TRENDnet’s 6-Port Hardened Industrial Gigabit PoE+ Layer 2 Managed DIN-Rail Switch,
model TI-PG541i, has four Gigabit PoE+ ports, one Gigabit port, one Gigabit SFP slot and
a 120W PoE budget. The switch is equipped with an IP30 rated metal enclosure and
designed to withstand a high degree of vibration, shock, protection against
ESD/EMI/surge, and operate within a wide temperature range (- 40 – 70 °C (- 40 - 158
°F)) for harsh environments. L2 management include features such as PoE port control,
VLAN, multicast, and QoS which allow for network integration flexibility.
TRENDnet’s 10-Port Industrial Gigabit L2 Managed PoE+ DIN-Rail Switch, model TIPG102i, features eight Gigabit PoE+ ports with a 240W PoE budget, and includes two
SFP slots that support both 100Base-FX and 1000Base-FX modules for long distance fiber
applications. The hardened switch is equipped with an IP30 rated metal enclosure,
designed to withstand a high degree of vibration and shock, while operating within a
wide temperature range of -40° – 75° C (-40° – 167° F) for industrial environments.
Advanced traffic management controls, troubleshooting, and SNMP monitoring support
make this a powerful solution for SMB networks.
TRENDnet’s 16-Port Industrial Gigabit Web Smart DIN-Rail Switch, model TI-G160WS,
delivers advanced management features with a 32Gbps switching capacity. Users are
able to connect sixteen devices to the switch for high speed gigabit network
connections. The switch is equipped with an IP30 rated metal enclosure, designed to
withstand a high degree of vibration and shock, while operating within a wide
temperature range of -40° – 75° C (-40° – 167° F) for industrial environments. Advanced
traffic management controls, troubleshooting, and SNMP monitoring support make this
a powerful solution for SMB networks.
Ports 1-4 – Designed to operate at 10Mbps, 100Mbps, or Gigabit speed in both
half-duplex and full-duplex transfer modes. Supports Auto MDI-X and capable
of delivering up to 30W (802.3at PoE+) per port.
Port 5 - Designed to operate at 10Mbps, 100Mbps, or Gigabit speed in both
half-duplex and full-duplex transfer modes. Supports Auto MDI-X
SFP Slot 6 – Designed to operate at Gigabit speeds.
Reset/Reboot Button – Push the button for 10 seconds and release to reset the
switch to factory defaults. Push the button for 3 seconds and release to reboot.
Grounding point/screw – The switch chassis can also be connected to a known
ground point for additional safety and protection. (grounding wire not
included)
Note: For any unused ports or SFP slots, it is recommended to leave the rubber plugs
installed during operation.
TRENDnet User’s Guide
Industrial Managed Switch Series
4
Input/Ouput
Function
PWR Input
(+) & (-)
Connects primary power source (ex. external power supply) to power the
device. Device will obtain power from this input first priority if available.
Please make sure to power supplies are turned off before wiring in.
Use a flat-head screw driver to push the orange notches in order release
the wiring connections. While holding in released position, insert the
wiring into the connection inputs from the external power supply and
release the orange notch to lock in the wire connections.
Please ensure that the external power supply is supplying within the
range of 48VDC ~ 57VDC @ 120W or above. 130W for max. PoE+ power.
Please note power supply is sold separately (model: TI-24048)
Device supports overload current protection and reverse polarity
protection.
RPS Input
(+) & (-)
Connects redundant power source (ex. external power supply) to power
the device. Device will obtain power from this input secondary priority if
primary power input is not available or has failed.
Please make sure to power supplies are turned off before wiring in.
Use a flat-head screw driver to push the orange notches in order release
the wiring connections. While holding in released position, insert the
wiring into the connection inputs from the external power supply and
release the orange notch to lock in the wire connections.
Please ensure that the external power supply is supplying within the
range of 48VDC ~ 57VDC @ 120W or above. 130W for max. PoE+ power.
Please note power supply is sold separately (model: TI-24048)
Device supports overload current protection and reverse polarity
protection.
ALM Output
Connects external alarm and sends output signal if fault is detected
based on DIP switch settings.
Supports an output with current carrying capacity of 1A @ 24V DC.
DIP Switches
Reset Button
(bottom of unit)
Ground point
6-pin terminal
block (PWR,
RPS, ALM)
DIP switch
definition
DC Jack
(optional, see below)
Top View
DC Jack Input for External Power Adapter
The device includes a DC Jack for an external power adapter and can
also be used as an additional redundant power supply (RPS) input.
Please ensure that the external power adapter is supplying 48VDC @
120W or above. 130W for max. PoE+ power. Please note power adapter is sold separately (model: 48VDC3000)
**Supported power supplies: TI-S12024 (120W), TI-S24048 (240W), TI-S48048 (480W).
Lower wattage power supplies may be used but may result in decreased PoE power
Connects primary power source (ex. external power supply) to power the
device. Device will obtain power from this input first priority if available.
Please make sure to power supplies are turned off before wiring in.
Use a flat-head screw driver to push the orange notches in order release
the wiring connections. While holding in released position, insert the
wiring into the connection inputs from the external power supply and
release the orange notch to lock in the wire connections.
Device supports overload current protection and reverse polarity
protection.
RPS Input
(+) & (-)
Connects redundant power source (ex. external power supply) to power
the device. Device will obtain power from this input secondary priority if
primary power input is not available or has failed.
Please make sure to power supplies are turned off before wiring in.
Use a flat-head screw driver to push the orange notches in order release
the wiring connections. While holding in released position, insert the
wiring into the connection inputs from the external power supply and
release the orange notch to lock in the wire connections.
Device supports overload current protection and reverse polarity
protection.
ALM Output
Connects external alarm and sends output signal if fault is detected
based on DIP switch settings.
Supports an output with current carrying capacity of 1A @ 24V DC.
DIP Switches
Reset Button
Ground point
6-pin terminal
block (PWR,
RPS, ALM)
DIP switch
definition
Top View
*Please note power supply is sold separately*
**Supported power supplies: TI-S12024 (120W), TI-S24048 (240W), TI-S48048 (480W).
Lower wattage power supplies may be used but may result in decreased PoE power
Note: Turn off the power before connecting modules or wires.
Calculate the maximum possible current in each power wire and common wire. Observe
all electrical codes dictating the maximum current allowable for each wire size. If current
go above the maximum ratings, the wiring could overheat, causing serious damage to
your equipment.
TRENDnet User’s Guide
Industrial Managed Switch Series
8
Switch
Status
Function
1
OFF
Disable alarm relay for PWR power input
ON
Enable alarm relay for power failure on PWR power input
2
OFF
Disable alarm relay for RPS power input
ON
Enable alarm relay for power failure on RPS power input
3
OFF
Storm control managed by switch configuration
ON
Enable storm control (Broadcast and DLF rate set to 300pps)
Takes precedence over storm control switch configuration
4
OFF
802.1p QoS managed by switch configuration
ON
Enable 802.1p QoS on ports 1 and 2 (Set CoS priority to tag 4
on ports 1 and 2)
Takes precedence over 802.1p QoS switch configuration
Connects primary power source (ex. external power supply) to power the
device. Device will obtain power from this input first priority if available.
Please make sure to power supplies are turned off before wiring in.
Use a flat-head screw driver to push the orange notches in order release
the wiring connections. While holding in released position, insert the
wiring into the connection inputs from the external power supply and
release the orange notch to lock in the wire connections.
Device supports overload current protection and reverse polarity
protection.
RPS Input
(+) & (-)
Connects redundant power source (ex. external power supply) to power
the device. Device will obtain power from this input secondary priority if
primary power input is not available or has failed.
Please make sure to power supplies are turned off before wiring in.
Use a flat-head screw driver to push the orange notches in order release
the wiring connections. While holding in released position, insert the
wiring into the connection inputs from the external power supply and
release the orange notch to lock in the wire connections.
Device supports overload current protection and reverse polarity
protection.
ALM Output
Connects external alarm and sends output signal if fault is detected
based on DIP switch settings.
Supports an output with current carrying capacity of 1A @ 24V DC.
DIP Switches
Reboot Button
Ground point
6-pin terminal
block (PWR,
RPS, ALM)
DIP switch
definition
Top View
*Please note power supply is sold separately*
**Supported power supplies: TI-M6024, TI-S12024 (120W), TI-S24048 (240W) **
6-pin Removable Terminal Block
Note: Turn off the power before connecting modules or wires.
Calculate the maximum possible current in each power wire and common wire. Observe
all electrical codes dictating the maximum current allowable for each wire size. If current
go above the maximum ratings, the wiring could overheat, causing serious damage to
your equipment.
The site where the switch will be installed may greatly affect its performance. When
installing, consider the following pointers:
Note: The switch model may be different than the one shown in the example
illustrations.
Install the switch in the appropriate location. Please refer to the technical
specifications at the end of this manual for the acceptable operating temperature
and humidity ranges.
Install the Switch in a site free from strong electromagnetic field generators (such
as motors), vibration, dust, and direct exposure to sunlight.
Install the switch in a location that is not affected by strong electromagnetic field
generators (such as motors), vibration, dust, and direct sunlight.
Leave at least 10cm of space at the front and rear of the switch for ventilation.
Fasten the DIN-Rail bracket to the rear of the switch using the included
fasteners/screws.
Note: The DIN-Rail bracket may already be installed to your switch when received.
The movable clip at the top of the DIN-Rail bracket should be on top.
The switch can be installed to a 35mm (W) DIN-Rail located in cabinet, rack, or
enclosure.
To mount the switch to a DIN-Rail using the attached DIN-Rail bracket, position the
switch in front of the DIN-Rail and hook the bracket over the top of the rail.
Then rotate the switch downward towards the rail until your hear a click indicating the
bracket is secure and locked into place.
To unmount the switch from the DIN-Rail, slightly pull the switch downwards to clear
the bottom of the DIN-Rail and rotate away from DIN-Rail to unmount.
Connect the power supply (sold separate, e.g. TRENDnet TI-S24048) to the switch
terminal block as shown below.
Optional: The switch chassis can also be connected to a known ground point for
additional safety and protection (grounding wire not included).
Note: Polarities V+ and V- should match between power supply and connections to
switch terminal block.
Note: The models in the image may be different than your specific model.
SFP Transceiver/Optical Cable Installation
1. Remove the rubber plug from the SFP slot.
Note: For any unused ports or SFP slots, it is recommended to leave the
rubber plugs installed during operation.
2. Slide the selected SFP module into the selected SFP slot (Make sure the SFP
module is aligned correctly with the inside of the slot)
3. Insert and slide the module into the SFP slot until it clicks into place.
4. Remove any rubber plugs that may be present in the SFP module’s slot.
5. Align the fiber cable’s connector with the SFP module’s mouth and insert the
connector
6. Slide the connector in until a click is heard
7. If you want to pull the connector out, first push down the release clip on top
of the connector to release the connector from the SFP module
To properly connect fiber cabling: Check that the fiber terminators are clean. You can
clean the cable plugs by wiping them gently with a clean tissue or cotton ball moistened
with a little ethanol. Dirty fiber terminators on fiber optic cables will impair the quality of
the light transmitted through the cable and lead to degraded performance on the port.
You can connect additional computers or other network devices to your switch using Ethernet cables to connect them to one of the available Gigabit Ports. Check the status of the LED
indicators on the front panel of your switch to ensure the physical cable connection from your computer or device.
Note: If you encounter issues connecting to your network, there may be a problem with your computer or device network settings. Please ensure that your computer or device network
settings (also called TCP/IP settings) are configured properly within the network subnet your switch is connected.
This command configures a static IP and subnet
mask for the system.
interface
show
This command displays the current port
configurations.
vlan
show
This command displays the current VLAN
configurations.
Accessing switch management interfaces
Access your switch command line interface
Note: The system may be managed using the Telnet protocol. The Telnet protocol is
enabled by default. Throughout this user’s guide, the term “CLI Configuration” will be
used reference access through the command line interface.
1. Connect your computer to one of the available Ethernet ports and make sure your
computer and switch are assigned to an IP address with the same IP subnet.
2. On your computer, run the terminal emulation program (ex. HyperTerminal,
TeraTerm, Putty, etc.) and set the program to use the Telnet protocol and enter the IP
address assigned to the switch. The default IP address of the switch is 192.168.10.200
/ 255.255.255.0.
3. The terminal emulation window should display a prompt for user name and
password.
Enter the user name and password. By default:
Its command prompt is “[DEVICE_NAME]#”.
It means these commands can be executed in this command prompt.
configure
Its command prompt is “[DEVICE_NAME](config)#”.
It means these commands can be executed in this command prompt.
In Enablecode, executing command “configure terminal” enter the configure
node.
[DEVICE_NAME]#configure terminal
eth0
Its command prompt is “[DEVICE_NAME](config-if)#”.
It means these commands can be executed in this command prompt.
In Configurecode, executing command “interface eth0” enter the eth0
interface node.
[DEVICE_NAME](config)#interface eth0
[DEVICE_NAME](config-if)#
interface
Its command prompt is “[DEVICE_NAME](config-if)#”.
It means these commands can be executed in this command prompt.
In Configurecode, executing command “interface gigaethernet1/0/5” enter
the interface port 5 node.
Or
In Configurecode, executing command “interface fastethernet1/0/5” enter
the interface port 5 node.
Note: depend on your port speed, gigaethernet1/0/5 for gigabit Ethernet
ports and fastethernet1/0/5 for fast Ethernet ports.
Its command prompt is “[DEVICE_NAME](config-vlan)#”.
It means these commands can be executed in this command prompt.
In Configurecode, executing command “vlan 2” enter the vlan 2 node.Note: where the “2” is the vlan ID.
Note: Your switch default management IP address http://192.168.10.200 is accessed
through the use of your Internet web browser (e.g. Internet Explorer®, Firefox®,
Chrome™, Safari®, Opera™) and will be referenced frequently in this User’s Guide. Throughout this user’s guide, the term Web Configuration will be used to reference
access from web management page.
1. Open your web browser and go to the IP address http://192.168.10.200. Your switch
will prompt you for a user name and password.
2. Enter the user name and password. By default:
User Name: admin
This command enters the eth0 interface
node to configure the system IP.
eth0
Show
This command displays the eth0
configurations.
eth0
ip address A.B.C.D/M
This command configures a static IP and
subnet mask for the system.
eth0
ip address defaultgateway A.B.C.D
This command configures the system
default gateway.
eth0
ip dhcp client
(disable|enable|renew)
This command configures a DHCP client
function for the system.
Disable: Use a static IP address on the
switch.
Enable & Renew: Use DHCP client to get an
IP address from DHCP server.
eth0
management vlan
VLANID
This command configures the management
vlan.
Basic Settings
General Settings
System
Management VLAN
To specify a VLAN group which can access the Switch.
The valid VLAN range is from 1 to 4094.
If you want to configure a management VLAN, the management VLAN should
be created first and the management VLAN should have at least one member
port.
Host Name
The hostname is same as the SNMP system name. Its length is up to 64 characters.
The first 16 characters of the hostname will be configured as the CLI prompt.
Default Settings
The default Hostname is [YOUR_DEVICE_NAME]
The default DHCP client is disabled.
The default Static IP is 192.168.10.200
Subnet Mask is 255.255.255.0
Default Gateway is 0.0.0.0
Management VLAN is 1.
