VigorSwitch G2080 User’s Guide Version: 1.0 Date: 2008/03/06 Copyright 2008 All rights reserved.
Copyright Information Copyright Declarations Copyright 2008 All rights reserved. This publication contains information that is protected by copyright. No part may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without written permission from the copyright holders. Trademarks The following trademarks are used in this document: z Microsoft is a registered trademark of Microsoft Corp.
European Community Declarations Manufacturer: Address: Product: DrayTek Corp. No. 26, Fu Shing Road, HuKou County, HsinChu Industrial Park, Hsin-Chu, Taiwan 303 VigorSwitch Series Device The product conforms to the requirements of Electro-Magnetic Compatibility (EMC) Directive 2004/108/EC by complying with the requirements set forth in EN55022/Class A and EN55024/Class A.
Table of Contents 1 Preface ...............................................................................................................1 1.1 Overview ................................................................................................................................. 1 1.2 Features .................................................................................................................................. 2 1.3 Packing List..............................................................
2.9 Max. Packet Length .............................................................................................................. 58 2.10 DHCP Boot.......................................................................................................................... 58 2.11 VLAN ................................................................................................................................... 59 2.11.1 VLAN Mode .........................................................................
3 Trouble Shooting ........................................................................................... 113 5.1 Resolving No Link Condition................................................................................................113 5.2 Q & A ....................................................................................................................................
1 Preface In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the VigorSwitch G2080 through the built-in CLI and web by RS-232 serial interface and Ethernet ports step-by-step. Many explanations in detail of hardware and software functions are shown as well as the examples of the operation for web-based interface and command-line interface (CLI). 1.1 Overview VigorSwitch G2080, is a standard switch that meets all IEEE 802.
Below shows key features of this device. QoS Support Quality of Service by the IEEE 802.1P standard. There are two priority queue and packet transmission schedule. Spanning Tree Support IEEE 802.1D, IEEE 802.1w (RSTP: Rapid Spanning Tree Protocol) standards. VLAN Support Port-based VLAN and IEEE802.1Q Tag VLAN. Support 256 active VLANs and VLAN ID 1~4094. Port Trunking Support static port trunking and port trunking with IEEE 802.3ad LACP.
z Jumbo frame support z Programmable classifier for QoS (Layer 4/Multimedia) z 8K MAC address and 4K VLAN support (IEEE802.1Q) z Per-port shaping, policing, and Broadcast Storm Control z IEEE802.1Q-in-Q nested VLAN support z Full-duplex flow control (IEEE802.
z Supports remote boot the device through user interface and SNMP z Supports network time synchronization and daylight saving z Supports 120 event log records in the main memory and display on the local console 1.
panel, contains a Power LED, which indicates the power status and 8 ports working status of the switch. LED Explanation LED ACT Color Green Explanation Blinks when CPU is activity SFP7/8 (Gigabit Fiber Port) Green Lit when connection with the remote device is good. Blinks when any traffic is present. Off when module connection is not good.
1.5 Hardware Installation At the beginning, please do first: ¾ Wear a grounding device to avoid the damage from electrostatic discharge ¾ Be sure that power switch is OFF before you insert the power cord to power source 1.5.1 Connecting the SFP Module to the Chassis The optional SFP modules are hot swappable, so you can plug or unplug it before or after powering on. 1. Verify that the SFP module is the right model and conforms to the chassis 2. Slide the module along the slot.
1.5.2 Installing Optional SFP Fiber Transceivers to the switch If you have no modules, please skip this section. 1.5.3 Installing Chassis to a 19-Inch Wiring Closet Rail Caution: Allow a proper spacing and proper air ventilation for the cooling fan at both sides of the chassis. 1. Wear a grounding device for electrostatic discharge. 2. Screw the mounting accessory to the front side of the switch (See Fig. 2-2). 3.
Cabling Requirements for 1000SX/LX SFP Module It is more complex and comprehensive contrast to TP cabling in the fiber media. Basically, there are two categories of fiber, multi mode (MM) and single mode (SM). The later is categorized into several classes by the distance it supports. They are SX, LX, LHX, XD, and ZX. From the viewpoint of connector type, there mainly are LC and BIDI LC.
Sum up all elements’ bit-time delay and the overall bit-time delay of wires/devices must be within Round Trip Delay (bit times) in a half-duplex network segment (collision domain). For full-duplex operation, this will not be applied. You may use the TP-Fiber module to extend the TP node distance over fiber optic and provide the long haul connection. Typical Network Topology in Deployment A hierarchical network with minimum levels of switch may reduce the timing delay between server and client station.
The same VLAN members could not be in different switches. Every VLAN members could not access VLAN members each other. The switch manager has to assign different names for each VLAN groups at one switch. Case 3: Port-based VLAN - 2 VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. VLAN3 members could not access VLAN1, VLAN2 and VLAN4.
