Go to page of
Similar user manuals
-
Switch
KTI Networks KSD-103-A Series
20 pages 1.93 mb -
Switch
KTI Networks KF-16M
24 pages 0.11 mb -
Switch
KTI Networks 2028
21 pages 0.08 mb -
Switch
KTI Networks 1000BASE-T
6 pages 0.34 mb -
Switch
KTI Networks KS-115FM-V
34 pages 1.2 mb -
Switch
KTI Networks 10BASE-T/100BASE-TX
1 pages 0.8 mb -
Switch
KTI Networks KS-115F Series
15 pages 0.19 mb -
Switch
KTI Networks KS-2240
30 pages 0.34 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of KTI Networks KS-2262, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of KTI Networks KS-2262 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of KTI Networks KS-2262. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of KTI Networks KS-2262 should contain:
- informations concerning technical data of KTI Networks KS-2262
- name of the manufacturer and a year of construction of the KTI Networks KS-2262 item
- rules of operation, control and maintenance of the KTI Networks KS-2262 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of KTI Networks KS-2262 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of KTI Networks KS-2262, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the KTI Networks service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of KTI Networks KS-2262.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the KTI Networks KS-2262 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
24 Fast Ethernet + 2 Gig ab it L2 Manage d Sw itch User's Manual KS-2262 Release 2.28[...]
-
Page 2
ii Electronic Emission Notices Federal Communica tions Commission (FCC) S tateme nt This equipment has been tested and f ound to comply with the limits for a c lass A com puting device pursuant to Subpart J of part 15 of FCC Rules, which are des igned to provide reasonable protec tion against such interf erence when operated in a comm ercial enviro[...]
-
Page 3
T able of Content s CAUTION ----------------------------------------------------------------------------------------------------------------------------- 4 ELECTRIC EMISSION NOTICES------------------------------------------------------------------------------------------------II 1. INTRODUCTION ------------------------------------------------------[...]
-
Page 4
2 3-15. SECUR I T Y ----------------------------------------------------------------------------------------------------------------- - 128 3-16. BA NDWIDTH MANAGEMENT --------------------------------------------------------------------------------------- 131 3-17. QOS(QUALITY OF SER VICE) CONFIGURA TION --------------------------------------------[...]
-
Page 5
3[...]
-
Page 6
4 Caution Circuit devices are sensitive to static electr icity , which can damage their delicate electronics . Dry weather conditions or walking ac ross a carpeted f loor may cause y ou to acquire a s t atic electric al charge. T o protect your device, alway s: • T ouch the m etal chassis of your com puter to ground the static electrical c harge [...]
-
Page 7
5 About this user ’ s m anual In this us er ’s m anual, it wi ll not o nl y tell you ho w t o install a nd c onn ec t your netwo rk system but configure and m onitor the 24 F AST ETHERNET + 2 GIGABIT L2 MANAGED S W ITCH through the bu ilt-in CLI and we b by RS-232 serial i nterface and Ether net ports step-by-st ep. Many exp lanations in detai [...]
-
Page 8
6 1. Introduction 1-1. Ov erview of 24 F A ST ETHERNET + 2 GIGA BIT L2 MA NAGED SWITCH 24 F AST ETHERNET + 2 GIGABIT L2 MANAGED SW ITCH, 24 Fast Eth ernet + 2 Gigabit L2 Managed Switch, im plemented 24 10/100Mbps TP + 2 Gigab it dual media por t s w ith T P/SFP , is a s t andard s witch that meets all IEEE 802.3/u/x/ z Gigabit, Fas t Ethernet a nd [...]
-
Page 9
7 Key Features in the Device QoS: Support Q uality of Ser vice by the I EEE 802.1P standard. T here are t wo priorit y que ue and pack et tr ansmission schedul e us ing W eighted R ound Robin (WRR) . User- defined weight cl assification of packet priorit y c an be based on either VLAN tag on packets or us er-defined port[...]
-
Page 10
8 1-2. Checklist Before you start installing the switch, verify that the package contains the f ollow ing: 24 F AST ET HERNET + 2 GIGABIT L2 MANAGED SW ITCH 24 Fas t Ethernet + 2 Gigabit L2 Managed Switch Fiber Modules (optional) Mounting Acces sory (for 19” Rack Shelf) This Us er's Manual in CD-ROM AC Power Cord RS-2[...]
-
Page 11
9 Supports 802.1Q VLAN with 256 entries. Supports user m anagement and lim its three users to login Supports DHCP Broadcasting Suppression to avoid network suspended or crashed Supports to send the trap event while m onitored events happened Supports default conf iguration which can be restor ed to over write the[...]
-
Page 12
10 1-4. V iew of 24 F A ST ETHERNET + 2 GIGA BIT L2 MA NA GED SWITCH 1-4-1. User I nt erf aces on t he Front Panel (Button, LEDs and Pl ugs) There ar e 24 TP Fast Ethernet por ts and 2 slots for optional rem ovable m odules on the front pane l of the s witch. LED d isplay area, locating on the f ront panel, contains a CPURUN, Power LED and 26 ports[...]
-
Page 13
11 LED Indicators LED Color Function System LED CPURUN Green Lit when CPU is on and good POW ER Green Lit when AC power is on and good ACT Green Lit when LEDSET set on active m ode FDX Green Lit when LEDSET set on full- duplex mode SPD Green Lit when LEDSET set on speed m ode 10/100Mb ps Ethernet T P Port 1 to 24 LED [...]
-
Page 14
12 1-4-2. User I nt erf aces on t he Rear Panel One RS- 232 DB-9 inter face is offer ed for configur ation or managem ent. And there is one AC power input sock et for having the switch powered on or off . Fig. 1-3 Re ar V iew of 24 F AST ETHER NET + 2 GI GA BIT L2 MA NAG ED SW ITCH RS-232 DB-9 Connector A C Line 100-240V 50/60 Hz[...]
-
Page 15
13 1-5. View of the Optional Modules In the s w itch, Port 25, 26 includes t w o t y p es of media --- TP and SFP Fiber (LC, BiDi LC…); t his port supp ort s 10/100 /1000Mbps TP or 1000Mbps SFP Fiber with auto-detec ted functio n. 1000Mbps SFP Fiber tr ansceiver is used for hig h-speed connecti on expansion. Refer to “KS-2601 Mod el List” f i[...]
-
Page 16
14[...]
-
Page 17
15 2. Installation 2-1. S t arting 24 F AST ETHERNET + 2 GIGA BIT L2 MA NAGED SWITCH Up This section will give users a quic k start for : - Hardware and Cable Installation - Managem ent S tation Installation - Software booting and configur ation 2-1-1. Hardw are and Cable Installation At the beginning, please do firs t: ⇒ W ear a grounding device[...]
-
Page 18
16 TP Port and Cable Installation ⇒ In the switc h, TP port supports MDI/MDI-X auto-cross over , s o both types of cable, s traight-thro ugh (Cable pi n-outs for RJ-45 j ack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M T P; 1, 2, 3, 4, 5, 6, 7, 8 to 1 , 2, 3, 4, 5, 6, 7, 8 in Giga bit TP) and cross ed-over ( Cable pin-ou ts for RJ-45 j ack 1, 2[...]
-
Page 19
17 2-1-2. I nstalling Chassis t o a 19- Inch Wiring Closet Rail Caution: Allow a proper s pac ing and proper a ir ventilation for the cooling fa n at both sides of the chassis. ⇒ W ear a grounding device f or electrostatic disc harge. ⇒ Screw the m ounting accessory to the front side of the s w itch (See Fig. 2-2) . ⇒ Place the Chassis into t[...]
-
Page 20
18 2-1-3-1. Cablin g Requirements for TP Ports ⇒ F or Fast Ethernet TP network connec tion The grade of the cable mus t be Cat. 5 or Cat. 5e wi th a m aximum length of 100 meter s. ⇒ G igabit Ethernet TP network connection The grade of the cable mus t be Cat. 5 or Cat. 5e wi th a m aximum length of 100 meter s. Cat. 5e is recom mended. [...]
-
Page 21
19 2-1-3-3. Switch Cascading in T opology T akes the Delay Time into Account Theor etically , the switc h partitions the collis ion dom ain for each p ort in s witch cascading that you m ay up-link the s witches unl imitedly . In pract ice, the net work extensio n (cascadin g levels & over all diam[...]
-
Page 22
20 Case1: All switch por t s are in the sam e local area network . Every por t can access each other (See Fig. 2-3) . If VLAN is e nabled and configur ed, eac h n ode i n the n et work that can c om m unicate each other direc tly is bounded in the same VLAN area. Here VL AN area is defined by what V LAN you ar e using. The switch supports bo th por[...]
-
Page 23
21 Case 2b: Port-bas ed VLAN (See Fig.2-5). 1. VLAN1 mem bers could not ac cess VLAN2, VLAN3 and VLAN4 m embers. 2. VLAN2 mem bers could not ac cess VLAN1 and VLAN3 m embers, but they could access V LAN4 members. 3. VLAN3 mem bers could not ac cess VLAN1, VLAN2 and VLAN4. 4. VLAN4 mem bers could not ac cess VLAN1 and VLAN3 m embers, but they could [...]
-
Page 24
22 2-1-4. Conf i guring the Management A gent of 24 F AST ETHERNET + 2 GIGA BIT L2 MA NA GED S WITC H We offer you three wa y s to s t artup the s witch managem ent function. T hey are RS- 232 cons ole, CLI, and Web. Us ers can us e any one of them to m onitor and configur e the switch. Y ou can touch them through the following procedures. Section [...]
-
Page 25
23 2-1-4-1. Configuring the Management A gent through the Serial RS-232 Port T o perf or m the c onfiguration thr ough RS-232 c onsole port, th e switch’s serial port must be directly con nected to a DCE device, for exa mple, a PC, through RS-2 32 cable wit h DB-9 connec tor . Next, run a term inal emulator with t he default sett ing of the switc[...]
-
Page 26
24 Set IP A ddress, Subnet Mask and Default Gatew ay IP A ddress Please r efer to F ig. 2-7 CLI Managem ent for details about fac tory setting. They are default se tting of IP addre ss. Y ou can f irst either co nfigure your PC IP address or change IP addres s of the switch, n ext to change the IP address of default g[...]
-
Page 27
25 2-1-4-2. Configur ing the Management A gent through the Ethernet Por t There ar e three ways to configure and m onitor the s w itch thr ough the s witch’ s Ethernet port. The y are CLI, W eb browser and SNMP manager . T he user interf ace for the las t one is NMS dependent and does not c over here. We j ust introduce the first two types of m a[...]
-
Page 28
26 Fig. 2-10 the Login Screen for W eb 2-1-5. IP A ddress A ssignment For IP address c onfiguration, th ere are three param eters needed to b e filled i n. They are IP address, Subnet Mask , Default Gateway and DNS. IP address: The addres s of the net work device i n the network is used for internetwork ing comm unication. Its addres s structure l [...]