Configures a IPv4 address for your Switch in dotted decimal
notation. For example, 192.168.10.200.
Subnet Mask
Enter the IP subnet mask of your Switch in dotted decimal
notation for example 255.255.255.0.
Default Gateway
Enter the IP address of the default outgoing gateway in dotted
decimal notation, for example 192.168.10.1.
Node
Command
Description
enable
show jumboframe
This command displays the
current jumbo frame settings.
configure
jumboframe
(10240|9216|1552|1536|1522)
This command configures the
maximum number of bytes of
frame size.
Parameter
Description
Frame Size
This field configures the maximum number of bytes of frame size
for specified port(s).
Apply
Click this button to take effect the settings.
Refresh
Click this button to reset the fields to the last setting.
Web Configuration
Basic Settings > General Settings > System
Notice:
The jumbo frame settings will apply to all ports.
If the size of a packet exceeds the jumbo frame size, the packet will be dropped.
The available values are 10240, 9216, 1552, 1536, 1522.
Default Settings
The default jumbo frame is 10240 bytes.
CLI Configuration
Web Configuration
Basic Settings > General Settings > Jumbo Frame
Jumbo Frame
Jumbo frames are Ethernet frames with a payload greater than 1500 bytes. Jumbo frames
can enhance data transmission efficiency in a network. The bigger the frame size, the
better the performance.
This command displays current time
and time configurations.
configure
time HOUR:MINUTE:SECOND
Sets the current time on the Switch.
hour: 0-23
min: 0-59
sec: 0-59
Note: If you configure Daylight Saving
Time
after you configure the time, the
Switch will apply Daylight Saving Time.
configure
time date YEAR/MONTH/DAY
Sets the current date on the Switch.
year: 1970-
month: 1-12
day: 1-31
configure
time daylight-saving-time
This command enables the daylight
saving time.
configure
time daylight-saving-time
start-date (first | second |
third | fourth | last) (Sunday
| Monday | Tuesday |
This command sets the start date for
the Daylight Saving Time.
For Example: first Sunday 4 0 (AM:0 1st
Sunday in April)
SNTP
The Network Time Protocol (NTP) is a protocol for synchronizing the clocks of computer
systems over packet-switched, variable-latency data networks. A less complex
implementation of NTP, using the same protocol but without requiring the storage of
state over extended periods of time is known as the Simple Network Time Protocol
(SNTP). NTP provides Coordinated Universal Time (UTC). No information about time
zones or daylight saving time is transmitted; this information is outside its scope and must
be obtained separately.
UDP Port: 123.
Daylight saving is a period from late spring to early fall when many countries set their
clocks ahead of normal local time by one hour to give more daytime light in the evening.
Note:
1. The SNTP server always replies the UTC current time.
2. When the Switch receives the SNTP reply time, the Switch will adjust the time
with the time zone configuration and then configure the time to the Switch.
3. If the time server’s IP address is not configured, the Switch will not send any
SNTP request packets.
4. If no SNTP reply packets, the Switch will retry every 10 seconds forever.
5. If the Switch has received SNTP reply, the Switch will re-get the time from NTP
server every 24 hours.
6. If the time zone and time NTP server have been changed, the Switch will
Enter the new date in year, month and day format and time in
hour, minute and second format. The new date and time then
appear in the Current Date and Current Time fields after you click
Apply.
Enable
Network Time
Protocol
Select this option to use Network Time Protocol (NTP) for the time
service.
NTP Server
Select a pre-designated time server or type the IP address or type
the domain name of your time server. The Switch searches for the
timeserver for up to 60 seconds.
Time Zone
Select the time difference between UTC (Universal Time
Coordinated, formerly known as GMT, Greenwich Mean Time)
and your time zone from the drop-down list box.
Daylight Saving Settings
State
Select Enable if you want to use Daylight Saving Time. Otherwise,
select Disable to turn it off.
Start Date
Configure the day and time when Daylight Saving Time starts if you
enabled Daylight Saving Time. The time is displayed in the 24 hour
format. Here are a couple of examples:
Daylight Saving Time starts in most parts of the United States on
the second Sunday of March. Each time zone in the United States
starts using Daylight Saving Time at 2 A.M. local time. So in the
United States you would select Second, Sunday, March and 2:00.
Daylight Saving Time starts in the European Union on the last
Sunday of March. All of the time zones in the European Union start
using Daylight Saving Time at the same moment (1 A.M. GMT or
UTC). So in the European Union you would select Last, Sunday,
March and the last field depends on your time zone. In Germany
for instance, you would select 2:00 because Germany's time zone
is one hour ahead of GMT or UTC (GMT+1).
End Date
Configure the day and time when Daylight Saving Time ends if you
enabled Daylight Saving Time. The time field uses the 24 hour
format.
Here are a couple of examples:
Daylight Saving Time ends in the United States on the last Sunday
of October. Each time zone in the United States stops using
Daylight Saving Time at 2 A.M. local time. So in the United States
you would select First, Sunday, November and 2:00.
Daylight Saving Time ends in the European Union on the last
Sunday of October. All of the time zones in the European Union
stop using Daylight Saving Time at the same moment (1 A.M. GMT
or UTC). So in the European Union you would select Last, Sunday,
October and the last field depends on your time zone. In Germany
for instance, you would select 2:00 because Germany's time zone
is one hour ahead of GMT or UTC (GMT+1).
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Node
Command
Description
enable
show interface eth0
The command displays the all of the interface
eth0 configurations.
eth0
show
The command displays the all of the interface
eth0 configurations.
Management Host
The feature limits the hosts which can manage the Switch. That is, any hosts can manage
the Switch via telnet or web browser. If user has configured one or more management
host, the Switch can be managed by these hosts only. The feature allow user to configure
management IP up to 3 entries.
This command displays the current MAC
address table age time.
enable
show mac-addresstable (static|dynamic)
This command displays the current
static/dynamic unicast address entries.
enable
show mac-addresstable mac MACADDR
This command displays information of a
specific MAC.
enable
show mac-addresstable port PORT_ID
This command displays the current unicast
address entries learnt by the specific port.
configure
mac-address-table
static MACADDR vlan
VLANID port PORT_ID
This command configures a static unicast
entry.
configure
no mac-address-table
This command removes a static unicast entry
MAC Management
Dynamic Address:
The MAC addresses are learnt by the switch. When the switch receives frames, it will
record the source MAC, the received port and the VLAN in the address table with an age
time. When the age time is expired, the address entry will be removed from the address
table.
Static Address:
The MAC addresses are configured by users. The static addresses will not be aged out by
the switch; it can be removed by user only. The maximum static address entry is up to
256.
The MAC Table (a MAC table is also known as a filtering database) shows how frames are
forwarded or filtered across the Switch’s ports. When a device (which may belong to a
VLAN group) sends a packet which is forwarded to a port on the Switch, the MAC address
of the device is shown on the Switch’s MAC Table. It also shows whether the MAC address
is dynamic (learned by the Switch) or static (manually entered).
The Switch uses the MAC Table to determine how to forward frames. See the following
figure.
1. The Switch examines the received frame and learns the port from which this
source MAC address came.
2. The Switch checks to see if the frame's destination MAC address matches a
source MAC address already learnt in the MAC Table.
If the Switch has already learnt the port for this MAC address, then it
forwards the frame to that port.
If the Switch has not already learnt the port for this MAC address, then
the frame is flooded to all ports. If too much port flooding, it may lead
to network congestion.
If the Switch has already learnt the port for this MAC address, but the
destination port is the same as the port it came in on, then it filters the
frame.
Default Settings
The default MAC address table age time is 300 seconds.
The Maximum static address entry is 256.
Enter the MAC address of a computer or device that you want to
add to the MAC address table.
Valid format is hh:hh:hh:hh:hh:hh.
VLAN ID
Enter the VLAN ID to apply to the computer or device.
Port
Enter the port number to which the computer or device is
connected.
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Static MAC Table
MAC Address
This field displays the MAC address of a manually entered MAC
address entry.
VLAN ID
This field displays the VID of a manually entered MAC address
entry.
Port
This field displays the port number of a manually entered MAC
address entry. The MAC address with port CPU means the
Switch’s MAC addresses itself.
Action
Click Delete to remove this manually entered MAC address entry
from the MAC address table. You cannot delete the Switch’s MAC
address from the static MAC address table.
Example:
[DEVICE_NAME](config)#mac-address-table static 00:11:22:33:44:55 vlan 1 port 1
Web Configuration
Basic Settings > MAC Management > Static MAC Settings
Static MAC
A static Media Access Control (MAC) address is an address that has been manually
entered in the MAC address table, and do not age out. When you set up static MAC
address rules, you are setting static MAC addresses for a port, so this may reduce the
need for broadcasting.
This command adds a port or a range of ports
as the source ports of the port mirroring.
configure
no mirror source ports
PORT_LIST
This command removes a port or a range of
ports from the source ports of the port
mirroring.
Port Mirror
Port-based Mirroring
The Port-Based Mirroring is used on a network switch to send a copy of network packets
sent/received on one or a range of switch ports to a network monitoring connection on
another switch port (Monitor to Port). This is commonly used for network appliances that
require monitoring of network traffic, such as an intrusion-detection system.
Port Mirroring, together with a network traffic analyzer, helps to monitor network traffic.
Users can monitor the selected ports (Source Ports) for egress and/or ingress packets.
Source Mode:
Ingress : The received packets will be copied to the monitor port.
Egress : The transmitted packets will be copied to the monitor port.
Both : The received and transmitted packets will be copied to the monitor
port.
Note:
1. The monitor port cannot be a trunk member port.
2. The monitor port cannot be ingress or egress port.
3. If the Port Mirror function is enabled, the Monitor-to Port can receive mirrored
packets only.
4. If a port has been configured as a source port and then user configures the port
as a destination port, the port will be removed from the source ports
automatically.
Default Settings
Mirror Configurations:
State : Disable
Monitor port : 1
Ingress port(s) : None
Egress port(s) : None
CLI Configuration
Example:
[DEVICE_NAME]#configure terminal
[DEVICE_NAME](config)#mirror enable
[DEVICE_NAME](config)#mirror destination port 2
[DEVICE_NAME](config)#mirror source ports 3-5 mode both
Select Enable to turn on port mirroring or select Disable to turn it
off.
Monitor to Port
Select the port which connects to a network traffic analyzer.
All Ports
Settings in this field apply to all ports.
Use this field only if you want to make some settings the same
for all ports.
Use this field first to set the common settings and then make
adjustments on a port-by-port basis.
Source Port
This field displays the number of a port.
Mirror Mode
Select Ingress, Egress or Both to only copy the ingress (incoming),
egress (outgoing) or both (incoming and outgoing) traffic from the
specified source ports to the monitor port. Select Disable to not
copy any traffic from the specified source ports to the monitor
port.
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Duplex mode
A duplex communication system is a system composed of two connected parties or
devices that can communicate with one another in both directions.
Half Duplex:
A half-duplex system provides for communication in both directions, but only one
direction at a time (not simultaneously). Typically, once a party begins receiving a signal,
it must wait for the transmitter to stop transmitting, before replying.
Full Duplex:
A full-duplex, or sometimes double-duplex system, allows communication in both
directions, and, unlike half-duplex, allows this to happen simultaneously. Land-line
telephone networks are full-duplex, since they allow both callers to speak and be heard
at the same time.
Loopback Test
A loopback test is a test in which a signal in sent from a communications device and
returned (looped back) to it as a way to determine whether the device is working right or
as a way to pin down a failing node in a network. One type of loopback test is performed
using a special plug, called a wrap plug that is inserted in a port on a communications
device. The effect of a wrap plug is to cause transmitted (output) data to be returned as
received (input) data, simulating a complete communications circuit using a single
computer.
Auto MDI-MDIX
Auto-MDIX (automatic medium-dependent interface crossover) is a computer
networking technology that automatically detects the required cable connection type
(straight-through or crossover) and configures the connection appropriately, thereby
removing the need for crossover cables to interconnect switches or connecting PCs peerto-peer. When it is enabled, either type of cable can be used or the interface
automatically corrects any incorrect cabling. For Auto-MDIX to operate correctly, the
speed on the interface and duplex setting must be set to "auto". Auto-MDIX was
developed by HP engineers Dan Dove and Bruce Melvin.
Auto Negotiation
Auto (auto-negotiation) allows one port to negotiate with a peer port automatically to
obtain the connection speed and duplex mode that both ends support. When autonegotiation is turned on, a port on the Switch negotiates with the peer automatically to
determine the connection speed and duplex mode.
If the peer port does not support auto-negotiation or turns off this feature, the Switch
determines the connection speed by detecting the signal on the cable and using halfduplexmode. When the Switch’s auto-negotiation is turned off, a port uses the pre-
configured speed and duplex mode when making a connection, thus requiring you to
make sure that the settings of the peer port are the same in order to connect.
Flow Control
A concentration of traffic on a port decreases port bandwidth and overflows buffer
memory causing packet discards and frame losses.IEEE802.3x flow control is used in full
duplex mode to send a pause signal to the sending port, causing it to temporarily stop
sending signals when the receiving port memory buffers fill and resend later.
This command configures the
speed and duplex for the port.
interface
shutdown
This command disables the specific
port.
interface
no shutdown
This command enables the specific
port.
interface
description STRINGs
This command configures a
description for the specific port.
interface
no description
This command configures the
default port description.
interface
cable test
This command diagnostics the
Ethernet cable and shows the
broken distance.
interface
clean cable-test result
This command cleans the test
result of the Ethernet cable test.
interface
show cable-test result
This command displays the test
result of the Ethernet cable test.
The Switch uses IEEE802.3x flow control in full duplex mode and backpressure flow
control in half duplex mode. IEEE802.3x flow control is used in full duplex mode to send
a pause signal to the sending port, causing it to temporarily stop sending signals when the
receiving port memory buffers fill. Back Pressure flow control is typically used in half
duplex mode to send a "collision" signal to the sending port (mimicking a state of packet
collision) causing the sending port to temporarily stop sending signals and resend later.
Note: 1000 Base-T doesn’t support force mode.
Cable Test.
This feature determines the quality of the cables, shorts, and cable impedance mismatch,
bad connectors, termination mismatch, and bad magnetics. The feature can work on the
copper Ethernet cable only.
Default Settings
The default port Speed & Duplex is auto for all ports.
The default port Flow Control is Off for all ports.
This command configures the
speed and duplex for the port.
Parameter
Description
Port
Select a port or a range ports you want to configure on this screen.
State
Select Enable to activate the port or Disable to deactivate the port.
Speed/Duplex
Select the speed and duplex mode of the port. The choices are:
• Auto
• 10 Mbps / Full Duplex
• 10 Mbps / Half Duplex
• 100 Mbps / Full Duplex
• 100 Mbps / Half Duplex
• 1000 Mbps / Full Duplex
Flow Control
Select On to enable access to buffering resources for the port thus
ensuring lossless operation across network switches. Otherwise,
select Off to disable it.
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Port
This field displays the port number.
State
This field displays whether the port is enabled or disabled.
Speed/Duplex
This field displays the speed either 10M, 100M or 1000M and the
duplex mode Full or Half.
Flow Control
This field displays whether the port’s flow control is On or Off.
Link Status
This field displays the link status of the port. If the port is up, it
displays the port’s speed, duplex and flow control setting.
