PoE Switch Web Management User Manual DN-95344
Contents About guide .............................................................................................................. 2 Terminology/Usage .................................................................................................. 2 Copyright and trademark ......................................................................................... 2 1 Products introduction ......................................................................................... 3 Front panel ...............
Web Management PoE switch User Manual 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. ACL Configuraion ......................................................................................... 41 QoS Configuration ....................................................................................... 46 IP Basic Configuration ................................................................................. 47 Certification. Authorization. Accounting (AAA) configuration ....................
Warning: indicates potential property damage or personal injury. Copyright and trademark Information in this document is subjected to change without notice. Reproduction in any manner whatsoever without the written permission of Corporation is strictly forbidden.
1 Products introduction Thanks for purchasing the Managed PoE switch products. The is a Gigabit Full Managed POE Switch, It provides 8 10/100/1000Mbps AutoNegotiation RJ45 POE ports and 2 Gigabit SFP Ports. It supports the port's full line speed forwarding to ensure the stable transmission of data. The machine can be used as a small local core switch or a mall and medium-sized LAN switch, and can also be used as an access switch for large LAN.
Real panel Grounding: use specialized ground lead connect Connect the power adapter output terminal to this port.
2 Hardware installation This chapter provides unpacking and installation information for the Managed PoE switch. First step: open a seal Open the shipping carton and carefully unpack its contents. Please consult the packing list located in the User Manual to make sure all items are present and undamaged. If any item is missing or damaged, please contact the local reseller for replacement.
Wall mount Installation Attach the mounting brackets to the switch's side panels (one on each side) and secure them with the screws provided (please note that these brackets are not designed for palm size switches). Third step: Connecting power supply Using the AC power cord to connect to the power adapter, and then plug the output terminal of the adapter into the DC IN socket on the back of the switch.
Power failure As a precaution, the switch should be unplugged in case of power failure. When power is resumed, plug the switch back in. 3 Getting Started This chapter introduces the management interface of Managed PoE switch. Management Option The Managed PoE switch can be managed through any port on the device by using the Web-based management. Each switch must be assigned its own IP address, which is used for communication with Web-Based Management or a SNMP network manager.
Connect the Ethernet cable to any of the ports on the front panel of the switch and to the Ethernet port on the PC. Network connection Login Web-based Management In order to login and configure the switch via an Ethernet connection, the PC must have an IP address in the same subnet as the switch. For example, if the switch has an IP address of 192.168.0.1, the PC should have an IP address of 192.168.0.x (where x is a number between 2 ~ 254), and a subnet mask of 255.255.255.0.
When the following logon dialog box appears, enter the password then click OK. By default, the username is admin and the password is admin.
1. WEB page elements Shown in Figure 2, WEB page is mainly composed of three parts: title page, navigation tree page and main page Figure 2 Title page is used to display the logo Main page is used to display the user from the navigation tree, select the page 2. The structure of Navigation tree Figure 3 shows the navigation tree organizational structure.
Figure 3 3. Page button Introduction On the pages, here are some commonly used buttons, the role of these buttons are generally the same, Form 2 on the role of these buttons are described: Form 2: button effect Refresh Update all fields on the page Apply Numerical value will be updated into the memory. Because the error-checking should be implement by the Web Server, before the user selects the button will be no error checking.
4. Error messages If the switch WEB server error occurred while processing user requests, it will display a dialog box in the corresponding error message. For example, Figure 4 shows an error message dialog box. Figure 4 5. Entry Field Some pages of the most left column in the table has an entry field, as shown in Figure 5, through the field can access different rows in the table.
Figure 5 6. Status Field Some pages of the most right column in the table there is a state field, as shown in Figure 6, the field displays the line status. Since all row state changes are processed in-house, so the status field is read-only. Once the line information of the entry filed into force, the line will automatically become the active state the status active.
Figure 6 the web page of status field WEB page introduction Switch switches WEB pages organized into groups, each including one or more of the WEB pages. The following are introduced one by one on each page.
1. Login dialog Box Figure 7 WEB browsing session of the login page Figure 7 shows the login dialog box, the logon dialog box will be displayed while the user login the web page at the first time. When the user filled out the correct user name and password, then click the Enter button can log on to the switch Web server. Passwords are case-sensitive, the anonymous user password can be maximum set up to 16 characters, while the multi-user name and password can be set up to 11 characters.
