The information contained in this document is subject to change without prior notice. Copyright (C). All Rights Reserved.
TRADEMARKS
Ethernet is a registered trademark of Xerox Corp.
WARNING:
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment
is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and if
not installed and used in accordance with the instruction manual may cause harmful interference in which case the user
will be required to correct the interference at his own expense.
NOTICE:
(1) The changes or modifications not expressively approved by the party responsible for compliance could void the
user's authority to operate the equipment.
(2) Shielded interface cables and AC power cord, if any, must be used in order to comply with the emission limits.
CISPR A COMPLIANCE:
This device complies with EMC directive of the European Community and meets or exceeds the following technical
standard.
EN 55022 - Limits and Methods of Measurement of Radio Interference Characteristics of Information Technology
Equipm ent. This device complies with CISPR Class A.
WARNING: This is a Class A product. In a domestic environment this product may cause radio interference in which case
the user may be required to take adequate measures.
CE NOTICE
Marking by the symbol indicates compliance of this equipment to the EMC directive of the European Community. Such
marking is indicative that this equipment meets or exceeds the following technical standards:
EN 55022: Limits and Methods of Measurement of Radio Interference characteristics of Information Technology
Equipment.
EN 50082/1:Generic Immunity Standard -Part 1: Domestic Commercial and Light Industry.
EN 60555-2: Disturbances in supply systems caused by household appliances and similar electrical equipment - Part 2:
Harmonics .
Driven by recent advances in desktop computing technology, today_s network applications have increased
in speed, power and the ability to process information. To meet the demands of these more
bandwidth-intensive applications, this swit ch device provides significant increase in performance for your
Ethernet and Fast Ethernet network. The switch comes with high number of 10/100 Fast Ethernet switched
ports, each capable of transferring information simultaneously at full wire speed to control and allocate the
network bandwidth. It also provides two Gigabit Ethernet slots for migration to Gigabit network smoothly.
The key features of the switch units are:
_ High Port -count and High Bandwidth
_ 100FX connectivity
_ Copper Gigabit connectivity
_ Fiber Gigabit connectivity
_ Network Management
1.2 Features
_ 19-inch rack mountable 24-Port 10/100 managed Fast Ethernet switch with two Giga expansion port
slots
_ Provides two alternative 100Base - FX port slots for fiber connections
_ Non-blocking and store-and-forward switch engine performs forwarding and filtering at full wire speed.
_ Supports diversified optional Giga port modules for selection including 10/100/1000 copper type and
fiber type
_ Provides port control function for auto-negotiation, speed, duplex, and flow control configuration
_ Provides per-port Egress/Ingress data rate control function
_ Provides 802.1X port-based network access control function
_ Provides broadcast storm filtering function
_ Provides 802.3ad port trunking function with up to 7 trunks
_ Supports input-port-based, output-port-based, and input-output-pair-based Sniffer function
_ Provides static MAC address and filtering MAC address configuration
_ Provides ingress port security function
_ Provides bridging delay bound control function
_ Supports Ethernet frame length up to 1522 bytes
_ Supports 802.3x flow control for full duplex mode and backpressure flow control for half duplex mode
_ Supports auto-aging with selectable inter -age time
_ Supports port-based VLAN and 802.1Q tag -based VLAN
_ Supports 802.1v protocol -based VLAN classification
_ Supports port-based priority and 802.1p CoS with 2-level priorities
_ Supports Spanning Tree Protocol
_ Supports IP Multicasting and IGMP snooping
_ Supports stacking management function
_ Supports console/Telnet/SNMP/Web/Trap managements
1.3 Hardware Specifications
10/100 Switched Ports Port 1 ~ 24, Total : 24 ports
802.3 10Base-T, 802.3u 100Base-TX compliant
Shielded RJ-45 with auto MDI-X function
802.3z and 802.3ab compliant
Supports optional 10/100/1000 Copper module
Supports optional Giga Fiber modules
Port Control Function Port enable/disable
Auto-negotiation function
Speed, Duplex mode
Full duplex flow control function
Half duplex flow control function
Ingress data rate
Egress data rate
Port security (MAC learning function)
Flow Control Methods 802.3x pause frame based for full duplex
Backpressure for half duplex mode
Forwarding speed Max. 148,810 pps on 100M switched ports
Max. 1,488,100 pps on Gigabit switched ports
Trunking Function IEEE 802.3ad compliant
Per trunk mode : Static or LACP
Up to 7 trunk groups (trunk ports)
Each is composed of up to 4 ports
Port Sniffering One sniffer port (any one among 26 ports)
Up to 25 monitored ports
3 mode options - Tx / Rx / Tx+Rx traffic
MAC address aging time Control options - 300 ~ 765 seconds
MAC Address Table Size : 6K entries for
Auto-learned unicast addresses and
Static unicast/multicast addresses
Broadcast Storm Filtering Threshold options - 5%,10%, 15%,20%, 25%
Filtering MAC Address Destination address-based filtering
Network Access Control 802.1X protocol support for all ports
Function Radius client configuration
Per port mode - Auto, Fu, Fa, No
QoS Function 2-level (High/Low) priority for Tx queues
Selectable Tx High/Low service ratio
Priority Decision Method First - Port -based priority
Second - 802.1p priority (Tag priority value)
VLAN Function Mode options if enabled -
Port - based VLAN
802.1Q Tag-based VLAN
Port-based VLAN Max. 26 VLAN groups
VLAN-tagging is ignored
No tag modification for tagged packets
Giga Port LED Display Link / Activity status
Duplex / Collision status
Console Port RS-232, DTE, DB9
Baud : 9600, N, 8, 1, 0, No flow control
Dimension 443mm (W) x 245mm (D) x 43mm (H)
Power Input Rati ng 100 ~ 240VAC, 50/60Hz, 50W
Input voltage range 90 ~ 264VAC
Input frequency 47 ~ 440Hz
Power Consumption 17W min. 26W max.
Environmental Operating temperature : 0 ~ 50oC
Storage temperature : -40 ~ 85oC
Certifications FCC Part 15 Class A
CE / CISPR Class A
1.4 Software Specifications
Management interface
In-band SNMP over TCP/IP network
In-band Web browser over TCP/IP network
In-band Telnet over TCP/IP network
Out-of-band via Console port
SNMP Traps over TCP/IP network
RFC & Protocols
IPv4 IP version4 RFC791
TCP Transmission Control Protocol RFC793
UDP User Datagram Protocol RFC768
ARP Ehernet Address Resolution Protocol RFC826
ICMP Internet Control Message Protocol RFC792
SNMP SNMP agent v1 RFC1157
MIB -2 Standard MIB RFC1213
Traps Generic SNMP traps RFC1157
TFTP Trivial File Transfer Protocol RFC1350
Telnet Telnet protocol RFC854
HTTP HTTP server for web management RFC1945
GVRP GARP VLAN Registration Protocol 802.1Q
GARP Generic attribute registration protocol 802.1P
DHCP Dynamic Host Configuration Protocol RFC2131
IGMP Internet Group Management Protocol RFC2236
RMON MIB groups : Statistics, History, Alarm, EventRFC1757
Bridge Bridge MIB RFC1493
1.4.1 Management Objects
List of management objects supported by console and Telnet interfaces :
Port state - enable/disable Yes Yes Yes Ye s
Port status - link, speed Yes Yes Yes Yes
Port static counters Yes Yes Yes Yes
Device Mac address information Yes Yes Yes Yes
System firmware version information Yes Yes Yes System hardware ver sion information Yes Yes Yes System default configuration version Yes Yes Yes G1, G2 module information Yes Yes Yes Yes
F23, F24 module information Yes Yes Yes Yes
Cooling Fan1 Fan2 status Yes Yes Yes Yes
LACP status Yes Yes Yes IGMP snooping information - - Yes -
Stacking configuration - - Yes Stacking switches monitoring - - Yes RFC 1213 MIB- 2 objects - - - Yes
RFC 1493 Bridge MIB - - - Yes
RFC 1271 RMON MIB (group 1,2,3,9) - - - Yes
1.4.2
Trap Events
The table below lists the events the device will generate SNMP traps.
