates that the port is shut down by the Limit
Control module, and this state can only be shown if Action is set
to Shutdown or Trap & Shutdown).
Re-open
button
If a port is shut down by this module, you can reopen it by clicking
this button. For other methods, refer to the Shutdown in the
Action section.
Note: Clicking the Re-open button refreshes the page and any
unsaved changes will be lost.
1. On the main screen of the Web management UI, click Conguration > Security >
Network > Limit Control.
2. In the Mode drop-down list, click a mode.
3. Select the Aging Enabled check box.
4. In the Aging Period eld, enter an aging period in seconds.
5. Set each port’s conguration, including Mode, Limit, and Action.
6. If the state of a port is Shutdown, to enable the port again, click Reopen.
7. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
45
Change the Network Access settings
On the Network Access Server Conguration screen, you can congure network
authentication settings. See the table below for more information about the settings
that you can change.
Menu optionDescription
ModeIndicates if Network Access Server (NAS) is globally
Re-authentication PeriodIf Re-authentication is enabled, this value determines
EAPOL TimeoutDetermines the time for re-transmission of Request
enabled or disabled on the switch. If disabled, all
ports are allowed forwarding of frames.
clients are re-authenticated after the interval
specied by the Re-authentication Period.
For 802.1X-enabled ports, re-authentication can be
used to detect if a new device is plugged into a switch
port, or if a supplicant/client is no longer attached.
For MAC-based ports, re-authentication is only useful
if the RADIUS server conguration has changed. It
doesn’t involve communication between the switch
and the client, and therefore doesn’t imply that a
client is still present on a port.
the length of time after which a connected client
must be re-authenticated. Values are in the range of 1
to 3600 seconds.
Identity EAPOL frames. Valid values are in the range
1 to 65535 seconds. This setting is not applicable for
MAC-based ports
Instruction Manual
46
Aging PeriodThis setting applies to the following modes:
1) Single 802.1X
2) Multi 802.1X
3) MAC-Based Auth.
The Port Security Module scans for activity on the
MAC addresses at regular intervals and frees up
resources if no activity is seen within a given period
of time. This parameter controls the interval at which
the ports are scanned, and can be set to a number
between 10 and 1000000 seconds.
If re-authentication is enabled and the port is in an
802.1X-based mode, the Aging Period isn’t relevant
since clients that are no longer attached to the port
will be removed upon the next re-authentication. If
re-authentication is not enabled, the only way to free
resources is by aging the entries.
Hold TimeFor ports in MAC-based Auth. mode, re-
authentication doesn’t initiate direct communication
between the switch and the client. As such, reauthentication won’t detect whether or not the client
is still attached, and the only way to free up resources
is to age the entry.
This setting applies to the following modes, when
Port Security is used to secure MAC addresses:
1) Single 802.1X
2) Multi 802.1X
3) MAC-Based Auth.
If a client is denied access or the RADIUS server
request times out (according to the timeout specied
on the Conguration > Security > AAA page), the
client is put on hold in the Unauthorized state.
The hold timer doesn’t count during an on-going
authentication.
In MAC-based Auth. Mode, the switch will ignore new
frames coming from the client during the hold time.
The Hold Time can be set to a number between 10
and 1000000 seconds
Instruction Manual
47
RADIUS-Assigned QoS
Enable
RADIUS-assigned QoS lets you centrally control the
trac class to which trac coming from a successfully
authenticated client is assigned on the switch. The
RADIUS server must be congured to transmit special
RADIUS attributes to take advantage of this feature.
The RADIUS-Assigned QoS Enabled check box
provides a quick way to globally enable/disable
RADIUS-server assigned QoS class functionality.
When checked, the individual port’s ditto setting
determines whether RADIUS-assigned QoS is enabled
on that port. When unchecked, RADIUS-server
assigned QoS Class is disabled on all ports.
RADIUS-Assigned VLAN
Enabled
RADIUS-assigned VLAN lets you centrally control the
VLAN on which a successfully authenticated client
is placed on the switch. Incoming trac will be
classied to and switched on the RADIUS-assigned
VLAN. The RADIUS server must be congured to
transmit special RADIUS attributes, to take advantage
of this feature.
The RADIUS-Assigned VLAN Enabled check box
provides a quick way to globally enable/disable
RADIUS-server assigned VLAN functionality.
When checked, the individual port’s ditto setting
determines whether RADIUS-assigned VLAN is
enabled on that port. When unchecked, RADIUSserver assigned VLAN is disabled on all ports.
Guest VLAN EnabledA Guest VLAN is a special VLAN, typically with limited
network access, on which 802.1X-unaware clients
are placed after a timeout as set by the network
administrator.
The switch follows a set of rules for entering and
leaving the Guest VLAN as listed below.
The Guest VLAN Enabled check box provides a
quick way to globally enable or disable Guest VLAN
functionality. When checked, the individual port’s
ditto setting determines whether the port can be
moved into Guest VLAN. When unchecked, the ability
to move to the Guest VLAN is disabled on all ports.
Instruction Manual
48
Guest VLAN IDThis is the value that a Port VLAN ID is set to if the port
is moved into the Guest VLAN. This value can only be
changed if the Guest VLAN option is enabled globally.
Valid values are in the range of 1 to 255.
Allow Guest VLAN if EAPOL
Seen
The switch remembers if an EAPOL frame has been
received on the port. Once the switch considers
whether to enter the Guest VLAN, it will rst check
if this option is enabled or disabled. If disabled
(unchecked by default), the switch will only enter the
Guest VLAN if an EAPOL frame has been received on
the port. If enabled (checked), the switch will consider
entering the Guest VLAN even if an EAPOL frame has
been received on the port.
This value can only be changed if the Guest VLAN
option is enabled globally.
Port Conguration
PortThe port number to which the conguration below
applies.
Admin StateIf NAS is enabled globally, this selection controls the
port’s authentication mode.
The following modes are available:
[Force Authorized]In this mode, the switch will send one EAPOL Success
frame when the port link comes up, and any client
on the port will be allowed network access without
authentication.
[Force Unauthorized]In this mode, the switch will send one EAPOL failure
frame when the port link comes up, and deny
network access to any client on the port.
[Port-Based 802.1X]In 802.1X terminology, the user is called the
‘supplicant’, the switch is the ‘authenticator’, and
the RADIUS server is the ‘authentication server’. The
authenticator forwards requests and responses
between the supplicant and the authentication
server.
Instruction Manual
49
[Single 802.1x]Only one supplicant can be authenticated on the port
at any time. If more than one supplicant is connected
to a port, the one that comes rst when the port’s link
comes up will be the rst one considered. If the rst
supplicant fails to authenticate, the second supplicant
is then considered.
[Multi 802.1X]One or more supplicants can be authenticated
on the same port at any time. Each supplicant is
authenticated individually and secured in the MAC
table using the Port Security module.
In Multi 802.1X it is not possible to use the multicast
BPDU MAC address as destination MAC address
for EAPOL frames sent from the switch toward the
supplicant, since that would cause all supplicants
attached to the port to reply to the requests sent from
the switch.
is not a standard, rather a best-practice method
adopted by the industry. In MAC-Based
authentication terminology, users are called “clients”,
and the switch acts as the supplicant on behalf of
clients. The initial frame sent by a client is snooped
by the switch, which in turn uses the client’s MAC
address as both user name and password in the
subsquent EAP exchanged with the RADIUS server.
The 6-byte MAC address is converted to a string of
hexadecimal digits, formatted as “xx-xx-xx-xx-xxxx”. The switch only supports the MD5-Challenge
authentication method, so the RADIUS server must be
congured accordingly.
When authentication is complete, the RADIUS server
sends a success or failure indication, which in turn
causes the switch to open or block trac for that
particular client, using the Port Security module. Only
then will frames from the client be forwarded on the
switch.
[RADIUS-Assigned QoS
Enabled]
[RADIUS-Assigned VLAN
Enabled]
This feature can be enabled or disabled for a given
port.
This feature can be enabled or disabled for a given
port.
Instruction Manual
50
[Guest VLAN Enabled]This feature can be enabled or disabled for a given
port.
Port StateThe current state of the port:
[Globally Disabled]802.1X and MAC-based authentication are globally
disabled.
[Link Down]802.1X and MAC-based authentication is enabled, but
no link on the given port.
[Authorized]The port is in Force Authorized mode, or a single-
supplicant mode and the supplicant is authorized.
