Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
TP-Link TL-SG2216 manuale d’uso - BKManuals

TP-Link TL-SG2216 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso TP-Link TL-SG2216. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica TP-Link TL-SG2216 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso TP-Link TL-SG2216 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso TP-Link TL-SG2216 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo TP-Link TL-SG2216
- nome del fabbricante e anno di fabbricazione TP-Link TL-SG2216
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature TP-Link TL-SG2216
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio TP-Link TL-SG2216 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti TP-Link TL-SG2216 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio TP-Link in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche TP-Link TL-SG2216, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo TP-Link TL-SG2216, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso TP-Link TL-SG2216. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452 Gigabit Smart Switch REV1.2.0 1910010909[...]

  • Pagina 2

    COPYRIGHT & TRADEMARKS S pecifications ar e subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., L TD. Other brands and product names are trademarks or registered trademarks of t heir respective holders. No part of the specificatio ns ma y be reproduced in any form or by any means or used to make any derivati[...]

  • Pagina 3

    IV Safety Information  When product has power button, the power button is one of the way to shut off the product; When there is no power button, the only way to co mpletely shut off power is to disconnect the product or the power adapter from the power source.  Don’t disassemble the product, or make repairs yourself. You run the risk of ele[...]

  • Pagina 4

    CONTENTS Package Contents .......................................................................................................................... 1 Chapter 1 ........................................................................................................... 2 About this Guide 1.1 ..........................................................[...]

  • Pagina 5

    5.1.1 ....................................................................................................... 31 Port Config 5.1.2 ........................................................................................................ 32 Port Mirror 5.1.3 .............................................................................................[...]

  • Pagina 6

    8.1.1 .............................................................................................. 84 Snooping Config 8.1.2 ....................................................................................................... 85 Port Config 8.1.3 ...................................................................................................[...]

  • Pagina 7

    10.3.2 ................................................................................................... 1 19 Port Binding 10.3.3 ................................................................................................. 1 19 VLAN Binding 10.4 .................................................................................... 120 Applicat[...]

  • Pagina 8

    VII 14.1 ......................................................................................................... 160 System Monitor 14.1.1 .................................................................................................. 160 CPU Monitor 14.1.2 .......................................................................................[...]

  • Pagina 9

    Package Content s The following items should be found in your box:  One Gigabit Smart Switch  One power cord  Two mounting brackets and other fittings  Installation Guide  Resource CD for TL-SG2216/TL-SG2424/ TL-SG2424P/TL-SG2452 switch, including:  This User Guide  Other Helpful Information Note: Make sure that the package con[...]

  • Pagina 10

    Chapter 1 About this Guide This User Guide contains in formation for setup and manage ment of TL-SG2216/TL-SG2424 /TL-SG2424P/TL-SG2452 Gigabit Smart Switch. Pleas e read this guide carefully befor e operation. 1.1 Intended Readers This Guide is intended for network managers fam iliar with IT concepts and network terminologies. 1.2 Conventions In t[...]

  • Pagina 11

    Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces:  System Info: Configure the description, system time and network parameters of the switch.  User Management: Configure the user name and password for users to log on to the W eb management page with a certain access [...]

  • Pagina 12

    Chapter Introduction Chapter 9 QoS This module is used to configure QoS function to provide different quality of service for va rious network applications and requirements. Here mainly introduces:  Diff Se rv: Co nf igu re priorities, port prio rity , 802.1P priority and DSCP priority .  Bandwidth Control: Configure rate limit feature to cont[...]

  • Pagina 13

    Chapter Introduction Chapter 14 Maintenance This module is used to assemble the commonly used system tools to manage the switch. Here mainly introduces:  System Monitor: Monitor the me mory and CPU of the switch.  Log: View configuration pa rameters on the switch.  Device Diagnostics: T est the connection status of the cable connected to t[...]

  • Pagina 14

    Chapter 2 Introduction Thanks for choosing the TL-SG2216/TL-SG242 4/TL-SG2424P/TL-SG2452 Gigabit Smart Switch! 2.1 Overview of the Switch Designed for workgroups and departments, TL-SG2216/TL-SG2424/TL-SG2424P/TL-SG2452 from TP-LINK provides wire-spe ed performance and full set of la yer 2 management features. It provides a variety of service featu[...]

  • Pagina 15

    The front p anel of TL-SG2424 is shown as Figure 2-2 . Figure 2-2 Front Panel of TL-SG2424 The front panel of TL-SG2424P is shown as Figure 2-3 . Figure 2-3 Front Panel of TL-SG2424P The front panel ofTL-SG2452 is shown as Figure 2-4 . Figure 2-4 Front Panel of TL-SG2452 The following parts are lo cated on the front panel of the switch:  Reset: [...]

  • Pagina 16

    N a m e Statu s Indication On The switch is working abnormally . Flashing The switch is working normally . System Off The switch is working abnormally . On A 1000Mbps device is connec ted to the corresponding port. 1000Mbps Off A 10/100Mbps device or no device is connected to the corresponding port. On A device is connected to the co rresponding po[...]

  • Pagina 17

    Name Statu s Indication On The remaining PoE power ≤ 7W. Flashing The remaining PoE power keeps ≤ 7W after this LED is on for 2 minutes. PoE Max Off The remaining PoE power ≥ 7W. On The port is supplying power normally. Green Flashing The supply power exceeds the correspondin g port’s maximum power. On Overload or short circuit is detected.[...]

  • Pagina 18

     AC Po wer Socket: Connect the female connector of t he power cord here, and the male connector to the AC power outlet. Please make su re the voltage of the power supply meets the requirement of the input voltage (100-240V ~ 50/60Hz 0.6A for TL-SG2216/TL-SG2424, 100-240V~ 50/60Hz 3.5A for TL-SG2424P and10 0-240V~ 50/60 Hz 1.0A for TL-SG2452). Re[...]

  • Pagina 19

    Chapter 3 Login to the Switch 3.1 Login 1) T o access the configurat ion utility , open a web-browser and type in the default address http://192.168.0.1 in the address field of the browser , then press the Enter key . Figure 3-1 Web-browser Tips: T o log in to the switch, the IP address of your PC should be set in the same subnet addresses of the s[...]

  • Pagina 20

    Figure 3-3 Main Setup-Menu Note: Clicking Apply can only make the new conf igurations effective before the switch is rebooted. If you want to keep the configur ations effective even the swit ch is rebooted, please click Save Config . Y ou are suggested to click Save Config before cutting off the power or rebooting the switch to avoid losing the new[...]

  • Pagina 21

    Chapter 4 System The System module is mainly for system confi guration of the switch, including four submenus: System Info , User Management, System T ools and Access Security . 4.1 System Info The System Info, mainly for basic proper ties configuration, can be implemented on System Summary , Device Description , Sy stem Time , Da ylight Saving Tim[...]

  • Pagina 22

    When the cursor moves on the port, the det ailed information of the port will be displayed. Figure 4-2 Port Information  Port Info Port: Displays the port number of the switch. Ty p e : Displays the type of the port. Rate : Displays the maximum trans mission rate of the port. St atu s: Displays the connection status of the po rt. Click a port to[...]

  • Pagina 23

    Figure 4-4 Device Description The following entries are displayed on this screen:  Device Description Device Name: Enter the name of the switch. Device Loca tion: Enter the location of the switch. S ystem Cont act: Enter your contact information. 4.1.3 System T ime System T ime is the time d isplayed while the switch is run ning. On this page yo[...]

