LevelOne GSW-2496 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of LevelOne GSW-2496, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of LevelOne GSW-2496 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of LevelOne GSW-2496. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of LevelOne GSW-2496 should contain:
- informations concerning technical data of LevelOne GSW-2496
- name of the manufacturer and a year of construction of the LevelOne GSW-2496 item
- rules of operation, control and maintenance of the LevelOne GSW-2496 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of LevelOne GSW-2496 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of LevelOne GSW-2496, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the LevelOne service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of LevelOne GSW-2496.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the LevelOne GSW-2496 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    GSW -2496 8-Port TP + 16-Port SFP L2 Managed Gigabit Switch User Manual V er . 1.00 -0704[...]

  • Page 2

    ii The informatio n in this document is su bject to change without notice. Unless the ex plicit written permissi on of Digital D ata C ommunications Co., L td., this document in whol e or in part shall not be r eplicated or modified or ame nded or transmitted, in a ny from, or by any means ma nual , electric, electronic, electromagnetic, mechanical[...]

  • Page 3

    iii DISCLAIMER. EXC EPT AS PROVIDED ABOVE, THE SOF TWARE IS PROVIDED “AS IS ” AND LEVELONE AND ITS LICEN SORS MAKE NO WARR ANTIES, EXPRESS OR IMPLIED , WITH REPSECT TO THE SOFTW ARE AND DOCUMENT AITON. LE VELONE AND ITS LICENSORS DI SCLAIM ALL OTHER WARRANTIES, INCLUSIVE OF WITH OUT LIMIT A TION, IMPLIED WARRANTIES OR MERCHANT ABILITY , FITNESS[...]

  • Page 4

    iv Caution Circuit devices are sensitive to static ele ctri city , which can damage their delicate electronics. Dry weather con dition s or walki ng across a carpeted floor may cause you to acquire a st at ic electrical charge. T o protect your device, always: • T ouch the metal cha ssis of your computer to ground the static el ectrical charge be[...]

  • Page 5

    v About this user ’ s manual In this user ’s manual, it will not only tell y ou how to install an d connect your network system but configure and moni tor the GSW -2496 through the built-in CLI and web by RS-232 serial interface and Ethernet port s step-by-step. Many explanation in det ail of hardware and software functions a re shown as well a[...]

  • Page 6

    vi T able of Content s C AUTION --------------------------------------------------------------------------------------------------------- IV E LECTRONIC E MISSION N OTICES ---------------------------------------------------------------------------- IV 1. INTRODUCT ION ---------------------------------------------------------------------------------[...]

  • Page 7

    vii 3-12. MAC T ABL E -------------------------------------------------------------------------------------------- 89 3-13. GVRP C ONFIGURA TION ------------------------------------------------------------------------------ 96 3-14. STP C ONFIGURA TION -------------------------------------------------------------------------------- 102 3-14-1. ST P[...]

  • Page 8

    [...]

  • Page 9

    l 1 1. Introduction 1-1. Overview GSW-249 6, a 24-port Gigabit L2 Managed Switch, is a standard switch tha t meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch included 8-Port 10/100/1000Mb ps TP and 16-Port Gigabit SFP Fiber management Ethernet switch. The switch can b e managed through RS-232 serial port via directly con[...]

  • Page 10

    2 • Key Features QoS: Support Quality of Service by the IEEE 802.1P standard. The re are two priority queue and pa cket transmi ssion schedule. S panning T ree: Support IEEE 802.1D, IEEE 802.1w (RSTP: Rapid S panning T ree Protocol) sta ndards. VLAN: Support Port-based VLAN and IEEE802 .1Q T ag VLAN. Support 256 active VLANs and VLAN ID 1~4094. P[...]

  • Page 11

    l 3 1-2. Checklist Before you start inst alling the switch, verify that the package cont ains the following: - GSW-249 6 - Power Cord - Console Cable - Rack-mounted Kit - CD Manual Please notify your sales repre sent ative i mmediately if any of the aforementioned items is missing or damag ed. 1-3. Features The GSW -2496 L2 Managed Switch, a st and[...]

  • Page 12

    4 • Support s 802.1Q VLAN • Support s user management and limits three u sers to login • Maximal pa cket length can be up to 9216 bytes for jumbo frame application • Support s DHCP Broadca sting Supp ression to avoid network suspende d or crashe d • Support s to send the trap event while monitored event s h appened • Support s default c[...]

  • Page 13

    l 5 1-4. V iew of GSW-2496 L2 Managed Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 8 TP Gigabit Ethernet p orts and 16 SFP fiber ports for optional removable modules on the front p anel of the switch. LED display area, locating on the left side of the panel, cont ains a Power LED, which indi cates the power st[...]

  • Page 14

    6 • LED Indicators LED Color Function System LED POWER Green Lit when +5V DC power is on and good CPU LED Green Blinks when CPU is activity 10/100/1000Ethernet TP Port 1 to 8 LED LINK/ACT Green Lit when connection with remote device is good Blinks when any traf fic is present Off when cabl e con nection is not good SPEED Green/ Ember Lit green wh[...]

  • Page 15

    l 7 1-5. Optional SFP T ransceiver Modules In the switch,1000Mbps SFP Fiber transceiver is used for high-speed connection exp an sion; the following a re optional SFP types provided for the switch: Note: GSW-249 6 o nly supports the following vendor’s SFP Transceiver 1. LevelOne (HW V er .: 3.0 or up) 2. Avago T echnologies 3. Finisar Corporation[...]

  • Page 16

    8 2. Installation 2-1. St arting Up This section will give users a quick st art for: - Hardware and Cable In stallation - Management S tation Installation - Software booting and configuration 2-1-1. Hardware and Cable Install ation At the beginning, please do first: ⇒ Wea r a grounding device to avoid the damage from electrostatic discharge ⇒ B[...]

  • Page 17

    l 9 • TP Port a nd Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover , so both types of cable, straight-throu gh (Cable pin-outs for RJ -45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed- over ( Cable pin- outs for RJ- 45 jack 1, 2, 3, 6 to 3, [...]

  • Page 18

    10 2-1-2. Inst alling Chassis to a 19-Inch Wiring Closet Rail Caution: Allow a proper sp acing and proper air ventilation for the cooling fan at both sides of the chassis. ⇒ Wear a groun ding devi ce for electrostatic discharge. ⇒ Screw the mounting accessory to the front side of the switch (Se e F ig. 2-2). ⇒ Place the Chassis into the 19-in[...]

  • Page 19

    l 11 2-1-3-1. Cabling Requirement s for TP Port s ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cabl e must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection ⎯ The grade of the cabl e must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. 2-1-3-2[...]

  • Page 20

    12 2-1-3-3. Switch Cascading in T opology • T akes the Dela y T ime into Account Theoretically , the switch partitions the collision domain for each port in swit ch cascading that you may up-link the swi tches unlimitedly . In practice, the network extension (cascading levels & overall diam eter) must follow the constraint of the IEEE 802.3/8[...]

  • Page 21

    l 13 Case1: All switch ports are in the same local area networ k. Every port can access each other (See Fig. 2-3). If VLAN is enabled and configured, each node in the network that can communicate each other di rectly is bounded in the same VLAN area. Here VLAN area is defin ed by what VLAN you are using. The switch support s both port-based VLAN an[...]

  • Page 22

    14 Case 2b: Port-based VLAN (See Fig.2-5). 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access V LAN1 and VLAN3 members, but they could access VLA N 4 members. 3. VLAN3 members could not acce ss VLAN1, VLAN2 and VLAN4 . 4. VLAN4 members could not access V LAN1 and VLAN3 members, but they could access [...]

  • Page 23

    l 15 2-1-4. Configuring the Management Agent We of fer you three ways t o startup the swit ch management function. They are RS-232 console, CLI, and W eb. Users can use any one of them to monitor and configure the switch. Y ou can touch th em through the following proce dures. Section 2-1-4-1: Configuring the Manag ement Agent through the Serial RS[...]

  • Page 24

    16 2-1-4-1. Configuring the Manag ement Ag ent through the Serial RS-232 Port T o perform the configuration through RS -232 console port, the switch’ s serial port must be directly connected to a DCE device, for example, a PC, through RS-232 cable with DB-9 connector . Next, r un a terminal emulator with the default setting of the switch’s seri[...]

  • Page 25

    l 17 • Set IP Add ress, Subnet Mask and Default Gateway IP Addres s Please refer to Fig. 2-7 CLI Managem ent for details about LevelOne’ s setting. They are default setting of IP address. Y ou can first either configure your PC IP address or change IP address of the swit ch, next to change the IP address of default gateway and subnet mask. For [...]

  • Page 26

    18 2-1-4-2. Configuring the Manag ement Agent through the Ethernet Port There are three ways to configure and monitor the switch th rough the switch’ s Ethernet port. They are CLI, W eb browser and SNMP manager . The user interface for the last one is NMS depende nt and does not cover here. W e just introduce the first two types of management int[...]

  • Page 27

    l 19 Fig. 2-10 the Login Screen for Web 2-1-5. IP Address Assignment For IP ad dress configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS . IP addre ss: The address of the network device in the network is used for internetworking communicati on. Its addre ss structure looks i s [...]

  • Page 28

    20 With the classful addressi ng, it divides IP address int o three classes, class A, class B and class C. The rest of IP addres se s are for multicast and broadcast. The bit length of the network prefix is the sa me as that of the subnet mask and is denoted as IP addre ss/X, for example, 192. 168.1.0/24. Each class has it s address range described[...]

  • Page 29

    l 21 Class D and E: Class D is a cla ss with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RF C 1 1 12. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP a ddress blocks reserved a nd able t[...]

  • Page 30

    22 In this diagram, you can see the subnet mask with 2 5-bit long, 255.255.255.128, cont ains 126 members in the su b-netted network. Another is that the length of network prefi x equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows t he result. Prefi[...]

  • Page 31

    l 23 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small netwo rk accommodating a maximum of 15 nodes in the network. Default gateway: For the routed p acket, if the destination is not in the routing t able, all the traffic is put into the device with the design ated IP address, known as defau[...]

  • Page 32

    24 2-2. T y pical Applications The GSW -2496 L2 Managed Switch implement s 8 Gigabit Ethernet TP ports with auto MDIX and 16 slots for the remov able module supporting comprehen sive fiber types of connectio n, including LC SFP mo dules. For more det ails on the specification of the switch, please refer to Appendix A. The switch is suitable for the[...]

