Edimax Technology ES-5240G+ Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 111 Seiten
- 5.16 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Switch
Edimax Technology ES-5226RS
59 Seiten 1.1 mb -
Switch
Edimax Technology EU-HB4S
2 Seiten 0.19 mb -
Switch
Edimax Technology ES-5224RFM
98 Seiten 1.55 mb -
Switch
Edimax Technology ES-5224R+
29 Seiten 0.31 mb -
Switch
Edimax Technology ES-5224RM+
265 Seiten 4.85 mb -
Switch
Edimax Technology EK-PAK2
3 Seiten 0.3 mb -
Switch
Edimax Technology Rackmount Fast Ethernet Switch
41 Seiten 0.41 mb -
Switch
Edimax Technology 5/8 Ports Desktop
40 Seiten 0.56 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Edimax Technology ES-5240G+ an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Edimax Technology ES-5240G+, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Edimax Technology ES-5240G+ die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Edimax Technology ES-5240G+. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Edimax Technology ES-5240G+ sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Edimax Technology ES-5240G+
- Den Namen des Produzenten und das Produktionsjahr des Geräts Edimax Technology ES-5240G+
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Edimax Technology ES-5240G+
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Edimax Technology ES-5240G+ zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Edimax Technology ES-5240G+ und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Edimax Technology finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Edimax Technology ES-5240G+ zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Edimax Technology ES-5240G+, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Edimax Technology ES-5240G+ widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
ES-5240G+ 24-Port GbE W eb Smart Switch User's Manual V ersion 1.0 / June 2007[...]
-
Seite 2
ii COPYRIGHT Copyright© 2007 Edimax. All right s reserved. No pa rt of this publication may be reproduced, transmitted, transcribed, stored in a retri eval system, or translated into any language or computer language, in any form or by any m eans, electronic, mechani cal, magnetic, optical, chemical, manual or otherwise, without the prior written [...]
-
Seite 3
iii T able of Content s Caution ........................................................................................................................ .......... v Electronic Emi ssion Notices .................................................................................................. v 1. Introdu ction .....................................[...]
-
Seite 4
iv 4-3-5. IGMP S t at us .......................................................................................................... 90 4-3-6. Ping S tatus............................................................................................................ 9 2 4-4. Main tenance .................................................................[...]
-
Seite 5
v Caution Circuit devices are sensitive to static ele c tric ity , which can damage their deli c ate electronics. Dry weather conditions or walking across a car peted floor may cause you to acquire a st atic electrical charge. T o protect your device, always: • T ouch the metal chassis of your computer to ground the static electri cal charge befo[...]
-
Seite 6
[...]
-
Seite 7
1 1. Introduction 1-1. Overview of 24-Port GbE W eb Smart Sw itch 24-port Gigabit W eb Smart Switch is a standalo ne switch that meets IEEE 802.3/u/x/z standa rds. The switch is equ ipped with included 20 x 10/100/1000Mbps TP port and 4 x Gigabit TP/SFP Fiber auto-se nse port We b Smart management Ethernet Switch. The switch is designed to incorpor[...]
-
Seite 8
2 1-2. Checklist Before you start inst alling the switch, veri fy that the package contai ns the following: 24-Port GbE Web Smart Switch SFP Modules (optional) Mounting Accessory (for 19 " Rack Shelf) CD-ROM with Us er's Manual Power Adapter Please notify your sales represent ative i mmediately if any [...]
-
Seite 9
3 • Support s to send the trap event while monitored events happ ened • Support s default configuration which can be restored to overwrite the current configuration which is working on via W eb UI and Reset button of the switch • Support s hot swap plug/unplug SFP module s • Support s Quality of Service (QoS) for real time applications base[...]
-
Seite 10
4 1-4. V iew of 24-Port GbE Web Smart Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet port s and 4 SFP fiber ports f or optional removable modules on the front p anel of the switch. LED display area. Locating on the left side o f the panel, Power LED, which i ndicates the power status a nd [...]
-
Seite 11
5 • LED Indicators LED Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED LINK/ACT Green Lit when connection with remote device is good Blinks when any traf fic is present 10/100/1000Mbp s Green/ Amber Lit Green when TP link on 1000Mbp s speed Lit Amber when TP link on 100Mbps speed Off[...]
