Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
TP-Link TL-SG2424P manuale d’uso - BKManuals

TP-Link TL-SG2424P manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso TP-Link TL-SG2424P. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica TP-Link TL-SG2424P o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso TP-Link TL-SG2424P descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso TP-Link TL-SG2424P dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo TP-Link TL-SG2424P
- nome del fabbricante e anno di fabbricazione TP-Link TL-SG2424P
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature TP-Link TL-SG2424P
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio TP-Link TL-SG2424P non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti TP-Link TL-SG2424P e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio TP-Link in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche TP-Link TL-SG2424P, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo TP-Link TL-SG2424P, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso TP-Link TL-SG2424P. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    TL-SG2424P 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slot s REV1.0.0 1910010774[...]

  • Pagina 2

    COPYRIGHT & TRADEMARKS S pecifications ar e subject to change w ithout notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., L TD. Other brands and product names are trademarks or registered trademarks of t heir respective holders. No part of the specificatio ns ma y be reproduced in any form or by any means or used to make any derivat[...]

  • Pagina 3

    Safety Information  When product has power button, the power butto n is one of the way to shu t off the product; When there is no power button, the only way to co mpletely shut off power is to disconnect the product or the power adapter from the power source.  Don’t disassemble the product, or make repairs yourself. Y ou run the risk of ele[...]

  • Pagina 4

    CONTENTS Package Contents .......................................................................................................................... 1 Chapter 1 About this Guide ........................................................................................................... 2 1.1 Intended Readers .........................................[...]

  • Pagina 5

    5.1.1 Port Config ....................................................................................................... 29 5.1.2 Port Mirror ........................................................................................................ 30 5.1.3 Port Security ...............................................................................[...]

  • Pagina 6

    Chapter 8 Multicast ..................................................................................................................... 83 8.1 IGMP Snooping .......................................................................................................... 85 8.1.1 Snooping Config ...........................................................[...]

  • Pagina 7

    1 1.1.1 Global Config ................................................................................................. 124 1 1.1.2 SNMP V iew .................................................................................................... 125 1 1.1.3 SNMP Group ...................................................................................[...]

  • Pagina 8

    IX 13.4.2 T racert ............................................................................................................ 160 Appendix A: S pecifications ......................................................................................................... 162 Appendix B: Configuring the PCs ................................................[...]

  • Pagina 9

    Package Content s The following items should be found in your box:  One 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots  One power cord  Two mounting brackets and other fittings  Installation Guide  Resource CD for TL-SG2424P switch, including:  This User Guide  Other Helpful Information Note: Make sure that the package[...]

  • Pagina 10

    Chapter 1 About this Guide This User Guide contains in formation for setup an d management of TL-SG2424P 24-Port Gigabit Smart PoE Switch with 4 Combo SFP Slots. Pl ease read this guide carefully before operation. 1.1 Intended Readers This Guide is intended for network managers fam iliar with IT concepts and network terminologies. 1.2 Conventions I[...]

  • Pagina 11

    Chapter Introduction Chapter 4 System This module is used to configure system properties of the switch. Here mainly introduces:  System Info: Configure the description, system time and network parameters of the switch.  User Management: Configure the user name and password for users to log on to the W eb management page with a certain access [...]

  • Pagina 12

    Chapter Introduction Chapter 9 QoS This module is used to configure QoS function to provide different quality of service for va rious network ap plications and requirements. Here mainly introduces:  Diff Se rv : C onf ig ure prio rities, port priori ty , 802.1P priority an d DSCP priority .  Bandwidth Control: Configure rate limit feature to [...]

  • Pagina 13

    Chapter 2 Introduction Thanks for choosing the TL-SG2424P 24-Port Gig abi t Smart PoE Switch with 4 Combo SFP Slot s! 2.1 Overview of the Switch Designed for workgroups and department s, TL-SG2424P from TP-LINK provides wire-speed performance and abundant layer 2 management features. It provides a varie ty of service features and multiple powerful [...]

  • Pagina 14

    2.3 Appearance Description 2.3.1 Front Panel Figure 2-1 Front Panel The following parts are lo cated on the front panel of the switch:  Reset: Press this button for 5 seconds or above to reset the software settings back to the factory defaults.  10/100/1000Mbps RJ45 Port s: Designed to connect to the devic e with a bandwidth of 10Mbp s, 100Mb[...]

  • Pagina 15

    When the Po E LED is on, the port LED is indicating the power supply status. LED Stat us Indication On The switch is powered on. Off The switch is powered off or power supply is abnormal. Power Flashing Power supply is abnormal. Flashing The switch works properly. System On/Off The switch works improperly. On The remaining PoE power ≤ 7W. Flashin[...]

  • Pagina 16

    Chapter 3 Login to the Switch 3.1 Login 1) T o access the configurat ion utility , open a web-browser and type in the default address http://192.168.0.1 in the address field of the browser , then press the Enter key . Figure 3-1 Web-browser Tips: T o log in to the switch, the IP address of your PC should be set in the same subnet addresses of the s[...]

  • Pagina 17

    Figure 3-3 Main Setup-Menu Note: Clicking Appl y can only make the new conf igurations effective before the switch is rebooted. If you want to keep the configur ations effective even the swit ch is rebooted, please click Save Config . Y ou are suggested to click Save Config before cutting off the power or rebooting the switch to avoid losing the ne[...]

  • Pagina 18

    Chapter 4 System The System module is mainly for system confi guration of the switch, including four submenus: System Info , User Management, System T ools and Access Securit y . 4.1 System Info The System Info, mainly for basic proper ties configuration, can be implemented on System Summary , Device Description , Sy stem Time , Daylight Saving Ti [...]

  • Pagina 19

    Indicates the SFP port is not connected to a device. Indicates the SFP port is at the speed of 1000Mbps. Indicates the SFP port is at the speed of 100Mbps. When the cursor moves on the port, the detailed information of the port will be displayed. Figure 4-2 Port Information  Port Info Port: Displays the port number of the switch. Ty p e : Displa[...]

  • Pagina 20

     Bandwidth Utilization Rx: Select Rx to display the bandwidth utilization of receiving p ackets on this port. Tx: Select Tx to display the bandwid th utilization of sending packets on this port. 4.1.2 Device Description On this page you can configur e the descriptio n of the switch, incl uding device nam e, device locati on and system contact. C[...]

  • Pagina 21

    Figure 4-5 System T ime The following entries are displayed on this screen:  Tim e In fo Current System Date: Displays the current date and time of the switch. Current Time Source: Displays the current time source of the switch.  Time Config Manual: When this option is selected, you can set the date and time manually . Get Time from NTP Serve[...]

  • Pagina 22

    Choose the menu System → System Info → Day light Saving Time to load the following page. Figure 4-6 Daylight Saving T ime The following entries are displayed on this screen:  DST Config DST St atus: Enable or disable the DST . Predefined Mode: Select a predefined DST configuration.  USA: First Sunday in April, 02:00 ~ Last Sunday in Octob[...]

  • Pagina 23

    Note: 1. When the DST is disabl ed, the predefined mode, recu rring mode and date mode cannot be configured. 2. When the DST is enabled, the default daylight saving time is of Europe in predefined mode. 4.1.5 System IP Each device in the network possesses a unique IP Address. Y ou can log on to the Web management page to operate the switch using th[...]