  • Pagina 24

     Time Config Manual: When this option is selected, you can set the date and time manually . Get Time from NTP Server: When this option is selected, y ou can configure the time zone and the IP Address for th e NTP Se rver . The switch will get UTC automatically if it has connected to a NTP Server .  Time Zone: Select your local time.  Prima[...]

  • Pagina 25

    Predefined Mode: Select a predefined DST configuration.  USA: Second Sunday in Marc h, 02:00 ~ First Sunday in November , 02:00.  Australia: First Sunday in Oct ober , 02:00 ~ First Sunday in April, 03:00.  Europe: Last Sunday in Marc h, 01:00 ~ Last Sunday in October , 01:00.  New Zealand: Last Sunday in September , 02:00 ~ First Sunda[...]

  • Pagina 26

    The followin g entries are displayed on this screen:  IP Config MAC Address: Displays MAC Address of the switch. IP Address Mode: Select the mode to obtain IP Address for the switch.  S tatic IP: When this option is selected, you should enter IP Address, Subnet Mask and Default Gateway manually .  DHCP: When this option is selected, the sw[...]

  • Pagina 27

    Figure 4-8 User T able 4.2.2 User Config On this page you can configure the access level of the user to log on to the Web management page. The switch provides two access levels : Guest and Admin. The guest only can view the settings without the right to conf igure the switch; the admin can c onfigure all the functions of the s w i t c h . The W eb [...]

  • Pagina 28

     User T able Select: Select the desired entry to delete the corresponding user information. It is multi-optional. T he current user information can’t be deleted. User ID, Name, Access Level and st atu s: Displays the current user ID, user name, access level and user status. Operation: Click the Edit button of the desired entry , and you can ed[...]

  • Pagina 29

    3. After being restored, the current settings of the switch will be lost. Wr ong upl oaded configuration file may cause the switch unmanaged. 4.3.2 Config Backup On this page you can download the cu rrent configuration and save it as a file to your computer for your future configuration restore. Choose the menu Sy stem → System T ools → Config [...]

  • Pagina 30

    Note: 1. Don’t interrupt the upgrade. 2. Please select the proper software version ma tching with your hardware to upgrade. 3. T o avoid damage, please don't turn off the device while upgradi ng . 4. After upgrading, the device will reboot automatically . 5. Y ou are suggested to backup the configuration before upgradi ng. 4.3.4 System Reboo[...]

  • Pagina 31

    4.4.1 Access Control On this page you can control the users logging on to the W eb management page to enhance the configuration management security. The def initions of Admin and Guest refer to 4.2 User Management . Choose the menu Sy stem → Access Security → Access Control to load the following page. Figure 4-15 Access Control The following en[...]

  • Pagina 32

    Port: The field can be available for c onfigur ation only when Port-based mode is selected. Only the users connected to these port s you set here are allowed for login.  Session Config Session Timeout: If you do nothing with the Web management page within the timeout time, the system will log out automatically . If you want to reconfigure, pl ea[...]

  • Pagina 33

    Figure 4-16 SSL Config The following entries are displayed on this screen :  Global Config SSL: Select Enable/Disable the SSL function on the switch.  Certificate Download Certificate File: Select the desired certificate to download to the switch. The certificate must be BASE64 encoded.  Key Download Key File: Select the desired SSL Key to[...]

  • Pagina 34

    Comprising server and client, SSH has two versi ons, V1 and V2 which are not compatible with each other . In the communication, SSH server and client can auto-negotia te the SSH version and the encryption algorithm. After getting a successful negotiation, the client sends authentication request to the server for login, and then the tw o can communi[...]

  • Pagina 35

    Ke y File: Select the desired key file to download. Download: Click the Dow nload button to download the desire d key file to the switch. Note: 1. Please ensure the key length of the downloaded file is in the range of 256 to 3072 bits. 2. After the Key File is downloaded, the user ’s original key of the same type will be replaced. The wrong uploa[...]

  • Pagina 36

    Application Example 2 for SSH:  Network Requirements 1. Log on to the switch via password authenticat ion using SSH and the SSH function is enabled on the switch . 2. PuTTY client software is recommended.  Configuration Procedure 1. Select the key type and key length, and gene rate SSH key . Note: 1. The key length is in the range of 256 to 3[...]

  • Pagina 37

    3. On the Web management page of the switch, dow nlo ad the public key file saved in the computer to the switch. Note: 1. The key type should accord with the type of the key file. 2. The SSH key downloading can not be interrupt ed. 4. Download th e private key file to SSH client sof tware. 29[...]

  • Pagina 38

    30 5. After the public key and private key are dow nloa d ed, please log on to the interface of PuTTY and enter the IP address for login. After successful authentication, pl ease enter the l ogin user name. If you log on to the switch without entering password, it indicates t hat the key has been successfully downloaded. Return to CONTENTS[...]

  • Pagina 39

    Chapter 5 Switching Switching module is used to conf igure the basic functi ons of the switch, including five submenus: Port , LAG , T raffic Monitor , MAC Address and DHCP Filtering . 5.1 Port The Port function, allowing you to configure the basic features fo r the port, is implemented on the Port Config , Port Mirror , Port Security , Port Isolat[...]

  • Pagina 40

    Description: Give a description to the port for identification. Statu s: Allows you to Enable/Disable t he port. When Enable is selected, the port can forward the packet s normally . Speed and Duplex: Select the S peed and Duplex m ode for the port. The device connected to the switch s hould be in the same S peed and Duplex mode with the switch. Wh[...]

  • Pagina 41

    Th e following ent ries are displaye d on this screen.  Mirror Group List Group: Displays the mirror group number . Mirroring: Dis plays the mirroring port number . Mode: Dis plays the mirror mode. The value will be "Ingress" or "Egress". Mirrored Port: Dis plays the mirrored ports. Operation: Click Edit to configure the mirr[...]

  • Pagina 42

     Mirrored Port Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port as a mirrored port. It is multi-optional. Port: Displays the port number . Ingress: Select Enable/Disable the Ingress feature. When the Ingress is enabled, the incoming packet s received[...]

  • Pagina 43

    Figure 5-4 Port Security The following ent ries are displaye d on this screen:  Port Security Select: Select the desired port for Port Security configuration. It is multi-optional. Port: Displays the port number . Max Learned MAC: S pecify the maximum number of MAC addresses that can be learned on the port. Learned Num: Displays the number of MA[...]

  • Pagina 44

    5.1.4 Port Isolation Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward packet s to the ports that are not on its forward portlist. Choose the menu Sw itch ing → Port → Port Isola tion to load the following p age. Figure 5-5 Port Isolation The following ent ries are dis[...]

  • Pagina 45

    Choose the menu Sw itch ing → Port → Loopback Detection to load the following p age. Figure 5-6 Loopback Detection Config The following ent ries are displaye d on this screen :  Global Config LoopbackDetection Statu s: Here you can enable o r dis able L oopback Detection function globally . Detection Interval: Set a Loopback Detection interv[...]

  • Pagina 46

     Port Config Port Select: Click the Select button to qui ck-se lect the corresponding port based on the port number you entered. Select: Select the desired port for Loopback Detection configuratio n. It is multi-optional. Port: Displays the port number . St atu s: Enable or disable Loopback Dete ction function for the port. Operation Mode: Selec[...]

  • Pagina 47

    Tips: 1. Calculate the bandwidth for a LAG: If a LAG consists of th e four ports in the speed of 1000Mbps Full Duplex, the whole bandwidth of the LAG is up to 8000Mbps (2000Mbps * 4) because the bandwidth of each member port is 2000Mbp s counting t he up-linked speed of 1000Mbps and the down-linked speed of 1000Mbps. 2. The traf fic load of the LAG[...]