-
Page 29
27 W i th the clas s addressing, it divides IP address into thr ee classes, clas s A, class B and class C. The res t of IP addresses are for m ulticast and broadcast. The bit length of the network pr efix is the sam e as that of the s ubnet mask and is denote d as IP address/X , for example, 192. 168.1.0/24. Eac h class has its addres s range descr[...]
-
Page 30
28 Class D and E: Class D is a c lass with fir st 4 MSB (Mos t significance bit) set to 1-1- 1-0 and is us ed for IP Multicast. Se e a lso RFC 1 1 12. Class E is a clas s with first 4 M SB se t to 1- 1-1- 1 and is used f or IP broadcas t. Accordin g to IANA ( Internet Ass igned Num bers Authorit y ), ther e are three s pecific IP address bl ocks re[...]
-
Page 31
29 In this di agram, you ca n see the sub net mask w ith 25- bit long, 25 5.255.255.128, contains 1 26 mem bers in the sub- netted networ k. Another is that th e length of network prefix equals the num ber of the bit with 1s in th at subnet m ask. W i th this, you can e asily count the number of IP addresses matched. T he following ta ble shows the[...]
-
Page 32
30 For diff erent network appl ications, the s ubnet mask may look lik e 255.255.255.2 40. This means it is a sm all network ac commodating a maxim u m of 15 nodes in t he network. Default gateway : For the route d pack et, if the destinatio n is not i n the ro u ting tabl e, all the tr aff ic is put into the d evice with t he designated IP address[...]
-
Page 33
31 2-2. T y pical Applicat ions The 24 F AST ETHERNET + 2 G IGABIT L2 MANAGED SW ITCH implem ents 24 Fast Eth ernet TP ports with auto MDIX an d 2 Gigabit dual m edia ports with SFP for rem ovable module sup ported com prehensive fib er types of connection, inc luding LC, BiDi LC f or SFP . For m ore details on the s pecificati on of the switc h, p[...]
-
Page 34
32 Fig. 2-15 Office N etwork Connection Fig. 2-14 Peer-to-peer Network C onnection[...]
-
Page 35
33 3. Operation of Web-based Management This chapter instruc t s you how to conf igure and m anage the 2 4 F AST ETHERNET + 2 GIGABIT L2 MANAGED SW ITCH through the web user i nterface it sup ports, to acces s and manage t he 24 10/1 00Mbps T P + 2 G igabit dual m edia ports with TP/SFP Fiber m anagement Eth ernet switc h. W ith this facilit y , yo[...]
-
Page 36
34 In the switc h, it supports a s i m ple user managem ent function al lowing only one adminis trator to conf igure the system at the sam e time. If there are t wo or mor e users usin g adm inistrator ’s identit y , the switc h wil l allo w the onl y one who logins fi rs t to configur e the system . The rest of users, even with administr ator ?[...]
-
Page 37
35 3-1. Web Management Home Ov erview After you log in, the s witch shows you the s ystem inf orm ation as Fig. 3-2. T his page is defau lt a nd t ells you the basic i nf orm ation of the s y stem , including “Mo del Name” , “System Description ”, “Loc a tion”, “Contact”, “Devi ce Nam e”, “Sy stem Up T ime”, “Current T ime[...]
-
Page 38
36 Fig. 3-3 port detail information In Fig. 3-3, it s ho ws th e bas ic inform ation of the clic k ed port. W ith this, you’ll se e th e inform ation about the por t status, traffic s t atus and ba ndwidth rating for egress and ingress r espectively . On th e left- top corne r , t her e is a pu ll-d own l ist f or Aut o Logou t. For the sak e[...]
-
Page 39
37 Port DHCP Boot VLAN Syste m SNMP IGMP Snoopin g MAC T able GVRP Roo t STP Tru n k 802.1x Alar m Configur atio n Securit y Bandw idth QoS Diagno stics TFTP Se rv e r Log Firm w are Upgrade Reboo t Logo u t[...]
-
Page 40
38 3-1-1. System Information Function name: Sy stem Inform ation Function desc ription: Show the basic system inf ormation. Parameter desc ription: Model name: The m odel name of this device. Sy stem description: As it is, this tells what this device is. Her e, it is “24 Fast Ethernet + 2 Gigabit L2 Managed Switch”. Location: Basically , it is [...]
-
Page 41
39 Host IP address: The IP address of the switch. Host MAC address : It is the Ethernet MAC addres s of the managem ent agent in this switch. Device Port: Show all ty pes and num bers of the port in the switch. RAM size: The s i ze of the DRAM in this switch. Flash size: The s i ze of the flash m emor y in this switch.[...]
-
Page 42
40 3-1-2. I P Configuration IP configurat ion is one of the most i mpor t ant config urations in the switch. W ithout the proper s etting, net work m anager will not be a ble to m anage or view t he device. The s w itch s upports both m anual IP address setting and automatic IP ad dress setting via DHCP server . When IP address is changed, y ou m u[...]
-
Page 43
41 IP address: Users c an configure the IP settin gs and fill in ne w valu es if users set the DHCP function “Disable”. Then, c lick <A pply> button to update. W hen DHCP is disabled, Default: 192.168.1.1 If DHCP is enabled, this f ield is filled by DHCP server and will not allow user m anually set it any more. Subnet mas k: Subnet mask i[...]
-
Page 44
42 DNS: It is Dom ain Name Server used to s erve the translation b etween IP address and nam e address. The s w itch s upports DNS c lient functi on to re-route the mnem onic name address to D NS server to get its associate d IP add ress for ac cessing Internet. Us er can spec if y a DNS IP addres s for the s witch. W ith this , the switch can tran[...]
-
Page 45
43 3-1-3. Time Configuration The s w itch pr ovides m anual and autom atic ways to set the system ti m e via NTP . Manual set ting is sim ple and you jus t input “Y e ar”, “Month” , “Day”, “Hour” , “Minute” and “Seco nd” within the vali d value range indic ated in each item . If you inp ut an invalid value, for ex ample, 61 [...]
-
Page 46
44 NTP: NTP is Net w ork T im e Protocol and is used to s y nc the network time based Gree nwich Mean Time (GMT ). If use the NTP mode and s elect a built-in NT P time server or manuall y specif y an user -defined NT P server as well as Time Zone, th e switch will s ync the tim e in a short after pressing <Ap ply > button. Though it synchr on[...]
-
Page 47
45 Day Light Saving End: This is used to set when to stop perfor ming the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day : Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23. Default: 0 Fig. 3-5[...]
-
Page 48
46 3-1-4. Account Conf iguration In this f unction, on ly administr ator can crea te, modify or delete t he usernam e and password. Administrator can m odify other gu est identit ies’ password without confirm ing the password but it is necessar y to modif y the adm inistrator-equ ivalent identit y . Guest-e quivalent i dentity can m odify his pas[...]
-
Page 49
47 3-1-5. Management Securi ty Through t he managem ent securit y configurat ion, the m anager can do the st rict setup to control the s w itch and lim it the user to acces s this switch. The f ollow ing rules are of fered for the manager to m anage the switch: Rule 1) : When no list exists, then it will accept all connections. Accept -------------[...]
-
Page 50
48 Function name: Management Sec urity Conf iguration Function desc ription: The s w itch off ers Managem ent Security Conf iguration f unction. W ith this function, t he manager ca n easily contr ol the m ode that the user c onnects to the switc h. According to the mode, user s can be clas sified into two t ypes: Thos e w ho are a ble to connect t[...]
-
Page 51
49 IP Range: The s witch supports tw o kinds of options for managed valid IP Rang e, including “ Any” and “C ustom” . Default is “An y ”. In c ase that ”Custom ” had been ch osen, you can assign eff ective IP range. The valid range is 0.0.0.0~255.255.255.255. Incom ing Port: The s w itch supp orts two kinds of options for m anaged v[...]
-
Page 52
50 3-1-6. Virtual St ack Function name: Virtual Stack Function desc ription: Virtual S tack Management( VSM) is the group m anagem ent func tion. Through the proper configuration of this func tion, switches in the same LAN will be grouped a utomaticall y . And am ong these sw itch, one switc h will be a m aster ma chine, and the others in this grou[...]
-
Page 53
51 Fig. 3-8 Parameter desc ription: S tate: It is used f or the activation or de-activation of VSM. Default is Enable. Role: The role that the switc h would like to play in virt ual stack. T wo types of roles, including m aster and slave are off ered for option. Def ault is Master . Group ID: It is the gr oup ident ifier (GID) which s igns f or VSM[...]
-
Page 54
52 3-2. Port Configuration Four func tions , inc luding Port S tatus, Port Conf igur ation, S im ple Counter and Detai l Counter ar e contained in this function folder for port monitor and managem ent. Each of them will be described in detail order ly in the f ollow ing sections . 3-2-1.Port St atus The f unction Port S tatus gathers the inform ati[...]
-
Page 55
53 Function name: Port S tatus Function Desc ription: Report the latest upda ted status of all port s in this s w itc h. W hen any one of the ports in the switch chan ges its param eter displa y e d in the page, it will be automatic ally r efreshed the port cur rent status about every 5 seconds. Paramete r Description : Port No: Displa y the p ort [...]
-
Page 56
54 S peed / Duplex : Displa y the spe ed a nd d uplex of all port. T here are thr ee speeds 10M bps, 100Mbps and 1000Mbps suppor ted for TP m edia, and the du plex supporte d is half du plex and full duplex. If th e media is 1Gbps fiber , it is 1000Mbps s upported onl y . The s t atus of speed/dup lex mode is determ ined by 1) the ne gotiation of b[...]
-
Page 57
55 Fig. 3-10 Parameter desc ription of Port 25 and Port 26: Connector T y pe: Display the connector ty pe, for ins t ance, UT P , SC, ST , LC and so on. Fiber T y pe: Display the fiber mode, f or instance, Multi-Mode, Single-Mode. Tx Central Wavelength: Display the fiber optical transm itting central wavelength, for instance, 850nm , 1310nm, 1550nm[...]
-
Page 58
56 V endor SN (Serial Num ber): Show the serial number assigned by the manuf acturer . Date Code: Show the date this module was m ade. T em perature: Show the current tem perature of m odule. Vcc: Show the working DC voltage of m odule. Mon1(Bias) m A: Show the Bias current of module. Mon2(TX PW R): Show the transm it pow er of m odule. Mon3(RX PW [...]
-
Page 59
57 3-2-2. Port Conf i gurat i on Port Conf igurat ion is appl ied to cha nge t he sett ing of each port. I n this conf igurat ion function, you can set/res et the follo w ing func tions. All of them are desc ribed in detail below . Fig. 3-1 1 Function name: Port Configur ation Function desc ription: It is used to set e ac h por t’s oper at io n m[...]
-
Page 60
58 S peed/Duplex: Set the s peed a nd dup lex of the p ort. In speed, 10/10 0Mbps bau d rat e is availab le for Fast Eth ernet, G igabit m odule in port 2 5, 26. If the media is 1Gbps fiber , it is alwa y s 1000 Mbp s a nd the duplex is full only . If the media is TP , the S peed/Duplex is com prised of the combination of speed mode, 10/100 /1000Mb[...]