  • Pagina 24

    Subnet Mask: Enter the subnet mask of the switch. Default Gat eway: Enter the default gateway of the switch. Note: 1. Changing the IP address to a different IP segment will interrupt the network communication, so please keep the new IP address in the sa me IP segment with the local network. 2. The switch o nly possesses an IP address. The IP addres[...]

  • Pagina 25

    Figure 4-9 User Config The following entries are displayed on this screen:  User Info User Name: Create a name for users’ login. Access Level: Select the access level to login.  Admin: Admin can edit, modify and view all the settings of different functions.  Guest: Guest only can view the settings without the right to edit and modify . U[...]

  • Pagina 26

    4.3 System T ools The System T ools function, allo wing you to manage the configurat ion file of the switch, can be implemented on Config Restore , Config Backup , Firmware Upgrade , System Reboot and Syst em Reset p ages. 4.3.1 Config Restore On this page you can upload a backup configuration file to restore your switch to this previous configurat[...]

  • Pagina 27

    Figure 4-1 1 Config Backup The following entries are displayed on this screen:  Config Backup Backup Config: Click the Backup Config button to save the current configuration as a file to your computer . Y ou are suggested to take this measure before upgrading. Note: It will take a few minutes to backup the configuration. Pleas e wait without any[...]

  • Pagina 28

    Note: 1. Don’t interrupt the upgrade. 2. Please select the proper software version matching with your hardware to upgrade. 3. T o avoid damage, please don't turn off the device while upgrading. 4. After upgrading, the devic e will reboot automatically . 5. Y ou are suggested to backup t he configuration before upgradi ng. 4.3.4 System Reboot[...]

  • Pagina 29

    4.4.1 Access Control On this page you can control the users logging on to the W eb management page to enhance the configuration management security. The def initions of Admin and Guest refer to 4.2 User Management . Choose the menu System → Access Security → Access Control to load the following page. Figure 4-15 Access Control The following ent[...]

  • Pagina 30

    Port: The field can be available for c onfiguration only when Port-based mode is selected. Only the users connected to these port s you set here are allowed for login.  Session Config Session Timeout: If you do nothing with the Web management page within the timeout time, the system will log out automatically . If you want to reconfigure, pl eas[...]

  • Pagina 31

    Figure 4-16 SSL Config The following entries are displayed on this screen:  Global Config SSL: Select Enable/Disable the SSL function on the switch.  Certificate Download Certificate File: Select the desired certificate to download to the switch. The certificate must be BASE64 encoded.  Key Download Key File: Select the desired SSL Key to [...]

  • Pagina 32

    Comprising server and client, SSH has two versi ons, V1 and V2 which are not compatible with each other . In the communication, SSH server and client can auto-negotia te the SSH version and the encryption algorithm. After getting a successful negotiation, the client sends authentication request to the server for login, and then the tw o can communi[...]

  • Pagina 33

    Ke y File: Select the desired key file to download. Download: Click the Dow nload button to download the desire d key file to the switch. Note: 1. Please ensure the key length of the downloaded file is in the range of 256 to 3072 bits. 2. After the Key File is downloaded, the user’s original key of the same type will be replaced. The wrong upload[...]

  • Pagina 34

    Application Example 2 for SSH:  Network Requirements 1. Log on to the switch via password authentic ation using SSH and the SSH function is enabled on the switch. 2. PuTTY client sof tware is recommended.  Configuration Procedure 1. Select the key type and key length, and generate SSH key . Note: 1. The key length is in the range of 256 to 30[...]

  • Pagina 35

    3. On the Web management page of the switch, download the public key file saved in the computer to the switch. Note: 1. 1. The key type should accord with the type of the key file. 2. 2. The SSH key downloading cannot be interrupted. 4. Download the private key f ile to SSH client software. 27[...]

  • Pagina 36

    28 5. After the public key and private key are dow nl oaded, please log on to the interface of PuTTY and enter the IP address for login. After successful authentication, pl ease enter the login user name. If you log on to the switch without entering password, it indicates t hat the key has been successfully downloaded. Return to CONTENTS[...]

  • Pagina 37

    Chapter 5 Switching Switching module is used to conf igure the basic functi ons of the switch, in cluding four submenus: Port , LAG , T raffic Monitor and MAC Address . 5.1 Port The Port function, allowing you to configure the basic features fo r the port, is implemented on the Port Config , Port Mirror , Port Security , Port Isolation and Loopback[...]

  • Pagina 38

    Description: Give a description to the port for identification. Statu s: Allows you to Enable/Dis able the port. When Enable is selected, the port can forward the packet s normally . Speed and Duplex: Select the S peed and Duplex mode for the port. The device connected to the switch s hould be in the same S peed and Duplex mode with the switch. Whe[...]

  • Pagina 39

    Mirroring: Displays the mirroring p ort number . Mode: Displays the mirror mode, the val ue can be "Ingress" or "Egress". Mirrored Port: Displays the mirrored ports. Operation: Click Edit to configure the mirror group. Click Edit to display the following figure. Figure 5-3 Mirroring Port The following entries are displayed on th[...]

  • Pagina 40

    Select: Select the desired port as a mirrored p ort. It is multi-optional. Port: Displays the port numbe r . Ingress: Select Enable/Disable the Ingress feature. When the Ingress is enabled, the incoming packet s received by the mirrored port will be copied to the mirroring port. Egress: Select Enable/Disable the Egress feature. When the Egress is e[...]

  • Pagina 41

    Figure 5-4 Port Security The following entries are displayed on this screen:  Port Security Select: Select the desired port for Port Security configuration. It is multi-optional. Port: Displays the port number . Max Learned MAC: S pecify the maximum number of MAC addresses that can be learned on the port. Learned Num: Displays the number of MAC [...]

  • Pagina 42

    Note: The Port Security function is di sabled for the LAG port member . Only the port is removed from the LAG , will the Port Security f unction be available for the port. 5.1.4 Port Isolation Port Isolation provides a method of restricting traffic flow to improve the network security by forbidding the port to forward packet s to the ports that are[...]

  • Pagina 43

     Port Isolation List Port: Display the port number . Forward Portlist: Display the forwardlist. 5.1.5 Loopback Detection With loopback detection feature enabled, the swit ch can detect loops using loopback detection packet s. When a loop is detected, the switch will di splay an alert or further block the corresponding port according to the port [...]

  • Pagina 44

    Dete ction Interval: Set a Loopback Detection interval between 1 and 1000 seconds. By default, it’s 30 seconds. Automatic Recovery Tim e : T ime after which the blocked port would automatically recover to normal status. It can be set as int egral times of detection interval. Web Re fresh St atus: Here you can enable or disable web automatic refre[...]

  • Pagina 45

     If the ports, which are enabled for the 802.1Q VLAN , Vo i c e V L A N , STP , QoS and Port Configuration ( S peed and Duplex , Flow Control ), are in a LAG , thei r configurations should be the same.  The ports, which are enabled for the Port Security , Port Mirror , MAC Address Filtering and St atic MAC Address Binding , cannot be added to[...]

