KGS-1604 Web Smart 16-Port Gigabit Ethernet Switch User’s Manual DOC.
Web Smart 16-Port Gigabit Ethernet Switch User's Manual Release 1.
Table of Contents Caution ................................................................................................................................. iv Electronic Emission Notices ................................................................................................. iv 1. Introduction .......................................................................................................................2 1-1. Overview of 16-Port GbE Web Smart Switch ........................................
4-3-3. LACP Status .........................................................................................................89 4-3-4. RSTP Status .........................................................................................................90 4-3-5. IGMP Status..........................................................................................................91 4-3-6. Ping Status............................................................................................................
Revision History Release Date Revision 1.02 1.01 1.00 06/28/2007 03/13/2007 02/10/2007 A2 A1 A1 Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
About this user’s manual This user’s manual provides instructions on how to install your Web Smart Switch. This guide also covers management options and detailed explanation about hardware and software functions.
1. Introduction 1-1. Overview of 16-Port GbE Web Smart Switch The 16-port Gigabit Web Smart Switch is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch has 12 10/100/1000Mbps TP ports and 4 Gigabit TP/SFP transceiver slots. It supports console, telnet, http and SNMP interface for switch management. The network administrator can logon the switch to monitor, configure and control each port’s activity.
1-2. Checklist Before you start installing the switch, verify that the package contains the following: ⎯ ⎯ ⎯ ⎯ ⎯ A 12-Port GbE Web Smart Switch Modules (optional) Mounting Accessory (for 19” Rack Shelf) This User's Manual in CD-ROM AC Power Cord Please notify your sales representative immediately if any of the aforementioned items is missing or damaged. 1-3.
• Supports 802.
1-4. View of 16-Port GbE Web Smart Switch Fig. 1-1 Full View of 16-PORT GbE Web Smart Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 12 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional removable modules on the front panel of the switch. LED display area, locating on the left side of the panel, contains a Power LED, which indicates the power status and 16 ports working status of the switch.
• LED Indicators LED POWER Color System LED Green Function Lit when +3.
1-5. View of the Optional Modules In the switch, Port 13~16 includes two types of media --- TP and SFP Fiber (LC, BiDi…); this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function.
2. Installation 2-1. Starting 16-Port GbE Web Smart Switch Up This section describes how to install the Web Smart Switch and its components, and also includes the following information: - Hardware and Cable Installation - Management Station Installation - Software booting and configuration 2-1-1.
• TP Port and Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used. It means you do not have to tell from them, just plug it. ⇒ Use Cat.
2-1-2-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. 2-1-2-2. Cabling Requirements for 1000SX/LX SFP Module It is more complex and comprehensive contrast to TP cabling in the fiber media.
2-1-2-3. Switch Cascading in Topology • Takes the Delay Time into Account Theoretically, the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly. In practice, the network extension (cascading levels & overall diameter) must follow the constraint of the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications, in which the limitations are the timing requirement from physical signals defined by 802.
Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-2). Fig. 2-2 No VLAN Configuration Diagram If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area. Here VLAN area is defined by what VLAN you are using. The switch supports both port-based VLAN and tag-based VLAN. They are different in practical deployment, especially in physical location.
Case 2b: Port-based VLAN (See Fig.2-4). Fig. 2-4 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. 3. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members could not access VLAN1 and VLAN3 members, but they could access VLAN2 members. Case3a: The same VLAN members can be at different switches with the same VID (See Fig. 2-5). Fig.
2-1-3. Configuring the Management Agent of 16-Port GbE Web Smart Switch In the way of web, user is allowed to startup the switch management function. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures.
2-1-3-1. Management through Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. We just introduce the first type of management interface. Web-based UI for the switch is an interface in a highly friendly way. 16-PORT GBE WEB SMART SWITCH Default IP Setting: IP = 192.168.1.1 Subnet Mask = 255.255.255.0 Default Gateway = 192.168.1.254 Assign a reasonable IP address, For example: IP = 192.168.1.100 Subnet Mask = 255.
Fig. 2-7 the Login Screen for Web 2-1-4. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication. Its address structure looks is shown in the Fig. 2-8. It is “classful” because it is split into predefined address classes or categories.
With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24. Each class has its address range described below. Class A: Address is less than 126.255.255.255. There are a total of 126 networks can be defined because the address 0.0.0.0 is reserved for default route and 127.0.
Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network. We call it Private IP address and list below: Class A Class B Class C 10.0.0.0 --- 10.255.255.255 172.16.0.0 --- 172.31.255.
In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result. Prefix Length No. of IP matched No.
For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as default router. Basically, it is a routing policy.
2-2. Typical Applications The 24-Port GbE Web Smart Switch provides auto MDIX on its TP ports and supports fiber types like: LC and BiDi SFP for removable modules on its four slots. For more details on the specification of the switch, please refer to Appendix A. ⎯ ⎯ ⎯ The switch is suitable for the following applications. Central Site/Remote site application is used in carrier or ISP (See Fig. 2-10) Peer-to-peer application is used in two remote offices (See Fig. 2-11) Office network(See Fig.
Fig. 2-11 Peer-to-peer Network Connection Fig.
3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What’s the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980. In 1992, Grand Junction Networks unveiled a new high speed Ethernet with the same characteristic of the original Ethernet but operated at 100Mbps, called Fast Ethernet now.
IEEE 802.2 LLC Data Link Layer IEEE802.3 CSMA/CD MAC IEEE 802.3 PLS CS Physical Layer MII ANSI X3T9.5 PMD IEEE 802.3 MAU Fiber Coaxial/STP/UTP This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model. In this section, we are mainly describing the MAC sub-layer.
Table 3-1 LLC Format The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address. The SSAP address field identifies the specific services indicated by C/R bit (command or response).
Fig. 3-2 SAP Format 3-2. Media Access Control (MAC) MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer. The MAC is belonged to Data Link Layer (Layer 2), the address is defined to be a 48-bit long and locally unique address.
Bit 47 1st byte 2nd byte OUI code 3rd byte 4th byte 5th byte Serial number bit 0 6th byte Table 3-3 Ethernet MAC address The first bit of the first byte in the Destination address (DA) determines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1). So the 48-bit address space is divided into two portions, Unicast and Multicast. The second bit is for global-unique (0) or locally-unique address.
- Destination address (DA) — The DA field is used to identify which network device(s) should receive the packet. It is a unique address. Please see the section of MAC addressing. - Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0. - Length/Type — This field indicates either the number of the data bytes contained in the data field of the frame, or the Ethernet type of data.
How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to detect error; when transmitting data, it performs frame assembly. 2. Performing Media access control. It prepares the initiation jobs for a frame transmission and makes recovery from transmission failure.
Ethernet MAC transmits frames in half-duplex and full-duplex ways. In halfduplex operation mode, the MAC can either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with the half-duplex operation exists only in the same collision domain, the carrier signal needs to spend time to travel to reach the targeted device.
Parameter value/LAN Max. collision domain DTE to DTE Max. collision domain with repeater Slot time Interframe Gap AttemptLimit BackoffLimit JamSize MaxFrameSize MinFrameSize BurstLimit 10Base 100 meters 100Base 1000Base 100 meters for UTP 100 meters for UTP 412 meters for fiber 316 meters for fiber 2500 meters 205 meters 200 meters 512 bit times 9.6us 16 10 32 bits 1518 64 Not applicable 512 bit times 0.96us 16 10 32 bits 1518 64 Not applicable 512 bit times 0.
3-3. Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device. When the target is not busy and the PAUSE time is expired, it will send another PAUSE frame with zero time-to-wait to source device. After the source device receives the PAUSE frame, it will again transmit frames immediately.
Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame.
What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data immediately following the MAC source address. When tagged VLAN is applied, the Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag control information are different in comparison with the basic Ethernet frame. The rest fields are the same.
The maximum length of the extension is equal to the quantity (slotTime minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision. 3-4. How does a switch work? The switch is a layer 2 Ethernet Switch equipped with 16 Gigabit Ethernet ports and 4 optional modules which support Gigabit Ethernet.
Fig.3-5 Collision Domain Extended Distance Limitations: The diameter of a half-duplex LAN segment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using yellow cable is 2500 meters and 185 meters when using coaxial cable. The switch with its per port per collision domain can extend the distance like a bridge does.
Fig. 3-6 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination port(s). Here we introduce some important features of a switch and how they work.
Mac address aging There is a field in MAC address table used to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA. Usually, the age time is programmable. Transmission schedule In most layer 2 switches, the QoS is supported. QoS in a switch must associate a transmission schedule to transmit the packet. This function is much to do with the priority level a packet has.
