Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Edimax Technology ES-5240G+ manuale d’uso - BKManuals

Edimax Technology ES-5240G+ manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Edimax Technology ES-5240G+. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Edimax Technology ES-5240G+ o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Edimax Technology ES-5240G+ descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Edimax Technology ES-5240G+ dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Edimax Technology ES-5240G+
- nome del fabbricante e anno di fabbricazione Edimax Technology ES-5240G+
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Edimax Technology ES-5240G+
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Edimax Technology ES-5240G+ non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Edimax Technology ES-5240G+ e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Edimax Technology in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Edimax Technology ES-5240G+, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Edimax Technology ES-5240G+, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Edimax Technology ES-5240G+. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    ES-5240G+ 24-Port GbE W eb Smart Switch User's Manual V ersion 1.0 / June 2007[...]

  • Pagina 2

    ii COPYRIGHT Copyright© 2007 Edimax. All right s reserved. No pa rt of this publication may be reproduced, transmitted, transcribed, stored in a retri eval system, or translated into any language or computer language, in any form or by any m eans, electronic, mechani cal, magnetic, optical, chemical, manual or otherwise, without the prior written [...]

  • Pagina 3

    iii T able of Content s Caution ........................................................................................................................ .......... v Electronic Emi ssion Notices .................................................................................................. v 1. Introdu ction .....................................[...]

  • Pagina 4

    iv 4-3-5. IGMP S t at us .......................................................................................................... 90 4-3-6. Ping S tatus............................................................................................................ 9 2 4-4. Main tenance .................................................................[...]

  • Pagina 5

    v Caution Circuit devices are sensitive to static ele c tric ity , which can damage their deli c ate electronics. Dry weather conditions or walking across a car peted floor may cause you to acquire a st atic electrical charge. T o protect your device, always: • T ouch the metal chassis of your computer to ground the static electri cal charge befo[...]

  • Pagina 6

    [...]

  • Pagina 7

    1 1. Introduction 1-1. Overview of 24-Port GbE W eb Smart Sw itch 24-port Gigabit W eb Smart Switch is a standalo ne switch that meets IEEE 802.3/u/x/z standa rds. The switch is equ ipped with included 20 x 10/100/1000Mbps TP port and 4 x Gigabit TP/SFP Fiber auto-se nse port We b Smart management Ethernet Switch. The switch is designed to incorpor[...]

  • Pagina 8

    2 1-2. Checklist Before you start inst alling the switch, veri fy that the package contai ns the following:    24-Port GbE Web Smart Switch    SFP Modules (optional)    Mounting Accessory (for 19 " Rack Shelf)    CD-ROM with Us er's Manual    Power Adapter Please notify your sales represent ative i mmediately if any [...]

  • Pagina 9

    3 • Support s to send the trap event while monitored events happ ened • Support s default configuration which can be restored to overwrite the current configuration which is working on via W eb UI and Reset button of the switch • Support s hot swap plug/unplug SFP module s • Support s Quality of Service (QoS) for real time applications base[...]

  • Pagina 10

    4 1-4. V iew of 24-Port GbE Web Smart Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet port s and 4 SFP fiber ports f or optional removable modules on the front p anel of the switch. LED display area. Locating on the left side o f the panel, Power LED, which i ndicates the power status a nd [...]

  • Pagina 11

    5 • LED Indicators LED Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED LINK/ACT Green Lit when connection with remote device is good Blinks when any traf fic is present 10/100/1000Mbp s Green/ Amber Lit Green when TP link on 1000Mbp s speed Lit Amber when TP link on 100Mbps speed Off[...]

  • Pagina 12

    6 1-5. V iew of the Optional Modules Port 21~24 on this switch support tw o types of medi a --- TP and SFP Fiber (LC, BiDi-SC…); this port support s 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbp s SFP Fiber transceiver is used for high- speed connection ex pansion; nine optional SFP types provided for the switch ar[...]

  • Pagina 13

    7 2. Installation 2-1. St arting 24-Port GbE Web Smart Switch Up This section will give user s a quick st art for: - Hardware and Cable Inst allation - Management S tation Installation - Software booting and configuration 2-1-1. Hardware and Cable Install ation At the beginning, please do first: Æ Wea r a grounding device to avoid the dam age from[...]

  • Pagina 14

    8 • TP Port an d Cable Inst allation ⇒ In the switch, TP port support s MDI/MDI-X auto-crossover , so both types of cable, straight-throu gh (Cable pin-out s for RJ -45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed- over (Cab le pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6[...]