  • Page 33

    l 25 3. Operation of Web-based Management This chapter instruct s you how to config ure and manage the GSW -2496 L2 Managed Switch through the web u ser interface it supports, to access and manage the 8-Port 10/100/1000Mbp s TP and 16-Po rt Gigabit SFP Fiber manage ment Ethernet switch. With this facility , y ou can easily access and monitor throug[...]

  • Page 34

    26 In the switch, it support s a simple user management function allowing only one administrator to config ure the system at the same time. If there are two or more users using administ rator ’s identity , the switch will allow the only on e who logins first to configure the system. The rest of users, even with administrator’s identity , can on[...]

  • Page 35

    l 27 3-1. Web Management Home Overview After you login, the switch shows you the system information a s Fig. 3-2. This page is default and tells you the ba sic in formation of the system, including “Mode l Name”, “System Description”, “Location”, “Co ntact”, “Device Name”, “System Up T ime”, “Current T ime”, “BIOS V er[...]

  • Page 36

    28 • The Information of Page Layout ⎯ On the top side, it shows the front p anel of the switch. In the front panel, the linked ports will display green; as to the ports, which are link of f, they will be dark. For the optional modules, the slot will show only a cover plate if no module exist s and will show a module if a module is pre sent. The[...]

  • Page 37

    l 29 Port Bandwidth Loo p Detection S y stem Mirror QoS SNMP IGMP Snoo p in g Root Max. Packet Len g th DHCP Boot VLAN MAC T able GVRP STP Tr u n k 802.1X A larm Confi g uration Dia g nostics TFTP Server Lo g Firmware U pg rade Reboot Lo g out[...]

  • Page 38

    30 3-1-1. System Information Function name: System Information Function description: Show the basic system information. Parameter description: Model name: The model name of this device. System description: As it is, this tells what this device is. Here, it is “L2 Managed Switch”. Location: Basically , it is the location where this switch is put[...]

  • Page 39

    l 31 Host IP addre ss: The IP addre ss of the swit ch. Host MAC addre ss: It is the Ethernet MAC address of the management agent in this switch. Device Port: Show all types and numbers of the port i n the switch. RAM size: The size of the DRAM in this switch. Flash size: The size of the flash memory in this switch.[...]

  • Page 40

    32 3-1-2. IP Configuration IP configu ration is one of the most im porta nt configurations in the switch. Without the proper setting, network manager will not be able to manage or view the device. The switch support s both man ual IP addre ss setting and automatic IP address setting via DHCP server . When IP addres s i s changed, you must reboot th[...]

  • Page 41

    l 33 IP addre ss: Users can configure the IP settings and fill in new values if users set the DHCP functio n “Di sable”. Then, click <Apply > button to update. When DHCP is disabled, Default: 192.168.1.1 If DHCP is e n abled, this field is fill ed by DHCP server and will not allow user manually set it any more. Subnet mask: Subnet mask is[...]

  • Page 42

    34 DNS: It is Domain Name Server used to serve the translation bet ween IP address and name address. The switch supports DNS client function to re-route the mnemoni c name address to DNS server to get its associated IP address for accessing Internet. User can specify a DNS IP address for the swit ch. With this, the switch can translate a mne m onic[...]

  • Page 43

    l 35 3-1-3. Time Configuration The switch provides m anual and automatic ways to set the system time via NTP . Manual setting is simple an d you just input “Y ear”, “Mont h”, “Day”, “Hour”, “Minute” and “Second” within the valid value range i ndicated in each item. If you input an invalid value, for example, 61 in minute, th[...]

  • Page 44

    36 NTP: NTP is Net work T ime Protocol and is used to sync the network time based Greenwich Mean Time (GMT). If use the NTP mode and select a built-in NTP time server or manua lly specify an user-defined NTP server as wel l as T ime Zone, the switch will sync the time in a short after pressing <Apply> button. Though it synch ronizes the time [...]

  • Page 45

    l 37 Day Light Saving End : This is used to set when to stop pe rformi ng the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day: Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23. Default: 0 Fig. 3-5[...]

  • Page 46

    38 3-1-4. Account Configuration In this function, only administrator can create, modify or delete the username and password. Administrator can modi fy ot her guest identities’ password without confirming the passwo rd but it is necessary to modify the administrator-equivalent identity . Guest-equivalent identity can m odify his p assword only . P[...]

  • Page 47

    l 39 3-1-5. Management Policy Through the management security con figuration, the manager can do the strict setup to control the switch and lim it the user to access this switch. The following rules are offered for the m anager to manage the switch: Rule 1) : When no list s exists, then it w ill accept all connections. Accept -------------- -------[...]

  • Page 48

    40 Function name: Management Security Configuratio n Function description: The switch offers Management Security Configuration function. With this function, the manager ca n easily control the mo de that the user connects to the switch. According to the mod e, users can be classified into two types: Those who are able to conne ct to t he switch (Ac[...]

  • Page 49

    l 41 IP Range: The switch supports t wo kinds of options for managed valid IP Range, including “Any” and “Custom”. Default is “Any”. In case that” Cust om” had been chosen, you can assign ed effect ive IP range. The valid range is 0.0.0.0~255.255.255.255. Incoming Port: The switch support s two kinds of options for managed valid Por[...]

  • Page 50

    42 3-1-6. Virtual S t ack Function name: Virtual Stack Function description: Virtual S tack Management(VSM) is the group management functi on. Through the proper configuration of this functi on, switches in t he same LAN will be grouped automatically . And among these switch, one switch will be a master machine, and the others in this group will be[...]

  • Page 51

    l 43 Fig. 3-8 Parameter description: S tate: It is used for the activation or de-activation of VSM. Default is Enab le. Role: The role that the switch would like to play in virtu al stack. T wo types of roles, including master and slave are of fered for option. Default is Master . Group ID: It is the group identifier (GID) which signs for VSM. V al[...]

  • Page 52

    44 3-2. Port Configuration Five functions, including Port Status, Po rt Configuration, Port Descriptio n, Simple Counter and Detail Counte r are contained in this function folder for port monitor and management. Each of them will be described in detail orderly in the following sections. 3-2-1.Port St atus The function Port S tatus gathers the in fo[...]

  • Page 53

    l 45 Function name: Port S tatus Function Description: Report the latest updated st atus of all ports in thi s switch. When any one of the ports in the switch cha nges its param eter displayed in the page, it will be automatically refreshed the port curr ent st atus about every 5 seconds. Parameter Description: Port No: Display the port number . Th[...]

  • Page 54

    46 S peed / Duplex Mode: Display the speed and duplex of all port. There are t hree speeds 10Mbp s, 100Mbps an d 1000Mbps supported for TP media, and the duplex supported is half duplex and full duplex . If the media is 1Gbps fiber , it is 1000Mbp s supported only . The status of speed/du plex mode is determined by 1) the negotiation of both local [...]

  • Page 55

    l 47 Fig. 3-1 1 Parameter description of Port 9~24: Connecto r T ype: Display the connector type, for instan ce, UTP , SC, ST , LC and so on. Fiber T ype: Display the fiber mode, for instance, Mu lti-Mode, Single-Mode. Tx Central W avelength: Display the fiber optical transmitting central wavelength, for inst ance, 850nm, 1310nm, 1550nm and so on. [...]

  • Page 56

    48 V endor SN (Serial Number): Show the serial number assign ed by the manufacturer . Date Code: Show the date this SFP module was made. T emperature: Show the current temperature of SFP module. Vcc: Show the working DC volt age of SFP module. Mon1(Bias) mA: Show the Bias current of SFP module. Mon2(TX PWR): Show the transmit powe r of SFP module. [...]

  • Page 57

    l 49 3-2-2. Port Configuration Port Configuration is applied to chan ge the setting of each port. In this configuration function, you can set/reset t he following functions. All of them are described in det ail below . Fig. 3-12 Function name: Port Configuration Function description: It is used to set each port’s operation mode. The swit ch suppo[...]

  • Page 58

    50 Mode: Set the speed and duplex of the port. In speed, if the media is 1Gbps fiber , it is always 1000Mbps an d the duplex is full only . If the media is TP , the S peed/Duplex is comprised of the combination of spee d mode, 10/100/1000Mbp s, and duplex mode, full duplex and half duplex. The following tabl e summarized the function the media supp[...]

  • Page 59

    l 51 3-2-3. Port Description Port Description is applied to add name for each port. In this function, you can set the following functions. All of them are described in det ail below . Fig. 3-12 Function name: Port Description Function description: It is used to set each port’s name. It is convenient way to show each port’ s connection instead b[...]

  • Page 60

    52 3-2-4. Simple Counter The function of Simple Counter co llect s any information and provides the counting about the traf fic of the port, no matter the packet is good or bad. In the Fig. 3-13, the window can show all ports’ counter information at the same time. Each dat a field has 20-digit long. If the counting is overflow , the counter will [...]

  • Page 61

    l 53 Rx Packet: The counting number of the p acket received. Tx Collision: Number of collisions transm itting frames experienced. Rx Error Packet: Number of bad packets received.[...]

  • Page 62

    54 3-2-5. Det ail Counter The function of Detail Counter collect s any information and provides the counting about the traf fic of the port, no matter the packet is good or bad. In the Fig. 3-14, the window can show only one port counter info rmation at the same time. T o see another port’s co unter , you have to pull down the list of Select, the[...]

  • Page 63

    l 55 Rx Low Priority Packets: Number of Rx packets classified as low priority. Rx Broadcast : Show the counting number of the received broadcast p acket. Rx Multicast: Show the counting number of the received multicast p acket. Tx Packet s: The counting number of t he p acket transmitted. TX Octets: T otal transmitted bytes. Tx High Priority Packet[...]

  • Page 64

    56 Tx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad p ackets transmitted. Tx 128-255 Bytes: Number of 127 ~ 255-byte frames in goo d and ba d packets transmitted. Tx 256-51 1 Bytes: Number of 256 ~ 511-byte frames in goo d and ba d packets transmitted. Tx 512-1023 Bytes: Number of 512 ~ 1023-byte frame s in g ood an d bad packets tra[...]

  • Page 65

    l 57 3-3. Mirror Function name: Mirror Configuration Function description: Mirror Configuration i s to monitor the traffic of the network. For example, we assume that Port A and Port B are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be copied to Port A for monitoring. Note: When configuring the mirror [...]