1.5.5 Configuring the Management Agent of Switch We offer you three ways to startup the switch management function. They are RS-232 console, CLI, and Web. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures.
Note: The switch’s serial port default settings are listed as follows: 4. Baud rate 57600 Stop bits 1 Data bits 8 Parity N Flow control none When you complete the connection, then press key. The login prompt will be shown on the screen. The default username and password are shown as below: Username = admin Password = admin Additionally, if a user connects VigorSwitch to VigorPro router, he also can access into VigorPro web configuration page to find out External Devices menu item.
Configuring the Management Agent of VigorSwitch G2080 through the Ethernet Port There are three ways to configure and monitor the switch through the switch’s Ethernet port. They are CLI, Web browser and SNMP manager. The user interface for the last one is NMS dependent and does not cover here. We just introduce the first two types of management interface.
the remote site. Please refer to Fig. 2-9 about the switch’s default IP address information. 2. Run web browser and follow the menu. Please refer to Chapter 2.
1.5.6 IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication. Its address structure looks is shown below. It is “classful” because it is split into predefined address classes or categories. Each class has its own network range between the network identifier and host identifier in the 32 bits address.
Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network. We call it Private IP address and list below: Class A 10.0.0.0 --- 10.255.255.255 Class B 172.16.0.0 --- 172.31.255.
In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result. Prefix Length No. of IP matched No.
First, IP Address: as shown above, enter “192.168.1.1”, for instance. For sure, an IP address such as 192.168.1.x must be set on your PC. Second, Subnet Mask: as shown above, enter “255.255.255.0”. Any subnet mask such as 255.255.255.x is allowable in this case. DNS: The Domain Name Server translates human readable machine name to IP address. Every machine on the Internet has a unique IP address. A server generally has a static IP address.
It is a system wide basic reference connection diagram. This diagram demonstrates how the switch connects with other network devices and hosts.
¾ 20 Office network VigorSwitch G2080 User’s Guide
2 Operation of Web-based Management This chapter instructs you how to configure and manage the switch through the web user interface it supports, to access and manage the 6-Port 10/100/1000Mbps TP and 2-Port Gigabit TP/SFP Fiber management Ethernet switch.
2.1 Web Management Home Overview After you login, the switch shows you the system information. This page is default and tells you the basic information of the system, including “Model Name”, “System Description”, “Location”, “Contact”, “Device Name”, “System Up Time”, “Current Time”, “BIOS Version”, “Firmware Version”, “Hardware-Mechanical Version”, “Serial Number”, “Host IP Address”, “Host Mac Address”, “Device Port”, “RAM Size” and “Flash Size”.
When clicking the port on the front panel, an information window for the port will be pop out. It shows the basic information of the clicked port. With this, you’ll see the information about the port status, traffic status and bandwidth rating for egress and ingress respectively. On the left-top corner, there is a pull-down list for Auto Logout. For the sake of security, we provide auto-logout function to protect you from illegal user as you are leaving.
2.1.2 System Information Function name: System Information Function description: Show the basic system information. Parameter description: 24 Model name: The model name of this device. System description: As it is, this tells what this device is. Here, it is “L2 Managed Switch”. Location: Basically, it is the location where this switch is put. User-defined. Contact: For easily managing and maintaining device, you may write down the contact person and phone here for getting help soon.
Device name: The name of the switch, User-defined. Default is VigorSwitch G2080. System up time: The time accumulated since this switch is powered up. Its format is day, hour, minute, second. Current time: Show the system time of the switch. Its format: day of week, month, day, hours: minutes: seconds, year. For instance, Wed, Apr. 23, 12:10:10, 2004. BIOS version: The version of the BIOS in this switch. Firmware version: The firmware version in this switch.
Function name: IP Configuration Function description: Set IP address, subnet mask, default gateway and DNS for the switch. Parameter description: DHCP Setting: DHCP is the abbreviation of Dynamic Host Configuration Protocol. Here DHCP means a switch to turn ON or OFF the function. The switch supports DHCP client used to get an IP address automatically if you set this function “Enable”. When enabled, the switch will issue the request to the DHCP server resided in the network to get an IP address.
Subnet mask: Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address, composed of Network address and Host address, otherwise can’t communicate with other devices each other. But unfortunately, the network classes A, B, and C are all too large to fit for almost all networks, hence, subnet mask is introduced to solve this problem.
2.1.4 Time Configuration The switch provides manual and automatic ways to set the system time via NTP. Manual setting is simple and you just input “Year”, “Month”, “Day”, “Hour”, “Minute” and “Second” within the valid value range indicated in each item. If you input an invalid value, for example, 61 in minute, the switch will clamp the figure to 59. NTP is a well-known protocol used to synchronize the clock of the switch system time over a network.
over the starting time, the system time will be increased one hour after one minute at the time since it passed over. And when the time passes over the ending time, the system time will be decreased one hour after one minute at the time since it passed over. The switch supports valid configurable day light saving time is –5 ~ +5 step one hour. The zero for this parameter means it need not have to adjust current time, equivalent to in-act daylight saving.