Generic: RFC1157 generic, Specific: EnterpriseSpecific
Type Trap Event
Generic Cold Start Device bootup
Generic Authentication SNMP authentication failure
Generic Port link change Port link down
Generic Port link change Port link recovery
Specific Fan1 failure Cooling Fan1 failure warning
Specific Fan1 failure Cooling Fan1 failure recovery
Specific Fan2 failure Cooling Fan2 failure warning
Specific Fan2 failure Cooling Fan2 failure recovery
1.5 Function Descriptions
1.5.1 LACP Trunking Function
The switch provides a trunking function, which is compliant with 802.3ad standard. 802.3ad is a
specification from IEEE that allows us to bundle several physical port links together to form one logical
port , called a trunk between two devices. It supports Link Aggregation Control Protocol (LACP).
IEEE 802.3ad trunking also allows redundant connections between devices to be combined for more
aggregate bandwidth between devices supporting LACP.
The LACP provides a standardized means for exchanging information between two link partners on a link
to allow their Link Aggregation Control instances to reach agreement on the identity of the Link
Aggregation Group to which the link belongs, move the link to that Link Aggregation Group, and enable its
transmission and reception functions in an orderly manner.
The switch can support up to seven trunk groups , or called trunk ports or trunks. Each group is a logic
port and can have up to 4 physical port members. A physical port can only belong to one trunk group. Each
trunk group can be set LACP disabled or enabled. The operations are:
LACP disabled
If one trunk group is LACP disabled, it becomes a local static trunk and all member ports are forced to be
work ports. The link aggregation is formed and there is no LACP negotiation taking place. Maximal four
member ports are allowed.
LACP enabled
If one trunk group is LACP enabled, it is called LACP static trunk. Link aggregation is formed through
LACP negotiation between link partners.
Up to four ports can be selected as member ports for each trunk group. However, the max. two ports, called
work ports can be aggregated at the same time. Those member ports which are not work ports are standby
to become work port if any current work port fails to operate. This transition takes about 30 seconds. Each
member port can be set LACP Passive or LACP active as described below:
LACP Passive : The port does not initiate the LACP negotiation, but it does understand the LACP packet.
It will reply to the received LACP packet to eventually form the link aggregation if its link partner is
requesting to do so (in active state).
LACP Active : The port is willing to form an aggregate link, and initiate the negotiation. The link
aggregate will be formed if its link partner is running in LACP active or passive mode.
There are only three valid combinations to run the LACP link aggregate as follows:
_ disabled to disabled state (forced link aggregate without LACP)
_ active to active state
_ active to passive state
Rules of trunking
1. Up to seven trunk groups (trunk ports) can be created.
2. Each trunk group can be composed of up to 4 member ports.
3. The member port can be one of Port 1 ~ Port 24 and G1 - G2 port.
4. One switched port only can belong to one trunk group.
5. If VLAN group exist, all members of one static trunk group must be in same VLAN group.
6. LACP operation requires member ports in full-duplex mode.
7. In a static trunk group (LACP disabled), four work ports are aggregated at the same time.
8. In an LACP trunk group, maximal two work ports can be aggregated at the same time.
1.5.2 IP Multicast Function
Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by
simultaneously delivering a single stream of information to thousands of corporate recipients and homes.
Applications that take advantage of multicast include video conference, corporate communications,
distance learning, and distribution of software, stock quotes, and news.
IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source
or the receivers while using the least network bandwidth of any competing technology. Multicast packets
are replicated in the network by the devices supporting multicast protocols resulting in the most efficient
delivery of data to multiple receivers possible.
Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in
receiving a particular data stream. This group does not have any physical or geographical boundaries - the
hosts can be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a
particular group must join the group using IGMP. Hosts must be a member of the group to receive the data
stream.
IP Multicast address
IP Multicast addresses specify an arbitrary group of IP hosts that have joined the group and want to receive
traffic sent to this group. IP multicast addresses range from 224.0.0.0 through 239.255.255.255. This
address range is only for the group address or destination address of IP multicast traffic. The source address
for multicast datagrams is always the unicast source address.
IGMP
Internet Group Management Protocol (IGMP) is used to dynamically register individual hosts in a multicast
group on a particular LAN. Hosts identify group memberships by sending IGMP messages to their local
multicast router. Under IGMP, routers listen to IGMP messages and periodically send out queries to
discover which groups are active or inactive on a particular subnet.
RFC 2236 defines the specification for IGMP Version 2. There are four types of IGMP messages:
_ Membership query
_ IGMP Version 1 membership report
_ IGMP Version 2 membership report
_ Leave group
Hosts send out IGMP membership reports corresponding to a particular multicast group to indicate that
they are interested in joining that group. The router periodically sends out an IGMP membership query to
verify that at least one host on the subnet is still interested in receiving traffic directed to that group. When
there is no reply to three consecutive IGMP membership queries, the router times out the group and stops
forwarding traffic directed toward that group.
With leave group message, the hosts can actively communicate to the local multicast router their intention
to leave the group. The router then sends out a group-specific query and determines whether there are any
remaining hosts interested in receiving the traffic. If there are no replies, the router times out the group and
stops forwarding the traffic.
IGMP Snooping
IGMP snooping requires the LAN switch to examine, or snoop, some Layer 3 information in the IGMP
packets sent between the hosts and the router. When the switch hears the IGMP host report from a host for
a particular multicast group, the switch adds the host's port number to the associated multic ast table entry.
When the switch hears the IGMP leave group message from a host, it removes the host's port from the table
entry.
Multicast Forwarding
In multicast routing, the source is sending traffic to an arbitrary group of hosts represented by a multicast
group address. The multicast router must determine which direction is upstream (toward the source) and
which direction (or directions) is downstream. If there are multiple downstream paths, the router replicates
the packet and forwards the traffic down the appropriate downstream paths - which is not necessarily all
paths.
The switch can support IP multicast if IGMP protocol is enabled. IGMP snooping function and status is
also provided. Each IP multicast address is associated one Vlan ID and its member ports. The information
is available from management interfaces.
1.5.3 MAC Address Filtering Function
MAC address filtering allows the switch to drop unwanted traffic. Incoming traffic is filtered based on the
destination MAC addresses (DAs). The unwanted destination addresses are cal led filter MAC addresses.
The switch provides management function that allows LAN administrator to maintain the filter MAC
address table.
1.5.4 Static MAC Address
The switch provides Static MAC Address setup function. The static MAC addresses are the MAC
addresses which are setup by LAN administrators and are not learned by the switch automatically.
The static addresses are stored and referred in switch MAC address table permanently regardless of
whether the MAC addresses are physically disconnected to the switch.
Applying this function with port security function allows LAN administrator to build a protection
mechanism that let switch only serves granted devices.
Static MAC address related settings:
Mac Address : Static Ethernet MAC address (12 digits)
Port num : The port number where the MAC address is located
Vlan ID : The associated Vlan ID to the address, if 802.1Q VLAN is enabled.
1.5.5 Port Security
A port in security mode does not learn any source MAC address (SA). Only the incoming packets with SA
existing in the switch static MAC address table can be forwarded normally. Otherwise, the packets are
dropped. This features provides a protection mechanism to restrict the devices link to the switch port.
Only devices with valid MAC addresses can be served by the switch.