  • Page 66

    58 3-4. Bandwid th Management Function name: Bandwidth M anag ement Function description: Bandwidth Manag ement function is used to set up the limit of Ingress and Egress bandwid th for each port. Note: Each port of the switch owns 16KB pack et buffer . The p acket buffer size will be reduced when the bandwi dth rate limitation is ena bled, which m[...]

  • Page 67

    l 59 Broadcast & Multicasat for Ingress Rate Limiting (Poli cing): Set up the limit of Ingress band width for the port you choose. I ncoming traffic will b e discarded if the rate exceeds the value you set up in Dat a Rate field. The format of the packet limits to broadca st and multicast. V alid range is 0~1000. All T r af fic for Egress Rate [...]

  • Page 68

    60 3-5. QoS(Quality of Service) Configuration The sw itch offers po werful 5 kinds of QoS functions. There are Per Port Priority that you can assign each po rt to different precedence, VLAN Tag priority that can make precedence of 8 p riorities , IP TOS Classific ation, IP TCP/UDP Port Classification and IP DiffServe Classification. In Quality of S[...]

  • Page 69

    l 61 Function name: Per Port Priority Function description: We can assign QoS Pri ority, including High and Low for each port. For example, if we transmit IP packets fr om Port 2 and Port 3 at the speed of 1Gbps to Port 1, and set the Class of Port 2 as High and Port 3 as Low, then the packets of Port 3 will be dro ppe d when the congestion happens[...]

  • Page 70

    62 Function name: VLAN T ag Priority Function description: In vlan tag, there are 3 bits belonging to priority. According to these 3 bits, we could arrange 8 traf fics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. W e can set High priority or Low priority for eac h traf fic class. For insta nce, if we let VLAN-tagge d priority 0 0 0 be[...]

  • Page 71

    l 63 Bit 0, Bit 1, Bit 2: According to the arrangem ent of VLAN-t agged priority , it can form 8 kinds of traffics, incl uding 0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0 and 1 1 1. Class: 8 kinds of traf fic as mentioned above, user can set up High Pri orit y or Low Priority for each port respectively .[...]

  • Page 72

    64 Function name: IP T oS Classification Function description: Another QoS function is the application of Layer 3 on network framework. W e focus on TO S field of IP header . There are three bits in TOS field. W e means bit 5~7 of T OS field that we will use. According to these 3 bi ts, we could arrange 8 tr affics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 [...]

  • Page 73

    l 65 Bit 0, Bit 1, Bit 2: According to the arrangement of Bit 5 ~ Bit 7 in T OS Field of IP Header , it can form 8 kinds of traf fics, includin g 0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0 and 1 1 1. Class: 8 kinds of traf fic as mentioned above, user can set up High Pri orit y or Low Priority for each port respectively .[...]

  • Page 74

    66 Function name: IP TCP/UDP Port Classification Function description: In L4 QoS Configuration, you can enter one of these spe cial network transmission events, for exampl e we use” Down pri oritize web browsing, e- mail, FTP and news “L4 Q oS Configuration and click <Apply > button, and then click <Advance >> > button. We can[...]

  • Page 75

    l 67 Prioritize Streaming Audio/Video: Belong to the QoS in L4. Just tick the option button and press <Apply> button to have this function taken affect. Then, click <Advance >> > button set up Special TCP/UDP port for QoS. Prioritize Database s (O racle, IBM DB2, SQL, Microsoft): Belong to the QoS in L4. Just tick the option butto[...]

  • Page 76

    68 Fig. 3-21 Advanced Mode Fig. 3-22 Simple Mode Simple Mode: Press <Simple << > button is to return to the screen that all L4 port numbe r will disappear (See Fig. 3-22).[...]

  • Page 77

    l 69 Function name: IP Dif fserv Classification Function description: In the late 1990s, the IETF redefined t he meaning of the 8-bit SERVICE TYPE field to accommodate a set of dif ferentiated services (DS). Under the differentiated services interpretation, the first six bit s comprise a codepoint, which is sometimes abbre viated DSCP , and the las[...]

  • Page 78

    70 3-6. Loop Detection Looping will always occur when the switches are con nected as a cycle and a switchtransmit s the packets that will go back to the transmitted swit ch. Loop Detection willprevent the looping from happening. Moreover , it could remove the loopingphenomenon per port. In general, you can unplug the cable conne ction to stop thelo[...]

  • Page 79

    l 71 Parameters description: S tate: Open the Loop Detection cap ability per port. The list has “Enable” and “Disable”. Default is “Disabl e”. Current S tatus: Show the looping st atus per port. It could be “Unlocked or Locked”. Default is “Unlocked”. When some port hap pen s looping, it will show “Locked” Resume Action: Rem[...]

  • Page 80

    72 3-7. SNMP Configuration Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can m anage the Managed devices equipp ed with SNMP agent, provided that the Management In formation Base (MIB) is installed correctly on the managed devices. The SNMP is a p rotocol that is used to govern the transfer of information[...]

  • Page 81

    l 73 Default SNMP function : Enable Default community name for GET : public Default community name for SET : private Default community name for Trap: publi c Default Set function : Enable Default trap host IP addre ss: 0.0.0.0 Default port number :162 Tr a p : In the switch, there are 6 trap h osts supported. Each of them ha s its own community nam[...]

  • Page 82

    74 3-8. IGMP Snooping The function, IGMP Snooping, is used to establish the multicast groups to forward the multicast packe t to the member ports, and, in nature, avoids wasting the bandwid th while IP multicast packet s are running over the network. This is because a switch that does not support IGMP or IGMP Snooping can no t tell the multicast pa[...]

  • Page 83

    l 75 Parameter description: IGMP snoo pi ng mode selection: The switch support s three kinds of IGMP Snooping status, including “Passive”, “Active” and “Disabl e”. Disable: Set “Disable” mode to disable IGMP Snoopin g function. Default: Disable Active: In Active mode, IGMP snooping switch will periodically issue the Membership Query[...]

  • Page 84

    76 Function name: Allowed Group Function description: The Allowed Group funct ion allows the IGMP Snooping to set up the IP multicast table based on user’s specific conditions. IGMP report packets that meet the items you set up will be joined or formed the multicast group. Fig. 3-26 Parameter description: IP Range: The switch supports t wo kinds [...]

  • Page 85

    l 77 Add: A new entry of allowed group configuration can be created after the parameters as mentione d above had been setup and then press <Add> button. Edit: The existed entry also can be modified af ter pressing <Edit> button. Delete: Remove the existed entry of allowed group configurat ion from the allowed group.[...]

  • Page 86

    78 3-9. Max. Packet Length Function name: Max. Packet Length Function description: The switch is capable of dealing with 9k Jumbo Frames, which suit s the transmission for a large amount of dat a in the network environment. Parameter description: Jumbo Frame(bytes): Set up the maximum length of the packet that each port of the switch can accept. Ma[...]

  • Page 87

    l 79 3-10. DHCP Boot The DHCP Boot function is use d to sp read the request broadcast packet into a bigger time frame to prevent the traf fic congestion due to bro adcast packets from many network devices wh ich may seek it s NMS, boot se rver , DHCP se rver and many connections predefined when the whol e building or block lose the power and then r[...]

  • Page 88

    80 3-1 1. VLAN The switch support s T ag-based VLAN (802.1q) and Port-based VLAN . Support 256 active VLANs and VLAN ID 1~ 4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and incr easing performa nce but greatly reducing VLAN management. 3-1 1-1[...]

  • Page 89

    l 81 Metro Mode: The Metro Mode is a quick configu ration VLAN environment method on Port-based VLAN. It will create 22 or 23 Port-based VLAN groups. Double-t ag: Double-t ag mode belongs to the tag-based mod e, however , it would treat all frames as the unt agged ones, which mea ns that tag with PV ID will be added into all packet s. Th en, these [...]

  • Page 90

    82 Up-link Port: This function is enabled only when metro mode is chosen in VLAN mode. 23: Except Port 23, each port of the sw itch cannot transmit p ackets with each other . Each port groups a VLAN with Port 23, thus, total 23 groups consi sting of 2 members are formed. 24: Except Port 24, each port of the sw itch cannot transmit p ackets with eac[...]

  • Page 91

    l 83 3-1 1-2. T ag-based Group Function name: Tag-based Group Configuration Function description: It shows the information of existed T ag-based VLAN Groups, Y ou can also easily create, edit and delete a T ag-based VLAN group by pressing <Add> , <Edit> and <Delete> function buttons. User can a dd a new VLAN group by inputting a n[...]

  • Page 92

    84 Add Group: Create a new T ag-based VLAN. Input the VLAN name as well as VID, configure the SYM-VLAN function and ch oose the member by ticki ng the check box beside the po rt No., then, press the <Apply> button to have the setting taken ef fect. Fig. 3-32 Delete Group: Just press t he <Delete> button to remove the selected group entr[...]

  • Page 93

    l 85 3-1 1-3. Port-based Group Function name: Port-based Group Configuration Function description: It shows the information of the existed Port-based VLAN Groups. Y ou can easily create, edit and delete a Po rt-based VLAN group by pressing <Add> , <Edit> and <Delete> function buttons. User can a dd a new VLAN group by inputting a [...]

  • Page 94

    86 Add Group: Create a new Port -based VLAN. Input the VLAN name a nd choose the member by ticking the check box besi de the port No., then, press the <Apply> button to have the setting t aken effect. Fig. 3-35 Delete Group: Just press t he <Delete> button to remove the selected group entry from the Port-based group t able. Fig. 3-36 Ed[...]

  • Page 95

    l 87 3-1 1-4. T ag Rule Function name: Tag Rule Function description: In VLAN T ag Rule Setting, user can inpu t VID number to each port. The range of VID number is from 1 to 4094. User also can choose ing ress filtering rules to each port. There are two ingress filtering rules which can be applied to the switch. The Ingres s Filtering Rule 1 is ?[...]

  • Page 96

    88 Role: This is an egress rule of t he port. Here you can choose Access, T runk or Hybrid. T runk means the outgoing p ackets must ca rry VLAN tag header . Access means the outgoing p ackets carry no VLAN t ag header . If packet s have double VLAN t ags, one will be dropped and the other will still be lef t. As to Hybrid, it is similar to T runk, [...]