-
Seite 12
6 1-5. V iew of the Optional Modules Port 21~24 on this switch support tw o types of medi a --- TP and SFP Fiber (LC, BiDi-SC…); this port support s 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbp s SFP Fiber transceiver is used for high- speed connection ex pansion; nine optional SFP types provided for the switch ar[...]
-
Seite 13
7 2. Installation 2-1. St arting 24-Port GbE Web Smart Switch Up This section will give user s a quick st art for: - Hardware and Cable Inst allation - Management S tation Installation - Software booting and configuration 2-1-1. Hardware and Cable Install ation At the beginning, please do first: Æ Wea r a grounding device to avoid the dam age from[...]
-
Seite 14
8 • TP Port an d Cable Inst allation ⇒ In the switch, TP port support s MDI/MDI-X auto-crossover , so both types of cable, straight-throu gh (Cable pin-out s for RJ -45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed- over (Cab le pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6[...]
-
Seite 15
9 2-1-2-1. Cabling Requirement s for TP Port s ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP netwo rk connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. 2-1-2-2. Ca[...]
-
Seite 16
10 2-1-2-3. Switch Cascading in T opology • T akes the Delay T ime into Account Theoretically , the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly . In practice, the network extension (cascading levels & overall diam eter) must follow the constraint of the IEEE 802.3/802.[...]
-
Seite 17
11 Case1: All switch ports are in the same local area networ k. Every port can access each other (See Fig. 2-2). If the VLAN is enabled and configured, each node in the network that can communicate each other di rectly is bounded to the same VLAN area. The VLAN area is defined by which VL AN you are on. The switch support s both port-based VLAN and[...]
-
Seite 18
12 Case 2b: Port-based VLAN (See Fig.2-4). 1. VLAN1 members can not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members can not access VL AN1 and VLAN3 members, but they can access VLA N4 members. 3. VLAN3 members can not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members can not access VL AN1 and VLAN3 members, but they can access VLA N2 members.[...]
-
Seite 19
13 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch Just like browsing on the Internet, this switch is de signed to allow users to access and manage it s functions through its web-based interface. Users can monitor the status of the switch, as well as to configure the switch through this web- based interface. Here we will gui[...]
-
Seite 20
14 2-1-3-1. Management through Ethern et Port There are two ways to configure and monitor the switch through its Ethe rnet port – using a web browser and an SNMP manager program. The later one is RubyVie w dependant which is not covered here. Using a web bro wser to access the switch’ s web-based management UI is highly user friendly so that we[...]
-
Seite 21
15 Fig. 2 -7 the Log in Screen for Web 2-1-4. IP Address Assignment For IP addre ss configuration, four p arameters are required. They are IP address, Subnet Mask, Default Gateway and DNS. IP addre ss: The IP addre ss of the network device in a network is used for internet working communication. The IP address is structured as shown in Fig. 2-8. It[...]
-
Seite 22
16 According to IPv4, the IP addre ssed are divided three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP addre ss/X, for example, 192.168.1.0/ 24. Each class ha s its address ra nge as described below . [...]
-
Seite 23
17 Class D and E: Class D is a cla ss with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RF C 1 1 12. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP addre ss blocks reserved and to be use[...]
-
Seite 24
18 In this diagram, you can see the subnet mask with 2 5-bit long, 255.255.255.128, cont ains 126 members in the sub-netted network. Anothe r is that the length of network prefi x equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows t he result. Prefi[...]
-
Seite 25
19 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: When the destination of a routed packet not listed in the routing t able, all traffic will be put into a device with this designated I P addre ss, which is known [...]
-
Seite 26
20 2-2. T ypical Applications The 24-Port GbE W eb Smart Switch implement s 24 Gigabit Ethernet TP ports with au to MDIX and four slots for removable modules Comprehen sive fiber types of connection inclu ding LC and BiDi-LC SFP modules are supported. For more detailed specifications of the switch, please refer to Appendix A. The switch is suitable[...]
-
Seite 27
21 Fig. 2-12 Office Network Connection Fig. 2-1 1 Peer-to-peer N etwork Connection[...]
-
Seite 28
22 3. Basic Concept and Management In this chapter we are goin g to introduce you the basic concept s and features of Ethernet, and how to work with the managem ent feature s provided by this switch. 3-1. What’ s the Ethernet Ethernet originated and was implement ed at Xerox in Palo Alto, CA in 1973 and was successfully comm ercialized by Digi t [...]