[Unauthorized]The port is in Force Unauthorized mode, or a
single-supplicant mode and the supplicant is not
successfully authorized by the RADIUS Server.
[X Auth/Y Unauth]The port is in a multi-supplicant mode, X clients are
currently authorized and Y are unauthorized.
RestartRestart client authentication using the following
methods:
[Reauthenticate]Schedules reauthentication to whenever the
quiet period of the port runs out (EAPOL-based
authentication). For MAC-based authentication,
reauthentication will be attempted immediately.
This setting only aects authenticated clients on the
port and will not deauthorize clients.
[Reinitialize]Forces a reinitialization of the clients on the port and
immediately reauthenticates. The clients will transfer
to the unauthorized state while the reauthentication
is in progess.
1. On the main screen of the Web management UI, click Conguration > Security >
Network > NAS.
2. Congure the System Conguration settings as needed.
3. Congure the Port Conguration settings as needed.
4. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
51
Change the Ports settings
On the ACL Ports Conguration screen, you can specify the assigned port reactions
when specic frames are matched. These behaviors include Port Redirect, Mirror,
Logging, and Shutdown.
To access the ACL Ports Conguration screen, click Conguration > Security >
Network > ACL > Ports.
Menu optionDescription
PortIdenties the port to which the settings contained in the same
Policy IDSpecify the Policy ID to apply to this port (range: 0 to 255).
ActionPermit or deny the forwarding if policy is Matched. (Permit
Rate Limiter IDSpecify a Rate Limiter ID. The mapping table is on the Rate
Port RedirectSelect the port to which frames are redirected. Allowed values are
MirrorSpecify the operation of this port. The allowed values are:
[Enabled]Frames received on the port are mirrored.
[Disabled]Frames received on the port are not mirrored. The default value
ShutdownSpecify the operation of this port. The allowed values are:
[Enabled]If a frame is received on the port. The port will be disabled.
[Disabled]Port shutdown is disabled. The default value is Disabled.
StateSpecify the port state of this port. The allowed values are:
[Enabled]To reopen ports by changing the volatile port conguration of
[Disabled]To close ports by changing the volatile port conguration of the
CounterCounts the number of frames that match this ACE.
row will apply.
selected by default.)
Limiters page. Disabled by default. Value range: 1 to 16.
Disabled (default value) or a specic port number. This value
can’t be set when Action is permitted.
is Disabled.
the ACL user module.
ACL user module. The default value is Enabled.
Instruction Manual
52
1. On the main screen of the Web management UI, click Conguration > Security >
Network > ACL > Ports.
2. Assign a Policy ID to a given port and set the related ACE parameters. Options
include Action, Rate Limiter ID, Port Redirect, Mirror, Logging, Shutdown, and
State.
3. Do any of the following:
• To refresh the counter of frames tht matched the policy, click Refresh.
• To clear the counter of frames matching the policy, click Clear.
4. To save your changes, click Save.
To restore the previous settings, click Reset.
Change the Rate Limiters settings
On the ACL Rate Limiter conguration screen, you can congure up to 16 Rate Limit
options. See the table below for more information about the settings that you can
change.
To access the Rate Limiter conguration screen, click Conguration > Security >
Network > ACL > Rate Limiters.
Menu optionDescription
Rate Limiter IDThe rate limiter ID for the settings contained in the same row
RateThe dropping threshold. Allowed values include 0 to 3276700 in
UnitSpecify the rate unit. The allowed values are:
[pps]Packets per second
[kbps]Kbits per second
1. On the main screen of the Web management UI, click Conguration > Security >
Network > ACL > Rate Limiter.
2. Congure the Rate Limiter settings as needed.
3. To save your changes, click Save.
To restore the previous settings, click Reset.
(range is 1 to 16).
pps or 0, 100, 2*100, 3*100…100000 in kbps.
Instruction Manual
53
Change the Access Control List settings
You can use the Access Control List screen to dene the ACE settings on the switch.
Each row describes the ACE that is dened. You can dene ltering rules for an ACL
policy, for a specic port, or for all ports. See the table below for more information
about the settings that you can change.
To access the Access Control List screen, click Conguration > Security > Network >
ACL > Access Control List.
Menu optionDescription
Ingress PortIndicates the ingress port of the ACE. Possible values are:
[All]The ACE will match all ingress ports.
[Port]The ACE will match a specic ingress port.
Policy/BitmaskIndicates the Policy and Bitmask of the ACE.
Frame TypeIndicates the frame type of the ACE. Possible values include:
[Any]The ACE will match any frame type.
[Etype]The ACE will match Ethernet Type frames. Note that an Ethernet
[ARP]The ACE will match ARP/RARP frames.
[IPv4]The ACE will match all IPv4 frame.
[IPv4/ICMP]The ACE will match IPv4 frames with ICMP protocol.
[IPv4/UDP]The ACE will match IPv4 frames with UDP protocol.
[IPv4/TCP]The ACE will match IPv4 frames with TCP protocol.
[IPv4/Other]The ACE will match IPv4 frames, which are not ICMP/UDP/TCP.
[IPv6]The ACE will match all IPv6 standard frames.
ActionIndicates the forwarding action of the ACE.
[Permit]Frames matching the ACE may be forwarded and learned.
[Deny]Frames matching the ACE are dropped.
Rate LimiterIndicates the rate limiter number of the ACE. The allowed range
Type based ACE will not get matched by IP and ARP frames.
is 1 to 16. When set to Disabled, the rate limiter operation is
disabled.
Instruction Manual
54
Port RedirectIndicates the port redirect operation of the ACE. Frames
matching the ACE are redirected to the port number. The allowed
values are Disabled or a specic port number. When Disabled is
displayed, the port redirect operation is disabled
MirrorSpeciy the mirror operation of this port. Frames matching the
ACE are mirrored to the destination mirror port. The allowed
values are:
[Enabled]Frames received on the port are mirrored.
[Disabled]Frames received on the port are not mirrored.The default value
is Disabled.
CounterThe counter indicates the number of times the ACE was hit by a
frame.
Modication
Buttons
You can modify each ACE (Access Control Entry) in the table,
using the following buttons:
[+]Inserts a new ACE before the current row.
[e]Edits the ACE row.
[ ]Moves the ACE up the list.
[ ]Moves the ACE down the list
[X]Deletes the ACE.
[+]The lowest plus sign adds a new entry at the botton of the ACE
listings.
1. On the main screen of the Web management UI, click Conguration > Security >
Network > ACL > Access Control List.
2. Do any of the following:
• To add a new ACE, click the plus button.
• To modify the ACE row, click the e button.
• To clean the counter of frames matching the policy, click the Clear button.
• To delete all of the ACE rows, click the Remove All button.
• To automatically refresh the page, click the Auto-refresh button.
3. To save your changes, click Save.
To restore the previous settings, click Reset.
Instruction Manual
55
Change the Snooping Conguration settings
You can use the DHCP Snooping Conguration screen to lter IP trac on insecure
ports for which the source address can’t be identied using DHCP snooping.
To access the DHCP Snooping Conguration screen, click Conguration > Security
> Network > DHCP > Snooping.
Menu optionDescription
Snooping mode
Snooping mode Indicates the status of DHCP snooping mode operation. Possible
[Enabled]Enables DHCP snooping mode operation. When DHCP snooping
[Disabled]Disables DHCP snooping mode operation.
Port mode conguration
Port modeIndicates the DHCP snooping port mode.
CongurationPossible port modes are:
[Trusted]Congures the port as a trusted source of the DHCP messages.
[Untrusted]Congures the port as an untrusted source of the DHCP
1. On the main screen of the Web management UI, click Conguration > Security >
Network > DHCP Snooping.
2. Do one of the following:
• Select Enabled Snooping Mode.
• Select Disabled Snooping port.
3. Select either Trusted or Untrusted for each port.
4. To save your settings, click Save.
To restore the previous settings, click Reset
modes are:
mode operation is enabled, the DHCP request messages will be
forwarded to trusted ports and only allow packets from trusted
ports.
messages.
Instruction Manual
56
Change the Relay settings
Using the DHCP Relay Conguration screen, you can congure DHCP relay service for
attached host devices. If a subnet doesn’t include a DHCP server, you can relay DHCP
client requests to a DHCP server on another subnet.
To access the DHCP Relay Conguration screen, click Conguration > Security >
Network > DHCP > Relay.
Menu optionDescription
Relay modeIndicates the DHCP relay mode operation.
Possible modes are:
[Enable]Enables DHCP relay mode operation. When DHCP relay mode
[Disable]Disables DHCP relay mode operation.