-
Page 61
59 3-2-3. Port Descri ption Port Desc ription is a pplied to c hange the setting of each por t. In this confi guration function, you can g ive a nam e to each por t. All of them are des cribed in detail below . Fig. 3-12 Function name: Port D escripti on Function desc ription: It is used to set each por t’s descriptio n. This hum an readable desc[...]
-
Page 62
60 3-2-5. Si mpl e Count er The func tion of Sim ple Counter co llects any infor mation and provides the counting about the traffic of the port, no matter the pack et is good or bad. In the Fig. 3-13 , the window can s how all ports’ counter inf ormation at the sa me time. Eac h data fie ld h as 2 0- dig it long . If the countin g i s over f lo w[...]
-
Page 63
61 Rx Pack et: The c ounting number of the pack et received. Tx Collision: Num ber of collisions tr ansmitting fr ames exper ienced. Rx Error Packet: Number of bad packets received.[...]
-
Page 64
62 3-2-4. Detail Counter The f unction of Detail Cou nter collects a ny inform ation and pro v ides the countin g about the traffic of the port, no matter the pack et is good or bad. In the Fi g. 3-14, the wind ow can show only one port c ounter inform ation at the s ame time. T o see another port’ s c ounter , y ou have t o pull do w n the lis t[...]
-
Page 65
63 Show the counting number of the received unicast p ack et. Rx Broadcas t Packets: Show the counting number of the received broadcas t p ack et. Rx Multicas t Packets: Show the counting number of the received m ulticast packet. Rx Pause Pack ets: Show the counting number of the received pause packet. Tx Collisions: Num ber of collisions tr ansmit[...]
-
Page 66
64 Tx Packets: The counting num ber of the pack et transmitted. TX Octets: T otal transm itted by tes . Tx Unicast Packets: Show the counting number of the transm itted unicast packet. Tx Broadcast Pack et s: Show the counting number of the transm itted broadcast packet. Tx Multicast Packets: Show the counting number of the transm itted multicast p[...]
-
Page 67
65 3-3. SNMP Configuration Any Net work Managem ent S y s tem (N MS) running th e Simple Network Managem ent Protoco l ( S NMP) can manag e the Ma naged devic es equipped with SNMP agent, pr ovided th at the Managem ent Inform ation Base (MI B ) is i nstalled correc tly on the managed devices. T he SNMP is a p rotocol that is used to gover n the tr[...]
-
Page 68
66 Default SNMP function: Enable Default com munity name f or GET : public Default com munity name f or SET : private Default com munity name f or T r ap: public Default Set f unction: Enable Default trap hos t IP address: 0.0.0.0 Default port num ber: 162 Trap: In the s witch, th ere are 6 tr ap hosts s upported. Each of them has its own comm unit[...]
-
Page 69
67 3-4. Loop Detection Looping will alway s occur when the switches are connec ted as a cy cle and a switch transm its the p ack et s that will go back to the transmitted s w itch. Loop Detection will prevent the looping fr om happening. Moreover , it c ould remove the looping phenomenon per port. In general, y ou can unplug the cable connec tion t[...]
-
Page 70
68 looping detection. After enabling looping ac tion, y ou should dec ide which port you w ould like to open loop detec tion capability . For example, you open the loop detection of por t 1 as enable state. W hen the looping situation happens f rom port 1, Loop Detection will lock the port1’s ability . And then y ou will see that the “Current S[...]
-
Page 71
69 3-5. DHCP Boot The DHCP Boot func tion is used to spre ad the request broadc ast p ack et into a bigger t ime fram e to prevent the traffic conges tion due to br oadcast pack ets from man y ne twork devices whic h ma y se ek its NMS, boot server , DHCP server a nd man y conn ections predefin ed when the whole b uilding or block lose the power an[...]
-
Page 72
70 3-6. IGMP Snooping The f unction, IGMP Snooping, is us ed to establis h the multicas t groups to forward the multic ast packet to the m e m ber ports, and, in nature, avoi ds wasting the bandwidth while IP multic ast pack ets are running o ver the network . This is because a switch that d oes not support IGMP or IGMP Snoop ing can not tell th e [...]
-
Page 73
71 Parameter desc ription: IGMP snooping m ode selection: The s w itch supports thr ee kinds of IGMP Snooping s tatus, including “Passive” , “Active” and “Disable” . Disable: Set “Disable” m ode to disable IGMP Snooping function. Default: Disable Active: In Acti ve mode, IG MP sno oping switch will per iodically iss ue the Member sh[...]
-
Page 74
72 Function name: Allowed Group Function desc ription: The Allo wed Group functi on allows the IGMP S nooping to set up the I P mu lticast table bas ed on u ser’s specif ic condit ions. IG MP report pac kets that meet the item s you set up will be joined or form ed the multicas t group. Fig. 3-19 Parameter desc ription: IP Range: The s w itch s u[...]
-
Page 75
73 Add: A new e ntry of allowed group configurati on can be c reated after th e parameter s as mentioned above had be en setup and then press <A dd> button. Edit: The ex isted entry also can be m odified after press ing <Edit> button. Delete: Remove the ex isted entry of allowed group conf iguration from the allowed group.[...]
-
Page 76
74 3-7. VLA N The s witch supports T ag- based VLAN (802.1q) an d Port-base d VLAN . It s upp orts 256 acti ve VLANs and VL AN ID 1~4094. VLAN c onfiguration is used to partition your LAN into sm all ones as your demand. Pro perl y configuri ng it, you can gain not only im proving sec urity and increasing performanc e but greatl y reduc ing VLAN ma[...]
-
Page 77
75 Sy m metric Vlan: This is an Ingress Rul e (Rule 1, The Ingress F iltering Rule 1 is “f orward only pack et s with VID matchin g this port’s conf igured VID”.). For exam ple, if port 1 r eceiv es a tagge d pack et with VI D=100 ( VLA N nam e=VLAN 100), and if S y mm etric-Vlan f unction is enabled, th e switch wil l check if port 1 is a m [...]
-
Page 78
76 Fig. 3-20[...]
-
Page 79
77 3-7-2. T ag- based G roup Function name: Tag-bas ed Group Configuration Function desc ription: It shows the inf ormation o f existed T ag-based VL AN Groups. Y ou can a lso easil y create, edit an d delete a T ag-based VLA N group b y pressing <A dd> , <Edit > a nd <Delete> f unction bu ttons. User can add a new VL AN group b y[...]
-
Page 80
78 Add Group: Input th e VLAN nam e, VID an d then cho ose the m ember by tick ing the check box beside the port No. to create a ne w T ag- based VLAN. As to the param eter of Untag, it s tands for an egr es s r u le of t he por t. If you tic k the check box beside the port No., packets with t his VID outgoi ng from this port w ill be untagg ed. Fi[...]
-
Page 81
79 3-7-3. PVI D Function name: PVID Function desc ription: In PVID Setti ng, user can inp ut VID number to eac h port. The range of VID number is from 1 to 4094. User also c an choose i ngress f iltering rule (Rule 2) to each port. The I ngress Filter ing Rule 2 is “drop untagged fr ame”. W hile Rule 2 is enabled, the port will discar d all Unt[...]
-
Page 82
80 It bases on 8 02.1 p Q oS an d affec ts untagged pack ets. W hen the pack ets enter the s w itch, it w ould get the priority preced ence according to your Default Prior i t y settin g and m ap to 802.1p prior ity set ti ng in Q oS function. For exam ple, while you s et Default Prior ity of port 2 with 2 a nd transm it untagged pack et s to port [...]
-
Page 83
81 3-7-4. Port - based G r oup Function name: Port-based G roup Configuration Function desc ription: It shows t he inform ation of the ex isted Port-bas ed VLAN G roups. Y ou c an easil y create, ed it and delete a P ort-based VL AN group by press ing <A dd> , <Edit > a nd <Delete> f unction bu ttons. User can add a new VL AN grou[...]
-
Page 84
82 Add Group: Create a ne w Port- based VLAN. In put the VLAN na me and choose the mem ber by tick ing the check box beside the port N o., then, pres s the <A pply> button to have the setting taken effec t. Fig. 3-25 Delete Group: Just pre ss the <Delete> button to remove the selec ted group entry from the Port-based gr oup t able. Edit[...]
-
Page 85
83 3-7-5. M anagement VLAN Function name: Management VLAN Function Desc ription: Parameter desc ription: S tate: It works w hen the tag-based m ode is chosen. W hen this f unction is enabled, only the tagged packets with this VID can m anage the switch. VID: V alid r ange 1~4094.[...]
-
Page 86
84 3-8. MA C T able MAC Tab le Configurati on gathers m any functions, i ncluding MAC Table Inf ormation, MAC T able Mainten ance, Stat ic and M AC Alias, which cann ot be categ orized to som e function type. They are descr ibed below . Function name: MAC T able Inf ormation Function Desc ription: Display the static or dy namic learning MAC entry a[...]
-
Page 87
85 Port: The port that ex ists in the searched MAC Entry . VID: VLAN Group that MAC Entry exists. S tate: Display the method that this MAC Entry is built. It may show “Dynamic MAC” or “S tatic MAC”. Fig. 3-26[...]
-
Page 88
86 Function Name: MAC T able Maintenanc e Function Desc ription: This function c an allow the user to set up the proc essing mec hanism of MAC T able. An idle MAC ad dress ex ceeding MAC Address Age-out Time will be rem oved from the MAC T able. T he range of Age-out Time is 10- 1000000 seconds , and the setup of this time will h ave no effect on s[...]
-
Page 89
87 Function Name: S tatic Setting Function Desc ription: The f unction of Stat ic is us ed to configur e MAC’s r eal manners inside of t he switch. T hree kinds of m a nners inc luding static , static with d estination dro p and static with sourc e drop are contained in this func tion . As “static ” is chosen, assign a MAC address to a specif[...]
-
Page 90
88 Queue (Priority): Set up the priority ( 0~3) for the MAC. Forwarding Rule (Dr op Policy ): St a t i c : A MAC address is assigned to a specif ic port, all of the switch’s traff ics sent to this MAC addres s will be forwarded to this port. Static with Destination Drop: W hile the DA of the inc oming pack ets meets the value you set up, these pa[...]
-
Page 91
89 Function name: MAC Alias Function desc ription: MAC Alias function is used to let you assign M AC address a pl ain English name. T his will hel p you tell which MAC address belo ngs to whic h user in t he illegal ac cess report. At the initi al time, it shows a ll pairs of the ex isted alias name and MAC addr ess. There ar e three MAC ali as fun[...]
-
Page 92
90 Parameter desc ription: MAC Address: It is a six- byte long Eth erne t hardware a ddress and us ually ex press ed b y hex and separated by hy phens . For example, 00 – 40 - C7 - D6 – 00 - 02 Alias: MAC alias nam e y ou as sign. Note: If there are too m any MAC addresses learned in the table, w e recom mend y ou inputting the MAC address and [...]