1.5.6 VLAN Function
Virtual LANs (VLANs) can be viewed as a group of devices on different physical LAN segments which
can communicate with each other as if they were all on the same physical LAN segment. It can create a
network that is independent of physical location and group users into logical workgroups. The benefits are:
_ Confine broadcast traffic and Increased performance
_ Improved manageability
_ Network tuning and simplification of software configurations
_ Physical topology independence
Increased security options
_
The switch supports port-based, 802.1Q (Tag-based) and protocol-based VLAN. In the default
configuration, VLAN function is disabled.
1.5.6.1 Port-based VLAN
Up to 26 VLAN groups can be created. Each group has its own port members. The member ports are
selected among the physical ports on the switch. Packets can go among only members in the same VLAN
group.
Required configurations:
_ Maintain (Create/delete/modify) VLAN groups
_ Manage the port members of each VLAN group
Note:
1. The ports which are not belonging to any group are treated as belonging to another single VLAN.
2. A trunk group is treated as a physical port.
3. VLAN -tagging is ignored in port-based VLAN mode.
1.5.6.2 IEEE 802.1Q VLAN (Tag-based VLAN)
Tag-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN
across devices from different venders. IEEE 802.1Q VLAN uses a technique to insert a tag into the
Ethernet frames. Tag contains a VLAN Identifier (VID) that indicates the VLAN numbers.
The switch can classify each received packet as belonging to one and only one VLAN. If the received
packet is VLAN-tagged, the packet is classified as belonging to the VLAN specified in the VLAN tag
header. If the received packet is untagged, it is classified as belonging to the default VLAN configured for
the ingress port.
Required configurations:
_ Enable or disable GVRP support
_ VLAN information including VID (2- 4094) and name
_ Tagged member ports of each VLAN
_ Outgoing tag mode for each member port
Tag - outgoing frames with VLAN-tagged
Untag - outgoing frames without VLAN-tagged
_ PVID (Port VID, 1- 255 for untagged incoming frames) for each port
_ Ingress Rule 1 setting for each port : forward only packets with VID
matching configured PVID
Ingress Rule 2 setting for each port : drop untagged frames
_
PVID : this feature is useful to accommodate the devices which do not support tagging to participate in the
VLAN.
GVRP - GARP [Generic Attribute Registration Protocol] VLAN Registration Protocol : GVRP
allows automatic VLAN configuration between the switch and nodes. If the switch is connected to a device
with GVRP enabled, you can send a GVRP request using the VID of a VLAN defined on the switch, the
switch will automatically add that device to the existing VLAN. (GVRP - 802.1Q compliant, GARP -
802.1P compliant)
1.5.6.3 Protocol-based VLAN
In order for an end station to send packets to different VLANs, it itself has to be either capable of tagging
packets it sends with VLAN tags or attached to a VLAN -aware bridge that is capable of classifying and
tagging the packet with different VLAN ID based on not only default PVID but also other information
about the packet, such as the protocol. The switch can support 802.1v compliant protocol-based VLAN
classification by means of both built - in knowledge of layer 2 packet formats used by selected popular
protocols, such as Novell IPX and AppleTalk`s EtherTalk, and others. Required configuration:
_ Protocol setting for each VLAN group defined in 802.1Q VLAN mode
_ If more than two V LAN groups are configured with same protocol
value, make sure the member ports of those groups are not overlaping.
Any incoming untagged packet is checked and classified according the Protocol vs. VLAN mapping
settings. If an associated VLAN group is found, the packet is calssified and is inserted with VID tag of the
group VLAN ID instead of input port PVID.
1.5.7 Spanning Tree Protocol
Spanning-Tree Protocol (STP) is a link management protocol that provides path redundancy while
preventing undesirable loops in the network. For an Ethernet network to function properly, only one active
path must exist between two stations. Multiple active paths between stations cause loops in the network. If
a loop exists in the network, you might receive duplicate messages. When loops occur, some switches see
stations on both sides of the switch. This condition confuses the forwarding algorithm and allows duplicate
frames to be forwarded.
To provide path redundancy, Spanning -Tree Protocol defines a tree that
spans all switches in an extended network. Spanning-Tree Protocol forces
certain redundant data paths into a standby (blocked) state. If one network segment in the Spanning-Tree
Protocol becomes unreachable, or if
Spanning-Tree Protocol costs change, the spanning-tree algorithm
re-configures the spanning- tree topology and reestablishes the link by
activating the standby path.
Spanning-Tree Protocol operation is transparent to end stations, which
are unaware whether they are connected to a single LAN segment or a
switched LAN of multiple segments.
STP related parameters
Priority : A value to identify the root bridge. The bridge with the lowest value has the highest priority and
is selected as the root.
MAC Address : The MAC address of the switch as a unique identifier
to the network.
Max Age : The number of seconds a bridge waits without receiving Spanning Tree protocol configuration
messages before attempting a reconfiguration. Maximum Age Timer measures the age of the received
protocol information recorded for a port and ensures that this information is discarded when its age limit
exceeds the value of the maximum age parameter recorded by the switch. The time-out value for this timer
is the maximum age parameter of the switches.
Hello Time : The number of seconds between the transmission of Spanning Tree protocol configuration
messages. It determines how often the switch broadcasts its hello message to other switches.
Forward Delay Time : The number of seconds a port waits before changing from its Spanning Tree
Protocol learning and listening states to the forwarding state. Forward Delay Timer Monitors the time spent
by a port in the learning and listening states. The time-out value is the forward delay parameter of
Spanning tree port states
Listening : Switches send messages to one another to establish the network topology and the optimal paths
to the different segments of the network. Other data is not transmitted.
Blocking : The switch enters the Blocking State if a path with higher priority is found to exist during the
Listening State. Normal data is not transmitted.
Learning : The switch enters the Learning State if no path with a higher priority is found during the
Listening State. Learned entries are entered in the Unicast Destination Forwarding Table. Normal data
is not transmitted.
Forwarding : The switch enters the Forwarding State after having been in the Learning State for a
predefined time period. Normal data is transmitted.
Per port control settings
PathCost : Specifies the path cost for each port. The Spanning-Tree Protocol uses port path costs to
determine which port to select as a forwarding port. You should assign lower numbers to ports attached to
faster media (such as full duplex), and higher numbers to ports attached to slower media. The possible
range is 1 to 65535. The recommended path cost is 1000 divided by LAN speed in megabits per second.
Priority : Specify STP port priority for each port. The port (physical or logical) with the lowest priority
value has the highest priority and forwards the spanning-tree frames. The possible priority range is 0
through 255 (decimal). The default is 128. If all ports have the same priority value, the lowest port number
forwards the spanning-tree frames.
1.5.8 Port Sniffer Function
Port sniffer function is a method to duplicate all traffic occurred on the specified monitored ports to the
designated sniffer port. The traffic can be configured for incoming packets only or outgoing packets only or
both. The control settings are:
Sniffer Mode : Specify the traffic type for monitoring
Sniffer Port : Specify the port where performs monitoring
Monitored Port : Select the ports whose traffic will be duplicated to the monitoring port. Press Space key
for selection from the port member list.
1.5.9 QoS Priority Function
This switch supports two priority levels, high and low, and provides two priority functions:
1. Port-based Priority (Static priority)
2. 802.1p Priority (VLAN tagged priority)
Priority Classification Methods
Static priority is called port -based priority. The priority level of a receiving packet is determined by the
configured priority of the input port where the packet is received and the content of the packet is ignored.
Each port must be pre-configured with a priority level for incoming frames or disabled setting.
802.1p Priority is a content -based priority method. If the receiving packet is an 802.1Q VLAN tagged
packet, the switch will check the 3-bit User Priority value in TCI (Tag Control Information) field of packet
tag data. By this value, the packet is classified as high priority or low priority according to 802.1p priority
configuration. The map of priority values vs. priority levels must be pre-configured.
The switch uses the following rules:
1. Applies Static Priority method first for tagged or untagged packets.
2. If port static priority is disabled, applies 802.1p Priority method.
3. Untagged packets are treated as low priority.
Outgoing Service Policy
The switch provides two options for outgoing service policy for high priority packets and low priority
packets.
