Hawking Technology HGMS224 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 128 Seiten
- 4.76 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Switch
Hawking Technology 100
15 Seiten 0.38 mb -
Switch
Hawking Technology 10M
25 Seiten 1.48 mb -
Switch
Hawking Technology 1000M
15 Seiten 0.38 mb -
Switch
Hawking Technology HGMS224
128 Seiten 4.76 mb -
Switch
Hawking Technology CS154F
15 Seiten 0.27 mb -
Switch
Hawking Technology 100M
25 Seiten 1.48 mb -
Switch
Hawking Technology SAE8
8 Seiten 0.09 mb -
Switch
Hawking Technology 10
15 Seiten 0.38 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Hawking Technology HGMS224 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Hawking Technology HGMS224, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Hawking Technology HGMS224 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Hawking Technology HGMS224. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Hawking Technology HGMS224 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Hawking Technology HGMS224
- Den Namen des Produzenten und das Produktionsjahr des Geräts Hawking Technology HGMS224
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Hawking Technology HGMS224
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Hawking Technology HGMS224 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Hawking Technology HGMS224 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Hawking Technology finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Hawking Technology HGMS224 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Hawking Technology HGMS224, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Hawking Technology HGMS224 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
1[...]
-
Seite 2
FCC Warning This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These lim itations are designed to provide reasonable protection against harmful interference in a residential installation. This equipm ent generates, uses and can radiate radio frequency energy and, if[...]
-
Seite 3
3 no warranty or representation, expressed, implied or statutory, with respect to its products or the contents or use of this documentation and all accompanying software, and specifically disclaim s its quality, performance, merchantability, or fitness for any particular purpose. Hawking Technology reserves the right to revise or update its product[...]
-
Seite 4
1. Introduction 7 2. Package Contents 8 3. Hardware Installation 9 4. Initial Setup for Management 11 4.1 Out-of-band Terminal Mode Configuration 11 4.2 In-band Management through Ethernet 12 4.3 Telnet Management 14 5. Web Management 16 5.1 Web Management Home Page Overview 16 5.2 Port Status 17 5.3 Port Statistics 19 5.4 Administrator 20 5.4.1 IP[...]
-
Seite 5
5.4.10 SNMP/Trap Manager 48 5.4.11 Security Manager 49 5.4.12 802.1x Configuration 50 5.4.13 Web Cluster 53 5.5 TFTP Firmware Update 55 5.6 Configuration Backup 56 5.6.1 TFTP Restore Configuration 56 5.6.2 TFTP Backup Configuration 56 5.7 Reset System 57 5.8 Reboot 57 6. Console – Firmware Update 58 7. Out-of-band Management 61 7.1 Main Menu 62 7[...]
-
Seite 6
7.2.8 MAC Address Configuration 87 7.2.8.1 Static MAC Address 87 7.2.8.2 Filtering MAC Address 91 7.3 Protocol Related Configuration 95 7.3.1 Spanning-Tree Protocol 95 7.3.1.1 Enabling STP 96 7.3.1.2 STP System Configuration 97 7.3.1.3 Per Port Configuration 98 7.3.2 SNMP 99 7.3.2.1 System Options 100 7.3.2.2 Community Strings 101 7.3.2.3 Trap Mana[...]
-
Seite 7
Hawking Technologies’ HGMS224 24-Port 10/100 Layer 2 Managed Switch ( Intelligent ) + 2- Port Gigabit Module Slot is a high performance, web-m anaged SNMP (simple network management protocol) Layer 2 switch that provides users with (24) 10/100Mbps Ethernet ports and (2) 1000Mbps gigabit ports. The switch features SNMP management and remote contro[...]
-
Seite 8
The complete HGMS224 package consists of: x One HGMS224 24-Port 10/100 Layer 2 Managed Switch ( Intelligent ) + 2-Port Gigabit Module Slot x Rack mount kit: 2 mounting brackets and screws x Four rubber feet with adhesive backing x One AC power cord x One RS-232 cable x One user’s manual x One CD Check to make sure that the un[...]
-
Seite 9
Please follow the guidelines below when choosing a location to install the switch: x The surface must support at least 3 kg. Do not place heavy objects on the switch. x Visually inspect the power cord and AC power connector. x Make sure that there is proper heat dissipation from and adequate ventilation around the switch. Desktop or Shelf [...]
-
Seite 10
x If the fans are working properly, the “Fan” LEDs will remain unlit. If either or both of the fans stop or fail, the corresponding “Fan” LED(s) will be lit red. LED Indicators St a t u s LED Color Solid Blinking Power Green The device is powered on N/A Diagnostic Green Self diagnostic successful Performing self diagnostic (after power o[...]
-
Seite 11
There are two ways to perform the initial setup for the Switch: a. “Out-of-Band Configuration” - connect y our PC’s serial port to the switch’s console port with the included RS-232 serial cable and run the terminal communication program b. “In-Band Configuration”- network a PC to the switch and run a web browser or telnet. The sections[...]
