Planet Technology WGD-800 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Planet Technology WGD-800, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Planet Technology WGD-800 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Planet Technology WGD-800. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Planet Technology WGD-800 should contain:
- informations concerning technical data of Planet Technology WGD-800
- name of the manufacturer and a year of construction of the Planet Technology WGD-800 item
- rules of operation, control and maintenance of the Planet Technology WGD-800 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Planet Technology WGD-800 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Planet Technology WGD-800, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Planet Technology service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Planet Technology WGD-800.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Planet Technology WGD-800 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    User's Manual WGD-800 8-Port 10/100Mbps Managed Ethernet Switch[...]

  • Page 2

    T rademarks Copyright © PLANET T echnology Corp. 2005. Contents subject to which revision without prior notice. PLANET is a registered trademark of PLANET T echnology Corp. All other trademarks belong to their respective own ers. Disclaimer PLANET T echnology does not warrant that the hardware will work properly in all e nvironments and applicatio[...]

  • Page 3

    T able of Contents 1. INTRODUCTION ................................................................................................................................. 6 1.1 P ACKET C ONTENTS ......................................................................................................................... 6 1.2 H OW TO U SE T HIS M ANUAL ......[...]

  • Page 4

    4.4.8 Load Default ........................................................................................................................ 30 4.4.9 Reboot ............................................................................................................................... .. 30 4.5 P ORT M ANAGEMENT ......................................[...]

  • Page 5

    6.2 100BASE-TX/10BASE-T P IN A SSIGNMENTS ................................................................................ 86 7. APPENDIX-B ............................................................................................................................... ..... 87   802.1Q VLAN M UL TI -U NT AGGED VLAN SETTING SAMPLE 1 ...............[...]

  • Page 6

    1. INTRODUCTION 1.1 Packet Content s Check the contents of your package for following parts: ▫ Ethernet Switch x1 ▫ CD-ROM user's manual x1 ▫ Quick installation guide x1 ▫ 19" rack mounting kit x1 ▫ Power cord x1 ▫ Rubber feet x 4 If any of these are missing or damaged, please contact y our dealer immedi ately , if possible, r[...]

  • Page 7

    ▫ Console/Web/SNMP management ▫ Configuration backup and rec overy ▫ Per port Ingress/Egress bandwidth restriction ▫ 802.1d S panning tree, 802.1w Rapid Sp anning Tree ▫ Configurable spanning tree aging time, STP port configuration ▫ 4 trunk groups, up to 4 ports per trunk ▫ Port-based/802.1Q VLAN with 4K VLAN ID ▫ MAC Binding/F ilt[...]

  • Page 8

    Management Interface Console/Web/T elnet/SNMP SNMP V ersion v1, v2c Support MIB Support SNMP MIB Ⅱ (RFC 1213), Bridge MIB (RFC 1493), RMON group 1,2,3,9 Enterprise private MIB St andard Comp liance Network S tandard IEEE802.3 10Base-T IEEE802.3u 100Base-TX IEEE802.3x Flow Control and Back pressure IEEE802.3ad Port trunk with LACP IEEE802.1d S pan[...]

  • Page 9

    2. INSTALLATION This section describes the functionalit ies of the Switch's components and guides how to install it on the desktop or shelf. Basic knowledge of networking is ass umed. Please read this chapter completel y before continuing. 2.1 Product Description 2.1.1 Product Overview With 8-Port 10/100Mbps TP , the PLANET WSD-800 boasts a hi[...]

  • Page 10

    2.1.4 Switch Rear Panel Figure 2-2 shows the rear panel of the switch Figure 2-2 WSD-800 rear panel. Power Notice: 1. The device is a po wer-required devic e, it means, it will not work till it is powered. If your networks should active all the time, please consider us ing UPS (Uninter rupted Po wer Supply) for your device. It will prevent you from[...]

  • Page 11

    When the switch receives po wer , the Po wer LED should remain solid Green. 2.2.2 Rack Mounting T o install the switch in a 19-inch standard rack, please fol lows the instructions described bel ow . Step1: Place the switch on a hard flat surface, with the front panel positioned towards the front side. Step2: Attach the rack-mount bracket to each si[...]

  • Page 12

    3. CONSOLE MANAGEMENT 3.1 Connecting to the Switch The console port is a female DB-9 connecto r that enables a connection to a PC or terminal for monitorin g and configuring the Switch. Use the supplied RS-232 cab le with a male DB-9 connector to connect a terminal or PC to the Console port. The Console configurat ion (out of band) allo ws you to s[...]