2.1.5 Account Configuration In this function, only administrator can create, modify or delete the username and password. Administrator can modify other guest identities’ password without confirming the password but it is necessary to modify the administrator-equivalent identity. Guest-equivalent identity can modify his password only. Please note that you must confirm administrator/guest identity in the field of Authorization in advance before configuring the username and password.
Rule 3) : When only “deny lists” exist, then it will accept all connections, excluding the connection inside of the denying range. Rule 4) : When both “accept and deny” lists exist, then it will deny all connections, excluding the connection inside of the accepting range. Rule 5) : When both “accept and deny” lists exist, then it will deny all connections, excluding the connection inside of the accepting range and NOT inside of the denying range at the same time.
Parameter description: 32 Name: A name is composed of any letter (A-Z, a-z) and digit (0-9) with maximal 8 characters. VID: The switch supports two kinds of options for managed valid VLAN VID, including “Any” and “Custom”. Default is “Any”. When you choose “Custom”, you can fill in VID number. The valid VID range is 1~4094. IP Range: The switch supports two kinds of options for managed valid IP Range, including “Any” and “Custom”. Default is “Any”.
setup and then press button. Of course, the existed entry also can be modified by pressing this button. Delete: Remove the existed entry of Management Security Configuration from the management security table. 2.1.7 Virtual Stack Function name: Virtual Stack Function description: Virtual Stack Management (VSM) is the group management function. Through the proper configuration of this function, switches in the same LAN will be grouped automatically.
Parameter description: State: It is used for the activation or de-activation of VSM. Default is Disable. Role: The role that the switch would like to play in virtual stack. Two types of roles, including master and slave are offered for option. Default is Master. Group ID: It is the group identifier (GID) which signs for VSM. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters. The maximal length is 15 characters 2.
2.2.1 Port Status The function Port Status gathers the information of all ports’ current status and reports it by the order of port number, link status, port state, Auto-Negotiation status, speed/duplex and flow control. An extra media type information for the module ports 7 and 8 is also offered Function name: Port Status Function Description: Report the latest updated status of all ports in this switch.
transmitted and received via this port. When it is disabled, no traffic can be transferred through this port. Port State is configured by user. Default: Enabled. Auto Negotiation: Show the exchange mode of Ethernet MAC. There are two modes supported in the switch. They are auto-negotiation mode “Enabled” and forced mode “Disabled”.
Parameter description of Port 7 and Port 8: Connector Type: Display the connector type, for instance, UTP, SC, ST, LC and so on. Fiber Type: Display the fiber mode, for instance, Multi-Mode, Single-Mode. Tx Central Wavelength: Display the fiber optical transmitting central wavelength, for instance, 850nm, 1310nm, 1550nm and so on. Baud Rate: Display the maximum baud rate of the fiber module supported, for instance, 10M, 100M, 1G and so on.
2.2.2 Port Configuration Port Configuration is applied to change the setting of each port. In this configuration function, you can set/reset the following functions. All of them are described in detail below. Function name: Port Configuration Function description: It is used to set each port’s operation mode. The switch supports 3 parameters for each port. They are state, mode and flow control. Parameter description: State: Set the communication capability of the port is Enabled or Disabled.
In Auto-negotiation mode, no default value. In Forced mode, default value depends on your setting. Flow Control: There are two modes to choose in flow control, including Enable and Disable. If flow control is set Enable, both parties can send PAUSE frame to the transmitting device(s) if the receiving port is too busy to handle. When it is set Disable, there will be no flow control in the port. It drops the packet if too much to handle. Default: Enable.
Rx Packet: The counting number of the packet received. Tx Collision: Number of collisions transmitting frames experienced. Rx Error Packet: Number of bad packets received. 2.2.4 Detail Counter The function of Detail Counter collects any information and provides the counting about the traffic of the port, no matter the packet is good or bad. In the following figure, the window can show only one port counter information at the same time.
Rx High Priority Packets: Number of Rx packets classified as high priority. Rx Low Priority Packets: Number of Rx packets classified as low priority. Rx Broadcast: Show the counting number of the received broadcast packet. Rx Multicast: Show the counting number of the received multicast packet. Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes. Tx High Priority Packets: Number of Tx packets classified as high priority.