  • Pagina 48

    Operation: Allows you to view or modify the information for each LAG .  Edit: Click to modify the settings of the LAG .  Detail: Click to get the information of the LAG . Click the Detail button for the det ailed information of your selected LAG . Figure 5-8 Detailed Information 5.2.2 St atic LAG On this page, you can manua lly configure the [...]

  • Pagina 49

     Member Port Member Port: Select the p ort as the LAG member . Clearing all the ports o f the LAG will delete this LAG . Tips: 1. The LAG can be deleted by clearing its all member ports. 2. A port can only be adde d to a LAG . If a port is the member of a LAG , the port number will be displayed in gray and can not be selected. 5.2.3 LACP Config [...]

  • Pagina 50

    Figure 5-10 LACP Config The following ent ries are displaye d on this screen :  Global Config System Priority : S pecify the system priority for the switch. The system priority and MAC address constitute the system identification (ID). A lower system priority value indicates a higher system priority . When exchanging information between systems,[...]

  • Pagina 51

    Mode: S pecify LACP mode for your selected port. Statu s: Enable/Disable the LACP feat ure for your selected port. LAG: Displays the LAG number which the port belongs to. 5.3 T raffic Monitor The T raffic Monitor function, monitoring the traffic of each p ort, is implemented on the Tr a f f i c Summary and T raffic St atistics pag es . 5.3.1 T raff[...]

  • Pagina 52

    Port: Displays the port numbe r . Packets Rx: Displays the number of packet s received on the port. The erro r packet s are not counted in. Packets Tx: Displays the number of packet s transmitted on the port. Octets Rx: Displays the number of octets received on the port. The error octets are counted in. Octet s Tx: Displays the number of octe ts tr[...]

  • Pagina 53

    Port: Enter a port number and click the Select button to view the traffic statistics of the corresponding port. Received: Displays the details of the p ackets received on the port. Sent: Displays the details of the pa ckets transmitted on the port. Broadcast: Displays the number of good broadcast packet s received o r transmitted on the port. The e[...]

  • Pagina 54

    The add ress filtering feature allo ws the switch to filter the undesired packets and forbid its forwarding so as to improve the network security. The types and the features of the MAC Address T able ar e listed as the following: Ty p e Configuration Wa y Aging out Being kept af ter reboot (if the configuration is saved) Relationship between the bo[...]

  • Pagina 55

    Ty p e : Select the type of your desired entry .  All: This option allows the address table to display all the address entries.  Stati c: This option allows the address table to display the st atic address entries only .  Dyn amic : This option allows the address table to display the dynamic address entries only .  Filtering: This optio[...]

  • Pagina 56

     Create St atic Address MAC Address: Enter the static MAC Address to be bound. VLAN ID: Enter the corresponding VLAN ID of the MAC address. Port: Select a port from the pull-down list to be bound.  Search Option Search Option: Select a Search Option from the pull-down list and click the Search button to find your desired entry in the S tatic [...]

  • Pagina 57

    Figure 5-15 Dynamic Address The following ent ries are displaye d on this screen:  Aging Config Auto Aging: Allows you to Enable/Disable t he Auto Aging feature. Aging Time: Enter the Aging T ime for the dynamic address.  Search Option Search Option: Select a Search Option fr om the pull-down list and click the Search button to find your desi[...]

  • Pagina 58

    Tips: Setting aging time properly helps implement effect ive MAC address aging. The aging time that is too long or too short results decreas es the performance of the switch. If the aging time is too long, excessive invalid MAC address entries maintained by the switch may fill up the MAC address table. This prevents the MAC address table from updat[...]

  • Pagina 59

     Filtering Address T able Select: Select the entry to delete the corre sponding filtering address. It is multi-optional. MAC Address: Displays the filtering MAC Address. VLAN ID: Displays the correspondi ng VLAN ID. Port: Here the symbol “--” indi cates no specified port. Ty p e : Displays the T ype of the MAC address. Aging St atus: Display[...]

  • Pagina 60

    Figure 5-17 Network diagram of DHCP For different DHCP clients, DHCP server pr ovides three IP address assigning methods: (1) Manually assign the IP address: Allow s the adm inistrator to bind the static IP address to a specific client (e.g.: WWW Server) via the DHCP server . (2) Automatically assign the IP address: DHCP server assigns the IP addre[...]

  • Pagina 61

    addr esses and replies to the client with DH CP-OFFER packet carrying the IP address and other information. ( 3 ) DHCP-REQUEST Stage: In the situation that there ar e several DHCP servers sending the DHCP-OFFER packets, the client will only res pond to the first received DHCP-OFFER packet and broadcast the DHCP-REQUEST packet which includes the[...]

  • Pagina 62

    54 the network from the DHCP Server Cheating Attack by discarding the DHCP p ackets on the distrusted port, so as to enhance the network security . Choose the menu Switching → DHCP Filtering to load the following page. Figure 5-20 DHCP Filtering The following entries are displayed on this screen :  DHCP Filtering DHCP Filtering: Enable/Disable[...]

  • Pagina 63

    Chapter 6 VLAN The traditional Ethernet is a data network communication technology based on CSMA/CD (Carrier Sense Multiple Access/Collision Detect) vi a shared communication medium. Through the traditional Ethernet, the overfull hosts in LAN will result in serious collis ion, flooding broadcasts, poor performance or even break down of the Internet[...]

  • Pagina 64

    6.1 802.1Q VLAN VLAN tags in the packet s are necessary for the sw itch to identify packets of dif ferent VLANs. The switch works at the data link layer in OSI model and it can identify the data link layer encapsulation of the packe t only , so you can add the VLAN tag field into the data link layer encapsulation for identification. In 1999, IEEE i[...]

  • Pagina 65

     PVID PVID (Port VLAN ID) is the default VID of the port. When the switch receives an un-VLAN-tagged packet, it will add a VLAN tag to the packet according to the PVID of its received port and forward the packet s. When creating VLANs, the PVID of each port, i ndicating the default VLAN to which the port belongs, is an important p arameter with [...]

  • Pagina 66

    Figure 6-3 VLAN T able T o ensure the normal communication of the factory sw itch, the default VLAN of all ports is set to VLAN1. The following ent ries are displaye d on this screen:  VLAN Create VLAN ID : Enter the VLAN ID you want to create. It ranges from 2 to 4094. Name : Give a name to the VLAN for identification.  VLAN T able VLAN [...]

  • Pagina 67

    Port: Displays the port numbe r . Unt agged: The port will be an untagged member of the specific VLAN if you select it. T agged: The port will be an tagged member of the specific VLAN if you select it. NotMember: The port will not be a member of the specific VLAN if you select it. PVID: Here you can change the PVID of the specific port. LAG: Displa[...]

  • Pagina 68

     Configure Switch B Ste p Operation Description 1 Configure the Link T ype of the ports Required. On VLAN → 802.1Q VLAN → VLAN Config page, configure the link type of Port 7, Port 6 and Port 8 as Untagged, T agged and Untagged respectively . 2 Create VLAN10 Required. On VLAN → 802.1Q VLAN → VLAN Config page, create a VLAN with its VLAN I[...]

  • Pagina 69

    Chapter 7 S p anning T ree STP (S panning T ree P rotocol), subject to IEEE 802 .1 D standard, is to disbranch a ring netwo rk in the Data Link layer in a local netwo rk. Devices running STP discover loops in the network and block ports by exchanging inf ormation, in that way , a ring net work can be di sbranched t o form a tree-topologi cal ring-f[...]

