i
VigorSwitch G1260 24 Gigabit Port Web Smart Switch User’s Guide Version: 1.1 Firmware Version: V1.
Copyright Information Copyright Declarations Copyright 2013 All rights reserved. This publication contains information that is protected by copyright. No part may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without written permission from the copyright holders. Trademarks The following trademarks are used in this document: Microsoft is a registered trademark of Microsoft Corp.
European Community Declarations Manufacturer: Address: Product: DrayTek Corp. No. 26, Fu Shing Road, HuKou township, HsinChu Industrial Park, Hsin-Chu, Taiwan 303 VigorSwitch Series Device The product conforms to the requirements of Electro-Magnetic Compatibility (EMC) Directive 2004/108/EC by complying with the requirements set forth in EN55022/Class A and EN55024/Class A.
Table of Contents Introduction ....................................................................................................1 1.1 Overview ................................................................................................................................. 1 1.2 Features .................................................................................................................................. 2 1.3 Packing List.......................................................................
3.4.4 VLAN Isolation ................................................................................................................ 54 3.5 Aggregation ........................................................................................................................... 55 3.6 802.1X................................................................................................................................... 56 3.7 IGMP Snooping......................................................................
Introduction 1.1 Overview The 24-port Gigabit Web Smart Switch is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch has 20 10/100/1000Mbps TP ports and 4 Gigabit TP/SFP transceiver slots. It supports console, telnet, http and SNMP interface for switch management. The network administrator can logon the switch to monitor, configure and control each port’s activity. In addition, the switch implements the QoS (Quality of Service), VLAN, and Trunking.
Power Saving The Power saving using the "ActiPHY Power Management" and "PerfectReach Power Management" two techniques to detect the client idle and cable length automatically and provides the different power. It could efficient to save the switch power and reduce the power consumption. 1.2 Features The VigorSwitch G1260, a standalone off-the-shelf switch, provides the comprehensive features listed below for users to perform system network administration and efficiently and securely serve your network.
Built-in web-based management and CLI management, providing a more convenient UI for the user 1.3 Packing List Before you start installing the switch, verify that the package contains the following: VigorSwitch G1260 AC Power Cord CD Rubber feet Rack mount kit Please notify your sales representative immediately if any of the aforementioned items is missing or damaged.
1.4 LED Indicators and Connectors Before you use the Vigor device, please get acquainted with the LED indicators and connectors first. There are 24 TP Fast Ethernet ports and 2 slots for optional removable modules on the front panel of the switch. LED display area, locating on the front panel, contains a ACT, Power LED and 24 ports working status of the switch. LED Explanation LED System Color Green Red Explanation Lit when +3.3V power is coming up Lit when The voltage is smaller than 10.
User Interfaces on the Rear Panel ( 24-PORT GBE WEB SMART SWITCH 1.5 Hardware Installation At the beginning, please do first: Wear a grounding device to avoid the damage from electrostatic discharge Be sure you have inserted the power cord to power source 1.5.1 Connecting the SFP Fiber Transceiver to the Chassis The optional SFP modules are hot swappable, so you can plug or unplug it before or after powering on. 1. Verify that the SFP module is the right model and conforms to the chassis 2.
Firmware Loading After resetting, the bootloader will load the firmware into the memory. It will take about 30 seconds, after that, the switch will flash all the LED once and automatically performs self-test and is in ready state. 1.5.2 Installing Optional SFP Fiber Transceivers to the switch If you have no modules, please skip this section. 1.5.3 Installing Chassis to a 19-Inch Wiring Closet Rail Caution: Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis.
The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Gigabit Ethernet TP network connection The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. Cabling Requirements for 1000SX/LX SFP Module It is more complex and comprehensive contrast to TP cabling in the fiber media. Basically, there are two categories of fiber, multi mode (MM) and single mode (SM).