Figure 8 Switch switches main page 3. System Configuration: (1) Basic information page Figure 9 is the basic information of configuration page, users can configure the basic information for the switch. System Description displays the description of the relevant parameters of system. System descriptor ID display system in the network identity management. The system version number is displayed the current software version number of switches.
Figure 9 Basic information Page (2) Serial port information page Figure 10 is a serial port configuration page, the page displays serial baud rate and other related information. When the host through the serial port terminals (such as Windows, HyperTerminal) to the management of switches, serial console on the COM port configuration must be consistent with this page information.
Figure 10 Serial port information page (3) User management page Figure 11 is a user management page, the user can modify this switch anonymous user (admin) password, Telnet and the Web without opening a multi-user, they all use the same anonymous user's password. Passwords are case-sensitive, and can be up to 16 characters.
and Web need anonymous user's password authentication Figure 11 user’s management page (4) Security Management Page Figure 12 is Security management configuration page, through the page's configuration, the administrator can control network management services TELNET, WEB and SNMP, you can open (enable) or off (disable) these services, these services can be mounted up with standards IP ACL group, and the implementation of the source IP address control, control access to the host of these services.
Figure 12 Security management page (5) Configure the current page Figure 13 is the current configuration page. The user can view the current configuration of the switch on this page. Save key is to store the current system configuration in the configuration file. Because the storage operation requires erase& write FLASH chips, which take up some time.
Figure 13 the current configuration page (6) Configuration page Figure 14 is profile configuration page. This page allows users to view the system's initial configuration. The initial configuration is actually the configuration file in the FLASH, when the configuration file does not exist in FLASH, the system starts using the default configuration. Delete key to delete the configuration file in the FLASH.
Figure14 Configuration file page (7) File upload page Figure 15 is a file upload page; through this page a user can upload a configuration file and mapping files to the switch. Click the Browse button to select the upload configuration file or image file in the directory path on the PC. Click Upload button upload a configuration file or image file, configuration file extension must be *. cfg, image file must be provided by the manufacturer and the file name extension must be *. img.
Figure 15 File Upload Page (8) System reset page Figure 16 is system reset page, through these page users to restart the switch. When you click on Restart button, will pop up a dialog box that prompts the user to determine whether or restart the switch, If it is determined according to OK button, otherwise click Cancel button. Restart will no longer open the Web page.
Figure16 System reset page 4. Port Configuration (1) Port configuration/port -display page Figure 17 is the port configuration/port -display page. Users can enable or disable the port to the page, set the port speed, or View all ports of the basic information. To set a specific port, users need to select the appropriate port name on port dropdown menu. The default port status is up, can select the drop-down menu -down to disable the port.
Figure 18 Port Statistics Page (3) Flow control page Figure 19 is the flow control page. Users can enable and disable each port’s send and receive flow control through this page. Flow control by sending the side of the drop-down on or off to open or close the sending side of flow control, flow control through the receiving side of the dropdown on or off to open or close the receiver-side flow control, while on and off also shows the port to send side and receiving-side flow control is turned on or off.
Figure 19 Flow control page (4) Broadcast storm control page Figure 20 is the Broadcast Storm Control page. This page is used to do the suppression for configure port broadcast packets, multicast packets and DLF packet. From the Port drop-down bar select to configure ports. Through the on and off key to open and close the port broadcast suppression, multicast, DLF inhibition and suppression. Inhibition rate is used to configure the port inhibition speed, range 11024000, unit kbits.
Figure 20 Broadcase Storm control Page (5) Port speed limits page Figure 21 is the port speed- limit page. This page is used to configure the port, send and receive rate From the Port drop-down bar select the configure ports. Bandwidth control of the send data packets is used to configure and display the bandwidth control it, the range is 1-1024000, unit kbits, enter into force after the key press applications. If the port is not configured bandwidth control, shown as off.
Figure 21 Port speed limit page (6) Port protection page Figure 22 is the Port protection page. This page is used to configure the port for the protection port. If the port is configured as a protected port, the ports cannot exchange the data with each other, protected port only with non-protected port for data exchange.
Figure 22 protected port page (7) Port Learning restrain page Figure 23 is the port learning restrain page. This page used to restrict the port can learn of the MAC address of the number, range is 0-8191.
