TP-Link TL-SG2008 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung TP-Link TL-SG2008 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von TP-Link TL-SG2008, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung TP-Link TL-SG2008 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung TP-Link TL-SG2008. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung TP-Link TL-SG2008 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts TP-Link TL-SG2008
- Den Namen des Produzenten und das Produktionsjahr des Geräts TP-Link TL-SG2008
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts TP-Link TL-SG2008
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von TP-Link TL-SG2008 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von TP-Link TL-SG2008 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service TP-Link finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von TP-Link TL-SG2008 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts TP-Link TL-SG2008, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von TP-Link TL-SG2008 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    TL-SG2008 8-Port Gigabit Smart Switch REV1.0.0 1910010984[...]

  • Seite 2

    I COPYRIGHT & TRADEMARKS S pecifications ar e subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., L TD. Other brands and product names are trademarks or registered trademarks of t heir respective holders. No part of the specificatio ns ma y be reproduced in any form or by any means or used to make any deriva[...]

  • Seite 3

    II Safety Information z When product has power button, the power button is one of the way to shut off the product; When there is no power button, the only way to co mpletely shut off power is to disconnect the product or the power adapter from the power source. z Don’t disassemble the product, or make repairs yourself. You run the risk of electri[...]

  • Seite 4

    III CONTENTS Package C ontent s ............................................................................................................... ........... 1 Chapter 1 About this G uide........................................................................................................... 2 1.1 Intended Re aders .................................[...]

  • Seite 5

    IV 5.1.1 Port C onfig ....................................................................................................... 28 5.1.2 Port Mi rror ........................................................................................................ 29 5.1.3 Port Security ..........................................................................[...]

  • Seite 6

    V 8.1.1 Snooping Config .............................................................................................. 79 8.1.2 Port C onfig ....................................................................................................... 80 8.1.3 VLAN Config ....................................................................................[...]

  • Seite 7

    VI 10.3.2 Port Bi nding ................................................................................................... 11 3 10.3.3 VLAN Bi nding ................................................................................................. 11 3 10.4 Application E xam ple for A CL .............................................................[...]

  • Seite 8

    1 Package Content s The following items should be found in your box: ¾ One TL-SG2008 8-Port Gigabit Smart Switch ¾ One power adapter ¾ Four rubber cushions ¾ Quick In stallation Guide ¾ Resource CD for TL-SG2008 switch, including: • This User Guide • Other Helpful Information Note: Make sure that the package contains the above it ems. If a[...]

  • Seite 9

    2 Chapter 1 About this Guide This User Guide contains in formation for setup and managem ent of TL-SG2008 8-Port Gigabit Smart Switch. Please read this guide carefully before operation. 1.1 Intended Readers This Guide is intended for network managers fam iliar with IT concepts and network terminologies. 1.2 Conventions In this Guide the following c[...]

  • Seite 10

    3 Chapter Introduction Chapter 4 System This module is used to confi gure system properties of the switch. Here mainly introduces: z System Info: Configure the description, system time and network parameters of the switch. z User Management: Configure the user name and password for users to log on to the W eb management page with a certain access l[...]

  • Seite 11

    4 Chapter Introduction Chapter 9 QoS This module is used to confi gure QoS function to provide different quality of service for va rious network applications and requirements. Here mainly introduces: z Diff Se rv: Co nf igu re priorities, port prio rity , 802.1P priority and DSCP priority . z Bandwidth Control: Configure rate limit feature to contr[...]

  • Seite 12

    5 Chapter 2 Introduction Thanks for choosing the TL-SG2008 8-Port Gigabit Smart Switch! 2.1 Overview of the Switch Designed for workgroups and departments, TL-SG2008 from TP-LINK provides wire-speed performance and full set of layer 2 management featur es. It provides a variet y of service features and multiple powerful functions with high security[...]

  • Seite 13

    6 The following parts are lo cated on the front panel of the switch: ¾ Reset: Press this button for five seconds or above to reset the sof tware setting back to factory default setting. ¾ LEDs Name Statu s Indication On(Green) The switch is powered on. Power Flashing/Off The switch is powered off or power supply is abnormal. Flashing The switch i[...]

  • Seite 14

    7 Chapter 3 Login to the Switch 3.1 Login 1) T o access the configurat ion utility , open a web-browser and type in the default address http://192.168.0.1 in the address field of the browser , then press the Enter key . Figure 3-1 Web-browser Tips: T o log in to the switch, the IP address of your PC should be set in the same subnet addresses of the[...]

  • Seite 15

    8 Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new conf igurati ons effective before the switch is rebooted. If you want to keep the configur ations effective even the swit ch is rebooted, please click Save Config . Y ou are suggested to click Save Config before cutting off the power or rebooting the switch to avoid losing the [...]

  • Seite 16

    9 Chapter 4 System The System module is mainly for system confi guration of the switch, including four submenus: System Info , User Management, System T ools and Access Security . 4.1 System Info The System Info, mainly for basic proper ties configuration, can be implemented on System Summary , Device Description , Sy stem Time , Da ylight Saving T[...]

  • Seite 17

    10 Figure 4-2 Port Information ¾ Port Info Port: Displays the port number of the switch. Ty p e : Displays the type of the port. Rate: Displays the maximum trans mission rate of the port. Statu s: Displays the connection status of the po rt. Click a port to display the bandwidth utilization on th is port. The actual rate divided by theoretical max[...]

  • Seite 18

    11 Figure 4-4 Device Description The following entries are displayed on this screen: ¾ Device Description Device Name: Enter the name of the switch. Device Location: Enter the location of the switch. System Cont act: Enter your contact information. 4.1.3 System T ime System T ime is the time d isplayed while the switch is run ning. On this page yo[...]

  • Seite 19

    12 ¾ Time Config Manual: When this option is selected, you can set the date and time manually . Get Time from NTP Server: When this option is selected, y ou can configure the time zone and the IP Address for th e NTP Se rver . The switch will get UTC automatically if it has connected to an NTP Server . z Time Zone: Select your local time. z Primar[...]

  • Seite 20

    13 Predefined Mode: Select a predefined DST configuration. z USA: Second Sunday in Marc h, 02:00 ~ First Sunday in November , 02:00. z Australia: First Sunday in Oct ober , 02:00 ~ First Sunday in April, 03:00. z Europe: Last Sunday in Marc h, 01:00 ~ Last Sunday in October , 01:00. z New Zealand: Last Sunday in September , 02:00 ~ First Sunday in [...]