  • Pagina 15

    9 2-1-2-1. Cabling Requirement s for TP Port s ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP netwo rk connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. 2-1-2-2. Ca[...]

  • Pagina 16

    10 2-1-2-3. Switch Cascading in T opology • T akes the Delay T ime into Account Theoretically , the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly . In practice, the network extension (cascading levels & overall diam eter) must follow the constraint of the IEEE 802.3/802.[...]

  • Pagina 17

    11 Case1: All switch ports are in the same local area networ k. Every port can access each other (See Fig. 2-2). If the VLAN is enabled and configured, each node in the network that can communicate each other di rectly is bounded to the same VLAN area. The VLAN area is defined by which VL AN you are on. The switch support s both port-based VLAN and[...]

  • Pagina 18

    12 Case 2b: Port-based VLAN (See Fig.2-4). 1. VLAN1 members can not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members can not access VL AN1 and VLAN3 members, but they can access VLA N4 members. 3. VLAN3 members can not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members can not access VL AN1 and VLAN3 members, but they can access VLA N2 members.[...]

  • Pagina 19

    13 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch Just like browsing on the Internet, this switch is de signed to allow users to access and manage it s functions through its web-based interface. Users can monitor the status of the switch, as well as to configure the switch through this web- based interface. Here we will gui[...]

  • Pagina 20

    14 2-1-3-1. Management through Ethern et Port There are two ways to configure and monitor the switch through its Ethe rnet port – using a web browser and an SNMP manager program. The later one is RubyVie w dependant which is not covered here. Using a web bro wser to access the switch’ s web-based management UI is highly user friendly so that we[...]

  • Pagina 21

    15 Fig. 2 -7 the Log in Screen for Web 2-1-4. IP Address Assignment For IP addre ss configuration, four p arameters are required. They are IP address, Subnet Mask, Default Gateway and DNS. IP addre ss: The IP addre ss of the network device in a network is used for internet working communication. The IP address is structured as shown in Fig. 2-8. It[...]

  • Pagina 22

    16 According to IPv4, the IP addre ssed are divided three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP addre ss/X, for example, 192.168.1.0/ 24. Each class ha s its address ra nge as described below . [...]

  • Pagina 23

    17 Class D and E: Class D is a cla ss with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RF C 1 1 12. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP addre ss blocks reserved and to be use[...]

  • Pagina 24

    18 In this diagram, you can see the subnet mask with 2 5-bit long, 255.255.255.128, cont ains 126 members in the sub-netted network. Anothe r is that the length of network prefi x equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows t he result. Prefi[...]

  • Pagina 25

    19 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: When the destination of a routed packet not listed in the routing t able, all traffic will be put into a device with this designated I P addre ss, which is known [...]

  • Pagina 26

    20 2-2. T ypical Applications The 24-Port GbE W eb Smart Switch implement s 24 Gigabit Ethernet TP ports with au to MDIX and four slots for removable modules Comprehen sive fiber types of connection inclu ding LC and BiDi-LC SFP modules are supported. For more detailed specifications of the switch, please refer to Appendix A. The switch is suitable[...]

  • Pagina 27

    21 Fig. 2-12 Office Network Connection Fig. 2-1 1 Peer-to-peer N etwork Connection[...]

  • Pagina 28

    22 3. Basic Concept and Management In this chapter we are goin g to introduce you the basic concept s and features of Ethernet, and how to work with the managem ent feature s provided by this switch. 3-1. What’ s the Ethernet Ethernet originated and was implement ed at Xerox in Palo Alto, CA in 1973 and was successfully comm ercialized by Digi t [...]

  • Pagina 29

    23 The above diagram shows the Ethernet ar chitecture in OSI model. LLC sub- layer and MAC sub-layer will re spond to the Data Li nk layer , and the transceivers will respond to the Physical layer . Logical Link Control (LLC) Dat a link layer is composed of both the su b-layers of MAC and MAC-client. Here MAC client may be logical link control or b[...]

  • Pagina 30

    24 The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP , SSAP , Contro l and Information. The DSAP address field i dentifies the one or more service access point s, in which the I/G bit indicates it is individual or gr oup address. If all bits of DSAP are 1s, it’s a global address. The SSAP address field identifies the sp ecifi[...]