1. High priority always first
2. Round robin method with specified [High : Low] ratio setting
This policy configuration can be set via the management interface.
1.5.10 802.1X Port- Based Network Access Control
For some IEEE 802 LAN environments, it is desirable to restrict access to the services offered by the LAN
to those users and devices that are permitted to make use of those services. IEEE 802.1X Port-based
network access control function provide a means of authenticating and authorizing devices attached to a
LAN port that has point-to- point connection characteristics, and of preventing access to that port in cases in
which the authentication and authorization process fails. The 802.1X standard relies on the client to provide
credentials in order to gain acces s to the network. The credentials are not based on a hardware address.
Instead, they can be either a username/password combination or a certificate. The credentials are not
verified by the switch but are sent to a Remote Authentication Dial-In User Service (RADIUS) server,
which maintains a database of authentication information. 802.1X consists of three components for
authentication exchange, which are as follows:
_ An 802.1X authenticator: This is the port on the switch that has services to offer to an end device,
provided the device supplies the proper credentials.
_ An 802.1X supplicant: This is the end device; for example, a PC that connects to a switch that is
requesting to use the services (port) of the device. The 802.1X supplicant must be able to respond to
communicate.
_ An 802.1X authentication server: This is a RADIUS server that examines the credentials provided to the authenticator from the supplicant and provides
the authentication service. The authentication server is responsible for letting the authenticator know if services should be granted.
The 802.1X authenticator operates as a go -between with the supplicant and the authentication server to
provide services to the network. When a switch is configured as an authenticator, the ports of the switch
must then be configured for authorization. In an authenticator-initiated port authorization, a client is
powered up or plugs into the port, and the authenticator port sends an Extensible Authentication Protocol
(EAP) PDU to the supplicant requesting the identification of the supplicant. At this point in the process, the
port on the switch is connected from a physical standpoint; however, the 802.1X process has not authorized
the port and no frames are passed from the port on the supplicant into the switching engine. If the PC
attached to the switch did not understand the EAP PDU that it was receiving from the switch, it would not
be able to send an ID and the port would remain unauthorized. In this state, the port would never pass any
user traffic and would be as good as disabled. If the client PC is running the 802.1X EAP, it would respond
to the request with its configured ID. (This could be a username/password combination or a certificate.)
After the switch, the authenticator receives the ID from the PC (the supplicant). The switch then passes the
ID information to an authentication server (RADIUS server) that can verify the identification information.
The RADIUS server responds to the switch with either a success or failure message. If the response is a
success, the port will be authorized and user traffic will be allowed to pass through the port like any switch
port connected to an access device. If the response is a failure, the port will remain unauthorized and,
therefore, unused. If there is no response from the server, the port will also remain unauthorized and will
not pass any traffic.
The following configuration settings are required in the switch to make 802.1X function work:
Radius server IP : IP address of the Radius server
Shared key : en encryption key for use during authentication sessions with the specified Radius server. It
must match the key used on the Radius server.
NAS identifier : identifier for this Radius client
Server port : the UDP destination port for authentication requests to the specified Radius server
Accounting port : the UDP destination port for accounting requests to the specified Radius server
Per-port 802.1X mode setting:
Auto (Au) - The port is set to the Authorized or Unauthorized state in accordance with the outcome of an
authentication exchange between the Supplicant and the Authentication Server.
Forced Authorized (Fa) - The port is forced to be in authorized state.
Forced Unauthorized (Fu) - The port is forced to be in unauthorized state.
None (No) - The port is not necessary authorized.
Misc. configuration:
quietPeriod - the period during which the port does not try to acquire a supplicant
txPeriod - the period the port waits to retransmit the NEXT EAPOL PDU during an authentication session
suppTimeout - the period of time the switch waits for a supplicant response toan EAP request
serverTimeout - the period of time the switch waits for a server response to an authentication request
reAuthMax - the number of authentication attempts that must time- out before authentication fails and the
authentication session ends.
reAuthPeriod - the period of time after which the connected radius clients must be re-authenticated
2. Installation and Management
2.1 Panel Description
2.2 AC Power Supply
One AC power cord which meets the specification of your country of origin was supplied with the switch
unit. Before installing AC power cord to the switch, make sure the AC power switch is in OFF position and
the AC power to the power cord is turned off. The switch supports wide range of AC power input
specifications as follows:
Power Rating : 100 ~ 240VAC, 50/60Hz, 50W
Voltage Range : 90 ~ 260VAC
Frequency : 47 ~ 440 Hz
Inrush Current : 24A@230V
Minimal Consumption : 17W
Maximal Cons umption : 26W
2.3 Network Switched Ports
The switch provides three types of switched ports as follows:
Port Number Label Specifications Port Type Modules
Port 1 - 22 1 - 22 Fixed RJ-45 10/100TX No
Port 23 - 24 23 - 24 Fixed RJ-45 10/100TX No
F23 - F24 Module slot 100FX Optional
Port 25-26 G1 - G2 Module slot Gigabit Optional
2.3.1 10/100TX Ports
The 10/100TX ports supports the following connection types and distances:
The ports can be configured to one of the following operating modes:
Auto mode : The port is auto -negotiation enabled and uses the speed and duplex settings as the highest
port capability for negotiation with its auto-negotiation capable link partner.
Nway_Forced mode : The port is auto -negotiation enabled and uses the speed and duplex settings as the
only port capability for negotiation with its auto-negotiation capable link partner.
Forced mode : The port is auto-negotiation disabled and uses the speed and duplex settings as the
connection configuration.
2.3.2 100FX Modules
Port 23 and Port 24 also provide optional fiber connectivity. The following installation rules should be
applied:
100FX Module Installation Working Connectors
F23 Slot F24 Slot Port 23 Port 24
None None P23 RJ- 45 P24 RJ-45
Installed None F23 module P24 RJ- 45 can not be used
None Installed P23 RJ-45 F24 module
Installed Installed F23 module F24 module
This figure illustrates an example of 100FX module. Every module has one jumper JP1 as shown. JP1
can be used to disable the module even the module is installed in the switch unit.
JP1 setting
ON - Short the jumper to enable the module
ON - Open the jumper to enable the module
The following 100FX modules are supported by F23 and F24 slots:
Part Number Connector Cable Distance
2260-FMT Duplex ST MMF*2 km
2260-FMC Duplex SC MMF 2 km
2260-FJM MT-RJ MMF 2 km
2260-FVM VF- 45 MMF 2 km
2260-FSA2 Duplex SC SMF* 20 km
2260-SFP Depends on the installed pluggable fiber transceiver
Note: 2260-SFP module provides an SFP (Small Form factor Pluggable) cage which can accommodate
different types of SFP fiber transceivers. The transceiver is not included in the module package and should
be purchased separately.
The following figures illustrate the outli ne of the Gigabit port modules:
Specifications
Part Number Compliance Speed Duplex
2260-GT IEEE 802.3ab 1000BASE -T 1000Mbps Half / Full
IEEE 802.3u 100BASE-TX 100Mbps Half / Full
IEEE 802.3 10BASE-T 10Mbps Half / Full
Auto-negotiation function
MDI-X RJ45
2260-SXC IEEE 802.3z 1000BASE-SX 1000Mbps Full
2260-SXL IEEE 802.3z 1000BASE-SX 1000Mbps Full
2260-LXC IEEE 802.3z 1000BASE-LX 1000Mbps Full
2260-SFP IEEE 802.3z 1000BASE-X 1000Mbps Full
(depends on the SFP transceiver installed)
Optical Specifications
Part Number Wavelength Output Power Input Optical Power
The following SFP transceiver have been tested for the compatibility with 2260-SFP module for
1000BASE-SX compliance:
Part Number Wavelength Specifications
Agilent HFBR-5710L_LP 850nm VCSEL MM LC-Duplex
E2O EM125-LP3TA 850nm VCSEL MM LC -Duplex
E2O EM125-MP3TA 850nm VCSEL MM MT-RJ
Giga Port Module Installation steps:
1. Turn the power to the switch off.
2. Insert the Gigabit modules and screw the modules securely.
3. Turn the power to the switch on.
2.4 Rack Mounting
Two 19-inch rack mounting brackets are supplied with the switch for 19 -inch rack mounting.