  • Seite 21

    14 ¾ IP Config MAC Address: Displays MAC Address of the switch. IP Address Mode: Select the mode to obtain IP Address for the switch. z S tatic IP: When this option is selected, you should enter IP Address, Subnet Mask and Default Gateway manually . z DHCP: When this option is selected, the switch will obtain network parameters from the DHCP Serve[...]

  • Seite 22

    15 Figure 4-8 User T able 4.2.2 User Config On this page you can configure the access level of the user to log on to the Web management page. The switch provides two access levels : Guest and Admin. The guest only can view the settings without the right to conf igure the switch; the admin can c onfigure all the functions of the switch. T h e W e b [...]

  • Seite 23

    16 Confirm Password: Retype the password. Password Display Mode: z Simple : Select a simple password display mode. z Cipher : Select a cipher password display mode. ¾ User T able Select: Select the desired entry to delete the corresponding user information. It is multi-optional. T he current user information can’t be deleted. User ID, Name, Acce[...]

  • Seite 24

    17 Note: 1. It will take a few minutes to restore the c onfiguration. Please wait without any operation. 2. T o avoid any damage, please don’t power down the switch while being restored. 3. After being restored, the current settings of the switch will be lost. Wr ong upl oaded configuration file may cause the switch unmanaged. 4.3.2 Config Backup[...]

  • Seite 25

    18 Figure 4-12 Firmware Upgrade Note: 1. Don’t interrupt the upgrade. 2. Please select the proper software version matching with your hardware to upgrade. 3. T o avoid damage, please don't turn off the device while upgrading. 4. After upgrading, the devic e will reboot automatically . 5. Y ou are suggested to backup t he configuration before[...]

  • Seite 26

    19 Figure 4-14 System Reset Note: After the system is reset, the sw itch will be reset to the default an d all the settings will be cleared. 4.4 Access Security Access Security provides different security m easures for the remote l ogin so as to enhance the configuration management securi ty. It can be implemented on Acces s Control page. 4.4.1 Acc[...]

  • Seite 27

    20 ¾ Access Control Config Control Mode: Select the control mode for users to log on to the W eb management page. z Disable : Disable the access control function. z IP-based: Select this option to limit the IP-range of the users for login. z MAC-based: Select this option to limit the MAC Ad dress of the users for login. z Port-based: Select this[...]

  • Seite 28

    21 default the switch has a certific ate (self-signed certificate) and a corresponding private key. The Certificate/Key Download func tion enables the user to r eplace the default key pair. After SSL is effective, you can log on to the Web management page via https://192.168.0.1 . For the first time you use HTTPS connec tion to log into the switch [...]

  • Seite 29

    22 4. It may take more time for https connection than that for http connection, because https connection involves auth entication, encryption and decryption etc. 4.4.3 SSH Config As stipulated by IFTF (Internet E ngineering T ask Force), SSH (Secure Shell) is a security protocol established on application and transpor t layers. SSH-encrypt ed-conne[...]

  • Seite 30

    23 Idle Timeou t: S pecify the idle timeout time. The system will automatically release the connection when the time is up. The default time is 120 seconds. Max Connect: S pecify the maximum number of the connections to the SSH server . No new connection will be established when the number of the connections reaches t he maximum number you set. The[...]

  • Seite 31

    24 2. Click the Open button in the above figure to log on to the switch. Enter the login user name and password, and then you can conti nue to configure the switch. Application Example 2 for SSH: ¾ Network Requirements 1. Log on to the switch via key authentication using SSH and the SSH functio n is enabled on the switch. 2. PuTTY client software [...]

  • Seite 32

    25 Note: 1. The key len gth is in the range of 256 to 307 2 bits. 2. During the key generation, rand omly moving the mouse quickly can accelerate the key generation. 2. After the key is successfu lly generated, please save the p ublic key and private key to the computer .[...]

  • Seite 33

    26 3. On the W eb managem ent page of the switch, download the public key file saved in the computer to the switch. Note: 1. The key typ e should accord with the type of the key file. 2. The SSH key dow nloading can not be interrupted. 4. After the public key is downlo aded, please log on to the inte rface of PuTTY and enter the IP address for logi[...]

  • Seite 34

    27 After successful authentication, pl ease enter the login user name. If you log on to the switch without entering password, it indicates t hat the key has been successfully downloaded. Return to CONTENTS[...]

  • Seite 35

    28 Chapter 5 Switching Switching module is used to conf igure the basic functi ons of the switch, in cluding four submenus: Port , LAG , T raffic Monitor and MAC Address . 5.1 Port The Port function, allowing you to configure the basic features fo r the port, is implemented on the Port Config , Port Mirror , Port Security , Port Isolation and Loopb[...]

  • Seite 36

    29 Duplex mode with the switch. When “Auto” is selected, the S peed and Duplex mode will be deter mined by auto-negotiation. For the SFP port, this switch does not support auto-negotiation. Flow Control: Allows you to Enable/Disable t he Flow Control feature. When Flow Control is enabled, the swit ch can synchronize the speed with its peer to a[...]

  • Seite 37

    30 Click Edit to display the following figure. Figure 5-3 Port Mirror Config The following ent ries are displaye d on this screen: ¾ Mirror Group Number: Select the mirror group number you want to configure. ¾ Mirroring Port Mirroring Port: Select the mirroring port number . ¾ Mirrored Port Port Select: Click the Select button to quick-select th[...]

  • Seite 38

    31 Note: 1. The LAG member can not be selected as the mirrored port or mirroring port. 2. A port can not be set as the mirrored port and the mirroring port simultaneously . 3. The Port Mirror function can take ef fect span the multiple VLANs. 5.1.3 Port Security MAC Address T able maintains the mapping relati onship between the port and the MAC add[...]

  • Seite 39

    32 Max Learned MAC: S pecify the maximum number of MAC addresses that can be learned on the port. Learned Num: Displays the number of MAC addr esses that have been learned on the port. Learn Mode: Select the Learn Mode for the port. • Dy namic : When Dynamic mode is selected, the learned MAC address will be deleted automatically after the aging t[...]

  • Seite 40

    33 ¾ Port Isolation Config Port: Select the port number to set its forwardlist. Forward Portlist: Select the port that to be forwarded to. ¾ Port Isolation List Port: Display the port number . Forward Portlist: Display the forwardlist. 5.1.5 Loopback Detection With loopback detection feature enabled, the swit ch can detect loops using loopback de[...]