  • Page 13

    “enable” for further configuration. The system needs pa ssword for further configuration. After the “enable ” command, the system asks fo r passwo rd, please enter “admin” for the default password. As shows in the following screen: Console login screen 3.3 Console Management Entering a question mark "?" at the prompt displays [...]

  • Page 14

    3.4 T elnet login The switch also supports telnet for remote management. The switch asks for user name and password for remote login when using teln et, please use “admin” for username and “admin” for password. 3.5 Commands There are two levels for console commands. The first level p rovides commands to show system informations an d current[...]

  • Page 15

    show port state Show port infomation show port storm-limit Show port storm limit mode and rate show qos map cos-queue-map Show qos map cos-queue-map show qos map dot1p-cos-map Show qos map cos-queue-map show qos map mac-cos-map Show qos map mac-cos-map show qos map port-cos-map Show each port's cos show qos map vlan-cos-map Show qos map vlan-c[...]

  • Page 16

    clear mirror monitored-port ingress Clear ingress monitored port for mirror clear multicast router Clear router port clear port counters Clear port statistics counter clear port rate-shaping Clear rat e-shaping of all ports clear port spantree portcost Restore sp anning tree port cost to default value clear port spantree portpri Restore spanning tr[...]

  • Page 17

    copy config flash Copy system configuration parameters to flas h 3.5.2.3 Disable command Disable command is to exit the privileg ed mode and ba ck to the first level of command line interface. Command Description Disable Disable privileged mod e 3.5.2.4 Reboot command Reboot command is to reboot the s witch, please bew are to check if the configura[...]

  • Page 18

    set igmp-snooping group number Set number of goups that a port can join in set igmp-snooping group poli cy Set igmp-snoo ping group polic y set igmp-snooping immediate-leav e Disable & Enable igmp snooping immedi ate-leave set igmp-snoop ing policy deny Set igmp snoop ing policy deny set ip http server disable Disable http server set ip http se[...]

  • Page 19

    set qos map cos-queue-map Set the queue number of each cos set qos map dot1p-cos-map Set the cos value of each dot1p pri ority set qos map mac-cos-map Set MAC based qos set qos map port-cos-map Set port's cos set qos map vlan-cos-map Set vlan based qos set qos queue egress-polic y Set the egress policy set radius key Set share key for radius s[...]

  • Page 20

    set snmp trap Set snmp trap receive host set spantree disable Disable span ning tree 3.5.2.6 Show command Show command is to display the current parameter of the switch functions. The follow table list s the show commands and the equivalent usages. Command Description s h o w c h a n n e l S h o w c h a n n e l i n f o r m a t i o n show console-in[...]

  • Page 21

    show security mac-learning Sh o w port security status show security static-MAC Show static mac table information show snmp Show snmp information show snmp rmon Show snmp rmon state show spantree Show spanning tree information show synt ax Show ba sic help infomation show system Show system information show trunk Show trunk information show version[...]

  • Page 22

    4. WEB-BASED MANAGEMENT This section introduces the configur ation and functions of the Web-Based manageme nt. 4.1 About We b-based Management The switch offers management features that allow users to manage the s w itch from anywhere on the network through a standard browser such as Microsoft Internet Explorer . The Web-Based Management supports I[...]

  • Page 23

    WSD-800 Web Management Interface 4.4 System 4.4.1 IP Configuration The switch can be managed by the Web/T elnet/SNMP in terf aces. Administrators can access the management interface via the IP address of the switch. T he default IP address of the s witch is 192.168.0.100. Y ou can change the IP address to be in the same IP segment as your LAN netwo[...]

  • Page 24

    1. The Switch’s factory-default IP address is 19 2.168.0.100 with Submask 25 5.255.255.0 and a default gateway of 192.168.0.254 2. The changed IP address take effect immediately af ter click on the OK button, you n eed to use the new IP address to access the W eb interface. 3. The changed IP address remains the origina l after r eboot the switch [...]

  • Page 25

    to one of its communities. SNMP default communities are: 。 Wri te = private 。 Read = public 4.2.2.2 SNMP Configuration T o configure S NMP management, click on System/SNMP menu button, and the web main page changes to the SNMP Management function, as shows in the following: The followings are the description of the sub- table. 1. SNMP Agent S t[...]