  • Pagina 70

    Figure 7-1 Basic STP diagram  STP T imers Hello T ime: Hello T ime ranges from 1 to 10 seconds. It specifie s the interval to send BPDU p ackets. It is used to test the links. Max. Age: Max. Age ranges from 6 to 40 sec onds. It specifies the maximum time the switch can wait without receiving a BPDU before attempting to reconfigure. Forward Delay[...]

  • Pagina 71

     Comparing BPDUs Each switch sends out configur ation BPDUs and receives a confi guration BPDU on one of its ports from another switch. The following t abl e shows the comparing operations. Ste p Operation 1 If the priority of the BPDU received on the po rt is lower than that of the BPDU if of the port itself, the switch discards the BPDU and do[...]

  • Pagina 72

    stop s forwarding data and the des ignated port of the up stream switch begins to forward data.  The condition for the designated port to transit its port st ate rapidly: The designated port is an edge port or connecting to a point-to-point link. If the designated port is an edge port, it can directly transit to forwarding state; if the designat[...]

  • Pagina 73

    Figure 7-2 Basic MSTP diagram  MSTP MSTP divides a network into several MST r egions. The CST is generat ed between these MST regions, and multiple spanning trees can be gener ated in each MST region. Each spanning tree is called an instance. As well as STP , MSTP us es BPDUs to generate sp anning tree. The only difference is that the BPD U for [...]

  • Pagina 74

    Figure 7-3 Port roles The S panning T ree module is mainly for spanning tree configuration of the switch, including four submenus: STP Config , Port Config , MSTP Inst ance and STP Security . 7.1 STP Config The STP Config function, for global configuration of spanning trees on the switch, can be implemented on STP Config and STP Summary p ages. 7.1[...]

  • Pagina 75

    The followin g entries are displayed on this screen:  Global Config STP: Select Enable/Disable STP f unction globally on the switch. V ersion: Select the desired STP version on the switch.  STP: S panning T ree Protocol.  RSTP: Rapid S panning Tr ee Protocol.  MSTP: Multiple S panning Tree Protocol.  Parameters Config CIST Priority: [...]

  • Pagina 76

    7.1.2 STP Summary On this page you can view the related parameters for S panning T ree function. Choose the menu S p anning T ree → STP Config → STP Summary to load the following page. Figure 7-5 STP Summary 7.2 Port Config On this page you can c onfigure the parameters of t he ports for CIST Choose the menu S p anning T ree → Port Config to [...]

  • Pagina 77

    Figure 7-6 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for STP conf iguration. It is multi-optional. Port: Displays the port number of the switch. Statu s: Select Enabl[...]

  • Pagina 78

    Port Role: Displays the role of the po rt played in the STP Instance.  Root Port: Indicates the port that has the lowest path cost from this bridge to the Root Bridge and forwards packets to the root.  Designated Port: Indicates the port that forwards packets to a downstream network segment or switch.  Master Port: Indicates the port t hat[...]

  • Pagina 79

    Figure 7-7 Region Config The following entries are displayed on this screen:  Region Config Region Name: Create a name for MST region identif ication using up to 32 characters. Revision: Enter the revision from 0 to 6553 5 for MST region identification. 7.3.2 Inst ance Config Instance Configuration, a property of MST regi on, is used to describe[...]

  • Pagina 80

    The followin g entries are displayed on this screen:  Inst ance T able Inst ance ID Select: Click the Select button to quick-select the corresponding Instance ID based on the ID number you entered. Select: Select the desired Instance ID for c onfiguration. It is multi-optional. Inst ance: Displays Inst ance ID of the switch. Statu s: Displays st[...]

  • Pagina 81

    Figure 7-9 Instance Port Config The following entries are displayed on this screen:  Port Config Inst ance ID: Select the desired instance ID for its port configuration. Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port to specify its priority and p a[...]

  • Pagina 82

    Ste p Operation Description 1 Make clear roles the switches play in spanning tree instances: root bridge or designated bridge Preparation. 2 Globally configure MSTP parameters Required. Enable S panning T ree function on the switch and configure MSTP p arameters on Sp anning Tr e e → STP Config → STP Config p age. 3 Configure MSTP parameters fo[...]

  • Pagina 83

    T o avoid this, MSTP provides root protect functi on. Ports with this function enabled can only be set as designated ports in all sp anning tree instances . When a port of this type receives BDPU packet s with higher priority , it transits its st ate to blocking state and stops forwarding packets (as if it is disconnected from the link). The port r[...]

  • Pagina 84

    Figure 7-10 Port Protect The following entries are displayed on this screen:  Port Protect Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for port protect configuration. It is multi-optional. Port: Displays the port number of the switch. Loop Prote[...]

  • Pagina 85

    Choose the menu Sp anning T ree → STP Security → TC Protect to load the following page. Figure 7-1 1 TC Protect The following entries are displayed on this screen:  TC Protect TC Threshold: Enter a number from 1 to 100. It is the maximum number of the TC-BPDUs received by the switch in a TC Protect Cycle. The default value is 20. TC Protect [...]

  • Pagina 86

     Configuration Procedure  Configure Switch A: Ste p Operation Description 1 Configure ports On VLAN → 802.1Q VLAN page, configure the link type of the related ports as T agged, and add the ports to VLAN101-VLAN106. The detailed instructions can be found in the section 802.1Q VLAN . 2 Enable STP function On Sp anning T ree → STP Config →[...]

  • Pagina 87

     Configure Switch C: Ste p Operation Description 1 Configure ports On VLAN → 802.1Q VLAN page, configure the link type of the related ports as T agged, and add the ports to VLAN101-VLAN106. The detailed instructions can be found in the section 802.1Q VLAN . 2 Enable STP function On Sp anning T ree → STP Config → STP Config page, enable STP[...]

  • Pagina 88

     The topology diagram of the t w o inst ances after the topology is stable  For Instance 1 (VLAN101, 103 and 105), the red paths in the following figure are connected links; the gray paths ar e the blocked links.  For Instance 2 (VLAN102, 104 and 106), the blue pa ths in the following fig ure are connected links; the gray paths ar e the bl[...]

  • Pagina 89

    Chapter 8 Multicast  Multicast Overview In the network, packet s are sent in three modes: unicast, broadcas t and multicast. In unicast, the source server sends separate copy information to each receiver . When a large number of users require this information, the serv er must send many pieces of info rmation with the same content to the users. [...]

  • Pagina 90

    4. Real time is highly demanded and certain packet s drop is allowed.  Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as destination addresses of multic ast packets. The multicast IP addresses range from 224.0.0.0~239.255.255.255. The following table displays t[...]

  • Pagina 91

    VLAN ID Multicast IP Port Figure 8-3 Multicast Address T able  IGMP Snooping In the network, the hosts apply to the near router for joining (leavin g) a multicast group by sending IGMP (Internet Group Management Protocol) me ssages. When the up-str eam device forwards down the multicast data, the switch is responsible for sending them to the hos[...]

  • Pagina 92

    it will be added to the multicast addr ess table with it s member port ti me specified; if the receiving port is already a member port, its mem ber port time will be directly reset. 3. IGMP Leave Message The host, running IGMPv1, does not send IGMP l eave message when leaving a multicast group, as a result, the switch can not get the leave informat[...]