  • Seite 41

    34 Automatic Recovery Tim e : T ime after which the blocked port would automatically recover to normal status. It can be set as int egral times of detection interval. Web Re fresh St atus: Here you can enable or disable web automatic refresh. Web Refresh Interval: Set a web refresh interval between 3 and 100 seconds. By default, it’s 3 seconds. ?[...]

  • Seite 42

    35 If the LAG is needed, you are sugges ted to configure the LAG functi on here b efore configuring the other functions for the member ports. Tips: 1. Calculate the bandwidth for a LAG: If a LAG consists of th e four ports in the speed of 1000Mbps Full Duplex, the whole bandwidth of the LAG is up to 8000Mbps (2000Mbps * 4) because the bandwidth of [...]

  • Seite 43

    36 Group Number: Displays the LAG number here. Description: Displays the description of LAG . Member: Displays the LAG member . Operation: Allows you to view or modify the information for each LAG . • Edit: Click to modify the settings of the LAG . • Detail: Click to get the information of the LAG . Click the Detail button for the det ailed inf[...]

  • Seite 44

    37 ¾ LAG Config Group Number: Select a Group Number for the LAG . Description: Displays the description of the LAG . ¾ Member Port Member Port: Select the p ort as the LAG member . Clearing all the ports o f the LAG will delete this LAG . Tips: 1. The LAG can be deleted by clearing its all member ports. 2. A port can only be added to a LAG . If a[...]

  • Seite 45

    38 Figure 5-10 LACP Config The following ent ries are displaye d on this screen: ¾ Global Config System Priority : S pecify the system priority for the switch. The system priority and MAC address constitute the system identification (ID). A lower system priority value indicates a higher system priority . When exchanging information between systems[...]

  • Seite 46

    39 LAG: Displays the LAG number which the port belongs to. 5.3 T raffic Monitor The T raffic Monitor function, monitoring the traffic of each p ort, is implemented on the Tr a f f i c Summary and T raffic St atistics pag es . 5.3.1 T raffic Summary T raffic Summary screen displays the traffic info rmation of each port, which facilitates you to moni[...]

  • Seite 47

    40 Octets Rx: Displays the number of octets received on the port. The error octets are counted in. Octet s Tx: Displays the number of octe ts transmitted on the port. St atistics: Click the St atistics button to vie w the detailed traf fic statistics of the port. 5.3.2 T raffic S t atistics T raffic S tatistics screen displays the detailed traffic [...]

  • Seite 48

    41 Broadcast: Displays the number of good broadcast packet s received o r transmitted on the port. The erro r frames are not counted in. Multicast: Displays the number of good mu lticast packets received o r transmitted on the port. The erro r frames are not counted in. Unicast: Displays the number of good unicast packets received o r transmitted o[...]

  • Seite 49

    42 Ty p e Configuration Wa y Aging out Being kept af ter reboot (if the configuration is saved) Relationship between the bound MAC address and the port Dynamic Address T able Automatically learning Y es No The bound MAC address can be learned by the other ports in the same VLAN. Filtering Address T able Manually configuring No Y es - T able 5-1 T y[...]

  • Seite 50

    43 z Filtering: This option allows the addr ess t able to display the filtering address entries only . ¾ Address T able MAC Address: Displays the MAC addres s learned by the switch. VLAN ID: Displays the correspondi ng VLAN ID of the MAC address. Port: Displays the correspondi ng Port number of the MAC address. Ty p e : Displays the T ype of the M[...]

  • Seite 51

    44 ¾ Search Option Search Option: Select a Search Option from the pull-down list and click the Search button to find your desired entry in the S tatic Address T able. • MAC: Enter the MAC address of your desired entry . • VLAN ID: Enter the VLAN ID number of your desired entry . • Port: Enter the Port number of your desired entry . ¾ St ati[...]

  • Seite 52

    45 Figure 5-15 Dynamic Address The following ent ries are displaye d on this screen: ¾ Aging Config Auto Aging: Allows you to Enable/Disable t he Auto Aging feature. Aging Time: Enter the Aging T ime for the dynamic address. ¾ Search Option Search Option: Select a Search Option fr om the pull-down list and click the Search button to find your des[...]

  • Seite 53

    46 Tips: Setting aging time properly helps implement effect ive MAC address aging. The aging time that is too long or too short results decreas es the performance of the switch. If the aging time is too long, excessive invalid MAC address entries maintained by the switch may fill up the MAC address table. This prevents the MAC address table from up[...]

  • Seite 54

    47 ¾ Filtering Address T able Select: Select the entry to delete the co rresponding filtering address. It is multi-optional. MAC Address: Displays the filtering MAC Address. VLAN ID: Displays the correspondi ng VLAN ID. Port: Here the symbol “__” ind icates no specified port. Ty p e : Displays the T ype of the MAC address. Aging St atus: Displ[...]

  • Seite 55

    48 Figure 5-17 Network diagram of DHCP For different DHCP clients, DHCP server pr ovides three IP address assigning methods: (1) Manually assign the IP address: Allows the adm inistrator to bind the static IP address to a specific client (e.g.: WWW Server) via the DHCP server . (2) Automatically assign the IP address: DHCP server assigns the IP add[...]

  • Seite 56

    49 packet and broadcast the DHCP-REQUEST packet which includes the assigned IP address of the DHCP-OFFER packet. ( 4 ) DHCP-ACK Stage: Since the DHCP-REQUEST packet is broadcasted, all DHCP servers on the network segment can rece ive it. However , only the re quested server processes the request. If the DHCP server acknowledges assi gning this [...]

  • Seite 57

    50 Figure 5-20 DHCP Filteri ng The following entries are displayed on this screen: ¾ DHCP Filtering DHCP Filtering: Enable/Disable the DHCP Fi ltering function globall y . ¾ T rusted Port Here you can select the desired port(s) to be Tr usted Port(s). Only the T rusted Port(s) can receive DHCP packets from DHCP Servers . Click All button to selec[...]

  • Seite 58

    51 Chapter 6 VLAN The traditional Ethernet is a data network communication technology based on CSMA/CD (Carrier Sense Multiple Access/Collision Detect) vi a shared communication medium. Through the traditional Ethernet, the overfull hosts in LAN will result in serious collis ion, flooding broadcasts, poor performance or even break down of the Inter[...]