(8) Port Trunking configuration page Figure 24 is the port trunking configuration page. This page allows the user to configure the port trunking. This page consists of four parts: port trunking ID selection, port trunking method selection, configurable ports and group of members’ port. To create or modify the port trunking, the user needs to select a port trunking ID, port trunking ID from 1 to 8.
Figure 24 Port Trunking configuration page (9) Port mirroring configuration page Figure 25 is the port mirroring configuration page. The page allows users to configure port mirroring. Port mirroring through the mirror port to monitor the data packets of being mirrored output port and the data packets of being mirrored input port. Mirroring Port can only choose one, being mirrored output port and being mirrored input port can select multiple.
Figure25 Port mirroring configuration page 5. MAC binding (1) MAC binding configuration page Figure 26 is the MAC binding configuration page. This page is used to achieve the port and MAC address binding.
Figure 26 the MAC binding configuration page (2) MAC binding automatic conversion page Figure 27 is the MAC binding automatic conversion page. This page is used to achieve the port MAC address auto-binding. Shows the hardware switch on the lay 2 the exist port dynamic MAC address and affiliated VLAN. Can choose one of the entry and convert it into static binding.
Figure 27 the MAC binding automatic conversion page 6. MAC filtering (1) MAC filtering configuration page Figure 28 is the MAC filtering configuration page. This page is used to configure the ports on the MAC address filtering. MAC entries on the page is used to enter the MAC address filtering, VLAN ID entry is used to enter the MAC address affiliated VLAN.
Figure 28 the MAC filtering configuration page (2) MAC filtering automatic conversion page Figure 29 is the MAC filtering automatic conversion page. This page is used to achieve the port MAC address auto-binding. Shows the hardware switch on the lay2 the exist port dynamic MAC address and affiliated VLAN.
Figure 29 the MAC filtering automatic conversion page 7. VLAN Configuration (1) VLAN information page Figure 30 shows the current VLAN information page. This page is read-only page displays the current VLAN configuration information l, including the VID, state and port members. Select VLAN from the drop-down VID, shows the port information of the Port VLAN members. A port may not be a member of VLAN, which can be VLAN-tagged or untagged members.
Figure 30 VLAN information page (2) Static VLAN configuration page Figure 31 is the static VLAN configuration page that allows users to create VLAN. If you want to create a new VLAN, the user input VID on activity line, ranging from 2 to 4094. VLAN name is generated depend on VLAN ID and cannot be modified. Click Apply button, then the list box displays the user-created VLAN's VID and VLAN name.
Figure 31 the static VLAN configuration page (3) VLAN port configuration page Figure 32 is a VLAN port configuration page, which is used to configure the VLAN port configuration and display results. This page mainly consists of eight parts: port, mode, all current VLAN, port-owned VLAN, key "default VLAN =>", "tagged =>", "untagged =>" and "non-members =>".
Button "default VLAN =>" to configure port the default VLAN, selected one VLAN from the current all the VLAN. Button "tagged =>" Configured port is designated as a tagged member of VLAN, selected one or more VLAN from the current all VLAN. Button "untagged =>" Configure VLAN port is a designated member of the untagged, selected one or more VLAN from the current all VLAN.
By default, the switch there is a share name as named public, the common body is read-only access. With this correspondence, the activities of this page is only one entry, shared body names are public, access is read-only access. When the switch through SNMP for network management, you need to configure a read-write permissions to the shared body.
Figure 34 the TRAP target configuration page 9. ACL Configuraion (1) IP Standard ACL configuration page Figure 35 is the IP standard ACL configuration page. Users can through this page to build ACL standard IP-rule base. User can select an ACL group number, in the group to create one or more rules. In a rule can match only the source IP address field (with mask). The standard IP rules to control the source IP address packet forwarding.
Figure 35 the IP standard ACL configuration page Users to configure the rules, the source IP address must be in with a mask, the rule can match the collection of IP addresses. The address mask is use anti-code, if the rule were to match the IP address range 192.168.0.0 to 192.168.0.255, then the IP address can be 192.168.0.1, and its mask of 0.0.0.255. Users to configure the rules, each rule must have a filter mode: allow or deny.
Figure 36 the IP Extended ACL configuration page (3) MAC IP ACL configuration page Figure 37 is the MAC IP ACL configuration page. IP MAC group can be the IP packet source and destination MAC address and source and destination IP address control.