-
Page 93
91 3-9. GVRP Configuration GVRP is an applic ation based on Gener ic Attribute R egistration Pr otocol (GARP) , ma inly used to autom atically an d dynam ically mai nt ain t he group m embership inform ation of the VLANs. T he GVRP offers the func tion provid ing the VL AN registrat ion serv ice throug h a G ARP applic ation. It m akes use of GARP [...]
-
Page 94
92 Function name: GVRP Config Function desc ription: In the functio n of GVRP Config, it is us ed to configure each p ort’s GVRP operatio n mode, in which th ere are se ven parameter s needed to be conf igured described below . Parameter desc ription: GVRP S tate Setting: This function is sim ply to let y ou en able or disab le GVRP function. Y o[...]
-
Page 95
93 Normal: It is Norm al Registration. The Registr ar responds norm ally to incom ing GARP m essages. The default s etting is Normal. Fixed: It is Registration F ixed. The Registrar ignores all GARP mes sages, and all mem bers rem ain in the registered ( IN) state. Forbidden: It is Registra tion Forbidden. The Registrar ignor es all GARP mes sages,[...]
-
Page 96
94 Function name: GVRP Counter Function desc ription: All GVRP count ers are main ly divided in to Received and Transm itted two categories to let you m onitor the GVRP actions . Actually , the y are G ARP pa ckets. Fig. 3-31 Parameter desc ription: Received: T o tal GV RP Pac kets : T otal GVRP BPDU is received by the GVRP application. Invalid GVR[...]
-
Page 97
95 LeaveEmpty Message Pac ket s: Number of GARP BPDU wi th Leave Em pty m essage is rec eived by the GARP application. Empty Message Pack et s: Number of GARP BPDU wi th Em pty m essage is rec eived by the GARP application. Transmitted: T o tal GV RP Pac kets : T otal GARP BPDU is transm itted by the G V RP application. Invalid GVRP Packets: Number[...]
-
Page 98
96 Function name: GVRP Group Inform ation Function desc ription: T o show the dynamic group m ember and their inform ation. Parameter desc ription: Current Dynamic Gr oup Number: The num ber of GVRP group that are cr eated currently . VID: VLAN identifier . W hen GVRP group creates, each dynamic VLAN group owns its VID. V alid r ange is 1 ~ 4094. M[...]
-
Page 99
97 3-10. STP Configuration The S panning Tree Prot ocol (ST P) is a standard ized m ethod (IEEE 80 2.1D) f or avoiding loops in switched networks . W hen ST P is enabled, ensure that onl y one path is active between an y two nodes on th e network at a t ime. User c an enable S panning Tree Prot ocol on switc h’ s web m anagement and th en set up [...]
-
Page 100
98 All bri dges in t he LAN will r e-learn an d de ter m ine which the root br id ge is . Maxim u m Age time is as signed b y Root Br idge in unit of sec onds. Default is 20 s econds. Current Forward Delay: Show th e current root br idge forwar d delay tim e. The value of Forward Delay tim e is set by root. The F orward Dela y time is defined as th[...]
-
Page 101
99 3-10-2. STP Configuration The ST P , S panning T ree Protocol, actually includes RST P . In the S panning Tree Configura tion, there are six p aram eters open for t he user to c onfigure as user ’s idea. Each param eter description is lis ted below . Function name: STP Configuration Function desc ription: User can s et the followin g S panning[...]
-
Page 102
100 Forward Delay: Y ou can s et the root bridge f orward dela y tim e. This figur e is set b y Root Bridge o nly . T he forward delay time is defined as t he time spent f rom Listenin g state moved to Learning state and a lso from Learning state moved to Forwardin g state of a port in br idge. T he forward del ay time contains two states, List eni[...]
-
Page 103
101 3-10-3. STP Port Configuration Function name: STP Port Setting Function desc ription: In the ST P Port Sett ing, one it em selection a nd five parameters s ettings are offered for user ’ s setup. User can d isable and e nable each p ort by selec ting each Port S tatus item . User also can s et “P ath C ost” and “Prior it y ” of eac h [...]
-
Page 104
102 802.1w RSTP recom mended value: (V alid range: 1 – 200,000,000) 10 Mbps : 2,000,000 100 Mbps : 200,000 1 Gbps : 20,000 Default: 0 Priority : Priorit y her e means Por t Priori ty . P ort Priorit y and Port Number ar e mix ed to form the Port ID. Port IDs are often compared in order to determ ine whic h port of a b r idge wou ld becom e the Ro[...]
-
Page 105
103 M Check : Migratio n Check . It forces the port s ending out a n RST P BPDU instea d of a leg acy STP BPDU at the next tr ansmiss i on. T he only benefit of this operatio n is to m a ke the p ort quick ly get bac k to act as an R STP port. Click <M Check > button to sen d a RSTP BPDU f rom the por t you specif ied. Fig. 3-35[...]
-
Page 106
104 3-1 1. T runking Configuration The Port T runking Co nfiguration is used to con figure the s ettings of Li nk Aggregat ion. Y ou c an bundle more than o ne port w ith the same s peed, full du plex and the sam e MAC to be a single log ical port, thus the log i cal port aggreg ates the bandwidth of these ports. T his means you c an apply your c u[...]
-
Page 107
105 Per Trunking Gr oup supports a m aximum o f 4 read y member -ports. Please not e that som e decisio ns will autom atically b e made by t he system while y ou ar e configur ing y our tr unking ports. T runk Setting Rules are listed below: Rule1: Maxim um 3 groups are allowed Rule 2: The m embers of each group cannot exceed m ore than 4 ports Rul[...]
-
Page 108
106 Function name: Port Setting/S tatus Function desc ription: Port setting/s t atus is used to configure th e trunk proper ty of eac h and every port i n th e swi tch sy stem. Parameter desc ription: Method: This deter mines the m ethod a port uses to aggregate with other ports. None: A port does not want to aggregate with any other port should ch[...]
-
Page 109
107 Aggtr: Aggtr is an abbrev iation of “ aggregator”. Every port is also a n aggregator , and its own aggre gator ID is the s am e as its own Port No. W e can regar d an aggregat or as a representativ e of a trunking gr oup. Ports with sam e Group ID a nd using sam e trunking m ethod will have the opportuni ty to aggregate to a particular aggr[...]
-
Page 110
108 Function name: Aggregator View Function desc ription: T o displa y the current p ort trunk ing inform ation from the aggregator point of view . Parameter desc ription: Aggregator: It shows th e aggre gat or ID ( f rom 1 to 26) of e ver y p ort. In fact, e ver y port is also an aggregator , and its own aggregat or ID is th e same as its o w n Po[...]
-
Page 111
109 Function name: LACP Detail (LACP Aggregator Detailed Infor mation) Function desc ription: Show the detailed information of the LACP trunk ing group. Parameter desc ription: Actor: The s w itch you are watching on. Partner: The peer s y s tem from this aggregator ’s view . Sy stem Priority : Show the Sy stem Priority part of a system ID. MAC A[...]
-
Page 112
11 0 Function name: LACP Sy s tem Configur ation Function desc ription: It is us ed to set the priority part of the LACP s y stem ID. LACP will onl y aggregate together the ports whose p eer link p artners are all on a single system . Each system supports LACP will be assigned a gl obally unique System Identifier f or this p urpose. A s ystem ID is[...]
-
Page 113
111 3-12. 802.1x Configuration 802.1x por t-based network access contr ol provides a method to r estrict user s to acces s network r esources via a uthenticatin g user ’s inform ation. T his restricts user s from gaining acces s to the networ k resourc es through a 80 2.1x-enabled port without auth entication. If a user wishes t o touch the netwo[...]
-
Page 114
11 2 The overv iew of operat ion flow is qu ite simple. W hen Supplican t P A E issues a r equest to Auth enticator P AE, Aut henticator and Supplican t exchanges authenticat ion m essage. Then, Aut henticator p asses th e request to RADIUS ser ver to verif y . Final ly , R ADIUS server r eplies if the request is gr anted or denied. W hile in the a[...]
-
Page 115
11 3 The Figur e shows the procedur e of 802.1x auth entication. There are steps f or th e login bas ed on 802. 1x port ac cess control m anagement. T he protocol used in the right side is EAPO L and the left side is EAP . 1. At the init ial stage, the s upplicant A is unau thenticated a nd a port on switch ac t ing as an a uthenticator is in un au[...]
-
Page 116
11 4 8. If user ID and pas sword is correct, the aut hentication s erver will send a R adius-Acces s-Accept t o the authe nticator . If not corr ect, the authentication server w ill send a Radius-Ac cess-Rejec t. 9. W h en the authent icator P AE receiv es a Radius-Acc ess-Accept, it will send a n EAP-Succes s to the supp licant. At t his time, the[...]
-
Page 117
11 5 Only Mu ltiHost 802.1X is the type of authenticatio n supported in th e switch. In t his mode, f or the devices connected to t his port, onc e a supplicant is author ized, the devices connec ted to this port can acces s the network resourc e through this port. 802.1x P ort-based Network Acces s Control functi on support ed b y the s witch is l[...]
-
Page 118
11 6 Fig. 3-43 Function name: 802.1x S tate Setting Function desc ription: This function is used to conf igure the global parameters for RADIUS authentication in 802.1x port s ecurity application. Parameter desc ription: Radius Server: RADIUS server IP address f or authentication. Default: 192.168.1.1 Port Num ber: The port num ber to com municate [...]
-
Page 119
11 7 The port num ber to com municate with Acc ounting server for the accounting s ervice. The valid value ranges 1-65535. Default port num ber is 1813.[...]
-
Page 120
11 8 Function name: 802.1x Mode Setting Function desc ription: Set the operation m ode of 802.1X for eac h port. In this device, it supports only Multi-host operation m ode. Parameter desc ription: Port Num ber: Indicate which port is s elected to configure the 802.1x operation mode. 802.1x Mode: 802.1x operation m ode. There are two options, inclu[...]
-
Page 121
11 9 Function name: Port Security Management Function desc ription: Shows eac h port status. In Multihost m ode, it shows t he port num ber and its status, authorized or unauthorized. Parameter desc ription: Disable Mode: W h en selecti ng Disable mode for a port in t he function 802.1X Port M ode Configura tion, the port is in the uncontrolle d po[...]
-
Page 122
120 Function name: Param . Setting Function desc ription: This function is used to conf igure the parameter s for each port in 802.1x port security application. Refer to the f ollowing parameters des cription for details. Parameter desc ription: Port: It is the port num ber to be selected f or configuring its ass ociated 802.1x parameter s which ar[...]
-
Page 123
121 reAuthEnabled: Choose whether regular authentic ation w ill take place in this port. Default: ON reAuthPeriod(1-65535 s ): A non-zero number seconds between the periodic re-authentic ation of the supplicant. Default: 3600 max . Request(1-10): The m aximum of num ber times that the authenticator will retransm i t an EAP Request to the supplicant[...]