  • Seite 59

    52 6.1 802.1Q VLAN VLAN tags in the packet s are necessary for the sw itch to identify packets of dif ferent VLANs. The switch works at the data link layer in OSI model and it can identify the data link layer encapsulation of the packe t only , so you can add the VLAN tag field into the data link layer encapsulation for identification. In 1999, IEE[...]

  • Seite 60

    53 ingress port belongs to, this packet will be dropped. When the VLAN-tagged packets are forwarded by the T agged port, its VLAN t ag will not be changed. ¾ PVID PVID (Port VLAN ID) is the default VID of the port. When the switch receives an un-VLAN-tagged packet, it will add a VLAN tag to the packet according to the PVID of its received port and[...]

  • Seite 61

    54 Figure 6-3 VLAN T able T o ensure the normal communication of the factory sw itch, the default VLAN of all ports is set to VLAN1. VLAN1 cannot be modified or deleted. The following ent ries are displaye d on this screen: ¾ VLAN Create VLAN ID : Enter the VLAN ID you want to create. It ranges from 2 to 4094. Name : Give a name to the VLAN fo[...]

  • Seite 62

    55 Unt agged: The port will be an untagged member of the specific VLAN if you select it. T agged: The port will be an tagged member of the specific VLAN if you select it. NotMember: The port will not be a member of t he specific VLAN if you select it. PVID: Here you can change the PVID of the specific port. LAG: Displays the LAG to which the port b[...]

  • Seite 63

    56 ¾ Configuration Procedure z Configure Switch A Ste p Operation Description 1 Configure the Link T ype of the ports Required. On VLAN → 802.1Q VLAN → VLAN Config page, configure the link type of Port 2, Port 3 and Port 4 as Untagged, T agged and Untagged respectively 2 Create VLAN10 Required. On VLAN → 802.1Q VLAN → VLAN Config page, cre[...]

  • Seite 64

    57 Chapter 7 S p anning T ree STP (S panning T ree P rotocol), subject to IEEE 802 .1 D standard, is to disbranch a ring netwo rk in the Data Link layer in a local netwo rk. Devices running STP discover loops in the network and block ports by exchanging inf ormation, in that way , a ring net work can be di sbranched t o form a tree-topologi cal rin[...]

  • Seite 65

    58 Figure 7-1 Basic STP diagram ¾ STP T imers Hello T ime: Hello T ime ranges from 1 to 10 seconds. It specifie s the interval to send BPDU p ackets. It is used to test the links. Max. Age: Max. Age ranges from 6 to 40 sec onds. It specifies the maximum time the switch can wait without receiving a BPDU before attempting to reconfigure. Forward Del[...]

  • Seite 66

    59 z Comparing BPDUs Each switch sends out configur ation BPDUs and receives a confi guration BPDU on one of its ports from another switch. The following t abl e shows the comparing operations. Ste p Operation 1 If the priority of the BPDU received on the po rt is lower than that of the BPDU if of the port itself, the switch discards the BPDU and d[...]

  • Seite 67

    60 RSTP (R apid S pa nning T ree Pr otoco l), ev olved from th e 802 .1D STP stan dard, enable Ethernet ports to transit their states rapidl y . The premises for the port in the RSTP to tr ansit its state rapidly are as follows. z The condition for the root port to transit its port state rapidly: The old root port of the switch stops forwarding dat[...]

  • Seite 68

    61 Figure 7-2 Basic MSTP diagram ¾ MSTP MSTP divides a network into several MST r egions. The CST is generat ed between these MST regions, and multiple spanning trees can be gener ated in each MST region. Each spanning tree is called an instance. As well as STP , MSTP us es BPDUs to generate sp anning tree. The only difference is that the BPD U fo[...]

  • Seite 69

    62 Figure 7-3 Port roles The S panning T ree module is mainly for spanning tree configuration of the switch, including four submenus: STP Config , Port Config , MSTP Inst ance and STP Security . 7.1 STP Config The STP Config function, for global configuration of spanning trees on the switch, can be implemented on STP Config and STP Summary p ages. [...]

  • Seite 70

    63 The following entries are displayed on this screen: ¾ Global Config STP: Select Enable/Disable STP f unction globally on the switch. V ersion: Select the desired STP version on the switch. z STP: S panning Tree Protocol. z RSTP: Rapid S panning Tr ee Protocol. z MSTP: Multiple S panning Tree Protocol. ¾ Parameters Config CIST Priority: Enter a[...]

  • Seite 71

    64 7.1.2 STP Summar y On this page you can view the related parameters for S panning T ree function. Choose the menu Sp anning T ree → STP Config → STP S ummary to load the following page. Figure 7-5 STP Summary 7.2 Port Config On this page you can c onfigure the parameters of t he ports for CIST Choose the menu Sp anning T ree → Port Config [...]

  • Seite 72

    65 The following entries are displayed on this screen: ¾ Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for STP conf iguration. It is multi-optional. Port: Displays the port number of the switch. Statu s: Select Enable /Disable STP f unct[...]

  • Seite 73

    66 z Disconnected: In this status the port is not pa rticipating in the STP . LAG: Displays the LAG number which the port belongs to. Note: 1. Configure the ports con nected directly to terminals as edge port s and enable the BPDU protection function as well. This not only enables these ports to transit to forwarding state rapidly but also secures [...]

  • Seite 74

    67 Figure 7-8 Instance Config The following entries are displayed on this screen: ¾ Inst ance T able Inst ance ID Select: Click the Select button to quick-select the corresponding Instance ID based on the ID number you entered. Select: Select the desired Instance ID for c onfiguration. It is multi-optional. Inst ance: Displays Inst ance ID of the [...]

  • Seite 75

    68 Inst ance ID: Enter the corresponding instance ID. 7.3.3 Inst ance Port Config A port can play different roles in different sp anni ng tree instance. On this page you can configure the parameters of the port s in di fferent instance IDs as well as view sta tus of the ports in the specified instance. Choose the menu Sp anning T ree → MSTP Inst [...]

  • Seite 76

    69 Note: The port status of one port in dif ferent spanning tree instances can be different. Global configuration Procedure for S panning T ree function: Ste p Operation Description 1 Make clear roles the switches play in spanning tree instances: root bridge or designated bridge Preparation. 2 Globally configure MSTP parameters Required. Enable S p[...]

  • Seite 77

    70 ¾ Root Protect A CIST and its secondary root bridges are usually located in the high-bandwidth core region. Wrong configuration or malicious attacks may resu lt in configuration BPD U p ackets with higher priorities being received by the legal root bridge, which causes the cu rrent legal root bridge to lose its position and network topology jit[...]