  • Pagina 46

     SRC IP + DST IP: When this option is selected, the Aggregate Arithmetic w ill apply to the source and destination IP addresses of the p ackets.  LAG T able Select: Select the desired LAG . It is multi-optional. Group Number: Displays the LAG number here. Description: Displays the description of LAG . Member: Displays the LAG member . Operati[...]

  • Pagina 47

    Figure 5-8 Manually Config The following entries are displayed on this screen:  LAG Config Group Number: Select a Group Number for the LAG . Description: Displays the description of LAG .  LAG T able Member Port: Select the p ort as the LAG member . Clearing all the ports o f the LAG will delete this LAG . Tips: 1. The LAG can be deleted by c[...]

  • Pagina 48

    aggregation group. In an aggr egation group, the port with smalle r port priority will be considered as the preferred one. If the two port prioriti es are equal, the port with smaller port number is preferred. After an aggregation group is es tablished, the selected ports can be aggregated together as one port to transmit packe ts. On this page, yo[...]

  • Pagina 49

    Port: Displays the port numbe r . Admin Key: S pecify an Admin Key for the port. The member ports in a dynamic aggregation group must have the same Admin Key . Port Priority: S pecify a Port Priority for the port. This value determines the pri ority of the port to be selected as the dynamic aggregation group member . The port with smaller Port Prio[...]

  • Pagina 50

    The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Allows you to Enable/Disable refreshing the T raffic Summary automatically . Refresh Rate: Enter a value in seconds to specify the refresh interval.  T raffic Summary Port Select: Click the Sele ct button to quick-select the corresponding port based on the port nu[...]

  • Pagina 51

    Figure 5-1 1 T raffic S tatistics The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Allows you to Enable/Disable refreshing the Traf fic Summary automatically . Refresh Rate: Enter a value in seconds to specify the refresh interval.  St atistics Port: Enter a port number and click the Select button to view the tr[...]

  • Pagina 52

    (Alignment Error). Th e length of the packet is between 64 bytes and 1518 bytes. UndersizePkt s: Displays the number of the re ceived packets (excluding erro r packet s) that are less than 64 bytes long. Pkt s64Octets: Displays the number of the re ceived packet s (including erro r packet s) that are 64 bytes long. Pkt s65to127 Octets: Displays the[...]

  • Pagina 53

    This function incl udes four submenus: Address T able , St atic Address , Dynamic Address and Filtering Address . 5.4.1 Address T able On this page, you can view all the information of the Address T able. Choose the menu Sw it chin g → MAC Address → Address T able to load the following page. Figure 5-12 Address T able The following entries are [...]

  • Pagina 54

    Aging S t atus: Displays the Aging status of the MAC address. 5.4.2 St atic Address The static address t able maintains the static address entries which can be added or removed manually , independe nt of the aging time. In the st able networks, the st at ic MAC address entries can facilitate the switch to reduce broadcast packets and rema rkably en[...]

  • Pagina 55

     St atic Address T able Select: Select the entry to delete or modi fy the corresponding po rt number . It is multi-optional. MAC Address: Displays the static MAC Address. VLAN ID: Displays the correspondin g VLAN ID of the MAC address. Port: Displays the corresponding Port number of the MAC address. Here you can modify the port number to which t[...]

  • Pagina 56

    Figure 5-14 Dynamic Address The following entries are displayed on this screen:  Aging Config Auto Aging: Allows you to Enable/Disable t he Auto Aging featur e. Aging Time: Enter the Aging T ime for the dyn amic address.  Search Option Search Option: Select a Search Option fr om the pull-down list and click the Search button to find your desi[...]

  • Pagina 57

    Bind: C lick the Bind button to bind the MAC address of your selected entry to the corresponding port statically . Tips: Setting aging time properly helps implement effect ive MAC address aging. The aging time that is too long or too short results decreas es the performance of the switch. If the aging time is too long, excessive invalid MAC address[...]

  • Pagina 58

     Search Option Search Option: Select a Search Option fr om the pull-down list and click the Search button to find your desired entry in the Filtering Address T able.  MAC: Enter the MAC address of your desired entry .  VLAN ID: Enter the VLAN ID number of your desired entry .  Filtering Address T able Select: Select the entry to delete [...]

  • Pagina 59

    Figure 5-16 Network diagram of DHCP For different DHCP clients, DHCP ser ver pr ovides three IP address assigning methods: (1) Manually assign the IP address: Allows the adm inistrator to bind the static IP address to a specific client (e.g.: WWW Server) via the DHCP server . (2) Automatically assign the IP address: DHCP server assigns the IP addre[...]

  • Pagina 60

    p acket and broadcast the DHCP-REQUEST p acket which includes the assigned IP address of the DHCP-OFFER packet. ( 4 ) DHCP-ACK Stage: Since the DHCP-REQUEST packet is broadcasted, all DHCP servers on the network segment can rece ive it. However , only the re quested server processes the request. If the DHCP server acknowledges assi gning this I[...]

  • Pagina 61

    53 Figure 5-19 DHCP Filtering The following entries are displayed on this screen:  DHCP Filtering DHCP Filtering: Enable/Disable the DHCP Fi ltering function globally .  T rusted Port Here you can select the desired port(s) to be Tr usted Port(s). Only the T rusted Port(s) can receive DHCP packets from DHCP Servers. Click All button to select[...]

  • Pagina 62

    Chapter 6 VLAN The traditional Ethernet is a data network communication technology based on CSMA/CD (Carrier Sense Multiple Access/Collision Detect) vi a shared communication medium. Through the traditional Ethernet, the overfull hosts in LAN will result in serious collis ion, flooding broadcasts, poor performance or even break down of the Internet[...]

  • Pagina 63

    with 802.1Q VLAN. If a packet is matched, the sw itch will add a corresponding VLAN tag to it and forward it in the corresponding VLAN. 6.1 802.1Q VLAN VLAN tags in the packet s are necessary for the sw itch to identify packets of different VLANs. The switch works at the data link layer in OSI model and it can identify the data link layer encapsula[...]

  • Pagina 64

    can receive and forward the packets of multiple VLANs. When the p ackets are forwarded by the TRUNK port, it s VLAN tag will not be changed. ( 3 ) GENERAL: The GENERAL port can be added in multiple VLANs and set various egres s rules according to the different VLANs. T he default egress rule is UNT AG . The PVID can be set as the VID number of [...]

  • Pagina 65

    6.1.1 VLAN Config On this page, you can view the current created 802.1Q VLAN. Choose the menu VLAN → 802.1Q VLAN → VLAN Config to load the following page. Figure 6-3 VLAN T able T o ensure the normal communication of the factory sw itch, the default VLAN of all ports is set to VLAN1. VLAN1 cannot be deleted. The following entries are displayed [...]

  • Pagina 66

    Figure 6-4 Create or Modify 802.1Q VLAN The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the ID number of VLAN. Description: Give a description to the VLAN for identification. Check: Click the Check button to check whether the VLAN ID you entered is valid or not.  VLAN Members Port Select: Click the Select butto[...]

  • Pagina 67

    Egress Rule : Select the Egress Rule for the VLAN port member . The default egress rule is UNT AG .  T AG: All packets forwarded by the port are tagged. The packet s contain VLAN information.  UNT AG: Packets forwarded by the port are untagged. LAG: Displays the LAG to which the port belongs. 6.1.2 Port Config Before creating the 802.1Q VLAN,[...]