Relay ServerIndicates the DHCP relay server IP address. A DHCP relay agent is
Relay
Information
mode
[Enable]Enables DHCP relay information mode. When DHCP relay
[Disable]Disables DHCP relay information mode.
operation is enabled, the agent forwards and transfers DHCP
messages between the clients and the server when they are not
in the same subnet domain. The DHCP broadcast message won’t
be ooded for security considerations.
used to forward and transfer DHCP messages between the clients
and the server when they are not in the same subnet domain.
DHCP Option 82 is the “DHCP Relay Agent Information Option”.
Option 82 was designed to allow a DHCP Relay Agent to insert
circuit specic information into a request that is being forwarded
to a DHCP server. The option works by setting two sub-options:
Circuit ID and Remote ID.
Possible modes are:
information mode operation is enabled, the agent inserts specic
information (option 82) into a DHCP message when forwarding
to DHCP server, and removes it from a DHCP message when
transferring to a DHCP client. It only works when DHCP relay
operation mode is enabled.
Instruction Manual
57
Relay
Information
Policy
Indicates the DHCP relay information policy option. When DHCP
relay information mode operation is enabled, if an agent receives
a DHCP message that already contains relay agent information,
it will enforce the policy. The Replace option is invalid when relay
information mode is disabled.
Possible policies are:
[Replace]Replace the original replay information when a DHCP message
that already contains it is received.
[Keep]Keep the original relay information when a DHCP message that
already contains it is received.
[Drop]Drop the package when a DHCP message that already contains
replay information is received.
1. On the main screen of the Web management UI, click Conguration > Security >
Network > DHCP > Relay.
2. Set the Relay Mode to either Enabled or Disabled.
3. Specify the Relay Server address.
4. Set Relay Information Mode to either Enabled or Disabled.
5. Specify Policy Settings.
6. To save your settings, click Save.
To restore the previous settings, click Reset.
Instruction Manual
58
Change the IP Source Guard settings
You can use the IP Source Guard table (manually insert MAC Address table) or DHCP
Snooping table (dynamic MAC address table) to lter IP trac on switch ports.
To access the IP Source Guard screen, click Conguration > Security > Network > IP
Source Guard.
Menu optionDescription
IP Source Guard mode
ModeEnable or Disable the Global IP Source Guard. All congured ACEs
Port mode conguration
Port modeSpecies the ports on which IP Source Guard is enabled. Only
Max DynamicSpecify the maximum number of dynamic clients that can be
1. On the main screen of the Web management UI, click Conguration > Security >
Network > IP Source Guard > Conguration.
2. Set the IP Source Guard mode to either Enabled or Disabled.
3. Set the IP Source Guard mode for each port, as well as the Max Dynamic Clients
allowed.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
will be lost when Mode is set to Enabled.
when both Global Mode and Port Mode are enabled on a given
port is IP Source Guard enabled on that port.
learned on a given port. This value can be 0, 1, 2, or Unlimited. If
the port mode is enabled and the value of max dynamic client is
equal to 0, it means only the IP packets that are matched in static
entries on the specic port are forwarded.
Instruction Manual
59
Change the Static Table settings
You can create a Static Port-VLAN-IP Address-MAC address mapping table for IP Source
Guard usage. The following table describes the options for conguring the mapping
table:
Menu optionDescription
DeleteSelect to delete the entry. It will be deleted during the next save.
PortThe logical port of the settings.
VLAN IDThe VLAN ID for the setting.
IP addressAllowed source IP address.
Mac addressAllowed source Mac address.
1. On the main screen of the Web management UI, click Conguration > Security >
Network > IP Source Guard > Static Table.
2. Select Add New Entry.
3. Enter the desired information for the following elds: Port number, VLAN ID, IP Address, and Mac Address.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the Conguration settings
ARP Inspection is a method of protecting against certain man-in-the-middle attacks.
It will validate the ARP request and response packet by intercepting with information
from the MAC-to-IP database (dynamic: DHCP Snooping table, static: Static table).
Menu optionDescription
ModeEnable the Global ARP Inspection or disable the Global ARP
Port mode
conguration
Inspection.
Specify which ports ARP Inspection is enabled on. ARP will only
be enabled on ports on which Global Mode and Port Mode are
enabled.
1. On the main screen of the Web management UI, click Conguration > Security >
Network > ARP Inspection > Conguration.
2. Set the ARP Inspection Conguration mode to either Enabled or Disabled.
Instruction Manual
60
3. Select Enabled or Disabled for each port.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the Static ARP Inspections Table settings
Use the Static ARP Inspection table to create a database for validation.
The switch rst compares ARP packets to any entries specied in the static ARP table.
If no static entry matches the packets, then the DHCP snooping bindings database
determines their validity.
Menu optionDescription
DeleteClicking the Delete button will remove the entry during the next
PortThe logical port for the settings.
VLAN IDThe VLAN ID for the settings.
Mac addressDesignates the Allowed Source MAC address in ARP request
IP addressDesignates the Allowed Source IP address in ARP request packets.
1. On the main screen of the Web management UI, click Conguration > Security >
ARP Inspection > Static Table.
2. To create a new Static ARP inspection record for a given port, click Add New Entry.
3. Enter the appropriate values for Port number, VLAN ID, IP Address, and Mac Address.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
save.
packets.
Change the Authentication Server Conguration settings
Use the Authentication Server Conguration screen to build up an authenticated
mechanism with RADIUS server.
To access the Authentication Server Conguration screen, click Conguration > Security > AAA.
Instruction Manual
61
Menu optionDescription
Common Server Conguration
TimeoutThe maximum waiting time to wait for a reply from server (range
Dead timeThe time after which the switch considers an authentication
RADIUS Authentication Server Conguration
EnableEnable the RADIUS Authentication Server by selecting this check
IP AdressIP address of the RADIUS server.
PortThe UDP port to use on the RADIUS authentication Server.
SecretEncryption key (maximum characters is 29).
1. On the main screen of the Web management UI, click Conguration > Security >
AAA.
2. Specify the parameters of the Radius Authentication Server.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
is 3 to 3600 seconds).
server to be dead if it does not reply (range is 0 to 3600 seconds).
box.
Change the Static settings
You can create a static trunk group (multiple links between devices to work as one
virtual aggregated link), using the Aggregation Mode Conguration screen.
To locate the screen, click Conguration > Port Trunking > Static.
Menu optionDescription
Hash Code contributors
Source MAC
address
Destination
MAC address
The Source MAC address can be used to calculate the destination
port for the frame. Select to enable the use of the Source MAC
address, or unselect to disable. By default, Source MAC address
is enabled.
The Destination MAC Address can be used to calculate the
destination port for the frame. Select to enable the use of the
Destination MAC Address, or unselect to disable. By default,
Destination MAC Address is disabled.
Instruction Manual
62
IP addressThe IP Address can be used to calculate the destination port for
TCP/IP port
number
Aggregation Group Conguration
Group IDIndicates the group ID for the settings contained in the same row.
Port membersEach switch port is listed for each group ID. Select a radio button
1. On the main screen of the Web management UI, click Conguration >
Aggregation > Static.
2. In the section titled Hash Code Contributors, congure the desired load-balancing
method using the provided check boxes. Parameters include Source MAC Address,
Destination MAC Address, IP Address, and TCP/UDP Port Number.
3. Assign port members to their specic trunking group.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
the frame. Select to enable the use of the IP Address, or unselect
to disable. By default, IP Address is enabled.
The TCP/IP port number can be used to calculate the destination
port for the frame. Select to enable the use of the TCP/IP Port
Number, or unselect to disable. By default, TCP/UDP Port Number
is enabled.
Group ID “Normal” indicates there is no aggregation. Only one
group ID is valid per port.
to include a port in an aggregation, or clear the radio button
to remove the port from the aggregation. By default, no ports
belong to any aggregation group. Only full duplex ports can join
an aggregation and ports must be in the same speed in each
group.
Change the LACP settings
Using the LACP Port Conguration screen, you can enable LACP on selected ports,
and also congure key and LACP mode.
To locate the screen, click Conguration > Port Trunking > Static.
Menu optionDescription
PortPort identier.
Instruction Manual
63
LACP enabledControls whether LACP is enabled on this switch port. LACP will
form an aggregation when two or more ports are connected to
the same partner. LACP can have up to 12 LLAGs per switch and
GLAGs per stack..