Cat. 5 TP Wire: Fiber Cable: 11.12/m 10.10/m Cat. 5 TP Wire: 1.12/m Fiber Cable: 1.0/m TP to fiber Converter: 56 Bit Time unit: 1ns (1sec./1000 Mega bit) Bit Time unit: 0.01s (1sec./100 Mega bit) Sum up all elements’ bit-time delay and the overall bit-time delay of wires/devices must be within Round Trip Delay (bit times) in a half-duplex network segment (collision domain). For full-duplex operation, this will not be applied.
Case 2: Port-based VLAN -1 (*The switch image is sample only.) The same VLAN members could not be in different switches. Every VLAN members could not access VLAN members each other. The switch manager has to assign different names for each VLAN groups at one switch. Case 3: Port-based VLAN – 2 (*The switch image is sample only.) VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members.
VLAN4 members could not access VLAN1 and VLAN3 members, but they could access VLAN2 members. Case 4: The same VLAN members can be at different switches with the same VID (*The switch image is sample only.
1.5.5 Configuring the Management Agent of Switch Users can monitor and configure the switch through the following procedures. Configuring the Management Agent of VigorSwitch G1260 through the Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. We just introduce the first type of management interface. Web-based UI for the switch is an interface in a highly friendly way.
1.5.6 IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication. Its address structure looks is shown below. It is “classful” because it is split into predefined address classes or categories. Each class has its own network range between the network identifier and host identifier in the 32 bits address.
Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network. We call it Private IP address and list below: Class A 10.0.0.0 --- 10.255.255.255 Class B 172.16.0.0 --- 172.31.255.
In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result. Prefix Length No. of IP matched No.
First, IP Address: as shown above, enter “192.168.1.1”, for instance. For sure, an IP address such as 192.168.1.x must be set on your PC. Second, Subnet Mask: as shown above, enter “255.255.255.0”. Any subnet mask such as 255.255.255.x is allowable in this case. Note: The DHCP Setting is enabled in default.
1.6 Typical Applications The 24-Port L2 Managed Fast Ethernet Switch with 2 SFP Dual Media implements 24 Fast Ethernet TP ports with auto MDIX and 2 Gigabit dual media ports with SFP for removable module supported comprehensive fiber types of connection, including LC, BiDi LC for SFP. For more details on the specification of the switch, please refer to Appendix A. The switch is suitable for the following applications.
Peer-to-peer application is used in two remote offices (* The switch image is sample only.) Office Network Connection (* The switch image is sample only.
This page is left blank.
Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 2.1 What’s the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980. In 1992, Grand Junction Networks unveiled a new high speed Ethernet with the same characteristic of the original Ethernet but operated at 100Mbps, called Fast Ethernet now.
This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model. In this section, we are mainly describing the MAC sub-layer. Logical Link Control (LLC) Data link layer is composed of both the sub-layers of MAC and MAC-client. Here MAC client may be logical link control or bridge relay entity.
(command or response). The DSAP and SSAP pair with some reserved values indicates some well-known services listed in the table below. LLC type 1 connectionless service, LLC type 2 connection-oriented service and LLC type 3 acknowledge connectionless service are three types of LLC frame for all classes of service. In Fig 3-2, it shows the format of Service Access Point (SAP). Please refer to IEEE802.2 for more details. 2.
The MAC is belonged to Data Link Layer (Layer 2), the address is defined to be a 48-bit long and locally unique address. Since this type of address is applied only to the Ethernet LAN media access control (MAC), they are referred to as MAC addresses. The first three bytes are Organizational Unique Identifier (OUI) code assigned by IEEE. The last three bytes are the serial number assigned by the vendor of the network device. All these six bytes are stored in a non-volatile memory in the device.
Source addresses (SA) - The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0. Length/Type - This field indicates either the number of the data bytes contained in the data field of the frame, or the Ethernet type of data. If the value of first two bytes is less than or equal to 1500 in decimal, the number of bytes in the data field is equal to the Length/Type value, i.e. this field acts as Length indicator at this moment.
the data field and FCS field in turn. The followings summarize what a MAC does before transmitting a frame. 1. MAC will assemble the frame. First, the preamble and Start-of-Frame delimiter will be put in the fields of PRE and SFD, followed DA, SA, tag ID if tagged VLAN is applied, Ethertype or the value of the data length, and payload data field, and finally put the FCS data in order into the responded fields. 2. Listen if there is any traffic running over the medium. If yes, wait. 3.