Otherwise, it displays Link Down if the port is disabled or not
connected to any device.
Example:
[DEVICE_NAME]#configure terminal
[DEVICE_NAME](config)#interface gi1/0/1
[DEVICE_NAME](config-if)#speed auto
Each egress port can support up to 8 transmit queues. Each egress transmit queue
contains a list specifying the packet transmission order. Every incoming frame is
forwarded to one of the 8 egress transmit queues of the assigned egress port, based on
its priority. The egress port transmits packets from each of the 8 transmit queues
according to a configurable scheduling algorithm, which can be a combination of Strict
Priority (SP) and/or Weighted Round Robin (WRR).
Typically, networks operate on a best-effort delivery basis, which means that all traffic
has equal priority and an equal chance of being delivered in a timely manner. When
congestion occurs, all traffic has an equal chance of being dropped.
When you configure the QoS feature, you can select specific network traffic, prioritize it
according to its relative importance, and use congestion-management and congestionavoidance techniques to give preferential treatment. Implementing QoS in your network
makes network performance more predictable and bandwidth utilization more effective.
The Switch supports 802.1p priority queuing. The Switch has 8 priority queues. These
priority queues are numbered from 7 (Class 7) — the highest priority queue — to 0 (Class
0) — the lowest priority queue.
The eight priority tags specified in IEEE 802.1p (p0 to p7) are mapped to the Switch’s
Priority scheduling is implemented by the priority queues stated above. The Switch will
empty the four hardware priority queues in order, beginning with the highest priority
queue, 7, to the lowest priority queue, 0. Each hardware queue will transmit all of the
packets in its buffer before permitting the next lower priority to transmit its packets.
When the lowest hardware priority queue has finished transmitting all of its packets, the
highest hardware priority queue will begin transmitting any packets it may have received.
QoS Enhancement
You can configure the Switch to prioritize traffic even if the incoming packets are not
marked with IEEE 802.1p priority tags or change the existing priority tags based on the
criteria you select. The Switch allows you to choose one of the following methods for
assigning priority to incoming packets on the Switch:
802.1p Tag Priority - Assign priority to packets based on the packet’s 802.1p
tagged priority.
Port Based QoS - Assign priority to packets based on the incoming port on the
Switch.
DSCP Based QoS - Assign priority to packets based on their Differentiated Services
Code Points (DSCPs).
Note: Advanced QoS methods only affect the internal priority queue mapping for the
Switch. The Switch does not modify the IEEE 802.1p value for the egress frames. You can
choose one of these ways to alter the way incoming packets are prioritized or you can
choose not to use any QoS enhancement setting on the Switch.
802.1p Priority
When using 802.1p priority mechanism, the packet is examined for the presence of a valid
802.1p priority tag. If the tag is present, the packet is assigned to a programmable egress
queue based on the value of the tagged priority. The tagged priority can be designated to
any of the available queues.
Tag Protocol Identifier (TPID): a 16-bit field set to a value of 0x8100 in order to
identify the frame as an IEEE 802.1Q-tagged frame.
Tag Control Information (TCI)
Priority Code Point (PCP): a 3-bit field which refers to the IEEE 802.1p priority.
It indicates the frame priority level from 0 (lowest) to 7 (highest), which can
be used to prioritize different classes of traffic (voice, video, data, etc.).
Canonical Format Indicator (CFI): a 1-bit field. If the value of this field is 1, the
MAC address is in non-canonical format. If the value is 0, the MAC address is
in canonical format. It is always set to zero for Ethernet switches. CFI is used
for compatibility between Ethernet and Token Ring networks. If a frame
received at an Ethernet port has a CFI set to 1, then that frame should not be
bridged to an untagged port.
VLAN Identifier (VID): a 12-bit field specifying the VLAN to which the frame
belongs. A value of 0 means that the frame doesn't belong to any VLAN; in
this case the 802.1Q tag specifies only a priority and is referred to as a priority tag. A value of hex 0xFFF is reserved for implementation use. All other values
may be used as VLAN identifiers, allowing up to 4094 VLANs. On bridges, VLAN
1 is often reserved for management.
Priority Levels
PCP: Priority Code Point.
DiffServ (DSCP)
Differentiated Services or DiffServ is a computer networking architecture that specifies a
simple, scalable and coarse-grained mechanism for classifying, managing network traffic
and providing Quality of Service (QoS) guarantees on modern IP networks. DiffServ can,
for example, be used to provide low-latency, guaranteed service (GS) to critical network
traffic such as voice or video while providing simple best-effort traffic guarantees to noncritical services such as web traffic or file transfers.
Differentiated Services Code Point (DSCP) is a 6-bit field in the header of IP packets for
packet classification purposes. DSCP replaces the outdated IP precedence, a 3-bit field in
the Type of Service byte of the IP header originally used to classify and prioritize types of
traffic.
When using the DiffServ priority mechanism, the packet is classified based on the DSCP
field in the IP header. If the tag is present, the packet is assigned to a programmable
egress queue based on the value of the tagged priority. The tagged priority can be
designated to any of the available queues.
The Type of Service provides an indication of the abstract parameters of the quality of
service desired. These parameters are to be used to guide the selection of the actual
service parameters when transmitting a datagram through a particular network. Several
networks offer service precedence, which somehow treats high precedence traffic as
more important than other traffic (generally by accepting only traffic above certain
precedence at time of high load). The major choice is a three way tradeoff between lowdelay, high-reliability, and high-throughput.
Bits 0-2: Precedence.
Bit 3: 0 = Normal Delay, 1 = Low Delay.
Bits 4: 0 = Normal Throughput, 1 = High Throughput.
Bits 5: 0 = Normal Reliability, 1 = High Reliability.
Bit 6-7: Reserved for Future Use.
The use of the Delay, Throughput, and Reliability indications may increase the cost (in
some sense) of the service. In many networks better performance for one of these
parameters is coupled with worse performance on another. Except for very unusual cases
at most two of these three indications should be set.
The type of service is used to specify the treatment of the datagram during its
transmission through the internet system. Example mappings of the internet type of
service to the actual service provided on networks such as AUTODIN II, ARPANET, SATNET,
and PRNET is given in "Service Mappings".
The Network Control precedence designation is intended to be used within a network
only. The actual use and control of that designation is up to each network. The
Internetwork Control designation is intended for use by gateway control originators only.
If the actual use of these precedence designations is of concern to a particular network,
it is the responsibility of that network to control the access to, and use of, those
precedence designations.
Example:
IP Header
DSCP=50 45 C8 . . .
Queuing Algorithms
Queuing algorithms allow switches to maintain separate queues for packets from each
individual source or flow and prevent a source from monopolizing the bandwidth.
Strict-Priority (SPQ)
The packets on the high priority queue are always service firstly.
Weighted round robin (WRR)
TRENDnet User’s Guide
Industrial Managed Switch Series
38
Node
Command
Description
enable
show queue cos-map
This command displays the current 802.1p
priority mapping to the service queue.
enable
show qos mode
This command displays the current QoS
scheduling mode of IEEE 802.1p.
configure
queue cos-map
PRIORITY QUEUE_ID
This command configures the 802.1p priority
mapping to the service queue.
configure
no queue cos-map
This command configures the 802.1p priority
mapping to the service queue to default.
configure
qos mode high-first
This command configures the QoS scheduling
mode to high_first, each hardware queue will
transmit all of the packets in its buffer before
permitting the next lower priority to transmit
Round Robin scheduling services queues on a rotating basis and is activated only
when a port has more traffic than it can handle. A queue is given an amount of
bandwidth irrespective of the incoming traffic on that port. This queue then moves
to the back of the list. The next queue is given an equal amount of bandwidth, and
then moves to the end of the list; and so on, depending on the number of queues
being used. This works in a looping fashion until a queue is empty.
Weighted Round Robin (WRR) scheduling uses the same algorithm as round robin
scheduling, but services queues based on their priority and queue weight (the
number you configure in the queue Weight field) rather than a fixed amount of
bandwidth. WRR is activated only when a port has more traffic than it can handle.
Queues with larger weights get more service than queues with smaller weights. This
queuing mechanism is highly efficient in that it divides any available bandwidth
across the different traffic queues and returns to queues that have not yet emptied.
Default Settings
QoS mode : High First (SPQ)
The mappings of the Priority to Queue are:
PRIO 0 ==> COSQ 2
PRIO 1 ==> COSQ 0
PRIO 2 ==> COSQ 1
PRIO 3 ==> COSQ 3
PRIO 4 ==> COSQ 4
PRIO 5 ==> COSQ 5
PRIO 6 ==> COSQ 6
PRIO 7 ==> COSQ 7
This command configures the QoS scheduling
mode to Weighted Fair Queuing.
configure
qos mode wrr-queue
weights VALUE VALUE
VALUE VALUE VALUE
VALUE VALUE VALUE
This command configures the QoS scheduling
mode to Weighted Round Robin.
interface
default-priority
This command allows the user to specify a
default priority handling of untagged packets
received by the Switch. The priority value
entered with this command will be used to
determine which of the hardware priority
queues the packet is forwarded to. Default: 0.
interface
no default-priority
This command configures the default priority
for the specific port to default (0).
enable
show diffserv
This command displays DiffServ
configurations.
configure
diffserv
(disable|enable)
This command disables / enables the DiffServ
function.
configure
diffserv dscp VALUE
priority VALUE
This command sets the DSCP-to-IEEE 802.1q
mappings.
Parameter
Description
All Ports 802.1p
priority
Use this field to set a priority for all ports.
The value indicates packet priority and is added to the priority tag
field of incoming packets. The values range from 0 (lowest
priority) to 7 (highest priority).
Port
This field displays the number of a port.
802.1p Priority
Select a priority for packets received by the port. Only packets
without 802.1p priority tagged will be applied the priority you set
here.
Click Refresh to begin configuring this screen afresh.
Parameter
Description
Schedule Mode
Select Strict Priority (SP) or Weighted Round Robin (WRR).
Note: Queue weights can only be changed when Weighted Round
Robin is selected.
Weighted Round Robin scheduling services queues on a rotating
basis based on their queue weight (the number you configure in
the queue Weight field). Queues with larger weights get more
service than queues with smaller weights.
Queue ID
This field indicates which Queue (0 to 7) you are configuring.
Queue 0 has the lowest priority and Queue 7 the highest priority.
Weight Value
You can only configure the queue weights when Weighted Round Robin is selected. Bandwidth is divided across the different traffic
queues according to their weights.
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Schedule Mode
Advanced Settings > Bandwidth Control > Schedule
Rate Limitation
Storm Control
A broadcast storm means that your network is overwhelmed with constant broadcast or
multicast traffic. Broadcast storms can eventually lead to a complete loss of network
connectivity as the packets proliferate.
Storm Control protects the Switch bandwidth from flooding packets, including broadcast
packets, multicast packets, and destination lookup failure (DLF). The Rate is a threshold
that limits the total number of the selected type of packets. For example, if the broadcast
and multicast options are selected, the total amount of packets per second for those two
types will not exceed the limit value.
Broadcast storm control limits the number of broadcast, multicast and unknown unicast
(also referred to as Destination Lookup Failure or DLF) packets the Switch receives per
second on the ports. When the maximum number of allowable broadcast, multicast and
unknown unicast packets is reached per second, the subsequent packets are discarded.
Enable this feature to reduce broadcast, multicast and unknown unicast packets in your
network.
Storm Control unit : pps.
Default Settings
Broadcast Storm Control : 300pps.
Multicast Storm Control : None.
DLF Storm Control : 300pps.
TRENDnet User’s Guide
Industrial Managed Switch Series
42
Node
Command
Description
enable
show storm-control
This command displays the current
storm control configurations.
The IGMP snooping is for multicast traffic. The Switch can passively snoop on IGMP
packets transferred between IP multicast routers/switches and IP multicast hosts to learn
the IP multicast group membership. It checks IGMP packets passing through it, picks out
the group registration information, and configures multicasting accordingly. IGMP
snooping allows the Switch to learn multicast groups without you having to manually
configure them.
The Switch can passively snoop on IGMP packets transferred between IP multicast
routers/switches and IP multicast hosts to learn the IP multicast group membership. It
checks IGMP packets passing through it, picks out the group registration information, and
configures multicasting accordingly. IGMP snooping allows the Switch to learn multicast
groups without you having to manually configure them.
The Switch forwards multicast traffic destined for multicast groups (that it has learned
from IGMP snooping or that you have manually configured) to ports that are members of
that group. IGMP snooping generates no additional network traffic, allowing you to
significantly reduce multicast traffic passing through your Switch.
The Switch can perform IGMP snooping on up to 4094 VLANs. You can configure the
Switch to automatically learn multicast group membership of any VLANs. The Switch then
performs IGMP snooping on the first VLANs that send IGMP packets. Alternatively, you
can specify the VLANs that IGMP snooping should be performed on. This is referred to as
fixed mode. In fixed mode the Switch does not learn multicast group membership of any
VLANs other than those explicitly added as an IGMP snooping VLAN.
Immediate Leave
When you enable IGMP Immediate-Leave processing, the switch
immediately removes a port when it detects an IGMP version 2 leave
message on that port. You should use the Immediate-Leave feature only
when there is a single receiver present on every port in the VLAN.
(Immediate Leave is only supported on IGMP Version 2 hosts).
The switch uses IGMP snooping Immediate Leave to remove from the forwarding table
an interface that sends a leave message without the switch sending group-specific queries
to the interface. The VLAN interface is pruned from the multicast tree for the multicast
group specified in the original leave message. Immediate Leave ensures optimal
bandwidth management for all hosts on a switched network, even when multiple
multicast groups are simultaneously in use.
Fast Leave
The switch allow user to configure a delay time. When the delay time is expired, the
switch removes the interface from the multicast group.
Last Member Query Interval
Last Member Query Interval: The Last Member Query Interval is the Max Response Time
inserted into Group-Specific Queries sent in response to Leave Group messages, and is
also the amount of time between Group-Specific Query messages.
Without Immediate Leave, when the switch receives an IGMP leave message from a
subscriber on a receiver port, it sends out an IGMP specific query on that port and waits
for IGMP group membership reports. If no reports are received in a configured time
period, the receiver port is removed from multicast group membership.
IGMP Querier
There is normally only one Querier per physical network. All multicast routers start up as
a Querier on each attached network. If a multicast router hears a Query message from a
router with a lower IP address, it MUST become a Non-Querier on that network. If a
router has not heard a Query message from another router for [Other Querier Present
Interval], it resumes the role of Querier. Routers periodically [Query Interval] send a
General Query on each attached network for which this router is the Querier, to solicit
membership information. On startup, a router SHOULD send [Startup Query Count]
General Queries spaced closely together [Startup Query Interval] in order to quickly and
reliably determine membership information. A General Query is addressed to the allsystems multicast group (224.0.0.1), has a Group Address field of 0, and has a Max
Response Time of [Query Response Interval].