  • Pagina 68

    Link T ype: Select the Link T ype from t he pull-down list for the port.  ACCESS: The ACCESS port can be added in a single VLAN, and the egress rule of the port is UNT AG . The PVID is same as the current VLAN ID. If the current VLAN is deleted, the PVID will be set to 1 by default.  TRUNK: The TRUNK port can be added in multiple VLANs, and t[...]

  • Pagina 69

    Configuration Procedure: Ste p Operation Description 1 Set the link type for port. Required. On the VLAN → 802.1Q VLAN → Port Config page, set the link type for the port based on its connected device. 2 Create VLAN. Required. On the VLAN → 802.1Q VLAN → VLAN Config page, click the Create button to create a VLAN. Enter the VLAN ID and the de[...]

  • Pagina 70

     Configuration Procedure  Configure switch A Ste p Operation Description 1 Configure the Link T ype of the ports Required. On VLAN → 802.1Q VLAN → Port Config page, configure the link type of Port 2, Port 3 and Port 4 as ACCESS, TRUNK and ACCESS respectively 2 Create VLAN10 Required. On VLAN → 802.1Q VLAN → VLAN Config page, create a [...]

  • Pagina 71

    Chapter 7 S p anning T ree STP (S panning T ree Prot ocol), subject to IEEE 802.1 D standard, is to disbranch a ring network in the Data Link layer in a local netwo rk. Devices running STP discover loops in the network and block ports by exchanging inf ormation, in that way , a ring net work can be disbranched t o form a tree-topologi cal ring-free[...]

  • Pagina 72

     Port: Port 3 is the root port of switch B and port 5 is the root port of switch C; port 1 is the designated port of switch A and por t 4 is the designated port of swit ch B; port 6 is the blocked port of switch C. Figure 7-1 Basic STP diagram  STP T imers Hello T ime: Hello T ime ranges from 1 to 10 seconds. It specifie s the interval to sen[...]

  • Pagina 73

     STP Generation  In the beginning In the beginning, each switch regards itself as the root, and generates a configuration BPDU for each port on it as a root, with the root path cost being 0, the ID of the designated bridge being that of the switch, and the designated port being itself.  Comparing BPDUs Each switch sends out configur ation [...]

  • Pagina 74

    RSTP (R apid S pann ing Tr ee Pr otoc ol), e volve d fro m the 802.1 D STP standard, enable Ethernet ports to transit their states rapidl y . The premises for the port in the RSTP to transit it s state rapidly are as follows.  The condition for the root port to transit its port state rapidly: The old root port of the switch stops forwarding data[...]

  • Pagina 75

    Figure 7-2 Basic MSTP diagram  MSTP MSTP divides a network into several MST r egions. The CST is generat ed betwee n these MST regions, and multiple spanning trees can be gener ated in each MST region. Each spanning tree is called an instance. As well as STP , MSTP us es BPDUs to generate sp anning tree. The only difference is that the BPD U for[...]

  • Pagina 76

    Figure 7-3 Port roles The S panning Tree module is mainly for sp anning tree configuration of the switch, including four submenus: STP Config , Port Config , MSTP Inst ance and STP Security . 7.1 STP Config The STP Config function, for global configuration of spanning trees on the switch, can be implemented on STP Config and STP Summary pages. 7.1.[...]

  • Pagina 77

    The following entries are displayed on this screen:  Global Config STP: Select Enable/Disable STP f unction globally on the switch. V ersion: Select the desired STP version on the switch.  STP: S panning T ree Protocol.  RSTP: Rapid S panning T ree Protocol.  MSTP: Multiple S panning T ree Protocol.  Parameters Config CIST Priority: [...]

  • Pagina 78

    4. If the TxHold Count parameter is too large, the number of MSTP p a ckets being sent in each hello time may be increased with occupying too much network resources. The default value is recommended. 7.1.2 STP Summary On this page you can view the related parameters for S panning T ree function. Choose the menu Sp anning T ree → STP Config → ST[...]

  • Pagina 79

    Figure 7-6 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for STP conf iguration. It is multi-optional. Port: Displays the port number of the switch. Statu s: Select Enabl[...]

  • Pagina 80

    Port Role: Displays the role of the po rt played in the STP Instance.  Root Port: Indicates the port that has the lowest path cost from this bridge to the Root Bridge and forwards packets to the root.  Designated Port: Indicates the port that forwards packets to a downstream network segment or switch.  Master Port: Indicates the port t hat[...]

  • Pagina 81

    Figure 7-7 Region Config The following entries are displayed on this screen:  Region Config Region Name: Create a name for MST region identif ication using up to 32 characters. Revision: Enter the revision from 0 to 6553 5 for MST region identification. 7.3.2 Instance Config Instance Configuration, a property of MST regi on, is used to describe [...]

  • Pagina 82

    The following entries are displayed on this screen:  Inst ance T able Inst ance ID Select: Click the Select button to quick-select the corresponding Instance ID based on the ID number you entered. Select: Select the desired Instance ID for c onfiguration. It is multi-optional. Inst ance: Displays Instance ID of th e switch. Statu s: Select Enabl[...]

  • Pagina 83

    Figure 7-9 Instance Port Config The following entries are displayed on this screen:  Port Config Inst ance ID: Select the desired inst ance ID for its port configuration. Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port to specify its priority and pa[...]

  • Pagina 84

    Note: The port status of one port in dif ferent spanning tree instances can be different. Global configuration Procedure for S panning T ree function: Ste p Operation Description 1 Make clear roles the switches play in spanning tree instances: root bridge or designated bridge Preparation. 2 Globally configure MSTP parameters Required. Enable S pann[...]

  • Pagina 85

     Root Protect A CIST and its secondary root bridges are usually located in the high-bandwidth core region. Wrong configuration or malicious attacks may resu lt in configuration BPD U p ackets with higher priorities being received by the legal root bridge, which causes the cu rrent legal root bridge to lose its position and network topology jitte[...]

  • Pagina 86

    Figure 7-10 Port Protect The following entries are displayed on this screen:  Port Protect Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for port protect configuration. It is multi-optional. Port: Displays the port number of the switch. Loop Prote[...]

  • Pagina 87

    7.4.2 TC Protect When TC Protect is enabled for the port on Port Protect page, the TC threshold and TC protect cycle need to be configured on this page. Choose the menu Sp anning T ree → STP Security → TC Protect to load the following p age. Figure 7-1 1 T C Protect The following entries are displayed on this screen:  TC Protect TC Threshold[...]

  • Pagina 88

     Configuration Procedure  Configure switch A: Ste p Operation Description 1 Configure ports On VLAN → 802.1Q VLAN page, configure the link type of the related ports as T runk, and add the ports to VLAN101-VLAN106. The detailed instructions can be found in the section 802.1Q VLAN . 2 Enable STP function On Sp anning T ree → STP Config → [...]

  • Pagina 89

     Configure switch C: Ste p Operation Description 1 Configure ports On VLAN → 802.1Q VLAN page, configure the link type of the related ports as T runk, and add the ports to VLAN101-VLAN106. The detailed instructions can be found in the section 802.1Q VLAN . 2 Enable STP function On Sp anning T ree → STP Config → STP Config page, enable STP [...]