-
Seite 12
4.2 In-band Configuration through Ethernet In addition to terminal mode configuration, the switch also supports in-band configuration via a web browser. Web browser configuration is easier than terminal mode configuration because the user can simply connect the network-ready PC to the switch, open the web browser, go to the switch’s configuration[...]
-
Seite 13
Modify the Switch’s IP Address via the Out-of-Band Method 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Log into the console (default username: admin, default password: 123). Use the Tab key to select (highlight) “Switch Static Configuration” and hit Enter . Use the Tab key to select “Administration Configuration” and hit Enter . Use the Tab key to [...]
-
Seite 14
4.3 Telnet Management In addition to local terminal mode operation, the switch supports remote m anagement through Telnet over the network or even over the Internet for browser-less environments. In this mode, before executing the Telnet program, you will again be asked to modify the IP Configuration settings as required for management via a web br[...]
-
Seite 15
15[...]
-
Seite 16
5.1 Web Management Home Page Overview Connection Icon From this page, you can view the link status of every port on the switch. If a given port is linked, it will be represented by a connection icon (see figure above) within the switch diagram/diagnostic at the top of the page. In the column on the left side of the page, you can click on the functi[...]
-
Seite 17
5.2 Port Status This page provides a display of the current status of every port on the switch. The status depends on the user settings and the negotiation results. 1. State: Displays port status: either disabled or enabled . “Unlink” will be treated as “off ”. 2. Link Status: “ Down” indicates that the port is not linked, “Up” indi[...]
-
Seite 18
7. Rate Control (100K): Displays the rate control setting. “Ingr”: Displays the port’s effective ingress rate. “Egr”: Display the port’s effective egress rate. 8. Port Security: Display the port security is enabled or disabled. 9. Config (located beneath the “Flow Control” category) : Displays the state of the user settings. 10. Act[...]
-
Seite 19
5.3 Port Statistics This page provides a display of the current status of the entire unit. Press the Reset button to clear all counters on this page. 19[...]
-
Seite 20
5.4 Administrator Many of the management functions can be set or performed by clicking on Administrator in the left column of the page. Once you have clicked on Administrator , you will see a menu that includes the following categories: IP Address Switch Settings Console Port Info Port Controls Trunking Fil[...]
-
Seite 21
5.4.2 Switch Settings 5.4.2.1 Basic All information in the Basic section is read-only. Therefore, you will not be able to modify its contents. Description: Displays what type of device you are using. MAC Address: The unique hardware address assigned by the manufacturer (default). Firmware Version: Displays the firmware version of the switch. Hardwa[...]
-
Seite 22
5.4.2.2 Module Info All information in the Module Info section is read only. Therefore, you will not be able to modify its contents. Its purpose is to display the module card information. 5.4.2.3 Advanced Miscellaneous Settings: MAC Table Address Entry: Age-out Time: Type in the number of seconds that an inactive MAC address remains in the s[...]
-
Seite 23
Broadcast Storm Filter Mode: To configure broadcast storm control, enable it and set the upper threshold for individual ports. The threshold is the percentage of the port's total bandwidth used by broadcast traffic. When broadcast traffic for a port rises above the threshold you set, broadcast storm control becomes active. The valid threshold [...]
-
Seite 24
Enable Delay Bound: Limit the queuing time of low priority packets in the switch. The default “Max Delay Time” is 255ms. If the low priority packet stays in the switch longer than the “Max Delay Time”, it will be sent. The valid range is 1-255ms. QoS Policy: High Priority Levels – Priority levels from 0-7 can be mapped to high or low queu[...]
-
Seite 25
5.4.3 Console Port Information The Console has a standard UART interface to communicate with the serial port. You can use the Windows HyperTerminal program to establish a link to the switch. Connect To -> Configure: Bits per seconds: 9600 Data bits: 8 Parity: none Stop Bits: 1 Flow control: none 25[...]
-
Seite 26
5.4.4 Port Controls User may modify or change mode operation in this page. 1. State: You can enable or disable the port control for each port. 2. Auto Negotiation: You can set the auto negotiation mode to Auto, N-way (specify the speed/duplex on a specific port and enable auto-negotiation), or Force for each port. 3. Speed: You can set the speed at[...]
-
Seite 27
6. Rate Control: Ports 1-24 support ingress and egress rate control for each port. For example, assume that Port 1 is set at 10Mbps. You can set its effective egress rate at 1Mbps and ingress rate at 500Kbps. The device will perform flow control or backpressure to confine the ingress rate to the specified rate. Ingress: Type the effective ingress r[...]
-
Seite 28
5.4.5 Trunking The Link Aggregation Control Protocol (LACP) provides a standardized means for: a. exchanging information between partner systems on a link, to allow their Link Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs, b. moving the link to that Link Aggregation Group, a[...]