  • Pagina 31

    25 3-2. Media Acces s Control (MAC) MAC Addressing Because LAN is co mposed of many nodes, for the data exchanged among these nodes, each nod e must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP [...]

  • Pagina 32

    26 Bit 47 bit 0 1st byte 2nd byte 3rd byte 4t h byte 5th byte 6th byte OUI code Serial number Table 3-3 Ethernet MAC address The first bit of the first byte in t he Destination address (DA) deter mines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1 ). So the 48-bit address space is div[...]

  • Pagina 33

    27 - Destination address (DA) — The DA field is used to identify which network device(s) should receive t he packet. It is a unique address. Please see the section of MAC addre ssing. - Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0. - Leng[...]

  • Pagina 34

    28 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transm itting data . When receiving data, it pars es frame to detect error; when transmi tting dat a, it performs frame assembly. 2. Performing Media access co ntrol. It prepares the initiation jobs for a frame transmission an d makes recovery from tran smission [...]

  • Pagina 35

    29 Ethernet MAC transmits frame s in half-duplex and full-du plex ways. In half- duplex operation mode, the MAC ca n either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with half-dupl ex operation exists only in the same collision domain. The carrie r signal needs to spend time [...]

  • Pagina 36

    30 Parameter value/LAN 10Base 100Base 1000Base Max. collision domain DTE to DTE 100 meters 100 meters for UTP 412 meters for fiber 100 meters for UTP 316 meters for fiber Max. collision domain with repeater 2500 meters 205 meters 200 meters Slot time 512 bit times 512 bit times 512 bit times Interframe Gap 9.6us 0.96us 0.096us AttemptLimit 16 16 16[...]

  • Pagina 37

    31 3-3. Flow Control Flow control is a mechanism to tell the source device stop sending frames for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sen ding a PAU SE frame from target device to source device. When the target is not busy and the PAUSE time is ex pired, it will send another [...]

  • Pagina 38

    32 Frame Reception In essence, the frame reception is t he same in both operations of half duplex and full duplex, except that full-duplex operat ion u ses two buffers to transmit and receive the frame independently. The receiv ing no de always “listens” if there is traffic running over the medium when it is not receiving a frame. When a frame [...]

  • Pagina 39

    33 What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data im mediately following the MAC so urce address. When tagged VLAN is applied, t he Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag c ontrol information are different in comparison with the basic Ethernet frame. The re st fie[...]

  • Pagina 40

    34 The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision. 3-4. How does a switch w ork? The switch is a layer 2 Ethernet Swit[...]

  • Pagina 41

    35 Extended Distance Limit ations: The diameter of a half-duplex LAN se gment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using cable i s 2500 meters an d 185 meters when using coaxial cable. The switch with it s per port per collision domain can extend the di stance li ke a bridg[...]

  • Pagina 42

    36 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the p acket to destination port(s ). Here we introduce some important features of a switch and how they work. MAC address t able When a pa cket is received on a port, th e switch fi rst checks if the pa cket is good or bad and extract s [...]

  • Pagina 43

    37 Mac address aging There is a field in MAC address ta ble us ed to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA arrives. Usually , the age time is programmable. T ransmission schedule In most layer 2 switches, the QoS is supported. QoS in a switch mus[...]

  • Pagina 44

    38 3-5. V irtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must un derstand what LAN is. In general, a LAN is composed of different physical n etwork segment s bridged by switches or bridges which attach to end stations in the same broadca s t domain. The traf fic can reach any stati on on the same LAN. Beyond thi s do[...]

  • Pagina 45

    39 Now we apply VLAN technology to configure the system shown as the figure above. We ca n partition the users into the dif ferent logical networks which have their own broadcast domain. The traf fic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traf fic within VLAN 1 does not flow to VLAN [...]

  • Pagina 46

    40 There are many types of VLAN appli ed. The most popular ones are port- based VLAN, tag-ba sed VLAN and protocol-based VLAN.  Port-based VLAN Some physical port s are configured as members of a VLAN. All stations attached on t hese ports can communica te with each other .  T ag-based VLAN It identifies the membership by VLAN ID, no matter w[...]

  • Pagina 47

    41 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag fiel d, contains VLAN identification with the value of 0 and priority information. Untagge d frame: An Ethernet frame carries no VLAN t [...]