KeyThe Key value incurred by the port.(Range is 1 to 65535.) The
“Auto” setting will set the key as appropriate by the physical link
speed, 10Mb=1, 100Mb=2, 1Gb=3. Using the specic setting, a
user-dened value can be entered. The same key setting ports
can participate in the same aggregation group.
RoleThe Role shows the LACP activity status. The “Active” will transmit
LACP packets each second, while “Passive” will wait for a LACP
packet from a partner.
TimeoutThe Timeout controls the period between BPDU transmissions.
“Fast” will transmit LACP packets each seconds, while “Slow” will
wait for 30 seconds before sending an LACP Packet.
PrioThe Prio controls the priority of the port. If the LACP partner
wants to form a larger group than is supported by this device,
then this parameter will control which ports will be active and
which ports will be in a backup role. Lower number means
greater priority.
1. On the main screen of the Web management UI, click Conguration >
Aggregation > LACP.
2. Enable LACPS on all of the ports in an LAG.
3. Divide the LAG by a dierent key.
4. Set the Role of at least one port to Active.
5. To save your settings, click Save.
To restore the previous settings, click Reset.
Instruction Manual
64
Change the Loop Protection settings
You can access the Loop Protection screen by clicking Conguration > Loop
Protection.
Menu optionDescription
General Settings
Enable loop
protection
Transmission
time
Shutdown timeThe period (in seconds) for which a port will be kept disabled in
Port Conguration
PortPort identier.
EnableControl whether loop protection is enabled on this switch port.
ActionCongure the action performed when a loop protection is
Tx modeControl whether the port is actively generating loop protection
1. On the main screen of the Web management UI, click Conguration > Loop Protection.
2. Enable Loop Protection, congure Transmission Time and Shutdown Time.
3. Specify the reaction for each port when loop protection is detected.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
Controls whether loop protection is enabled.
The interval between each loop protection PDU sent on each
port. Valid values are 1 to 10 seconds.
the event of loop is detected (and the port action shuts down the
port). Valid values are 0 to 604800 seconds (7 days). A value of
zero will keep a port disabled (until next device restart).
detected on a port. Valid values are Shutdown Port, Shutdown
Port and Log, or Log only.
PDUs, or whether it is just passively looking for looped PDUs.
Instruction Manual
65
Change the Spanning Tree settings
The Spanning Tree algorithm enables the switch to cooperate with other bridging
devices by detecting and disabling network loops and providing backup links between
switches, bridges, and routers.
You can access the Spanning Tree screen by clicking Conguration > Spanning Tree
> Bridge Settings.
Menu optionDescription
Basic Settings
Protocol version The STP protocol version setting, the Valid values are STP(IEEE
Bridge priorityControls the bridge priority; low numeric values have higher
Forward delayThe delay used by STP Bridges to transit Root and Designated
Max ageThe Maximum age of information transmitted by the Bridge
Maximum hop
count
Advanced settings
Edge Port BPDU
ltering
Edge Port BPDU
Guard
Port Error
Recovery
Port Error
Recovery
Timeout
802.1D) and RSTP(IEEE 802.1w).
priority.
Ports to forwarding (used in STP compatible mode). (Range is 4
to 30 seconds.)
when it is the Root Bridge. (Range is 6 to 40 seconds.)
Max Age must be ≤ (Forward delay -1) x 2.
This setting denes the initial value of remaining Hops for MSTI
information generated at the boundary of an MSTI region. (Range
is 6 to 40 hops.)
Control whether the port explicitly congured as Edge will
transmit and receive BPDUs.
Control whether a port explicitly congured as Edge will disable
itself upon reception of a BPDUs. The port will enter the errordisables state and will be removed from the active topology.
Control whether a port in the error-disable state will
automatically be enabled after a certain time. If recovery is not
enabled, ports have to be disabled and re-enabled from normal
STP operation. The condition is also cleared by a system reboot.
The time to pass before a port in the error-disabled state can be
enabled. (Range is 30 to 86400 seconds.)
Instruction Manual
66
1. On the main screen of the Web management UI, click Conguration > Spanning Tree > Bridge Settings.
2. Congure the required attributes.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the MSTI Mapping settings
Use the MSTI Mapping screen to inspect the current STP MSTI bridge instance
priorities conguration and change them if necessary.
You can access the screen by clicking Conguration > Spanning Tree > MSTI
Mapping.
Menu optionDescription
Conguration Identication
Conguration
name
Conguration
revision
MSTI Mapping
MSTIThe bridge instance. The CIST is not available for explicit
VLANs mappedThe list of VLANs mapped to the MSTI. The VLANs can be given as
The name identifying the VLAN-to-MSTI mapping. Bridges must
share the name and revision (see below), as well as VLAN-to-MSTI
mapping conguration, in order to share spanning trees for
MSTIs (intra-region). The name can be at most 32 characters.
The revision of the MSTI conguration named above. This must
be an integer between 0 and 65535.
mapping, as it will receive the VLANs that aren’t explicitly
mapped.
a single VLAN (xx, xx being between 1 and 4094), or a range(xxyy), each of which must be separated with a comma and/or
space. A VLAN can only be mapped to one MSTI. An unused MSTI
should just be left empty.(i.e. not having any VLANs mapped to
it). Example 2, 5, 20 to 40.
1. On the main screen of the Web management UI, click Conguration > Spanning Tree > MSTI > Mapping.
2. Congure the Identication and MSTI Mapping tables.
3. Specify the reaction for each port when loop protection is detected.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
Instruction Manual
67
Change the MSTI Priorities settings
Use the MSTI Priorities screen to congure the bridge priority for the CIST and any
congured MSTI. RSTP recognizes each MST Instance as a single bridge node.
You can access the screen by clicking Conguration > Spanning Tree > MSTI
Priorities.
Menu optionDescription
MSTIThe bridge instance. The CIST is the default instance, which is
PrioritiesControls the bridge priority, lower numeric values have better
1. On the main screen of the Web management UI, click Conguration > Spanning Tree > MSTI Priorities.
2. Set the Priority value for CIST and MSTI1-MSTI7.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
always active.
priority. The bridge priority plus the MSTI instance number,
concatenated with the 6-byte MAC address of the switch forms a
Bridge Identier.
Change the CIST ports settings
Using the STP CIST Ports Conguration screen, you can congure STA attributes
for interfaces when the Spanning Tree mode is set to STP or RSTP, or for Interfaces
in the CIST. STA interface attributes include Path Cost, Priority, Edge Port, Automatic
Detection of an edge port, and PtP link type.
You can access the screen by clicking Conguration > Spanning Tree > Bridge Ports.
Menu optionDescription
CIST Aggregation Port Conguration
STP EnableControls whether STP is enabled on this switch port.
Instruction Manual
68
Path CostControl the Path Cost incurred by this port. The “Auto” setting
will set the path cost as appropriate by physical link speed, using
the 802.1D recommended values. Using “specic” settings, a
user-dened value can be entered. The path cost is used when
establishing the active topology of the network. Low path cost
ports are chosen as forwarding ports in favour of higher path cost
ports. (Range is 1 to 200000000.)
PriorityControl the port priority. This can be used to control priority of
the ports having identical port cost.
Admin EdgeEnable this option if this port is connected to an end node or at
the end of the bridge.
Auto EdgeControl whether automatic edge detection is enabled on a
bridge port.
Restricted roleIf enabled, cause the port not to be selected as Root port for the
CIST, even if it has the best spanning tree priority vector. This
features is also known as Root Guard.
Restricted TCNIf enabled, this causes the port not to propagate received
topology change notications and topology changes to other
ports. If set, it can cause temporary loss of connectivity after
changes in a spanning tree’s active topology as a result of
persistently incorrect learned station location information. It is set
by a network administrator to prevent external bridges to a core
region of the network, causing address ushing in that region,
possibly because those bridges are not under the full control of
the administrator or the physical link state of the attached LANs
transits frequently.
BDPU GuardIf enabled, causes the port to disable itself upon receiving valid
BPDUs. Contrary to the similar bridge setting, the port Edge
status doesn’t aect this setting.
Point-to-PointControls whether the port connects to a point-to-point LAN
rather than a shared medium. This can be automatically
determined, or forced either true or false. The transition to the
forwarding state is faster for point-to-point LANs than for shared
media.
1. On the main screen of the Web management UI, click Conguration > Spanning Tree > CIST Ports.
2. Congure the required attributes.
Instruction Manual
69
3. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the MSTI Ports settings
The MSTI ports conguration screen allows the user to inspect the current STP MSTI
port congurations and possibly change them as well. An MSTI port is a virtual port,
which is instantiated separately for each active CIST(physical) port for each MSTI
instance congured on and applicable to the port.The MSTI instance must be selected
before displaying actual MSTI port conguration options.