  • Seite 78

    71 Figure 7-10 Port Protect The following entries are displayed on this screen: ¾ Port Protect Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for port protect configuration. It is multi-optional. Port: Displays the port number of the switch. Loop Pro[...]

  • Seite 79

    72 Figure 7-1 1 TC Protect The following entries are displayed on this screen: ¾ TC Protect TC Threshold: Enter a number from 1 to 100. It is the maximum number of the TC-BPDUs received by the switch in a TC Protect Cycle. The default value is 20. TC Protect Cycle: Enter a value from 1 to 10 to s pecify the TC Protect Cycle. The default value is 5[...]

  • Seite 80

    73 ¾ Configuration Procedure z Configure Switch A: Ste p Operation Description 1 Configure ports On VLAN → 802.1Q VLAN page, configure the link type of the related ports as T agged, and add the ports to VLAN101-VLAN106. The detailed instructions can be found in the section 802.1Q VLAN . 2 Enable STP function On Sp anning T ree → STP Config →[...]

  • Seite 81

    74 z Configure Switch C: Ste p Operation Description 1 Configure ports On VLAN → 802.1Q VLAN page, configure the link type of the related ports as T agged, and add the ports to VLAN101-VLAN106. The detailed instructions can be found in the section 802.1Q VLAN . 2 Enable STP function On Sp anning T ree → STP Config → STP Config page, enable ST[...]

  • Seite 82

    75 ¾ The topology diagram of the t w o inst ances after the topology is stable z For Instance 1 (VLAN101, 103 and 105), the red paths in the following figure are connected links; the gray paths ar e the blocked links. z For Instance 2 (VLAN102, 104 and 106), the blue pa ths in the following fig ure are connected links; the gray paths ar e the bloc[...]

  • Seite 83

    76 Chapter 8 Multicast ¾ Multicast Overview In the network, packet s are sent in three modes: unicast, broadcas t and multicast. In unicast, the source server sends separate copy information to each receiver . When a large number of users require this information, the serv er must send many pieces of info rmation with the same content to the users[...]

  • Seite 84

    77 ¾ Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as destination addresses of multic ast packets. The multicast IP addresses range from 224.0.0.0~239.255.255.255. The following table displays the range and description of several special multicast IP addresses. [...]

  • Seite 85

    78 should be a group port list, so the switch will dup licate this multicast data and deliver each port one copy . The general format of the mu lticast address table is described as Figure 8-3 below . VLAN ID Multicast IP Port Figure 8-3 Multicast Address T able ¾ IGMP Snooping In the network, the hosts apply to the near router for joining (leavin[...]

  • Seite 86

    79 in the VLAN as well as analyze the message to get the address of the mu lticast group the host applies for joining. The receiving port will be processed: if the rece iving port is a new member port, it will be added to the multicast addr ess table with it s member port ti me specified; if the receiving port is already a member port, its mem ber [...]

  • Seite 87

    80 Figure 8-4 Basic Config The following entries are displayed on this screen: ¾ Global Config IGMP Snooping: Select Enable/Disable IGMP S nooping function globally on the switch. Unknown Multicast: Select the operation for the swit ch to process unknown multicast, Forward or Discard. ¾ IGMP Snooping S tatus Description: Displays IGMP Snooping st[...]

  • Seite 88

    81 The following entries are displayed on this screen: ¾ Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for IGMP Snooping featur e configuration. It is multi-optional. Port: Displays the port of the switch. IGMP Snooping: Select Enable/Di[...]

  • Seite 89

    82 ¾ VLAN Config VLAN ID: Enter the VLAN ID to enable IGMP Snooping for the desired VLAN. Router Port Time: S pecify the aging time of the router port. Within this time, if the switch doesn’t receive IGMP query message from the router port, it will consider this port is not a router port any more. Member Port T ime: S pecify the aging time of th[...]

  • Seite 90

    83 VLAN owning a receiver one copy . Th is mode wastes a lot of bandwid th. The problem above can be solved by configuring a multicast VLAN. By adding switch port s to the multicast VLAN and enabling IGMP Snooping, you c an make users in different VLANs share the same multicast VLAN. This sa ves the bandwid th since multic ast streams are transmitt[...]

  • Seite 91

    84 2. The Multicast VLAN won't take effect unle ss you first complete the configuration for the corresponding VLAN owning the port on the 802.1Q VLAN page. 3. Configure the link type of the router port in the multicast VL AN as T agged otherwise all the member ports in the multicast VLAN can not receive multicast streams. 4. After a multicast [...]

  • Seite 92

    85 ¾ Network Diagram ¾ Configuration Procedure Ste p Operation Description 1 Create VLANs Create three VLANs with the VLAN ID 3, 4 and 5 respectively , and specify the description of VL AN3 as Multicast VLAN on VLAN → 802.1Q VLAN page. 2 Configure ports On VLAN → 802.1Q VLAN function pages. For port 3, configure its link type as T agged, and [...]

  • Seite 93

    86 Choose the menu Multicast → Multicast IP → Multicast IP T able to load the following page. Figure 8-8 Multicast IP T able The following entries are displayed on this screen: ¾ Search Option Multicast IP: Enter the multicast IP address the desired entry must carry . VLAN ID: Enter the VLAN ID the desired entry must carry . Port: Select the p[...]

  • Seite 94

    87 Figure 8-9 S tatic Multicast IP T able The following entries are displayed on this screen: ¾ Create St atic Multicast Multicast IP: Enter static multicast IP address. VLAN ID: Enter the VLAN ID of the multicast IP . Forward Port: Enter the forward port of the multicast group. ¾ Search Option Search Option: Select the rules for displaying multi[...]

  • Seite 95

    88 port. If the port can be added to the multicast group, it will be added to the multicast address table; if the port can not be added to the multicast group, the switch will drop the IG MP report message. In that way , the multicast streams will not be trans mitted to this port, which allows you to control hosts joining the multicast group. 8.3.1[...]

  • Seite 96

    89 Choose the menu Multicast → Multicast Filter → Port Filter to load the following page. Figure 8-1 1 Port Filter The following entries are displayed on this screen: ¾ Port Filter Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for multica[...]

  • Seite 97

    90 Configuration Procedure: Ste p Operation Description 1 Configure IP-Range Requir ed. C onfigure IP-Range to be filtered on Multicast → Multicast Filter → IP-Range page. 2 Configure multicast filter rules for ports Optional. Configure multicast filter rules for ports on Multicast → Multicast Filter → Port Filter page. 8.4 Packet S t atist[...]