The steps to mount the switch onto a 19 -inch rack are:
1. Turn the power to the switch off.
2. Install two brackets with supplied screws onto the switch as shown in above figure:
2. Mount the switch onto 19 -inch rack with rack screws securely.
3. Turn the power to the switch on.
2.5 LED Indicators
LED Name State Interpretation
System LEDs
P(Power) On Power is supplied to the unit.
Off No power is supplied to the unit.
C(Console) On Tx activities
Off No Tx or Rx
D(Diag) Blink Diagnostic and initialization in process On Diagnostic and initialization completed
Port 1 ~ Port 24 LEDs
100/10 On Port speed is 100Mbps.
Off Port speed is 10Mbps.
Link/Act. On Port link up
Off Port link down
Blink Port Tx/Rx activities
FDX/Col. On Port is in full duplex.
Off Port is in half duplex.
Blink Collisions
Port 25 (G1), Port 26 (G2) LEDs
Link/Act. On Port link up
Off Port link down
Blink Port Tx/Rx activities
FDX/Col. On Port is in full duplex.
Off Port is in half duplex.
Blink Collisions
2.6 Cooling Fans
The switch is equipped with two cooling fans. Both fans are featured with failure detection function. When
the fan operation speed is below the specification, it is detected as a failure. The fan status can be
monitored via management functions. One fan failure trap is also issued when fan failure event occurs.
Important :
Do not operate the switch unit when a fan failure is detected. Without normal operation of the cooling fans,
the switch unit might not operate properly or even might be damaged due to not enough ventilation. Return
the defective unit to the dealer where it was purchased.
2.7 Management Setup
The managed switch is featured with management functions and can be managed by using the following
methods:
_ Direct console connection over an RS-232 cable
_ Telnet software over TCP/IP network
_ SNMP manager software over TCP/IP network
_ Web browser software from Internet or Intranet over TCP/IP network
_ SNMP trap hosts from Internet or Intranet over TCP/IP network
The following figure illustrates a management model diagram:
2.7.1 Setup for Out -of-band (Console) Management
Before doing any in-band management, it is necessary to perform console operation for configuring IP and
SNMP related settings for the first time the switch is received for installation. Any PC running Windows
95/98/ or NT can be used as a console via COM port. Windows Hyper Terminal program is an ideal and the
most popular software for such console terminal operations.
To setup console operation, the steps are:
1. Find a proper RS-232 cable for the connection to a console terminal. If your are using PC as a terminal,
make sure the cable pin assignments comply to the following requirement.
Console port 9-pin PC COM portPin 2 RXD -------------------------------- 3
2. Connect one end to the console port and connect the other end to the PC COM port.
3. Configure your PC COM port setting to match the RS-232 settings of the console port and start your
terminal software.
Factory default settings of the Console port Baud rate : 9600, N, 8, 1, 0
Flow control : disabled
4. Turn the switch unit power on.
5. Press <Enter> key several times in your terminal software until a login prompt comes up. It means the
connection is proper.
The console port does not support modem connection. Refer to Chapter 3 for more information about
Console management.
2.7.2 Setup for In-band Management
To perform an in -band management, it is necessary to connect the system to your TCP/IP network. The
steps are:
1. Configure IP and SNMP related settings to the device using direct console management when you
receive it first time for the installation.
2. Find a proper straight-through Category 5 UTP cable (maximal length 100 meters) for the connection.
3. Connect one end of the UTP cable to the UTP port of the media converter and connect the other end to a
network device, such as a switching hub, in your TCP/IP network.
4. Start your in- band management operations. For different management methods, refer to:
_ Chapter 3 for Console and Telnet management _ Chapter 4 for SNMP management _ Chapter 5 for Web management
2.7.3 Quick Guide to Configure Switch IP Address
This section provides a quick instruction to configure a new IP address via Console port for the switch
received for the first time. The steps are:
1. Set up console connection as desc ribed in section 2.7.1.
2. Login with default username= admin and password=123.
3. Menu selections to enter IP configuration as follows:
Main Menu
-> Switch Static Configuration
-> Administration Configuration
-> IP Configuration
3. Consol e and Telnet Operation
This chapter describes the detailed console operation. It can be applied to either out-of-band console
management or in-band Telnet management. Refer to Chapter 2 for installation details.
Cold Start
When the power to the switch is turned on, the device start initialization and self-test process. The self-test
messages are displayed as follows if a console connection is established successfully.:
Power-on Self -test Console message
---------------------------------------------
$$$ Switch LOADER Checksum O.K !!!
$$$ Press any key to start Xmodem receiver:
$$$ Switch IMAGE Checksum ...... O.K !!!
$$$ Loading IMAGE ...............................
$$$ Switch Power On Self Test...
$$$ CPU(arm7) Sdram Test Start..
++ Memory Test (Long) .... O.K !!!
++ Memory Test (Short) ... O.K !!!
++ Memory Test (Byte) .... O.K !!!
$$$ CPU(arm7) Sdram Test O.K !!!
$$$ Switch Register R/W Test ...O.K !!!
$$$ Phy Register R/W Test ...O.K !!!
$$$ Embedded Sram Built In Self Test ...O.K !!!
$$$ Switch Data Area Checksum ...O.K !!!
$$$ Detect Module Card... O.K !!!
$$$ Switch Engine Initialize...O.K !!!
$$$ Trunk Initialize...O.K !!!
$$$ Port Initialize...O.K !!!
$$$ BwCtrl Initialize...O.K !!!
$$$ Forwarding Initialize...O.K !!!
$$$ Vlan Initialize...O.K !!!
---------------------------------------------
Both console management and Telnet management are same in operation starting from login prompt.
Direct Console Management
When you can see the self-test messages shown on screen properly, you can press <Enter> key to start
console login operation. Go to Login Prompt section in next page directly.
Telnet Management
Use Telnet software to perform the management operation. The most convenient solution is using the
built-in Telnet function in a Windows 95/98/ or NT PC. Enter into DOS window and invoke Telnet
command :
>telnet xxx.xxx.xxx.xxx
to connect to the device. The specified xxx.xxx.xxx.xxx is the IP address of the device. Factory default IP
address is 192.168.0.2.
A welcome message and login prompt are displayed if the connection is established properly.
Login Prompt
The following figure illustrates the login screen:
For security reason, the device supports a function to change the password in setup menu. It is
recommended to change the default password immediately after a successful login.
3.1 Main Menu
When login successfully, the main menu is shown as follows:
---------------------------------------------
Main Menu
Switch Static Configuration
Protocol Related Configuration
Status and Counters
Reboot Switch
TFTP Update Firmware
Logout
Configure the switch.
Arrow/TAB/BKSPC = Move ItemEnter= Select Item
---------------------------------------------
Function description of the selected item:
Switch Static Configuration : Configure the switch related settings
Protocol Related Configuration : Configure the protocol parameters
Status and Counters : Show the status of the switch
Reboot Switch : Reboot the system or restore factory default configuration
TFTP Update Firmware : Use tftp to download firmware image
Logout : Exit the menu line program.