(4) MAC IP ACL configuration page Figure 38 is the MAC IP ACL configuration page, IP MAC group can be the IP packet source and destination MAC address and source and destination IP address control. Figure 38 the IP Extended ACL configuration page (5) MAC ARP ACL configuration page Figure 39 is the MAC ARP ACL configuration page. ARP group can be the type of the operation of the ARP packet, the sender MAC and the sender IP control.
Figure 39 the IP Extended ACL configuration page (6) ACL information page Figure 40 is the ACL information page, which displays the current ACL rules configured in all the information.
10. QoS Configuration (1) QoS Apply Configuration Page Figure 41 is a QoS Apply configuration page. Figure 41 QoS Apply configuration page (2) QoS Schedule Configuration Page Figure 42 is a QoS Schedule configuration page.
Figure 42 QoS Schedule configuration page 11. IP Basic Configuration (1) VLAN Interface Configuration Page Figure 43 is a VLAN interface configuration page, users can configure the VLAN interface through this page, delete VLAN interfaces, configure the interface IP address, remove the interface IP address, and view interface information. VLAN already exists can only be set when the interface can only be configured on the interface set interface address.
Figure 43 VLAN interface configuration page Switch switch in the default have a VLAN1 interface, the interface can not be deleted. One can only configure a VLAN interface. (2) ARP configuration and display page Figure 44 is the ARP configuration and display page, this page can display all of the information of the ARP table switch, while users can configure a static ARP entries on this page, delete ARP entries, and revised the dynamic ARP table entry to a static ARP table entry.
Figure 44 the ARP configuration and display page (3) Host Static Routing configuration page Figure 45 is the host static route configuration page, the user can through this page to add, delete static routing switch hosts. By default, the switch is not configured to host a static route, the user can configure the default route through this page, that is the purpose of address/subnet prefix is 0.0.0.
12. Certification. Authorization. Accounting (AAA) configuration (1) Radius Configuration Page Figure 46 is the Radius configuration page, users can configure with the Radiusrelated information, you can set information includes: 1. Be sure to set the Radius server's IP address before do the authentication and accounting in this field 2. Optional Radius server IP address, if there is spare Radius server can set this field. 3.
(2) 802.1x Configuration Page Figure 47 is the 802.1x configuration page, users can configure 802.1x related information on this page, including: 1. Whether to activate the 802.1x protocol, when doing authentication and accounting must be to start 802.1x protocol. 2. Switch is to adopt a common authentication method or the expansion of authentication. 3. Whether to open re-authentication function, the default is not open. When you do authentication and accounting based on the actual circumstances.
Figure 47 the 802.1x configuration page (3) 802.1x port configuration page Figure 48 is the 802.1x port configuration page, the user through this page to configure the support 802.1x port mode and hosts of the largest, at the same time you can view each port 802.1x configuration. 802.1x port model includes four types: N/A State, Auto state, Force-authorized state and Force-unauthorized state. When a port needs to do 802.
Figure 48 the 802.1x port configuration page Doing 802.1x authentication, port access, the default maximum host number is 100, the user can modify this field, the biggest support to the 100. (4) 802.1x user authentication information page Figure 49 is a 802.
Figure 49 802.1x user authentication information page 13. Spanning Tree Protocol configuration (1) MSTP global configuration page Figure 50 is the MSTP global configuration page, through which you can configure some MSTP related information, mainly including: Whether to enable MSTP. Configure the bridge priority. Devices with lower priority are more likely to be the root bridge. Enable BPDU filtering function on the port in the portfast bpdu-filter default state.
Start or shut down and cisco compatible spanning tree protocol. Figure 50 MSTP Global Configuration Page (2) MSTP port configuration page Figure 51 is the MSTP global configuration page. Through this page, you can configure some MSTP related information, mainly including: Select the port to be configured. Configure a port as a portfast port to enable the port from the blocking state to the forwarding state, bypassing the listening and learning states. Open the BPDU filter on the selected port.
Figure 51 MSTP Port Configuration Page (3) MSTP configuration information page Figure 52 is the MSTP configuration information page, through which you can view some MSTP related information Figure 52 MSTP Configuration Information page 56
14. IGMP SNOOPING configuration (1) IGMP SNOOPING configuration page Figure 53 is the IGMP SNOOPING configuration page, through which you can start IGMP SNOOPING. Figure 53 IGMP SNOOPING configuration page (2) IGMP SNOOPING information page Figure 54 is the IGMP SNOOPING information page, which allows users to view some information about IGMP SNOOPING.