This command displays the current IGMP
snooping configurations.
enable
show igmp-counters
This command displays the current IGMP
snooping counters.
enable
show igmp-counters
(port|vlan)
This command displays the current IGMP
snooping counters per port or per vlan.
configure
igmp-snooping (disable
| enable)
This command disables / enables the IGMP
snooping on the switch.
configure
igmp-snooping vlan
VLANID
This command enables the IGMP snooping
function on a VLAN or range of VLANs.
configure
no igmp-snooping vlan
VLANID
This command disables the IGMP snooping
function on a VLAN or range of VLANs.
configure
igmp-snooping
unknown-multicast
(drop|flooding)
This command configures the process for
unknown multicast packets when the IGMP
snooping function is enabled.
drop: Drop all of the unknown multicast
packets.
interface
igmp-querier-mode
(auto|fixed|edge)
This command specifies whether or not and
under what conditions the port(s) is (are)
IGMP query port(s). The Switch forwards
IGMP join or leave packets to an IGMP query
port, treating the port as being connected to
an IGMP multicast router (or server). You
must enable IGMP snooping as well.
Port IGMP Querier Mode
Auto:
The Switch uses the port as an IGMP query port if the port receives IGMP query
packets.
Fixed:
The Switch always treats the port(s) as IGMP query port(s). This is for when
connecting an IGMP multicast server to the port(s). The Switch always forwards the
client’s report/leave packets to the port.
Normally, the port is connected to an IGMP server.
Edge:
The Switch does not use the port as an IGMP query port. The IGMP query packets
received by this port will be dropped.
Normally, the port is connected to an IGMP client.
Note: The Switch will forward the IGMP join and leave packets to the query port.
Configurations:
Users can enable/disable the IGMP Snooping on the Switch. Users also can enable/disable
the IGMP Snooping on a specific VLAN. If the IGMP Snooping on the Switch is disabled,
the IGMP Snooping is disabled on all VLANs even some of the VLAN IGMP Snooping are
enabled.
Default Settings
If received packets are not received after 400 seconds, all multicast entries will be
deleted.
The default global IGMP snooping state is disabled.
The default VLAN IGMP snooping state is disabled for all VLANs.
The unknown multicast packets will be dropped.
The default port Immediate Leave state is disabled for all ports.
The default port Querier Mode state is auto for all ports.
Notices: There are a global state and per VLAN states. When the global state is disabled,
the IGMP snooping on the Switch is disabled even per VLAN states are enabled. When the
global state is enabled, user must enable per VLAN states to enable the IGMP Snooping
on the specific VLAN.
CLI Configuration
TRENDnet User’s Guide
Industrial Managed Switch Series
46
(Default:auto)
interface
igmp-immediate-leave
This command enables the IGMP Snooping
immediate leave function for the specific
interface.
interface
no igmp-immediateleave
This command disables the IGMP Snooping
immediate leave function for the specific
interface.
Parameter
Description
IGMP Snooping
State
Select Enable to activate IGMP Snooping to forward group
multicast traffic only to ports that are members of that group.
Select Disable to deactivate the feature.
IGMP Snooping
VLAN State
Select Add and enter VLANs upon which the Switch is to perform
IGMP snooping. The valid range of VLAN IDs is between 1 and
4094. Use a comma (,) or hyphen (-) to specify more than one
VLANs. Select Delete and enter VLANs on which to have the
Switch not perform IGMP snooping.
Unknown
Multicast Packets
Specify the action to perform when the Switch receives an
unknown multicast frame. Select Drop to discard the frame(s).
Select Flooding to send the frame(s) to all ports.
Click this to reset the fields to the last setting.
IGMP Snooping
State
This field displays whether IGMP snooping is globally enabled or
disabled.
IGMP Snooping
VLAN State
This field displays VLANs on which the Switch is to perform IGMP
snooping. None displays if you have not enabled IGMP snooping
on any port yet.
Unknown
Multicast
Packets
This field displays whether the Switch is set to discard or flood
unknown multicast packets.
Parameter
Description
Querier Mode
Select the desired setting, Auto, Fixed, or Edge. Auto means
the Switch uses the port as an IGMP query port if the port
receives IGMP query packets. Fixed means the Switch always
treats the port(s) as IGMP query port(s). This is for when
connecting an IGMP multicast server to the port(s). Edge means
the Switch does not use the port as an IGMP query port. In this
case, the Switch does not keep a record of an IGMP router
being connected to this port and the Switch does not forward
IGMP join or leave packets to this port.
Immediate
Leave
Select individual ports on which to enable immediate leave.
Group Limit
Configures the maximum group for the port or a range of ports.
Apply
Click Apply to apply the settings.
Refresh
Click this to reset the fields.
Port
The port ID.
Querier Mode
The Querier mode setting for the specific port.
Immediate Leave
The Immediate Leave setting for the specific port.
Group Counts
The current joining group count and the maximum group count.
A multicast address is associated with a group of interested receivers. According to RFC
3171, addresses 224.0.0.0 to 239.255.255.255, the former Class D addresses, are
designated as multicast addresses in IPv4.
The IANA owns the OUI MAC address 01:00:5e, therefore multicast packets are delivered
by using the Ethernet MAC address range 01:00:5e:00:00:00 - 01:00:5e:7f:ff:ff. This is 23
bits of available address space.
Supports 16 million hosts on each of 127
networks.
Class B
128.1.0.1 to 191.255.255.254
Supports 65,000 hosts on each of 16,000
networks.
Class C
192.0.1.1 to 223.255.254.254
Supports 254 hosts on each of 2 million
networks.
Class D
224.0.0.0 to 239.255.255.255
Reserved for multicast groups.
Class E
240.0.0.0 to 254.255.255.254
Reserved for future use, or Research and
Development Purposes.
IP multicast
address
Description
224.0.0.0
Base address (reserved)
224.0.0.1
The All Hosts multicast group that contains all systems on the same
network segment
224.0.0.2
The All Routers multicast group that contains all routers on the same
network segment
224.0.0.5
The Open Shortest Path First (OSPF) AllSPFRouters address. Used to
send Hello packets to all OSPF routers on a network segment
224.0.0.6
The OSPF AllDRouters address. Used to send OSPF routing information
to OSPF designated routers on a network segment
The first octet (01) includes the broadcast/multicast bit. The lower 23 bits of the 28-bit
multicast IP address are mapped into the 23 bits of available Ethernet address space. This
means that there is ambiguity in delivering packets. If two hosts on the same subnet each
subscribe to a different multicast group whose address differs only in the first 5 bits,
Ethernet packets for both multicast groups will be delivered to both hosts, requiring the
network software in the hosts to discard the unrequired packets.
This command displays the current port isolation
configurations.
“V”indicates the port’s packets can be sent
to that port.
“-” indicates the port’s packets cannot be
sent to that port.
interface
port-isolation
ports PORTLISTS
This command configures a port or a range of
ports to egress traffic from the specific port.
interface
no port-isolation
This command configures all ports to egress
traffic from the specific port.
VLAN
Port Isolation
The port isolation is a port-based virtual LAN feature. It partitions the switching ports into
virtual private domains designated on a per port basis. Data switching outside of the
port’s private domain is not allowed. It will ignore the packets’ tag VLAN information.
This feature is a per port setting to configure the egress port(s) for the specific port to
forward its received packets. If the CPU port (port 0) is not an egress port for a specific
port, the host connected to the specific port cannot manage the Switch.
If you wish to allow two subscriber ports to talk to each other, you must define the egress
port for both ports. CPU refers to the Switch management port. By default it forms a VLAN
with all Ethernet ports. If it does not form a VLAN with a particular port then the Switch
cannot be managed from that port.
Example: If you want to allow port-1 and port-3 to talk to each other, you must configure
as below:
Select a port number to configure its port isolation settings.
Select All Ports to configure the port isolation settings for all ports
on the Switch.
Egress Port
An egress port is an outgoing port, that is, a port through which a
data packet leaves.
Selecting a port as an outgoing port means it will communicate
with the port currently being configured.
Select All/
Deselect All
Click Select All to mark all ports as egress ports and permit traffic.
Click Deselect All to unmark all ports and isolate them.
Deselecting all ports means the port being configured cannot
communicate with any other port.
Apply
Click Apply to configure the settings.
Refresh
Click this to reset the fields to the last setting.
Port
Isolation
Status
“V” indicates the port’s packets can be sent to that port.
“-” indicates the port’s packets cannot be sent to that port.
TPID
User Priority
CFI
VLAN ID
2 bytes
3 bits
1 bit
12 bits
A tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN
membership of a frame across bridges - they are not confined to the switch on which they
were created. The VLANs can be created statically by hand or dynamically through GVRP.
The VLAN ID associates a frame with a specific VLAN and provides the information that
switches need to process the frame across the network. A tagged frame is four bytes
longer than an untagged frame and contains two bytes of TPID (Tag Protocol Identifier,
residing within the type/length field of the Ethernet frame) and two bytes of TCI (Tag
Control Information, starts after the source address field of the Ethernet frame).
The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet
switches. If a frame received at an Ethernet port has a CFI set to 1, then that frame should
not be forwarded as it is to an untagged port. The remaining twelve bits define the VLAN
ID, giving a possible maximum number of 4,096 VLANs. Note that user priority and VLAN
ID are independent of each other. A frame with VID (VLAN Identifier) of null (0) is called a
priority frame, meaning that only the priority level is significant and the default VID of the
ingress port is given as the VID of the frame. Of the 4096 possible VIDs, a VID of 0 is used
to identify priority frames and value 4095 (FFF) is reserved, so the maximum possible
VLAN configurations are 4,094.
802.1Q VLAN
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of
requirements that communicate as if they were attached to the Broadcast domain,
regardless of their physical location. A VLAN has the same attributes as a physical LAN,
but it allows for end stations to be grouped together even if they are not located on the
same network switch. Network reconfiguration can be done through software instead of
physically relocating devices.
VID- VLAN ID is the identification of the VLAN, which is basically used by the standard
802.1Q. It has 12 bits and allow the identification of 4096 (2^12) VLANs. Of the 4096
possible VIDs, a VID of 0 is used to identify priority frames and value 4095 (FFF) is
reserved, so the maximum possible VLAN configurations are 4,094.
Each port on the Switch is capable of passing tagged or untagged frames. To forward a
frame from an 802.1Q VLAN-aware switch to an 802.1Q VLAN-unaware switch, the Switch
first decides where to forward the frame and then strips off the VLAN tag. To forward a
frame from an 802.1Q VLAN-unaware switch to an 802.1Q VLAN-aware switch, the Switch
first decides where to forward the frame, and then inserts a VLAN tag reflecting the
ingress port's default VID. The default PVID is VLAN 1 for all ports, but this can be changed.
A broadcast frame (or a multicast frame for a multicast group that is known by the system)
is duplicated only on ports that are members of the VID (except the ingress port itself),
thus confining the broadcast to a specific domain.
TRENDnet User’s Guide
Industrial Managed Switch Series
52
Node
Command
Description
enable
show vlan VLANID
This command displays the VLAN
configurations.
configure
vlan <1~4094>
This command enables a VLAN and enters
the VLAN node.
configure
no vlan <1~4094>
This command deletes a VLAN.
vlan
show
This command displays the current VLAN
configurations.
vlan
name STRING
This command assigns a name for the
specific VLAN.
The VLAN name should be the combination
of the digit or the alphabet or hyphens (-) or
underscores (_).
The maximum length of the name is 16
characters.
vlan
no name
This command configures the vlan name to
default.
Note: The default vlan name is
“VLAN”+vlan_ID, VLAN1, VLAN2,…
vlan
add PORTLISTS
This command adds a port or a range of
ports to the vlan.
vlan
fixed PORTLISTS
This command assigns ports for permanent
member of the vlan.
vlan
no fixed PORTLISTS
This command removes all fixed member
from the vlan.
vlan
tagged PORTLISTS
This command assigns ports for tagged
member of the VLAN group. The ports
should be one/some of the permanent
members of the vlan.
802.1Q Port base VLAN
With port-based VLAN membership, the port is assigned to a specific VLAN independent
of the user or system attached to the port. This means all users attached to the port
should be members of the same VLAN. The network administrator typically performs the
VLAN assignment. The port configuration is static and cannot be automatically changed
to another VLAN without manual reconfiguration.
As with other VLAN approaches, the packets forwarded using this method do not leak into
other VLAN domains on the network. After a port has been assigned to a VLAN, the port
cannot send to or receive from devices in another VLAN without the intervention of a
Layer 3 device.
The device that is attached to the port likely has no understanding that a VLAN exists. The
device simply knows that it is a member of a subnet and that the device should be able
to talk to all other members of the subnet by simply sending information to the cable
segment. The switch is responsible for identifying that the information came from a
specific VLAN and for ensuring that the information gets to all other members of the
VLAN. The switch is further responsible for ensuring that ports in a different VLAN do not
receive the information.
This approach is quite simple, fast, and easy to manage in that there are no complex
lookup tables required for VLAN segmentation. If port-to-VLAN association is done with
an application-specific integrated circuit (ASIC), the performance is very good. An ASIC
allows the port-to-VLAN mapping to be done at the hardware level.
Default Settings
The default PVID is 1 for all ports.
The default Acceptable Frame is All for all ports.
Enter the VLAN ID for this entry; the valid range is between 1 and
4094.
VLAN Name
Enter a descriptive name for the VLAN for identification purposes.
The VLAN name should be the combination of the digit or the
alphabet or hyphens (-) or underscores (_).
The maximum length of the name is 16 characters.
Member Port
Enter the port numbers you want the Switch to assign to the VLAN
as members. You can designate multiple port numbers
individually by using a comma (,) and by range with a hyphen (-).
Apply
Click Apply to save your changes back to the Switch.
Refresh
Click Refresh to begin configuring this screen afresh.
VLAN List
VLAN ID
This field displays the index number of the VLAN entry. Click the
number to modify the VLAN.
VLAN Name
This field displays the name of the VLAN.
VLAN Status
This field displays the status of the VLAN. Static or Dynamic
(802.1Q VLAN).
Member Port
This field displays which ports have been assigned as members of
the VLAN. This will display None if no ports have been assigned.
Action
Click Delete to remove the VLAN. The VLAN 1 cannot be deleted.
Parameter
Description
VLAN ID
Select a VLAN ID to configure its port tagging settings.
Tag Port
Selecting a port which is a member of the selected VLAN ID will
make it a tag port. This means the port will tag all outgoing frames
transmitted with the VLAN ID.
Select All
Click Select All to mark all member ports as tag ports.
Deselect All
Click Deselect All to mark all member ports as untag ports.
Apply
Click Apply to save your changes back to the Switch.
Refresh
Click Refresh to begin configuring this screen afresh.
Tag Status
VLAN ID
This field displays the VLAN ID.
Tag Ports
This field displays the ports that have been assigned as tag ports.
This field displays the ports that have been assigned as untag
ports.
Parameter
Description
Port
Select a port number to configure from the drop-down box.
Select All to configure all ports at the same time.
PVID
Select a PVID (Port VLAN ID number) from the drop-down box.
Acceptable
Frame
Specify the type of frames allowed on a port. Choices are All,
VLAN Untagged Only or VLAN Tagged Only.
- Select All from the drop-down list box to accept all untagged or
tagged frames on this port. This is the default setting.
- Select VLAN Tagged Only to accept only tagged frames on this
port. All untagged frames will be dropped.
- Select VLAN Untagged Only to accept only untagged frames on
this port. All tagged frames will be dropped.
Apply
Click Apply to save your changes back to the Switch.
Refresh
Click Refresh to begin configuring this screen afresh.
Port Status
Port
This field displays the port number.
PVID
This field displays the Port VLAN ID number.