  • Pagina 90

    links; the gray p aths ar e the blocked links.  For Instance 2 (VLAN102, 104 and 106), the blue pa ths in the following fig ure are connected links; the gray paths ar e the blocked links.  Suggestion for Configuration  Enable TC Protect functio n for all the ports of switches.  Enable Root Protect function for a ll the ports of root bri[...]

  • Pagina 91

    Chapter 8 Multicast  Multicast Overview In the network, packet s are sent in three modes: unicast, broadcas t and multicast. In unicast, the source server sends separate copy information to each receiver . When a large n umber of users require this information, the serv er must send many pieces of info rmation with the same content to the users.[...]

  • Pagina 92

     Multicast Address 1. Multicast IP Address: As specified by IANA (Internet Assigned Numbers Authority), Class D IP addresses are used as destination addresses of multic ast packets. The multicast IP addresses range from 224.0.0.0~239.255.255.255. The following table displays the range and description of several special multicast IP addresses. Mu[...]

  • Pagina 93

     IGMP Snooping In the network, the hosts apply to the near Router for joining (leaving) a multicast group by sending IGMP (Internet Group Management Protocol) me ssages. When the up-str eam device forwards down the multicast data, the switch is responsible for sending them to the hosts. IG MP Sn oopin g i s a multicast contr ol mechanism, which [...]

  • Pagina 94

    3. IGMP Leave Message The host, running IGMPv1, does not send IGMP l eave message when leaving a multicast group, as a result, the switch cannot get the leave info rmation of the host momentarily . How ever , after leaving the multicast group, the host does not send IGMP report message any more, so the switch will remove the port from the correspon[...]

  • Pagina 95

    Figure 8-4 Basic Config The following entries are displayed on this screen:  Global Config IGMP Snooping: Select Enable/Disable IGMP S nooping function globally on the switch. Unknown Multicast: Select the operation for the swit ch to process unknown multicast, Forward or Discard.  IGMP Snooping S tatus Description: Displays IGMP Snooping sta[...]

  • Pagina 96

    Figure 8-5 Port Config The following entries are displayed on this screen:  Port Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for IGMP Snooping feature conf iguration. It is multi-optional. Port: Displays the port of the switch. IGMP Snoop[...]

  • Pagina 97

    Figure 8-6 VLAN Config The following entries are displayed on this screen:  VLAN Config VLAN ID: Enter the VLAN ID to enable IGMP Snooping for the desired VLAN. Router Port Time: S pecify the aging time of the router port. Within this time, if the switch doesn’t receive IGMP query message from the router p ort, it will consider this port is no[...]

  • Pagina 98

    Note: The settings here will be invalid when multicast VLAN is enabled Configuration procedure: Ste p Operation Description 1 Enable IGMP Snooping function Required. Enable IGMP Snooping globally on the switch and for the port on Multicast → IGMP Snooping → Snooping Config and Port Config page. 2 Configure the multicast parameters for VLANs Opt[...]

  • Pagina 99

     Multicast VLAN Multicast VLAN: Select Enable/Disable Multicast VLAN feature. VLAN ID: Enter the VLAN ID of the multicast VLAN. Router Port Time: S pecify the aging time of the router port. Within this time, if the switch doesn’t receive IGMP query message from the router p ort, it will consider this port is not a router port any more. Member [...]

  • Pagina 100

    4 Look over the configuration If it is successfully conf igured, the VLAN ID of the multicast VLAN will be displayed in the IGMP Snooping S tatus table on the Multicast → IGMP Snooping → Snooping Config page. Application Example for Multicast VLAN:  Network Requirements Multicast source sends multicast streams via the router , and the st rea[...]

  • Pagina 101

    2 Configur e ports On VLAN → 802.1Q VLAN function pages. For port 3, configure its link type as GENERAL and its egress rule as T AG , and add it to VLAN3, VLAN4 and VLAN5. For port 4, configure its link type as GENERAL and its egress rule as UNT AG , and add it to VLAN3 and VLAN 4. For port 5, configure its link type as GENERAL and its egress rul[...]

  • Pagina 102

    VLAN ID: Enter the VLAN ID the desired entry must carry . Port: Select the port number the desired entry must carry . Ty p e : Select the type the desired entry must carry .  All: Displays all multicast IP entries.  S tatic: Displays all stat ic multicast IP entries.  Dynamic: Displays all dynam ic multicast IP entries.  Multicast IP T [...]

  • Pagina 103

    VLAN ID: Enter the VLAN ID of the multicast IP . Forward Port: Enter the forward port of the multicast group.  Search Option Search Option: Select the rules for displaying multicast IP t able to find the desired entries quickly .  All: Displays all static multicast IP entries.  Multicast IP: Enter the multic ast IP address the desired entr[...]

  • Pagina 104

    Figure 8-10 Multicast Filter The following entries are displayed on this screen:  Create IP-Range IP Range ID : Enter the IP- range ID. St art Multicast IP: Enter start multicast IP of the IP-range you set. End Multicast IP: Enter end multicast IP of the IP-range you set.  IP-Range T able IP-Range ID Select: Click the Select button to quick-s[...]

  • Pagina 105

    Figure 8-1 1 Port Filter The following entries are displayed on this screen:  Port Filter Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for multicas t filtering. It is multi-optional. Port: Displays the port numbe r . Filter: Select Enable/[...]

  • Pagina 106

    Configuration Procedure: Ste p Operation Description 1 Configure IP-Range Required. C onfigure IP-Range t o be filtered on Multicast → Multicast Filter → IP-Range page. 2 Configur e multicast filter rules for ports Optional. Configure multicast filter rules for ports on Multicast → Multicast Filter → Port Filter page. 8.4 Packet S t atistic[...]

  • Pagina 107

     IGMP S tatistics Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Port: Displays the port number of the switch. Query Packet: Displays the number of query packet s the port received. Report Packet (V1): Displays the number of IGMPv1 report packet s the port received. Report Packet[...]

  • Pagina 108

    Chapter 9 QoS QoS (Quality of Service) functi ons to provide different quality of service for various network applications and requirements and optim ize the bandwidth resource dist ribution so as to provide a network service experience of a better quality .  QoS This switch classifies the ingr ess packets, map s the packet s to different priori[...]

  • Pagina 109

    2. 802.1 P Priority Figure 9-2 802.1Q frame As shown in the figure above, each 802.1Q T ag ha s a Pri field, comprising 3 bits. The 3-bit priority field is 802.1p priority in the range of 0 to 7. 802.1P priority determi nes the priority of the packets based on the Pri value. On the Web management page of the switch, you can configure different prio[...]

  • Pagina 110

    Figure 9-4 SP-Mode 2. WRR-Mode: We ight Round Robin Mod e. In this mode, packe ts in all the queues are sent in order based on the weight value for each queue and every queue can be assured of a certain service time. The weight value indicates the occupied proportion of the resource. WRR queue overcomes the disadvantage of SP queue that the packets[...]

  • Pagina 111

    The QoS module is mainly for traf fic control and priority configuration, including three submenus: DiffServ , Bandwidth Control and V oice VLAN . 9.1 DiffServ This switch classifies the ingr ess packets, map s the packet s to different priority queues and then fo rwa rd s t he pa ck ets acc or din g t o s pec if ie d scheduling algo rithms to impl[...]