  • Page 97

    l 89 3-12. MAC T able MAC Table Configuration gathers many functions, including MAC Table Information, MAC Table Maintenance, Static Forward, Static Filter and MA C Alias, which cannot be categorized to some fun ction type. Th ey are de scribed below. Function name: MAC T able Information Function Description: Display the static or dyna m ic learni[...]

  • Page 98

    90 Port: The port that exists in the searche d MAC Entry . VID: VLAN Group that MAC Entry exists. S tate: Display the method that this MAC Entr y is built. It may show “Dynamic MAC” or “S tatic MAC”. Fig. 3-38[...]

  • Page 99

    l 91 Function Name: MAC T able Maintenance Function Description: This function can allo w the user to set up the processing mechanism of MAC T able. An idle MAC address exceeding MAC Address Age-out T ime will be removed from the MAC T able. The range of Age-out T ime is 10-65535 second s, and the setup of this time will have no ef fect on st atic [...]

  • Page 100

    92 Function Name: S tatic Forward Function Description: Static Forward is a function that allows the user i n the static forward table to access a specified po rt of the switch. Static Forward table associated with a specified port of a switch i s set up by manually inputting MAC address and its alias name. When a MAC address is assi gned to a spec[...]

  • Page 101

    l 93 Function name: S tatic Filter Function Description: Static Filter is a function that denies the packet forwarding if the p acket’s MAC Address is listed in the filtering Static Filter table. User can very easily maintain the table by filling in MAC Address, VID (VLAN ID) and Alias fields individually. User also can delete the existed entry b[...]

  • Page 102

    94 Function name: MAC Alias Function description: MAC Alias function is used to let y ou assign MAC address a plain English name. This will help you tell which MAC address belongs to which user in the illegal access report. At the initial time, it shows all p airs of the existed alias name and MAC addre ss. There are three MAC alias functions in th[...]

  • Page 103

    l 95 Parameter description: MAC Address: It is a six-byte long Ethernet hardw are address and usually expressed by hex and separated by hyph ens. Fo r example, 00 – 1 1 – 6B – D6 – 00 – 01 Alias: MAC alias name you assign. Note: If there are too many MAC addresses learned in the t able, we recommend you inputting the MAC address and alias[...]

  • Page 104

    96 3-13. GVRP Configuration GVRP is an application based on Generic Attribute Regi stration Protocol (GARP), mainly used to automatically and dynamically main tain the group membership information of the VLANs. The GVRP offers the function providing t he VLAN registration service through a GARP application. It makes use of GA RP Information Declara[...]

  • Page 105

    l 97 Function name: GVRP Co nfig Function description: In the function of GVRP Config, it is used to configure e ach port’s GVRP operation mode, in which there are sev en parameters needed to be configured described below . Parameter description: GVRP S tate Setting: This function is simply to let you enable or disable GVRP function. Y ou can pul[...]

  • Page 106

    98 Normal: It is Normal Registration. T he Registrar responds normally to incoming GARP messages. The default setting is Normal. Fixed: It is Registration Fixed. The Registrar ignores all GARP messages, and all members remain in t he registered (IN) st ate. Forbidden: It is Registration Forbidden . The Registrar ignores all GARP messages, and all m[...]

  • Page 107

    l 99 Function name: GVRP Co unt er Function description: All GVRP counters are mainly divi ded into Received and T ransmitted two categories to let you monitor the GVRP actions. Actually , they are GARP pack ets. Fig. 3-44 Parameter description: Received: To t a l G V R P P a c k e t s : T otal GVRP BPDU is received by the GVRP applic ation. Invali[...]

  • Page 108

    100 LeaveEmpty Message Packet s: Number of GARP BPDU with Leave Empty message is received by the GARP ap plicatio n. Empty Message Packet s: Number of GARP BPDU with Empty message is received by the GARP appli c ation. T ransmitted: To t a l G V R P P a c k e t s : T otal GARP BPDU is transmitt ed by the GVRP application. Invalid GVRP Pac kets: Num[...]

  • Page 109

    l 101 Function name: GVRP Group Information Function description: T o show the dynamic group member and their inform ation. Parameter description: VID: VLAN identifier . When GVRP gro up creates, each dynamic VLAN group owns its VID. V alid range is 1 ~ 4094. Member Port: Those are the members belonging to the same dynamic VLAN g roup. Edit Adminis[...]

  • Page 110

    102 3-14. STP Configuration The S panning T ree Protocol (STP) is a standardized method (IEEE 802.1D) for avoiding loop s in switched networks. When STP is enabled, ensure that only one path is active bet ween any two nodes on the netwo rk at a time. User can enable S panning T r ee Protocol o n switch’s web man agement and then set up other adva[...]

  • Page 111

    l 103 All bridges in the LAN will re-l earn an d determine which the root bridge is. Maximum Age time is assigned by root bridge in unit of seconds. Default i s 20 seconds. Current Forward Delay: Show the current root bridge forwar d delay time. The value of Forward Delay time is set by root. The Forward Delay time i s defined as the time spent fro[...]

  • Page 112

    104 3-14-2. STP Configuration The STP , S panning T ree Protocol, actually includes RSTP . In th e S panning T ree Configuration, there are six param e ters open for the user to configure as user ’s idea. Each parameter description is listed below . Function name: STP Configu r ation Function description: User can set the followin g S panning T r[...]

  • Page 113

    l 105 Forward Delay: Y ou can set the root bridge forward del ay time. This figure is set by root bridge only . The forward delay time i s defined as the time spent from Listening sta te moved to Learning state and also from Learning st ate moved to Forwarding st ate of a port in bridge. The forward delay time contain s two states, Listening state [...]

  • Page 114

    106 3-14-3. STP Port Configuration Function name: STP Port Setting Function description: In the STP Port Setting, one item selection and five parameters settings are offered for u ser ’ s setup. User can dis able and enable each port by selectin g each Port S tatus item. User also can se t “Path Cost” and “Priority” of each port by fillin[...]

  • Page 115

    l 107 802.1w RSTP recommended value: (V alid range: 1 – 200,000,00 0) 10 Mbps : 2,000,000 100 Mbps : 200,000 1 Gbps : 20,000 Default: 0 Priority: Priority here means Port Priority . Port Priority and Port Number are mixed to form the Port ID. Port IDs are oft en compared in order to determin e which port of a bridge woul d become the Root Port. T[...]

  • Page 116

    108 M Check: Migration Check. It forces the port sending out an RSTP BPDU instead of a legacy STP BPDU at the next transmissio n. The only benefit of this operation is to make the port quickly get back to act as an RSTP port. Click <M Check> button to send a RSTP BPDU from the port you specified. Fig. 3-48[...]

  • Page 117

    l 109 3-15. T runking Configuration The Port T runking Configuration i s us ed to configure the settings of Link Aggregation. Y ou can bundle more than one port with the sam e speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwid th of these ports. This means you ca n apply your current Ethern[...]

  • Page 118

    11 0 Per T runking Group support s a maximum of 12 ready member-port s. Please note that some decisions w ill automatically be made by the system while you are configuring your trunki ng p orts. Some configuration examples are listed below: a) 12 ports have already used S tatic T runk Group ID 1, the 13th port willing to use the same S tatic T runk[...]

  • Page 119

    l 111 Function name: Port Setting/S tatus Function description: Port setting/status i s used to configur e the trunk property of e ach and every port in the switch system. Parameter description: Method: This determines the method a port uses to aggregate with other ports. None: A port does not want to aggregate with any other port should cho o se t[...]

  • Page 120

    11 2 Aggtr: Aggtr is an abbreviation of “aggrega tor”. Every port is also an aggregator , and its own aggregator ID is the same as its o wn Port No. We can regard an aggregator as a represent ative of a trunking group. Ports wit h same Group ID and using same trun king method will have the opportunity to aggregate to a particul ar aggregator po[...]

  • Page 121

    l 11 3 Function name: Aggregator V i ew Function description: T o display the current port trunking info rmation from the aggregator point of view . Parameter description: Aggregator: It shows the aggregator ID (from 1 to 24) of every port. In fact, every port is also an aggregator , and its own aggreg ator ID is the same as its own Port No.. Metho[...]

  • Page 122

    11 4 Function name: LACP Det ail (LACP Aggregator Detailed Information ) Function description: Show the detailed informat ion of the LACP trunking group. Parameter description: Actor: The switch you are watching on. Partner: The peer system from this aggregato r’s view . System Priority: Show the System Priority part of a system ID. MAC Address: [...]

  • Page 123

    l 11 5 Function name: LACP System Priority Function description: It is used to set the priority part of the LACP system ID. LACP will only aggregate together the port s whose peer link partners a re all on a single system. Each system supp orts LACP wi ll be assigned a glob ally unique System Identifier for this purpose. A system ID is a 64-bit fie[...]

  • Page 124

    11 6 3-16. 802.1X Configuration 802.1X port-based network access co ntrol provides a method to restrict users to access network re sources via authenticating user ’s information. Thi s restrict s users from gaini ng access to the network resources t hrough a 802.1X- enabled port without authentication. If a use r wishes to touch the network throu[...]

  • Page 125

    l 11 7 The overview of operation flow for the Fig. 3-5 3 is quite simple. When Supplicant P AE issues a request to Au thenticator P AE, Authenticator and Supplicant exchanges authenticatio n message. Then, Authenticator passes the request to RA DIUS server to verify . Finally , RADIUS server replies if the request is granted or denied. While in the[...]

  • Page 126

    11 8 The Fig. 3-55 shows the procedure of 802.1X authenti cation. There are steps for the login based on 802.1X port access control m anagement. The protocol used in the right side is EAPOL and the left si de is EAP . 1. At the initial stage, the supp licant A is unauthenticated and a port on switch acting as an authenticato r is in unauthorized st[...]

  • Page 127

    l 11 9 8. If user ID and password is correct, the authentication server will send a Radius-Acce ss-Accept to the authenticator . If not correct, the authentication server will se nd a Radius-Access-Reject. 9. When the authenticator P AE re ceives a Radius-Access-Accept, it will send an EAP-Success to the supplicant. At this time, the supplicant is [...]

  • Page 128

    120 Only Normal 802.1X is the type of auth entication supported in the switch. In this mode, for the devices connected to th is port, once a supplicant is autho rized, the devices connected to this port can ac cess the network resource throug h this port. 802.1X Port-based Network Access Co ntro l function supported by the switch is little bit comp[...]