  • Page 26

    。 Cont act: The contact person of the switch which would show in the SNMP software. Fill the fileds and click on the “OK” button to save. 3. Community Configuration Use this table to configure the SNMP community strings and define the policy of the rela tive string. The communit y string acts like a password to permit access to the agent on t[...]

  • Page 27

    A trap manager is a management station (SNMP application) that receives traps (the system alerts generated by the switch). If no trap manager is defined, no traps are issued. Create a trap manager by entering the IP address of the station and a community string. 。 Enter Network management stations IP address: 192.168.0.53 (for example) 。 T rap [...]

  • Page 28

    4.4.4 CONSOLE This function shows the connection parameters fo r the Console Managem ent Interface. Click on the System/CONSOLE menu button, and the following table sh ows in the main page of the web. 4.4.5 System Upgrade This function allows performing firmware update from the web interface. Click on the System/System Upgrad e menu button, and the[...]

  • Page 29

    CAUTION: Do not power off the sw itch until the update progress is complete. 4.4.6 Saving Parameters It takes effect i mmediatel y when you change the parame ters of the management f unction when the switch is running. But the parameters would not be saved after reboot the swith. T o keep the changed parameters, Click on the System/Saving Parameter[...]

  • Page 30

    4.4.8 Load Default This function is to reset the configuration of switch to the factory default. Click on the System/Load Default menu button, and the following table shows in the web main page. CAUTION: This operation will result in all the parameters losing. 4.4.9 Reboot This function is to reboot the system. 4.5 Port Management 4.5.1 Port Config[...]

  • Page 31

    4.5.2 Port S tatistics The Port S tatistics page provides a view of t he current status of every port on the Switch. Pressing the “Reset” button will reset all port counters to zero. 4.5.3 Port Band Restrict The function provides the In-B and and Out-Band connec tion speed restriction on the ports. The Band of the connection speed rangs from 64[...]

  • Page 32

    NOTICE: Due to the Chipset limition, set the band rat e large then 50 0Kbps at In-Band Restrict field. If this value is less than 500Kbps and the packet will drop on that time. And please also be remi ned, enable flow control at specific port is requir ed. 4.6 Redundancy 4.6.1 S panning T ree 1. Sp anning T ree Protocol The IEEE 802.1D S panning T [...]

  • Page 33

    。 Creates a single spanning tree from any comb ination of switching or bri dging elements. 。 Creates multiple spanning trees – from any combination of ports contained within a single switch, in user specified groups. 。 Automatically reconfigures the spanning tree to com pens ate for the failure, addition, or removal of an y element in the t[...]

  • Page 34

    loops. Ports must w ait for new net wor k topology information to prop agate throughout t he net work before starting to forward packets. They must also wait for the packet lifetim e to expire for BPDU packets that were forwarded based on the old topology . The forward del ay timer is used to allow the net work topology to stabilize after a topolog[...]

  • Page 35

    power up. If properly configured, each port stabilizes to t he forwarding or blocking state. No p ackets (except BPDUs) are forwarded from, or received by , ST P enabled port s until the for warding state is enabled for that port. 2. STP Parameters STP Operation Lev els The Switch allows for two levels of oper ation: the switch level and the port l[...]

  • Page 36

    Port Priority A relative priorit y for each port –lower numbers give a higher pr iority and a greater chance of a give n port being elected as the root port 32768 Port Cost A value used by STP to evaluate paths – STP calculates path cost s and selects the path with the minimum cost as the active pat h 19-100Mbps Fast Ethernet ports 4-1000Mbps G[...]

  • Page 37

    Max. Age _ 2 x (Hello T ime + 1 second) Port Priority – A Port Priority can be from 0 to 255. The lowe r the number , the greater the probability the port will be chosen as the Root Port. Port Cost – A Port Cost can be set from 0 to 65535. The l ower the numb er , the greater the proba bility the port will be chosen to forward packets. 3. Illus[...]

  • Page 38

    Root Bridge Port 3 Port 1 Port 2 A Designated Bridge Port 1 Port 2 Port 3 C Port 1 Port 2 Port 3 B LAN 1 LAN 2 LAN 3 Designated Port Root Port Root Port Designated Port Blocked After Appl ying the ST A Rules The switch with the lowest Bridge ID (switch C) was elec ted the root bridge, and the ports were selected to give a high port cost between swi[...]