3-5. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different physical network segments bridged by switches or bridges which attach to end stations in the same broadcast domain. The traffic can reach any station on the same LAN. Beyond this domain, the traffic cannot go without router’s help. This also implies that a LAN is limited.
Fig. 3-8 Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical networks which have their own broadcast domain. The traffic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1 does not flow to VLAN 2 and others.
There are many types of VLAN applied. Most popular is port-based VLAN, tag-based VLAN and protocol-based VLAN. Port-based VLAN Some physical ports are configured as members of a VLAN. All stations attached on these ports can communicate with each other. Tag-based VLAN It identifies the membership by VLAN ID, no matter where the packet comes from. It is also referred to as 802.1Q VLAN. Protocol-based VLAN It identifies the VLAN membership by layer 3 protocol types, for example IPX, Appletalk, IP, etc.
VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification with the value of 0 and priority information. Untagged frame: An Ethernet frame carries no VLAN tag information. VLAN Identifier: Also referred to as VID. It is used to identify a member whether it belongs to the VLAN group with the VID.
Ingress Rule: Each packet received by a VLAN-aware bridge will be classified to a VLAN. The classification rule is described as follows. 1. If the VID of the packet is null VID (VID=0)or this packet is an untagged packet: a. If there are still some other ways(e.g. protocol, MAC address, application, IP-subnet, etc.
How does a Tagged VLAN work? If the ingress filtering is enabled and when a packet is received, VLAN bridge will first check if the VID of the packet presents. 1). If the packet has a non-zero VID, VLAN bridge will apply this VID as the VLAN ID of the packet in the network. 2). For a packet with null tag or no VLAN tag, if VLAN bridge provides rules to decide its VID, then apply this VID to the packet.
3-6. Link Aggregation Basically, Link Aggregation is to aggregate the bandwidth of more than one port to an assigned logical link. This highly increases total bandwidth to the targeted device. There is more than one Link Aggregation technology in many vendors’ switch products already, which may cause the problem of interoperability. This is the reason why now we have 802.3ad Link Aggregation Control Protocol (LACP). Why 802.3ad (LACP)? Network is varying.
Terminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group with a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an independent link. There are three cases of link used in the network, which are switch to switch, switch to station and station to station. Here station may be a host or a router.
4. Operation of Web-based Management This chapter would introduce how to manage your Web Smart Switch and how to configure the 10/100/1000Mbps TP Ports and Gigabit TP/SFP Fiber dual media ports on the switch via web user interfaces. Web Smart Switch provides 12 fixed Gigabit Ethernet TP ports and 4 optional Gigabit dual media ports. With this facility, you can easily access and monitor the status like MIBs, port activity, and multicast traffic through any ports on the switch.
Fig. 4-1 4-1. Web Management Home Overview After login, System Information would be displayed as Fig. 4-2 illustrated. This page lists default values and shows you the basic information of the switch, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”. With this information, you will know the software version, MAC address, ports available and so on. It would be helpful while malfunction occurred.
• The Information of Page Layout ⎯ On the top part of the information page, it shows the front panel of the switch. Linked ports will be displayed in green color, and linked-off ones will be in black. For the optional modules, the slots with no module will only show covered plates, the other slots with installed modules would present modules. The images of modules would depend on the ones you insert. Vice versa, if ports are disconnected, they will show just in black.
4-2. Configuration Configuration includes the following functions: System Configuration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuration, Aggregation, LACP, RSTP, 802.1X, IGMP Snooping, Mirror, QoS, Filter, Rate Limit, Storm Control and SNMP. Configuration System Configuration Ports Configuration VLAN Mode Configuration VLAN Group Configuration Aggregation LACP RSTP 802.
4-2-1. System Configuration System configuration is one of the most important functions. Without a proper setting, network administrator would not be able to manage the device. The switch supports manual IP address setting. Fig. 4-3 Function name: System Configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, active IP address, active subnet mask, active gateway, DHCP server and Lease time left.
Show the active IP address of this switch. Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Server: Show the IP address of the DHCP server. Default: 0.0.0.0 Lease Time Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 characters are allowed in this parameter. Any alphanumeric character and null are acceptable.
32 bits Network ID Host ID Network ID Host ID Subnet number Subnet mask is used to set the subnet mask value, which should be the same value as that of the other devices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual. Default: 255.255.255.0 Fallback Gateway: Set an IP address for a gateway to handle those packets that do not meet the routing rules predefined in the device.