  • Page 129

    l 121 Function name: 802.1X S tate Setting Function description: This function is used to configure the global p arameters for RA DIUS authentication in 802.1X port security application. Parameter description: Radius Server: RADIUS server IP address for authentication. Default: 192.168.1.1 Port Number: The port number to communicate with RADIUS se [...]

  • Page 130

    122 Function name: 802.1X Mode Setting Function description: Set the operation mode of 802.1X for each port. In this device, it support s only Normal operation mode. Parameter description: Port Number: Indicate which port is sele cted to configure the 802.1X operation mode. 802.1X Mode: 802.1X operation mode. There are two options, including Disabl[...]

  • Page 131

    l 123 Function name: Port Security Management Function description: Shows each port statu s. In Normal mo de, it shows the port number and its status, authorized o r una uthori zed. Parameter description: Disable Mode: When selecting Disa ble mode for a port in the function 802.1X Port Mode Configuration, the port is i n the uncontrolled port state[...]

  • Page 132

    124 Function name: Param. Setting Function description: This function is used to configure the paramete rs fo r each port in 8 02.1X port security application. Refer to the following parameters descriptio n for detail s. Parameter description: Port: It is the port number to be selected for configuring it s associated 802.1X parameters which a re Po[...]

  • Page 133

    l 125 reAuthEnabled: Choose whether regular authentication will t ake place in this port. Default: ON reAuthPeriod(1-65535 s): A non-zero number seconds bet ween t he periodic re-authentication of the supplicant. Default: 3600 max. Request(1-10): The maximum of number times that the authenticator will retransmit an EAP Reque st to the suppli cant b[...]

  • Page 134

    126 3-17. Alarm Configuration Function name: Events Configuration Function description: The T rap Events Config uration function is used to enable the switch to send out the trap information while pre-defined trap event s occurred. The switch offers 23 differe nt trap events to users for swit ch management. The trap information can be sent out in t[...]

  • Page 135

    l 127 Fig. 3-60 Function name: Email/SMS Configuration Function description: Alarm configuration is used to confi gure the persons who should receive the alarm message via either email or SMS, or both. It depe nds on your settings. An email address or a mobile phone number ha s to be set in the web page of alarm configuration (See Fig. 3-61). Th en[...]

  • Page 136

    128 Parameter description: Email: Mail Server: the IP addre s s of the serve r transferring your email. Username: your username on the mail server . Password: your pa ssword on the mail server . Email Address 1 – 6: email address that would like to receive the alarm message. SMS: SMS Server: the IP addre s s of the se rver transferring y our SMS.[...]

  • Page 137

    l 129 3-18. Configuration The switch support s three copies of configuration, including the default configuration, working conf iguration and us er configuration for your configuration management. All of them are listed and described below respective ly .  Default Configura tion: This is LevelOne’ s setting and cannot be altered. In W eb UI, t[...]

  • Page 138

    130 3-18-1. Save/Restore Function name: Save As S tart Configuration Function description: Save the current configuration as a st ar t configuration file in flash memory . Fig. 3-63 Function name: Save As User Configuration Function description: Save the current configuration as a user configuration file in flash memory . Fig. 3-64[...]

  • Page 139

    l 131 Function name: Restore Default Configurat ion (includes default IP address) Function description: Restore Default Configuration function can retrieve LevelOne ’s setting to replace the start configura tion. And t he IP address of the switch will also be restored to 192.168.1.1. Fig. 3-65 Function name: Restore Default Configurat ion (excl u[...]

  • Page 140

    132 Function name: Restore User Configuration Function description: Restore User Configuration functio n can retrieve the previous confirmed working configuration stored in the flash memory to update st art configuration. When completing to restore the configur ation, the system’ s start configuration is updated and will be changed it s system se[...]

  • Page 141

    l 133 3-18-2. Config File Function name: Config File Function description: With this function, user can back up or re load the confi g files of Save As S tart or Save As User via TFTP . Parameter description: Export File Path: Export S tart: Export Save As S tart’s con fig file stored in the flash. Export User-Conf: Export Save As User ’ s conf[...]

  • Page 142

    134 3-19. Diagnostics Three functions, including Diagno stic s, Loopback T est and Ping T est are contained in this function folder for device self-diag nostics. Each of them will be described in detail orderly in the followin g sections. Function name: Diagnostics Function description: Diagnostics function provi des a set of basic system diagnosis[...]

  • Page 143

    l 135 Function name: Loopback T est Function description: In the Loopback T est function, there ar e two different loopback test s. One is Internal Loopback T est and the other is External Loopback T est. The former te s t function will not send the test signal out si de the switch box. The test signal only wraps aroun d in the switch box. As to th[...]

  • Page 144

    136 Function name: Ping T est Function description: Ping T est function is a tool for detecting if the target device is alive or not through ICMP protocol which abounds with repo rt messages. The switch provides Ping T est function to let you k now that if the target device is available or not. Y ou can simply fill in a known IP address and then cl[...]

  • Page 145

    l 137 3-20. TFTP Server Function name: TFTP Server Function description: Set up IP address of TFTP serve r . Parameter description: S pecify the IP address where the TFTP serv er locates. Fill in the IP address of your TFTP server , then press <Apply> button to have the setting taken ef fect. Fig. 3-72[...]

  • Page 146

    138 3-21. Log This function shows the log data. The switch provides system log data for users. There are 18 private trap logs, 5 public trap logs. The swit ch supports tot al 120 log entries. For more det ails on log items, please refer to the se ction of T rap/Alarm Configuration and SNMP Configuratio n. Function name: Log Data Function descriptio[...]

  • Page 147

    l 139 3-22. Firmware Upgrade Software upgrade tool i s used to help upgrade the software functio n in orde r to fix or improve the function. The switch provides a TFTP client for software upgrade. Thi s can be d one through Ethernet. Function name: Firmware Upgrade Function description: The switch su pports TFTP upgrade tool for upgrading sof tware[...]

  • Page 148

    140 3-23. Reboot We offer you many ways to reboot the switch, including power up, hardware reset and software reset. Y ou can press the RESET butt on in the front panel to reset the switch. After upgrading software, changi ng IP configuration or changing VLAN mode configuration, then you must reboot to have the new configuration taken effect. Here [...]

  • Page 149

    l 141 3-24. Logout You can manually logout by performing Log out function. In the switch, it provides another way to logout. You can configure it to logout automatically. Function name: Logout Function description: The switch allows you to logout the sy stem to prevent other users from the system without the permission. If you do not logout and exi[...]

  • Page 150

    142 4. Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basi c inst allation. The followi ng description is the brief of the network connection. -- Locate the correct DB-9 null modem cable with fem ale DB-9 co n nector . Null modem cable comes with t he management switch. Refer to the Appendix B for null modem cable configurat[...]

  • Page 151

    l 143 L2 Managed Sw itch - GSW-24 96 Login: admin Password: GSW-2496# Fig. 4-1 L2 Managed Sw itch - GSW-24 96 Login: admin Password: GSW-2496$ Fig. 4-2[...]

  • Page 152

    144 4-2. Commands of CLI T o see the commands of the mode, ple ase input “ ? ” after the prompt, then all commands will be li sted in the screen. All commands can be divided into two categories, including glob al commands and local commands. Glob al commands can be used wherever the mod e you ar e. They are “exit”, “end”, “help”, ?[...]

  • Page 153

    l 145 4-2-1. Global Commands of CLI end Synt ax: end Description: Back to the top mode. When you enter this comm and, your current position would move t o the top mode. If you use this command in the top mode, you are still in the position of the top mode. Argument: None. Possible value: None. Example: GSW-2496# ala rm GSW-2496(alar m)# events GSW-[...]

  • Page 154

    146 help Synt ax: help Description: T o show available commands. Some commands are the combination of mo re than two words. When you enter this command, the CLI would sho w the complete commands. Besides, the command would help you classify the com mands between the local com mands and the global ones. Argument: None. Possible value: None. Example:[...]

  • Page 155

    l 147 history Synt ax: history [#] Description: T o show a list of previous commands tha t you had ever run. When you enter this com mand, the CLI would show a list of commands which you had typed before. The CLI support s up to 256 records. If no argument is typed, the CLI would list total record s up to 256. If optional argument is given, the CLI[...]

  • Page 156

    148 logout Synt ax: logout Description: When you enter this command via T elnet connection, you woul d logout the system and disconnect. If you connect the system th rough direct serial port with RS-232 cable, you would logout the syste m and be ba ck to the initial login prompt wh en you run this command. Argument: None. Possible value: None. Exam[...]

  • Page 157

    l 149 restor e user Synt ax: restor e user Description: T o restore the st artup configuration as us er defined configuration. If restoring def ault successfully , the CLI wo uld prompt if reboot immediately or not. If you press Y or y , the system would reboot i mmediately; others would back to the CLI system. After restoring user-defined co nfigu[...]

  • Page 158

    150 save user Synt ax: save user Description: T o save the current configuration as the user-defined configur ation. When you enter this command, the CLI would save your cu rrent configuration into the non-volatile FLASH as user-defined configuration. Argument: None. Possible value: None. Example: GSW-249 6# save user Saving user ... Save Successfu[...]

  • Page 159

    l 151 4-2-2. Local Commands of CLI  802.1X set max-request Synt ax : set max-request <port-range> <times> Description : The maximum number of times that the state machine will retransmit an EAP Request packet to the Supplica nt before it times out the authentication sessi on. Argument : <port range> : syntax 1,5-7 , available f[...]

  • Page 160

    152 set port-control Synt ax : set port-control <port-range> <authorized> Description : T o set up 802.1X status of each port. Argument : <port range> : syntax 1,5-7 , available fro m 1 to 24 <authorized> : Set up the st atus of each port 0:ForceUnauthorized 1:ForceAuthorized 2:Auto Possible value: <port range> : 1 to [...]

  • Page 161

    l 153 Synt ax : set reAuthMax <port-range> <max> Description : The number of reauthentication attempt s that are permitted before the port becomes Unauthorized. Argument : <port range> : syntax 1,5-7 , available fro m 1 to 24 <max> : max. value , range 1-10 Possible value: <port range> : 1 to 24 <max> : 1-10, def[...]

  • Page 162

    154 set state <ip > <port-number> <secret-key> Description : T o configure the settings related with 802.1X Radius Server . Argument : <ip> : the IP address of Radius Server <port-number> : the servic e port of Radi us Serve r(Authorization port) <secret-key> : set up the value of secret -key , and the length of [...]