-
Seite 29
2. Group ID: You can configure up to seven trunk groups. Choose the "Group ID" and click "Get". 3. LACP: If enabled, the group is an LACP static trunking group. If disabled, the group is a local static trunking group. All ports support LACP dynamic trunking groups. If connecting to a device that also supports LACP, the LACP dyna[...]
-
Seite 30
2. The page shown below displays the static trunking groups. 3. The page shown below displays “Actor” and “Partner” trunking. 30[...]
-
Seite 31
5.4.5.3 State Activity Active (select) : The port automatically sends LACP protocol packets. N/A (not selected) : The port does not automatically sends LACP protocol packets, and responds only if it receives LACP protocol packets from the opposite device. 1. A link that either has two active LACP ports, or one active port can perform dynamic LACP t[...]
-
Seite 32
5.4.6 Filter Database 5.4.6.1 IGMP Snooping The switch supports IP multicasting. You can enable the IGMP protocol in the “IGMP Snooping” section. IGMP snooping information is displayed on this page. You can view different multicast groups, VIDs and member ports in this section. IP multicast addresses range from 224.0.0.0 to 239.255.255.255. 32[...]
-
Seite 33
The Internet Group Management Protocol (IGMP) is an internal protocol within the Internet Protocol (IP) suite. The IP suite manages multicast traffic by using switches, routers, and hosts that support IGMP. Enabling IGMP allows the ports to detect IGMP queries and report packets, and manage IP multicast traffic through the switch. IGMP has three fu[...]
-
Seite 34
5.4.6.2 S tatic MAC Address When you add a static MAC address, it remains in the switch's address table, regardless of whether or not the device is physically connected to the switch. This saves the switch from having to re-learn a device's MAC address when the disconnected or powered-off device is active on the network again. 1. Click on[...]
-
Seite 35
4. If tag-based (IEEE 802.1Q) VLANs are set up on the switch, static addresses are associated with individual VLANs. Type in the VID (tag-based VLAN ID) to associate with the MAC address. 5. Click the Add button. 5.4.6.3 MAC Filtering MAC address filtering allows the switch to drop unwanted traffic. Traffic is filtered based on the destination addr[...]
-
Seite 36
5.4.7 VLAN Configuration A Virtual LAN (VLAN) is a logical network grouping that limits the broadcast domain. It allows you to isolate network traffic so only members of the VLAN receive traffic from the same VLAN members. Basically, creating a VLAN from a switch is logically equivalent to reconnecting a group of network devices to another Layer 2 [...]
-
Seite 37
Port-based VLAN Packets can only be broadcast among members of the same VLAN group. Note that all unselected ports are treated as belonging to another single VLAN. If the port-based VLAN is enabled, the VLAN-tagging is ignored. 37[...]
-
Seite 38
Tag-based VLAN (IEEE 802.1Q VLAN) Tag-based VLAN is an IEEE 802.1Q specification standard. Therefore, it is possible to create a VLAN across devices from different switch vendors. IEEE 802.1Q VLAN uses a technique to insert a “tag” into the Ethernet frames. Tags contain a VLAN Identifier (VID) that indicates the VLAN numbers. Prot[...]
-
Seite 39
5.4.7.1 Port-Based VLAN 39 1. Click Add to create a new VLAN group. 2. Enter the VLAN name and group ID, and select the mem b ers for the new VLAN. 3. Click Apply . 4. If there are more groups than the viewable box can display, you can click Next Page to view other VLAN groups. NOTE: If the trunk groups already exist, you can view them (ex: TRK1, T[...]
-
Seite 40
5.4.7.2 T ag-based (IEEE 802.1Q) VLAN This page, user can create Tag-based VLAN, and enable or disable GVRP protocol. There are 256 VLAN groups to provide configure. Enable 802.1Q VLAN, the all ports on the switch belong to default VLAN, VID is 1. The default VLAN can’t be delete. GVRP (GARP [Generic Attribute Registration Protocol] VLAN Registra[...]
-
Seite 41
Basic Create a VLAN and add tagged member ports to it. 1. Click on the “Basic” tab, and then click Add to reach the page shown below. 2. Type a name for the new VLAN. 3. Type a VID (between 2-4094). The default is 1. 4. Choose the protocol type. 5. From the column box on the left that displays the available ports, select the ports you wo[...]
-
Seite 42
6. Click Next . Then you can view the page as follows: 7. Use this page to set the outgoing frames as VLAN-tagged frames, if necessary. Then click Apply . Tag: outgoing frames that are VLAN-tagged. Untag: outgoing frames that are not VLAN-tagged. 42[...]
-
Seite 43
Port VID Configure Port VID Settings From the main tag-based (IEEE 802.1Q) VLAN page, click the “Port VID” tab. 43 Port VID (PVID) Set the port VLAN ID that will be assigned to untagged traffic on a given port. This feature is useful for accommodating devices that you want to participate in the VLAN but that don’t support tagging. Each[...]