-
Seite 29
23 The above diagram shows the Ethernet ar chitecture in OSI model. LLC sub- layer and MAC sub-layer will re spond to the Data Li nk layer , and the transceivers will respond to the Physical layer . Logical Link Control (LLC) Dat a link layer is composed of both the su b-layers of MAC and MAC-client. Here MAC client may be logical link control or b[...]
-
Seite 30
24 The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP , SSAP , Contro l and Information. The DSAP address field i dentifies the one or more service access point s, in which the I/G bit indicates it is individual or gr oup address. If all bits of DSAP are 1s, it’s a global address. The SSAP address field identifies the sp ecifi[...]
-
Seite 31
25 3-2. Media Acces s Control (MAC) MAC Addressing Because LAN is co mposed of many nodes, for the data exchanged among these nodes, each nod e must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP [...]
-
Seite 32
26 Bit 47 bit 0 1st byte 2nd byte 3rd byte 4t h byte 5th byte 6th byte OUI code Serial number Table 3-3 Ethernet MAC address The first bit of the first byte in t he Destination address (DA) deter mines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1 ). So the 48-bit address space is div[...]
-
Seite 33
27 - Destination address (DA) — The DA field is used to identify which network device(s) should receive t he packet. It is a unique address. Please see the section of MAC addre ssing. - Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0. - Leng[...]
-
Seite 34
28 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transm itting data . When receiving data, it pars es frame to detect error; when transmi tting dat a, it performs frame assembly. 2. Performing Media access co ntrol. It prepares the initiation jobs for a frame transmission an d makes recovery from tran smission [...]
-
Seite 35
29 Ethernet MAC transmits frame s in half-duplex and full-du plex ways. In half- duplex operation mode, the MAC ca n either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with half-dupl ex operation exists only in the same collision domain. The carrie r signal needs to spend time [...]
-
Seite 36
30 Parameter value/LAN 10Base 100Base 1000Base Max. collision domain DTE to DTE 100 meters 100 meters for UTP 412 meters for fiber 100 meters for UTP 316 meters for fiber Max. collision domain with repeater 2500 meters 205 meters 200 meters Slot time 512 bit times 512 bit times 512 bit times Interframe Gap 9.6us 0.96us 0.096us AttemptLimit 16 16 16[...]
-
Seite 37
31 3-3. Flow Control Flow control is a mechanism to tell the source device stop sending frames for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sen ding a PAU SE frame from target device to source device. When the target is not busy and the PAUSE time is ex pired, it will send another [...]
-
Seite 38
32 Frame Reception In essence, the frame reception is t he same in both operations of half duplex and full duplex, except that full-duplex operat ion u ses two buffers to transmit and receive the frame independently. The receiv ing no de always “listens” if there is traffic running over the medium when it is not receiving a frame. When a frame [...]
-
Seite 39
33 What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data im mediately following the MAC so urce address. When tagged VLAN is applied, t he Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag c ontrol information are different in comparison with the basic Ethernet frame. The re st fie[...]
-
Seite 40
34 The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision. 3-4. How does a switch w ork? The switch is a layer 2 Ethernet Swit[...]
-
Seite 41
35 Extended Distance Limit ations: The diameter of a half-duplex LAN se gment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using cable i s 2500 meters an d 185 meters when using coaxial cable. The switch with it s per port per collision domain can extend the di stance li ke a bridg[...]
-
Seite 42
36 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the p acket to destination port(s ). Here we introduce some important features of a switch and how they work. MAC address t able When a pa cket is received on a port, th e switch fi rst checks if the pa cket is good or bad and extract s [...]
-
Seite 43
37 Mac address aging There is a field in MAC address ta ble us ed to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA arrives. Usually , the age time is programmable. T ransmission schedule In most layer 2 switches, the QoS is supported. QoS in a switch mus[...]
-
Seite 44
38 3-5. V irtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must un derstand what LAN is. In general, a LAN is composed of different physical n etwork segment s bridged by switches or bridges which attach to end stations in the same broadca s t domain. The traf fic can reach any stati on on the same LAN. Beyond thi s do[...]
-
Seite 45
39 Now we apply VLAN technology to configure the system shown as the figure above. We ca n partition the users into the dif ferent logical networks which have their own broadcast domain. The traf fic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traf fic within VLAN 1 does not flow to VLAN [...]
-
Seite 46
40 There are many types of VLAN appli ed. The most popular ones are port- based VLAN, tag-ba sed VLAN and protocol-based VLAN. Port-based VLAN Some physical port s are configured as members of a VLAN. All stations attached on t hese ports can communica te with each other . T ag-based VLAN It identifies the membership by VLAN ID, no matter w[...]