-
Page 124
122 3-13. A larm Configuration Function name: Events Configuration Function desc ription: The Trap Events Conf iguratio n function is used to e nable the sw itch to send out the trap information while pre-def ined trap events occurred. The s w itch offers 21 different tr ap events to users for switch m anagement. The tr ap inform ation can be s ent[...]
-
Page 125
123 Fig. 3-47 Function name: Em ail/SMS Configuration Function desc ription: Alarm configuration is use d to configure the pers ons who shou ld receive the alarm m essage via either email or S MS, or both. It depends on y our s ettings. An email addr ess or a m obile phone num ber has to be set in the web page of alarm c onf igur atio n. T hen, us [...]
-
Page 126
124 Parameter desc ription: Em ail: Mail Server: the IP address of the server transf erring y our email. Usernam e: y our usernam e on the mail ser v er . Password: your password on the mail s erver . Email Address 1 – 6: em ail address that would lik e to receive the alarm message. SMS: SMS Server: the IP address of the server transferr ing y ou[...]
-
Page 127
125 3-14. Configuration The s w itch s upports three c opies of c onfiguration, including th e default c onfiguration, work ing configuration a nd user conf iguration for y our conf iguration m anagement. All of them are listed and descr ibed below respec tively . Default Configuration: This is factor y setting and cannot be altered. In Web UI,[...]
-
Page 128
126 3-14-1. Save/Restore Function name: Save As S tart Configuration Function desc ription: Save the current c onfiguration as a start conf iguration file in flash m emor y . Function name: Save As User Configuration Function desc ription: Save the current c onfiguration as a user c onfiguration file in f lash mem ory . Function name: Restore Def a[...]
-
Page 129
127 3-14-2. Conf i g File Function name: Config File Function desc ription: W ith this f unction, user can back up or reload the config f iles of Save As S tart or Save As Us er via TF TP . T o notice that after im port config f ile, the original IP related setting won’t be changed by config file. T his feature is des igned for preventing rem ote[...]
-
Page 130
128 3-15. Security Function name: Mirror Conf iguration Function desc ription: Mirror C onfiguratio n is to monitor the tr affic of the n etwork. F or example, we assum e that Port A and Por t B are Mon itoring Port and M onitored P ort respectiv ely, thus, the traffic rec eived b y Port B will be c opied to Port A for monitor ing. Parameter desc r[...]
-
Page 131
129 Function name: Isolated Group Function desc ription: Isolated G roup function ca n let the port be ind ependent of other por ts in the Isolated gr oup, and the co mmunication is also forbidd en between these p orts. But, the ports of the Is olated gr oup ar e still ab le to co mm unicate with the port s of the non-Iso lated group. W ith this de[...]
-
Page 132
130 Function name: Restricted G roup Function desc ription: The f unction of the Restricted G roup can decide th e direction of tr ansmitting pack ets for the specific port. T he packets rec eived by the port with th e “Ingress ” mode of Res tricted Group will be se nt to the ports with the “ Egress” mode of Restricted Group. Parameter desc[...]
-
Page 133
131 3-16. Bandw idth Management Function name: Ingress Bandwidth Setting Function desc ription: Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port. Fig. 3-54 Parameter desc ription: Port No.: Choose the p ort that you woul d like this f unction to w ork on it. V alid range of the por t is 1~26. Rate: S[...]
-
Page 134
132 Function name: Egress Bandwidth Setting Function desc ription: Egress Bandwidth Setting func tion is used to set up the lim it of Egress bandwidth for each port. Parameter desc ription: Port No.: Choose the p ort that you woul d like this f unction to w ork on it. V alid range of the por t is 1~26. Rate: Set up the limit of Egr ess band w idth [...]
-
Page 135
133 Function name: S torm Setting Function desc ription: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for eac h port. Fig. 3-55 Parameter desc ription: S torm T ype: Disable: Disable the func tion of the bandwidth storm c ontrol. Broadcast Stor m Control: Enable the function of bandwidth storm c ontrol f[...]
-
Page 136
134 S torm Rate: Set up t he limit of bandwidth for s torm t y p e you choos e. V al id value of the storm rate ranges f rom 1-10 0 with the m inimum unit of 1. And onl y integer is acc ept able. Default is 100.[...]
-
Page 137
135 3-17. QoS(Quality of Service) Configurat ion The s witch suppor ts 5 kind s of QoS, are as follo ws, M AC Pr iorit y , 8 02.1p Pr iorit y , IP TOS Priorit y , and Diff Serv DSCP Priorit y . Port Base d Priorit y has a spec ial nam e called VIP Port in the s witch. Any packets enter VIP Port will have hig hest transm itting priorit y . M AC Prio[...]
-
Page 138
136 The Q oS functions as we m entioned above are able t o enable at the same tim e. But, the following precedence will decide whether thes e functions work or not. 1. enable both VIP and TOS Choose priorities of VIP and TOS. 2. enable both VIP and DSCP Choose priorities of VIP and DSCP . 3. enable both TOS and DSCP Choose "DSCP". 4. enab[...]
-
Page 139
137 Function name: QoS Global Setting Function desc ription: W h en you want to use Qo S functio n, please enable QoS Mode in advance. Then you can use MAC Prior ity , 802 .1p Priority , IP TOS Priority , DiffServ DSCP Priorit y , or V IP Port functions and take eff ect. In this func tion, you ca n Enable Q oS Mode. Cho ose any of Pr iority Contro [...]
-
Page 140
138 Function name: VIP Port Setting Function desc ription: W h en the port is s et as VIP Port, the p ackets enter this port and will hav e highest tr ansmitting priority. For example, as you cho ose port 2 is VIP Port, sim ultaneously transm it packets from port 2 a nd port 3 t o port 1 at s peed of 100MB and let congest ion happen. T he pack ets [...]
-
Page 141
139 Function name: 802.1p Setting Function desc ription: This func tion will af f ect the priorit y of VL AN ta g. Bas ed on prior it y of VLAN t ag , it can ar range 0~8 priorities, pr iorities can map to 4 queues of th e switch (queue 0~ 3) and possess different band width distrib ution according to your weight setting. Parameter desc ription: 80[...]
-
Page 142
140 Function name: D-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throug[...]
-
Page 143
141 Function name: T- Typ e T O S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throu[...]
-
Page 144
142 Function name: R-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throug[...]
-
Page 145
143 Function name: M-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throug[...]
-
Page 146
144 Function name: DSCP Setting Function desc ription: In the late 1990s , the IET F redefine d the m eaning of the 8-bit S ERVICE T YPE field to ac comm odate a set of d i fferentiat ed services ( DS). Under the differentiated services interpretation, the first six bits com prise a codepo int, which is som etimes abbr eviated DSCP , and the last t[...]
-
Page 147
145 3-18. Diagnostics Three f unctions, includi ng Diagnostics , Loopback T est and P i ng T est are contain ed in this f unction folder for device s elf-diagnost ics. Eac h of them will b e described in detail orderly in the following sections. Function name: Diagnostics Function desc ription: Diagnostic s function pr ovides a s et of basic s y st[...]
-
Page 148
146 Function name: Loopback T es t Function desc ription: In the Loopbac k T est func t ion, there are two different loo pback tests. O ne is Internal L oopback T est and the other is Exter nal Loopback T es t. The form e r test func tion will not send the test s ignal outside t he switch b ox. The test signal only wr ap s around in the s witch box[...]
-
Page 149
147 Function name: Ping T est Function desc ription: Ping T es t func tion is a tool for detec ting if the target de vice is alive or not through I CMP protocol which aboun ds with report mess ages. The switch provides P ing T est function to let you know th at if the target d evic e is ava ilabl e or not. Y o u can sim pl y fill in a known IP addr[...]
-
Page 150
148 3-19. TFTP Serv er Function name: TFTP Ser ve r Function desc ription: Set up IP address of TF TP server . Parameter desc ription: S pecif y the IP address w here the TF TP server locates. Fill in the IP address of y our TFT P server , then press <A pply> button to have the setting t aken eff ect. Fig. 3-67[...]
-
Page 151
149 3-20. Log This function s hows the log data. T he switch provide s system log data f or users. There ar e 16 private trap logs , 5 public trap logs . The switch suppor t s total 120 log entries. F or more detai ls on log i tems, pleas e refer to the section of Trap/Alarm Configuration and SNMP Configuration. Function name: Log Data Function des[...]
-
Page 152
150 Upload Log: Upload log data through tftp. Clear Log: Clear log data.[...]
-
Page 153
151 3-21. Firmware Upgrade Software upgra de tool is used to h elp upgrade t he software functi on in order t o fix or impr ove the function . The switch pro vides a TFT P client for software upgrade. T his can be done through Ethernet. Function name: Firm w are Upgrade Function desc ription: The s w itch sup ports TFT P upgrade too l for upgrad in[...]
-
Page 154
152 3-22. Reboot W e offer y ou m any ways to reboot the s witch, includi ng power up, hardware r eset and softwar e reset. You can pr ess the RESET button in the fr ont panel to reset t he switch. After upgrad ing software, changing IP configurat ion or chan ging VLA N mode c onfiguration, then you m ust reboot to have the ne w configura tion take[...]
-
Page 155
153 3-23. Logout You can manuall y log out by perf orming Lo gout funct i on. I n the switc h, it prov ides another way to logout. You can configure it to logout autom atically. Function name: Logout Function desc ription: The s w itch a llows you t o logout the s ystem to pre vent other users from the system without the permission. If you do not l[...]
-
Page 156
154 4. Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basic installation. The f ollowi ng descr iption is the brief of the network connec tion. -- Locate the c orrect DB-9 null m odem cable with fem ale DB-9 connector . Null modem cable com es with the managem ent switch. Refer to the Appendix B f or null modem cable conf ig[...]
-
Page 157
155 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262# ------------------------------- Fig. 4-1 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262$ ------------------------------- Fig. 4-2[...]
-
Page 158
156 4-2. Commands of CLI T o see the commands of the mode, p lease input “ ? ” after the prompt, the n all comm ands will be listed in th e screen. All comm ands can be d ivided int o two categories , including g lobal com mands and loca l comm ands. Global comm ands can be used wherever th e mode yo u are. T hey are “exit”, “end”, “h[...]
-
Page 159
157 4-2-1. Glo bal Comma nds of CLI --------------------------- end Syntax: end Description: Back to the top mode. W h en you enter this com mand, your current pos ition woul d move to the top m ode. If y ou use this c omm and in the top mode, you are still in the position of the top m ode. A rgument: None. Possible valu e: None. Example: FE2262 # [...]
-
Page 160
158 --------------------------- help Syntax: help Description: T o show available com mands . Some c om m ands are th e c om bination of m ore than t wo words. W hen you enter t his comm and, the CLI would sho w the com plete commands. Bes ides, the comm and would hel p you clas sif y the c omm ands between t he lo cal c omm ands and th e glob al o[...]