-
Seite 44
Ingress Filtering Ingress filtering allows frames that belong to a specific VLAN to be forwarded if the port belongs to that VLAN. The switch has two ingress filtering rules. They are as follows: Ingress Filtering Rule 1: Only forward packets with VIDs matching this port’s configured VID. Ingress Filtering Rule 2: Drop untagged frames. 5.4.8 Span[...]
-
Seite 45
2. You can also view the spanning tree status of the switch. A sample is shown below. 45[...]
-
Seite 46
3. You can change the settings for the STP parameters. Then click Apply . Parameter Description Priority You can change the priority value, which is a value used to identify the root bridge. The bridge with the lowest value has the highest priority and is selected as the root. Enter a number between 1 and 65535. Max Age You can change the max age v[...]
-
Seite 47
4. The following parameters can be configured on each port. Click Apply after you have made the appropriate changes. Parameter Description Port Priority You can increase the priority level for a port to become the root port. The range is 0-255, and the default setting is 128. The lowest number has the highest priority. Path Cost This parameter spec[...]
-
Seite 48
3. Monitored Port: The ports y ou want to monitor. All monitor port traffic will be copied to sniffer port. You can select max 25 monitor ports in the switch. User can choose which port that they want to monitor in only one sniffer mode. If you want to disable the function, you must select “None” in the “Analysis Port” category . 48[...]
-
Seite 49
5.4.10 SNMP/T rap Manager Any network management platform that is running the Sim ple Network Management Protocol (SNMP) can manage the switch, provided the Management Information Base (MIB) is installed correctly on the management station. SNMP is a protocol that governs the transfer of inform ation between management station and agent. 1. System [...]
-
Seite 50
3. Trap Managers: A trap manager is a managem ent station that receives traps, which are the system alerts generated by the switch. If no trap manager is defined, no traps are issued. Create a trap manager by entering the IP address of the station and a community string. 5.4.1 1 Security Manager On this page, you can change the user name and passwo[...]
-
Seite 51
5.4.12 802.1x Configuration System Configuration 802.1x makes use of the physical access characteristics of IEEE 802 LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authenti[...]
-
Seite 52
Per Port Configuration In this page, you can select a specific port and configure the authorization state. You can select from a list of four authorization states for each port: Fu: Forces a specific port to be unauthorized. Fa: Forces a specific port to be authorized. Au: The state of a specific port is determined by the outcome of the authenticat[...]
-
Seite 53
Misc Configuration In this page, you can change the default configuration for the 802.1x standard: Quiet Period: Used to define periods of time during which it will not attempt to acquire a supplicant (default time is 60 seconds). Tx Period: Used to determine when an EAPOL PDU is to be transmitted (default value is 30 seconds). Supplicant Timeout: [...]
-
Seite 54
5.4.13 W eb Cluster This switch provides a new management tool for you to manage a group of LAN switches through a master switch. It is called the “Web Cluster” function. This function allows the manager switch (also called “master switch”) to fetch the web pages from the managed switches to the user ‘s browser. The MIS can store informat[...]
-
Seite 55
There are 16+1 rows in the web cluster menu. The top row, with the deep blue background, indicates the master switch IP and cannot be modified. The other 16 rows, in a lighter blue background, can be added with managed switches by clicking Add/Del Switches . In the row, there is specific information about the managed switch: host nam es and their I[...]
-
Seite 56
5.5 TFTP Firmwar e Update The following menu options provide some system control functions to allow you to update the rmware and remote boot switch system: are”. x new image.bin file by clicking Apply . te is completed, click Reboot to restart the switch. fi x Install the TFTP program (such as Turbo98, or Cisco TFTP) and then execute. x [...]
-
Seite 57
5.6 Configuration Backup 5.6.1 TFTP Restore Configuration Use this page to set the FTP server address. You can restore the EEPROM value from here, but you u image. .6.2 TFTP Backup Configuration m st put the image back in the FTP server; the switch will download back the flash 5 se this page to set the TFTP server IP address. You can save the curre[...]
-
Seite 58
5.7 Reset System In this page, y ou can reset the switch to its default configuration. The default value is shown elow. b .8 Reboot 5 this page, you can reboot the switch in software reset. In 58[...]
-
Seite 59
Console - 1K Xmodem Firmware Update s mode. So you must change the baud rate to 57600bps to download the firmware. here are two situations in which to use the 1K X modem to update the firm ware: . You can enter "1K X modem receiver m ode" by pressing any key within 5 seconds of the system power being turned on. . The system automatically [...]
-
Seite 60
2. Press the “Connect” button and you will see “CCCC…”displayed on the console. Then go to Transfer > Send File . 3. Select 1K Xmodem under the Protocol item, and list the directory for the image file folder. Then click Send . 60[...]