Rx Jabber: Number of long frames(according tomax_length register) with invalid CRC. Rx Drops: Frames dropped due to the lack of receiving buffer. Rx Errors: Number of the error packet received. Tx Collisions: Number of collisions transmitting frames experienced. Tx Drops: Number of frames dropped due to excessive collision, late collision, or frame aging. Tx FIFO Drops: Number of frames dropped due to the lack of transmitting buffer. 2.
2.4 Bandwidth Management Function name: Bandwidth Management Function description: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for each port. Note: Each port of the switch owns 16KB packet buffer. The packet buffer size will be reduced when the bandwidth rate limitation is enabled, which may cause that jumbo frame cannot be forwarded. Please avoid enabling jumbo frame and bandwidth rating functions at the same time.
packet limits to unicast, broadcast and multicast. Valid range is 0~1000. 2.5 QoS(Quality of Service) Configuration The switch offers powerful 5 kinds of QoS functions. There are Per Port Priority that you can assign each port to different precedence, VLAN Tag priority that can make precedence of 8 priorities, IP TOS Classification, IP TCP/UDP Port Classification and IP DiffServe Classification. In Quality of Service (QoS) Configuration, there is one option named” Default Class”.
2.5.1 Per Port Priority Function name: Per Port Priority Function description: We can assign QoS Priority, including High and Low for each port. For example, if we transmit IP packets from Port 2 and Port 3 at the speed of 1Gbps to Port 1, and set the Class of Port 2 as High and Port 3 as Low, then the packets of Port 3 will be dropped when the congestion happens because Port 2 owns higher precedence of transmitting packets.
2.5.2 VLAN Tag Priority Function name: VLAN Tag Priority Function description: In vlan tag, there are 3 bits belonging to priority. According to these 3 bits, we could arrange 8 traffics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. We can set High priority or Low priority for each traffic class. For instance, if we let VLAN-tagged priority 0 0 0 be high priority and VLAN-tagged priority 0 0 1 be Low Priority, and then make port 1, 2, 3 be in the vlan 2.
2.5.3 IP ToS Classification Function name: IP ToS Classification Function description: Another QoS function is the application of Layer 3 on network framework. We focus on TOS field of IP header. There are three bits in TOS field. We means bit 5~7 of TOS field that we will use. According to these 3 bits, we could arrange 8 traffics –0 0 0, 0 0 1, 0 1 0, 0 1 1, 1 0 0, 1 0 1, 1 1 0, 1 1 1. As long as we change bit 5~7 of TOS field of IP header, we will create the 8 traffic packets we meant before.
2.5.4 IP TCP/UDP Port Classification Function name: IP TCP/UDP Port Classification Function description: In L4 QoS Configuration, you can enter one of these special network transmission events, for example we use” Down prioritize web browsing, e-mail, FTP and news “L4 QoS Configuration and click button, and then click >> button.
other special L4 QoS events, Special TCP/UDP port number will be took action. Of course, user could be allowed to add or modify the port number at random. For instance, if we choose “Down prioritize web browsing, e-mail, FTP and news” as the QoS of L4 and enter the “Advanced Mode”, then we can see that some special port number 80, 280, 443, 25, 110, 20, 21, 69, 119, 2009 have been configured already. User also has the right to modify these port numbers. The display is shown as below.
Simple Mode: Press button is to return to the screen that all L4 port number will disappear 2.5.5 IP Diffserv Classification Function name: IP Diffserv Classification Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused.
2.6 Loop Detection Function name: Loop Detection Function description: The switch will send out looping detection frame to detect the ports on the switch whether they have looping traffic happen. When the switch port receives the looping detection frame from itself, it means there is looping happen in the network. The looping ports will be locked to avoid the looping storm causing all traffic be blocked. Parameter description: Port: User can set up the port (1~8) respectively to set loop detection.
2.7 SNMP Configuration Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
access the device with different community name via SNMP protocol; If they both have the same community name, they can talk each other. Community name is user-definable with a maximum length of 15 characters and is case sensitive. There is not allowed to put any blank in the community name string. Any printable character is allowable. The community name for each function works independently. Each function has its own community name.
54 VigorSwitch G2080 User’s Guide
2.8 IGMP Snooping The function, IGMP Snooping, is used to establish the multicast groups to forward the multicast packet to the member ports, and, in nature, avoids wasting the bandwidth while IP multicast packets are running over the network. This is because a switch that does not support IGMP or IGMP Snooping can not tell the multicast packet from the broadcast packet, so it can only treat them all as the broadcast packet.
Default: Disable Active In Active mode, IGMP snooping switch will periodically issue the Membership Query message to all hosts attached to it and gather the Membership report message to update the database of the Multicast table. By the way, this also reduces the unnecessary multicast traffic. Passive In Passive Snooping mode, the IGMP snooping will not periodically poll the hosts in the groups.