Menu optionDescription
MSTI Aggregated Ports Conguration
PortThe switch port number of the corresponding STP CIST(and MSTI)
Path CostControl the Path Cost incurred by this port. The “Auto” setting
PriorityControls the port priority. This can be used to control priority of
1. On the main screen of the Web management UI, click Conguration > Spanning Tree > MSTI Ports.
2. Select MSTI and then click the get button.
3. Set the STA parameters for ports.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
port.
will set the path cost as appropriate by physical link speed, using
the 802.1D recommended values. Using “specic” settings, a
user-dened value can be entered. The path cost is used when
establishing the active topology of the network. Low path cost
ports are chosen as forwarding ports in favour of higher path cost
ports.
(Range is 1 to 200000000.)
ports having identical port cost.
Instruction Manual
70
Change the MVR settings
You can enable multicast trac forwarding on the multicast VLANs by using the MVR
conguration screen. In a multicast television application, a PC, a network television,
or set-top box can receive the multicast stream. Multiple set-top boxes or PCs can be
connected to one subscriber port, which is a switch port congured as an MVR receiver
port.
When a subscriber selects a channel, the set-top box or PC sends an IGMP/MLD report
message to Switch A to join the appropriate multicast group address. Uplink ports that
send and receive multicast VLAN are called MVR source ports. It allows you to create at
maximum eight MVR VLANs, with corresponding channel settings for each Multicast
VLAN. At maximum, there will be a total of 256 group addresses for channel settings.
Menu optionDescription
MVR ModeEnable or Disable the Global MVR. The Unregistered Flooding
DeleteCheck to delete the entry. The designated entry will be deleted
MVR VIDSpecify the Multicast VLAN ID.
MVR NameMVR Name is an optional attribute to indicate the name of the
ModeSpecify the MVR mode of operation. In Dynamic mode, MVR
TaggingSpecify whether the traversed IGMP/MLD control frames will be
PrioritySpecify how the traversed IGmP/mld control frames will be sent
control depends on the current conguration in IGMP/MLD
snooping. It is suggested to enable Unregistered Flooding control
when the MVR group table is full.
during the next save.
Warning: It’s not recommended to have MVR source ports
overlapped with management VLAN ports.
specic MVR VLAN. Maximum length of the MVR VLAN Name
string is 32. MVR VLAN Name can only contain alphanumeric
characters. When the optional MVR VLAN name is given, it should
contain at least one letter. MVR VLAN name can be edited for the
existing MVR VLAN entries or it can be added to the new enteries.
allows dynamic MVR membership reports on source ports. In
Compatible mode, MVR memership reports are forbidden on
source ports. The default is Dynamic mode.
sent as Untagged or Tagged with MVR VID. The default is Tagged.
in prioritized manner. The default Priority is 0.
Instruction Manual
71
LLQIDenes the maximum time to wait for IGMP/MLD report
memberships on a receiver port before removing the port from
multicast group membership. The value is in units of tenths of a
seconds. The range is from 0 to 31744. The default LLQI is 5 tenths
or one-half second.
Interface
Channel Setting
When the MVR VLAN is created, click the Edit symbol to expand
the corresponding multicast channel settings for the specic
MVR VLAN. Summary about the Interface Channel Setting (of the
MVR VLAN) will be shown beside the Edit symbol.
PortThe logical port for the setting.
Port RoleCongure an MVR port of the designated MVR VLAN as one of the
following roles.
[Inactive]The designated port does not participate in MVR operations.
[Source]Congure uplink ports that receive and send multicast data as
source ports. Subscribers cannot be directly connected to source
ports.
[Receiver]Congure a port as a receiver port if it is a subscriber port and
should only receive multicast data. It does not receive data unless
it becomes a member of the multicast group by issuing IGMP/
MLD messages.
[Be Caution]MVR source ports are not recommended to be overlapped with
management VLAN ports. Select the port rule by clicking the Role
symbol to switch the setting.
“I” indicates Inactive, “S” indicates source, and ”R” indicates
Receiver. The default Role is Inactive.
1. On the main screen of the Web management UI, click Conguration > MVR.
2. Enable MVR globally on the switch, and select MVR VLAN.
3. Set the VLAN interface setting.
4. If necessary, you can select Enable “fast leaving” for each port.
5. To save your settings, click Save.
To restore the previous settings, click Reset.
Instruction Manual
72
Change the IGMP Snooping Conguration settings
Multicasting is used to support real-time applications such as video-conferencing or
streaming audio. A multicast server doesn’t have to establish a separate connection
to each client; it only broadcasts its service to the network. Using this approach will
signicantly increase broadcast trac on the network. This switch can use IGMP to
lter multicast trac. IGMP snooping can be used to passively monitor or snoop the
packets exchanging between multicast hosts and clients. Then it can set its lters. You
can use the IGMP Snooping Conguration page to congure Global and Port Related
settings to control the forwarding of multicast trac. This can decrease broadcast
trac to improve the network performance.
You can access the screen by clicking Conguration > IPMC > IGMP Snooping >
Basic Conguration.
Menu optionDescription
Global Conguration
Snooping
Enabled
Unregistered
IPMCv4
Flooding
Enabled
IGMP SSM
Range
Leave Proxy
Enable
Proxy EnabledEnable IGMP Proxy. This feature can be used to avoid forwarding
Port Related Conguration
PortPort identier.
Router PortSpecify which ports act as router ports. A router port is a port
Fast LeaveEnable the fast leave on the port.
Control whether the IGMP snooping is enabled.
Enable unregistered IPMCv4 trac ooding. The ooding control
takes eect only when IGMP Snooping is enabled. When IGMP
Snooping is disabled, unregistered IPMCv4 trac ooding is
always active in spite of this setting.
SSM (Source-Specic Multicast) Range allows the SSM-aware
hosts and routers to run the SSM service model for the groups in
the address range.
Enable IGMP Leave Proxy. This feature can be used to avoid
forwarding unnecessary leave messages to the router side.
unnecessary join and leave messages to the router side.
on the Ethernet switch that leads towards the Layer 3 multicast
device or IGMP querier. If an aggregation member port is
selected as a router port, the whole aggregation will act as a
router port.
Instruction Manual
73
ThrottlingSet this to Enable to limit the number of multicast groups to
1. On the main screen of the Web management UI, click Conguration > IPMC >
IGMP Snooping > Basic Conguration.
2. Specify the required IGMP Snooping settings.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
which a switch port can belong.
Change the VLAN Conguration settings
Each page shows up to 99 entries from the VLAN table, the default being 20, selected
through the “entries per page” input eld. When rst visited, the web page will show
the rst 20 entries from the beginning of the VLAN table. The one with the lowest VLAN
ID found in the VLAN table will be displayed rst.
You can access the screen by clicking Conguration > IPMC > IGMP Snooping >
VLAN.
Menu optionDescription
DeleteSelect to delete the entry. The desginated entry will be deleted
VLAN IDThe VLAN ID of the entry.
IGMP Snooping
Enabled
IGMP QuerierEnable the IGMP Querier in the VLAN.
CompatibilityCompatibility is maintained by hosts and routers taking
RVRobustness Variable. The Robustness Variable allows tuning for
QIQuery Interval. The Query Interval is the interval between General
during the next save.
Enable the per-VLAN IGMP Snooping. Up to 32 VLANs can be
selected for IGMP Snooping.
appropriate actions depending on the versions of IGMP
operating on hosts and routers within a network. The allowed
selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2, and
Forced IGMPv3. The default compatibility value is IGMP-Auto.
the expected packet loss on a network. The allowed range is 1 to
255, and the default robustness variable is 2.
Queries sent by the Querier. The allowed range is 1 to 31744
seconds. Default query interval is 125 seconds.
Instruction Manual
74
QRIQuery Response Interval. The maximum Response Delay used to
LLQI(LMQI for
IGMP)
URIUnsolicited Report Interval. The Unsolicited Report Interval is the
1. On the main screen of the Web management UI, click Conguration > IPMC >
IGMP Snooping > VLAN Conguration.
2. To add a new entry, click Add New IGMP VLAN.
3. To update the displayed table starting from that or the next closest VLAN table
match, click Refresh.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
calculate the Maximum Response Code inserted into the periodic
General Queries. The allowed range is 0 to 31744 in tenths of
seconds, and the default query response interval is 100 in tenths
of seconds(10 seconds).