  • Page 163

    l 155 T o display the mode of each port. Argument : None Possible value: None Example: GSW-249 6(802.1X)# sho w mode Port Mode ====== ===== ======= 1 Disable 2 Normal 3 Disable 4 Disable 5 Disable 6 Disable : : : show param eter Synt ax : show para meter Description : T o display the parameter settings of each port. Argument : None. Possible value:[...]

  • Page 164

    156 port 2) port control : Aut o reAu thMax : 2 txPe riod : 30 Quie t Period : 60 reAu thEnabled : ON reAu thPeriod : 360 0 max. Request : 2 supp Timeout : 30 serv erTimeout : 30 : : : show security Synt ax : show security Description : T o display the authenticati on status of each port. Argument : None. Possible value: None. Example: GSW-249 6(80[...]

  • Page 165

    l 157 add Synt ax: add <name> Description: T o create a new guest user . When you create a new guest user , you must type in password an d confirm p assword. Argument: <name> : new account na me Possible value: A string must be at least 5 character . Example: GSW-2496(acco unt)# add aaaaa Password: Confirm Passw ord: Save Successf ully [...]

  • Page 166

    158 modify Synt ax: modify <name> Description: T o change the username and p assword of an existing account. Argument: <name> : existing user account Possible value: None. Example: GSW-2496(acco unt)# modify aa aaa username/pass word: the lengt h is from 5 to 15. Current usern ame (aaaaa):bbb bb New password: Confirm passw ord: Username[...]

  • Page 167

    l 159  alarm <<email>> del mail-address Synt ax : del mail-address <#> Description : T o remove the configuration of E-mail address. Argument : <#>: email address numb er , range: 1 to 6 Possible value: <#>: 1 to 6 Example: GSW-2496(alar m-email)# del mail-address 2 del server-user Synt ax : del server-us e r Descri[...]

  • Page 168

    160 set server Synt ax : set server <ip > Description : T o set up the IP addre ss of the email server . Argument : <ip>:email server ip address or do main n ame Possible value: None. Example: GSW-2496(alar m-email)# set s erver 192.168.1 .6 set user Synt ax : set user <usernam e> Description : T o set up the account and pa sswo r[...]

  • Page 169

    l 161 <<event s>> del all Synt ax : del all <range> Description : T o disable email, sms and trap of even t s. Argument : <range>:del the ran ge of e vents, syntax 1,5-7 Possible value: <range>: 1~23 Example: GSW-2496(alar m-events)# del all 1-3 del email Synt ax : del email <range> Description : T o disable the [...]

  • Page 170

    162 del trap Synt ax : del trap <range> Description : T o disable the trap of the events. Argument : <range>:del the range of trap, synt ax 1,5-7 Possible value: <range>: 1~23 Example: GSW-2496(alar m-events)# del trap 1-3 set all Synt ax : set all <range> Description : T o enable email, sms and trap of event s. Argument : &[...]

  • Page 171

    l 163 set sms Synt ax : set sms <ran ge> Description : T o enable the sms of the event s. Argument : <range>:set the range of sms, synt ax 1,5-7 Possible value: <range>: 1~23 Example: GSW-2496(alar m-events)# set sms 1-3 set trap Synt ax : set trap <range> Description : T o enable the trap of the events. Argument : <range[...]

  • Page 172

    164 Example: GSW-2496(alar m-events)# show Events E mail SMS Trap ------------- --------------- ------------- 1 Cold Start v 2 Warm Start v 3 Link Down v 4 Link Up v 5 Authentica tion Failure v 6 User Login 7 User Logou t 8 STP Topolo gy Changed 9 STP Disabl ed 10 STP Enable d 11 LACP Disab led 12 LACP Enabl ed 13 LACP Membe r Added 14 LACP Port Fa[...]

  • Page 173

    l 165 show (alarm) Synt ax : show Description : The Show for alarm here is used to displa y the configuration of T rap, SMS or E-mail. Argument : None. Possible value: None. Example: GSW-2496(alar m)# show events GSW-2496(alar m)# show email GSW-2496(alar m)# show sms <<sms>> del phone-number Synt ax : del phone-number <#> Descrip[...]

  • Page 174

    166 set phone-number Synt ax : set phone-number <#> <p hone-number> Description : T o add sms phone numbe r . Argument : <#>: mobile phone number , range: 1 to 6 <phone-num ber>: phon e number Possible value: <#>: 1 to 6 Example: GSW-2496(alar m-sms)# set pho ne-number 1 096 8777777 set server Synt ax : set server <[...]

  • Page 175

    l 167 show Synt ax : show Description : T o display the configuration of SMS trap event. Argument : None. Possible value: None. Example: GSW-2496(alar m-sms)# show SMS Server : 192.168.1.7 Username : ABC Password : *********** ***** Mobile Phone 1: 0968777777 Mobile Phone 2: Mobile Phone 3: Mobile Phone 4: Mobile Phone 5: Mobile Phone 6:  autolo[...]

  • Page 176

    168  bandwid th disable egress-rate Synt ax : disable egress-rate <range > Description : T o cancel the egress-rate of the port. Argument : <range>:synt ax 1,5-7, available from 1 to 24 Possible value: <range>: 1 to 24 Example: GSW-249 6(b andwidth)# disable egress-rate 1-8 disable ingress-rate Synt ax : disable ingress-rate &l[...]

  • Page 177

    l 169 enable egress-rate Synt ax : enable egress-rate <range> <d at a_rate> Description : T o set up the egress-rate of the port. Argument : <range>:synt ax 1,5-7, available from 1 to 24 <data_rate>: 0-10 00 Possible value: <range>: 1 to 24 <data_rate>: 0-10 00 Example: GSW-249 6(b andwidth)# enable egre ss-rate [...]

  • Page 178

    170 Synt ax : show Description : T o display all current settings of the bandwi d th. Argument : None. Possible value: None. Example: GSW-249 6(b andwidth)# show Ingress Egress Port ================================================= ====================== All State All Rate Storm State Storm Rate All state All Rate ====== =========== ========== ====[...]

  • Page 179

    l 171  config-file export st art Synt ax : export start Description : T o run the export start function. Argument : None. Possible value: None. Example: GSW-249 6(config-file )# export start Export succ e ssful. export user -conf Synt ax : export user-conf Description : T o run the export user-conf function. Argument : None Possible value: None [...]

  • Page 180

    172 import user -conf Synt ax : import user-conf Description : T o run the import user-conf function. Argument : None Possible value: None Example: GSW-2496(config-file )# import user-conf Import successful. set export-path Synt ax : set export-path <filep ath> Description : T o set up the filepath and filename that will be expo rted. Argumen[...]

  • Page 181

    l 173 show Synt ax : show Description : T o display the config-file information. Argument : None. Possible value: None. Example: GSW-2496(config-file )# show TFTP Server IP Address: 192.168.3.1 1 1 Export Path and Filename: nmap/123.ts Import Path and Filename: user123.txt[...]

  • Page 182

    174  dhcp-boot set dhcp-boot Synt ax : set dhcp-boot <sec > Description : T o set up the delay time for DHCP Boot. Argument : <sec>:range syntax: 0, 1-3 0. The value “0” is to disable dhcp-boot delay Possible value: <sec>:0-30 Example: GSW-249 6(d hcp-boot)# set dhcp-boot 30 show Synt ax : show Description : T o display the[...]

  • Page 183

    l 175  diag diag Synt ax: diag Description: Diag is used to test whether UART , DR AM, Flash and EEPROM is normal or not. Argument: None. Possible value: None. Example: GSW-2496(diag )# diag EEPROM Test : OK UART Test : OK DRAM Test : OK Flash Test : OK loopback Synt ax: Loopback Description: For Internal/External Loopback T est. Argument: None.[...]

  • Page 184

    176  firmware set upgrade-path Synt ax : set upgrade-path <file p ath> Description : T o set up the image file that will be upgraded. Argument : <filepath>: upgrad e file p ath Possible value: <filepath>: upgrad e file p ath Example: GSW-249 6(firmwa re)# set upgrade-path gs2124c_GS W-2496_v2.03.img show Synt ax : show Descript[...]

  • Page 185

    l 177  gvrp disable Synt ax : disable Description : T o disable the gvrp function. Argument : None. Possible value: None. Example: GSW-249 6(gvrp)# disable enable Synt ax : enable Description : T o enable the gvrp function. Argument : None. Possible value: None. Example: GSW-249 6(g vrp)# enable group Synt ax : group <group numbe r> Descri[...]

  • Page 186

    178 GSW-2496(gvrp )# group 2 GSW-2496 (gvrp-group-2)# set applicant 1-6 non-partici pant GSW-2496(gvrp -group-2)# show GVRP group VI D: 2 Port Applican t Registr ar ---- -------- ------- ------- -- 1 Non-Part icipant Normal 2 Non-Part icipant Normal 3 Non-Part icipant Normal 4 Non-Part icipant Normal 5 Non-Part icipant Normal 6 Non-Part icipant Nor[...]

  • Page 187

    l 179 set applicant Synt ax : set applicant <range> <no rmal|non-particip ant> Description : T o set default applicant mode for each port. Argument : <range>: port range, synt ax 1,5-7, available from 1 to 24 <normal>: set applicant as norm al mode <non-particip ant>: set applicant as non-p arti cipant mode Possible va[...]

  • Page 188

    180 set restri ct ed Synt ax : set restricted <ra nge > <enable|disable> Description : T o set the restricted mode for each port. Argument : <range>: port range, synt ax 1,5-7, available from 1 to 24 <enable>: set restri cted e nabled <disable>: set restricted di sabled Possible value: <range>: 1 to 24 <enable[...]

  • Page 189

    l 181 set timer Synt ax : set timer <range> <join> <l eave> <leaveall> Description : T o set gvrp join time, leave time, and leaveall time for each port. Argument : <range> : port range, synt ax 1,5-7, available from 1 to 24 <join>: join timer , available from 20 to 100 <leave>: leave timer , available from[...]

  • Page 190

    182 show counter Synt ax : show counter <port> Description : T o display the counter number of the port. Argument : <port>: port number Possible value: <port>: available from 1 to 24 Example: GSW-2496(gvrp )# show counter 2 GVRP Counter port: 2 Counter Name Recei ved Transmitted ------------- ------- ----- --- ----------- Total GV[...]