  • Pagina 48

    42 Ingress Rule: Each packet received by a VLAN-aware bridge will be classified t o a VLAN. The classification rule is described as follows . 1. If the VID of the packet is null (VID=0 ) or this packe t is an untagged packet: a. If there are still some other ways(e. g. protocol, MAC addr ess, application, IP-subnet, etc.) to classify the incoming p[...]

  • Pagina 49

    43 How does a T agged VLAN work? If the ingress filtering is enabled and when a packet is receive d, the VLAN bridge will first check if the VID of the packet present s. 1). If the packet has a non-zero VID, t he VLAN bridge will apply this VID as the VLAN ID of the packet in the network. 2). For a packet with a null tag or no VLAN t ag, if the VLA[...]

  • Pagina 50

    44 3-6. Link Aggregation Basically , Link Aggregation is to aggregate the ban dwidth of more than one port to an assigned logical link. This hig hly increases total bandwid th to the targeted device. There is more than one Link Aggreg ation technology in many vendors’ switch products al ready , wh ich may cause the problem of interoperability . T[...]

  • Pagina 51

    45 T erminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group wit h a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an ind ependent link. There are three cases of link used in th e network, which are switch to [...]

  • Pagina 52

    46 4. Operation of Web-based Management This chapter instruct s you how to configure and manage the 24-Port GbE Web Smart Switch through its web user interface and how to access and manage 20 10/100/1000Mbp s TP Port and 4 Gigabit TP/SFP Fiber dua l media port. The switch provides 20 fixed Gigabit Ether net TP port s and four optional Gigabit dual [...]

  • Pagina 53

    47 Fig. 4-1 4-1. Web M anag ement Home Overview After you login, the switch sho ws you t he system stat us information as Fig. 4- 2. This is the default page and it displays you with the basic information of the system, including “Switch S tatus”, “TP Po rt S tatus”, “Fiber Port S tatus”, “Aggregation”, “VLAN”, “Mirro r”, ?[...]

  • Pagina 54

    48 • The Information of Page Layout ⎯ On the top, it shows the front panel of the swit ch. In the front panel, green LEDs on to show linked ports in function; for unlinked ports the LEDs will be OFF . For the optional modules, the slot will show only a cover plate if no module exist s. On the other hand, it will show a module if one pre sents. [...]

  • Pagina 55

    49 4-2. Configuration Fifteen functions, including System Co nfi guration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuratio n, Aggre gation , LACP , RST P , 802.1X, IGMP Snooping, Mirror , QoS, F ilter , Rate Limit, S torm Control and SNMP are contained in this function folder for system and n etwork management. Each of them wi[...]

  • Pagina 56

    50 4-2-1. System Configuration System configuration is one of the mo st import ant configurations in the switch. Without proper setti ngs, network administrator w ill not be able to manage or view the status of this device.The switch sup ports manual IP addre ss setting . Fig. 4-3 Function name: System Configuration Function description: Show syste[...]

  • Pagina 57

    51 Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Serv er: Show the IP address of the DHCP server . Default: 0.0.0.0 Lease T i me Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 charact ers are allowed in this param[...]

  • Pagina 58

    52 Subnet mask is used to set the subnet mask value, which should be the same value as that of the other dev ices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual. Default: 255.255.255.0 Fallback Gateway: Set an IP address for a g ateway to handle those packe[...]

  • Pagina 59

    53 4-2-2. Port Configuration Function name: Ports Configu r ation Function description: Ports Configuration is ap plied to ch ange the settings of each port. In this configuration function, you can set/reset the following parameters, Mode and Flow Control. All of them are described in details below . Parameter description: Enable Jumbo Frames: This[...]

  • Pagina 60

    54 Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration The switch support s Port-based VLAN and T ag-based VLAN (802.1q) . Support 24 active VLANs and VLAN ID 1~ 4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improved security and increas ed performance bu[...]

  • Pagina 61

    55 T ag-based: T ag-based VLAN identifies it s member by VID. This is quite different fro m port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to dete rmine if it can be forwarded. The switch su pports suppl ement of 802.1q. For more details, plea[...]

  • Pagina 62

    56 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the existing information of VL AN Group s List and the maintenance that can be done to them, i.e. modify and delete. User also can add a new VLAN group by inputting a new VLAN name and VLA N ID. If you are in port-based VLAN, it will just show [...]

  • Pagina 63

    57 Add Group: Create a new port-based VLAN or t ag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the c heck box ( ; ) beside the ID, then press the <Delete> button to delete the group. Fig. 4-9 Port-Based VLAN Configuration[...]