-
Seite 61
4. Start downloading the image file. 5. Finish downloading the file and the switch system will update the firmware automatically. If the message “Update firmware…ok…” appears, the switch will reboot. Please change the baud rate to 9600bps. 61[...]
-
Seite 62
Out-of-band Terminal Mode Management . The switch also provides a serial interface to manage and monitor the switch. You can follow the steps outlined in the “Console Port Info” section of the web interface for using the Windows HyperTerminal program to link the switch. . You can type a user name and password to login. The default user name is [...]
-
Seite 63
7.1 Main Menu The Switch Static Configuration: Allows you to configure the switch. Protocol Related Configuration: Allows you to configure the protocol function. Status and Counters: Displays the status of the switch. Reboot Switch: Allows you to restart the system or reset switch to its default configuration. TFTP Update Firmware: Uses TFTP to dow[...]
-
Seite 64
7.2 Switch Static Configuration ou can press the Tab or Backspace keys to choose an item, and then press Enter to select the his section. to previous menu. es, ues. Previous Page>: Allows you to return to the previous page. Y item. The action menu, shown below, applies for configuration in t <Quit>: Allows you to exit the current page and [...]
-
Seite 65
7.2.1 Port Configuration From this page, you can manipulate the status of every port. ress Spacebar to toggle between items. You can adjust the input rate (100K per unit). The valid range is 0-1000. ge is 0-1000. 1-1000: valid range of rate values. P 1. InRate (100K/unit): 0: disables rate control. 1-1000: valid range of rate values. 2. OutRate (10[...]
-
Seite 66
3. Enabled: You can enable or disable the ports. “No” indicates that the port is disabled. . Auto: You can set the auto-negotiation mode to either “Auto”, “N-way Force” or “Force” for each port. . Spd/Dpx: You can set the speed of ports 1-24 to either 100Mbps or 10Mbps. You can set the speed of ports 25 & 26 at either 1000Mbps, [...]
-
Seite 67
7.2.2 Trunk Configuration Thi m of seven trunk groups. You can arbitrarily select up t nk group. 1. Select <Edit> on the “actions” menu 2. Press the spacebar to configure the m ember ports of a trunk group. You will also have to set the corresponding trunk groups between TRK1 and TRK7 to “Static” or “LACP”. “Static” – the st[...]
-
Seite 68
6. All ports in the same static trunk group will be treated as a single port. So when you set the VLAN members and port configuration, they will be toggled on or off simultaneously. VLAN groups exist, all of the members of a static trunk group must be in the sam e VLAN roup. NOTE: If g 68[...]
-
Seite 69
7.2.3 VLAN Configuration The page below allows y ou to set the VLAN mode to port-based VLAN, 802.1Q VLAN, or “Disable”. 69[...]
-
Seite 70
NOTE : Whenever you change the VLAN settings, you will need to restart the switch. the VLAN mode is set to 802.1Q VLAN, you can set PVIDs, as well as ingress filtering 1 and gress filtering 2 in this section. . PVID (Port VID: 1-255): Type in the PVID. . Non-Member Drop: Same as Ingress Filtering Rule #1 on the web interface. Only forwards packets [...]
-
Seite 71
7.2.3.1 Create a VLAN Group Ϭʳ Create a Port-Based VLAN Create a port-based VLAN and add member/nonm ember ports to it. 1. Select <Edit> . 2. VLAN Name: Type in a name for the new VLAN. 3. Grp ID: Type in the VLAN group ID. The group ID range is 1-4094. 4. Member: Press Spacebar to choose the VLAN members. There are two options: i. Member: [...]
-
Seite 72
Ϭʳ Create an 802.1Q VLAN Create an 802.1Q VLAN and add tagged /untagged member ports to it. 2. VLAN Name: Type in a name for the new VLAN. in a VID between 1-4094. The default is 1. You can configure up to a. UnT AN group and outgoing frames are NO VLAN group and outgoing frames are c. NO: The port is NOT a member of this VLAN group. 6. Press Ctr[...]
-
Seite 73
NOTE: If the trunk groups already exist, you can view them (ex: TRK1, TRK2…) after port 26 in the menu f ports and configure them as the mem bers of a VLAN. 7.2.3 d In th g 1. Press <E 2. Choose the edit or delete and then press Enter . 3. You can membe r por . 4. After ed g . o .2 E it/Delete a VLAN Group is pa e, you can edit or delete a VLA[...]
-
Seite 74
. Pressing <Enter> once will complete deletion when in delete mode. . The VLAN Name and VLAN ID cannot be modified. . The default VLAN cannot be deleted. .2.3.3 Groups Sorted Mode this page, you can sort the VLAN groups by: .N a m e .V I D NOTE : 1 2 3 7 In 1 2 74[...]
-
Seite 75
The Edit/Delete a VLAN group page will display the result. Shown below is the page if sorted by name. 75[...]
-
Seite 76
Shown below is the page if sorted by VID. 7.2.4 Miscellaneous Configuration 76[...]