  • Page 39

    2. Bridge Information The informations of the STP Root show in the Bridge Information table. 3. STP Port Con figura tion On the STP port configuration, the settings are implemented on a. per use r-defined Group of ports. The following fields can be set for ST P port configuration: Edge Port: Defines if this port connected directly to a single wor k[...]

  • Page 40

    to connect to other bridges. Under RST P, all ports operat ing in full-duplex mode are cons idered to be P2P ports, unless manually overrid den through configuration. The link type attached to this port could be sel ected as following: 。 A uto - The switch automaticall y determines if the interface is attached to a point-to-point link or to share[...]

  • Page 41

    It allows a maximum of four ports to be aggregated at the sa me time and up to 4 gro ups. If the group is defined as a LACP st atic link aggr egationing group, then any ex tra ports selected are placed in a standby mode for redundancy if one of the othe r ports fa ils. If the group is defined as a loca l static link aggregationing gr oup, then the [...]

  • Page 42

    special consideration. The Switch allows you to further tailor ho w priority tagged data p ackets are handled on your net work. Using queues to manage priorit y tagged data allows you to specify its relative priority to suit the needs of your net work. There may be circumstances wher e it would be advantageous to gro up two or more differentl y tag[...]

  • Page 43

    DEF AUL T_ VLAN port member list. The DEF AUL T _VLAN has a VID = 1. Port-based VLAN Port-based VLAN limit traffic that flows into and out of switch ports. Thus, all devices con nected to a port are members of the VLAN(s) the port belongs to, whether there is a single computer directly connected to a switch, or an entire department. On port-based V[...]

  • Page 44

    priority are used by 802.1p. The VID is the VLAN ident ifier and is us ed by the 802.1Q standard. Becaus e the VID is 12 bits long, 4094 unique VLAN can be identified. The tag is inserted into the packet header making the ent ire packet longer by 4 octets. All of the informa tion originally contained in the packet is retained. 802.1Q T ag User Prio[...]

  • Page 45

    T ag-a ware switches must keep a table to relate PVID wi thin the switch to VID on the network. The switch will compare the VID of a p acket to be transmitted to the VID of the port that is to transmit the packet. If the two VID are different the switch will drop the packet. Because of the existence of th e PVID for untagged packet s and the VID fo[...]

  • Page 46

    3. The Port-ba se VLAN Confirutation table then pops up, enter the VLAN group ID, VLAN name and select the member ports for the VLAN. 4. Click the “OK” button to add the VLAN. 5. Select the ports in the Port List field and click on the Add button to ad d the member ports to the VLAN. The selected VLAN member then shows in the VLAN Member field.[...]

  • Page 47

    802.1Q VLAN Configuration There are up to 256 configur able VLAN groups. By default when 802.1Q is enabled, al l ports on the switch belon g to default VLAN (VID 1). The default VLAN cannot be deleted. Underst and nomenclature of the Switch T agging and Unt agging Every port on an 802.1Q compliant s witch ca n be configured as tagging or untagging.[...]

  • Page 48

    。 Port Mode VLAN Membership Frame Leave Access Belongs to a single untagged VLAN Untagged ( T ag=PVID be removed) Alw a ys U n ta g Allowed to belongs to multiple untagged VLANs at the same time Untagged (T ag= PVID be removed) T runk Allow ed to belongs to multiple T agged VLANs at the same time T agged (T ag= PVID or Original VID be remained) P[...]

  • Page 49

    3. Choose the Link T ype in the drop drop down men u: Acces s , Alw a y s U n ta g or T runk . Note that if the Acces s type is chosen, it will strip t he 802.1Q tag from all packets that out of this port. On the other hand, if the Tr u n k type is chosen, it will put the VID number , priority and other VLAN information into the h eader of all pack[...]

  • Page 50

    5.3 Select on the VLAN chich you want to tag with in the VLA N T able field and click on the “ Add” button to add. This will add the VLAN in to the VLAN with The T runk Port field. 5.4 Click on the “close” button to clos e the VLAN port configuration ta ble of port #2, and back to the 802.1Q main pag e. 5.5 Click on the “Show VLAN Members[...]

  • Page 51

    from the network, and then reconnected at some time later . If the Net work station is connected with one port want to control the switch, the station’s MAC Ad dress must be the same as one MAC Address T o bind the MA C Address, click on the Security/MAC Address Bindi ng menu button, the main web page then shows the MAC Address Bind function tabl[...]