  • Page 191

    l 183  hostname hostname Synt ax : hostname <name> Description : T o set up the hostname of the switch. Argument : <name>: hostname, max. 40 cha ra cters. Possible value: <name>: hostname, max. 40 cha ra cters. Example: GSW-2496# hostn ame Comp any Company#  igmp-snooping add allowed-group Synt ax : add allowed-group <ip-[...]

  • Page 192

    184 set mode Synt ax : set mode <st atus> Description : T o set up the mode of IGMP Snooping. Argument : <status>: 0:di sabl e, 1:active, 2:passive Possible value: <status>: 0,1or 2 Example: GSW-249 6(ig mp-snooping)# set mode 2 show igmp-snooping Synt ax : show igmp-snooping Description : T o display IGMP snoo ping mode and allow[...]

  • Page 193

    l 185  IP disable dhcp Synt ax : disable dhcp Description : T o disable the DHCP funct ion of the system. Argument : None. Possible value: None. Example: GSW-249 6(ip )# disable dhcp enable dhcp Synt ax : enable dhcp <man ual|auto > Description : T o enable the system DHCP function and set DNS server via manual or auto mode. Argument : <[...]

  • Page 194

    186 set ip Synt ax : set ip <ip> <mask> <gateway> Description : T o set the system IP address, subn et mask and gateway . Argument : <ip> : ip address <mask> : s ubnet mask <gateway> : default gateway Possible value: <ip> : 192.168.1.2 or others <mask> : 255.255.255.0 or others <gateway> : 192.1[...]

  • Page 195

    l 187  log clear Synt ax: clear Description: T o clear the log data. Argument: None. Possible value: None. Example: GSW-249 6(log)# clear disable auto-upload Synt ax: disable auto-upload Description: T o disable the auto-upload function. Argument: None. Possible value: None. Example: GSW-249 6(lo g)# disable auto-upload enable auto-upload Synt a[...]

  • Page 196

    188 show Synt ax: show Description: T o show a list of trap log events. When any of log event s happens, it will be recorded and using sho w command in log function to que ry . Up to 120 log records are supported. Argument: None. Possible value: None. Example: GSW-2496(log) # show Tftp Server : 0.0.0.0 Auto Upload : Disable 1) Wed Apr 1 3 12:13:27 [...]

  • Page 197

    l 189  mac-t able <<alias>> del Synt ax : del <mac> Description : T o delete the mac alias entry . Argument : <mac> : mac address, format: 00-02-03 -04-05-06 Possible value: <mac> : mac address Example: GSW-249 6(m ac-table-alias)# del 00-44-33-44-55-44 set Synt ax : set <mac> <a lias> Description : T o [...]

  • Page 198

    190 search Synt ax : search <port > <mac> <vid> Description : T o look for the relative mac information in mac t able. Argument : <port> : set up the range of the ports to search for , syntax 1,5-7, available form 1 to 24 <mac> : mac address, format: 01-02-03- 04-05-06, '?' can be used <vid> : vlan id, [...]

  • Page 199

    l 191 <<maint ain>> set aging Synt ax : set aging <#> Description : T o set up the age out time of dynamic learning mac. Argument : <#>: age-timer in seco nd s, 0, 10 to 65535. The value “0” means to disabl e aging Possible value: <#>: 0, 10 to 65535. Example: GSW-249 6(m ac-table-maint ain)# set aging 300 set flus[...]

  • Page 200

    192 <<st atic-mac >> add Synt ax : add <mac> <port> <vid> [alias] Description : T o add the static ma c entry . Argument : <mac> : mac address, format: 00-02-03 -04-05-06 <port> : 0-24. The value “0 ” means this entry is filtering entry <vid> : vlan id. 0, 1-4094. VID must be zero if vlan mode is [...]

  • Page 201

    l 193 show filter Synt ax : show filter Description : T o display the static filter t able. Argument : None Possible value: None Example: GSW-249 6(mac-t able-stati c-mac)# sho w filter S tatic Filtering Etnry: (T otal 1 item(s)) 1) mac: 00-33-03-04-0 5-06, vid: -, alias: ccc show forw ard Synt ax : show forw ard Description : T o display the stati[...]

  • Page 202

    194  management add Synt ax: Usage: set [<name> <value>] [<vid> <value>] [<ip> <value>] [<port> <val ue>] [< type> <value>] <action> < value> Synopsis: set name Mary v id 20 ip 192.168.1.1-192.168.1.90 port 2-5,8 typ e h,s action a Synopsis: set name Mary v id 20 ip 192.168.[...]

  • Page 203

    l 195 delete Synt ax: delete # Description: T o delete a specific record or ran ge. Argument: <#>: a specific or range management security entry(s) Possible value: None. Example: GSW-2496(mana gement)# show #: 1 Name : Tom Vla nID : 2 IP : 192.168.1 .30-192.168.1.8 0 Type : SNMP Act ion : Deny Port : 1,2 GSW-2496(mana gement)# delete 1 GSW-24[...]

  • Page 204

    196 edit [#]: the specific management policy entry . Available range: 1 to 65536. Synt ax: Usage: set [<name> <value>] [<vid> <val ue>] [<ip> <value>] [<port > <value>] [< type> <value>] <action> < value> Synopsis: set name Mary v id 20 ip 192.168.1.1-192.168.1.90 port 2-5,8 ty[...]

  • Page 205

    l 197 show Synt ax: show Description: T o show the specific management policy record. Argument: None. Possible value: None. Example: GSW-2496(mana gement)# show #: 1 Name : Tom Vla nID : 2 IP : 192.168.1 .30-192.168.1.8 0 Type : SNMP Act ion : Deny Port : 1,2[...]

  • Page 206

    198  max-pkt-len set len Synt ax : set len <range> <length > Description : To set up the maximum length of the packet that each port of the switch can accept. Argument : <range>: port range, synt ax 1,5-7, available from 1 to 24 <length (bytes)>: maximum pa cket length Possible value: <range> : 1 to 24 <length (b[...]

  • Page 207

    l 199  mirror set mirror -mode Synt ax : set mirror-mode <rx|disable> Description : T o set up the mode of mirror (rx mode or disable). Argument : <rx | disable>: rx : enable the mode of mirror(Only mi rror the packet s that is received) disable: end the function of mirror Possible value: <rx | disable>: rx or disable Example: [...]

  • Page 208

    200 show Synt ax : show Description : T o display the setting status of Mirror fu nction. Argument : None. Possible value: None. Example: GSW-249 6(m irror)# show Mirror Mode : rx Monitoring Port : 2 Monitored Port : 3 4 5 7 10[...]

  • Page 209

    l 201  port clear counter Synt ax : clear counter Description : T o clear all ports’ counter (include simple and det ail port counter) information. Argument : None. Possible value: None. Example: GSW-249 6 (port)# clear counter disable flow-control Synt ax : disable flow-control <range> Description : T o disable the flow control function[...]

  • Page 210

    202 enable flow-control Synt ax : enable flow-control <range> Description : T o enable the flow control function of the port. Argument : <range>: synt ax 1,5-7, available from 1 to 24 Possible value: <range>: 1 ~ 24 Example: GSW-249 6 (p ort)# enable flow-control 3-8 enable state Synt ax : enable state <range> Description : [...]

  • Page 211

    l 203 show conf Synt ax : show conf Description : T o display the each port’ s configuration about state, speed-duplex and flow control. Argument : None. Possible value: None. Example: GSW-249 6 (p ort)# show conf show detail-counter Synt ax : show det ail-counter <#> Description : T o display the detailed cou nting number of each port’s [...]

  • Page 212

    204 Port 9 SFP in formation ------------- --------------- --------------- --------------- ----------- Connector Typ e : SFP - LC Fiber Type : Mult i-mode (MM) Tx Central Wa velength : 850 Baud Rate : 1G Vendor OUI : 00:1 1:6b Vendor Name : Leve lOne Vendor PN : GVT- 0300 Vendor Rev : 0000 Vendor SN : 5425 010728 Date Code : 0704 30 Temperature : no[...]

  • Page 213

    l 205  qos set advance-l ayer4 Synt ax : set advance-layer4 <po rt-range > <#> <tcp/udp port> <defa ult> <m atch> Description : T o set class of port s on advanced mode of Layer 4 qos. Argument : <port-range>: port range, synt ax 1,5-7, available from 1 to 24 <#>: special UDP/TCP port selection, range: 1[...]

  • Page 214

    206 set dif f serv Synt ax : set dif f serv <ds-range> < cl ass> Description : T o set class of ports on IP Dif fServe qos. Argument : <ds-range>: dscp field, synt ax 1,5-7, available from 0 to 63 <class>: class of service setting. 1: high, 0: low Possible value: <ds-range>: 0 to 63 <class>: 1or 0 Example: GSW-24[...]

  • Page 215

    l 207 set pri-tag Synt ax : set pri_tag <port-rang e> <t ag-range> <class> Description : T o set class of port s on vlan tag-based qos. Argument : <port-range>: port range, synt ax 1,5-7, available from 1 to 24 <tag-range>: tag priority level, synt ax: 1,5-7, available from 0 to 7 <class>: class of service settin[...]

  • Page 216

    208 set tos Synt ax : set tos <port-range> <tos-range> <class> Description : T o set class of ports on IP TOS qos. Argument : <port-range>: port range, synt ax: 1,5-7, available from 1 to 24 <tos-range>: tos preceden ce field, sy nt ax 1,5-7, available from 0 to 7 <class>: class of service setting. 1: high, 0: lo[...]

  • Page 217

    l 209  reboot reboot Synt ax: reboot Description: T o reboot the system. Argument: None. Possible value: None. Example: GSW-249 6# reboot  snmp disable Synt ax : disable set-ability disable snmp Description : The Disable here is used for the de-a ctivation of snmp or set-community . Argument : None. Possible value: None. Example: GSW-2496(snm[...]

  • Page 218

    210 set Synt ax : set get-community <comm unity> set set-community <comm unity> set trap <#> <ip> [port] [community] Description : The Set here is used for the setup of get-community , set-community , trap host ip, host port and trap-communi ty . Argument : <#>: trap number <ip>: ip address or domain name <por[...]

  • Page 219

    l 21 1  stp MCheck Synt ax : MCheck <range> Description : T o force the port to transmit RST BPDUs. Argument : <range>: synt ax 1,5-7, available from 1 to 24 Possible value: <range>: 1 to 24 Example: GSW-249 6(st p)# Mcheck 1-8 disable Synt ax : disable Description : T o disable the STP functio n. Argument : None. Possible valu[...]