  • Pagina 112

    Configuration Procedure: Ste p Operation Description 1 Select the port priority Required. On QoS → DiffServ → Port Priority page, configure the port priority . 2 Configure th e mapping relation between the 802.1P priority and TC Required. On QoS → DiffServ → 802.1P/CoS mapping page, configure the mappi ng relation between the 802.1P priorit[...]

  • Pagina 113

    The following entries are displayed on this screen:  DSCP Priority Config DSCP Priority: Select Enable or Disable DSCP Priority .  Priority Level DSCP: Indicates the priority determined by the DS region of IP dat agram. It ranges from 0 to 63. Priority: Indicates the 802.1P priority the packets with tag are mapped to. The priorities are label[...]

  • Pagina 114

    The following entries are displayed on this screen:  Priority and CoS-mapping Config T ag-id/Cos-id: Indicates the precedence level defined by IEEE802.1P and the CoS ID. Queue TC-id: Indicates the priority level of egress queue the packet s with tag and CoS-id are mapped to. The priority levels of egress queue are labeled as TC0, TC1, TC2 and TC[...]

  • Pagina 115

    SP+WRR-M ode: S t rict-Priority + Weight Round R obi n Mode. In this mode, this switch provides two scheduling groups, SP g roup and WRR group. Queues in SP group and WRR group are scheduled strictly based on strict-priority mode while the queues inside WRR g roup follow the WRR mode. In SP+WRR m ode, TC3 is in the SP group; TC0, TC1 and TC2 belong[...]

  • Pagina 116

    The following entries are displayed on this screen:  Rate Limit Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for Rate conf iguration. It is multi-optional. Port: Displays the port number of the switch. Ingress Rate (Kbps): Configure the ba[...]

  • Pagina 117

    Figure 9-1 1 S torm Control The following entries are displayed on this screen:  Storm Control Config Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Select: Select the desired port for S tor m Control configuration. It is multi-optional. Port: Displays the port number of the swit[...]

  • Pagina 118

    9.3 V oice V LAN V oice VLANs are configured spec ially for voice data stream. By configuring V o ice VLANs and adding the ports with voice devices attached to voic e VLANs, you can perform QoS-related configuration for voice data, ens uring the transmission priority of voice data stream and voice quality .  OUI Address (Organizationally unique [...]

  • Pagina 119

    Port V oice VLAN Mode V oice Stream T ype Link type of the port and processing mode ACCESS: Not supported. TRUNK: Supported. The default VL AN of the port can not be voice VLAN. TA G v o i c e stream GENERAL: Supported. The default VLAN of the port can not be voice VLAN and the egress rule of the access port in the default VLAN should be T AG . ACC[...]

  • Pagina 120

    Note: Don’t transmit voice stream toget her with other business packet s in the voice VLAN except for some special requirements. The V oice VLAN functi on can be implemented on Global Config, Port Config and OUI Config pages. 9.3.1 Global Config On this page, you can configure the global pa rameters of the voice VLAN, including VLAN ID, aging tim[...]

  • Pagina 121

    Figure 9-13 Port Config Note: T o enable voice VLAN function for the LAG member port, please ensure its member state accords with its port mode. If a port is a member port of voice VLAN, changing its port mode to be “Auto” will make the port leave the voice VLAN and will not join the voice VLAN automatically until it re ceives voice streams. Th[...]

  • Pagina 122

    Securit y Mode: Configure the security mode for forwarding packets.  Disable: All packet s are forwarded.  Enable: Only voice data are forwarded. Member St ate: Displays the state o f the port in the current voice VLAN. LAG: Displays the LAG number which the port belongs to. 9.3.3 OUI Config The switch supports OUI create and add the MAC addr[...]

  • Pagina 123

    Description: Displays the description of the OUI. Configuration Procedure of V oice VLAN: Ste p Operation Description 1 Configure the link type of the port Required. On VLAN → 802.1Q VLAN → Port Config page, configure the link type of ports of the voice device. 2 Create VLAN Required. On VLAN → 802.1Q VLAN → Port Config page, click the Crea[...]

  • Pagina 124

    Chapter 10 PoE PoE (Power over Ethernet) technology describes a system to transmit electrical power along with data to remote devices over standard twisted-p air cable in an Ethernet net work. It is especially useful for supplying power to IP telephones, wi reless LAN access points, cameras and so on.  Composition A PoE system usually consists o[...]

  • Pagina 125

    10.1.1 PoE Config On this page, you can configure the p a rameters to implement PoE function. Choose the menu PoE → PoE Config → PoE Config to load the following p age. Figure 10-1 PoE Config The following items are displayed on this screen:  Global Config System Power Limit: S pecify the max power the PoE switch can supply . Syst em Power C[...]

  • Pagina 126

    Po wer Limit ( 0. 1 w-3 0 w): Defines the max power the corresponding port can supply . Class1 represents 4w , Class2 represents 7w , Class3 represents 15.4w and Class4 represents 30w . Time Range: Select the time range for the PoE port to supply power . If No limit is selected, the PoE port will supply power all the time. PoE Profile: Select the p[...]

  • Pagina 127

    PoE Pr iority: The priority levels include High, Middle and Low in descendi ng order . When the supply power exceeds the system power limit, the PD linked to the port with lower priority will be disconnected. Power Limit: Defines the max power the corresponding port can supply . Class1 represents 4w , Class2 represents 7w , Class3 represents 15.4w [...]

  • Pagina 128

    Slice: Displays the time-slic e o f the time-range. Mode: Displays the mode the time-range adopts. Operation: Click Edit to modify this time-range and click Det ail to display the complete information of this time–range. 10.2.2 PoE Time-Range Create On this page you can create time-ranges. Choose the menu PoE → PoE Time-Range → PoE Time-Range[...]

  • Pagina 129

     Time-Slice T able Index: Displays the index of the time-slice. St art Time: Displays the start time of the time-slice. End Time: Displays the end time of the time-slice. Delete: Click the Delete button to delete the correspo nding time-slice. 10.2.3 PoE Holiday Config Holiday mode is applied as a different secured a ccess control policy from th[...]

  • Pagina 130

    Chapter 11 SNMP  SNMP Overvie w SNMP (Simple Network Management Protocol) has gained the most extens ive application on the UDP/IP networks. SNMP provides a management frame to monitor and maintain the network devices. It is used for automatica lly managing the various network devices no matter the physical differences of the devices. Curr ently[...]

  • Pagina 131

    application requirement. SNMP v1: SNMP v1 adopts Community Name authentic ation. The community name is used to define the relation between SNMP Management S tation and SNMP Agent. The SNMP pa ckets failing to pass community name authentication are discarded. The community name can limit access to SNMP Agent from SNMP NMS, functioning as a p assword[...]

  • Pagina 132

    The User configure d in a SNMP Group can manage the switch via the client program on management station. The specif ied User Name and the Auth/Privacy Password are used for SNMP Management S tation to access the SNMP Agent, functioning as the password. SNMP module is used to configure the SNMP f unction of the switch, including three submenus: SNMP[...]