Custom – Use “Custom” to specify IP multicast address range for allowed IP multicast group setting. The IGMP register behavior, it will be according to the allowed IP multicast group list to do limitation. Only allowed IP multicast group can do IGMP registration successfully. VID: Any ”Any” means without VID limitation for the allowed IP multicast group, it can belong any VID for IGMP registration. Custom – Use “Custom” to specify VID for the allowed IP multicast group.
2.9 Max. Packet Length Function name: Max. Packet Length Function description: The switch is capable of dealing with 9k Jumbo Frames, which suits the transmission for a large amount of data in the network environment. Parameter description: Max. Frame Size (bytes): Set up the maximum length of the packet that each port of the switch can accept. Maximum length can be up to 1532 bytes or 9208 bytes. The default is 1532 bytes. 2.
2.11 VLAN The switch supports Tag-based VLAN (802.1q) and Port-based VLAN. Support 256 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management. 2.11.
then you cannot talk to them. Each port-based VLAN you built up must be assigned a group name. This switch can support up to maximal 8 port-based VLAN groups. Tag-based Tag-based VLAN identifies its member by VID. This is quite different from port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to determine if it can be forwarded. The switch supports supplement of 802.1q.
2.11.2 Tag-based Group Function name: Tag-based Group Configuration Function description: It shows the information of existed Tag-based VLAN Groups, You can also easily create, edit and delete a Tag-based VLAN group by pressing , and function buttons. User can add a new VLAN group by inputting a new VLAN name and VLAN ID. Parameter description: VLAN Name: The name defined by administrator is associated with a VLAN group. Valid letters are A-Z, a-z, 0-9, “ - “ and “_” characters.
Add Group: Create a new Tag-based VLAN. Input the VLAN name as well as VID, configure the SYM-VLAN function and choose the member by ticking the check box beside the port No., then, press the button to have the setting taken effect. Delete Group: Just press the button to remove the selected group entry from the Tag-based group table.
Edit a group: Just select a group entry and press the button, then you can modify a group’s description, SYM-VLAN and member set. 2.11.3 Port-based Group Function name: Port-based Group Configuration Function description: It shows the information of the existed Port-based VLAN Groups. You can easily create, edit and delete a Port-based VLAN group by pressing , and function buttons. User can add a new VLAN group by inputting a new VLAN name.
Add Group: Create a new Port-based VLAN. Input the VLAN name and choose the member by ticking the check box beside the port No., then, press the button to have the setting taken effect. Delete Group: Just press the button to remove the selected group entry from the Port-based group table.
Edit a group: Just select a group entry and press the button, then you can modify a group‘s description and member set. 2.11.4 Tag Rule Function name: Tag Rule Function description: In VLAN Tag Rule Setting, user can input VID number to each port. The range of VID number is from 1 to 4094. User also can choose ingress filtering rules to each port. There are two ingress filtering rules which can be applied to the switch.
enabled, the switch will check if port 1 is a member of VLAN100. If yes, the received packet is forwarded; otherwise, the received packet is dropped. Rule 2: Drop untagged frame. You can configure a given port to accept all frames (Tagged and Untagged) or just receive tagged frame. If the former is the case, then the packets with tagged or untagged will be processed. If the later is the case, only the packets carrying VLAN tag will be processed, the rest packets will be discarded.
To create a secure VLAN for the switch management interface, all of the management traffic will be sent via an isolated VLAN. This is a security function. It can protect switch management interface, it also can avoid the switch CPU DoS by network attacking. Parameter description: State: EnableThis function is based on tag-based VLAN mode. When this function is enabled, only the tagged packets with this VID can manage the switch. Disable – The management VLAN function default setting is disabled.
68 MAC: Display the MAC address of one entry you selected from the searched MAC entries table. Alias: Set up the Alias for the selected MAC entry. Set Alias: Save the Alias of MAC entry you set up. Search: Find the entry that meets your setup. Previous Page: Move to the previous page. Next Page: Move to the next page. Alias: The Alias of the searched entry. MAC Address: The MAC address of the searched entry. Port: The port that exists in the searched MAC Entry.
2.12.2 MAC Table Maintenance Function Name: MAC Table Maintenance Function Description: This function can allow the user to set up the processing mechanism of MAC Table. An idle MAC address exceeding MAC Address Age-out Time will be removed from the MAC Table. The range of Age-out Time is 10-65535 seconds, and the setup of this time will have no effect on static MAC addresses.
2.12.3 Static Forward Function Name: Static Forward Function Description: Static Forward is a function that allows the user in the static forward table to access a specified port of the switch. Static Forward table associated with a specified port of a switch is set up by manually inputting MAC address and its alias name. When a MAC address is assigned to a specific port, all of the switch’s traffics MAC address will be forwarded to this port.
2.12.4 Static Filter Function name: Static Filter Function Description: Static Filter is a function that denies the packet forwarding if the packet’s MAC Address is listed in the filtering Static Filter table. User can very easily maintain the table by filling in MAC Address, VID (VLAN ID) and Alias fields individually. User also can delete the existed entry by clicking button.