Last Member Query Interval. The last Member Query Time is
the time value represented by the Last Member Query Interval,
multiplied by the Last Member Query Count. The allowed range
is 0 to 31744 in tenths of seconds, and the default last member
query intervall is in tenths of seconds (1 second).
time between repetitions of a host’s initial report of membership
in a group. The allowed range is 0 to 31744 seconds, and the
default unsolicited report interval is 1 second.
Change the Port Group Filtering settings
Use the Port Group Filtering Conguration screen to lter specic multicast trac.
You can access the screen by clicking Conguration > IPMC > IGMP Snooping >
VLAN Conguration.
Menu optionDescription
DeleteCheck to delete the entry. It will be deleted during the next save.
PortThe logical port for the settings.
Filtering Groups The IP Multicast Group that will be ltered.
Add New
Filtering Group
Click Add New Filtering Group to add a new entry to the Group
Filtering table. Specify the Port, and Filtering Group of the new
entry.
Instruction Manual
75
1. On the main screen of the Web management UI, click Conguration > IPMC >
IGMP Snooping > Port Group Filtering.
2. Click Add New Filtering Group.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the Basic Conguration settings
Multicast Listener Discovery snooping is available on IPv6 network and performs a
similar function to IGMP for IPv4.
You can access the screen by clicking Conguration > IPMC > MLD Snooping >
Basic.
Menu optionDescription
Snooping EnabledEnable the Global MLD Snooping.
Unregistered
IPMCv6 Flooding
Enabled
MLD SSM RangeSSM (Source-Specic Multicast) Range allows the SSM-aware
Leave Proxy
Enabled
Proxy EnabledEnable MLD Proxy. This feature can be used to avoid
Router PortSpecify which ports act as router ports. A router port is a
Fast Leave
Throttling
Enable unregistered IPMCv6 trac ooding. The ooding
control takes eect only when MLD Snooping is enabled.
When MLD Snooping is disabled, unregistered IPMCv6 trac
ooding is always active in spite of this setting.
hosts and routers to run the SSM service model for the groups
in the address range.
Enable MLD leave Proxy. This feature can be used to avoid
fowarding unnecessary leave messages to the router side.
forwarding unnecessary join and leave messages to the router
side.
port on the Ethernet switch that leads towards the Layer 3
multicast device or MLD querier. If an aggregation member
port is selected as a router port, the whole aggregation will
act as a router port.
Enable the fast leave on the port. Enable to limit the number
of multicast groups to which a switch port can belong.
1. On the main screen of the Web management UI, click Conguration > IPMC > MLD Snooping > Basic Conguration.
Instruction Manual
76
2. Compile the MLD-related parameters.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the VLAN Conguration settings
Use the MLD Snooping VLAN Conguration screen to congure MLD snooping and
query for a VLAN interface.
You can access the screen by clicking Conguration > IPMC > MLD Snooping >
VLAN Conguration.
Menu optionDescription
DeleteCheck to delete the entry. The designated entry will be
VLAN IDThe VLAN ID of the entry.
MLD Snooping
Enabled
MLD Querier
Compatibility
RVRobustness Variable. The Robustness Variable allows tuning
QIQuery Interval. The Query Interval is the interval between
QRIQuery Response Interval. The maximum Response Delay used
deleted during the next save.
Enable per-VLAN MLD Snooping. Up to 32 VLANs can be
selected for MLD Snooping.
Enable the IGMP Querier in the VLAN
Compatibility is maintained by hosts and routers taking
appropriate actions depending on the versions of MLD
operating on hosts and routers within a network. The allowed
selection is “MLD-Auto”, “Forced-MLDv1”, and “Forced MLDv2”.
The default compatibility value is “MLD-auto”.
for the expected packet loss on a link. The allowed range is 1
to 255, default robustness variable value is 2.
General Queries sent by the Querier. The allowed range is 1 31744 seconds, default query interval is 125 seconds.
to calculate the Maximum Response Code inserted into the
periodic General Queries. The allowed range is 0 to 31744 in
tenths of seconds, default query response interval is 100 in
tenths of seconds (10 seconds).
Instruction Manual
77
LLQILast listener Query Interval. The Last Listener Query Interval is
URIUnsolicited Report Interval. The Unsolicited Report Interval
1. On the main screen of the Web management UI, click Conguration > IPMC > MLD Snooping > VLAN Conguration.
2. To create a new MLD VLAN entry, click Add New MLD VLAN.
3. To update the displayed table starting from that or the next closest VLAN table
match, click Refresh.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
the Maximum Response Delay used to calculate the Maximum
Response Code inserted into Multicast Address Specic
Queries sent in response to Version 1 Multicast Listener
Done messages. It is also the Maximum Response Delay
used to calculate the Maximum Response Code inserted into
Multicast Address and Source Specic query message. The
allowed range is 0 to 31744 in tenths of seconds, default last
listener query interval is 10 in tenths of seconds(1 second).
is the time between repetitions of a node’s initial report of
interest in a multicast address. The allowed range is 0 to 31744
seconds, default unsolicited report interval is 1 second.
Change the MLD Conguration settings
Use the MLD Snooping Port Group Filtering Conguration screen to lter specic
multicast trac.
You can access the screen by clicking Conguration > IPMC > MLD Snooping > Port
Group Filtering.
Menu optionDescription
DeleteSelect to delete the entry. The designated entry will be
PortThe logical port for the settings.
Add New Filtering
Group
deleted during the next save.
Add a new ltering group.
Instruction Manual
78
1. On the main screen of the Web management UI, click Conguration > IPMC > MLD Snooping > Port Group Filtering.
2. To add a new entry, click Add New Filtering Group.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
Change the LLDP settings
Use the LLDP Conguration screen to set the timing parameters for LLDP
advertisements and the device information which is advertised.
You can access the screen by clicking LLDP > LLDP.
Menu optionDescription
LLDP Parameters
Tx IntervalThe switch periodically transmits LLDP frames to its
Tx HoldEach LLDP frame contains information about how long the
Tx DelayIf some conguration is changed (e.g. the IP address) a new
Tx ReinitWhen a port is disabled, LLDP is disabled or the switch is
LLDP Port Conguration
PortThe switch port number of the logical LLDP port.
ModeSelect LLDP mode.
neighbours for having the network discovery information up
to date. The interval between each LLDP frame is determined
by the Tx Interval value. Valid values are restricted to 5 to
32768 seconds.
information in the LLDP frame will be considered valid. The
LLDP information valid period is set to Tx Hold multiplied by
Tx Interval seconds. Valid values are restricted to 2 to 10 times.
LLDP frame is transmitted, but the time between the LLDP
frames will always be at least the value of Tx Delay seconds. Tx
Delay cannot be larger than 1/4 of the Tx Interval value. Valid
values are restricted to 1 to 8192 seconds.
rebooted, an LLDP shutdown frame is transmitted to the
neighbouring units, signalling that the LLDP information
isn’t valid anymore. Tx Reinit controls the amount of seconds
between the shutdown frame and a new LLDP initialization.
Valid values are restricted to 1 to 10 seconds.
Instruction Manual
79
[Rx only]The switch will not send out LLDP information, but LLDP
information from neighbour units is analyzed.
[Tx only]The switch will drop LLDP information received from
neighbours, but will send out LLDP information.
[Disabled]The switch will not send out LLDP information, and will drop
LLDP information received from neighbours.
[Enabled]The switch will send out LLDP information, and will analyze
LLDP information received from neighbours.
CDP AwareSelect CDP awareness.
The CDP operation is restricted to decoding incoming CDP
frames (the switch doesn’t transmit CDP frames). CDP frames
are only decoded if LLDP on the port is enabled.
Only CDP TLVs that can be mapped to a corresponding eld
in the LLDP neighbours’ table are decoded. All other TLVs are
discarded (unrecognized CDP TLVs and discarded CDP frames
are not shown in the LLDP statistics). CDP TLVs are mapped
onto LLDP neighbours’ table as shown below.
CDP TLV “Device ID” is mapped to the LLDP “Chassis ID” eld.
CDP TV “Address” is mapped to the LLDP “Management
Address” eld. The CDP address TLV can contain multiple
addresses, but only the rst address is shown in the LLDP
neighbours’ table.
CDP TLV “Port ID” is mapped to the LLDP “Port ID” eld.
CDP TLV “Version and Platform” is mapped to the LLDP
“System Description” eld.