  • Pagina 93

    Figure 8-4 Basic Config The following entries are displayed on this screen:  Global Config IGMP Snooping: Select Enable/Disable IGMP S nooping function globally on the switch. Unknown Multicast: Select the operation for the swit ch to process unknown multicast, Forward or Discard.  IGMP Snooping S tatus Description: Displays IGMP Snooping sta[...]

  • Pagina 94

    Figure 8-5 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for IGMP Snooping featur e configuration. It is multi-optional. Port: Displays the port of the switch. IGMP Snoop[...]

  • Pagina 95

    Figure 8-6 VLAN Config The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the VLAN ID to e nable IGMP Snooping for the desired VLAN. Router Port Time: S pecify the aging time of the router port. Within this time, if the switch doesn’t receive IGMP query message from the router port, it will consider this port is no[...]

  • Pagina 96

    Router Port: Displays the router po rt of the VLAN. Note: The settings here will be invalid when multicast VLAN is enabled Configuration procedure: Ste p Operation Description 1 Enable IGMP Snoop ing function Required. Enable IGMP Snooping globally on the switch and for the port on Multicast → IGMP Snooping → Snooping Config and P ort Config pa[...]

  • Pagina 97

    The followin g entries are displayed on this screen:  Multicast VLAN Multicast VLAN: Select Enable/Disable Multicast VLAN feature. VLAN ID: Enter the VLAN ID of the multicas t VLAN. Router Port Time: S pecify the aging time of the router port. Within this time, if the switch doesn’t receive IGMP query message from the router port, it will cons[...]

  • Pagina 98

    Application Example for Multicast VLAN:  Network Requirements Multicast source sends multicast streams via the router , and the st reams are transmitted to user A and user B through the switch. Router: Its W AN port is connected to the multicast source; it s LAN port is co nnected to the switch. The multicast packet s are transmitted in VLAN3. S[...]

  • Pagina 99

     Network Diagram  Configuration Procedure Ste p Operation Description 1 Create VLANs Create three VLANs with the VLAN ID 3, 4 and 5 respectively , and specify the description of VL AN3 as Multicast VLAN on VLAN → 802. 1Q VLAN page. 2 Configure ports On VLAN → 802.1Q VLAN function pages. For port 3, configure its link type as T agged, and [...]

  • Pagina 100

    8.2.1 Multicast IP T able On this page you can view the multicast IP table on the switch. Choose the menu Multicast → Multicast IP → Mult icast IP T abl e to load the following page. Figure 8-8 Multicast IP T able The following entries are displayed on this screen:  Search Option Multicast IP: Enter the multicast IP address the desired entry[...]

  • Pagina 101

    Figure 8-9 S tatic Multicast IP T able The following entries are displayed on this screen:  Create St atic Multicast Multicast IP: Enter static multicast IP address. VLAN ID: Enter the VLAN ID of the multicas t IP . Forward Port: Enter the forward port of the multicast group.  Search Option Search Option: Select the rules for displaying multi[...]

  • Pagina 102

    port. If the port can be added to the multicast group, it will be added to the multicast address table; if the port can not be added to the multicast group, the switch will drop the IG MP report message. In that way , the multicast streams will not be trans mitted to this port, which allows you to control hosts joining the multicast group. 8.3.1 IP[...]

  • Pagina 103

    Figure 8-1 1 Port Filter The following entries are displayed on this screen:  Port Filter Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for multicas t filtering. It is multi-optional. Port: Displays the port number . Filter: Select Enable/D[...]

  • Pagina 104

    Ste p Operation Description 1 Configure IP-Range Required. C onfigure IP-Range to be filtered on Multicast → Multicast Filter → IP-Range page. 2 Configure multicast filter rules for ports Optional. Configure multicast filter rules for ports on Multicast → Multicast Filter → Port Filter page. 8.4 Packet S t atistics On this page you can view[...]

  • Pagina 105

    Quer y Packet: Displays the number of query packet s the port received. Report Packet (V1): Displays the number of IGMPv1 report packet s the port received . Report Packet (V2): Displays the number of IGMPv2 report packet s the port received . Report Packet (V3): Displays the number of IGMPv3 report packet s the port received . Leave Packet: Displa[...]

  • Pagina 106

    Chapter 9 QoS QoS (Quality of Service) functi ons to provide different quality of service for various network applications and requirements and optim ize the bandwidth resource dist ribution so as to provide a network service experience of a better quality .  QoS This switch classifies the ingr ess packets, map s the packet s to different priori[...]

  • Pagina 107

    Figure 9-2 802.1Q frame As shown in the figure above, each 802.1Q T ag ha s a Pri field, comprising 3 bits. The 3-bit priority field is 802.1p priority in the range of 0 to 7. 802.1P priority determi nes the priority of the packet s based on the Pri value. On the Web management page of the switch, you can configure different priority tags mapping t[...]

  • Pagina 108

    Figure 9-4 SP-Mode 2. WRR-Mode: Weight Round Robin Mode. In this mode, packet s in all the queues are sent in order based on the weight value for each queue and every queue can be assured of a certain service time. The weight value indicates the occupied proportion of the resource. WRR queue overcomes the disadvantage of SP queue that th e packet s[...]

  • Pagina 109

    4. Equ-Mode: Equal-Mode. In this mode, a ll the queues occupy the bandwidth equally . The weight value ratio of a ll the queues is 1:1:1:1. The QoS module is mainly for traffic control and priority configuration, including three submenus: DiffServ Bandwidth Control and V oice VLAN . 9.1 DiffServ This switch classifies the ingr ess packets, map s th[...]

  • Pagina 110

    Ste p Operation Description 1 Select the port priority Required. On QoS → DiffServ → Port Priority page, configure the port priority . 2 Configure the mapping relation between the 802.1P priority and TC Required. On QoS → DiffServ → 802.1P Priority page, configure the mapping re lation between the 802.1P priority and TC. 3 Select a schedule[...]

  • Pagina 111

    DSCP: Indicates the priority determined by the DS region of IP dat agram . It ranges from 0 to 63. Priority: Indicates the 802.1P priority the p ackets with tag are mapped to. The priorities are labeled as CoS0 ~ CoS7. Configuration Procedure: Ste p Operation Description 1 Configure the mapping relation between the DSCP priority and 802.1P priority[...]

  • Pagina 112

    Queue TC-id: Indicates the priority level of egress queue the packets with t ag and CoS-id are mapped to. The priority levels of egress queue are labeled as TC0, TC1, TC2 and TC3. Configuration Procedure: Ste p Operation Description 1 Configure the mapping relation between the 802.1P priority T ag/CoS and the TC Required. On QoS → DiffServ → 80[...]

  • Pagina 113

    Equ-Mode: Equal-Mod e. In this mode , a ll the queues occupy the band width equally . The weight value ratio of all the queues is 1:1:1:1. 9.2 Bandwid th Control Bandwidth function, allowing you to control the traffic rate an d broadcast flow on each port to ensure network in working or der , can be implemented on Rate Limit and Storm Control p age[...]

  • Pagina 114

    Ingress Rat e (bps ): Configure the bandwidth for receiving packe ts on the port. Y ou can select a rate from the dropdown list or select "Manual" to set Ingress rate, the system will auto matically se lect integral multiple of 64Kbp s that closest to the rate you entered as the real Ingress rate. Egress Rate(bps): Configure the bandwid t[...]

  • Pagina 115

    The followin g entries are displayed on this screen:  Storm Control Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for S tor m Control configuration. It is multi-optional. Port: Displays the port number of the switch. Broadcast Rate (bp s): [...]