-
Page 161
159 --------------------------- history Syntax: history [#] Description: T o show a list of previous com mands that you had ever run. W h en you ent er this com mand, the CLI wou l d sh ow a list of commands whic h you had t y ped bef ore. The CLI supports up to 25 6 records. If no argum ent is typed, the CLI would list total recor ds up to 256 . I[...]
-
Page 162
160 --------------------------- logout Syntax: logout Description: W h en you enter t his comm and via T elnet con nection, you wou ld logout the s y st em and disc onnect. If y ou connect the system throug h direct s erial port with RS-232 cable, you would l ogo ut t he s y stem and be bac k to the initi al l ogi n prom pt when you run this com ma[...]
-
Page 163
161 --------------------------- restore us er Syntax: restore us er Description: T o restor e the s tartup conf igur ati on as us er def in ed c o nf igurati on. If r es toring d ef ault succes sfully , t he CLI would prom pt if reboot im mediatel y or not. If y ou press Y or y , the system would reboot im mediately; others would back to the CLI sy[...]
-
Page 164
162 --------------------------- save use r Syntax: save user Description: T o save the c urrent conf ig uration as the us er-d efined c onf iguratio n. W hen you enter this com mand, the CLI would sav e your curre nt configurati on into the non-volat ile FLASH as user -defined configur ation. A rgument: None. Possible valu e: None. Example: FE2262 [...]
-
Page 165
163 4-2-2. Local Commands of CLI 802.1x --------------------------- set max-r equest Syntax : set m ax-request <port- range> <times> Description : The m aximum num ber o f tim es that the state machin e will retrans mit an EAP Request packet to the Supplic ant before it tim es out the authentication session. A rgument : [...]
-
Page 166
164 --------------------------- set port-c ontrol Syntax : set port-c ontrol <port-range> <authorized> Description : T o set up 802.1X s t atus of eac h port. A rgument : <port range> : syntax 1,5-7, available from 1 to 26 <authorized> : set up the status of each por t 0:ForceUnauthor iz ed 1:ForceAuthor iz ed 2:Auto Possibl[...]
-
Page 167
165 --------------------------- set reAuthMax Syntax : set reAuthMax <port-range> <max > Description : The num ber of reauthentic ation attempts that are perm itted before the port becom es Unauthorized. A rgument : <port range> : syntax 1,5-7, available from 1 to 26 <max > : max. value , r ange 1-10 Possible valu e: <por[...]
-
Page 168
166 set st ate Syntax : set state <ip> <port-num ber> <secr et-key> <Accounting Service> <Acc ounting Server> <Acc ounting Port> Description : T o conf igure the settings related with 802.1X Radius Server and Accounting ser v ice. A rgument : ip: xxx.xxx.xxx.xxx port-num ber:1~65535 secret- key : The length of s [...]
-
Page 169
167 FE2262 (802.1x)# s et txPeriod 2 30 --------------------------- show mode Syntax : show mode Description : T o display the mode of eac h port. A rgument : None. Possible valu e: None. Example: FE2262(802.1x)# show mode Port Mode ====== ============ 1 Disable 2 Multi-host 3 Disable 4 Disable 5 Disable 6 Disable : : : --------------------------- [...]
-
Page 170
168 --------------------------- show se curity Syntax : show securit y Description : T o display the authentication status of each port. A rgument : None. Possible valu e: None. Example: FE2262 (802.1x)# s how security Port Mode Status ====== ============ ============== 1 Disable 2 Multi-host Unauthorized 3 Disable 4 Disable 5 Disable 6 Disable : :[...]
-
Page 171
169 account --------------------------- add Syntax: add <name> Description: T o create a new guest us er . W hen y ou create a new guest user , you must type in password and confir m password. A rgument: <name> : new acc ount name Possible valu e: <name> : A string m ust be at least 5 character . Example: FEL2SW-26[...]
-
Page 172
170 --------------------------- modify Syntax: m odify <name> Description: T o change the user name and password of an ex isting account. A rgument: <name> : ex isting user account Possible valu e: None. Example: FEL2SW-26(account)# modify aaaaa username/password: the length is from 5 to 15. Current username (aaaaa):bbbbb New password: [...]
-
Page 173
171 alarm <<email>> --------------------------- del mail-address Syntax : del m ail-address <#> Description : T o rem ove the e-ma il address. A rgument : <#>: email addr ess number , range: 1 to 6 Possible valu e: <#>: 1 to 6 Example: FEL2SW-26(alarm-email)# del mail-address 2 -------------------------[...]
-
Page 174
172 --------------------------- set serve r Syntax : set serv er <i p> Description : T o set up the IP address of the email server . A rgument : <ip>:ema il server ip address or domain nam e Possible valu e: None. Example: FEL2SW-26(alarm-email)# set server 192.168.1.6 --------------------------- set user Syntax : set user <us ername[...]
-
Page 175
173 <<even t s>> --------------------------- del all Syntax : del all <range> Description : T o disable em ail, sm s and trap of events. A rgument : <range>:del the range of email, sm s and trap of events, syntax 1,5-7 Possible valu e: <range>: 1~21 Example: FEL2SW-26(alarm-events)# del all 1-3 ------------------------[...]
-
Page 176
174 --------------------------- del trap Syntax : del trap <range> Description : T o disable the trap of the events. A rgument : <range>:del the range of trap, sy ntax 1,5-7 Possible valu e: <range>: 1~21 Example: FEL2SW-26(alarm-events)# del trap 1-3 --------------------------- set all Syntax : set all <range> Description :[...]
-
Page 177
175 --------------------------- set sms Syntax : set sm s <range> Description : T o enable the sm s of the events. A rgument : <range>:set the range of sms, sy ntax 1,5-7 Possible valu e: <range>: 1~21 Example: FEL2SW-26(alarm-events)# set sms 1-3 --------------------------- set trap Syntax : set trap <range> Description : T[...]
-
Page 178
176 --------------------------- show Syntax : show Description : The Show here is us ed to display the configuration of alarm event. A rgument : None. Possible valu e: None. Example: FEL2SW-26(alarm-events)# show Events Email SMS Trap ----------------------------------------- 1 Cold Start v 2 Warm Start v 3 Link Down v 4 Link Up v 5 Authentication [...]
-
Page 179
177 --------------------------- show (al arm) Syntax : show Description : The Sho w fo r al ar m here is used to disp lay the conf igu r ation of Trap, SMS or E- m ail . A rgument : None. Possible valu e: None. Example: FEL2SW-26 (alarm)# show email FEL2SW-26 (alarm)# show events FEL2SW-26 (alarm)# show sms --------------------------- <<sms&g[...]
-
Page 180
178 --------------------------- set phone-number Syntax : set phone-num ber <#> <phone-num ber> Description : T o add sm s phone number . A rgument : <#>: mobile phone num ber , range: 1 to 6 <phone-num ber>: phone number Possible valu e: <#>: 1 to 6 Example: FEL2SW-26(alarm-sms)# set phone-number 1 0968777777 --------[...]
-
Page 181
179 --------------------------- show Syntax : show Description : T o display the configuration of SMS trap event. A rgument : None. Possible valu e: None. Example: FEL2SW-26(alarm-sms)# show SMS Server : 192.168.1.7 Username : ABC Password : **************** Mobile Phone 1: 0968777777 Mobile Phone 2: Mobile Phone 3: Mobile Phone 4: Mobile Phone 5: [...]
-
Page 182
180 autologout --------------------------- autologout Syntax : autologout <time> Description : T o set up the tim er of autologout. A rgument : <time>: r ange 1 to 3600 seconds, 0 for autologout off, current setting is 180 seconds. Possible valu e: < time >: 0,1-3600 Example: FEL2SW -26 # autologout 3600 Set autolo[...]
-
Page 183
181 --------------------------- set sto rm-rate Syntax : set stor m-rate <range> <data_rate> Description : T o set up the stor m-rate of the port s. A rgument : <range>:syntax: 1,3-5, available from 1 to 5 1: Disable 2: Broadcas t S torm Control 3: Multicast S torm Control 4: Unknown Unicas t S torm Contr ol 5: Broadcast, Multic a[...]
-
Page 184
182 config -file --------------------------- export start Syntax : export start Description : T o run the expor t st art function. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (conf ig-file)# expor t start Expo rt successful . --------------------------- export user-c onf Syntax : export user -conf Description : T o [...]
-
Page 185
183 --------------------------- import user-conf Syntax : impor t user-conf Description : T o run the im port user-conf function. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (conf ig-file)# im port user-c onf Import succe ssful. --------------------------- set export-path Syntax : set export-path <filepath> Description : T o [...]
-
Page 186
184 --------------------------- show Syntax : show Description : T o display the inform ation of the config f ile. A rgument : None. Possible valu e: None. Example: FEL2SW-26(config-file)# show TFTP Server IP Address: 192.168.3.111 Export Path and Filename: log/21511.txt Import Path and Filename: log/21511.txt dhcp-boot ------------[...]
-
Page 187
185 diag --------------------------- diag Syntax: diag Description: Diag is used to test whether EEPRO M, UAR T , DRAM and Flash is normal or not. A rgument: None. Possible valu e: None. Example: FEL2SW-26 (diag)# diag EEPROM Test : OK UART Test : OK DRAM Test : OK Flash Test : OK --------------------------- Loopback Syntax: loopbac[...]
-
Page 188
186 192.168.1.115 is alive.[...]
-
Page 189
187 firmw are --------------------------- set upgrade-path Syntax : set upgrade-path <f ilep ath> Description : T o set up the im age file that will be upgraded. A rgument : <filepath>: upgrade file path and nam e Possible valu e: <filepath>: upgrade file path and nam e Example: FEL2SW-26 (firmware)# set upgrade-pa[...]
-
Page 190
188 gvrp --------------------------- disable Syntax : disable Description : T o disable the gvrp f unction A rgument : None. Possible valu e: None. Example: FEL2SW -26 (gvrp) # disable --------------------------- enable Syntax : enable Description : T o enable the gvrp f unction. A rgument : None. Possible valu e: None. Example: FEL[...]
-
Page 191
189 FEL2SW-26 (gvrp)# group 2 FEL2SW -26 (gvrp- group-2)# set applicant 1- 6 non-p articipant FEL2SW-26 (gvrp-group-2)# show GVRP group VID: 2 Port Applicant Registrar ---- --------------- --------- 1 Non-Participant Normal 2 Non-Participant Normal 3 Non-Participant Normal 4 Non-Participant Normal 5 Non-Participant Normal 6 Non-Participant Normal 7[...]
-
Page 192
190 --------------------------- set applicant Syntax : set applicant <r ange> <normal|non-participant> Description : T o set def ault applicant mode f or each port. A rgument : <range>: port range, s y ntax 1,5-7, available f rom 1 to 26 <norm al>: set applicant as norm al mode <non-participant>: set applicant as non-p[...]
-
Page 193
191 Example: FEL2SW-26 (gvrp)# set restricted 1-10 enable FEL2SW-26 (gvrp)# show config GVRP state: Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted ---- --------- ---------- ------------- --------------- --------- ---------- 1 20 60 1000 Normal Normal Enable 2 20 60 1000 Normal Normal Enable 3 20 60 1000 Normal Normal [...]