-
Seite 47
41 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag fiel d, contains VLAN identification with the value of 0 and priority information. Untagge d frame: An Ethernet frame carries no VLAN t [...]
-
Seite 48
42 Ingress Rule: Each packet received by a VLAN-aware bridge will be classified t o a VLAN. The classification rule is described as follows . 1. If the VID of the packet is null (VID=0 ) or this packe t is an untagged packet: a. If there are still some other ways(e. g. protocol, MAC addr ess, application, IP-subnet, etc.) to classify the incoming p[...]
-
Seite 49
43 How does a T agged VLAN work? If the ingress filtering is enabled and when a packet is receive d, the VLAN bridge will first check if the VID of the packet present s. 1). If the packet has a non-zero VID, t he VLAN bridge will apply this VID as the VLAN ID of the packet in the network. 2). For a packet with a null tag or no VLAN t ag, if the VLA[...]
-
Seite 50
44 3-6. Link Aggregation Basically , Link Aggregation is to aggregate the ban dwidth of more than one port to an assigned logical link. This hig hly increases total bandwid th to the targeted device. There is more than one Link Aggreg ation technology in many vendors’ switch products al ready , wh ich may cause the problem of interoperability . T[...]
-
Seite 51
45 T erminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group wit h a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an ind ependent link. There are three cases of link used in th e network, which are switch to [...]
-
Seite 52
46 4. Operation of Web-based Management This chapter instruct s you how to configure and manage the 24-Port GbE Web Smart Switch through its web user interface and how to access and manage 20 10/100/1000Mbp s TP Port and 4 Gigabit TP/SFP Fiber dua l media port. The switch provides 20 fixed Gigabit Ether net TP port s and four optional Gigabit dual [...]
-
Seite 53
47 Fig. 4-1 4-1. Web M anag ement Home Overview After you login, the switch sho ws you t he system stat us information as Fig. 4- 2. This is the default page and it displays you with the basic information of the system, including “Switch S tatus”, “TP Po rt S tatus”, “Fiber Port S tatus”, “Aggregation”, “VLAN”, “Mirro r”, ?[...]
-
Seite 54
48 • The Information of Page Layout ⎯ On the top, it shows the front panel of the swit ch. In the front panel, green LEDs on to show linked ports in function; for unlinked ports the LEDs will be OFF . For the optional modules, the slot will show only a cover plate if no module exist s. On the other hand, it will show a module if one pre sents. [...]
-
Seite 55
49 4-2. Configuration Fifteen functions, including System Co nfi guration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuratio n, Aggre gation , LACP , RST P , 802.1X, IGMP Snooping, Mirror , QoS, F ilter , Rate Limit, S torm Control and SNMP are contained in this function folder for system and n etwork management. Each of them wi[...]
-
Seite 56
50 4-2-1. System Configuration System configuration is one of the mo st import ant configurations in the switch. Without proper setti ngs, network administrator w ill not be able to manage or view the status of this device.The switch sup ports manual IP addre ss setting . Fig. 4-3 Function name: System Configuration Function description: Show syste[...]
-
Seite 57
51 Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Serv er: Show the IP address of the DHCP server . Default: 0.0.0.0 Lease T i me Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 charact ers are allowed in this param[...]
-
Seite 58
52 Subnet mask is used to set the subnet mask value, which should be the same value as that of the other dev ices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual. Default: 255.255.255.0 Fallback Gateway: Set an IP address for a g ateway to handle those packe[...]
-
Seite 59
53 4-2-2. Port Configuration Function name: Ports Configu r ation Function description: Ports Configuration is ap plied to ch ange the settings of each port. In this configuration function, you can set/reset the following parameters, Mode and Flow Control. All of them are described in details below . Parameter description: Enable Jumbo Frames: This[...]
-
Seite 60
54 Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration The switch support s Port-based VLAN and T ag-based VLAN (802.1q) . Support 24 active VLANs and VLAN ID 1~ 4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improved security and increas ed performance bu[...]
-
Seite 61
55 T ag-based: T ag-based VLAN identifies it s member by VID. This is quite different fro m port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to dete rmine if it can be forwarded. The switch su pports suppl ement of 802.1q. For more details, plea[...]