  • Page 52

    Current Filtering MA C Ta b l e . 4.7.4 MAC Address Learning The switch is able to disable MAC Address learn ing function on ports. 1. Fill the Port Lis t field in the MAC Address Lea rning table and select Enable/Dis able in the MAC Address Learning field. 2. Click on the “OK” button to save.[...]

  • Page 53

    4.7.5 MAC Address Aging T ime The Aging T ime affects the learning process of the Switch. Dynamic forwarding table entries, which are made up of the source and destination MAC addr e sses and their associated port numbers, are de leted from the table if they are not accessed within the aging time. The aging time can be from 30 to 1,000,000 seconds [...]

  • Page 54

    4.7.6 802.1X Port-Based Network Access Control 4.7.6.1 Theory Understa nding IEEE 802.1X Po rt-Based Authentication The IEEE 802.1X standard defines a client-server-b ased acce ss control and authenticatio n protocol that restricts unauthorized clients from connecting to a LAN through publicly accessible ports. The authentication server authenticat[...]

  • Page 55

    z Authentication server —per forms the actual authentication of the client. The authentication server validates the identity of the client and notifies the s witch whether or not the client is aut horized to access the LAN and switch services. Because th e switch ac ts as the proxy , the authentica tion service is transparent to the client. In th[...]

  • Page 56

    dropped. If the client does not receive an EA P-requ est/identity frame after three attempts to st art authentication, the client transmits frames as if the port is in the autho rized state. A port in the authorized state effectively means that the client has been successfully authenticated. When the client supplies its identit y , the switch begin[...]

  • Page 57

    If a client that does not support 802.1X is connected to an unauthorized 802.1X port, the switch requests the client's identity. In this situation, the client does not respond to the r equest, the port remains in the unauthoriz ed state, and the client is not granted access to the net work. In contrast, when an 802.1X-enabled client connects t[...]

  • Page 58

    4.7.6.2 802.1X Configuration This switch has two 802.1X Mode: Radius Server & Local A uthenticate , choose one you ne ed ● Local Authenticate — In this situation, do not need Rad ius server in the net work, all authentication completed by 802.1x Switch , the normal topologies as belo w 1. Enter “ 802.1X Port St atus Configuration " , [...]

  • Page 59

    EAPOL frames to be sent and received through the port. It’s a default st atus 。 Force authorized: disables 802.1 X authentication and caus es the port to transition to the authorized state without any authentic ation exchange re quired. The por t transmits and receives normal traffic without 802.1X-based authenticati on of the client. This is t[...]

  • Page 60

    ● Radius Server — In this situation, need a Radius server in the network, the normal topologies as bel ow 1. Select the “ Radius Serv er ” mode. 2. The RADIUS Server configuration table includes the foll owing fields:[...]

  • Page 61

    • RADIUS Server IP Address The IP address of the RADIUS server being add ed. • Authentication Port(1-65535) The UDP port used by this server. The valid range is 0 - 65535. The default UDP Port No. is 1812 • Account Port(1-65535) The UDP port used by accounting server. T he valid range is 0 - 65535. The default UDP Port No. is 1813 • Share K[...]

  • Page 62

    4. Configure ports attribute of 802.1X, the same as “802.1X Port S tatus Configuration”. NOTE: Set the Ports Authenticate S tatus to “Force Author ized” if the port i s c onnected t o the RADIUS server or the port is a uplink port that is conn ected to another switch. Or once the 802.1X stat to work, the switch might not be able to access t[...]

  • Page 63

    to be created on the Radius Server PC. For example, the Radius Server found ed on Win2000 Server , and then: Enter ” Active Directory Users and Computers ”, create legal us er data, the next, right-click a user what you cr eated to en ter properties, and what to be noticed:[...]

  • Page 64

    6. The last, run your 802.1X Client 4.7.6.3 802.1X Clie nt Configuration Windows XP is originally 802.1X supp ort. As to ot her operating systems (windows 98SE, ME, 2000), an 802.1X client utility is needed. The follo wing procedures show how to configure 80 2.1X Authentication in Windows XP . Please note that if you want to change the 802.1x aut h[...]

  • Page 65

    4. Select “ Authentication ” tab. 5. Select “ Enable network acce ss co n trol using IEEE 802.1X ” to enable 80 2.1x authentication. 6. Select “ MD-5 Challenge ” from the drop-down list box for EAP type. 7. Click “ OK ”. 8. When wireless client has associated with WGSW-2840/52 40, a user authen tication notice appears in s ystem tra[...]