-
Page 194
192 --------------------------- set timer Syntax : set tim er <range> <join> <leave> <leaveall> Description : T o set gvrp j oin time, leave tim e, and leaveall time f or each port. A rgument : <range> : port range, s y ntax 1,5-7, available f rom 1 to 26 <join>: join tim er , available fr om 20 to 100 <leave&[...]
-
Page 195
193 --------------------------- show counter Syntax : show counter <port> Description : T o show counter of the port. A rgument : <port>: port num ber , available from 1 to 26 Possible valu e: <port>: 1 to 26 Example: FEL2SW -26(gvrp) # show counter 2 GVRP Counter port: 2 Counter Name Received Transmitted -------------------- ----[...]
-
Page 196
194 hostname --------------------------- hostname Syntax : hostnam e <name> Description : T o set up the hostnam e of the switch. A rgument : <name>: hos tname, m ax. 40 characters . Possible valu e: <name>: hos tname, m ax. 40 characters . Example: FEL2SW -26 # hostnam e Company Company# igmp-snoop[...]
-
Page 197
195 --------------------------- set mode Syntax : set m ode <status> Description : T o set up the m ode of IGMP Snooping. A rgument : <status>: 0:disable, 1:active, 2:passive Possible valu e: <status>: 0,1or 2 Example: FEL2SW -26(igm p-snooping)# set m ode 2 --------------------------- show igmp-snooping Syntax : show igmp- snoopi[...]
-
Page 198
196 IP --------------------------- disable dhcp Syntax : disable dhcp Description : T o disable the DHCP function of the s y stem . A rgument : None. Possible valu e: None. Example: FEL2SW -26(ip)# dis able dhcp DHCP is already stopped. --------------------------- enable dhcp Syntax : enable dhcp <m anual| auto> Description : [...]
-
Page 199
197 --------------------------- set i p Syntax : set ip <ip> <m ask> <gateway> Description : T o set the system IP address , subnet mask and gateway . A rgument : <ip> : ip address <mas k> : subnet m ask <gateway > : default gateway Possible valu e: <ip> : 192.168.1.1 or others <mas k> : 255.255.255.0[...]
-
Page 200
198 log --------------------------- clear Syntax: clear Description: T o clear the log data. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (log)# clear --------------------------- disable auto-upload Syntax: disable auto-upload Description: T o disable the auto-upload f unction. A rgument: None. Possible valu e: None. [...]
-
Page 201
199 loop-detect i on (LD) --------------------------- disable action Syntax : disable action Description : Disable LD and corr esponding action. Disable the lock ed-port action when loop occurs. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (loop-detection)# dis able action --------------------------- disable port Synt[...]
-
Page 202
200 --------------------------- enable port Syntax : enable port <port range> Description : Enable LD and corres ponding action. Enable LD per port. A rgument : <port range>: The range of y our setting enabled loop detection with ports. Possible valu e: <port range>: syntax: 1,5-7, available from 1 to 26 Example: FEL2SW-26 (loop-d[...]
-
Page 203
201 --------------------------- show Syntax: show Description: T o show a l ist of trap log events. When an y of log events happens , it will be recorded a nd using show c ommand in log f unction to quer y . Up to 120 log records are supported. A rgument: None. Possible valu e: None. Example: FEL2SW-26 (log)# show Tftp Server : 0.0.0.0 Auto Upload [...]
-
Page 204
202 mac-table <<alias>> --------------------------- del Syntax : del <m ac> Description : T o delete the m ac alias entry . A rgument : <mac > : mac addres s, form at: 00-02-03-04-05-06 Possible valu e: <m ac> : mac addr ess Example: FEL2SW -26 (m ac-table-alias)# del 00-44- 33-44-55-44 ----------------[...]
-
Page 205
203 <<infor mation>> --------------------------- search Syntax : searc h <port> <mac> <vid> Description : T o look for the relative m ac inform ation in mac t able. A rgument : <port> : set up the range of the ports to search for , synt ax 1,5-7, available f rom 1 to 26 <mac > : mac addres s, form at: 01-02[...]
-
Page 206
204 <<maintain>> --------------------------- set aging Syntax : set aging <tim e> Description : T o set up the age out tim e of dynamic learning m ac. A rgument : <time> : Mac t able age out tim e betw een 10 and 1000000 seconds . The value “0” means to disable age out time Possible valu e: <time> : 10- 1000000 sec[...]
-
Page 207
205 Example: FEL2SW-26(mac-table-maintain)# show Mac table age out time: 300 seconds Port Dynamically learn limit ------ ------------------------- 1 8191 2 8191 3 8191 4 8191 5 8191 : : : 21 8191 22 8191 23 8191 24 8191 25 8192 26 8192 <<static-mac>> --------------------------- add Syntax : add <m ac> <vid> <queue> <[...]
-
Page 208
206 --------------------------- del Syntax : del <m ac> Description : T o rem ove the static mac entry . A rgument : <mac > : mac addres s, form at: 00-02-03-04-05-06 Possible valu e: <m ac> : mac addr ess Example: FEL2SW -26(m ac-table-static-m ac)# del 00-02-03-04- 05-06 --------------------------- show Syntax : show Description[...]
-
Page 209
207 management --------------------------- add Syntax: Usage: set [<nam e> <value>] [<vid> <value>] [<ip> <value>] [<port> <value>] [<ty pe> <value>] <action> <value> Sy nopsis: set nam e Mary vid 20 ip 192.168.1.1-192.168.1.90 port 2-5,8 ty pe h,s action a Sy n[...]
-
Page 210
208 --------------------------- delete Syntax: delete # Description: T o delete a spec ific record or range. A rgument: [#]: a specif ic or range managem ent security entry (s) Possible valu e: None. Example: FEL2SW-26 (management)# show #: 1 Name : Tom VlanID : 2 IP : 192.168.1.30-192.168.1.80 Type : SNMP Action : Deny Port : 1,2 FEL2SW-26 (manage[...]
-
Page 211
209 Example: FEL2SW-26 (management)# edit 1 FEL2SW-26 (management-edit-1)# set name Tom vid 2 ip 192.168.1.30- 192.168.1.80 port 1-2 type s action d FEL2SW-26 (management-edit-1)# show #: 1 Name : Tom VlanID : 2 IP : 192.168.1.30-192.168.1.80 Type : SNMP Action : Deny Port : 1,2 --------------------------- show Syntax: show Description: T o show th[...]
-
Page 212
210 port --------------------------- clear counter Syntax : clear counter Description : T o clear all por t s’ counter (inc lude simple and detail port counter) information. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (port)# c lear counter --------------------------- disable state Syntax : disable state <range[...]
-
Page 213
21 1 set de scripti on Syntax : set desc ription <range> <description> Description : T o set up the hum an readable description of all ports. A rgument : range syntax: 1,5-7, available from 1 to 26 description: s et it s port des cription, max 47 c haracters Possible valu e: <range>: 1 to 26 Example: FEL2SW -26(port)# s et descrip[...]
-
Page 214
212 --------------------------- show conf Syntax : show conf Description : T o display the each port’s configuration about s t ate, speed-duplex and flow control. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (port)# s how conf --------------------------- show descr iption Syntax : show description Description : T o display the eac[...]
-
Page 215
213 Port 25 Fiber Media Information --------------------------------------------------------------------- Connector Type : SFP - LC Fiber Type : Multi-mode (MM) Tx Central Wavelength : 850 Baud Rate : 1G Vendor OUI : 00:40:c7 Vendor Name : APAC Opto Vendor PN : KM28-C3S-TC-N Vendor Rev : 0000 Vendor SN : 5425011140 Date Code : 050530 Temperature : [...]
-
Page 216
214 5 TP Up Enable Enable 100M/Full ON ON 6 TP Down Enable Enable ----/---- ---- ---- 7 TP Down Enable Enable ----/---- ---- ---- : : : 24 TP Down Enable Enable ----/---- ---- ---- 25 TP Down Enable Enable ----/---- ---- ---- 26 TP Down Enable Enable ----/---- ---- ---- qos --------------------------- disable 1p Syntax : disable 1p [...]
-
Page 217
215 --------------------------- disable tos Syntax : disable tos Description : T o disable IP TOS qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # disable tos --------------------------- enable 1p Syntax : enable 1p Description : T o enable 802.1p qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # ena[...]
-
Page 218
216 --------------------------- enable qos Syntax : enable qos Description : T o enable qos f unction. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # enable qos --------------------------- enable tos Syntax : enable tos Description : T o enable IP TOS qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # en[...]
-
Page 219
217 --------------------------- set pri-tag Syntax : set pri-tag [<q0><priority>] [<q1><priority> ] [<q2><priority>] [<q3><priority >] Description : T o set 802.1p qos weighting f or 4 queues. A rgument : <q>: queue level, q0: queue 0; q1: queue 1; q2: queue 2; q3: queue 3. <priority>: pri[...]
-
Page 220
218 Possible valu e: <ty pe_value>: 0~3 <priority >: 0 to 7. Example: FEL2SW -26 (qos) # set tos 0 q0 1 q1 2 q2 4 q3 6 --------------------------- set vi p Syntax : set vip <port_range> <m ode> Description : T o set vip port for strict priority . A rgument : <port_range>: syntax 1,5-7, available from 1 to 26 <mode&g[...]
-
Page 221
219 DiffServ Queue DiffServ Queue DiffServ Queue DiffServ Queue --------- ------- ---------- ------- ---------- ------- ---------- ------- 0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 0 10 0 11 0 12 0 13 0 14 0 15 0 16 1 17 1 18 1 19 1 20 1 21 1 22 1 23 1 24 1 25 1 26 1 27 1 28 1 29 1 30 1 31 1 32 2 33 2 34 2 35 2 36 2 37 2 38 2 39 2 40 2 41 2 42 2 43 2 4[...]
-
Page 222
220 --------------------------- show priority- t ag Syntax : show priority-t ag Description : T o show 802.1p Qos c onfiguration. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (qos)# show priority-tag 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority Disable ip tos classification Disable ip diffse[...]
-
Page 223
221 --------------------------- show tos Syntax : show tos Description : T o show IP tos Qos conf iguration. A rgument : none Possible valu e: none Example: FEL2SW-26 (qos)# show tos ip tos classification ==================== Global QoS mode: Enable QoS Disable 802.1p Priority Enable ip tos classification Disable ip diffserv classification Scheduli[...]
-
Page 224
222 --------------------------- reboot Syntax: reboot Description: T o reboot the system. A rgument: None. Possible valu e: None. Example: FEL2SW -26 # reboot security <<isolat ed-group>> --------------------------- set Syntax : set <port> Description : T o set up the f unction of the isolated group. A rgument : &l[...]
-
Page 225
223 <<mirror>> --------------------------- disable Syntax : disable Description : T o disable the f unction of m i rror . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (sec urity -m i rror )# disable --------------------------- enable Syntax : enable Description : T o enable the func tion of mirr or . A rgument : None. Po[...]