The following operation convention is commonly used for later configuration pages:
Action menu:
<Quit> Exit configuration
<Edit> Edit each configuration value
<Save> Save all configured values
<Previous Page> Browse previous configuration page
<Next Page> Browse next configuration page
Control keys for action menu:
[Tab] key Move to next item
[Backspace] key Move to previous item
[Enter] key Confirm selection
Control keys used for <Edit> operation:
[Tab] key Move to next item
[Backspace] key Move to previous item
[Space] key Change configuration option
[Ctrl+A] key Quit from <Edit> operation, back to action menu
3.2 Switch Static Configuration
[Switch Static Configuration] menu is shown as follows:
InRate OutRate FlowControl
Port Type (100K) (100K) Enable Auto Spd/Dpx Full Half
----------------------------------------------------------------- PORT1 100TX 0 0 Yes AUTO 100 FULL On On
PORT2 100TX 0 0 Yes AUTO 100 FULL On On
PORT3 100TX 0 0 Yes AU TO 100 FULL On On
PORT4 100TX 0 0 Yes AUTO 100 FULL On On
PORT5 100TX 0 0 Yes AUTO 100 FULL On On
PORT6 100TX 0 0 Yes AUTO 100 FULL On On
PORT7 100TX 0 0 Yes AUTO 100 FULL On On
PORT8 100TX 0 0 Yes AUTO 100 FULL On On
802.1Q IEEE 802.1Q VLAN is used
Disabled VLAN function is disabled.
Note: When VLAN mode is changed, the switch must be reboot to make the change effective.
If 802.1Q mode is selected, some additional settings are required as follows:
--------------------------------------------------- Managed 24+2G Switch : VLAN Support Configuration
VLAN Mode : 802.1Q
IngressFilter1 IngressFilter2
Port PVID NonMember Drop Untagged Drop
----------------------------------------------------------------- PORT1 1 FORWARD DROP
PORT2 3 FORWARD FORWARD
PORT3 1 DROP FORWARD
PORT4 1 DROP FORWARD
PORT5 1 DROP FORWARD
PORT 6 1 DROP FORWARD
PORT7 1 DROP FORWARD
PORT8 1 DROP FORWARD
Optional values - 1 ~ 255
Ingress Filter / NonMember Drop: Drop or forward input VLAN tagged frames whose VID does not
match PVID associated to the input port. This rule is applied only when input port is not the member port
of the associated VLAN group. Setting options - DROP, FORWARD
Ingress Filter / UnTagged Drop: Drop or forward input untagged frames
Options - DROP, FORWARD
3.3.3.2 Create a VLAN Group
Create a Port -based VLAN group
--------------------------------------------------- Add a VLAN Group
VLAN Name: [Vlan2 ] Grp ID:[ 2 ](1~4094)
Port Member
---------------------- PORT1 Member
PORT2 Member
PORT3 No
PORT4 No
PORT5 No
PORT6 No
PORT7 No
PORT8 No
Broadcast storm protection control setting:
Threshold options - NO, 5%,10%,15%,20%,25%
The threshold is the percentage of the total packet buffer occupied by queued broadcast packets. Upon
reaching the threshold, broadcast strom filtering mechanism is activated and further incoming broadcast
packets are dropped.
3.3.4.3 Max Bridge Transmit Delay Bound
---------------------------------------------------Managed 24+2G Switch : Max Bridge Transmit Delay Bound
Max bridge transmit delay bound : OFF
Low Queue Delay Bound : ENABLE
Low Queue Max Delay Time : 255(2ms/unit)
Max bridge transmit delay bound: Limit the packets queuing time in switch. If enabled and queuing time expired, the
queued packets will be dropped.
Options - OFF (default), 1sec, 2sec, 4sec
Low Queue Delay Bound: Limit the low priority packets queuing time in switch. If enabled and queuing
time expired, the low priority packets queued in switch will be sent.
Low Queue Max Delay Time: The maximal time that a low priority packet will be queued in switch.
Options - 1~255, 255=default, (2ms/unit)
Note:
Make sure Max bridge transit delay bound control is enabled when Low Queue Delay Bound control is
set to ENABLE.
3.3.4.4 Port Security
--------------------------------------------------- Managed 24+2G Switch : Port Security
A port in security mode will be locked and disabled to perform further MAC address learning. Only the
incoming packets with source MAC address already existing in the switch MAC address table can be
forwarded normally. Otherwise, the packets are dropped.
Options - Enabled, Disabled
For specific security application, user can disable the port fr om learning any new MAC addresses, then use
the static MAC addresses operation to define a list of MAC addresses that are allowed to pass through the
secure port.
IP related parameters assigned to this switch device:
DHCP : DHCP client function setting
Enable : enable DHCP client function to get a dynamic IP address
Disable : disable DHCP client function and use current IP address
IP Address : Current IP address assigned to the switch unit
Subnet_Mask : Subnet mask assigned to the switch unit
Gateway : Default gateway IP address assigned to the switch unit
Note:
1. If DHCP is enabled, the displayed IP address is the IP address given by DHCP server. Any modification
to this IP address is ignored.
2. If DHCP is enabled and no DHCP server is available in your network, current IP address is used.
3. A modified IP address is accepted and will be saved only when DHCP setting is disabled.
3.3.6 Port Sniffer Confi guration
--------------------------------------------------- Managed 24+2G Switch : Port Sniffer
Sniffer Mode : Rx
Sniffer Port : PORT1
Monitored Port:
Port Member
--------------------- PORT1 PORT2 PORT3 V
PORT4 PORT5 V
PORT6 PORT7 PORT8 -
Disable : Port priority is disabled. 802.1p priority method is applied.
Low : All incoming packets are treated as low priority.
High : All incoming packets are treated as high priority.
Priority 0 ~ 7 : Packet priority value map to high or low level.
Options - Low = low priroity packet, High = high priority packet
QoSMode : Service policy how output ports serve the queued packets
Options - First Come First Service = by queued sequence (no priority)
All High before Low = high priority packets first
High/Low Queue Service Ratio => H[x] : L[x], where x = 1~7
3.3.8 MAC Address Configuration
--------------------------------------------------- Managed 24+2G Switch : MAC Address Configuration
This configuration allows you to <add> mo re than one specific and static MAC addresses into the switch
MAC address table. Those static addresses will stay in table permanently and will not be removed even
when aging time out or the switch is powered off. <Edit> and <Delete> functions are also provided to
maintain those static MAC addresses.
Add static MAC address
--------------------------------------------------- Managed 24+2G Switch : Add Static MAC Address
MAC Address : the Ethernet MAC address
Port Num : press <Space> key to select the port number
Vlan ID : If tag-based (802.1Q) VLAN is enabled on the switch, each static address is associated with one
VLAN. Type the VID to associate with the MAC address. For port-based VLAN, this setting is not
displayed.
Use [Tab] or [BackSpace] key to choose the target address for <Edit> or <Delete> actions.
3.3.8.2 Filtering MAC Address
Refer to Chapter 1 for description of MAC address filtering function. The operations to Add/Edit/Delete a
filter MAC address are similar to the operations for static MAC address table. The following page shows an
example of filter MAC address table:
MAC Address : Type the MAC address to filter.
Vlan ID : If tag -based (802.1Q) VLAN is enabled on the switch, type the VID to associate with the filter
Current spanning tree information about the Root Bridge is shown on the left side and new values for
STP parameters are configured on the right side.
The settings are:
Priority : The priority is assigned to the switch. The higher value is lower priority. Range: 0 - 65535
Max Age : The number of seconds a bridge waits without receiving Spanning Tree protocol configuration
messages before attempting a reconfiguration. Valid value : 6 ~ 40.
Hello Time : The number of seconds between the transmission of Spanning Tree protocol configuration
messages. Valid value : 1 ~ 10.
Forward Delay Time : The number of seconds a port waits before changing from its Spanning Tree
Protocol learning and listen ing states to the forwarding state. Valid value : 4 ~ 30.
For descriptions of STP status and parameters, refer to Chapter 1 - Spanning Tree Protocol section.