Figure 54 IGMP SNOOPING Information page 15. GMRP configuration (1) GMRP Global Configuration Page Figure 55 shows the GMRP global configuration page. Users can enable GMRP through this page.
Figure 55 GMRP Global Configuration Page (2) GMRP port configuration page Figure 56 shows the GMRP port configuration page. You can use this page to enable the GMRP port and view the port information. Figure 56 GMRP Port Configuration Page (3) GMRP state machine page Figure 57 is the GMRP state machine page. Users can view the GMRP state machine information through this page.
Figure 57 is the GMRP state machine page 16. EAPS configuration (1) EAPS configuration page Figure 58 is an EAPS configuration page, through which you can configure some EAPS related information, including: Select an EAPS ring number. Configure the operating node mode of an EAPS Domain. Configure Primary Port of EAPS Domain. Configure Secondary Port of EAPS Domain. Configure a control VLAN for EAPS Domain. Add one or more protected VLANs of the EAPS Domain.
Figure 58 EAPS Configuration Page (2) EAPS information page Figure 59 is an EAPS information page, through which users can view some EAPS related information.
17. RMON configuration (1) RMON statistics group configuration page Figure 60 shows the RMON statistics group configuration page. You can use this page to configure the RMON statistics group. Select a port from the drop-down list to view/configure the RMON statistics group configuration for this port. When not configured, the index number is 0, fill in the correct index number (range 1 to 100), the owner is optional, you can configure RMON statistics group for the port.
Figure62 RMON history group configuration page (3) RMON alarm group configuration page Figure 62 shows the RMON alarm group configuration page. You can use this page to create or modify an RMON alarm group. Select a configured alarm group from the drop-down list to view/configure its information. Select New to create it. The index number range is from 1 to 60, and the interval range is from 1 to 3600. In seconds, the monitoring object must fill in the MIB node.
Figure 62 RMON alarm group configuration page (4) RMON event group configuration page Figure 63 is the RMON event group configuration page. Users can create or modify RMON event groups through this page. Select a configured event group from the drop-down list to view/configure its information. Select New to create it. The index number range is from 1 to 60. The description is a character string.
Figure 63 RMON Event Group Configuration Page 18. Cluster configuration (1) NDP configuration page Figure 64 shows the NDP configuration page. You can use this page to configure NDP. The configurable information includes: selecting the port, enabling the NDP function of the port, enabling the global NDP function, the interval for sending NDP packets, and the aging time of the NDP packets on the receiving device. For port selection, you can select the port as required and enable the port NDP function.
Figure 64 NDP configuration page (2) NTDP configuration page Figure 65 shows the NTDP configuration page. You can use this page to configure NTDP. The information that can be set includes: selecting the port, enabling the NTDP function of the port, enabling the global NTDP function, the range of the topology collection, the time interval of collecting the regular topology, the delay time of the first port forwarding the packet, and the forwarding of the packet by other ports delay.
Set the delay for forwarding packets on the first port. The valid range is 11000 milliseconds. The default value is 200 milliseconds. Set the delay for forwarding packets on the first port. The valid range is 1 to 100 milliseconds. The default value is 20 milliseconds. Figure 65 NTDP configuration page (3) Cluster Configuration Page Figure 66 is the cluster configuration page. Users can configure the cluster and view the cluster member table through this page.
Configure a private IP address range for member devices in the cluster. The valid range of ip addresses is 0.0.0.0 to 255.255.255.255. The valid range of the mask length is 0 to 32. Set the interval for sending handshake packets. The valid range is 1-255 seconds. The default is 10 seconds. Configure the device's effective retention time. The valid range is 1-255 seconds and the default is 60 seconds. To set up a cluster, you need to configure the cluster name and choose to join the cluster.
19. log management (1) Log information page Figure 67 is the Log information page. Users can enable and view various log information through this page. Figure 67 Log Information Page Critical: Output critical level information. Debugging: Outputs debug level debugging information. Informational: Output information level debugging information. Warning: Output warning level debugging information. ALL: Output all log information 20.
1. Status: Enable means PoE function is available Disable means PoE function is close. 2. Operation: Displays the PoE ports ON or OFF Figure 68 the PoE port configuration page Hereby Assmann Electronic GmbH, declares that the Declaration of Conformity is part of the shipping content. If the Declaration of Conformity is missing, you can request it by post under the below mentioned manufacturer address. www.assmann.