-
Seite 62
56 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the existing information of VL AN Group s List and the maintenance that can be done to them, i.e. modify and delete. User also can add a new VLAN group by inputting a new VLAN name and VLA N ID. If you are in port-based VLAN, it will just show [...]
-
Seite 63
57 Add Group: Create a new port-based VLAN or t ag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the c heck box ( ; ) beside the ID, then press the <Delete> button to delete the group. Fig. 4-9 Port-Based VLAN Configuration[...]
-
Seite 64
58 4-2-5. Aggregation The Aggregation (Port T runking) Confi guration is used to configure the settings of Link Aggregation. Y ou can bundle more than one port with the same speed, full duplex and the same MA C to be one single logical port, thus the lo gical port aggregates the b andwidth of these bundled port s This means you can apply your curre[...]
-
Seite 65
59 4-2-6. LACP The switch support s the link aggr egation IEEE802.3ad sta ndard. This standard describ es the Link Aggregate Contro l Protocol (LACP), which i s a protocol that dynamically creates and manages trunk group s. When you enable LACP link aggregation on a port, the port can automatically negotiate with port s at the remote end of a link [...]
-
Seite 66
60 4-2-7. RSTP RSTP detect s and breaks network loop s and provides backup links betwe en switches, bridge s or routers. It allows a switch to interact with other RS TP – compliant switches in your netwo rk to ensure that only one path exists between any two stations o n the network. The switch allows you to create multip le STP configurations an[...]
-
Seite 67
61 RSTP Port Configuration Function description: Enable or disable RSTP proto c ol on t he port which being sele cted and set path cost. Parameter description: Protocol Enabled: Just tick t he check box ( ; ) beside the port x to enable RSTP protocol, then press the <Apply > b utton to apply . Edge: Just tick the c heck box ( ; ) beside the p[...]
-
Seite 68
62 4-2-8. 802.1X 802.1x port-based network access co ntrol provides a method to restrict users to access network resour ces via authenticat ing user ’s information. This re stricts users from gaining access to the network resource s through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a po rt under 8[...]
-
Seite 69
63 While in the authentication process, th e message packet s encapsulated by Extensible Authentic ation Protocol over LA N (EAPOL), are exchanged between an authenticator P AE and a supplicant P AE. The Authenticato r exchanges the messag e to authentication server using EAP encapsulatio n. Before successfully authenticating, the supplicant can on[...]
-
Seite 70
64 1. On the initial stage, the su pp licant A is unauthenticated and a port on switch acting as an authenticato r is in unauthorized st ate. So the access is blocked in this st age. 2. Initiating a session. Eithe r authenticator or sup plicant can initiate the message exchange. If supplicant initiates the proce ss, it sends EAPOL-start packet to t[...]
-
Seite 71
65 10. When the supplicant issue an EAP-Logof f message to Authentication server , the port you are using is set to be unauthorized.. The 802.1X “Enabled” is the type of aut hentication supported in the switch. In this mode, for the devices connected to th is port, once a sup plicant is authorized, the devices connected to this port can ac cess[...]
-
Seite 72
66 Mode: Enable or disable 802.1X function. RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to be used comm unicate with RADIUS se rver for the authentication service. The valid value ranges 1-65535. Default port number is 1812. RADIUS Secret: The secret key between authentication server an [...]
-
Seite 73
67 Force Reinitialize: Force the subscriber to reinitialize connection to the port. Force Reinitialize All: Force Reinitialize for all port s at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration S tatistics: Choose the port which you want to sh ow of 802.1X statistics, the screen include Authenticator counters, ba cke[...]
-
Seite 74
68 Fig. 4-17 802.1X S tatistics Function name: 802.1x Parameters Function description: In here, user can enable or disabl e Re authentication function and specify how often a clien t has to re-enter his or her u sername and password to st ay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authenticatio[...]
-
Seite 75
69 4-2-9 IGMP Snooping Function name: IGMP Snooping Config uration Function description: IGMP snoopi ng enable group multicast traffic to only be forwarded to port s that are members of that grou p; thus allowing you to significa ntly reduce multicast traffic p assing through the switch. All the functions should press <Apply> button to st art[...]
-
Seite 76
70 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the tra ffic of the network, this switch supports one port mirror multi ports. For example, we assume that Port A and Port B are Source Ports and Po rt C is Mirror Port respective ly. The traffic passed by Port A and Port B w[...]
-
Seite 77
71 4-2-1 1. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make preced ence of 8 pr iorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Fig. 4-21 QoS Configuration[...]