-
Seite 77
7.2.4.1 MAC Age Interval he valid range is 300-765 seconds. The default value is 300 seconds. Type the number of seconds that an inactive MAC address remains in the switch’s address table. T 77[...]
-
Seite 78
7.2.4.2 Broadcast S torm Filtering .P r e s s Spacebar to choose the threshold value. he valid threshold values are 5%, 10%, 15%, 20%, 25% and NO. The default value is 5%. 7.2.4.3 Max Bridge T ransmit Delay Bound 1. Max bridge transmit delay bound: Limits the queuing time of the packets in the switch. If enabled, the queued packets that exceed the [...]
-
Seite 79
NOTE: Make sure “Max bridge transit delay bound control” is enabled before enabling “Low Queue Delay Bound” because “Low Queue Delay Bound” can only work when “Max bridge ansit delay bound control” is enabled. .2.4.4 Port Security port in security mode will be “locked” without permission of the address learning. Norm ally You ad[...]
-
Seite 80
80 1. Select <Edit> . .P r e s s Spacebar to choose whether to enable or disable the item. .P r e s s Ctrl + A to go back to the action menu. . Select <Save> to save all configured values. .2.4.5 Collision s Retry Forever ollisions Retry Forever: Disable – In half-duplex, if collisions occur, the system will retry 2 3 4 5. You can pre[...]
-
Seite 81
81[...]
-
Seite 82
7.2.5 Administration Configuration 82[...]
-
Seite 83
7.2.5.1 Change Username From this page, you can change the web manageme nt username. Type in the new username, and en press <Save> . .2.5.2 Change Password se this page; user can change web managem ent login password. th 7 U 83[...]
-
Seite 84
.2.5.4 IP Configuration From this page, you can configure the IP settings 7.2.5.3 Device Information From this page, you can configure the device information. 7 . 84[...]
-
Seite 85
N uration 7.2.6 Port Mirroring Config d networks. Traffic through ports can be monitored via one designated port. Traffic through ports can be monitored by one specific ort. That is, traffic going in or out of monitored ports will be duplicated into the monitoring port. Press Spacebar to change the configuration of each item. 1. Select <Edit>[...]
-
Seite 86
7.2.7 Priority Configuration 86 7.2.7 he static priority is based on the port: if y ou set the port priority to high, incoming frames from is port will always be high priority frames. .1 Port S tatic Priority T th[...]
-
Seite 87
7.2.7.2 802.1p Priority Configuration ueues are assigned high/low priority levels from 0-7. . Select <Edit> . 2. Press Spacebar to select the priority level mapping to high or low queue. 3. High/Low Queue Service Ratio H/L: You can select the ratio of high priority packets and low priority packets. 4. Press Ctrl + A to go back to the action m[...]
-
Seite 88
7.2.8 MAC Address Configuration 7.2.8.1 S tatic MAC Address hen you add a static MAC address, it remains in the switch's address table, regardless of hether the device is phy sically connected to the switch. This saves the switch from having to re- arn a device's MAC address when the disconnected or powered-off device is active on the net[...]
-
Seite 89
Add static MAC address ʳ ʳ 1. Press the <Add>, <Edit> key s to add static MAC addresses. ʳ 2. MAC Address: Enter the MAC address to and from which the port should permanently forward traffic, regardless of the device’s network activity. ʳ 3. Port num: Press Spacebar to select the port number. 4. VLAN ID: If tag-based (802.1Q) VLAN[...]
-
Seite 90
Edit Static MAC Addresses 1. Press the <Edit> key. 2. Choose the MAC address that you want to modify and then press enter. ʳ ʳ ʳ ʳ 3. 4. +A to go back to the action menu, and then select <Save> to save all ʳ ʳ ʳ ʳ ʳ ʳ ʳ ʳ ʳ Press the <Edit> key to modify all the items. ʳ Press Ctrl configured values. 90[...]
-
Seite 91
elete a filter MAC address. ʳ 3. When pressing <Enter> once will complete deletion on delete mode. Delete Static MAC Address ʳ 1. Press <Delete> key to d 2. Choose the MAC address that you want to delete and then press enter. ʳ 91[...]
-
Seite 92
7.2.8.2 Filtering MAC Address MAC ad . Traffic is filtered based on the destinat s. Add filter MAC address 1. Press <Add>, <Edit> to add a filter MAC address. 2. MAC Address: Type the MAC address to filter. 3. VLAN ID: If tag-based (802.1Q) VLANs are set up on the switch, type the VID to associate with the MAC address. 4. Press Ctrl + A[...]
-
Seite 93
ʳ Edit filter MAC address ʳ 1. Press the <Edit> key. 2. Choose the MAC address that you want to modify and then press enter. ʳ ʳ ʳ ʳ ʳ ʳ ʳ ʳ 93[...]