  • Page 66

    9. Enter the user name, password and the lo g on domain that your account b elongs. 10. Click “ OK ” to complete the validation process .[...]

  • Page 67

    4.8 QoS 4.8.1 Underst and QOS Quality of Service (QoS) is an advanced traffic prioritiza tion feature that a llows you to establish control ov er network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, ti me critical, and file-backup traffic. QoS redu[...]

  • Page 68

    1. Define a service level to determine the pr iority that will be applied to traffic. 2. Apply a classifier to determine how the incoming traffi c will be classified and thus treated by the Switch. 3. Create a QoS profile which associates a service level and a classifier. 4. Apply a QoS profile to a port(s). 4.8.2 QOS Configuration QoS settings all[...]

  • Page 69

    2. VLAN-COS Mapping QoS settings allow customization of VLAN ID to T raffic classifiers 1. Fill the VID (1-2094) field in the VL AN-CoS Mapping T able. 2. Fill the mapping number in the CoS (0-7) field. 3. Click on the “OK” button to save. 4. T o remove the VLAN-CoS ma pping item, simply click on the “Delete” button in the Show VL AN-CoS Ma[...]

  • Page 70

    3. 802.1p-CoS Mapping QoS settings allow customization of packet priority in order to facilitate delive ry of data traf fic that might be a ffected by latency problems. The IEEE 802.1p Prio rit y specification uses 8 priority levels to classify data packets. In 802.1p compliant devices, a tag inserted in to the packet header is used to id ent ify t[...]

  • Page 71

    4. Port-COS Mapping QoS settings allow customization of VLAN ID to T raffic classifiers 1. Fill the Port List (e.g. 1-3,7) field in the port-based QoS Configuration T able. 2. Fill the mapping number in the CoS (0-7) field. 3. Click on the “OK” button to save. 5. COS-Queue Mapping 1. Fill the CoS (0-7) field in the CoS-Queue Mapping Con figurat[...]

  • Page 72

    6. Queue Management There are two rules for the Priorit y Queue: Weighted Round Robin ( WRR ) and Always Hight . T o configure Q ueue Rule, select the Queue Policy drop down menu in the Queue Rule Configuration table. And Click on the “OK” button to save. If the WRR was chosen as the Queue Policy , t he page would show in the main page.[...]

  • Page 73

    4.9 Multicast 4.9.1 IGMP Snooping Theory Computers and network devices that want to receive mu lticast transmissi ons need to inform nearby routers that they will become members of a multicast group. The In ternet Group Management Protocol (IGMP) is used to communicate this information. IGMP is also used to periodi cally check the multicast grou p [...]

  • Page 74

    A host sends an IGMP “report” to join a group A host will never send a report when it wants to leave a group (for versio n 1). A host will send a “leave” report when it wants to leave a group (for version 2). Multicast routers send IGMP queries (to the all-hosts group address: 224.0.0.1) perio dically to see whether any group members exist [...]

  • Page 75

    4.9.2 St atic Routing Port This function is to configure ports to be the member of IGMP Group s in VLANs. T o do this, fill the Port List field and the VID field for the static routing and click on the “Add ” button to save. 4.10 Port Analysis 4.10.1 Port Analysis This function shows the statistical information of eac h port, it helps to diagno[...]

  • Page 76

    4.10.2 Port Mirror Port Mirroring is a method of monitoring network traffic that forwards a copy of each incoming and/or outgoin g packet from one port of a network switch to another port where the p acket can be studie d. It enables the manager to keep close track of switch performance and alter it if necessar y . Configuring the port mirroring by[...]

  • Page 77

    4.1 1 Storm Control This function is to control the Braodcast S torm, Mu lticast S torm and Flooded Storm p acket on each port . T o configure th e S torm Control, click on the Storm Control menu button. The web main page then shows the S trom Restricting function table. 1. Fill the Port List field in the Broadcast S torm Restricting table, select [...]

  • Page 78

    4.12 IP St ackin g 4.12.1 About IP St acking IP Stacking function enables you to use a si ngle IP address and standar d network cabling to manage a gr oup of up to 8 PLANET WSW-2401A/W GSW-2840/5240 s witches in the same IP subnet (broadcast domain). Once one switch had been operated as the Master of a sta ck, additional switches can join the IP st[...]