Parameter value/LAN 10Base 100Base 1000Base Max. collision domain DTE to DTE 100 meters 100 meters for UTP 412 meters for fiber 100 meters for UTP 316 meters for fiber Max. collision domain with repeater 2500 meters 205 meters 200 meters Slot time 512 bit times 512 bit times 512 bit times Interframe Gap 9.6us 0.96us 0.
2.3 Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device. When the target is not busy and the PAUSE time is expired, it will send another PAUSE frame with zero time-to-wait to source device. After the source device receives the PAUSE frame, it will again transmit frames immediately.
Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame.
Bits 11-0 VID (VLAN Identifier) 0x000: Null VID. No VID is present and only user priority is present. 0x001: Default VID 0xFFF: Reserved Note: RIF is used in Token Ring network to provide source routing and comprises two fields, Routing Control and Route Descriptor. When MAC parses the received frame and finds a reserved special value 0x8100 at the location of the Length/Type field of the normal non-VLAN frame, it will interpret the received frame as a tagged VLAN frame.
collision. The arbitrator will arbitrate who should gain the media. The arbitrator is a distributed mechanism in which all stations contend to gain the media. Please refer to “What’s the Ethernet” for more details. In the figure listed below, assumed in half duplex, you will see some ports of the switch are linked to a shared HUB, which connects many hosts, and some ports just are individually linked to a single host.
The switch port can run at different speed, such as 10Mbps, 100Mbps or 1000Mbps. A shared hub cannot afford this. Extended Distance Limitations: Traffic aggregation is to aggregate the bandwidth of more than one port and treat it as a single port in the LAN. This single port possesses the features of a normal port but loading balance. This is a great feature for the port needing more bandwidth but cannot afford paying much cost for high bandwidth port. (* The switch image is sample only.
the traffic using that entry has yet come for a while. If this time period is more than the aging time, the entry will be marked invalid. The vacancy is now available for other new MAC. Both learning and forwarding are the most important functions in a switch. Besides that, VLAN can be one of the rules to forward the packet. There are ingress rule and egress rule applied.
In the figure above, all stations are within the same broadcast domain. For these stations, it is obviously that the traffic is getting congested while adding more stations on it. With the more and more users joining the LAN, broadcast traffic will rapidly decrease the performance of the network. Finally, the network may get down. (* The switch image is sample only.) Now we apply VLAN technology to configure the system shown as the figure above.
others. This helps us configure the network easily according to the criteria needed, for example, financial, accounting, R&D and whatever you think it necessary. You can also easily move a user to a different location or join a new user somewhere in the building to VLAN. Without VLAN, it is very hard to do. Basically, VLAN can afford offering at least 3 benefits: move and change users, reduce broadcast traffic and increase performance, Security.
Untagged frame: An Ethernet frame carries no VLAN tag information. VLAN Identifier: Also referred to as VID. It is used to identify a member whether it belongs to the VLAN group with the VID. The assignable number is 1- 4094. If VID=0, the tagged frame is a priority packet. Both the value of 0 and 4095 also cannot be assigned in VLAN management. Port VLAN Identifier: VLAN identifier of a port. It also can be referred to as PVID.
untagged for a transmitted packet. When a packet is transmitted out, the VLAN bridge checks the port’s egress list. If the VLAN of the packet is on the egress list of the port on which the packet transmits out, the packet will be transmitted with the priority accordingly. If enabled, an egress port will transmit out a tagged packet if the port is connected to a 802.1Q-compliant device. If an egress port is connected to a non-802.
If we plan to deploy four VLANs in an office and use a switch to partition them, we should check which ports belong to which VLAN first. Assuming a 24-port switch is applied. Name VID Port Members Marketing 2 1,2,3,4,5 Service 3 6,7,20,21,22 Sales 4 8,9,10,11,12,13,14,15,16 Administration 1 17,18,19,23,24 Next, assigns IP address to each VLAN. Usually, we use 10.x.x.x as internal IP block. Because there are total four VLANs in the network, we must assign 4 IP blocks to each of them.