  • Pagina 116

    Number OUI Address V endor 1 00-01-e3-00-00-0 0 Siemens phone 2 00-03-6b-00-00-0 0 Cisco phone 3 00-04-0d-00- 00-00 Avaya phone 4 00-60-b9-00-00-00 Philips/NEC phone 5 00-d0-1e-00-00-0 0 Pingtel phone 6 00-e0-75-00-00-0 0 Polycom phone 7 00-e0-bb-00-00-0 0 3com phone T able 9-1 OUI addresses on the switch  Port V oice VLAN Mode A voice VLAN can [...]

  • Pagina 117

     Security Mode of V oice VLAN When voice VLAN is enabled for a port, you can configure it s security mode to filter data stream. If security mode is enabled, the port just forwards voice packet s, and discards other packets whose source MAC addresses do not match OUI addresses. If security mode is not enabled, the port forwards all the packet s.[...]

  • Pagina 118

    VLAN ID: Enter the VLAN ID of the v oice VLAN. Aging Time: S pecifies the living time of the membe r port in auto mode after the OUI address is aging out. Priority: Select the priority of the port when sending voice data. 9.3.2 Port Config Before the voice VLAN function is enabled, the parameters of the ports in the voice VLAN should be configured [...]

  • Pagina 119

    Port Mode: Select the mode for the p ort to join the voice VLAN.  Auto: In this mode, the switch aut omatically adds a port to the voice VLAN or removes a port from the voice VLAN by checking whether the port receives voice data or not.  Manual: In this mode, you can manually add a port to the voice VLAN or remove a port from the voice VLAN. [...]

  • Pagina 120

    OUI: Displays the OUI address of the voice device. Mask: Displays the OUI address mask of the voice device. Description: Displays the description of the OUI. Configuration Procedure of V oice VLAN: Ste p Operation Description 1 Configure the link type of the port Required. On VLAN → 802.1Q VLAN → VLAN Config page, configure the link type of por[...]

  • Pagina 121

    Chapter 10 ACL 10.1 ACL Config An ACL may contain a number of rules, and each ru le specifies a different package range. Packet s are matched in match order . Once a rule is ma tched, the switch processes the matched packet s taking the operation specified in the rule without considering th e other rules, which can enhance the performance of the sw[...]

  • Pagina 122

    Figure 10-2 ACL Create The following entries are displayed on this screen:  Create ACL ACL ID: Enter ACL ID of the ACL you want to create. Rule Order: User Config order is set to be match order in this ACL. 10.1.3 MAC ACL MAC ACLs analyze and process packet s based on a se ries of match conditi ons, which can be the source MAC addresses and dest[...]

  • Pagina 123

    D-MAC: Enter the destination MAC addr ess contained in the rule. MASK: Enter MAC address mask. If it is set to 1, it must strictly match the address. 10.1.4 St andard-IP ACL S tandard-IP ACLs analyze and process data packe ts based on a series of ma tch conditions, which can be the source IP addresses and destination IP addresses carried in the pac[...]

  • Pagina 124

    Figure 10-5 Create Extend-IP Rule The following entries are displayed on this screen:  Create Extend-IP ACL ACL ID: Select the desired Extend-I P ACL for configuration. Rule ID: Enter the rule ID. Operation: Select the operation for the switch to process packet s which match the rules.  Permit: Forward packet s.  Deny: Discard Packe ts. S-[...]

  • Pagina 125

    10.2.1 Policy Summary On this page, you can view the ACL and the corresponding operations in the policy . Choose the menu ACL → Policy Config → Policy Summary to load the following page. Figure 10-6 Policy Summary The following entries are displayed on this screen:  Search Option Select Policy: Select name of the desired policy fo r view . I[...]

  • Pagina 126

    10.2.3 Action Create On this page you can add ACLs for the policy . Choose the menu ACL → Policy Config → Action Create to load the following page. Figure 10-8 Action Create The following entries are displayed on this screen:  Create Action Select Policy: Select the name of the policy . Select ACL: Select the ACL for configuration in the pol[...]

  • Pagina 127

    The followin g entries are displayed on this screen:  Search Option Show Mode: Select a show mode appropriate to your nee ds.  Policy Bind T able Select: Select the desired entry to delet e the corresponding binding policy . Index: Displays the index of the binding policy . Policy Name: Displays the name of the binding policy . Interface: Dis[...]

  • Pagina 128

    10.3.3 VLAN Bi nding On this page you can bind a policy to a VLAN. Choose the menu ACL → Policy Binding → VLAN Binding to load the following page. Figure 10-1 1 Bind the policy to the VLAN The following entries are displayed on this screen:  VLAN-Bind Config Policy Name: Select the name of the po licy you want to bind. VLAN ID: Enter the ID [...]

  • Pagina 129

    10.4 Application Example for ACL  Network Requirements 1. The manager of the R&D departm ent can access to the forum of the comp any and the Internet without any forbiddance. The MAC address of the manager is 00-64 -A5-5D-12-C3. 2. The st aff of the R&D department can not access to the Intern et but can visit the forum. 3. The st aff of [...]

  • Pagina 130

    Ste p Operation Description 2 Configure for requirement 2 and 4 On ACL → ACL Config → ACL Create page, create ACL 100. On ACL → ACL Config → St andard-IP ACL p age, select ACL 100, create Rule 1, configure operatio n as Deny , configure S-IP as 10.10.70.1 and mask as 255.255.255.0, configure D-IP as 10.10.50.1 and mask as 255.255.255.0. On [...]

  • Pagina 131

    Chapter 11 PoE Note: Only TL-SG2424P supports PoE function. PoE (Power over Ethernet) technology describes a system to transmit electrical power along with data to remote devices over standard twisted-p air cable in an Ethernet net work. It is especially useful for supplying power to IP telephones, wi reless LAN access points, cameras and so on. ?[...]

  • Pagina 132

    PoE Config, mainly for PoE attributes configura tion, is implemented on PoE Config and PoE Profile pages. 11.1.1 PoE Config On this page, you can configure the p a rameters to implement PoE function. Choose the menu PoE → PoE Config → PoE Config to load the following p age. Figure 1 1-1 PoE Config The following items are displayed on this scree[...]

  • Pagina 133

    PoE Pr iority: The priority levels include High, Middle and Lo w in descending order . Whe n the supply power exceeds the system power limit, the PD linked to the port with lower priority will be disconnected. Power Limit ( 0. 1w- 30 w): Defines the max power the corresponding port can supply . Class1 represents 4w , Class2 represents 7w , Class3 r[...]

  • Pagina 134

    PoE S t atus: Select to the enable/disable Po E fe ature for the corresponding port. If set enable, the port may supply power to the linked PD (Power Device). PoE Priority: The priority levels include High, Middle and Lo w in descending order . Whe n the supply power exceeds the system power limit, the PD linked to the port with lower priority will[...]

  • Pagina 135

    Index: Displays the index of the time-rang e. Time-Range Name: Displays the name of the time-range. Slice: Displays the time-slic e of the time-range. Mode: Displays the mode the time-range adopts. Operation: Click Edit to modify this time-range and click Det ail to display the complete information of this time–range. 11.2.2 PoE Time-Range Create[...]

  • Pagina 136

    End T ime: Set the end time of the time-slice.  Time-Slice T able Index: Displays the index of the time-slice. St art Time: Displays the st art time of the time-slice. End Time: Displays the end time of the time-slice. Delete: Click the Delete button to delete the corresponding time-slice. 11.2.3 PoE Holiday Config Holiday mode is applied as a d[...]