  • Seite 98

    91 Report Packet (V1): Displays the number of IGMPv1 report packet s the port received . Report Packet (V2): Displays the number of IGMPv2 report packet s the port received . Report Packet (V3): Displays the number of IGMPv3 report packet s the port received . Leave Packet: Displays the number of leave packets the port received. Error Packet: Displ[...]

  • Seite 99

    92 Chapter 9 QoS QoS (Quality of Service) functi ons to provide different quality of service for various network applications and requirements and optim ize the bandwidth resource dist ribution so as to provide a network service experience of a better quality . ¾ QoS This switch classifies the ingr ess packets, map s the packet s to different prio[...]

  • Seite 100

    93 2. 802.1P Priority Figure 9-2 802.1Q frame As shown in the figure above, each 802.1Q T ag ha s a Pri field, comprising 3 bits. The 3-bit priority field is 802.1p priority in the range of 0 to 7. 802.1P priority determi nes the priority of the packet s based on the Pri value. On the Web management page of the switch, you can configure different p[...]

  • Seite 101

    94 Figure 9-4 SP-Mode 2. WRR-Mode: We ight Roun d Robin Mode. In this mode, packet s in all the queues are sent in order based on the weight value for each queue and every queue can be assured of a certain service time. The weight value indicates the occupied proportion of the resource. WRR queue overcomes the disadvantage of SP queue that th e pac[...]

  • Seite 102

    95 The QoS module is mainly for traffic control and priority configurati on, including two submenus: DiffServ and Bandwidth Control . 9.1 DiffServ This switch classifies the ingr ess packets, map s the packet s to different priority queues and then fo rwar ds th e pac ke ts ac cor din g to sp eci fi ed scheduli ng algorithms to implement QoS functi[...]

  • Seite 103

    96 Configuration Procedure: Ste p Operation Description 1 Select the port priority Required. On QoS → DiffServ → Port Priority page, configure the port priority . 3 Select a schedule mode Requir ed. On QoS → DiffServ → Schedule Mode page, select a schedule mode. 9.1.2 802.1P/CoS Mapping On this page you ca n configure 8 02.1P priority . 802[...]

  • Seite 104

    97 Configuration Procedure: Ste p Operation Description 1 Log on to the 802.1 P/CoS Mapping page 2 Enable 802.1P priority function Required. By default, the 802. 1P priority function is disabled. 3 Map the 802.1P priority t ag to the priority level Required. Select 802.1P priority tag and the corresponding priority level. 4 Select a schedule mode R[...]

  • Seite 105

    98 ¾ Priority Level DSCP: Indicates the priority determined by the DS region of IP dat agram . It ranges from 0 to 63. Priority Level: Indicates the priority level the packets with t ag are mapped to. The priority levels are labeled as TC0, TC1, TC2 and TC3. Note: T o complete QoS function confi guration, you have to go to the Schedule Mode page t[...]

  • Seite 106

    99 SP+WRR-Mode: S trict-Priority + Weight Round Ro bin Mode. In this mode, this switch provides two scheduling groups, SP group and WRR group. Queues in SP group and WRR group are schedule d strictly based on strict-priority mode while the queues inside WRR group follow the WRR mode. In SP+WRR mode, TC3 is in the SP group; TC0, TC1 and TC2 belong t[...]

  • Seite 107

    100 Select: Select the desired port for Rate configuration. It is multi-optional. Port: Displays the port number of the switch. Ingress Rate (bps ): Configure the bandwidth for receiving p ackets on the port. Y ou can select a rate from the dropdown list or select "Manual" to set Ingress rate, the system will automat ically select integra[...]

  • Seite 108

    101 The following entries are displayed on this screen: ¾ Storm Control Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for S tor m Control configuration. It is multi-optional. Port: Displays the port number of the switch. Broadcast Rate (bp s)[...]

  • Seite 109

    102 Number OUI Address V endor 2 00-03-6b-00-00-0 0 Cisco phone 3 00-04-0d-00- 00-00 Avaya phone 4 00-60-b9-00-00-00 Philips/NEC phone 5 00-d0-1e-00-00-0 0 Pingtel phone 6 00-e0-75-00-00-0 0 Polycom phone 7 00-e0-bb-00-00-0 0 3com phone T able 9-1 OUI addresses on the switch ¾ Port V oice VLAN Mode A voice VLAN can operat e in two m odes: automati[...]

  • Seite 110

    103 ¾ Security Mode of V oice VLAN When voice VLAN is enabled for a port, you can configure its security mode to filter data stream. If security mode is enabled, the port just forwards voice packet s, and discards other packets whose source MAC addresses do not match OUI addresses. If security mode is not enabled, the port forwards all the packet [...]

  • Seite 111

    104 VLAN ID: Enter the VLAN ID of the voice VLAN. Aging Time: S pecifies the living time of the membe r port in auto mode after the OUI address is aging out. Priority: Select the priority of the port when sending voice data. 9.3.2 Port Config Before the voice VLAN function is enabled, the parameters of the ports in the voice VLAN should be configur[...]

  • Seite 112

    105 Security Mode: Configure the security mode for forwarding packets. z Disable: All packets are forwarded. z Enable: Only voice data are forwarded. Member St ate: Displays the state of the port in the current voice VLAN. LAG: Displays the LAG number which the port belongs to. 9.3.3 OUI Config The switch supports OUI creation and adds the MA C add[...]

  • Seite 113

    106 Configuration Procedure of V oice VLAN: Ste p Operation Description 1 Configure the link type of the port Required. On VLAN → 802.1Q VLAN → VLAN Config page, configure the link type of ports of the voice device. 2 Create VLAN Requir ed. On VLAN → 802.1Q VLAN → VLAN Config page, click the Creat e button to create a VLAN. 3 Add OUI addres[...]

  • Seite 114

    107 Chapter 10 ACL 10.1 ACL Config An ACL may contain a number of rules, and each ru le specifies a different package range. Packet s are matched in match order . Once a rule is ma tched, the switch processes the matched packet s taking the operation specified in the rule without considering th e other rules, which can enhance the performance of th[...]

  • Seite 115

    108 Figure 10-2 ACL Create The following entries are displayed on this screen: ¾ Create ACL ACL ID: Enter ACL ID of the ACL you want to create. Rule Order: User Config order is set to be match order in this ACL. 10.1.3 MAC ACL MAC ACLs analyze and process packet s based on a se ries of match conditi ons, which can be the source MAC addresses and d[...]