-
Seite 94
ʳ 3. Press <Edit> to modify all the items. ʳ 4. Press Ctrl + A to go back to the action menu, and then select <Save> to save all configured values. ʳ Delete filter MAC address ʳ ʳ 1. Press <Delete> to delete a filter MAC address. ʳ 2. Choose the MAC address that you want to delete and then press enter. ʳ 3. Pressing <Ent[...]
-
Seite 95
95[...]
-
Seite 96
.3 Protocol Related Configuration 7 .3.1 Spanning-Tree Protocol 7 The Spanning-Tree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loops in switched networks. When STP is enabled, it ensures that only one path at a time is active between any two nodes on the network. 96[...]
-
Seite 97
7.3.1.1 Enabling STP This page allows you to enable or disable the Spanning Tree function. Press Spacebar to select Enabled” or “Disabled”. “ 97[...]
-
Seite 98
7.3.1.2 STP System Configuration . You can view the spanning tree information about the Root Bridge on the left. . On the right, you can set new values for the STP parameters. OTE: For parameter descriptions, please see Section 2-4-8. 1 2 N 98[...]
-
Seite 99
7.3.1.3 Per Port Configuration 1. PortState: Displays the spanning tree status for each port – whether the port is forwarding or blocking. . PathCost: Specifies the path cost of the port that the switch uses to determine which ports are the forwarding ports. 4. Priority: This specifies the priority of port; you can make it more or less likely to [...]
-
Seite 100
7.3.2 SNMP Any network management running the Simple Network Managem ent Protocol (SNMP) can be sed to manage the switch. Use this page to define management stations as trap managers and to nter SNMP community strings. You can also define a name, location, and contact person for the witch. u e s 100 100[...]
-
Seite 101
Options 7.3.2.1 System .P r e s s <Edit> . . System Name: Type a name to be used for the switch. 3. System Contact: Type the name of contact person or organization. 4. System Location: Type the location of the switch. 5. Press Ctrl + A to go back to the action menu. 6. Press <Save> to save the configured values. 1 2 101[...]
-
Seite 102
gs se this age to Add/ Edit/ Delete SNMP community strings. . Community Name: The name of current strings. . Write Access: Indicates if the rights are read-only or read-write. Restricted: Read-only - enables requests accompanied by this string to display MIB-object information. Unrestricted: Read-write - enables requests accompanied by this string [...]
-
Seite 103
Add Community Name 1. Press <Add> --> <Edit> key. e right is restricted or unrestricted. Edit Community Name 1. Press <Edit> , choose the item that you want to modify, and then press Enter. 2. Community Name: Type the new name. 3. Write Access: Press Spacebar to set the rights to “Restricted” or “Unrestricted”. 2. Commu[...]
-
Seite 104
C and then press enter. Delete Community Name 1. Press <Delete> key. 2. hoose the community name that you want to delete 3. When pressing <Enter> once will complete deletion in delete mode. 104[...]
-
Seite 105
7.3.2.3 At r a p ted by the switch. by entering the IP address of the station and a community string. Add SNMP trap manager 1. Press <Add> , <Edit> to add the trap manager. 2. IP: Type the IP address. 3. Community Name: Type the community name. 4. Press Ctrl +A to go to the actions menu. Press <Save> key to save all configured val[...]
-
Seite 106
Edit trap managers .P r e s s <Edit> key, and then choose the item that you want to modify. . IP: Type the new IP address . Community Name: Type the community name. .P r e s s Ctrl +A go to actions line, press <Save> key to save all configure. 1 2 3 4 106[...]
-
Seite 107
Delete trap manager 1. Press the <Delete> key. 2. Choose the trap manager that you want to delete and then press Enter . 3. Pressing <Enter> once will complete deletion in delete mode. 107[...]
-
Seite 108
7.3.3 GVRP GVRP ( R l) VRP allows automatic VLAN configuration between the switch and corresponding nodes. For xample, if the switch is connected to a device with GVRP enabled, you can activate this setting to allow dynamic VLAN configuration information to be processed by the switch. If a device sends a GVRP request using the VID of a VLAN defined[...]
-
Seite 109
7.3.4 IGMP The Internet Group Management Protocol (IGMP) is an internal protocol of the Internet Protocol P) suite. (I This page you can enable / disable the IGMP support. . Select <Edit> . .P r e s s Spacebar to choose enabled / disabled. .P r e s s Ctrl + A to go back to the action menu. . Select <Save> to save configured values. 1 2 [...]
-
Seite 110
7.3.4.1 LACP (Link Aggregation Control Protocol) Note: All ports support LACP dynamic trunking groups. If connecting to a device that also supports LACP, the LACP dynamic trunking group will be created autom atically. 7.3.4.2 Working Port Setting This page can set the actual work ports within the trunk group. This page can configure and view the LA[...]
-
Seite 111
1. Select <Edit> . 2. Group: Displays the trunk group ID. . LACP Work Port Num: The maximum number of ports that can be aggregated at the same time. If the group is LACP static trunking, the excess ports are standby and able to aggregate if work ports fail. If the group is local static trunking, the num ber of ports m ust be the sam e as the [...]