  • Page 79

    • Master – The IP S tacking Management status is enabled and the current switch is a Master switch at this IP S tack Group. • Clie nt.- The IP S tacking Management status is enabled and the current s witch is a Client switch at this IP S tack Group. Manamement st atus : T his filed is to Enable or Disable the IP S tack function. Management mo[...]

  • Page 80

    2. Then assign a role to the WGSW-2840 as Master in Manag ement mode field, the following screen appears. 3. Enter a string in the “IP S tacking Group” fiel d; the default string of the W GSW-2840/5240 is “ planet_sw itch ”. This string must be the same with the Client switc hes that to be assigned to the same IP S tack group. 4. Modify the[...]

  • Page 81

    8. Enter a string in the “IP S tacking Group” fiel d; the default string of the W GSW-2840/5240 is “ planet_sw itch ”. This string must be the same with the Master switch that to be assigned to the same IP S tack group. 9. Modify the “ System priority ” and “ Stack name ” if necessary . At this sample we change the S tack name of th[...]

  • Page 82

    13. After setup complete, please go to system and choose “Saving p aramete rs” to save cur rent configuration. The following screen appears. NOTE: Please do not assign role for whole stack member Switch as client, it cannot detect the Master device with minimum MAC address.[...]

  • Page 83

    5. TROUBLE SHOOTING This section is intended to hel p you solve the most common problems on the WSD-800 Managed Ether net Switch 5.1 Incorrect connections The switch port can auto detect straight or crossover cable when you link switch with other Ethernet device. For the RJ-45 connector should use correct UT P or STP cabl e, 10/100Mbps port use 2 p[...]

  • Page 84

    Category 3, 4 or 5 cable for 10Mbps connections or 100 Ω Category 5 cable for 100Mb ps connections. Also be sure that the length of any tw isted-pair connection does not exc eed 100 meters (328 feet).[...]

  • Page 85

    6. APPENDIX 6.1 Console Port Pin Assignments The DB-9 serial port on the front panel is used to connec t to the switch for out-of-ba nd console configuration. The console menu-driven config uration progr am can be accessed from a terminal or a PC runnin g a terminal emulation program. The pin assignments used to connect to the serial port are provi[...]

  • Page 86

    10BASE-T Cat. 3, 4, 5100-ohm UTP 100 m (328 ft) RJ-45 100BASE-TX Cat. 5 100-ohm UTP 100 m (328 ft) RJ-45 100BASE-FX 50/125 or 62.5/125 micr on core multimode fiber (MMF) 2 km (1.24 miles) SC or ST 6.2 100BASE-TX/10BASE-T Pin Assignments With 100BASE-TX/10BASE-T cable, pins 1 and 2 are used f or transmitting data, and pins 3 and 6 for receiving data[...]

  • Page 87

    7. APPENDIX-B  802.1Q VLAN Multi-Unt agged VLAN setting sample 1 The version V .1.4.27 of WGSW-2840 had added the multip le untagged VLAN function on a port. The function could be applied at if the members of t wo or more different VLAN group s all hav e to access the same server/AP/Printer . But the two VLAN groups are sepa rat ed a nd can’t [...]

  • Page 88

    Figure 7-2 802.1Q VLAN page screen 3. Move the mouse course to the port, which had be assig ned to be conn ect to the server/AP/printer , then click on the port. For this case, we set the Port-1 to be the multiple untagged port. The screen in Figure 7-3 appears. 4. At the Link T ype, select “ Always Untag ” at the draw bar . Click “OK” to a[...]

  • Page 89

    6. At the Port 1- VLAN Port configuration page, select VLAN 2 and VLAN 3 to add to the Port 1 . The right information window at this table shows the status. The screen in Figure 7-4 appears. Figure 7-4 Assign Port-1 to be VLAN 2 and VLAN 3 member . 7. After the down the Port 1 VLAN configuration, press “ close ” to back to the 802.1Q VLAN main [...]

  • Page 90

    • And both P ort 2 and Port 3 are VL AN 1 members. 10. After properly configure the 802.1Q VLAN per port setting, it should be as the screen in Figure 7-6 app ears. Figure 7-6 Port 1, Port 2 and Port 3 VLAN configuration Although Port 2 and Port 3 are VLAN 1 mem bers, with different PVID setting, the two ports are not able to access each other . [...]