2.12.5 MAC Alias Create/Edit or Delete Function name: MAC Alias Function description: MAC Alias function is used to let you assign MAC address a plain English name. This will help you tell which MAC address belongs to which user in the illegal access report. At the initial time, it shows all pairs of the existed alias name and MAC address. There are three MAC alias functions in this function folder, including MAC Alias Add, MAC Alias Edit and MAC Alias Delete.
2.13 GVRP Configuration GVRP is an application based on Generic Attribute Registration Protocol (GARP), mainly used to automatically and dynamically maintain the group membership information of the VLANs. The GVRP offers the function providing the VLAN registration service through a GARP application. It makes use of GARP Information Declaration (GID) to maintain the ports associated with their attribute database and GARP Information Propagation (GIP) to communicate among switches and end stations.
normal registrar, fixed registrar and forbidden registrar, provided for the user’s choice. Normal - It is Normal Registration. The Registrar responds normally to incoming GARP messages. The default setting is Normal. Fixed - It is Registration Fixed. The Registrar ignores all GARP messages, and all members remain in the registered (IN) state. Forbidden - It is Registration Forbidden. The Registrar ignores all GARP messages, and all members remain in the unregistered (EMPTY) state.
2.13.2 GVRP Counter Function name: GVRP Counter Function description: All GVRP counters are mainly divided into Received and Transmitted two categories to let you monitor the GVRP actions. Actually, they are GARP packets. Parameter description: Received: Total GVRP Packets - Total GVRP BPDU is received by the GVRP application. Invalid GVRP Packets - Number of invalid GARP BPDU is received by the GARP application.
76 VigorSwitch G2080 User’s Guide
2.13.3 GVRP Group Information Function name: GVRP Group Information Function description: Show the dynamic group member and their information. Parameter description: VID: VLAN identifier. When GVRP group creates, each dynamic VLAN group owns its VID. Valid range is 1 ~ 4094. Member Port: Those are the members belonging to the same dynamic VLAN group.
2.14.1 STP Status Function name: STP Status Function description: In the Spanning Tree Status, user can read 12 parameters to know STP current status. The 12 parameters’ description is listed in the following table. Parameter description: STP State: Show the current STP Enabled / Disabled status. Default is “Disabled”. Bridge ID: Show switch’s bridge ID which stands for the MAC address of this switch. Bridge Priority: Show this switch’s current bridge priority setting. Default is 32768.
be the exact time it spent but very close to, because the time is eclipsing. Time Since Last Topology Change: Time Since Last Topology Change is the accumulated time in unit of seconds the STP has been since the last STP Topology Change was made. When Topology Change is initiated again, this counter will be reset to 0. And it will also count again once STP topology Change is completed. 2.14.2 STP Configuration The STP, Spanning Tree Protocol, actually includes RSTP.
bridge of the LAN, for example, all other bridges will use the hello time assigned by this switch to communicate with each other. The valid value is 1 ~ 10 in unit of second. Default is 2 seconds. Max. Age: When the GEL2-SW8 is the root bridge, the whole LAN will apply this figure set by this switch as their maximum age time. When a bridge received a BPDU originated from the root bridge and if the message age conveyed in the BPDU exceeds the Max.
2.14.3 STP Port Configuration Function name: STP Port Setting Function description: In the STP Port Setting, one item selection and five parameters settings are offered for user’s setup. User can disable and enable each port by selecting each Port Status item. User also can set “Path Cost” and “Priority” of each port by filling in the desired value and set “Admin Edge Port” and “Admin Point To Point” by selecting the desired item. Parameter description: Port Status: It displays the current state of a port.
Admin Edge Port: If user selects “Yes”, this port will be an edge port. An Edge Port is a port connected to a device that knows nothing about STP or RSTP. Usually, the connected device is an end station. Edge Ports will immediately transit to forwarding state and skip the listening and learning state because the edge ports cannot create bridging loops in the network. This will expedite the convergence. When the link on the edge port toggles, the STP topology keeps unchanged.
2.15 Trunking Configuration The Port Trunking Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
end of a link is strongly recommended. Please also note that low speed links will stay in “not ready” state when using static trunk to aggregate with high speed links. As to system restrictions about the port aggregation function on the switch, in the management point of view, the switch supports maximum 8 trunk groups for LACP and additional 8 trunk groups for Static Trunk. But in the system capability view, only 8 “real trunked” groups are supported.
Passive - A Passive LACP port will not actively send LACPDU out before it receives an LACPDU from its link partner. Aggtr: Aggtr is an abbreviation of “aggregator”. Every port is also an aggregator, and its own aggregator ID is the same as its own Port No. We can regard an aggregator as a representative of a trunking group. Ports with same Group ID and using same trunking method will have the opportunity to aggregate to a particular aggregator port.