-
Seite 112
7.3.4.4 LACP S tatus lational information here. LACP trunk group When you’re setting trunking group, you can see the re Static trunk group 112[...]
-
Seite 113
<Quit>: Exit this page and return to previous menu. Previous Page>: Return to previous page to view. .3.5 802.1x Protocol < <Next page>: Go to next page to view. 7 rom this page, you can configure and view the 802.1x status. F 113[...]
-
Seite 114
7.3.5.1 Enable 802.1x 1. Select .P r e s s .P r e s s 4. Select .3.5.2 802 <Edit> . Spacebar to choose enabled/disabled. Ctrl + A go back to the action menu. <Save> to save configure value. .1x System Configuration 2 3 7 114[...]
-
Seite 115
1. Press <Edit> . rver IP Address: the IP address of the authentication server. 3. Shared Key: A key shared between this switch and the authentication server. 4. NAS, Identifier: A string used to identify this switch. 5. Server Port: The UDP port number used by the authentication server to authenticate. 6. Accounting Port: The UDP port number[...]
-
Seite 116
3. Tx rmine when an EAPOL PDU is to be transmitted (default value is 30 sec ) 4. Sup a nt h e supplicant and authentication server (default value is 30 seconds). 5. Ser T authenticator and authentication server (default value is 30 seconds). 6. Re- h before a s (default value is 2 times). 7. Re- of seconds between periodic re-a is 3600 seconds). .P[...]
-
Seite 117
7.4.1 Port Status ink Status: Indicates whether the port is linked or not linked. Rate: Displays the input rate control (100K/unit) setting value. utRate: Displays the output rate control (100K/unit) setting value. nabled: Indicates whether the port is enabled or disabled. This depends on the user setting. nabled” will be displayed as “Yes”, [...]
-
Seite 118
<Quit> : Exit the “Port Status” page, and then return to the previous menu. Previous Page>: Displays the previous page. < <Next page>: Displays the next page. .4.2 Port Counters 7 he following information provides a view of the current status of the unit. ious page. T <Quit> : Exit the “Port Status” page and return t[...]
-
Seite 119
7.4.3 System Information MAC Address: The unique hardware address assigned by the manufacturer. irmware Version: Displays the switch’s firmware version. SIC Version: Displays the switch’s hardware version. ys the board number. erial number: Displays the serial number assigned by the manufacturer. on module card mode. odule 1 information: Displa[...]
-
Seite 120
7.5 Reboot Switch .5.1 Default 7 esets the switch to its default configuration. For default settings, please see Section 2-4-14. 7.5.2 Restart R Reboot the switch in software reset. 120[...]
-
Seite 121
7.6 TFTP Firmware Update his page provides you with the option to update the firmware, restore the EEPROM values, or pload current EEPROM values. T u 121[...]
-
Seite 122
7.6.1 TFTP Firmware Update This page allows you to use TFTP to update the firmware. 1. Start the TFTP server, and copy the firmware update version image file to the TFTP server. 2. Press <Edit> on this page. 3. TFTP Server: Type the IP of the TFTP server. 4. Remote File Name: Type the image file name. 5. Press Ctrl + A to go to the action men[...]
-
Seite 123
123 . Start the TFTP server. 2P 3 TFTP server. 4 5 6 to download. 7 ownloading as well. 8R 1 .r e s s <Edit> on this page. . TFTP Server: Type the IP of . Remote File Name: Type the image file name. .P r e s s Ctrl + A go to action line. .P r e s s <Save> , and the image file will begin . When saved successfully, the image file will hav[...]
-
Seite 124
7.6.3 Backup Configure File this page, you can save the current EEPROM value to the image file. Then go to the update onfigure page to restore the EEPROM value. the IP of the TFTP server. 4. Remote File Name: Type the image file name. 5. Press Ctrl + A to go back to the action menu line. 6. Press <Save> , and the image file will begin to down[...]
-
Seite 125
5.1 VLAN Application Used with Switch by formation and avoiding the complexity and heavy rocessing requirements of Layer 3 IP based routers. s a result, each group of stations connected to separate segmented ports forms a different olated broadcast domain. The broadcast sharing ports should be used to connect servers and ther common services, such [...]
-
Seite 126
Offers security by completely isolating from each other the different broadcast Network administrators can easily "fine tune" the network. ou can group users according to som e shared characteristic, such as a common business nction or a common protocol. A single switch ma y have several independent VLANs ithin it. On the followin[...]
-
Seite 127
127 127[...]
-
Seite 128
5.2 Trunking Application Used with Switch runking allows you to increase the available bandwidth between switches by grouping ports into trunk. Trunking can also be used to connect a server to switches if higher bandwidth service is quired. You can use trunking to improve the throughput between segments. Moreover, this itch provides trunking with a[...]