  • Seite 116

    109 MASK: Enter MAC address mask. If it is set to 1, it must strictly match the address. 10.1.4 St andard-IP ACL S tandard-IP ACLs analyze and process data packe ts based on a series of ma tch conditions, which can be the source IP addresses and destination IP addresses carried in the packets. Choose the menu ACL → ACL Config → St andard-IP ACL[...]

  • Seite 117

    1 10 Figure 10-5 Create Extend-IP Rule The following entries are displayed on this screen: ¾ Create Extend-IP ACL ACL ID: Select the desired Extend-I P ACL for configuration. Rule ID: Enter the rule ID. Operation: Select the operation for the switch to process packet s which match the rules. z Permit: Forward packet s. z Deny: Discard Packe ts. S-[...]

  • Seite 118

    111 Choose the menu ACL → Policy Config → Policy Summary to load the following page. Figure 10-6 Policy Summary The following entries are displayed on this screen: ¾ Search Option Select Policy: Select name of the desired policy fo r view . If you want to delete the desired policy , please click the Delete button. ¾ Action T able Select: Sele[...]

  • Seite 119

    1 12 Figure 10-8 Action Create The following entries are displayed on this screen: ¾ Create Action Select Policy: Select the name of the policy . Select ACL: Select the ACL for configuration in the policy . 10.3 Policy Binding Policy Binding function can have the policy take its effect on a specific port/VLAN. The policy will take ef fect only whe[...]

  • Seite 120

    1 13 Interface: Displays the port number or VLAN ID bound to the policy . Direction: Displays the binding direction. 10.3.2 Port Binding On this page you can bind a policy to a port. Choose the menu ACL → Policy Binding → Port Binding to load the following p age. Figure 10-10 Bind the policy to the port The following entries are displayed on th[...]

  • Seite 121

    1 14 The following entries are displayed on this screen: ¾ VLAN-Bind Config Policy Name: Select the name of the po licy you want to bind. VLAN ID: Enter the ID of the VLAN you want to bind. ¾ VLAN-Bind T able Index: Displays the index of the binding policy . Policy Name: Displays the name of the binding policy . VLAN ID: Displays the ID of the VL[...]

  • Seite 122

    1 15 ¾ Network Diagram ¾ Configuration Procedure Ste p Operation Description 1 Configure for requirement 1 On ACL → ACL Config → ACL Create page, create ACL 1 1. On ACL → ACL Config → MAC ACL page, select ACL 1 1, create Rule 1, configure the operation as Perm it, configure the S-MAC as 00-64-A5-5D-12-C3 and mask as FF-FF-FF-FF-FF-FF . On[...]

  • Seite 123

    1 16 Ste p Operation Description 3 Configure for requirement 3 and 4 On ACL → ACL Config → ACL Create page, create ACL 101. On ACL → ACL Config → St andard-IP ACL p age, select ACL 101, create Rule 4, configure operatio n as Deny , configure S-IP as 10.10.50.0 and mask as 255.255.255.0, configure D-IP as 10.10.70.0 and mask as 255.255.255.0[...]

  • Seite 124

    1 17 Chapter 11 SNMP ¾ SNMP Overvie w SNMP (Simple Network Management Protocol) has gained the most extens ive application on the UDP/IP networks. SNMP provides a management frame to monitor and maintain the network devices. It is used for automatica lly managing the various network devices no matter the physical differences of the devices. Curr e[...]

  • Seite 125

    1 18 SNMP v1: SNMP v1 adopts Community Name authentic ation. The community name is used to define the relation between SNMP Management S tation and SNMP Agent. The SNMP packet s failing to pass community name authentication are discarded. The community name can limit access to SNMP Agent from SNMP NMS, functioning as a password. SNMP v2c: SNMP v2c [...]

  • Seite 126

    1 19 management station. The specif ied User Name and the Auth/Privacy Password are used for SNMP Management S tation to access the SNMP Agent, functioning as the p assword. SNMP module is used to configure the SNMP f unction of the switch, including three submenus: SNMP Config , Notification and RMON . 11.1 SNMP Config The SNMP Config can be imple[...]

  • Seite 127

    120 11.1.2 SNM P View The OID (Object Identifier) of t he SNMP packets is used to describe the managed objects of the switch, and the MIB (Management Information Base) is the set of the OIDs. The SNMP View is created for the SNMP management station to manage MIB objects. Choose the menu SNMP → SNMP Config → SNMP Vie w to load the following page[...]

  • Seite 128

    121 Figure 1 1-5 SNMP Group The following ent ries are displaye d on this screen: ¾ Group Config Group Name: Enter the SNMP Group name. The Group Name, Security Model and Security Level compose the identifier of the SNMP Group. The Groups with these three items the same are considered to be the same. Security Model: Select the Security Mode l for [...]

  • Seite 129

    122 Notify V iew : Select the View to be the Notify V iew . The management station can receive trap messages of the assigned SNMP view generate d by the switch's SNMP agent. ¾ Group T able Select: Select the desired entry to del ete the corresponding group. It is multi-optional. Group Name: Displays the Group Name here. Security Model: Displa[...]

  • Seite 130

    123 ¾ User Config User Name: Enter the User Name here. User T ype: Select the type for the User . • Local User: Indicates that the user is connected to a local SNMP engine. • Remote User: Indicates that the user is connected to a remote SNMP engine. Group Name: Select the Group Name of the Us er . The User is classified to the corresponding Gr[...]

  • Seite 131

    124 11.1.5 SNM P Community SNMP v1 and SNMP v2c adopt community name authentication. The comm unity name can limit access to the SNMP agent from SNMP network ma nagement station, functioni ng as a password. If SNMP v1 or SNMP v2c is employed, you can di rectly configure the SNMP Community on this page without configuring SNMP Group and User . Choos[...]

  • Seite 132

    125 Configuration Procedure: z If SNMPv3 is employed, please take the following step s: Ste p Operation Description 1 Enable SNMP function globally . Requir ed. On the SNMP → SNMP C onfig → Global Config page, enable SNMP function globally . 2 Create SNMP View . Required. O n the SNMP → SNMP Config → SNMP View page, create SNMP View of the [...]

  • Seite 133

    126 11.2 Notification With the Notification function enabl ed, the switch can initiatively report to the management station about the important events that o ccur on the V iews (e.g., the manag ed device is rebooted), which allows the management station to monitor and process the events in time. The notification information in cludes the following [...]