1. Public standardized specification 2. No interoperability issue 3. No change to IEEE 802.3 frame format, no change in software and management. 4. Increased bandwidth and availability 5. Load sharing and redundancy 6. Automatic configuration 7. Rapid configuration and reconfiguration 8. Deterministic behavior 9. Low risk of duplication or mis-ordering 10. Support existing IEEE 802.3 MAC Clients 11. Backwards compatibility with aggregation-unaware devices There are also some constraints when applying LACP.
38 VigorSwitch G1260 User’s Guide
Operation of Web-based Management This chapter would introduce how to manage your Web Smart Switch and how to configure the 10/100/1000Mbps TP Ports and Gigabit TP/SFP Fiber dual media ports on the switch via web user interfaces. Web Smart Switch provides 20 fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports. With this facility, you can easily access and monitor the status like MIBs, port activity, and multicast traffic through any ports on the switch.
3.1 Web Management Home Overview After login, System Information would be displayed as the following illustration. This page lists default values and shows you the basic information of the switch, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”. With this information, you will know the software version, MAC address, ports available and so on. It would be helpful while malfunction occurred.
3.2 System 3.2.1 System Information and IP Configuration System configuration is one of the most important functions. Without a proper setting, network administrator would not be able to manage the device. The switch supports manual IP address setting. Function name: System configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, host IP address, host MAC address, active subnet mask, active gateway, and DHCP server.
Firmware version The firmware version in this switch. Hardware Version The hardware version of this switch. MAC address It is the Ethernet MAC address of the management agent in this switch. Serial number The serial number is assigned by the manufacturer. Temperature The Temperature of this switch (near power supply/ near fan Entrance). Voltage The voltage of this switch.(power supply/MAC/PHY) Active IP address The IP address of the switch.
Subnet mask is used to set the subnet mask value, which should be the same value as that of the other devices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual. Default: 255.255.255.0 Fallback Gateway Set an IP address for a gateway to handle those packets that do not meet the routing rules predefined in the device.
3.3 Port 3.3.1 Port Configuration Port Configuration is applied to change the setting of each port. In this configuration function, you can set/reset the following functions. All of them are described in detail below. Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports (TP Ports and Fiber Ports) on the switch. By this function, you can set or reset the values for Mode and Flow Control.
Enable Jumbo Frames This function support jumbo frames of up to 9600 bytes, Just tick the check box () to enable it. Default: disable Power Saving This function supports Power Saving. Default: disable Drop frames after excessive collisions Drop frames after excessive collisions. After an excessive collision, the MAC drop frames might occur. If yes, a frame is dropped after excessive collision. This is IEEE Standard 802.3 half-duplex flow control operation. Link Show link status of this port.
3.4 VLANs The switch supports Tag-based VLAN (802.1q) and Port-based VLAN. Support 256 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management. 3.4.
quite different from port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to determine if it can be forwarded. The switch supports supplement of 802.1q. Each tag-based VLAN you built up must be assigned VLAN name and VLAN ID. Valid VLAN ID is 1-4094. User can create total up to 64 Tag VLAN groups.
3.4.2 VLAN Group – Tag-based Function name: VLAN Group - Tag-based VLAN Configuration Function description: It shows the information of existed Tag-based VLAN Groups, You can also easily create, edit and delete a Tag-based VLAN group by pressing , , and function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID.
Port Member is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box () beside the port x to enable it. Click to have the setting taken effect. VLAN ID Type an ID number for identification. VLAN Configuration List VID - VLAN identifier. Each tag-based VLAN group has a unique VID. It appears only in tag-based and Double-tag mode. Member - Display the selected port members that will apply to such VALN group.
detail. Detailed for Port Configuration Parameter description: Port Display the number of the LAN port in the switch. Ingress Filtering You can check this box to discard other VLAN group packets, but only forward this port joined VLAN group packets. Frame Type Specify a frame type to forward packets. All - Forward all tagged and untagged packets. Tagged Only - Forward tagged packets only and discard untagged packets. PVID Private VLAN ID identifier. Each Private VLAN group has a unique VID.