Perport Configuration
--------------------------------------------------- Managed 24+2G Swit ch : STP Port Configuration
PortState : Spanning tree port state status
Possible states - Forwarding, Blocking, Listening, Learning
Control settings:
PathCost : Specifies the path cost for each port. The possible range is 1 to 65535. The recommended path
cost is 1000 divided by LAN speed in megabits per second.
Priority : Specify STP port priority for each port. The possible priority range is 0 through 255 (decimal).
The default is 128. If all ports have the same priority value, the lowest port number forwards the
spanning-tree frames.
For descriptions of STP status and parameters, refer to Chapter 1 - Spanning Tree Protocol section.
System Name : Specify a logical name to the switch unit.
System Contact : Specify the name of contact person regarding the unit.
System Location : Type the location where the switch unit is located.
These settings are used for SNMP MIB -II objects.
3.4.2.2 Community Strings
--------------------------------------------------- Managed 24+2G Switch : SNMP Community Configuration
Community Name Write Access
-------------------------------------------- public Restricted
private Unrestricted
This page shows current Community strings which are allowed to access MIB objects of the switch unit via
SNMP management interface. Up to four communities can be configured. Action commands are:
<Add > : Create a new community string.
<Edit> : Edit settings.
<Delete> : Select a string to delete
Add/Edit a Community String
--------------------------------------------------- Managed 24+2G Switch : Add SNMP Community
Community Name: Command-1
Write Access : Restricted
Community Name : Specify the name of one community string which is allowed to access this switch
unit.
Write Access : Specify the access right authorized to the community name.
Options - Res tricted = Read only, Unrestricted =Read/Write
3.4.2.3 Trap Managers
A trap manager is a management station that allows to receive SNMP traps. An SNMP trap is issued by the
switch when the associated trap event occurs in the sw itch. A trap manager is defined by its IP address and
a community string. Up to three trap managers can be configured.
Group : Display the trunk group ID.
LACP : Display the trunk group LACP setting.
Setting:
LACP Work Port Num : Specify the maximal number of ports can be aggregated at the same time. A
trunk group with LACP disabled must be specified with 4. An LACP enabled trunk group can be specified
up to 2.
Use <Edit >.command to set LACP state activity mode for each port.
State Activity setting options Active : The port automatically sends LACP protocol packets. If it belongs to a trunk group which is set to
LACP mode.
Passive : The port does not automatically send LACP protocol packets and responds only if it receives
LACP protocol packets from the opposite device.
Note:
If a trunk group is set to LACP mode, all its member ports are set to [Active] default.
This menu is used to configure 802.1X function related settings. For more information about 802.1X
function, refer to Section 1.5.10 802.1X Port-Based Network Access Control.
This menu is used to setup Radius server related parameters as follows:
Radius Server IP : IP address of the Radius server
Shared Key : an encryption key for use during authentication sessions with the specified Radius server. It
must match the key used on the Radius server.
NAS Identifier : identifier for this Radius client (this switch)
Server Port : the UDP destination port for authentication requests to the specified Radius server
Accounting Port : the UDP destination port for accounting requests to the specified Radius server
This menu is used to configure per-port 802.1x mode. The options are:
Au (Auto) - The port is set to the Authorized or Unauthorized state in accordance with the outcome of an
authentication exchange between the Supplicant and the Authentication Server.
Fa (Forced Authorized) - The port is forced to be in authorized state.
Fu (Forced Unauthorized) - The port is forced to be in unauthorized state.
No (None) - The port is not necessary authorized.
This menu is used to setup 802.1x protocol related timers and parameters as follows:
Quiet Period - the period during which the port does not try to acquire a supplicant
Tx Period - the period the port waits to retransmit the NEXT EAPOL PDU during an authentication
session
Supplicant Timeout - the period of time the switch waits for a supplicant response toan EAP request
Server Timeout - the period of time the switch waits for a server response to an authentication request
ReAuthMax - the number of authentication attempts that must time- out before authentication fails and the
authentication session ends.
Reauth Period - the period of time after which the connected radius clients must be re-authenticated
Port Status : display the status of all switched ports and trunk groups.
Port Counters : display the statistic counters of each ports.
System Information : display system related information, cooling fan status, and all slot module status.
Link InRate OutRate Flow
Port Status (100K) (100K) Enable Auto Spd/Dpx Control
----------------------------------------------------------------- PORT1 Down 0 0 No AUTO 100 Full On
PORT2 Do wn 0 0 No AUTO 100 Full On
PORT3 Down 0 0 No AUTO 100 Full On
PORT4 Down 0 0 No AUTO 100 Full On
PORT5 Up 0 0 Yes AUTO 100 Full Off
PORT6 Down 0 0 No AUTO 100 Full On
PORT7 Down 0 0 No AUTO 100 Full On
PORT8 Down 0 0 No AUTO 100 Full On
This page display current port status for all switched ports. The status are:
Link Status : Display port link status
InRate : Display the input rate control (100K/unit) setting value.
OutRate : Display the output rate control (100K/unit) setting value.
Enable : Display the port function setting. (Yes=Port is enabled, No=Port is disabled)
Auto : Display the port Nway mode: Auto , Nway_Force , Force.
Spd/Dpx : Display the port speed and duplex status.
FlowControl : Display the flow control status.
Note:
In auto / Nway force mode, it displays the flow control status after negotiation. In force mode, it displays
the flow control setting.
MAC Address : The unique MAC address assigned to this switch unit
Firmware Version : Display the switch firmware version.
ASIC Version : Display the main controller version.
PCBA Version : Display the switch Hardware version.
G1 Module Type : Display module information in G1 slot.
G2 Module Type : Display module information in G2 slot.
F23 Module Type : Display module information in F23 slot.
F24 Module Type : Display module information in F24 slot.
FAN -1 Status : Display status of Cooling Fan1.
FAN -2 Status : Display status of Cooling Fan2.
TFTP Update Firmware : Update the switch firmware via TFTP
TFTP Restore Configuration : Download default configuration file to the switch from the TFTP server
TFTP Backup Configuration : Backup current configuration settings of the switch as a image file to the
To use TFTP to upload current switch configuration and save it as a backup image file onto TFTP server.
The steps are:
1. Start your TFTP server.
2. Use <Edit> command to specify TFTP server and file name:
TFTP Server : Type the IP address of your TFTP server.
Remote File Name : Type the file name to save current configuration
5. Press [Ctrl+A ] to go back to action line.
6. Use <Save> command to start uploading current switch configuration.
7. When command completed successfully, the image file upload finished too.
4. SNMP Manageme nt
SNMP management are performed at a network management station running SNMP network management
application manager software. The following figure illustrates an example model:
The switch unit serves as an SNMP agent and provides the capabilities that allows network administrators
via SNMP protocol to set parameters and view switch status defined in the standard MIB-II and private
MIB. A trap manager is a management station that allows to receive SNMP traps. An SNMP trap is issued
by the switch when the associated trap event occurs in the switch.
4.1 Configuring SNMP Settings via Console Operation
Before performing SNMP operation, proper SNMP settings must be configured. The SNMP related settings
are:
Name : Logic name to identify the switch unit
Location : Location where the switch unit is installed
Contact : Contact person regarding the switch unit
Community string : SNMP communities to which the SNMP manager belongs and access right to the
switch unit ( read only or read/write)
Trap Managers : IP addresses of trap managers to which a trap is
issued and the community to which the trap manager belongs.
Up to four SNMP communities and up to three trap managers are supported by the system SNMP agent.