  • Pagina 64

    58 4-2-5. Aggregation The Aggregation (Port T runking) Confi guration is used to configure the settings of Link Aggregation. Y ou can bundle more than one port with the same speed, full duplex and the same MA C to be one single logical port, thus the lo gical port aggregates the b andwidth of these bundled port s This means you can apply your curre[...]

  • Pagina 65

    59 4-2-6. LACP The switch support s the link aggr egation IEEE802.3ad sta ndard. This standard describ es the Link Aggregate Contro l Protocol (LACP), which i s a protocol that dynamically creates and manages trunk group s. When you enable LACP link aggregation on a port, the port can automatically negotiate with port s at the remote end of a link [...]

  • Pagina 66

    60 4-2-7. RSTP RSTP detect s and breaks network loop s and provides backup links betwe en switches, bridge s or routers. It allows a switch to interact with other RS TP – compliant switches in your netwo rk to ensure that only one path exists between any two stations o n the network. The switch allows you to create multip le STP configurations an[...]

  • Pagina 67

    61 RSTP Port Configuration Function description: Enable or disable RSTP proto c ol on t he port which being sele cted and set path cost. Parameter description: Protocol Enabled: Just tick t he check box ( ; ) beside the port x to enable RSTP protocol, then press the <Apply > b utton to apply . Edge: Just tick the c heck box ( ; ) beside the p[...]

  • Pagina 68

    62 4-2-8. 802.1X 802.1x port-based network access co ntrol provides a method to restrict users to access network resour ces via authenticat ing user ’s information. This re stricts users from gaining access to the network resource s through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a po rt under 8[...]

  • Pagina 69

    63 While in the authentication process, th e message packet s encapsulated by Extensible Authentic ation Protocol over LA N (EAPOL), are exchanged between an authenticator P AE and a supplicant P AE. The Authenticato r exchanges the messag e to authentication server using EAP encapsulatio n. Before successfully authenticating, the supplicant can on[...]

  • Pagina 70

    64 1. On the initial stage, the su pp licant A is unauthenticated and a port on switch acting as an authenticato r is in unauthorized st ate. So the access is blocked in this st age. 2. Initiating a session. Eithe r authenticator or sup plicant can initiate the message exchange. If supplicant initiates the proce ss, it sends EAPOL-start packet to t[...]

  • Pagina 71

    65 10. When the supplicant issue an EAP-Logof f message to Authentication server , the port you are using is set to be unauthorized.. The 802.1X “Enabled” is the type of aut hentication supported in the switch. In this mode, for the devices connected to th is port, once a sup plicant is authorized, the devices connected to this port can ac cess[...]

  • Pagina 72

    66 Mode: Enable or disable 802.1X function. RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to be used comm unicate with RADIUS se rver for the authentication service. The valid value ranges 1-65535. Default port number is 1812. RADIUS Secret: The secret key between authentication server an [...]

  • Pagina 73

    67 Force Reinitialize: Force the subscriber to reinitialize connection to the port. Force Reinitialize All: Force Reinitialize for all port s at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration S tatistics: Choose the port which you want to sh ow of 802.1X statistics, the screen include Authenticator counters, ba cke[...]

  • Pagina 74

    68 Fig. 4-17 802.1X S tatistics Function name: 802.1x Parameters Function description: In here, user can enable or disabl e Re authentication function and specify how often a clien t has to re-enter his or her u sername and password to st ay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authenticatio[...]

  • Pagina 75

    69 4-2-9 IGMP Snooping Function name: IGMP Snooping Config uration Function description: IGMP snoopi ng enable group multicast traffic to only be forwarded to port s that are members of that grou p; thus allowing you to significa ntly reduce multicast traffic p assing through the switch. All the functions should press <Apply> button to st art[...]

  • Pagina 76

    70 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the tra ffic of the network, this switch supports one port mirror multi ports. For example, we assume that Port A and Port B are Source Ports and Po rt C is Mirror Port respective ly. The traffic passed by Port A and Port B w[...]

  • Pagina 77

    71 4-2-1 1. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make preced ence of 8 pr iorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Fig. 4-21 QoS Configuration[...]

  • Pagina 78

    72 Function name: QoS Configuration Function description: When you want to use QoS functio n, please select QoS Mode through th e drop-down menu in advance you can choose from 802.1p Priorit y or DSCP Priority to take effect. In this function, you can disabl e QoS Mode and choose any other Priority Control and enable i t, such as 802.1p and DSCP . [...]