2.15.2 Aggregator View Function name: Aggregator View Function description: To display the current port trunking information from the aggregator point of view. Parameter description: 86 Aggregator: It shows the aggregator ID (from 1 to 8) of every port. In fact, every port is also an aggregator, and its own aggregator ID is the same as its own Port No.. Method: Show the method a port uses to aggregate with other ports. Member Ports: Show all member ports of an aggregator (port).
LACP Detail Function name: LACP Detail (LACP Aggregator Detailed Information) Function description: Show the detailed information of the LACP trunking group. Parameter description: Actor: The switch you are watching on. Partner: The peer system from this aggregator’s view. System Priority: Show the System Priority part of a system ID. MAC Address: Show the MAC Address part of a system ID. Port: Show the port number part of an LACP port ID. Key: Show the key value of the aggregator.
2.15.3 LACP System Priority Function name: LACP System Priority Function description: It is used to set the priority part of the LACP system ID. LACP will only aggregate together the ports whose peer link partners are all on a single system. Each system supports LACP will be assigned a globally unique System Identifier for this purpose. A system ID is a 64-bit field comprising a 48-bit MAC Address and 16-bit priority value. The System Priority can be set by the user. Its range is from 1 to 65535.
Supplicant: It is an entity being authenticated by an authenticator. It is used to communicate with the Authenticator PAE (Port Access Entity) by exchanging the authentication message when the Authenticator PAE request to it. Authenticator: An entity facilitates the authentication of the supplicant entity. It controls the state of the port, authorized or unauthorized, according to the result of authentication message exchanged between it and a supplicant PAE.
In the following figure, this is the typical configuration, a single supplicant, an authenticator and an authentication server. B and C is in the internal network, D is Authentication server running RADIUS, switch at the central location acts Authenticator connecting to PC A and A is a PC outside the controlled port, running Supplicant PAE.
The figure below shows the procedure of 802.1X authentication. There are steps for the login based on 802.1X port access control management. The protocol used in the right side is EAPOL and the left side is EAP. 1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage. 2. Initiating a session. Either authenticator or supplicant can initiate the message exchange.
connected to the supplicant and under 802.1X control is in the authorized state. The supplicant and other devices connected to this port can access the network. If the authenticator receives a Radius-Access-Reject, it will send an EAP-Failure to the supplicant. This means the supplicant is failed to authenticate. The port it connected is in the unauthorized state, the supplicant and the devices connected to this port won’t be allowed to access the network. 10.
2.16.1 802.1X State Setting Function name: 802.1X State Setting Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1X port security application. Parameter description: Radius Server: RADIUS server IP address for authentication. Default: 192.168.1.1 Port Number: The port number to communicate with RADIUS server for the authentication service. The valid value ranges 1-65535. Default port number is 1812.
2.16.2 802.1X Mode Setting Function name: 802.1X Mode Setting Function description: Set the operation mode of 802.1X for each port. In this device, it supports only Multi-host operation mode. Parameter description: Port Number: Indicate which port is selected to configure the 802.1X operation mode. 802.1X Mode: 802.1X operation mode. There are two options, including Disable and Multi-host mode. Default is Disable. Disable - It will have the chosen port acting as a plain port, that is no 802.
2.16.3 Port Security Management Function name: Port Security Management Function description: Shows each port status. In Multi-host mode, it shows the port number and its status, authorized or unauthorized. Parameter description: Disable Mode: When selecting Disable mode for a port in the function 802.1X Port Mode Configuration, the port is in the uncontrolled port state and does not apply 802.1X authenticator on it. Any node attached on this port can access the network without the admittance of 802.
Function description: This function is used to configure the parameters for each port in 802.1X port security application. Refer to the following parameters description for details. Parameter description: Port: It is the port number to be selected for configuring its associated 802.1X parameters which are Port control, reAuthMax, txPeriod, Quiet Period, reAuthEnabled, reAuthPeriod, max. Request, suppTimeout, serverTimeout and Controlled direction.
VigorSwitch G2080 User’s Guide 97
2.17 Alarm Configuration 3.17.1 Events Configuration Function name: Events Configuration Function description: The Trap Events Configuration function is used to enable the switch to send out the trap information while pre-defined trap events occurred. The switch offers 24 different trap events to users for switch management. The trap information can be sent out in three ways, including email, mobile phone SMS (short message system) and trap.
3.17.2 Email/SMS Configuration Function name: Email/SMS Configuration Function description: Alarm configuration is used to configure the persons who should receive the alarm message via either email or SMS, or both. It depends on your settings. An email address or a mobile phone number has to be set in the web page of alarm configuration (See Fig. 3-60). Then, user can read the trap information from the email or the mobile phone. This function provides 6 email addresses and 6 mobile phone numbers at most.