  • Seite 134

    127 Ty p e : Select the type for the notifications. • Tr a p : Indicates traps are sent. • Inform: Indicates informs are sen t. The Inform type has a higher security than the T rap type. Retry: S pecify the amount of times t he switch resends an inform request. The switch will resend the inform request if it doesn’t get the response from the [...]

  • Seite 135

    128 RMON Group Function History Group After a history group is confi gured, the switch collects and records network statistics information periodically , based on which the m anagement station can monitor network effectively . Event Group Event Group is used to define RMON events. Alarms occur when an event is detected. S tatistic Group S tatistic [...]

  • Seite 136

    129 11.3.2 Event Config On this page, you can configure the RMON events. Choose the menu SNMP → RMON → Event Config to load the following page. Figure 1 1-10 Event Config The following ent ries are displaye d on this screen: ¾ Event T able Select: Select the desired entry for configuration. Index: Displays the index number of the entry . User:[...]

  • Seite 137

    130 Figure 1 1-1 1 Alarm Config The following ent ries are displaye d on this screen: ¾ Alarm T able Select: Select the desired entry for configuration. Index: Displays the index number of the entry . Va r i a b l e : Select the alarm variables from the pull-down list. Port: Select the port on which the Alarm entry acts. Sample T ype: S pecify the[...]

  • Seite 138

    131 Ow ner : Enter the name of the device or user that defined the entry . Statu s: Select Enable/Disable t he corresponding alarm entry . Note: When alarm variables exceed the Threshold on the same direction continuously for several times, an alarm event will only be generated on the first time, that is, the Rising Alarm and Falling Alarm are trig[...]

  • Seite 139

    132 Chapter 12 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to locate and solve the network problem. ( 1 ) System Monitor: Monitor the utilization stat us of the memory and the CPU of switch. ( 2 ) Log: View the configuration parameters of t he switch and find[...]

  • Seite 140

    133 Click the Monitor button to enable the switch to monitor and display its CPU utilization rate every four seconds. 12.1.2 Memor y Monitor Choose the menu Maintenance → S ystem Monitor → Memory Monitor to load the following page. Figure 12-2 Memory Monitor Click the Monitor button to enable the switch to monitor and display its Memory utiliza[...]

  • Seite 141

    134 Severity Level Description debugging 7 Debug-level messages T able 12-1 Log Level The Log function is implemented on the Log T able , Local Log , Remote Log and Backup Log pages. 12.2.1 Log T able The switch supports logs output to two directions , namely , log buf fer and log file. The information in log buffer will be lost af ter the switch i[...]

  • Seite 142

    135 Severity: Displays the severity level of the log information. Y ou can select a severity level to display the log in formation whose severity le vel value is the same or smaller . Content: Displays the content of the log information. Note: 1. The logs are classified into eight levels based on severity . The higher the information severity is, t[...]

  • Seite 143

    136 12.2.3 Remote Log Remote log feature enables the switch to send sy stem logs to the Log Ser ver . Log Server is to centralize the system logs from various devices for the administ rator to monitor and m anage the whole network. Choose the menu Maintenance → Log → Remote Log to load the following page. Figure 12-5 Log Host The following ent [...]

  • Seite 144

    137 Figure 12-6 Backup Log The following ent ry is displayed on this screen: ¾ Backup Log Backup Log: Click the Backup Log button to save the log as a file to your computer . Note: It will take a few minutes to backup the l og file. Please wait without any operat ion. 12.3 Device Diagnostics This switch provides Cable T est and Loopback functions [...]

  • Seite 145

    138 Length: If the connection status is normal, here displays the length range o f the cable. Error: If the connection status is close, open or impedanc e, here displays the error length of the cable. Note: 1. The interval between two cable tests for one port must be more than 3 seconds. 2. The result is more reasonable when the cable pair is in th[...]

  • Seite 146

    139 12.4.1 Ping Ping test function, testing the connectivit y between the switch and one node of the network, facilitates you to test the network connectivity and r eachability of the host so as to locate the network malfunctions. Choose the menu Maintenance → Netw ork Diagnostics → Ping to load the following page. Figure 12-9 Ping The followin[...]

  • Seite 147

    140 Figure 12-10 T racert The following ent ries are displaye d on this screen: ¾ T racert Config Destination IP: Enter the IP address of the destination device. Max Hop: S pecify the maximum number of t he route hops the test data can pass through. Return to CONTENTS[...]

  • Seite 148

    141 Appendix A: Sp ecifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Bas e-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEEE802.3ad Dynamic link aggregation IEEE802.3x Flow Control IEEE802.1p QoS IEEE802.1q VLAN IEEE802.1d Spanning Tree IEEE802.1s Multiple S panning Tree Standards IEEE802.1w Rapid Spanning Tree Protocol [...]

  • Seite 149

    142 Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make sure your Ethernet Adapter is work ing, refer to the adapter ’s manual if necessary . Configure TCP/IP comp onent 1) On the Windows taskbar , click the St a rt button, and then click Control Panel . [...]

  • Seite 150

    143 5) The following TCP/IP Properties window will display and the I P Address t ab is open on this window by default. Figure B-3 6) Select Use the following IP address . And the following items will be available. If the switch's IP address is 192.168.0.1, specify IP address as 192.168.0. x (x is from 2 to 254), and the Subnet mask as 255.255.[...]

  • Seite 151

    144 Appendix C: Glossary Boot Protocol (BOOTP) BOOTP is used to provide bootup informat ion for netwo rk devices, including IP address information, the address of the TFTP server that contains the de vices system files, and the name of the boot file. Class of Service (CoS) CoS is supported by prioritizing packets based on the required leve l of ser[...]

  • Seite 152

    145 IGMP Snooping Listening to IGMP Query and IGMP Report packets transferred between IP Multicast routers and IP Multicast host groups to ident ify IP Multicast group members. IGMP Query On each subnetwork, one IGMP-capable device will ac t as the querier — that is, the device that asks all hosts to report on the IP multicast groups t hey wish t[...]

  • Seite 153

    146 in standard SNMP, and can set alarms on a variety of traffic conditions, in cluding specific error types. Rapid Spanning Tree Protocol (RSTP) RSTP reduces the conver gence time for network t opology changes to about 10% of that required by the older IEEE 802.1D STP standard. Simple Network Management Protocol (SNMP) The application protocol in [...]