Acceptable
Frame
This field displays the type of frames allowed on the port. This will
either display All or VLANTagged Only or VLAN Untagged Only.
Node
Command
Description
enable
show mac-vlan
This command displays the all of the mac-vlan
configurations.
configure
mac-vlan STRINGS
vlan VLANID priority
<0-7>
This command creates a mac-vlan entry with the
leading three or more bytes of mac address and
the VLAN and the priority.
Port Settings
Advanced Settings > VLAN > VLAN > Port Settings
MAC VLAN
The MAC base VLAN allows users to create VLAN with MAC address. The MAC address
can be the leading three or more bytes of the MAC address.
For example, 00:01:02 or 00:03:04:05 or 00:01:02:03:04:05.
When the Switch receives packets, it will compare MAC-based VLAN configures. If the SA
is matched the MAC-based VLAN configures, the Switch replace the VLAN with user
configured and them forward them.
For example:
Configurations: 00:01:02, VLAN=23, Priority=2.
The packets with SA=00:01:02:xx:xx:xx will be forwarded to VLAN 22 member ports.
Notices: The 802.1Q port base VLAN should be created first.
Configures the leading three or more bytes of the MAC address.
VLAN
Configures the VLAN.
Priority
Configures the 802.1Q priority.
Action
Click the “Delete” button to delete the protocol VLAN profile.
DHCP Options
DHCP Options, formally known as DHCP Options 82 is the “DHCP Relay Agent Information
Option”. Option 82 was designed to allow a DHCP Relay Agent to insert circuit specific
information into a request that is being forwarded to a DHCP server. Specifically the
option works by setting two sub-options: Circuit ID and Remote ID.
The DHCP option 82 is working on the DHCP snooping or/and DHCP relay. The switch will
monitor the DHCP packets and append some information as below to the DHCPDISCOVER
and DHCPREQUEST packets. The switch will remove the DHCP Option 82 from the
DHCPOFFER and DHCPACK packets. The DHCP server will assign IP domain to the client
dependent on these information.
The maximum length of the information is 32 characters.
In residential, metropolitan Ethernet-access environments, DHCP can centrally manage
the IP address assignments for a large number of subscribers. When the DHCP option-82
feature is enabled on the switch, a subscriber device is identified by the switch port
through which it connects to the network (in addition to its MAC address). Multiple hosts
on the subscriber LAN can be connected to the same port on the access switch and are
uniquely identified.
When you enable the DHCP snooping information option 82 on the switch, this sequence
of events occurs:
The host (DHCP client) generates a DHCP request and broadcasts it on the network.
When the switch receives the DHCP request, it adds the option-82 information in
the packet. The option-82 information contains the switch MAC address (the
remote-ID suboption) and the port identifier, vlan-mod-port, from which the packet
is received (the circuit-ID suboption).
If the IP address of the relay agent is configured, the switch adds the IP address in
the DHCP packet.
The switch forwards the DHCP request that includes the option-82 field to the DHCP
server.
The DHCP server receives the packet. If the server is option-82 capable, it can use
the remote ID, the circuit ID, or both to assign IP addresses and implement policies,
such as restricting the number of IP addresses that can be assigned to a single
The circuit form is a flexible architecture. It allows user to combine any information or the
system configurations into the circuit sub-option.
The Circuit Form is a string format. And its maximum length is 100 characters.
The keyword, %SPACE, will be replaced with a space character.
The other keywords get system configurations from the system and then replace the
keyword and its leading code in the Circuit form. Eventually, the content of the circuit
form is part of the payload on the DHCP option 82 packet.
Rules:
The keyword must have a leading code ‘%’. For example: %HOSTNAME.
If there are any characters following the keywords, you must add ‘+’ between
the keyword and character. For example: %HOSTNAME+/.
If there are any characters before the keyword, you must add ‘+’ between the
character and the keyword. For example: Test+%HOSTNAME.
Keyword:
HOSTNAME -Add the system name into the Circuit sub-option..
SPACE -Add a space character.
SVLAN -Add the service provider VLAN ID into the Circuit sub-option.
If the service provider VLAN is not defined, the system will
return PVLAN.
CVLAN -Add the customer VLAN ID into the Circuit sub-option.
If the CVLAN is not defined, the system returns 0.
PORT -Add the transmit port ID into the Circuit sub-option.
FRAME -Add the frame ID into the Circuit sub-option.
The frame ID is configured with the CLI command, “dhcp-
options option82 circuit_frame VALUE”. Or GUI Circuit Frame.
TRENDnet User’s Guide
Industrial Managed Switch Series
58
Node
Command
Description
enable
show dhcp-options
This command displays the DHCP options
configurations.
configure
dhcp-options
option82 (disable |
enable)
This command disables / enables the DHCP
option 82 on the Switch.
configure
dhcp-options
option82 circuit_id
This command configures the information of
the circuit ID sub-option.
configure
dhcp-options
option82 remote_id
This command configures the information of
the remote ID sub-option.
configure
dhcp-options
option82
circuit_frame VALUE
This command configures the frame ID for the
circuit sub-option.
configure
dhcp-options
option82 circuit_shelf
VALUE
This command configures the shelf ID for the
circuit sub-option.
configure
dhcp-options
option82 circuit_slot
VALUE
This command configures the slot ID for the
circuit sub-option.
SHELF -Add the shelf ID into the Circuit sub-option.
The shelf ID is configured with the CLI command, “dhcpoptions option82 circuit_shelf VALUE”. Or GUI Circuit Shelf.
SLOT -Add the slot ID into the Circuit sub-option.
The slot ID is configured with the CLI command, “dhcpoptions option82 circuit_slot VALUE”. Or GUI Circuit Slot.
Select this option to enable / disable the DHCP option 82 on the
Switch.
Circuit Frame
The frame ID for the circuit sub-option.
Circuit Shelf
The shelf ID for the circuit sub-option.
Circuit Slot
The slot ID for the circuit sub-option.
Circuit-ID String
The String of the circuit ID sub-option information.
Remote-ID String
The String of the remote ID sub-option information.
Apply
Click Apply to save your changes to the Switch.
Refresh
Click Refresh to begin configuring this screen afresh.
DHCP Option 82 Port Settings
Port
The Port ID.
Curcuit-ID String
The String of the circuit ID sub-option information for the specific
port.
Remote-ID String
The String of the remote ID sub-option information for the
specific port.
DHCP Option 82 Port Status
The field displays all of the ports’ configurations.
Web Configuration
Advanced Settings > DHCP Options
DHCP Relay
Because the DHCPDISCOVER message is a broadcast message, and broadcasts only cross
other segments when they are explicitly routed, you might have to configure a DHCP
Relay Agent on the router interface so that all DHCPDISCOVER messages can be
forwarded to your DHCP server. Alternatively, you can configure the router to forward
DHCP messages and BOOTP message. In a routed network, you would need DHCP Relay Agents if you plan to implement only one DHCP server.
The DHCP Relay that either a host or an IP router that listens for DHCP client messages
being broadcast on a subnet and then forwards those DHCP messages directly to a
configured DHCP server. The DHCP server sends DHCP response messages directly back
to the DHCP relay agent, which then forwards them to the DHCP client. The DHCP
administrator uses DHCP relay agents to centralize DHCP servers, avoiding the need for a
DHCP server on each subnet.
Most of the time in small networks DHCP uses broadcasts however there are some
circumstances where unicast addresses will be used. A router for such a subnet receives
the DHCP broadcasts, converts them to unicast (with a destination MAC/IP address of the
configured DHCP server, source MAC/IP of the router itself). The field identified as the
GIADDR in the main DHCP page is populated with the IP address of the interface on the
router it received the DHCP request on. The DHCP server uses the GIADDR field to identify
the subnet the device and select an IP address from the correct pool. The DHCP server
then sends the DHCP OFFER back to the router via unicast which then converts it back to
a broadcast and out to the correct subnet containing the device requesting an address.
Configurations:
Users can enable/disable the DHCP Relay on the Switch. Users also can enable/disable the
DHCP Relay on a specific VLAN. If the DHCP Relay on the Switch is disabled, the DHCP
Relay is disabled on all VLANs even some of the VLAN DHCP Relay are enabled.
Applications:
Application-1 (Over a Router)
The DHCP cleint-1 and DHCP client-2 are located in different IP segments. But they
allocate IP address from the same DHCP server.
This command displays the current port
configurations.
interface
power efficientethernet auto
The command enables EEE on the specified
interface. When EEE is enabled, the device
advertises and auto negotiates EEE to its link
partner.
interface
no power efficientethernet auto
The command disables EEE on the specified
interface.
Parameter
Description
EEE Port State
Click a port to enable IEEE 802.3az Energy Efficient Ethernet on
that port.
Select All
Click this to enable IEEE 802.3az Energy Efficient Ethernet across
all ports.
Deselect All
Click this to disable IEEE 802.3az Energy Efficient Ethernet across
all ports.
Apply
Click Apply to configure the settings.
Refresh
Click this to reset the fields to the last setting.
EEE (Energy Efficient Ethernet)
The Energy Efficient Ethernet (EEE) is an IEEE 802.3az standard that is designed to reduce
power consumption in Ethernet networks during idle periods.
EEE can be enabled on devices that support low power idle (LPI) mode. Such devices can
save power by entering LPI mode during periods of low utilization. In LPI mode, systems
on both ends of the link can save power by shutting down certain services. EEE provides
the protocol needed to transition into and out of LPI mode in a way that is transparent to
upper layer protocols and applications.
Default Settings
All ports’ EEE states are disabled.
CLI Configuration
Web Configuration
Advanced Settings > EEE
Example:
[DEVICE_NAME]#configure terminal
[DEVICE_NAME](config-if)#interface gigabitethernet1/0/1
[DEVICE_NAME](config-if)#power efficient-ethernet auto
[DEVICE_NAME](config-if)#no power efficient-ethernet auto
The command displays the current trunk
configurations.
configure
link-aggregation
[GROUP_ID] (disable |
enable)
The command disables / enables the trunk on
the specific trunk group.
configure
link-aggregation
[GROUP_ID] interface
PORTLISTS
The command adds ports to a specific trunk
group.
configure
no link-aggregation
[GROUP_ID] interface
PORTLISTS
The commands delete ports from a specific
trunk group.
Link Aggregation
Static Trunk
Link Aggregation (Trunking) is the grouping of physical ports into one logical highercapacity link. You may want to trunk ports if for example, it is cheaper to use multiple
lower-speed links than to under-utilize a high-speed, but more costly, single-port link.
However, the more ports you aggregate then the fewer available ports you have. A
trunk group is one logical link containing multiple ports. The Switch supports both static
and dynamic link aggregation.
Note: In a properly planned network, it is recommended to implement static link
aggregation only. This ensures increased network stability and control over the trunk
groups on your Switch.
Default Settings:
The default group Link Aggregation state is disabled for all groups.
The default group Link Aggregation load balance is source MAC and destination
MAC for all groups.
Maximum link aggregation group: 6
Maximum port in link aggregation group: 8
Select the group ID to use for this trunk group, that is, one logical
link containing multiple ports.
Select Enable to use this static trunk group.
Load Balance
Configures the load balance algorithm for the specific trunk
group.
Member Ports
Select the ports to be added to the static trunk group.
Apply
Click Apply to configure the settings.
Refresh
Click this to reset the fields to the last setting.
Trunk Group Status
Group ID
This field displays the group ID to identify a trunk group, that is,
one logical link containing multiple ports.
State
This field displays if the trunk group is enabled or disabled.
Load Balance
This field displays the load balance policy for the trunk group.
Member Ports
This field displays the assigned ports that comprise the static
trunk group.
You must connect all ports point-to-point to the same Ethernet switch and
configure the ports for LACP trunking.
LACP only works on full-duplex links.
All ports in the same trunk group must have the same media type, speed,
and duplex mode and flow control settings.
Configure trunk groups or LACP before you connect the Ethernet switch to
avoid causing network topology loops.
System Priority:
The switch with the lowest system priority (and lowest port number if system priority is
the same) becomes the LACP “server”. The LACP “server” controls the operation of LACP
setup. Enter a number to set the priority of an active port using Link Aggregation Control
Protocol (LACP), the smaller the number, the higher the priority level.
System ID:
The LACP system ID is the combination of the LACP system priority value and the MAC
address of the router.
Administrative Key:
The administrative key defines the ability of a port to aggregate with other ports. A
port's ability to aggregate with other ports is determined by these factors:
LACP
The Switch adheres to the IEEE 802.3ad standard for static and dynamic (LACP) port
trunking.
The IEEE 802.3ad standard describes the Link Aggregation Control Protocol (LACP) for
dynamically creating and managing trunk groups.
When you enable LACP link aggregation on a port, the port can automatically negotiate
with the ports at the remote end of a link to establish trunk groups. LACP also allows
port redundancy, that is, if an operational port fails, then one of the “standby” ports
The port priority determines which ports should be put in standby mode when there is a
hardware limitation that prevents all compatible ports from aggregating.
Default Settings:
The default System Priority is 32768.
The default group LACP state is disabled for all groups.
Port physical characteristics, such as data rate, duplex capability, and
point-to-point or shared medium.
Configuration restrictions that you establish.
TRENDnet User’s Guide
Industrial Managed Switch Series
65
Node
Command
Description
enable
show lacp counters [GROUP_ID]
This command displays the LACP
counters for the specific group or
all groups.
enable
show lacp internal [GROUP_ID]
This command displays the LACP
internal information for the specific
group or all groups.
enable
show lacp neighbor [GROUP_ID]
This command displays the LACP
neighbor’s information for the
specific group or all groups.
enable
show lacp port_priority
This command displays the port
priority for the LACP.
enable
show lacp sys_id
This command displays the actor’s
and partner’s system ID.
configure
lacp (disable | enable)
This command disables / enables
the LACP on the switch.
configure
lacp GROUP_ID (disable |
enable)
This command disables / enables
the LACP on the specific trunk
group.
configure
clear lacp counters [PORT_ID]
This command clears the LACP
statistics for the specific port or all
ports.
configure
lacp system-priority<1-65535>
This command configures the
system priority for the LACP. Note:
The default value is 32768.
configure
no lacp system-priority
This command configures the
default for the system priority for
the LACP.
interface
lacp port_priority <1-65535>
This command configures the
priority for the specific port.
Note: The default value is 32768.
interface
no lacp port_priority
This command configures the
default for the priority for the
specific port.
configure
interface range
gigabitethernet1/0/PORTLISTS
This command enters the interface
configure node.
if-range
lacp port_priority <1-65535>
This command configures the
priority for the specific ports.
Note: The default value is 32768.
if-range
no lacp port_priority
This command configures the
default for the priority for the
specific ports.
LACP system priority is used to determine link aggregation
group (LAG) membership, and to identify this device to other
switches during LAG negotiations. (Range: 0-65535; Default:
32768)
System ID
The neighbor Switch’s system ID.
Port
The direct connected port Id of the neighbor Switch.
Age
The available time period of the neighbor Switch LACP
information.
Port State
The direct connected port’s state of the neighbor Switch.
Port Priority
The direct connected port’s priority of the neighbor Switch.
Oper Key
The Oper key of the LACP member port.
Internal Information
Port Priority
The port priority of the LACP member port.
Admin Key
The Admin key of the LACP member port.