  • Pagina 133

    Note: The amount of Engine ID c haracters must be even. 11.1.2 SNM P View The OID (Object Identifier) of t he SNMP packets is used to describe the managed objects of the switch, and the MIB (Management Information Base) is the set of the OIDs. The SNMP View is created for the SNMP management station to manage MIB objects. Choose the menu SNMP → S[...]

  • Pagina 134

    11.1.3 SNM P Group On this page, you can co nfigure SNMP Group to control the network access by providing the users in various groups with different management right s via the Read View , Write View and Notify V iew . Choose the menu SNMP → SNMP Config → SNMP Group to load the following page. Figure 1 1-5 SNMP Group The following entries are di[...]

  • Pagina 135

    Wr i te Vi ew : Select the View to be the W rite View . The management access is writing only and changes can be made to th e assigned SNMP V iew . The View defined both as the Read View and the Write V iew can be read and modified. Notify V iew : Select the V iew to be the Notify View . The management station can receive trap messages of the assig[...]

  • Pagina 136

    Figure 1 1-6 SNMP User The following entries are displayed on this screen:  User Config User Name: Enter the User Name here. User T ype: Select the type for the User .  Local User: Indicates that the user is connected to a local SNMP engine.  Remote User: Indicates that the user is connected to a remote SNMP engine. Group Name: Select the [...]

  • Pagina 137

     User T able Select: Select the desired entry to del ete the corresponding User . It is multi-optional. User Name: Displays the name of the User . User T ype: Displays the User T ype. Group Name: Displays the Group Name of the User . Security Model: Displays the Security Model of the User . Security Level: Displays the Security Level of the User[...]

  • Pagina 138

    Acce ss: Defines the access rights of the community.  read-only: Management right of the Community is restricted to read-only , and changes cannot be made to the corresponding View .  read-write: Management right of the Community is read-write and changes can be made to the corresponding View . MIB Vie w : Select the MIB V iew for the communi[...]

  • Pagina 139

     If SNMPv1 or SNMPv2c is employed, please take the following step s: Ste p Operation Description 1 Enable SNMP function gl obally . Required. On the SNMP → SNMP Config → Global Config page, enable SNMP function globally . 2 Create SNMP View . Required. On the SNMP → SNMP Config → SNMP View page, create SNMP View of the management agent. [...]

  • Pagina 140

    Figure 1 1-8 Notification Config The following entries are displayed on this screen:  Create Notification IP Address: Enter the IP Address of the manag ement Host. UDP Port: Enter the number of the UDP port used to send n otifications. The UDP port functio ns with the IP address for the notification sending. The default is 162. User: Enter the U[...]

  • Pagina 141

     Notification T able Select: Select the desired entry to delete the corresponding management station. IP Address: Displays the IP Address of the management host. UDP Port: Displays the UDP port us ed to send notifications. User: Displays the User name of the management station. Security Model: Displays the Security Model of the management statio[...]

  • Pagina 142

    The RMON Groups can be configured on the Histor y Control, Event Config and Alarm Config pages. 11.3.1 Histor y Control On this page, you can confi gure the History Group for RMON. Choose the menu SNMP → RMON → History Control to load the following page. Figure 1 1-9 History Control The following entries are displayed on this screen:  Histor[...]

  • Pagina 143

    Figure 1 1-10 Event Config The following entries are displayed on this screen:  Event T able Select: Select the desired entry for configuration. Index: Displays the index number of the entry . User: Enter the name of the User or the community to which the event belongs. Description: Give a description to the event for identification. Ty p e : Se[...]

  • Pagina 144

    Figure 1 1-1 1 Alarm Config The following entries are displayed on this screen:  Alarm T able Select: Select the desired entry for configuration. Index: Displays the index number of the entry . Va r i a b l e : Select the alarm variables from the pull-down list. Port: Select the port on which the Alarm entry acts. Sample T ype: S pecify the samp[...]

  • Pagina 145

    Interval: Enter the alarm interv al time in seconds. Ow ne r: Enter the name of the device or user that defined the entry . Statu s: Select Enable/Disable t he corresponding alarm entry . Note: When alarm variables exceed the Threshold on the same direction continuously for several times, an alarm event will only be generated on the first time, tha[...]

  • Pagina 146

    Chapter 12 LLDP LLDP (Link Layer Discovery Protocol) is a Layer 2 protocol that is used for network devices to advertise their own device information periodica lly to neighbors on the same IEEE 802 local area network. The advertised informati on, including details such as dev ice identification, capabilities and configuration settings, is repr esen[...]

  • Pagina 147

     Tx&Rx: the port can both transmit and receive LLDPDUs.  Rx_Only: the port can receive LLDPDUs only .  Tx_Only: the port can transmit LLDPDUs only .  Disable: the port cannot tr ansmit or receive LLDPDUs. 2) LLDPDU transmission mechanism  If the ports are working in TxRx or Tx m ode, they will advertise local information by sendi[...]

  • Pagina 148

    The followin g table shows the details about the currently defined TL Vs. TL V type TL V Name Description Usage in LLDPDU 0 End of LLDPDU Mark the end of the TL V sequence in LLDPDUs. Any information following an End Of LLDPDU TL V shall be ignored. Mandatory 1 Chassis ID Identifies the C hassis address of the connected device. Mandatory 2 Port ID [...]

  • Pagina 149

    Note: For detailed introduction of TL V , please refer to IEEE 802.1AB standard and ANSI/TIA-1057. In TP-LINK switch, the following LL DP optional TL Vs are supported. Port Description TLV The Port Description TLV allows network management to advertise the IEEE 802 LAN station's port description. System Capabilities TLV The System Capabilities[...]

  • Pagina 150

    The LLDP module is mainly for LLDP function c onfiguration of the switch, including three submenus: Basic Config , Device Info , Device St atistics and LLDP-MED . 12.1 Basic Config LLDP is configured on the Global Config and Port Config pages. 12.1.1 Global Config On this page you can configure the LL DP p arameters of the device globally . Choose [...]

  • Pagina 151

    Fast S t art Times: When the port's LLDP st ate transfo rms from Disable (or Rx_Only) to Tx&Rx (or Tx_Only), the fast start mechanism will be enabled, that is, the transmit interval will be shorten to a second, and several LLDPDUs will be sent out (the number of LLDPDUs equals this parameter). The default value is 3. 12.1.2 Port Config On [...]

  • Pagina 152

    12.2 Device Info Y ou can view the LLDP information of the local device and its neighbors on the Local Info and Neighbor Info pages respectively . 12.2.1 Local Info On this page you can see all ports' c onfiguration and syst em information. Choose the menu LLDP → Device Info → Local Info to load the following page. Figure 12-3 LLDP Lo cal [...]

  • Pagina 153

    Refre sh Rate: S pecify the auto refresh rate.  Local Info Enter the desired port number and click Select to display the information of the corresponding port. 12.2.2 Neighbor Info On this page you can get the information of the neighbors. Choose the menu LLDP → Device Info → Neighbor Info to load the following page. Figure 12-4 LLDP Nei ghb[...]

  • Pagina 154

    Figure 12-5 LLDP S tatistic Information The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disa ble the aut o refresh function. Refresh Rate: S pecify the auto refresh rate.  Global St atistics Last Up date: Displays latest update ti me of the statistics. T otal Insert s: Displays the number of neighbors in[...]