  • Pagina 137

    End Date: Displays the end date of the holida y . Return to CONTENTS 129[...]

  • Pagina 138

    Chapter 12 SNMP  SNMP Overvie w SNMP (Simple Network Management Protocol) has gained the most extens ive application on the UDP/IP networks. SNMP provides a management frame to monitor and maintain the network devices. It is used for automatica lly managing the various network devices no matter the physical differences of the devices. Curr ently[...]

  • Pagina 139

    application requirement. SNMP v1: SNMP v1 adopts Community Name authentic ation. The community name is used to define the relation between SNMP Management S tation and SNMP Agent. The SNMP packet s failing to pass community name authentication are discarded. The community name can limit access to SNMP Agent from SNMP NMS, functioning as a password.[...]

  • Pagina 140

    The User configure d in a SNMP Group can manage the switch via the client program on management station. The specif ied User Name and the Auth/Privacy Password are used for SNMP Management S tation to access the SNMP Agent, functioning as the p assword. SNMP module is used to configure the SNMP f unction of the switch, including three submenus: SNM[...]

  • Pagina 141

    12.1.2 SNM P View The OID (Object Identifier) of t he SNMP packets is used to describe the managed objects of the switch, and the MIB (Management Information Base) is the set of the OIDs. The SNMP View is created for the SNMP management station to manage MIB objects. Choose the menu SNMP → SNMP Config → SNMP Vie w to load the following page. Fi[...]

  • Pagina 142

    Figure 12-5 SNMP Group The following ent ries are displaye d on this screen:  Group Config Group Name: Enter the SNMP Group name. The Group Name, Security Model and Security Level compose the identifier of the SNMP Group. The Groups with these three items the same are considered to be the same. Security Model: Select the Security Mode l for the [...]

  • Pagina 143

    Notif y V iew : Select the View to be the Notify View . The management station can receive trap messages of the assigned SNMP view generate d by the switch's SNMP agent.  Group T able Select: Select the desired entry to delete the corresponding group. It is multi-optional. Group Name: Displays the Group Name here. Security Model: Displays t[...]

  • Pagina 144

     User Config User Name: Enter the User Name here. User T ype: Select the type for the User .  Local User: Indicates that the user is connected to a local SNMP engine.  Remote User: Indicates that the user is connected to a remote SNMP engine. Group Name: Select the Group Name of the Us er . The User is classified to the corresponding Group[...]

  • Pagina 145

    12.1.5 SNM P Communit y SNMP v1 and SNMP v2c adopt community name authentication. The comm unity name can limit access to the SNMP agent from SNMP network ma nagement station, functioni ng as a password. If SNMP v1 or SNMP v2c is employed, you can di rectly configure the SNMP Community on this page without configuring SNMP Group and User . Choose t[...]

  • Pagina 146

    Configuration Procedure:  If SNMPv3 is employed, please take the following step s: Ste p Operation Description 1 Enable SNMP function globally . Required. On the SNMP → SNMP Config → Global Config page, enable SNMP function globally . 2 Create SNMP View . Required. On the SNMP → SNMP Config → SNMP View page, create SNMP View of the manag[...]

  • Pagina 147

    12.2 Notification With the Notification function enabl ed, the switch can initiatively report to the management station about the important events that o ccur on the V iews (e.g., the manag ed device is rebooted), which allows the management station to monitor and process the events in time. The notification information in cludes the following two [...]

  • Pagina 148

    Ty p e : Select the type for the notifications.  Tr a p : Indicates traps are sent.  Inform: Indicates informs are sen t. The Inform type has a higher security than the T rap type. Retry: S pecify the amount of times t he switch resends an inform request. The switch will resend the inform request if it doesn’t get the response from the m an[...]

  • Pagina 149

    RMON Group Function History Group After a history group is confi gured, the switch collects and records network statistics information periodically , based on which the m anagement station can monitor network effectively . Event Group Event Group is used to define RMON events. Alarms occur when an event is detected. S tatistic Group S tatistic Grou[...]

  • Pagina 150

    St atu s: Select Enable/Disable the corresponding sampling entry . 12.3.2 Event Config On this page, you can configure the RMON events. Choose the menu SNMP → RMON → Event Config to load the following page. Figure 12-10 Event Config The following ent ries are displaye d on this screen:  Event T able Select: Select the desired entry for confi[...]

  • Pagina 151

    Figure 12-1 1 Alarm Config The following ent ries are displaye d on this screen:  Alarm T able Select: Select the desired entry for configuration. Index: Displays the index number of the entry . Va r i a b l e : Select the alarm variables from the pull-down list. Port: Select the port on which the Alarm entry acts. Sample T ype: S pecify the sam[...]

  • Pagina 152

    Interval: Enter the alarm interv al time in seconds. Ow ner : Enter the name of the device or user that defined the entry . Statu s: Select Enable/Disable t he corresponding alarm entry . Note: When alarm variables exceed the Threshold on the same direction continuously for several times, an alarm event will only be generated on the first time, tha[...]

  • Pagina 153

    Chapter 13 LLDP Note: Only TL-SG2424P supports LLDP function. LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device information periodically to neighbors on the same IEEE 802 local area network. The advertised informati on, including details such as dev ice identification, capabili[...]

  • Pagina 154

    or to allow t he port to both transmit and receive LLDPD Us. Four LLDP admin statuses are supported by each port.  Tx&Rx: the port can both transmit and receive LLDPDUs.  Rx_Only: the port can receive LLDPDUs only .  Tx_Only: the port can transmit LLDPDUs only .  Disable: the port cannot tr ansmit or receive LLDPDUs. 2) LLDPDU trans[...]

  • Pagina 155

    The followin g table shows the details about the currently defined TL Vs. TL V type TL V Name Description Usage in LLDPDU 0 End of LLDPDU Mark the end of the TL V sequence in LLDPDUs. Any information following an End Of LLDPDU TL V shall be ignored. Mandatory 1 Chassis ID Identifies the C hassis address of the connected device. Mandatory 2 Port ID [...]

  • Pagina 156

    Note: For detailed introduction of TL V , please refer to IEEE 802.1AB standard and ANSI/TIA-1057. In TP-LINK switch, the following LL DP optional TL Vs are supported. Port Description TLV The Port Description TLV allows network management to advertise the IEEE 802 LAN station's port description. System Capabilities TLV The System Capabilities[...]

  • Pagina 157

    The LLDP module is mainly for LLDP function c onfiguration of the switch, including three submenus: Basic Config , Device Info , Device St atistics and LLDP-MED . 13.1 Basic Config LLDP is configured on the Global Config and Port Config pages. 13.1.1 Global Config On this page you can configure the LL DP p arameters of the device globally . Choose [...]

  • Pagina 158

    Fast S t art Times: When the port's LLDP sta te transfo rms from Disable (or R x_O nly) to Tx&Rx (or Tx_Only), the fast start mechanism will be enabled, that is, the transmit interval will be shorten to a second, and several LLDPDUs will be sent out (the number of LLDPDUs equals this parameter). The default value is 3. 13.1.2 Port Config O[...]

  • Pagina 159

    13.2 Device Info Y ou can vie w the LLDP information of the local device and its neighbors on the Local Info and Neighbor Info pages respectively . 13.2.1 Local Info On this page you can see all ports' configuration an d system information. Choose the menu LLDP → Device Info → Local Info to load the following page. Figure 13-3 LLDP Lo cal [...]