Both the CDP and LLDP support “system capabilities”, but the
CDP capabilities cover capabilities that are not part of the
LLDP. These capabilities are shown as “others” in the LLDP
neighbours table. If all ports have CDP awareness disabled,
the switch forwards CDP frames received from neighbour
devices. If at least one port has CDP awareness enabled all
CDP frames are terminated by the switch.
Note: When CDP awareness on a port is disabled the CDP
information isn’t removed immediately, but gets removed
when the hold time is exceeded.
Port DescrOptional TLV: When selected, the “port description” is included
in LLDP information transmitted.
Instruction Manual
80
Sys NameOptional TLV: When selected, the “system name” is included in
Sys CapaOptional TLV: When selected, the “system capability” is
Mgmt AddrOptional TLV: When selected, the “management address” is
1. On the main screen of the Web management UI, click Conguration > LLDP >
LLDP.
2. Set the LLDP Parameters.
3. Congure the LLDP Mode, CDP aware, and Optional TLVs parameters.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
LLDP information transmitted.
included in LLDP information transmitted.
included in LLDP information transmitted.
Change the LLDP-MED settings
Use the LLDP-MED Conguration screen to set the device information which is
advertised for other devices.
You can access the screen by clicking LLDP > LLDP-MED.
Menu optionDescription
Fast start repeat count
Fast start repeat
count
Rapid startup and Emergency Call Service Location
Identication Discovery of endpoints is a critically important
aspect of VoIP systems in general. In addition, it is best
to advertise only those pieces of information which are
specically relevant to particular endpoint types (for example
only advertise the voice network policy to permitted voicecapable devices), both in order to conserve the limited LLDPU
space and to reduce security and system integrity issues that
can come with inappropriate knowledge of the network
policy.
Instruction Manual
81
Fast start repeat
count
With this in mind, LLDP-MED denes an LLDP-MED Fast Start
interaction between the protocol and the application layers
on top of the protocol, in order to achieve these related
properties. Initially, a Network Connectivity Device will only
transmit LLDP TLVs in an LLDPDU. Only after an LLDP-MED
Endpoint Device is detected, will an LLDP-MED capable
Network Connectivity Device start to advertise LLDP-MED
TLVs in outgoing LLDPDUs on the associated port. The LLDPMED application will temporarily speed up the transmission
of the LLDPDU to start within a second, when a new LLDPMED neighbour has been detected in order share LLDP-MED
information as fast as possible to new neighbours. Because
there is a risk of an LLDP frame being lost during transmission
between neighbours, it is recommended to repeat the fast
start transmission multiple times to increase the possibility
of the neighbours receiving the LLDP frame. With Fast start
repeat count it is possible to specify the number of times the
fast start transmission would be repeated. The recommended
value is 4 times, given that 4 LLDP frames with a 1 second
interval will be transmitted, when an LLDP frame with new
information is received. It should be noted that LLDP-MED
and the LLDP-MED Fast Start mechanism is only intended
to run on links between LLDP-MED Network Connectivity
Devices and Endpoint Devices, and as such does not apply
to links between LAN infrastructure elements, including
Network Connectivity Devices, or other types of links.
Coordinates Location
LatitudeLatitude SHOULD be normalized to within 0-90 degrees with
a maximum of 4 digits.It is possible to specify the direction to
either North of the equator or South of the equator.
LongitudeLongitude SHOULD be normalized to within 0-180 degrees
with a maximum of 4 digits. It is possible to specify the
diretion to either East of the prime meridian or West of the
prime meridian.
Instruction Manual
82
AltitudeAltitude SHOULD be normalized to within -32767 to 32767
with a maximum of 4 digits.It is possible to select between
two altitude types (oors or meters). Meters: Representing
meters of Altitude dened by the vertical datum specied.
Floors: Representing altitude in a form more relevant in
buildings which have dierent oor-to-oor dimensions.
An altitude = 0.0 is meaningful even outside a building, and
represents ground level at the given latitude and longitude.
Inside a building, 0.0 represents the oor level associated
with ground level at the main entrance.
Map DatumThe Map Datum is used for the coordinates given in these
options:
WGS84: (Geographical 3D)-World Geodesic System 1984, CRS
Code 4327, Prime Meridian Name: Greenwich.
NAD83/NAVD88: North American Datum 1983, CRS Code
4269, Prime Meridian Name: Greenwich; The associated
vertical datum is the North American Vertical Datum
of 1988(NAVD88). This datum pair is to be used when
referencing locations on land, not near tidal water(which
would use Datum= NAD83/MLLW).
NAD83/MLLW: North American Datum 1983, CRS Code 4269,
Prime Meridian Name: Greenwich; The associated vertical
datum is Mean Lower Low Water(MLLW). This datum pair is to
be used when referencing locations on water/sea/ocean.
Civic Address Location
Country CodeThe two-letter ISO 3166 country code in capital ASCII letters-
Emergency Call Service ELIN identier data format is dened
to carry the ELIN identier as used during emergency call
setup to a traditional CMAM or ISDN trunk-based PSAP. This
format consists of a numerical digit string, corresponding to
the ELIN to be used for emergency calling.
Policies
Instruction Manual
84
PoliciesNetwork Policy Discovery enables the ecient discovery and
diagnosis of mismatch issues with the VLAN conguration,
along with the associated Layer 2 and Layer 3 attributes.
Policies are only intended for use with applications that have
specic “real-time” network policy requirements, such as
interactive voice and/or video service.
The network policy attributes advertised are:
1. Layer 2 VLAN ID (IEEE 802.1Q)
2. Layer 2 priority value (IEEE 802.1D)
3. Layer 3 Diserv code point (DSCP) value (IETF RFC 2474)
This network policy is potentially advertised and associated
with multiple sets of application types supported on a given
port. The application types specically addressed are:
1. Voice
2. Guest Voice
3. Softphone Voice
4. Video Conferencing
5. Streaming Video
6. Control/Signalling (conditionally support a separate
network policy for the media type above)
DeleteSelect to delete the policy, it will be deleted during the next
save.
Policy IDID for the policy. This is auto generated and will be used
when selecting the policies that will be mapped to the
specic ports.
Instruction Manual
85
Application Type
1. Voice
2. Voice signalling
(conditional)
3. Guest Voice
4. Guest Voice
Signalling
(conditional)
5. Softphone Voice
6. Video
Conferencing
7. Streaming Video
Intended use of the application types:
For use by dedicated IP Telephony handsets and other similar
appliances supporting interactive voice services. These
devices are typically deployed on a separate VLAN for ease
of deployment and enhanced security by isolation from data
applications.
For use in network topologies that require a dierent
policy for the voice signalling than for the voice media. This
application type should not be advertised if all of the same
network policies apply as those advertised in the Voice
application policy.
Support a separate “limited feature-set” voice service for
guest users and visitors with their own IP Telephony handsets
and other similar appliances supporting interactive voice
services.
For use in network topologies that require a dierent policy
for the guest voice signalling than for the guest voice media.
This application type should not be advertised if all of the
same network policies apply as those advertised in the Guest
Voice application policy.
For use by softphone application on typical data-centric
devices, such as PCs or laptops. This class of endpoints
frequently does not support multiple VLANs, if at all, and
are typically congured to use an “untagged” VLAN or a
single “tagged” data specic VLAN. When a network policy
is dened for use with an “untagged” VLAN (see Tagged ag
below), then the L2 priority eld is ignored and only the DSCP
value has relevance.
For use by dedicated Video Conferencing equipment and
other similar appliance supporting real-time interactive
video/audio services.
For use by broadcast or multicast based video content
distribution and other similar applications supporting
streaming video services that require specic network policy
treatment. Video applications relying on TCP with buering
would not be an intended use of this application type.
Instruction Manual
86
8. Video Signalling
(conditional)
For use in network topologies that require a separate policy
for the video signalling than for the video media. This
application type should not be advertised if all of the same
network policies apply as those advertised in the Video
Conferencing application policy.
TagTag indicating whether the specied application type is using
a “Tagged” or an “untagged” VLAN.
Untagged indicates that the device is using an untagged
frame format and as such does not include a tag header as
dened by IEEE 802.1Q-2003. In this case, both the VLAN ID
and Layer 2 priority elds are ignored and only the DSCP
value has relevance.
Tagged indicates that the device is using the IEEE 802.1Q
tagged frame format, and that both the VLAN ID and the
Layer 2 priority values are being used, as well as the DSCP
value. The tagged format includes an additional eld, known
as the tag header. The tagged frame format also includes
priority tagged frames as dened by IEEE 802.1Q-2003.