-
Seite 78
72 Function name: QoS Configuration Function description: When you want to use QoS functio n, please select QoS Mode through th e drop-down menu in advance you can choose from 802.1p Priorit y or DSCP Priority to take effect. In this function, you can disabl e QoS Mode and choose any other Priority Control and enable i t, such as 802.1p and DSCP . [...]
-
Seite 79
73 Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SER VICE TYPE field to accommodate a set of diff erentiated services (DS). Under the differentiated services interpretation, the first six bi ts comprise a codepoi nt, which is sometimes abbre viated DSCP , and the last two bits are l[...]
-
Seite 80
74 4-2-12 Filter Function name: Filter Configuration Function description: This function can set manageme nt’s source IP Address to each port, simple and raise safety . After completing the function’s setting, press <Apply> button to have this fu nction in effect. Parameter description: Source IP Filter: Mode: There are three types of mod[...]
-
Seite 81
75 Fig. 4-24 Filter Configuration[...]
-
Seite 82
76 4-2-13 Rate Limit Function name: Ingress and Egress Ban dwidth Setting Function description: Ingress and Egress Ban dwidth Setting function is used to set up the limit of Ingress or Egress band width for each po rt. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded i[...]
-
Seite 83
77 4-2-14 Storm Control Function name: S torm Control Function description: S torm Control is used to block unnece ssary frames of the multicast and broadcast that would have reduce d the switch’ s performance. When the frames of multicast or broadcast are ov er the rate and S trom Control is enabled, the frames that exceed t he determined rate c[...]
-
Seite 84
78 Parameter description: ICMP Rate: T o enable the ICMP S torm cap ability . The user can use drop-do wn menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Learn Frames Rate: T o enable the Learn Frames S torm capability . The user can use drop- down menu to select number of fram es. Default is No Limit[...]
-
Seite 85
79 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can m anage the Managed devices equipped with SNMP agent, provided that the Management In formation Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between S NMP[...]
-
Seite 86
80 Default SNMP function: Disable Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig. 4-27 SNMP Configuration[...]
-
Seite 87
81 4-3. Monitoring There are six functions under in the moni toring function. S tatistics Overview Detailed S tatistics Monitorin g LACP S tatus RSTP S tatus IGMP S tatus Pin g[...]
-
Seite 88
82 4-3-1. St atistics Overview The function of Statistics Overview coll ects any information and p r ovides the counting summary about the traf fic of the port, no matter the packet is good or bad. In the Fig. 4-25, the window can show all ports’ counter information at the same time. If the counting overflows, t he counter will be reset the count[...]
-
Seite 89
83 4-3-2. Det ailed St atistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’ s traffic. In the Fig. 4-26, the window can show all cou nter information each port at one time. Parameter description: Rx Packets: The counting number of the p acket received. RX Octets: T otal received byte[...]
-
Seite 90
84 Tx Broad- and Multicast: Show the counting number of the t r ansmitted broadcast with multicast packet. Tx Error Packet s: Show the counting number of the received error p ackets. Rx 64 Bytes: Number of 64-byte frames in good a nd bad packets received.[...]
-
Seite 91
85 Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and ba d packets received. Rx 256-51 1 Bytes: Number of 256 ~ 511-byte frames in good and ba d packets received. Rx 512-1023 Bytes: Number of 512 ~ 1023-byt e frames in good and bad packet s received. Rx 102[...]
-
Seite 92
86 Tx Collisions: Number of collisions transm itting frames experienced. Tx Drops: Number of frames dropped due to excessive collision, late collision, or frame aging. Tx Overflow: Number of frames dropped due to the lack of transmitting buffer. Fig. 4-29 Detailed S tatistics for each port[...]
-
Seite 93
87 4-3-3. LACP S tatus Function name: LACP S tatus Function description: Display the LACP status. In the Fig. 4-30, the window can show LACP information and statu s for each port at one time. Parameter description: LACP Aggreg ation Overview: Show the group/port st atus. Red signs are set by default for link down ports; user ar e recommended to ref[...]
-
Seite 94
88 4-3-4. RSTP S tatus Function name: RSTP S tatus Function description: Display the RSTP st atus. In the Fig. 4-28, the window can show the VLAN bridge information and st atuses of 1~24 ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id. Bridge Id: Show this switch’ s current bridge priority setting and bridge ID [...]