Trunk - means the outgoing packets must carry VLAN tag header. Access - means the outgoing packets carry no VLAN tag header. If packets have double VLAN tags, one will be dropped and the other will still be left. Hybrid - it is similar to Trunk, and both of them will tag-out. When the port is set to Hybrid, its packets will be untagged out if the VID of the outgoing packets with tag is the same as the one in the field of Untag VID of this port.
3.4.3 VLAN Group - Port-based Function name: VLAN Group - Port-based VLAN Configuration Function description: It shows the information of VLAN Groups, and allows administrators to maintain them by modifying and deleting each VLAN group. User also can add a new VLAN group by inputting a new VLAN name and VLAN ID. If you are in port-based VLAN, it will just show the ID、Member of the existed port-based VLAN group. If you are in tag-based VLAN, it will show the ID、VID、Member of the existed tag-based VLAN group.
Port Members is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box () beside the port x to enable it. Click to have the setting taken effect. VLAN Configuration List VigorSwitch G1260 User’s Guide ID - When you want to edit a VLAN group, you must select the Group ID field. Then, you will enter Tag Base VLAN Group Setting or Port Base VLAN Group Setting page, which depends on your VLAN mode selection.
3.4.4 VLAN Isolation Function name: Port Isolation Configuration Function description: Port Isolation provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair.
3.5 Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle ports by same speed, MAC, and full duplex to be a single logical port, thus the logical port can aggregate the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
3.6 802.1X 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.
While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator exchanges the message to authentication server using EAP encapsulation. Before successfully authenticating, the supplicant can only touch the authenticator to perform authentication message exchange or access the network from the uncontrolled port.
1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage. 2. Initiating a session. Either authenticator or supplicant can initiate the message exchange. If supplicant initiates the process, it sends EAPOL-start packet to the authenticator PAE and authenticator will immediately respond EAP-Request/Identity packet. 3.
Enabled Auto Failure Port Unauthorized Enabled ForceUnauthorized Don’t Care Port Unauthorized Enabled ForceAuthorized Don’t Care Port Authorized Function name: 802.1X Configuration Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1x port security application. Parameter description: Mode IP Address UDP Port Secret Key VigorSwitch G1260 User’s Guide Enable or disable 802.1X function. RADIUS server IP address for authentication.
Port Control This is used to set the operation mode of authorization. There are two type of operation mode supported, Authorized, Auto. Auto - The controlled port is set to be in authorized state or unauthorized state depends on the result of the authentication exchange between the authentication server and the supplicant. Authorized - The controlled port is forced to hold in the authorized state. Force Unauthorized –The controlled port is forced to hold in the unauthorized state.
3.7 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch to constrain multicast traffic by listening to Internet Group Management Protocol (IGMP). After finishing the settings, please press button to start up the function. Parameter description: IGMP Enabled: Just tick the check box ( ) to enable this function. Default: disable.
3.8 Mirroring Function name: Mirror Configuration Function description: Mirror Configuration is provided to monitor the traffic in the network. This switch supports one-port mirror multi-ports. For example, we assume that Port A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the traffic passing through Port A and Port B will be copied to Port C for monitor purpose. Parameter description: Port: Use the drop-down menu to select a mirror port.
QoS Mode - Disabled QoS Mode – 802.1p Each Priority can select any of Queue. In Default, Priority 0 is mapping to Queue normal, Priority 1 is mapping to Queue low, Priority 2 is mapping to Queue low, Priority 3 is mapping to Queue normal, Priority 4 is mapping to Queue medium, Priority 5 is mapping to Queue medium, Priority 6 is mapping to Queue high, and Priority 0 is mapping to Queue high.
Priority. Priority QoS Mode – DSCP In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused. DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet.