VLAN IDVLAN identier (VID) for the port as dened in IEEE 802.1Q-
2003.
L2 PriorityL2 Priority is the Layer 2 priority to be used for the specied
application type. L2 Priority may specify one of eight priority
levels (0 through 7), as dened by IEEE 802.1D-2004. A value
of 0 represents the default priority as dened in IEEE 802.1D-
2004.
DSCPDSCP value to be used to provide Diserv node behaviour
for the specied application type as dened in IETF RFC2474.
DSCP may contain one of 64 code point values (0 through
63). A value of 0 represents the default DSCP value as dened
in RFC 2475.
Instruction Manual
87
Change the MAC Table settings
Use the MAC Address Table Conguration screen to congure dynamic address
learning or to assign static addresses to specic ports.
You can access the screen by clicking Conguration > MAC Table.
Menu optionDescription
Aging Conguration
Disable Automatic
Aging
Aging TimeSpecify the number of seconds for the aging time (range is
MAC Table Learning
AutoIf the learning mode for a port is greyed out, then another
DisableDo not perform learning.
SecureOnly static MAC entries are learned; all other frames are
1. On the main screen of the Web management UI, click Conguration > MAC Table.
2. Congure the MAC Table.
3. If necessary, change the aging time.
4. Specify the learning method for each port.
5. To save your settings, click Save.
To restore the previous settings, click Reset.
Do not automatically remove default dynamic entries from
the MAC Table after the Aging Time expires.
from 10 to 1000000).
module is in control of the mode and you can’t change it. For
example, one possible module is MAC-Based Authentication
under 802.1X.
Perform learning automatically as soon as a frame with an
unknown SMAC is received.
dropped.
Note: Make sure that the link that manages the switch is
added to the Static MAC Table before you change to secure
learning mode. Otherwise, the management link is lost and
can only to restored by using another non-secure port or by
connecting to the switch via the serial interface.
Instruction Manual
88
Change the VLAN Memberships settings
VLAN provides greater network performance by reducing broadcast trac. It
also provides a high level of network security because trac must pass through a
congured Layer 3 link to reach a dierent VLAN.
You can monitor and modify the VLAN Membership Conguration for the switch here.
Up to 4096 VLANs are supported.
You can access the screen by clicking Conguration > VLANs > VLAN Membership.
Menu optionDescription
DeleteDelete a VLAN entry during the next save.
VLAN IDSpecify the ID of this particular VLAN (range is from 1 to 4096).
VLAN NameSpecify the name of the VLAN. The VLAN name can be null.
Port MembersA row of check boxes for each port appears for each VLAN ID.
1. On the main screen of the Web management UI, click Conguration > VLANs >
VLAN Membership.
2. If necessary, change the default VLAN ID=1.
3. To create a new VLAN group with ID, name, and port members, click Add New Entry.
4. To refresh the display table starting from the rst entry of the VLAN table, click
Refresh.
5. To save your settings, click Save.
To restore the previous settings, click Reset.
If it is not null, it must contain letters or numbers. You must
include at least one letter in a non-null VLAN name. You can
edit the VLAN name for the existing VLAN entries or you can
add it to the new entries. (Range is from 0 to 32 characters.)
Check the box to include a port in a VLAN. Place an X in the
box to include a port in a forbidden port list. Uncheck the box
to remove a port from a VLAN.
Change the Ports settings
Use the VLAN Port Conguration page to set VLAN attributes for specic interfaces,
including processing frames with embedded tags, ingress ltering, accepted frame
types, and the Port VLAN ID.
You can access the screen by clicking Conguration > VLANs > Ports.
Instruction Manual
89
Menu optionDescription
EtherType for
Custom S-ports
Specify the EtherType used for Custom S-ports. This is a global
setting for all the Custom S-ports.
PortSpecify the logical port number of this row.
Port TypeSpecify the port type: Unaware, Customer port (C-port),
Service Port (S-port), Or Custom Service port (S-custom-port).
If the Port Type is Unaware, all frames are classied to the Port
VLAN ID and tags are not removed.
Ingress lteringEnable ingress ltering on a port. This parameter aects
VLAN ingress processing. If you enable ingress ltering and
the ingress port is not a member of the classied VLAN of the
frame, the frame is discarded. By default, ingress ltering is
disabled.
Frame TypeSpecify whether the port accepts all frames or only tagged
or untagged frames. This parameter aects VLAN ingress
processing. If the port only accepts tagged frames, untagged
frames received on this port are discarded.
Port VLAN modeCongure VLAN mode to “None” or Specic.”
None: a VLAN tag with classied VLAN ID is inserted in frames
transmitted on the port.This mode is normally used for ports
connected to VLAN-aware switches.
Specic: a Port VLAN ID can be congured.
Untagged frames received on the port are classied to
the Port VLAN ID. If VLAN awareness is disabled, all frames
received on the port are classied to the Port VLAN ID. If
the classied VLAN ID of a frame transmitted on the port is
dierent from the Port VLAN ID, a VLAN tag with the classied
VLAN ID is inserted in the frame.
Port VLAN IDSpecify the VLAN identier for the port (range is from 1 to
4095, and the default is 1).
Note: The port must be a member of the same VLAN as the
Port VLAN ID.
Tc TagSpecify the egress tagging of a port. Untag_pvid - All VLANs
except the congured PVID are tagged. Tag_all - All VLANs are
tagged. Untag_all - All VLANs are untagged.
Instruction Manual
90
1. On the main screen of the Web management UI, click Conguration > VLANs >
Ports.
2. Congure the required settings for each interface.
3. To refresh the display table starting from the rst entry of the VLAN table, click
Refresh.
4. To save your settings, click Save.
To restore the previous settings, click Reset.
Change PVLAN Membership settings
A private VLAN provides port-base security and isolation between ports within an
assigned VLAN. Data trac on ports assigned to a private VLAN can only be forwarded
to or from uplink ports. Ports isolated in the private VLAN are designated as downlink
ports and can only communicate to uplink ports with the same private VLAN.
Use the private VLAN Membership Conguration page to assign ports to a specic
private VLAN.
You can access the screen by clicking Conguration > Private VLANs > PVLAN
Membership.
Menu optionDescription
DeleteDelete a private VLAN entry. The entry is deleted during the
Private VLAN IDSpecify the ID of this particular private VLAN.
Port MembersSpecify whether ports are members of a private VLAN. A row
1. On the main screen of the Web management UI, click Conguration > Private VLANs > PVLAN Membership.
2. To add or delete members of any existing PVLAN, or to create a new PVLAN, click
Add New Private VLAN.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
next save.
of check boxes for each port appears for each private VLAN
ID. To include a port in a private VLAN, check the box. To
remove or exclude the port from the private VLAN, uncheck
the box. By default, no ports are members, and all boxes are
unchecked.
Instruction Manual
91
Change the Port Isolation settings
Use the Port Isolation Conguration screen to prevent communications between
customer ports within the same private VLAN.
You can access the screen by clicking Conguration > Private VLANs > Port Isolation.
Menu optionDescription
Port MembersEnable port isolation for ports. A check box appears for each
1. On the main screen of the Web management UI, click Conguration > Private VLANs > Port Isolation.
2. Make sure that the checked ports are isolated from each other.
3. To save your settings, click Save.
To restore the previous settings, click Reset.
port of a private VLAN. When you check a box, port isolation
is enabled for the corresponding port. When you uncheck a
box, port isolation is disabled for the corresponding port. By
default, port isolation is disabled on all ports.
Change the MAC-based VLAN settings
Use MAC-Based VLAN Membership Conguration to congure VLAN based on MAC
addresses. It assigns a VLAN ID for the ingess untagged frame by the source MAC
address. If it doesn’t match the database, it is assigned by Port VLAN ID.
You can access the screen by clicking Conguration > VCL > MAC-based VLAN.
Menu optionDescription
DeleteTo delete a MAC-based VLAN entry, check this box and press
MAC AddressSpecify the MAC Address.
VLAN IDSpecify the VLAN ID.
Port MembersSpecify whether to include a port in a MAC-based VLAN. A
save. The entry is deleted in the stack.
row of check boxes for each port appears for each MAC-based
VLAN entry. To include a port in a MAC-based VLAN, check
the box. To remove or exclude the port from the MAC-based
VLAN, uncheck the box. By default, no ports are members,
and all boxes are unchecked.
Instruction Manual
92
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.