4.2 SNMP MIB-2 and Private MIB
Use the SNMP management application software to compile the MIB file first before performing any management operation. The
following MIB standards are supported:
The following MIB -2 objects are related to the switched ports and are indexed by a port number 1 ~ 27 (27
= CPU port):
Port MIB-2 Objects Set/Get Value Options
ifIndex.1 ~ 27 Get Physical port number
ifDescr.1 ~ 26 Get text - Port 1~26 on unit 1
ifDescr.27 Get text - ethernet switch low driver
ifType.1 ~ 27 Get erhernet-csmacd(6)
ifSpeed.1 ~ 24 Get 100000000=100M, 10000000=10M
ifSpeed.25 ~ 26 Get 100000000=100M, 10000000=10M
1000000000=1000M, 0=No module
ifSpeed.27 Get 10000000 = 10M
ifAdminStatus.1 ~ 27 Set up(1) = enable port
down(2) = disable port
ifAdminStatus.1 ~ 27 Get up(1) = port is enabled
down(2) = port is disabled
ifOperStatus.1 ~ 27 Get up(1) = port status link up
down(2) = port status link down
ifLastChange.1 ~ 27 Get Time of port status change
ifInOctets.1 ~ 27 Get Port total bytes received
ifInUcastPkts.1 ~ 27 Get Port total unicast packet received
ifInNUcastPkts.1 ~ 27 Get Port total non-unicast packet received
ifInDiscards.1 ~ 27 Get Port total packet dropped
ifInErrors.1 ~ 27 Get Port total error packet received
ifOutOctets.1 ~ 27 Get Port total bytes sent
ifOutUcastPkts.1 ~ 27 Get Port total unicast packet sent
ifOutNUcastPkts.1 ~ 27 Get Port total non-unicast packet sent
ifOutDiscards.1 ~ 27 Get Port total packet aborted
ifOutErrors.1 ~ 27 Get Port total error packet sent
ifOutQLen.11 Get Port total out put queued packets
The following are device-related private MIB objects:
Private MIB Objects Set/Get Value Options
DeviceName.0 Get KS2260
PortNumber.0 Get 26
F23_Module.0 Get N/A(0)
FX_Module(1)
F23_Module.0 Get N/A(0)
FX_Module(1)
G1_Module.0 Get N/A(0)
TP_10/100/1000T(1)
FX_1000SX_SC(2)
FX_1000SX_LC(3)
FX_1000LX_SC(4)
FX_1000LX_SC(5)
FX_1000LX_SC(6)
FX_1000LX_LC(7)
FX_1000LX_LC(8)
FX_1000LX_S3_SC(9)
FX_1000LX_S5_SC(10)
FX_1000LX_S3_SC(11)
FX_1000LX_S5_SC(12)
G2_Module.0 Get Same as G1_Module.0
FanStatus1.0 Get Normal(0)
Warning(1)
FanStatus2.0 Get Normal(0)
Warning(1)
Refer to MIB file, ks2260-v1.xx.mib for the details. This file can be used for MIB compiler.
4.3 SNMP Traps
The switch supports the following SNMP traps. When the trap event occurs, the SNMP agent will generate
a trap notification to SNMP trap manager stations. Up to three trap managers can be supported. Each trap
manager must be configured with : IP address and Community string which the trap manager belongs.
The provided traps and associated events are:
Trap Name RFC1157 Event of Trap Generated
Cold Start Generic The device is powered on or reboot
remotely and complete initialization
Authentication Generic SNMP community authentication failure
Port link change Generic Any switched port link down
Port link change Generic Any switched port link recovery
Fan 1 failure Specific Fan 1 failure warning or recovery
Fan 2 failure Specific Fan 2 failure warning or recovery
5. Web Ma nagement
The managed switch features an http server which can serve the management requests coming from any
web browser software over internet or intranet network.
Web Browser
Microsoft Internet Explorer 5.0 or later
Important:
The switch does not support any version of Netscape browser software.
Best Display Resolution
1024 x 768 pixels up
High color (16 bit) up
Set IP Address for the device unit
Before the device can be managed from a web browser software, make sure a unique IP address is
configured to the device. Refer to Section 2.7 for how to set IP address and related parameters for the
managed switch unit. The parameters are:
_ IP address
_ Subnet mask
_ Default Gateway
_ User name
_ Password
5.1 Start Browser Software and Making Connection
Start your browser software and enter the IP address of the device unit to which you want to connect. The
IP address is used as URL for the browser software to search the device.
URL : http://xxx.xxx.xxx.xxx/
Factory default IP address : 192.168.0.2
Login the Username and Password to enter web management. Refer to Appendix A for factory default
values.
5.2 Web Management Home Overview
This page provides the following menu list. Each menu is described individually in the following sections.
This page shows all port status in a scroll bar list. The status are dependent on user settings and the
negotiation results as follows:
State : Display port function status including Config : function setting - On = enable, Off = disable
Atual : status - On = enabled, Off = disabled
Link Status : Down = No Link, UP = active link is established
Auto Negotiation : Display the auto negotiation mode setting and status
Config / AtualAuto = enable auto negotiation with the specified highest capability
Force = disable auto negotiation and use forced mode
Nway-force = enable auto negotiation with the specified capability
Note : Specified capability means speed and duplex configuration
Speed status : Display port speed setting and status
Config : port speed capability setting
Atual : port speed is used currently
Port 1-24 : 10/100Mbps
G1 port, G2 port : 10/100/1000Mbps
Duplex status : Display duplex setting and status
Config : port duplex capability setting - Full, Half
Atual : port duplex mode is used currently - Full, Half
Flow Control: Display the flow control settings and status
Config/Full : On = enable for full duplex, Off = disable
Config/Half : On = enable for half duplex, Off = disable
Atual : current flow control status
Rate Control : Display the port rate control settings (unit=100K bytes)
Atual/Ingr : Display the port effective ingress rate setting
Atual/Egr : Display the port effective egress rate setting
Off = the rate control is disabled.
Priority : Display the port port-based priority setting
High = the port is high priority port.
Low = the port is low priority port.
Disable = port-based priority is disabled.
Port Security : Display the port security setting (SA MAC learning)
On = security on and SA MAC address learning is stopped
Off = port security off and performs normal MAC address learning
Note : SA = Source MAC address in the received packet
5.4 Port Statistics
This page displays the function, link status, and statistic counters of all ports by a scroll list. The status and
counters are:
State : On = port is enabled, Off = port is disabled
Link : port link status, Down = link down, Up = link up
TxGoodPkt : Good transmitted packet count
TxBadPkt : Bad transmitted packet count
RxGoodPkt : Good received packet count
RxBadPkt : Bad received packet count
TxAbort : Aborted packet count
Collision : the number of collisions
DropPkt : Dropped packet count
Press [Reset] button to reset all counters.
Click port icons on the switch image to also see a single port counters as follows:
5.5 Administrator
Administrator menu provides the following management functions:
_ IP address
_ Switch settings
_ Console port information
_ Port controls
_ Trunking
_ Filter database
_ VLAN configuration
_ Spanning tree
Port Sniffer
_
_ SNMP
_ Security Manager
_ Stack Settings
5.5.1 IP Address
Available settings:
DHCP : DHCP function setting
Enable : enable DHCP client function to get dynamic IP address
Disable : disable DHCP client function and use static IP address
IP Address : Static IP address assigned to the managed switch unit
Subnet_Mask : subnet mask setting
Gateway : Default gateway IP address
Click Buttons:
[Apply] : confirm and apply the setting changes
[Help] : description about the settings
The switch unit must be reset to use the new IP parameters.
5.5.2 Switch Setting
This menu provides the following functions:
Basic : the basic information of the managed switch unit
Module Info : the information of the Gigabit modules installed
Advanced : some switch related settings
5.5.2.1 Basic Information
Description : The name of switch type
MAC Address : The unique MAC address assigned to the switch unit
Firmware Version : The firmware version built-in
ASIC Version : The switch controller version of the switch unit
PCBA Version : The hardware version of the switch unit
FAN -1 Status : The status of cooling Fan1 - NORMAL, WARNING
FAN -2 Status : The status of cooling Fan2 - NORMAL, WARNING
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.