-
Seite 95
89 Fig. 4-31 RSTP S tatus[...]
-
Seite 96
90 4-3-5. IGMP S tatus Function name: IGMP S tatus Function description: Display the IGMP status. In the Fig. 4-29, the window can show VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queri es status. Queries transmitted: T o count the group membership queri[...]
-
Seite 97
91 Fig. 4-32 IGMP S tatus[...]
-
Seite 98
92 4-3-6. Ping St atus Function name: Ping S tatus Function description: T o setting up the target IP address for ping function of ICMP protocol and display the pinging st atus. In the Fig. 4-30, the window can show t he pinging information. Parameter description: Ping Parameters: T arget IP address: Set up a T arget IP address to ping. Count: Use [...]
-
Seite 99
93 Fig. 4-33 Ping[...]
-
Seite 100
94 4-4. Maintenance There are five functions under the maintenan ce section. Wa r m R e s t a r t Factor y Default Maintenance Software Up g rade Confi g uration File Transfer Lo g out[...]
-
Seite 101
95 4-4-1. W arm Restart We offer you many ways to reboot the switch, toggle the power, hardware reset and software reset. Y ou can press the RESET butt on in the front panel to reset the switch to its default setting. Afte r upgrading software, you must reb oot to have the new configuration ta ken effect. Here we will be discussing the software res[...]
-
Seite 102
96 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and repl ace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed. If you want to restore all [...]
-
Seite 103
97 4-4-3. Sof tware Upgrad e Function name: Software Upg r ade Function description: Browse through your PC for a newer ve rsion of software pre-saved on your PC and upgrade the switch. Fig. 4-36 Software Up grade[...]
-
Seite 104
98 4-4-4. Configuration File T ransfer Function name: Configuration File Transfe r Function description: Backup the switch’s config uration file on to your computer to prevent acci dental data lost. If a device configuration crash occurs, or to configure a new switch, this pre-saved configuratio n backup file can be used to quickly restore the sw[...]
-
Seite 105
99 4-4-5. Logout Besides the auto logout function as we mentioned in the system configuration section, the swit ch also allows the user to logout manually by performing Logout function. Function name: Logout Function description: The switch allows you to logout the sy stem to preve nt unwanted accesses by other users without permi ssion. If you do [...]
-
Seite 106
100 5. Maintenance 5-1. Resolving No Link Condition The possible cause s for a no link LED st atus are as follows: z The attached device is not powered on z The cable may not be the correct type or is faulty z The installed building p remise cable is faulty z The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot co[...]
-
Seite 107
101 Appendix A Technical Specifications Features • 20 (10/100/1000Mbp s) Gigabit Ethernet (TP) switching port s are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward sh ared-memory Web-Smart switched. • Supports auto-ne gotiation [...]
-
Seite 108
102 Hardware Specifications St andard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x Network Interface: Configuration Mode Connector Port 10/100/1000Mbp s Gigabit TP NW ay TP (RJ-45) 1 - 24 1000Base-SX Gigabit Fiber 1000 FDX *SFP 21,22,23,24 (Option) 1000Base-LX Gigabit Fiber 1000 FDX *SFP 21,22,23,24 (Option) 1000Base-LX Single F[...]
-
Seite 109
103 Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT , 1 0/100/1000Mbp s 1000M SFP Fiber Port 21,22,23,24 : SFP(LINK/ACT) Power Requirement : AC Line V oltage : 100 ∼ 240 V Frequency : 50 ∼ 60 Hz Consumption : 30W Ambient T emperature : 0 ° to 50 ° C Humidity : 5% to 90% Dimensions :[...]
-
Seite 110
104 Management Software Specifications System Configuration Auto-negotiation support on 10/100Base-T X ports, Web brow s er can set transmission speed (10/100Mbps) and operat ion mode (Full/Half duplex) on each port, ena ble/disable any por t, set VLAN group, set T runk Connection. VLAN Function Port-Base / 802.1Q-T agged, allowed up to 24 active V[...]
-
Seite 111
105 Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below . PRIV A TE-ES-5240G+-MIB DEFINITIONS ::= BEGIN IMPORTS mib-2, DisplayS tring,ifIndex FROM RF C1213-MIB enterprises,Counter , T imeTicks , Gauge,IpAddress FROM RFC1 155-SMI OBJECT -TYPE FROM RFC-1212 TRAP-TYPE FROM RFC-1215; privatetech OB JECT IDENTIFIER :[...]