Oper Key
The Oper key of the LACP member port.
Port State
The port state of the LACP member port.
LACP Info.
Advanced Settings > Link Aggregation > LACP Info.
Loop Detection
Loop detection is designed to handle loop problems on the edge of your network. This
can occur when a port is connected to a Switch that is in a loop state. Loop state occurs
as a result of human error. It happens when two ports on a switch are connected with
the same cable. When a switch in loop state sends out broadcast messages the
messages loop back to the switch and are re-broadcast again and again causing a
broadcast storm.
The loop detection function sends probe packets periodically to detect if the port
connect to a network in loop state. The Switch shuts down a port if the Switch detects
that probe packets loop back to the same port of the Switch.
Loop Recovery:
When the loop detection is enabled, the Switch will send one probe packets every two
seconds and then listen this packet. If it receives the packet at the same port, the
Switch will disable this port. After the time period, recovery time, the Switch will
enable this port and do loop detection again.
The Switch generates syslog, internal log messages as well as SNMP traps when it shuts
down a port via the loop detection feature.
Default Settings
The default global Loop-Detection state is disabled.
This command displays the current
loop detection configurations.
configure
loop-detection (disable | enable)
This command disables / enables
the loop detection on the switch.
configure
loop-detection address
MACADDR
This command configures the
destination MAC for the loop
detection special packets.
configure
no loop-detection address
This command configures the
destination MAC to default
(00:0b:04:AA:AA:AB).
interface
loop-detection (disable | enable)
This command disables / enables
the loop detection on the port.
interface
no shutdown
This command enables the port. It
can unblock port blocked by loop
detection.
interface
loop-detection recovery (disable
| enable)
This command enables / disables
the recovery function on the port.
interface
loop-detection recovery time
VALUE
This command configures the
recovery period time.
configure
interface range
gigabitethernet1/0/ PORTLISTS
This command enters the interface
configure node.
if-range
loop-detection (disable | enable)
This command disables / enables
the loop detection on the ports.
if-range
loop-detection recovery (disable
| enable)
This command enables / disables
the recovery function on the port.
if-range
loop-detection recovery time
VALUE
This command configures the
recovery period time.
The default Loop Detection Destination MAC is 00:0b:04:AA:AA:AB
The default Port Loop-Detection state is disabled for all ports.
The default Port Loop-Detection status is unblocked for all ports.
The loop detection on the Switch is disabled.
Loop Detection Destination MAC=00:0b:04:aa:aa:ab
Recovery Recovery
Port State Status State Time Port State Status State Time
---- -------- ------- -------- ---- ---- -------- ------- -------- ----
1 Disabled Normal Enabled 1 2 Disabled Normal Enabled 1
3 Disabled Normal Enabled 1 4 Disabled Normal Enabled 1
5 Disabled Normal Enabled 1 6 Disabled Normal Enabled 1
7 Disabled Normal Enabled 1 8 Disabled Normal Enabled 1
9 Disabled Normal Enabled 1 10 Disabled Normal Enabled 1
11 Disabled Normal Enabled 1 12 Disabled Normal Enabled 1
13 Disabled Normal Enabled 1 14 Disabled Normal Enabled 1
15 Disabled Normal Enabled 1 16 Disabled Normal Enabled 1
Vendor Name = “ABCDEFG Corp.”
Word 0 Hi byte = ‘A’
Word 0 Lo byte = ‘B’
Word 1 Hi byte = ‘C’
Word 1 Lo byte = ‘D’
Word 2 Hi byte = ‘E’
Word 2 Lo byte = ‘F’
Word 3 Hi byte = ‘G’
Word 3 Lo byte = ‘’
Word 4 Hi byte = ‘C’
Word 4 Lo byte = ‘o’
Word 5 Hi byte = ‘r’
Word 5 Lo byte = ‘p’
Word 6 Hi byte = ‘.’
Word 6 Lo byte = ‘\0’
0x0020
16 words
ASCII
Product Name = “SWITCH”
Word 0 Hi byte = ‘S’
Word 0 Lo byte = ‘W’
Word 1 Hi byte = ‘I’
Word 1 Lo byte = ‘T’
Word 2 Hi byte = ‘C’
Word 2 Lo byte = ‘H’
0x0040
7 words
Product Serial Number
Ex: Serial No=A000000000001
0x0050
12 words
ASCII
Firmware Version=” 8648-999-
1.1.0.S0”
Word 0 Hi byte = ‘8’
Word 0 Lo byte = ‘6’
Word 1 Hi byte = ‘4’
Word 1 Lo byte = ‘8’
Word 2 Hi byte = ‘-’
Word 2 Lo byte = ‘9’
Word 3 Hi byte = ‘9’
Word 3 Lo byte = ‘9’
Modbus
MODBUS TCP supports different types of data format for reading. The primary four types
of them are:
MODBUS Data Map and Information Interpretation of IE Switches
MODBUS base address of switches is 1001(decimal) for Function Code 4.
Word 4 Hi byte = ‘-’
Word 4 Lo byte = ‘1’
Word 5 Hi byte = ‘.’
Word 5 Lo byte = ‘1’
Word 6 Hi byte = ‘.’
Word 6 Lo byte = ‘0’
Word 7 Hi byte = ‘.’
Word 7 Lo byte = ‘S’
Word 8 Hi byte = ‘0’
Word 8 Lo byte = ‘\0’
0x0060
16 words
ASCII
Firmware Release Date=” Mon Sep 30
18:51:45 2013”
0x0070
3 words
HEX
Ethernet MAC Address
Ex: MAC = 00-01-02-03-04-05
Word 0 Hi byte = 0 x 00
Word 0 Lo byte = 0 x 01
Word 1 Hi byte = 0 x 02
Word 1 Lo byte = 0 x 03
Word 2 Hi byte = 0 x 04
Word 2 Lo byte = 0 x 05
0x0080
1 word
HEX
Power 1(PWR) Alarm, DIP switch 1
need ON
0x0000: no alarm
0x0001: input voltage < 44V
0x0002: input voltage > 57V
0x0003: No PWR input
0x0081
1 word
HEX
Power 2(RPS) Alarm, DIP switch 1
need ON
0x0000: no alarm
0x0001: input voltage < 44V
0x0002: input voltage > 57V
0x0003: No RPSinput
0x0090
1 word
HEX
Fault LED Status
0x0000: No
0x0001: Yes
Port Information
0x0100 to
0x0109
1 word
HEX
Port 1 to 10 Link Status
0x0000: Link down
0x0001: 10M-Full-FC_ON (FC: Flow
Xpress Ring Status on the Switch:
0x0000 : Disabled.
0x0001 : Enabled
0x0510
1 word
HEX
Status of Xpress-ring1 of the Switch
0x0000 : Disabled
0x0001 : Enabled
0x0511
1 word
HEX
Status of Xpress-ring2 of the Switch
0x0000 : Disabled
0x0001 : Enabled
0x0512
3 word
HEX
Destination MAC of the Xpress-ring1
Word 0 Lo byte = MAC0
Word 0 Hi byte = MAC1
Word 1 Lo byte = MAC2
Word 1 Hi byte = MAC3
Word 2 Lo byte = MAC4
Word 2 Hi byte = MAC5
0x0515
3 word
HEX
Destination MAC of the Xpress-ring2
Word 0 Lo byte = MAC0
Word 0 Hi byte = MAC1
Word 1 Lo byte = MAC2
Word 1 Hi byte = MAC3
Word 2 Lo byte = MAC4
Word 2 Hi byte = MAC5
0x0518
1 word
HEX
Primary Port of the Xpress-ring1
Word 0 Hi byte = Port ID.
0x0519
1 word
HEX
Secondary Port of the Xpress-ring1
Word 0 Hi byte = Port ID.
This is the highest priority level. Ports set to
the Critical level are guaranteed to receive
power before any of the ports assigned to
the other priority levels.
High
Ports set to the High level receive power
only when all the ports assigned to the
Critical level are already receiving power.
Low
This is the lowest priority level. Ports set to
the Low level receive power only when all
the ports assigned to the Critical and High
levels are already receiving power. This
level is the default setting.
Power over Ethernet
(Supported Models: TI-PG541i, TI-PG102i)
The main advantage of PoE is that it can make installing a network easier. The selection
of a location for a network device is often limited by whether there is a power source
nearby. This constraint limits equipment placement or requires the added time and cost
of having additional electrical sources installed. However, with PoE, you can install PoE
compatible devices wherever they are needed without having to worry about whether
there is power source nearby.
Power Sourcing Equipment (PSE)
A device that provides PoE to other network devices is referred to as power sourcing
equipment (PSE). The Gigabit Web Smart PoE+ Switch is a PSE device which provides DC
power to the network cable and functions as a central power source for other network
devices.
Powered Device (PD)
A device that receives power from a PSE device is called a powered device (PD).
Examples include wireless access points, IP phones, webcams, and even other Ethernet
switches.
PD Classes PDs are grouped into five classes. The classes are based on the amount of
power that PDs require. The Gigabit Web Smart PoE+ Switch supports all five classes.
Power Budget
Power budget is the maximum amount of power that the PoE switch can provide at one
time to the connected PDs. Port Prioritization As long as the total power requirements
of the PDs is less than the total available power of the switch, it can supply power to all
of the PDs.
However, when the PD power requirements exceed the total available power, the
switch denies power to some ports based on a process called port prioritization.
The ports on the PoE switch are assigned to one of three priority levels. These levels and
descriptions are listed in Table 3. Without enough power to support all the ports set to
the same priority level at one time, the switch provides power to the ports based on the
port number, in ascending order. For example, when all of the ports in the switch are set
to the low priority level and the power requirements are exceeded on the switch, port 1
has the highest priority level, port 2 has the next highest priority level and so forth.
Click Refresh to begin configuring this screen afresh.
PoE Mode
Displays the current PoE mode.
Total Power
Displays the total power that the Switch supports.
Total Consuming
Power
Displays the total consuming power for all of the PDs.
External Power
Module
Displays the status of the external power module.
Port
Display the Port No.
State
Displays the PoE state for the specific port.
PD Priority
Displays the PoE priority for the specific port.
Class
The field displays the class mode which the PSE negotiate with
the PD on the specific port.
Consuming
Power(mW)
Displays the consuming power for the specific port.
Power
Allocated(mW)
Displays the power allocated for the specific port.
Current
Status(mA)
Displays the current status for the specific port.
PD Alive Check
The function has a global state configuration. If the global state configuration is
enabled. The Switch will check the configurations of every port.
If the port’s state is enabled, the Switch will send keep-a-live probe packet every
interval time. If the host cannot respond when the keep-a-live probe packet count
is over the retry times, the Switch performs the action, reboot/alarm/all to the
Power Device, depending on the port’s configuration.
Power OFF Time (sec):
When PD has been rebooted, the PoE port restored power after the
specified time.
Default:15, range: 3-120 sec.
Start up Time (sec):
When PD has been start up, the Switch will wait Start up time to do PoE
Auto Checking.
Default: 60, range: 30-600 sec.
Interval Time (sec):
Device will send checking message to PD each interval time.
Default: 30, range: 10-120 sec.
Action:
The action when the failure detection.
All: Send an alarm message to inform the administrator and then reboot
the PD.
Alarm: Just send an alarm message to inform the administrator.
None: Keep Ping the remote PD but does nothing further.
Reboot: Cut off the power of the PoE port, make PD rebooted.
This command displays the
configuration of the PD Alive Check.
configure
pd-alive (disable|enable)
This command disables or enables
the global PD Alive Check for the
Switch.
interface
pd-alive action
(reboot|alarm|all|none)
This command configures the
action when the system detects
that the host cannot respond the
keep-a-live probe packet.
interface
pd-alive interval VALUE
This command configures the
interval to send the keep-a-live
probe packets to check if the host is
still alive for the specific port.
interface
pd-alive ip IP_ADDR
This command configures the Host
IP address which connects to the
specific port.
interface
pd-alive retry-time VALUE
This command configures the retry
times when no response from the
host for the keep-a-live probe
packet for the specific port.
interface
pd-alive power-off-time VALUE
startup-time VALUE
This command configures the
power-off time and startup time.
Parameter
Description
State
Enables/Disables the PD Alive Check.
Port
Selects a port or a range of ports which you want to configure.
State
Enables/Disables the PD Alive Check for the specific port(s).
IP Address
Specifies the Host IP address which connects to the port.
Interval
The interval to send the packet probes to check if the host is
still alive.
Retry Time
The retry times when no response from the host for the keepalive probe packet.
Action
The action to the Power Device when the system detects that
the Power Device cannot respond the keep-a-live probe packet.
The options have Reboot / Alarm / All /None.
This command enables or disables
the PoE schedule on the specific
day.
interface
poe schedule week
(Sun|Mon|Tue|Wed|Thu|Fri|Sat)
start-time VALUE end-time VALUE
action (enable|disable)
This command configures the PoE
schedule start-time and end-time
on a specific day on the specific
port. Users can enable or disable
the PoE on the time period.
Parameter
Description
Port
Selects a port that you want to configure the PoE schedule
function.
Week
Select a week day that you want to configure the schedule.
Check
Enables or Disables the PoE schedule on the specific port for a
defined time period.
Time (Hour)
Select the time (in hours) to start and stop the schedule.
Web Configuration
Advanced Settings > PoE > Schedule
PoE Schedule
The function has a global state configuration. If the global state configuration is
disabled. The Switch will not perform the schedule function. If the global state is
enabled, the Switch will check every port’s configurations.
If the port’s check configuration is NO for a specific day, the Switch will not perform
action for the specific port. If the port’s check configuration is YES for a specific day, the
Switch will check the Start time and End Time. If the current time is in the interval
between Start time and End Time, the Switch will perform the action configuration. If
the action is ENABLE, the Switch will send power to the port. If the current time is not in
the interval between Start time and End Time, the Switch will not send power to the
port.
(R)STP detects and breaks network loops and provides backup links between switches,
bridges or routers. It allows a Switch to interact with other (R)STP compliant switches in
your network to ensure that only one path exists between any two stations on the
network.
The Switch supports Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol
(RSTP) as defined in the following standards.
IEEE 802.1D Spanning Tree Protocol
IEEE 802.1w Rapid Spanning Tree Protocol
The Switch uses IEEE 802.1w RSTP (Rapid Spanning Tree Protocol) that allows faster
convergence of the spanning tree than STP (while also being backwards compatible
with STP-only aware bridges). In RSTP, topology change information is directly
propagated throughout the network from the device that generates the topology
change. In STP, a longer delay is required as the device that causes a topology change
first notifies the root bridge and then the root bridge notifies the network. Both RSTP
and STP flush unwanted learned addresses from the filtering database.
In STP, the port states are Blocking, Listening, Learning, Forwarding.
In RSTP, the port states are Discarding, Learning, and Forwarding.
Note: In this document, “STP” refers to both STP and RSTP.
STP Terminology
The root bridge is the base of the spanning tree.
Path cost is the cost of transmitting a frame onto a LAN through that port.
The recommended cost is assigned according to the speed of the link to
which a port is attached. The slower the media, the higher the cost.
On each bridge, the bridge communicates with the root through the root
port. The root port is the port on this Switch with the lowest path cost to the
root (the root path cost). If there is no root port, then this Switch has been
accepted as the root bridge of the spanning tree network.