  • Page 220

    212 set config Synt ax : set config <Bridge Priority > <Hello T ime> <Max. Age> <Forward Delay> Description : T o set up the parameters of STP . Argument : <Bridge Priority>:priority must be a mult i ple of 4096, available from 0 to 61440. <Hello T ime>: available from 1 to 10. <Max. Age>: available from 6 [...]

  • Page 221

    l 213 set version Synt ax : set version <stp|rstp> Description : T o set up the version of STP . Argument : <stp|rstp>:stp / rs tp Possible value: <stp|rstp>:stp / rs tp Example: GSW-249 6(st p)# set version rstp show config Synt ax : show config Description : T o display the configuration of STP . Argument : None. Possible value:[...]

  • Page 222

    214 show port Synt ax : show port Description : T o display the port information of STP . Argument : None. Possible value: None. Example: GSW-2496# stp GSW-2496(stp) # show port Port Port Sta tus Path Cost P riority Admin E dge Port Admin Point To Point ==== ======== === ========= = ======= ======= ======== ====== ============== 1 DISCARDI NG 20000[...]

  • Page 223

    l 215 show st atus Synt ax : show st atus Description : T o display the status of STP . Argument : None. Possible value: None. Example: GSW-249 6(st p)# show status STP Status : STP State : Enab led Bridge ID : 00:1 1:6B:D8:09:1D Bridge Priori ty : 6144 0 Designated Ro ot : 00:1 1:6B:D8:09:1D Designated Pr iority : 6144 0 Root Port : 0 Root Path Co[...]

  • Page 224

    216  system set cont a ct Synt ax : set conta ct <cont act string> Description : T o set the contact de scription of the switch. Argument : <contact>: stri ng length up to 40 characters. Possible value: <contact>: A, b, c, d, ... ,z and 1, 2, 3, …. etc. Example: GSW-2496(system)# set cont a ct T aipei set device-na me Synt ax[...]

  • Page 225

    l 217 show Synt ax : show Description : T o display the basic information of the switch. Argument : None. Possible value: None. Example: GSW-2496(syst em)# show Model Name : GSW-2496 System Descri ption : L2 Managed S witch Location : Contact : Device Name : GSW-2496 System Up Tim e : 0 Days 0 Hou rs 39 Mins 42 S ecs Current Time : Fri Jan 27 1 2:5[...]

  • Page 226

    218  tft p set server Synt ax : set server <ip > Description : T o set up the IP addre ss of tftp serve r . Argument : <ip>: the IP addre s s of tftp server Possible value: <ip>: tf tp server ip Example: GSW-249 6(t ftp)# set server 192.168.3. 1 1 1 show Synt ax : show Description : T o display the information of t f tp server [...]

  • Page 227

    l 219  time set daylight sa ving Synt ax: set daylightsa ving <hr> <M M/DD/HH> <mm/dd/hh> Description: T o set up the daylight saving. Argument: hr : daylig ht saving hour, range: -5 to + 5 MM : daylig ht saving start Month (01-12) DD : daylig ht saving start Day (01-31) HH : daylig ht saving start Hour (00-23) mm : daylig ht s[...]

  • Page 228

    220 Synt ax: set ntp <ip> <timezone> Description: T o set up the current time via NTP server . Argument: <ip>: ntp server ip address or dom ain name <timezone>: time zone (GMT), range: -12 to +13 Possible value: <timezone>: -12,-1 1…,0,1…,13 Example: GSW-249 6(ti me)# set ntp clock.via.net 8 Synchronizing...(1) Syn[...]

  • Page 229

    l 221  trunk del trunk Synt ax : del trunk <port-range> Description : T o delete the trunking port. Argument : <port-range>: port range, synt ax 1,5-7, available from 1 to 24 Possible value: <port-range>: 1 to 24 Example: GSW-249 6(trunk)# del trun k 1 set priority Synt ax : set priority <range> Description : T o set up t[...]

  • Page 230

    222 show aggtr -view Synt ax : show aggtr-view Description : T o display the aggregator list. Argument : None. Possible value: None. Example: GSW-249 6(trunk)# sho w aggtr-view Aggregator 1) Method: None Member Ports: 1 Ready Ports:1 Aggregator 2) Method: LACP Member Ports: 2 Ready Ports: : : : show lacp-detail Synt ax : show lacp -detail <aggtr[...]

  • Page 231

    l 223 Synt ax : show lacp-priorit y Description : T o display the value of LACP Priority . Argument : None. Possible value: None. Example: GSW-249 6(trunk)# sho w lacp-priority LACP Syste m Priority : 32768 show st atus Synt ax : show st atus Description : T o display the aggregator st atus an d the settings of each port. Argument : None. Possible [...]

  • Page 232

    224  vlan del port-group Synt ax: del port-group <name> Description: T o delete the port-based vlan group. Argument: <name>: which vlan group you want to delete. Possible value: <name>: port-vlan nam e Example: GSW-2496(vl an)# del port-group VLAN-2 del tag-group Synt ax: del tag-group <vid> Description: T o delete the ta[...]

  • Page 233

    l 225 disable sym-vlan Synt ax: disable sym-vlan <range> Description: T o drop frames from the non-member p ort. Argument: <range>: which port(s) you want to set, synt ax 1,5-7, available from 1 to 24 Possible value: <range>: 1 to 24 Example: GSW-249 6(vl an)# disable sym-vlan 5-10 enable drop-unt ag Synt ax: enable drop-unt ag &l[...]

  • Page 234

    226 set mode Synt ax: set mode <disable|port|t ag|metro|double-tag> [up-li nk] Description: T o switch VLAN mode, including disable, port-ba sed, tag-based, metro and double- tag modes. Argument: <disable>: vlan disable <tag>: set t ag-based vlan <port>: set port-based vlan <metro>: set metro mode vlan <double-tag &[...]

  • Page 235

    l 227 set port-role Synt ax: set port-role <range> <access|trun k|hybrid > [vid] Description: T o set egress rule: configure the port roles. Argument: <range> :which po rt(s) you want to set, syntax 1,5-7, available from 1 to 24 <access>: Do not t ag fram es <trunk>: T ag all frames <hybrid>: T ag all frames exce[...]

  • Page 236

    228 set tag-group Synt ax: set tag-group <vid> <name > <range> <#> Description: T o add or edit the t ag-b ased vlan group. Argument: <vid>: vlan ID, range from 1 to 4094 <name>: ta g-vlan name <range>: vlan group m emb ers, syntax 1,5-7, available from 1 to 24 <#>: sym/asym vlan setting. 1: symme tri[...]

  • Page 237

    l 229 show pvid Synt ax: show pvid Description: T o display pvid, ingress/egress rule. Argument: None. Possible value: None. Example: GSW-2496(vlan )# show pvid Port PVID Rule1 Ru le2 Port Rul e Untag Vid ------ ------ --------- ---- ----- --------- -- ----------- 1 1 Disable Dis able Access - 2 1 Disable Dis able Access - 3 5 Disable Dis able Acce[...]

  • Page 238

    230  vs disable Synt ax: disable Description: T o disable the virtual sta ck. Argument: None. Possible value: None. Example: GSW-2496(vs)# disable enable Synt ax: enable Description: T o enable the virtual sta ck. Argument: None. Possible value: None. Example: GSW-2496(vs)# enable set gid Synt ax: set gid <gid> Description: T o set the gro[...]

  • Page 239

    l 231 set role Synt ax: set role <master|slave> Description: T o set role. Argument: <master|slave>: master: act as master , slave : act as slave Possible value: <master|slave>: ma ster o r slave Example: GSW-2496(vs)# set role maste r show Synt ax: show Description: T o display the configuration of the virtual st a ck. Argument: [...]

  • Page 240

    232 5. Maintenance 5-1. Resolving No Link Condition The possible cau se s for a no link LE D status are as follows: z The attached device i s not powered on z The cable may not be the correct type or is faulty z The installed building p rem ise cable is faulty z The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot[...]

  • Page 241

    l 233 Appendix A Technical Specifications Features • 8 (10/100/1000Mbp s) Gigabit Ethernet (TP) switching port s are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 16 Gigabit SFP fiber ports. • Non-blocking store-and-forward sh ared-memory Web-Smart switched. • Support s auto-negotiation for configuring spe ed, duplex mode. • Sup[...]

  • Page 242

    234 Hardware Specifications  St andard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x  Network Interface: Configuration Mode Connector Port 10/100/1000Mbp s Giga bit TP NW ay TP (RJ-45) 1 - 8 1000Base-SX Gigabit Fiber 1000 FDX *SFP 9 - 24 1000Base-LX Gigabit Fiber 1000 FDX *SFP 9 - 24 *Optional SFP module sup port s LC transceiver ?[...]

  • Page 243

    l 235  Diagnostic LED: System LED : Power , CPU Per Port LED: 10/100/1000M TP Port 1 to 8 : LINK/ACT , SPEED 1000M SFP Fiber Port 9 to 24 : SFP(LINK/ACT)  Power Requirement : AC Line V oltage : 100 ∼ 240 V Frequency : 50 ∼ 60 Hz Consumption : 30W  Ambient T emperature : 0 ° to 40 ° C  Humidity : 5% to 90%  Dimensions : 44(H) ×[...]

  • Page 244

    236 Management Software Specifications System Configuration Auto-negotiation support on 10/100/1000 Ba se- TX ports, Web bro wser or console interface can set transmission speed (10/100/1000Mbps) and operation mode (Full/Half dup le x) on each p ort, enable/disable an y port, set VLAN group, set T runk Connecti on. Management Agent SNMP support; MI[...]

  • Page 245

    l 237 Appendix B Null Modem Cable Specifications The DB-9 cable is used for con ne cting a terminal o r terminal emulator to the Managed Switch’ s RS-232 port to access the command-lin e interface. The table bel ow shows the pin assignments for the DB-9 ca ble. Function Mnemonic Pin Carrier CD 1 Receive Dat a RXD 2 T ransmit Data TXD 3 Data T erm[...]

  • Page 246

    [...]

  • Page 247

    © 2007, Digit al Data Communications Co., Lt d.. All rights rese rve d. All brand and product names are tradem arks o r regi stered trademarks of their respective compani es.[...]