  • Pagina 79

    73 Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SER VICE TYPE field to accommodate a set of diff erentiated services (DS). Under the differentiated services interpretation, the first six bi ts comprise a codepoi nt, which is sometimes abbre viated DSCP , and the last two bits are l[...]

  • Pagina 80

    74 4-2-12 Filter Function name: Filter Configuration Function description: This function can set manageme nt’s source IP Address to each port, simple and raise safety . After completing the function’s setting, press <Apply> button to have this fu nction in effect. Parameter description: Source IP Filter: Mode: There are three types of mod[...]

  • Pagina 81

    75 Fig. 4-24 Filter Configuration[...]

  • Pagina 82

    76 4-2-13 Rate Limit Function name: Ingress and Egress Ban dwidth Setting Function description: Ingress and Egress Ban dwidth Setting function is used to set up the limit of Ingress or Egress band width for each po rt. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded i[...]

  • Pagina 83

    77 4-2-14 Storm Control Function name: S torm Control Function description: S torm Control is used to block unnece ssary frames of the multicast and broadcast that would have reduce d the switch’ s performance. When the frames of multicast or broadcast are ov er the rate and S trom Control is enabled, the frames that exceed t he determined rate c[...]

  • Pagina 84

    78 Parameter description: ICMP Rate: T o enable the ICMP S torm cap ability . The user can use drop-do wn menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Learn Frames Rate: T o enable the Learn Frames S torm capability . The user can use drop- down menu to select number of fram es. Default is No Limit[...]

  • Pagina 85

    79 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can m anage the Managed devices equipped with SNMP agent, provided that the Management In formation Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between S NMP[...]

  • Pagina 86

    80 Default SNMP function: Disable Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig. 4-27 SNMP Configuration[...]

  • Pagina 87

    81 4-3. Monitoring There are six functions under in the moni toring function. S tatistics Overview Detailed S tatistics Monitorin g LACP S tatus RSTP S tatus IGMP S tatus Pin g[...]

  • Pagina 88

    82 4-3-1. St atistics Overview The function of Statistics Overview coll ects any information and p r ovides the counting summary about the traf fic of the port, no matter the packet is good or bad. In the Fig. 4-25, the window can show all ports’ counter information at the same time. If the counting overflows, t he counter will be reset the count[...]

  • Pagina 89

    83 4-3-2. Det ailed St atistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’ s traffic. In the Fig. 4-26, the window can show all cou nter information each port at one time. Parameter description: Rx Packets: The counting number of the p acket received. RX Octets: T otal received byte[...]

  • Pagina 90

    84 Tx Broad- and Multicast: Show the counting number of the t r ansmitted broadcast with multicast packet. Tx Error Packet s: Show the counting number of the received error p ackets. Rx 64 Bytes: Number of 64-byte frames in good a nd bad packets received.[...]

  • Pagina 91

    85 Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and ba d packets received. Rx 256-51 1 Bytes: Number of 256 ~ 511-byte frames in good and ba d packets received. Rx 512-1023 Bytes: Number of 512 ~ 1023-byt e frames in good and bad packet s received. Rx 102[...]

  • Pagina 92

    86 Tx Collisions: Number of collisions transm itting frames experienced. Tx Drops: Number of frames dropped due to excessive collision, late collision, or frame aging. Tx Overflow: Number of frames dropped due to the lack of transmitting buffer. Fig. 4-29 Detailed S tatistics for each port[...]

  • Pagina 93

    87 4-3-3. LACP S tatus Function name: LACP S tatus Function description: Display the LACP status. In the Fig. 4-30, the window can show LACP information and statu s for each port at one time. Parameter description: LACP Aggreg ation Overview: Show the group/port st atus. Red signs are set by default for link down ports; user ar e recommended to ref[...]

  • Pagina 94

    88 4-3-4. RSTP S tatus Function name: RSTP S tatus Function description: Display the RSTP st atus. In the Fig. 4-28, the window can show the VLAN bridge information and st atuses of 1~24 ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id. Bridge Id: Show this switch’ s current bridge priority setting and bridge ID [...]