For each LAN segment, a designated bridge is selected. This bridge has the
lowest cost to the root among the bridges connected to the LAN.
Forward Time (Forward Delay):
This is the maximum time (in seconds) the Switch will wait before changing
states. This delay is required because every switch must receive information
about topology changes before it starts to forward frames. In addition, each port
needs time to listen for conflicting information that would make it return to a
blocking state; otherwise, temporary data loops might result. The allowed range
is 4 to 30 seconds.
Max Age:
This is the maximum time (in seconds) the Switch can wait without receiving a
BPDU before attempting to reconfigure. All Switch ports (except for designated
ports) should receive BPDUs at regular intervals. Any port that age out STP
information (provided in the last BPDU) becomes the designated port for the
attached LAN. If it is a root port, a new root port is selected from among the
Switch ports attached to the network. The allowed range is 6 to 40 seconds.
This is the time interval in seconds between BPDU (Bridge Protocol Data Units)
configuration message generations by the root switch. The allowed range is 1 to
10 seconds.
PathCost:
Path cost is the cost of transmitting a frame on to a LAN through that port. It is
recommended to assign this value according to the speed of the bridge, the
slower the media, the higher the cost.
How STP Works?
After a bridge determines the lowest cost-spanning tree with STP, it enables the root
port and the ports that are the designated ports for connected LANs, and disables all
other ports that participate in STP. Network packets are therefore only forwarded
between enabled ports, eliminating any possible network loops.
STP-aware switches exchange Bridge Protocol Data Units (BPDUs) periodically. When
the bridged LAN topology changes, a new spanning tree is constructed. Once a stable
network topology has been established, all bridges listen for Hello BPDUs (Bridge
Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello
BPDU after a predefined interval (Max Age), the bridge assumes that the link to the
root bridge is down. This bridge then initiates negotiations with other bridges to
reconfigure the network to re-establish a valid network topology.
802.1D STP
The Spanning Tree Protocol (STP) is a link layer network protocol that ensures a loopfree topology for any bridged LAN. It is based on an algorithm invented by Radia
Perlman while working for Digital Equipment Corporation. In the OSI model for
computer networking, STP falls under the OSI layer-2. Spanning tree allows a network
design to include spare (redundant) links to provide automatic backup paths if an active
link fails, without the danger of bridge loops, or the need for manual enabling/disabling
of these backup links. Bridge loops must be avoided because they result in flooding the
network.
The Spanning Tree Protocol (STP) is defined in the IEEE Standard 802.1D. As the name
suggests, it creates a spanning tree within a mesh network of connected layer-2 bridges
(typically Ethernet switches), and disables those links that are not part of the tree,
leaving a single active path between any two network nodes.
STP switch port states
Blocking - A port that would cause a switching loop, no user data is sent or
received but it may go into forwarding mode if the other links in use were to
fail and the spanning tree algorithm determines the port may transition to
the forwarding state. BPDU data is still received in blocking state.
Listening - The switch processes BPDUs and awaits possible new information
that would cause it to return to the blocking state.
Learning - While the port does not yet forward frames (packets) it does learn
source addresses from frames received and adds them to the filtering
database (switching database)
Forwarding - A port receiving and sending data, normal operation. STP still
monitors incoming BPDUs that would indicate it should return to the blocking
state to prevent a loop.
Disabled - Not strictly part of STP, a network administrator can manually
disable a port
802.1w RSTP
In 1998, the IEEE with document 802.1w introduced an evolution of the Spanning Tree
Protocol: Rapid Spanning Tree Protocol (RSTP), which provides for faster spanning tree
convergence after a topology change. Standard IEEE 802.1D-2004 now incorporates
RSTP and obsoletes STP. While STP can take 30 to 50 seconds to respond to a topology
change, RSTP is typically able to respond to changes within a second.
RSTP bridge port roles:
Root - A forwarding port that is the best port from Nonroot-bridge to
Rootbridge
Designated - A forwarding port for every LAN segment
Alternate - An alternate path to the root bridge. This path is different than
Backup - A backup/redundant path to a segment where another bridge port
already connects.
Disabled - Not strictly part of STP, a network administrator can manually
disable a port
Edge Port:
They are attached to a LAN that has no other bridges attached. These edge ports
transition directly to the forwarding state. RSTP still continues to monitor the port
for BPDUs in case a bridge is connected. RSTP can also be configured to
automatically detect edge ports. As soon as the bridge detects a BPDU coming to
an edge port, the port becomes a non-edge port.
Forward Delay:
The range is from 4 to 30 seconds. This is the maximum time (in seconds) the root
device will wait before changing states (i.e., listening to learning to forwarding).
Transmission Limit:
This is used to configure the minimum interval between the transmissions of
consecutive RSTP BPDUs. This function can only be enabled in RSTP mode. The
range is from 1 to 10 seconds.
Hello Time:
Set the time at which the root switch transmits a configuration message. The
range is from 1 to 10 seconds.
Bridge priority:
Bridge priority is used in selecting the root device, root port, and designated port.
The device with the highest priority becomes the STA root device. However, if all
devices have the same priority, the device with the lowest MAC address will
become the root device.
Port Priority:
Set the port priority in the switch. Low numeric value indicates a high priority. A
port with lower priority is more likely to be blocked by STP if a network loop is
detected. The valid value is from 0 to 240.
Path Cost:
The valid value is from 1 to 200000000. Higher cost paths are more likely to be
blocked by STP if a network loop is detected.
BPDU Guard:
This is a per port setting. If the port is enabled in BPDU guard and receive any
BPDU, the port will be set to disable to avoid the error environments. User must
enable the port by manual.
BPDU Filter:
It is a feature to filter sending or receiving BPDUs on a switch port. If the port
receives any BPDUs, the BPDUs will be dropped.
Notice:
If both of the BPDU filter and BPDU guard are enabled, the BPDU filter has the
high priority.
Root Guard:
The Root Guard feature forces an interface to become a designated port to prevent
surrounding switches from becoming a root switch. In other words, Root Guard
provides a way to enforce the root bridge placement in the network. The Root Guard
feature prevents a Designated Port from becoming a Root Port. If a port on which
the Root Guard feature receives a superior BPDU, it moves the port into a
rootinconsistent state (effectively equal to a listening state), thus maintaining the
current Root Bridge status. The port can be moved to forwarding state if no superior
BPDU received by this port for three hello times.
This command displays the
spanning tree information for only
active port(s)
enable
show spanning-tree blockedports
This command displays the
spanning tree information for only
blocked port(s)
enable
show spanning-tree port detail
PORT_ID
This command displays the
spanning tree information for the
interface port.
enable
show spanning-tree statistics
PORT_ID
This command displays the
spanning tree information for the
interface port.
enable
show spanning-tree summary
This command displays the
summary of port states and
configurations
enable
clear spanning-tree counters
This command clears spanning-tree
statistics for all ports.
enable
clear spanning-tree counters
PORT_ID
This command clears spanning-tree
statistics for a specific port.
configure
spanning-tree (disable | enable)
This command disables / enables
the spanning tree function for the
system.
configure
spanning-tree algorithm-timer
forward-time TIME max-age
TIME hello-time TIME
This command configures the
bridge times (forward-delay,maxage,hello-time).
configure
no spanning-tree algorithmtimer
This command configures the
default values for forward-time &
max-age & hello-time.
configure
spanning-tree forward-time <430>
This command configures the
bridge forward delay time (sec).
configure
no spanning-tree forward-time
This command configures the
default values for forward-time.
configure
spanning-tree hello-time <1-10>
This command configures the
bridge hello time(sec).
Default Settings:
STP/RSTP: disabled.
STP/RSTP mode: RSTP.
Forward Time: 15 seconds.
Hello Time: 2 seconds.
Maximum Age: 20 seconds.
System Priority: 32768.
Transmission Limit: 3 seconds.
Per port STP state: enabled.
Per port Priority: 128.
Per port Edge port: disabled.
Per port BPDU filter: disabled.
Per port BPDU guard: disabled.
Per port BPDU Root guard: disabled.
Per port Path Cost: depend on port link speed.
Example: Bandwidth -> STP Port Cost Value
10 Mbps -> 100
100 Mbps -> 19
1 Gbps -> 4
10 Gbps -> 2
16-bit based value range 1-65535,
32-bit based value range 1-
200000000.
if-range
no spanning-tree cost
This command configures the path
cost to default for the specific port.
if-range
spanning-tree port-priority <0240>
This command configures the port
priority for the specific port.
Default: 128.
if-range
no spanning-tree port-priority
This command configures the port
priority to default for the specific
port.
Parameter
Description
State
Select Enabled to use Spanning Tree Protocol (STP) or Rapid
Spanning Tree Protocol (RSTP).
Mode
Select to use either Spanning Tree Protocol (STP) or Rapid
Spanning Tree Protocol (RSTP).
Forward Time
This is the maximum time (in seconds) the Switch will wait
before changing states. This delay is required because every
switch must receive information about topology changes
before it starts to forward frames. In addition, each port needs
time to listen for conflicting information that would make it
return to a blocking state; otherwise, temporary data loops
might result. The allowed range is 4 to 30 seconds.
Max Age
This is the maximum time (in seconds) the Switch can wait
without receiving a BPDU before attempting to reconfigure.
All Switch ports (except for designated ports) should receive
BPDUs at regular intervals.
Any port that age out STP information (provided in the last
BPDU) becomes the designated port for the attached LAN. If it
is a root port, a new root port is selected from among the
Switch ports attached to the network. The allowed range is 6
to 40 seconds.
Hello Time
This is the time interval in seconds between BPDU (Bridge
Protocol Data Units) configuration message generations by the
root switch. The allowed range is 1 to 10 seconds.
Priority
Priority is used in determining the root switch, root port and
designated port. The switch with the highest priority (lowest
numeric value) becomes the STP root switch. If all switches
have the same priority, the switch with the lowest MAC
address will then become the root switch.
Enter a value from 0~61440.
The lower the numeric value you assign, the higher the priority
for this bridge.
Priority determines the root bridge, which in turn determines
the Root Hello Time, Root Maximum Age and Root Forwarding
Delay.
Pathcost
Path cost is the cost of transmitting a frame on to a LAN
through that port. It is recommended to assign this value
Root refers to the base of the spanning tree (the root bridge).
This field displays the root bridge’s priority. This Switch may
also be the root bridge.
MAX Age
This is the maximum time (in seconds) the Switch can wait
without receiving a configuration message before attempting
to reconfigure.
Hello Time
This is the time interval (in seconds) at which the root switch
transmits a configuration message. The root bridge
determines Hello Time, Max Age and Forwarding Delay.
Forward Delay
This is the time (in seconds) the root switch will wait before
changing states.
Current Bridge Status
MAC address
This is the MAC address of the current bridge.
Priority
Priority is used in determining the root switch, root port and
designated port. The switch with the highest priority (lowest
numeric value) becomes the STP root switch. If all switches
have the same priority, the switch with the lowest MAC
address will then become the root switch.
Priority determines the root bridge, which in turn determines
the Root Hello Time, Root Maximum Age and Root Forwarding
Delay.
MAX Age
This is the maximum time (in seconds) the Switch can wait
without receiving a BPDU before attempting to reconfigure.
All Switch ports (except for designated ports) should receive
BPDUs at regular intervals.
Any port that age out STP information (provided in the last
BPDU) becomes the designated port for the attached LAN. If it
is a root port, a new root port is selected from among the
Switch ports attached to the network.
Hello Time
This is the time interval in seconds between BPDU (Bridge
Protocol Data Units) configuration message generations by the
root switch.
Forward Delay
This is the maximum time (in seconds) the Switch will wait
before changing states. This delay is required because every
switch must receive information about topology changes
before it starts to forward frames. In addition, each port needs
time to listen for conflicting information that would make it
return to a blocking state; otherwise, temporary data loops
might result.
Path Cost
Path cost is the cost of transmitting a frame on to a LAN
through that port. It is recommended to assign this value
according to the speed of the bridge. The slower the media,
the higher the cost.
Root Cost
This is the number of the port on the Switch through which this
Switch must communicate with the root of the Spanning Tree.
IP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports
by filtering traffic based on the DHCP snooping binding database or manually
configured IP source bindings. This feature helps prevent IP spoofing attacks when a
host tries to spoof and use the IP address of another host. Any IP traffic coming into the
interface with a source IP address other than that assigned (via DHCP or static
configuration) will be filtered out on the untrusted Layer 2 ports.
The IP Source Guard feature is enabled in combination with the DHCP snooping feature
on untrusted Layer 2 interfaces. It builds and maintains an IP source binding table that
is learned by DHCP snooping or manually configured (static IP source bindings). An
entry in the IP source binding table contains the IP address and the associated MAC and
VLAN numbers. The IP Source Guard is supported on Layer 2 ports only, including
access and trunk ports.
The IP Source Guard features include below functions:
DHCP Snooping
DHCP snooping is a DHCP security feature that provides network security by filtering
untrusted DHCP messages and by building and maintaining a DHCP snooping binding
database, which is also referred to as a DHCP snooping binding table.
DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. You can
use DHCP snooping to differentiate between untrusted interfaces connected to the end
user and trusted interfaces connected to the DHCP server or another switch.
The DHCP snooping binding database contains the MAC address, the IP address, the
lease time, the binding type, the VLAN number, and the interface information that
corresponds to the local untrusted interfaces of a switch.
When a switch receives a packet on an untrusted interface and the interface belongs to
a VLAN in which DHCP snooping is enabled, the switch compares the source MAC
address and the DHCP client hardware address. If addresses match (the default), the
switch forwards the packet. If the addresses do not match, the switch drops the packet.
The switch drops a DHCP packet when one of these situations occurs:
A packet from a DHCP server, such as a DHCPOFFER, DHCPACK, DHCPNAK, or
DHCPLEASEQUERY packet, is received from the untrusted port.
A packet is received on an untrusted interface, and the source MAC address
and the DHCP client hardware address do not match any of the current
bindings.
Use DHCP snooping to filter unauthorized DHCP packets on the network and to build
the binding table dynamically. This can prevent clients from getting IP addresses from
unauthorized DHCP servers.
Trusted vs. Untrusted Ports
Every port is either a trusted port or an untrusted port for DHCP snooping. This setting
is independent of the trusted/untrusted setting for ARP inspection. You can also specify
the maximum number for DHCP packets that each port (trusted or untrusted) can
receive each second.
Trusted ports are connected to DHCP servers or other switches. The Switch discards
DHCP packets from trusted ports only if the rate at which DHCP packets arrive is too
high. The Switch learns dynamic bindings from trusted ports.
Note: The Switch will drop all DHCP requests if you enable DHCP snooping and there
are no trusted ports.
Untrusted ports are connected to subscribers. The Switch discards DHCP packets from
untrusted ports in the following situations:
The packet is a DHCP server packet (for example, OFFER, ACK, or NACK).
The source MAC address and source IP address in the packet do not match any of
the current bindings.
The packet is a RELEASE or DECLINE packet, and the source MAC address and
source port do not match any of the current bindings.
The rate at which DHCP packets arrive is too high.
DHCP Snooping Database
The Switch stores the binding table in volatile memory. If the Switch restarts, it loads
static bindings from permanent memory but loses the dynamic bindings, in which case
the devices in the network have to send DHCP requests again.
Configuring DHCP Snooping
Follow these steps to configure DHCP snooping on the Switch.