  • Pagina 155

    based on the port number you entered. Port: Displays local device's port number . T ransmit T otal: Displays the number of LLDP DUs sent by this port. Receive T otal: Displays the number of LLDPDUs received by this port. Discards: Displays the number of L LDPDUs discarded by this port. Errors: Displays the number of error LLDPDUs received by t[...]

  • Pagina 156

    Extended Power-Via-MDI TLV The Extended Power-Via-MDI TLV is intended to enable advanced power management between LLDP-MED Endpoint and Network Connectivity Devices, and it allows advertisement of fine graine d pow er requirement details, Endpoint power priority, as we ll as both Endpoint and Network Connectivity Device power status. Inventory TLV [...]

  • Pagina 157

    Figure 12-7 LLDP-MED Port Configuration The following entries are displayed on this screen:  LLDP-MED Port Config Port Select: Select the desired port to configure. LLDP-MED St atus: Configure the port's LLDP-MED status:  Enable: Enable the port's LLD P-MED status, and the port's Admin S tatus will be changed to Tx&Rx.  [...]

  • Pagina 158

     Included TL Vs Select TL Vs to be included in outgoing LLDPDU.  Location Identification Parameters Configure the Locati on Identification TLV's content in outgoing LLDPDU of the port. Emergency Number: Emergency number is Emergency Ca ll Service ELIN identifier, which is used during emergency call setup to a traditional CAMA or ISDN tru[...]

  • Pagina 159

    Figure 12-8 LLDP-MED Local Informatio n The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disa ble the aut o refresh function. Refresh Rate: S pecify the auto refresh rate.  Local Info Enter the desired port number and click Select to display the information of the corresponding port. 12.4.4 Neighbor Info [...]

  • Pagina 160

    Figure 12-9 LLDP-MED Neighbor Inform ation The following entries are displayed on this screen:  Auto Refresh Auto Refresh: Enable/Disa ble the aut o refresh function. Refresh Rate: S pecify the auto refresh rate.  Neighbor Info Port Select: Click the Select button to quick-select the corresponding port based on the port number you entered. Lo[...]

  • Pagina 161

    Chapter 13 Maintenance Maintenance module, assembling the commonly used system tools to manage the switch, provides the convenient method to locate and solve the network problem. ( 1 ) System Monitor: Monitor the utilization stat us of the memory and the CPU of switch. ( 2 ) Log: View the configuration parameters of t he switch and find out[...]

  • Pagina 162

    C lick the Monitor button to enable the switch to monitor and display its CPU utilization rate every four seconds. 13.1.2 Memor y Monitor Choose the menu Maintenance → S ystem Monitor → Memory Monitor to load the following page. Figure 13-2 Memory Monitor Click the Monitor button to enable the switch to monitor and display its Memory utilizatio[...]

  • Pagina 163

    notifications 5 Normal but significant conditions informational 6 Informational messages debugging 7 Debug-level messages T able 13-1 Log Level The Log function is implemented on the Log T able , Local Log , Remote Log and Backup Log pages. 13.2.1 Log T able The switch supports logs output to two directions , namely , log buffer and log file. The i[...]

  • Pagina 164

    select a module from the drop-down list to display the corresponding log information. Severity: Displays the severity level of the log information. Y ou can select a severity level to display the log in formation whose severity le vel value is the same or smaller . Content: Displays the content of the log information. Note: 1. The logs are classifi[...]

  • Pagina 165

    13.2.3 Remote Log Remote log feature enables the switch to send sy stem logs to the Log Ser ver . Log Server is to centralize the system logs from various devices for the administ rator to monitor and m anage the whole network. Choose the menu Maintenance → Log → Remote Log to load the following page. Figure 13-5 Log Host The following entries [...]

  • Pagina 166

    Figure 13-6 Backup Log The following entry is displayed on this screen:  Backup Log Backup Log: Click the Backup Log button to save the log as a file to your computer . Note: It will take a few minutes to backup the l og file. Please wait without any operation. 13.3 Device Diagnostics This switch provides Cable T est and Loopback functions for d[...]

  • Pagina 167

    St atu s: Displays the connection st atus of the cable connected to the port. Th e test results of the cable in clude normal, close, open, short, impedance or unknown. Length: If the connection status is normal, here displays the length range o f the cable. Error: If the connection status is close, open or impedanc e, here displays the error length[...]

  • Pagina 168

    13.4 Network Diagnostics This switch provides Ping test and T racer t test functions fo r network diagnostics. 13.4.1 Ping Ping test function, testing the connectivit y between the switch and one node of the network, facilitates you to test the network connectivity and r eachability of the host so as to locate the network malfunctions. Choose the m[...]

  • Pagina 169

    Figure 13-10 T racert The following entries are displayed on this screen:  T racert Config Destination IP: Enter the IP address of the destination device. Max Hop: S pecify the maximum number of the route hops the test data can p ass through. Return to CONTENTS 161[...]

  • Pagina 170

    Appendix A: S pecifications IEEE802.3 10Base-T Ethernet IEEE802.3u 100Base-TX/100Bas e-FX Fast Ethernet IEEE802.3ab 1000Base-T Gigabit Ethernet IEEE802.3z 1000Base- X Gigabit Ethernet IEEE802.3x Flow Control IEEE802.1p QoS Standards IEEE802.1q VLAN Ethernet: 10Mbps HD , 20Mbps FD Fast Ethernet: 100Mbps HD , 200Mbps FD Transmission Rate Gigabit [...]

  • Pagina 171

    Appendix B: Configuring the PCs In this section, we’ll introduce how to install and configure the TCP/IP correctly in Windows 2000. First make sure your Ethernet Adapter is work ing, refer to the adapter ’s manual if necessary . 1) On the Windows taskbar , click the Start button, and then click Control Panel . 2) Click the Net w ork and Interne[...]

  • Pagina 172

    164 5) The following TCP/IP Properties window will display and the I P Address t ab is open o n this window by default. Figure B-3 6) Select Use the following IP address . And the following items will be available. If the switch's IP address is 192.168.0.1, specify IP address as 192.168.0. x (x is from 2 to 254), and the Subnet mask as 255.255[...]

  • Pagina 173

    Appendix C: Glossary Boot Protocol (BOOTP) BOOTP is used to provide bootup informat ion for netwo rk devices, including IP address information, the address of the TFTP server that contains the de vices system files, and the name of the boot file. Class of Service (CoS) CoS is supported by prioritizing packets based on the required leve l of service[...]

  • Pagina 174

    IEEE 802.1p An IEEE standard for providing quality of serv ice (QoS) in Ethernet networks. The standard uses packet tags that define up to eight traffic classe s and allows switches to transmit packets based on the tagged priority value. IEEE 802.3ac Defines frame extensions for VLAN tagging. IEEE 802.3x Defines Ethernet frame start/st op requests [...]

  • Pagina 175

    meaning that it takes a message and converts it into a fixed string of digits, also called a message digest. Network Time Protocol (NTP) NTP provides the mechanisms to synchronize ti me across the network. The time servers operate in a hierarchical-master-slave conf iguration in orde r to synchronize local clocks within the subnet and to national t[...]

  • Pagina 176

    168 Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. User Datagram Protocol (UDP) UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport mechanism to provide access to IP-like services. UDP packets are delivered just like IP packets – connection-less dat[...]