2.18 Configuration The switch supports three copies of configuration, including the default configuration, working configuration and user configuration for your configuration management. All of them are listed and described below respectively. Default Configuration This is the ex-factory setting and cannot be altered. In Web UI, two restore default functions are offered for the user to restore to the default setting of the switch.
2.18.1 Save/Restore Save As Start Configuration Function name: Save As Start Configuration Function description: Save the current configuration as a start configuration file in flash memory.
Save As User Configuration Function name: Save As User Configuration Function description: Save the current configuration as a user configuration file in flash memory. Restore Default Configuration (includes default IP address) Function name: Restore Default Configuration (includes default IP address) Function description: Restore Default Configuration function can retrieve the ex-factory setting to replace the start configuration. And the IP address of the switch will also be restored to 192.168.1.1.
Restore Default Configuration (excludes current IP address) Function name: Restore Default Configuration (excludes current IP address) Function description: Restore Default Configuration function can retrieve the ex-factory setting to replace the start configuration. However, the switch’s current IP address that the user set up will not be changed and will NOT be restored to 192.168.1.1 as well.
2.18.2 Config File Function name: Config File Function description: With this function, user can back up or reload the config files of Save As Start or Save As User via TFTP. Parameter description: Export File Path: Export Start -Export Save As Start’s config file stored in the flash. Export User-Conf - Export Save As User’s config file stored in the flash. Import File Path: Import Start -Import Save As Start’s config file stored in the flash.
2.19 Diagnostics Three functions, including Diagnostics, Loopback Test and Ping Test are contained in this function folder for device self-diagnostics. 2.19.1 Diagnostics Function name: Diagnostics Function description: Diagnostics function provides a set of basic system diagnosis. It let users know that whether the system is health or needs to be fixed. The basic system check includes EEPROM test, UART test, DRAM test and Flash test.
2.19.2 Loopback Test Function name: Loopback Test Function description: In the Loopback Test function, there are two different loopback tests. One is Internal Loopback Test and the other is External Loopback Test. The former test function will not send the test signal outside the switch box. The test signal only wraps around in the switch box. As to the latter test function, it will send the test signal to its link partner. If you do not have them connected to active network devices, i.e.
Parameter description: IP Address: An IP address with the version of v4, e.g. 192.168.1.1. Default Gateway: IP address of the default gateway. 2.20 TFTP Server Function name: TFTP Server Function description: Set up IP address of TFTP server. Parameter description: Specify the IP address where the TFTP server locates. Fill in the IP address of your TFTP server, then press button to have the setting taken effect.
2.21 Log This function shows the log data. The switch provides system log data for users. There are 19 private trap logs, 5 public trap logs. The switch supports total 120 log entries. For more details on log items, please refer to the section of Trap/Alarm Configuration and SNMP Configuration. Function name: Log Data Function description: The Trap Log Data is displaying the log items including all SNMP Private Trap events, SNMP Public traps and user logs occurred in the system. In the report table, No.
2.22 Firmware Upgrade Software upgrade tool is used to help upgrade the software function in order to fix or improve the function. The switch provides a TFTP client for software upgrade. This can be done through Ethernet. Function name: Firmware Upgrade Function description: The switch supports TFTP upgrade tool for upgrading software. If you assure to upgrade software to a newer version one, you must follow two procedures: 1. Specifying the IP address where TFTP server locates.
2.23 Reboot We offer you many ways to reboot the switch, including power up, hardware reset and software reset. You can press the RESET button in the front panel to reset the switch. After upgrading software, changing IP configuration or changing VLAN mode configuration, then you must reboot to have the new configuration taken effect. Here we are discussing is software reset for the “reboot” in the main menu. Function name: Reboot Function description: Reboot the switch.
Auto Logout: VigorSwitch G2080 User’s Guide Default is ON. If it is “ON”, and no action and no key is stroke as well in any function screen more than 3 minutes, the switch will have you logout automatically.
112 VigorSwitch G2080 User’s Guide
3 Trouble Shooting This section will guide you to solve abnormal situations if you cannot access into the Internet after installing the device and finishing the web configuration. Please follow sections below to check your basic installation status stage by stage. z Checking if the hardware status is OK or not. z Checking if the network connection settings on your computer are OK or not. z Pinging the device from your computer. z Checking if the ISP settings are OK or not.
¾ Check the RS-232 cable is connected well on the console port of the Managed Switch and COM port of PC. ¾ Check if the COM of the PC is enabled. 4. How to configure the Managed Switch? The “Hyperterm” is the terminal program in Win95/98/NT. Users can also use any other terminal programs in Linux/Unix to configure the Managed Switch. Please refer to the user guide of that terminal program.