1. Enable DHCP snooping on the Switch.
2. Enable DHCP snooping on each VLAN.
3. Configure trusted and untrusted ports.
4. Configure static bindings.
Note:
The Switch will drop all DHCP requests if you enable DHCP snooping and there are
no trusted ports.
If the port link down, the entries learned by this port in the DHCP snooping
binding table will be deleted.
You must enable the global DHCP snooping and DHCP Snooping for vlan first.
The main purposes of the DHCP Snooping are:
1. Create and maintain binding table for ARP Inspection function.
2. Filter the DHCP server’s packets that the DHCP server connects to an untrusted
port.
The DHCP server connected to an un-trusted port will be filtered.
Default Settings
The DHCP snooping on the Switch is disabled.
The DHCP snooping is enabled in VLAN(s): None.
Maximum Maximum
Port Trusted Host Count Port Trusted Host Count
----- ---------- --------------- ----- ---------- --------------1 no 32 2 no 32
3 no 32 4 no 32
5 no 32 6 no 32
7 no 32 8 no 32
9 no 32 10 no 32
11 no 32 12 no 32
13 no 32 14 no 32
15 no 32 16 no 32
Notices
There are a global state and per VLAN states.
When the global state is disabled, the DHCP Snooping on the Switch is disabled
even per VLAN states are enabled.
When the global state is enabled, user must enable per VLAN states to enable the
DHCP Snooping on the specific VLAN.
This command displays the current
DHCP snooping configurations.
configure
dhcp-snooping (disable|enable)
This command disables/enables the
DHCP snooping on the switch.
configure
dhcp-snooping vlan VLANID
This command enables the DHCP
snooping function on a VLAN or
range of VLANs.
configure
no dhcp-snooping vlan VLANID
This command disables the DHCP
snooping function on a VLAN or
range of VLANs.
configure
dhcp-snooping server IPADDR
This command configures a valid
DHCP server.
interface
dhcp-snooping host
This command configures the
maximum host count for the
specific port.
interface
no dhcp-snooping host
This command configures the
maximum host count to default for
the specific port.
interface
dhcp-snooping trust
This command configures the trust
port for the specific port.
interface
no dhcp-snooping trust
This command configures the untrust port for the specific port.
configure
interface range
gigabitethernet1/0/ PORTLISTS
This command enters the interface
configure node.
VLAN 1: port 1-10.
DHCP Client-1: connect to port 3.
DHCP Server: connect to port 1.
Procedures:
1. Default environments:
A. DHCP Client-1: ipconfig /release
B. DHCP Client-1: ipconfig /renew
DHCP Client-1 can get an IP address.
2. Enable the global DHCP Snooping.
A. [DEVICE_NAME](config)#dhcp-snooping
B. DHCP Client-1: ipconfig /release
C. DHCP Client-1: ipconfig /renew
DHCP Client-1 can get an IP address.
3. Enable the global DHCP Snooping and VLAN 1 DHCP Snooping.
A. [DEVICE_NAME](config)#dhcp-snooping
B. [DEVICE_NAME](config)#dhcp-snooping vlan 1
C. DHCP Client-1: ipconfig /release
D. DHCP Client-1: ipconfig /renew
DHCP Client-1 cannot get an IP address.
CLI Configuration
5. If you configure a static host entry in the DHCP snooping binding table, and then
you want to change the host to DHCP client, the host will not get a new IP from
DHCP server, and then you must delete the static host entry first.
; Because the DHCP server connects to a un-trust port.
4. Enable the global DHCP Snooping and VLAN 1 DHCP Snooping.
A. [DEVICE_NAME](config)#dhcp-snooping
B. [DEVICE_NAME](config)#dhcp-snooping vlan 1
C. [DEVICE_NAME](config)#interface gi1/0/1
D. [DEVICE_NAME](config-if)#dhcp-snooping trust
E. DHCP Client-1: ipconfig /release
F. DHCP Client-1: ipconfig /renew
This command configures the
maximum host count for the
specific ports.
if-range
no dhcp-snooping host
This command configures the
maximum host count to default for
the specific ports.
if-range
dhcp-snooping trust
This command configures the trust
port for the specific ports.
if-range
no dhcp-snooping trust
This command configures the untrust port for the specific ports.
Parameter
Description
State
Select Enable to use DHCP snooping on the Switch. You still
have to enable DHCP snooping on specific VLANs and specify
trusted ports.
Note: The Switch will drop all DHCP requests if you enable
DHCP snooping and there are no trusted ports.
Select Disable to not use DHCP snooping.
VLAN State
Select Add and enter the VLAN IDs you want the Switch to
enable DHCP snooping on. You can designate multiple VLANs
individually by using a comma (,) and by range with a hyphen (-
).
Select Delete and enter the VLAN IDs you no longer want the
Switch to use DHCP snooping on.
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
DHCP Snooping Status
DHCP Snooping
State
This field displays the current status of the DHCP snooping
feature, Enabled or Disabled.
Enabled on VLAN
This field displays the VLAN IDs that have DHCP snooping
enabled on them. This will display None if no VLANs have been
set.
This field configures the valid DHCP server’s IP address.
Apply
Click Apply to configure the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Server Screening List
No.
This field displays the index number of the DHCP server entry.
Click the number to modify the entry.
IP Address
This field displays the IP address of the DHCP server.
Action
Click Delete to remove a configured DHCP server.
DHCP Server Screening
The Switch supports DHCP Server Screening, a feature that denies access to rogue DHCP
servers. That is, when one or more DHCP servers are present on the network and both
provide DHCP services to different distinct groups of clients, the valid DHCP server’s
packets will be passed to the client.
If you want to enable this feature, you must enable the DHCP Snooping function first.
The switch allows users to configure up to three valid DHCP servers.
If no DHCP servers are configured, it means all DHCP server are valid.
CLI Configuration
Port Settings
Security > IP Source Guard > DHCP Snooping > Port Settings
Web Configuration
Security > IP Source Guard > DHCP Snooping > Server Screening
Select a port number to modify its maximum host count.
Trust
Configures the specific port if it is a trust port.
Maximum Host
Count
Enter the maximum number of hosts (1-32) that are permitted
to simultaneously connect to a port.
Apply
Click Apply to take effect the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Node
Command
Description
enable
show dhcp-snooping binding
This command displays the current
DHCP snooping binding table.
configure
dhcp-snooping binding mac
MAC_ADDR ip IP_ADDR vlan
VLANID port PORT_NO
This command configures a static
host into the DHCP snooping
binding table.
configure
no dhcp-snooping binding mac
MACADDR
This command removes a static
host from the DHCP snooping
binding table.
Parameter
Description
MAC Address
Enter the source MAC address in the binding.
IP Address
Enter the IP address assigned to the MAC address in the
binding.
VLAN ID
Enter the source VLAN ID in the binding.
Port
Specify the port in the binding.
Example:
[DEVICE_NAME]#configure terminal
[DEVICE_NAME](config)#dhcp-snooping binding mac 00:11:22:33:44:55 ip
1.1.1.1 vlan 1 port 2
[DEVICE_NAME](config)#no dhcp-snooping binding mac 00:11:22:33:44:55
[DEVICE_NAME]#show dhcp-snooping binding
Web Configuration
Static Entry Settings
Binding Table
The DHCP Snooping binding table records the host information learned by DHCP
snooping function (dynamic) or set by user (static). The ARP inspection will use this
table to forward or drop the ARP packets. If the ARP packets sent by invalid host, they
will be dropped. If the Lease time is expired, the entry will be removed from the table.
Static bindings are uniquely identified by the MAC address and VLAN ID. Each MAC
address and VLAN ID can only be in one static binding. If you try to create a static
binding with the same MAC address and VLAN ID as an existing static binding, the new
static binding replaces the original one.
Bindings are used by DHCP snooping and ARP inspection to distinguish between
authorized and unauthorized packets in the network. The Switch learns the dynamic
bindings by snooping DHCP packets and from information provided manually in the
Static Entry Settings screen.
This command displays the current
ARP Inspection configurations.
configure
arp-inspection (disable | enable)
This command disables/enables the
ARP Inspection function on the
switch.
configure
arp-inspection vlan VLANID
This command enables the ARP
Inspection function on a VLAN or
range of VLANs.
ARP Inspection
Dynamic ARP inspection is a security feature which validates ARP packet in a network
by performing IP to MAC address binding inspection. Those will be stored in a trusted
database (the DHCP snooping database) before forwarding. Dynamic ARP intercepts,
logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability
protects the network from certain man-in-the-middle attacks.
Dynamic ARP inspection ensures that only valid ARP requests and responses are
relayed. The switch performs these activities:
Intercepts all ARP requests and responses on untrusted ports.
Verifies that each of these intercepted packets has a valid IP-to-MAC address
binding before it updates the local ARP cache or before it forwards the packet to
the appropriate destination.
Trusted and untrusted port
This setting is independent of the trusted and untrusted setting of the DHCP
snooping.
The Switch does not discard ARP packets on trusted ports for any reasons.
The Switch discards ARP packets on un-trusted ports if the sender’s information
in the ARP packets does not match any of the current bindings.
Normally, the trusted ports are the uplink port and the untrusted ports are
connected to subscribers.
Configuration:
Users can enable/disable the ARP Inspection on the Switch. Users also can
enable/disable the ARP Inspection on a specific VLAN. If the ARP Inspection on the
Switch is disabled, the ARP Inspection is disabled on all VLANs even some of the VLAN
ARP Inspection are enabled.
Default Settings
The ARP Inspection on the Switch is disabled.
The age time for the MAC filter is 5 minutes.
ARP Inspection is enabled in VLAN(s): None.
Port Trusted Port Trusted
----- ---------- ------ --------- 1 no 2 no
3 no 4 no
5 no 6 no
7 no 8 no
9 no 10 no
11 no 12 no
13 no 14 no
15 no 16 no
Notices
There are a global state and per VLAN states.
When the global state is disabled, the ARP Inspection on the Switch is disabled
even per VLAN states are enabled.
When the global state is enabled, user must enable per VLAN states to enable
This command disables the ARP
Inspection function on a VLAN or
range of VLANs.
interface
arp-inspection trust
This command configures the trust
port for the specific port.
interface
no arp-inspection trust
This command configures the untrust port for the specific port.
Parameter
Description
State
Use this to Enable or Disable ARP inspection on the Switch.
VLAN State
Enter the VLAN IDs you want the Switch to enable ARP
Inspection for. You can designate multiple VLANs individually by
using a comma (,) and by range with a hyphen (-).
Trusted Ports
Select the ports which are trusted and deselect the ports which
are untrusted.
The Switch does not discard ARP packets on trusted ports for
any reason.
The Switch discards ARP packets on untrusted ports in the
following situations:
• The sender’s information in the ARP packet does not match
any of the current bindings.
• The rate at which ARP packets arrive is too high. You can
specify the maximum rate at which ARP packets can arrive on
untrusted ports.
Select All
Click this to set all ports to trusted.
Deselect All
Click this to set all ports to untrusted.
Apply
Click Apply to add/modify the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
ARP Inspection Status
ARP Inspection
State
This field displays the current status of the ARP Inspection
feature, Enabled or Disabled.
Enabled on VLAN
This field displays the VLAN IDs that have ARP Inspection
enabled on them. This will display None if no VLANs have been
set.
Trusted Ports
This field displays the ports which are trusted. This will display
This command displays the current
ARP Inspection filtered MAC.
configure
arp-inspection macfilter age
VALUE
This command configures the age
time for the ARP inspection MAC
filter entry.
configure
clear arp-inspection mac-filter
This command clears all of entries
in the filter table.
configure
no arp-inspection mac-filter mac
MACADDR vlan VLANID
This command removes an entry
from the ARP inspection MAC filter
table.
Parameter
Description
Filter Age Time
This setting has no effect on existing MAC address filters.
Enter how long (1-10080 minutes) the MAC address filter
remains in the Switch after the Switch identifies an
unauthorized ARP packet. The Switch automatically deletes the
MAC address filter afterwards.
Apply
Click Apply to add/modify the settings.
Refresh
Click Refresh to begin configuring this screen afresh.
Filter Table
No.
This field displays a sequential number for each MAC address
filter.
MAC Address
This field displays the source MAC address in the MAC address
filter.
Filter Table
Dynamic ARP inspections validates the packet by performing IP to MAC address binding
inspection stored in a trusted database (the DHCP snooping database) before
forwarding the packet. When the Switch identifies an unauthorized ARP packet, it
automatically creates a MAC address filter to block traffic from the source MAC address
and source VLAN ID of the unauthorized ARP packet. The switch also periodically
deletes entries if the age-time for the entry is expired.
If the ARP Inspection is enabled and the system detects invalid hosts, the system
will create a filtered entry in the MAC address table.
When Port link down and ARP Inspection was disabled, Switch will remove the
MAC-filter entries learned by this port.
When Port link down and ARP Inspection was enabled, Switch will remove the
MAC-filter entries learned by this port.
The maximum entry of the MAC address filter table is 256.
When MAC address filter table of ARP Inspection is full, the Switch receives
unauthorized ARP packet, and it automatically creates a SYSLOG and drop this ARP
packet. The SYSLOG event happens on the first time.
Default Settings:
The mac-filter age time: 5 minutes. (0 – No age)
The maximum mac-filter entries: 256.
This field displays the source VLAN ID in the MAC address filter.
Port
This field displays the source port of the discarded ARP packet.
Expiry (min)
This field displays how long (in minutes) the MAC address filter
remains in the Switch.
Action
Click Delete to remove the record manually.
Total
This field displays the current number of MAC address filters
that were created because the Switch identified unauthorized
ARP packets.
4. Filter a range of destination MAC address.
Command: destination mac MACADDR MACADDRThe second MACADDR is a mask, for example: ffff.ffff.0000
L3 ACL Support:
1. Filter a specific source IP address.
Command: source ip host IPADDR
2. Filter a specific destination IP address.
Command: destination ip host IPADDR
Access Control List (ACL)
L2 Access control list (ACL) is a list of permissions attached to an object. The list
specifies who or what is allowed to access the object and what operations are allowed
to be performed on the object.
L2 ACL function allows user to configure a few rules to reject packets from the specific
ingress ports or all ports. These rules will check the packets’ source MAC address and
destination MAC address. If packets match these rules, the system will do the actions
“deny”. “deny” means rejecting these packets.
The Action Resolution engine collects the information (action and metering results)
from the hit entries: if more than one rule matches, the actions and meter/counters are
taken from the policy associated with the matched rule with highest priority.
L2 ACL Support:
1. Filter a specific source MAC address.
Command: source mac host MACADDR
2. Filter a specific destination MAC address.
Command: destination mac host MACADDR
3. Filter a range of source MAC address.
Command: source mac MACADDR MACADDR The second MACADDR is a mask, for example: ffff.ffff.0000
3. Filter a range of source IP address.
Command: source ip IPADDR IPADDR The second IPADDR is a mask, for example: 255.255.0.0
4. Filter a range of destination IP address.
Command: destination ip IPADDR IPADDR
L4 ACL Support:
1. Filter a UDP/TCP source port.
2. Filter a UDP/TCP destination port.
Default Settings:
Maximum profile: 64.
Maximum profile name length: 16.
Notices
The ACL name should be a combination of alphanumeric characters.