DSCP Value (0..63) 64 kinds of priority traffic as mentioned above, user can set up any of Queue (low, normal, medium, high). In default, Priority 0~63 are mapping to High. Priority User can set up any of Queue (low, normal, medium, high). 3.10 Loop Detection Function name: Loop Detection Configuration Function description: The loop detection is used to detect the presence of traffic.
Unlock Time The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action is to shut down the port). Port Display the number of the ports on the switch. State Show the status on the port. Protocol Enabled Controls whether Loop Detection is enabled on this switch port. When Port No is chosen and enable port's Loop detection, the port can detect loop happens and port will be Locked. If Loop did not happen, port maintains Unlocked.
Packet Per Second It is a threshold. When the broadcast packet traffic in a second is higher than the threshold configured, the Broadcast Strom Protection enable. Unlock Time The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action is to shut down the port). Port Display the number of the ports on the switch. State Show the status on the port. Protocol Enabled Controls whether Broadcast Strom Protection is enabled on this switch port.
Parameter description: SNMP enabled The term SNMP enable here is used for the activation or de-activation of SNMP. Default is Disable. Default SNMP function: Disable SNMP Trap destination Set the IP address for the SNMP Trap Host. Community name is used as password for authenticating if the requesting network management unit belongs to the same community group. If they both don’t have the same community name, they don’t belong to the same group.
the user. Port Event The Port Event trap enable here is used for the “Link Up” or “Link Down” of system Event. Default is “Disable”. Other Event The Other Event trap enable here is used for the Authentication failure of system Event. Default is “Disable”. 3.13 Statistics Overview Function name: Statistics Overview for all ports Function description: The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports.
3.14 Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. The window can show all counter information each port at one time. Parameter description: Rx Packets: The counting number of the packet received. Rx Octets: Total received bytes. Rx High Priority Packets: Number of Rx packets classified as high priority. Rx Low Priority Packets: Number of Rx packets classified as low priority.
Tx Broad- and Multicast: Show the counting number of the transmitted broadcast with multicast packet. Tx Error Packets: Show the counting number of the received error packets. Rx 64 Bytes: Number of 64-byte frames in good and bad packets received. Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and bad packets received. Rx 256-511 Bytes: Number of 256 ~ 511-byte frames in good and bad packets received.
3.15 IGMP Status Function name: IGMP Status Function description: Display IGMP status. The window shows VLAN ID for each multicast group. Parameter description: VLAN ID: Show VLAN ID for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted. Queries received: To count the group membership queries received.
it show the leaves number. VLAN ID: Show VLAN ID for each multicast group. Group Address: Display the corresponding IP address for the VLAN ID multicast group. Ports Member: Display the corresponding port number for the VLAN ID multicast group. 3.16 Ping Function name: Ping Configuration Function description: To set up target IP address for ping function and display ping status. Parameter description: Target IP Address Set up a Target IP address to ping.
Received timeouts: Show the timeout of request. Average Response Time (in ms) Show the average response time in milliseconds. NOTE: All the functions should press button to start up after you set up the parameters. 3.17 Warm Restart The device offers many approaches to reboot your switch, such as: power up, hardware reset and software reset. You can press RESET button in the front panel of your switch to reset the device and to retrieve default settings.
configurations including the IP address setting to the factory default, please press the “Mode” button on the front panel. You must press the “Mode” button over 3 seconds to restore the factory default setting. 3.19 Firmware Upgrade Function name: Firmware Upgrade Function description: You can just click Browse button to retrieve the file you want in your system to upgrade your switch.
3.20 Configuration File Transfer Function name: Export/Import Configuration Function description: With this function, user can back up or reload the configuration files of Save As Start or Save As User via TFTP. Parameter description: Import: Import a configuration file stored in the flash. Export: Export the current configuration on switch from Flash.
3.21 Logout In addition to auto logout function we just mentioned in system configuration section, the switch also allows administrators to logout manually by Logout function. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout.
This page is left blank.
Trouble Shooting 4.1 Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 4.2 Q & A 1. Computer A can connect to Computer B, but cannot connect to Computer C through the Managed Switch. The network device of Computer C may fail to work.