  • Pagina 160

    Refre sh Rate: S pecify the auto refresh rate.  Local Info Enter the desired port number and click Select to display the information of the corresponding port. 13.2.2 Neighbor Info On this page you can get the information of the neighbors. Choose the menu LLDP → Device Info → Neighbor Info to load the following page. Figure 13-4 LLDP Nei ghb[...]

  • Pagina 161

    Figure 13-5 LLDP S tatistic Information The following ent ries are displaye d on this screen :  Auto Refresh Auto Refresh: Enable/Disable the aut o r efresh function. Refresh Rate: S pecify the auto refresh rate.  Global St atistics Last Up date : Displays latest update ti me of the st atistics. T ot al Inserts: Displays the number of neighbo[...]

  • Pagina 162

    based on the port number you entered. Port: Displays local device's port number . T ransmit T otal: Displays the number of L LDP DUs sent by this port. Receive T ot al: Displays the number of LLDPDUs received by this port. Discards: Displays the number of L LDPDUs discarded by this port. Errors: Displays the number of error LLDPDUs received by[...]

  • Pagina 163

    Extended Power-Via-MDI TLV The Extended Power-Via-MDI TLV is intended to enable advanced power management between LLDP-MED Endpoint and Network Connectivity Devices, and it allows advertisement of fine graine d pow er requirement details, Endpoint power priority, as we ll as both Endpoint and Network Connectivity Device power status. Inventory TLV [...]

  • Pagina 164

    Figure 13-7 LLDP-MED Port Configuration The following ent ries are displaye d on this screen :  LLDP-MED Port Config Port Select: Select the desired port to configure. LLDP-MED S t atus: Configure the port's LLDP-MED statu s : Enable: Enable the port's LLDP- MED status, and the port's Admin S tatus will be changed to Tx&Rx. Di[...]

  • Pagina 165

     Included TL Vs Select TL Vs to be included in outgoing LLDPDU.  Location Identification Parameters Configure the Locati on Identification TLV's content in outgoing LLDPDU of the port. Emergency Number: Emergency number is Emergency Ca ll Service ELIN identifier, which is used during emergency call setup to a traditional CAMA or ISDN tru[...]

  • Pagina 166

    Figure 13-8 LLDP-MED Local Informatio n The following ent ries are displaye d on this screen :  Auto Refresh Auto Refresh: Enable/Disable the aut o r efresh function. Refresh Rate: S pecify the auto refresh rate.  Local Info Enter the desired port number and click Select to display the information of the corresponding port. 13.4.4 Neighbor In[...]

  • Pagina 167

    Figure 13-9 LLDP-MED Neighbor Inform ation The following ent ries are displaye d on this screen :  Auto Refresh Auto Refresh: Enable/Disable the aut o r efresh function. Refresh Rate: S pecify the auto refresh rate.  Neighbor Info Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered.[...]

  • Pagina 168

    Chapter 14 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to locate and solve the network problem. ( 1 ) System Monitor: Monitor the utilization stat us of the memory and the CPU of switch. ( 2 ) Log: View the configuration parameters of t he switch and find out[...]

  • Pagina 169

    14.1.2 Memor y Monitor Choose the menu Maintenance → S ystem Monitor → Memory Monitor to load the following page. Figure 14-2 Memory Monitor Click the Monitor button to enable the switch to monitor and display its Memory utilization rate every four seconds. 14.2 Log The Log system of switch can re cord, classify and manage the syst em informati[...]

  • Pagina 170

    The Log function is implemented on the Log T able , Local Log , Remote Log and Backup Log pages. 14.2.1 Log T able The switch supports logs output to two directions, namely , log b uffer and log file. The information in log buffer will be lost af ter the switch is reboot ed or powered off whereas the information in log file will be kept ef fective [...]

  • Pagina 171

    Choose the menu Maintenance → Log → Local Lo g to load the following page. Figure 14-4 Local Log The following ent ries are displaye d on this screen:  Local Log Config Select: Select the desired entry to conf igure the corresponding local log. Log Buffer: Indicates the RAM for saving system log. The inforamtion in the log buffer is displaye[...]

  • Pagina 172

    Figure 14-5 Log Host The following ent ries are displaye d on this screen:  Log Host Index: Displays the index of the log host. The switch supports 4 log hosts. Host IP: Configure the IP for the log host. UDP Port: Displays the UDP port used for receiving/sending log information. Here we use the standard port 514. Severity: Specify the severity [...]

  • Pagina 173

     Backup Log Backup Log: Click the Backup Log button to save the log as a file to your computer . Note: It will take a few minutes to backup the l og file. Please wait without any operat ion. 14.3 Device Diagnostics This switch provides Cable T est and Loopback functions for device diagnose. 14.3.1 Cable T est Cable T est functions to test the co[...]

  • Pagina 174

    14.3.2 Loopback Loopback test function, looping the sender and the receiver of the si gnal, is used to test whether the port of the switch is available as well as to check and analyze the physical connection st atus of the port to help you locate and solve network malfunctions. Choose the menu Maintenance → Device Diagnostics → Loopback to load[...]

  • Pagina 175

    Figure 14-9 Ping The following ent ries are displaye d on this screen:  Ping Config Destination IP: Enter the IP address of the destination node for Ping test. Ping Times: Enter the amount of times to send test data during Ping testing. The default value is recommended. Dat a Size: Enter the size of the sending dat a during Ping testing. The def[...]

  • Pagina 176

     T racert Config Destination IP: Enter the IP address of the destination device. Max Hop: S pecify the maximum number of t he route hops the test data can pass through. Return to CONTENTS 168[...]

  • Pagina 177

    Appendix A: Sp ecifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Bas e-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEEE802.3z 1000Base- X Gigabit Ethernet IEEE802.3x Flow Control IEEE802.1p QoS Standards IEEE802.1q VLAN Ethernet: 10Mbps HD , 20Mbps FD Fast Ethernet: 100Mbps HD , 200Mbps FD Transmission Rate Gigabit [...]

  • Pagina 178

    Return to CONTENTS 170[...]

  • Pagina 179

    Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make sure your Ethernet Adapter is work ing, refer to the adapter ’s manual if necessary . 1) On the Windows taskbar , click the Start button, and then click Control Panel . 2) Click the Net w ork and Interne[...]

  • Pagina 180

    172 5) The following TCP/IP Properties window will display and the I P Address t ab is open on this window by default. Figure B-3 6) Select Use the following IP address . And the following items will be available. If the switch's IP address is 192.168.0.1, specify IP address as 192.168.0. x (x is from 2 to 254), and the Subnet mask as 255.255.[...]

  • Pagina 181

    Appendix C: Glossary Boot Protocol (BOOTP) BOOTP is used to provide bootup informat ion for netwo rk devices, including IP address information, the address of the TFTP server that contains the de vices system files, and the name of the boot file. Class of Service (CoS) CoS is supported by prioritizing packets based on the required leve l of service[...]

  • Pagina 182

    Internet Group Manageme nt Protocol (IGMP) A protocol throug h which hos ts can register with their local router for multicast services. If there is more than one multicast switch/router on a gi ven subnetwork, one of t he devices is made the “querier” and assumes responsibility fo r keeping track of group membership. IGMP Snooping Listening to[...]

  • Pagina 183

    175 Remote Authentication Dial-in User Service (RADIUS) RADIUS is a logon authent ication protocol that uses software running on a central server to control access to RADIUS-comp liant devices on the network. Remote Monitoring (RMON) RMON provides comprehensive netwo rk monitoring capabilities. It eliminates the polling required in standard SNMP, a[...]