  • Pagina 95

    89 Fig. 4-31 RSTP S tatus[...]

  • Pagina 96

    90 4-3-5. IGMP S tatus Function name: IGMP S tatus Function description: Display the IGMP status. In the Fig. 4-29, the window can show VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queri es status. Queries transmitted: T o count the group membership queri[...]

  • Pagina 97

    91 Fig. 4-32 IGMP S tatus[...]

  • Pagina 98

    92 4-3-6. Ping St atus Function name: Ping S tatus Function description: T o setting up the target IP address for ping function of ICMP protocol and display the pinging st atus. In the Fig. 4-30, the window can show t he pinging information. Parameter description: Ping Parameters: T arget IP address: Set up a T arget IP address to ping. Count: Use [...]

  • Pagina 99

    93 Fig. 4-33 Ping[...]

  • Pagina 100

    94 4-4. Maintenance There are five functions under the maintenan ce section. Wa r m R e s t a r t Factor y Default Maintenance Software Up g rade Confi g uration File Transfer Lo g out[...]

  • Pagina 101

    95 4-4-1. W arm Restart We offer you many ways to reboot the switch, toggle the power, hardware reset and software reset. Y ou can press the RESET butt on in the front panel to reset the switch to its default setting. Afte r upgrading software, you must reb oot to have the new configuration ta ken effect. Here we will be discussing the software res[...]

  • Pagina 102

    96 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and repl ace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed. If you want to restore all [...]

  • Pagina 103

    97 4-4-3. Sof tware Upgrad e Function name: Software Upg r ade Function description: Browse through your PC for a newer ve rsion of software pre-saved on your PC and upgrade the switch. Fig. 4-36 Software Up grade[...]

  • Pagina 104

    98 4-4-4. Configuration File T ransfer Function name: Configuration File Transfe r Function description: Backup the switch’s config uration file on to your computer to prevent acci dental data lost. If a device configuration crash occurs, or to configure a new switch, this pre-saved configuratio n backup file can be used to quickly restore the sw[...]

  • Pagina 105

    99 4-4-5. Logout Besides the auto logout function as we mentioned in the system configuration section, the swit ch also allows the user to logout manually by performing Logout function. Function name: Logout Function description: The switch allows you to logout the sy stem to preve nt unwanted accesses by other users without permi ssion. If you do [...]

  • Pagina 106

    100 5. Maintenance 5-1. Resolving No Link Condition The possible cause s for a no link LED st atus are as follows: z The attached device is not powered on z The cable may not be the correct type or is faulty z The installed building p remise cable is faulty z The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot co[...]

  • Pagina 107

    101 Appendix A Technical Specifications Features • 20 (10/100/1000Mbp s) Gigabit Ethernet (TP) switching port s are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward sh ared-memory Web-Smart switched. • Supports auto-ne gotiation [...]

  • Pagina 108

    102 Hardware Specifications  St andard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x  Network Interface: Configuration Mode Connector Port 10/100/1000Mbp s Gigabit TP NW ay TP (RJ-45) 1 - 24 1000Base-SX Gigabit Fiber 1000 FDX *SFP 21,22,23,24 (Option) 1000Base-LX Gigabit Fiber 1000 FDX *SFP 21,22,23,24 (Option) 1000Base-LX Single F[...]

  • Pagina 109

    103  Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT , 1 0/100/1000Mbp s 1000M SFP Fiber Port 21,22,23,24 : SFP(LINK/ACT)  Power Requirement : AC Line V oltage : 100 ∼ 240 V Frequency : 50 ∼ 60 Hz Consumption : 30W  Ambient T emperature : 0 ° to 50 ° C  Humidity : 5% to 90%  Dimensions :[...]

  • Pagina 110

    104 Management Software Specifications System Configuration Auto-negotiation support on 10/100Base-T X ports, Web brow s er can set transmission speed (10/100Mbps) and operat ion mode (Full/Half duplex) on each port, ena ble/disable any por t, set VLAN group, set T runk Connection. VLAN Function Port-Base / 802.1Q-T agged, allowed up to 24 active V[...]

  • Pagina 111

    105 Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below . PRIV A TE-ES-5240G+-MIB DEFINITIONS ::= BEGIN IMPORTS mib-2, DisplayS tring,ifIndex FROM RF C1213-MIB enterprises,Counter , T imeTicks , Gauge,IpAddress FROM RFC1 155-SMI OBJECT -TYPE FROM RFC-1212 TRAP-TYPE FROM RFC-1215; privatetech OB JECT IDENTIFIER :[...]