-
Page 226
224 --------------------------- show Syntax : show Description : T o display the current setting status of mirror . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (sec urity - mirror) # show Mirror: Monitoring Port :1 Monitored Ingress :4 Monitored Egress :2 3 <<restricted-group>> --------------------------- set Syntax : s[...]
-
Page 227
225 snmp --------------------------- disable Syntax : disable set-c omm unity disable snm p Description : The Dis able here is used for the de- activation of snm p or set-com munity . A rgument : None. Possible valu e: None. Example: FEL2SW-26(snmp)# disable set-community FEL2SW-26(snmp)# disable snmp --------------------------- ena[...]
-
Page 228
226 --------------------------- set Syntax : set get-com m unity <com munity> set set-c omm unity <com munity> set trap <#> <ip> [port] [com munity] Description : The Set here is used for the setup of get-comm unity , set-com munity , trap hos t ip, host port and trap- c omm unity . A rgument : <#>: trap num ber , rang[...]
-
Page 229
227 stp --------------------------- MCh eck Syntax : MCheck <range> Description : T o force the port to trans mit RST BPDUs. A rgument : <range>: syntax 1,5-7, available from 1 to 26 Possible valu e: <range>: 1 to 26 Example: FEL2SW -26 (stp) # Mcheck 1-8 --------------------------- disable Syntax : disable Descrip[...]
-
Page 230
228 --------------------------- set con fig Syntax : set conf ig <Bridge Priority > <Hello Ti m e> <Max. Age> <Forward Delay> Description : T o set up the param eters of ST P . A rgument : <Bridge Priority>: priority m ust be a multiple of 4096,available from 0 to 61440. <Hello T ime >: available from 1 to 10. &l[...]
-
Page 231
229 FEL2SW -26 (stp) # set version rstp --------------------------- show config Syntax : show config Description : T o display the STP configuration data. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (stp)# show config STP State Configuration : Spanning Tree Protocol : Enabled Bridge Priority (0-61440) : 61440 Hello Time (1-10 sec) :[...]
-
Page 232
230 --------------------------- show status Syntax : show status Description : T o display of the status of ST P . A rgument : None. Possible valu e: None. Example: FEL2SW-26 (stp)# show status STP Status : STP State : Enabled Bridge ID : 00:40:C7:D8:09:1D Bridge Priority : 61440 Designated Root : 00:40:C7:D8:09:1D Designated Priority : 61440 Root [...]
-
Page 233
231 system --------------------------- set contact Syntax : set contact <contact> Description : T o set the contact des cription of the switch. A rgument : <contact>:string length up to 40 c haracters. Possible valu e: <contact>: A, b, c, d, ... ,z and 1, 2, 3, …. etc. Example: FEL2SW -26 (system )# set contact T[...]
-
Page 234
232 --------------------------- show Syntax : show Description : T o display the basic infor mation of the switch. A rgument : None. Possible valu e: None. Example: FEL2SW-26(system)# show Model Name : FEL2SW-26 System Description : 24 Fast Ethernet + 2 Gigabit L2 Managed Switch Location : Contact : Device Name : FEL2SW-26 System Up Time : 0 Days 2[...]
-
Page 235
233 tft p --------------------------- set serve r Syntax : set serv er <i p> Description : T o set up the IP address of t ftp server . A rgument : <ip>: the IP address of tftp server Possible valu e: <ip>: tftp server IP Example: FEL2SW -26 (tftp)# set ser v er 192.168.3.1 1 1 --------------------------- show Synta[...]
-
Page 236
234 time --------------------------- set daylightsaving Syntax: set daylight saving <hr> <MM/DD/HH> <m m/dd/hh> Description: T o set up the daylight saving. A rgument: <hr> : daylight saving hour, range: -5 to +5 <MM> : daylight saving start Month (01-12) <DD> : daylight saving start Day (01-31) &[...]
-
Page 237
235 --------------------------- set ntp Syntax: set ntp <ip> <tim ez one> Description: T o set up the cur rent time via NT P server . A rgument: <ip>: ntp server ip addres s or domain nam e <timezone>: tim e z one (GMT ), range: -12 to +13 Possible valu e: <timezone>: -12,-1 1…,0,1…,13 Example: FEML2-SW 26E( time)#[...]
-
Page 238
236 trunk --------------------------- del trunk Syntax : del trunk <port-range> Description : T o rem ove the trunk port. A rgument : <port-range> : s y ntax 1,5-7, available f rom 1 to 26 Possible valu e: <port-range> : 1 to 26 Example: FEL2SW -26 (trunk )# del trunk 1 --------------------------- set hash Syntax :[...]
-
Page 239
237 --------------------------- set trunk Syntax : set trunk <port-range> <m ethod> <group> <active LACP> Description : T o set up the status of trunk, including the group num ber and mode of the trunk as well as LACP mode. A rgument : <port-range> : s y ntax 1,5-7, available f rom 1 to 26 <m ethod>: <static| [...]
-
Page 240
238 --------------------------- show lacp-c onfig Syntax : show lacp-c onfig Description : T o display the value of LACP Priority . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (trunk )# show lacp-conf ig LACP Sy s tem Priority : 33333 Hash Method : DA --------------------------- show lacp- det ail Syntax : show lacp-detail <aggt[...]
-
Page 241
239 --------------------------- show status Syntax : show status Description : T o display the aggregator status and the settings of each port. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (trunk)# show status Trunk Port Setting Trunk Port Status ------------------------------------- ---------------------- port Method Group Active LA[...]
-
Page 242
240 vla n --------------------------- del port-group Syntax: del port-group <nam e> Description: T o delete the port-bas ed vlan group. A rgument: <name>: por t-vlan name Possible valu e: <name>: por t-vlan name Example: FEL2SW -26 (vlan)# del port- group vlan-2 --------------------------- del tag-group Syntax: del[...]
-
Page 243
241 --------------------------- disable drop-untag Syntax: disable drop-untag <port_range> Description: T o disable drop- unt ag. A rgument: <port_range>: which port(s ) y ou want not to drop untagged frames . Sy ntax: 1,5-7, available from 1 to 26 Possible valu e: <port_range>: 1 to 26 Example: FEL2SW -26 (vlan)# disable dr op-un[...]
-
Page 244
242 --------------------------- enable double-tag Syntax: enable double-tag Description: T o enable double-tag. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# enable double-tag --------------------------- enable drop-untag Syntax: enable drop-untag <port_range> Description: T o enable drop-untag. A rgument: <port_range[...]
-
Page 245
243 --------------------------- enable symmetric Syntax: enable symm etric Description: T o drop f rames f rom the non-m ember port. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# enable s y m metric --------------------------- set mgt-vlan Syntax: set m gt-vlan <st ate> [vid] Description: T o assign a m anagement vlan to[...]
-
Page 246
244 <name>: por t-vlan name <range>: vlan group m embers , sy ntax: 1,5-7, available from 1 to 26 Possible valu e: <range>: 1 to 26 Example: FEL2SW -26 (vlan)# set por t-group vlan-1 2-5,6-10 --------------------------- set pvi d Syntax: set pvid <port_range> <pvid> <def ault_priority > Description: T o set vlan [...]
-
Page 247
245 --------------------------- show config Syntax: show config Description: T o display the current vlan m ode, Sy m me tric vlan, SVL and Double tag states. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# s how config Current vlan mode:Tag-based vlan Global setting: Symmetric vlan : Disable (Asymmetric) SVL : Disable (IVL) Dou[...]
-
Page 248
246 Description: T o display managem ent setting. A rgument: None Possible valu e: None Example: FEL2SW-26(vlan)# show mgt-vlan Management Vlan: State : Disable VID : 1 --------------------------- show pvid Syntax: show pvid Description: T o display pvid, priority and drop untag result. A rgument: None Possible valu e: None Example: FEL2SW-26 (vlan[...]
-
Page 249
247 vs --------------------------- disable Syntax: disable Description: T o disable the virt ual stack. A rgument: None. Possible valu e: None. Example: FEL2SW-26(vs)# disable --------------------------- enable Syntax: enable Description: T o enable the virtual s t ack . A rgument: None. Possible valu e: None. Example: FEL2SW-26 (vs[...]
-
Page 250
248 --------------------------- set role Syntax: set role <m aster|slave> Description: T o set role. A rgument: <m aster|slave>: master : act as mas ter , s lave : act as slave Possible valu e: <m aster|slave>: master or slave Example: FEL2SW -26 (vs)# s et role master --------------------------- show Syntax: show Description: T o[...]
-
Page 251
249 5. Maintenance 5-1. Resolving No Link Condition The pos sible causes for a no link LED status are as f ollow s: T he attached device is not powered on T he cable may not be the correct ty pe or is faulty T he installed building premis e cable is faulty T he port may be faulty 5-2. Q&A 1. Computer A c an connect to Computer B[...]
-
Page 252
250 Appendix A Technical Specifications Features • The switch inc luded 24-Port 10/100Mbps TP and 2-Port Gigabit Dual Media TP/SFP . • Supports 24-port 10/100M TP ports with Nway and auto MDIX function . • Supports on-line plug/unplug SFP transce iver modules. • Non-block ing, store-and-for w ard and shared- memor y L2 m anaged switch. • [...]
-
Page 253
251 Hardware Specifi cat i ons St andard Compliance: IEEE802.3ab / 802.3z / 802.3u / 802.3x 802.3z and 802.3ab compliant Gigabit Ethernet ports T ransmissio n Mode: 10/100Mbps s upport full or half duplex 1000Mbp s suppor t full duplex only T ransmissio n S peed: 10/100/1000Mbps f or TP 1000Mbps f or [...]
-
Page 254
252 Diagnostic LED: Sy stem LED : Power CPURUN ACT (LEDSET ) FDX (LEDSET ) SPD (LEDSET) Per Port LED: 10/100M TP Port 1 to 24 : LINK/ACT , FDX, SPD 1000M Fiber/TP Port 25,26 : LINK/ACT , FDX, SPD Power Requirement : AC Line V oltage : 100 ∼ 240 V Frequency : 50 ∼ 60 Hz Consum ption : 15W A mbient [...]
-
Page 255
253 Management Soft w are Speci f ications Sys tem Configuration Auto-negotiation support on 10/100Base-TX ports, W eb browser or console interface can set transmission speed (10/100Mbp s) and operation mode (Full/Half duplex ) on each port, enable/disable any port, set VLAN group, set T runk Connection. Management A gent SNMP support; M IB II, Bri[...]
-
Page 256
254 Appendix B Null Modem Cable Specifications The DB-9 c able is used for c onnecting a terminal or ter minal em ulator to the Managed Switch’s RS-232 port to acces s the comm and-line interfac e. The table below shows the pin assignm ents for the DB-9 c able. Function Mnemonic Pin Carrier CD 1 Receive Data RXD 2 T ransm it Dat a TX D 3 Data T e[...]