4-2-2. Port Configuration Function name: Port Configuration Function description: Port Configuration is applied for the settings of the ports on the switch. By this function, you can set or reset the values for Mode and Flow Control. Parameter description: Enable Jumbo Frames: This function support jumbo frames of up to 9600 bytes, Just tick the check box (;) to enable it. Default: disable Link: Show link status of this port. Mode: Set the speed and duplex of the port.
Fig.
4-2-3. VLAN Mode Configuration Web Smart Switch supports Port-based VLAN and Tag-based VLAN (802.1q). Its VLAN mode supports 16 active VLANs and the available VLAN ID range is from 1~4094. VLAN configuration is used to divide a LAN into smaller ones. With proper configuration, you can gain not only improved security and increased performance, but also save a lot of VLAN management effort.
based VLAN groups. Fig. 4-5 Select VLAN Mode Fig. 4-6 Metro mode 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the information of VLAN Groups, and allows administrators to maintain them by modifying and deleting each VLAN group. User also can add a new VLAN group by inputting a new VLAN name and VLAN ID. If you are in port-based VLAN, it will just show the ID、Member of the existed port-based VLAN group.
VID: VLAN identifier. Each tag-based VLAN group has a unique VID. It appears only in tag-based mode. Member: In modify function this is used to enable or disable if a port is a member of the new added VLAN, “Enable” means it is a member of the VLAN. Just tick the check box (;) beside the port x to enable it. Fig. 4-7 Port-Based VLAN Configuration Add Group: Create a new port-based VLAN or tag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig.
Delete Group: Just tick the check box (;) beside the ID, then press the button to delete the group. Fig.
4-2-5. Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle ports by same speed, MAC, and full duplex to be a single logical port, thus the logical port can aggregate the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
Function name: LACP Port Configuration Function description: Enable or disable LACP protocol, user is allowed to set the aggregation key value. Parameter description: Protocol Enabled: Just tick the check box (;) to enable LACP protocol then press the button to apply. Key Value: It’s key for an aggregation. This must be an integer value between 1 and 255 or auto select by switch. Fig.
4-2-7. RSTP RSTP detects and resolves network loops, and provides backup links between switches, bridges and routers. The protocol allows a switch to communicate with other RSTP compliant switches, and to ensure only one path existing between two stations in your network environment. The switch allows you to create multiple STP configurations and assign ports to a specific tree.
Function name: RSTP Port Configuration Function description: Enable or disable RSTP protocol on the ports that are selected and set path cost. Parameter description: Protocol Enabled: Just tick the check box (;) beside the port x to enable LACP protocol, then press the button to apply. Edge: Just tick the check box (;) beside the port x to enable edge function. Path Cost: Path cost is the cost of transmitting a frame on to a LAN through that port. It is assigned according to the speed of the bridge.
4-2-8. 802.1X 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.
While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator exchanges the message to authentication server using EAP encapsulation. Before successfully authenticating, the supplicant can only touch the authenticator to perform authentication message exchange or access the network from the uncontrolled port. Fig. 4-13 In the Fig.
1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage. 2. Initiating a session. Either authenticator or supplicant can initiate the message exchange. If supplicant initiates the process, it sends EAPOL-start packet to the authenticator PAE and authenticator will immediately respond EAP-Request/Identity packet. 3.
unauthorized. Fig. 4-15 The 802.1X “Enabled” is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port. 802.1x Port-based Network Access Control function supported by the switch is little bit complex, for it just support basic “Enabled” mode, which can distinguish the device’s MAC address and its VID.
RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to communicate with RADIUS server for the authentication service. The valid value ranges 1-65535. Default port number is 1812. RADIUS Secret: The secret key between authentication server and authenticator. It is a string with the length 1 – 15 characters. The character string may contain upper case, lower case and 0-9. It is character sense.
Fig. 4-16 802.1X Configuration Statistics: Choose the port which you want to show of 802.1X statistics, the screen include Authenticator counters, backend Authenticator counters, dot1x MIB counters and Other statistics. Press the button will fresh the screen and see the newer counters. Fig. 4-17 802.1X Statistics Function name: 802.
often a client has to re-enter his or her username and password to stay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authentication will take place in this port. Default: disable Reauthentication Period (1-65535 s): A non-zero number seconds between the periodic re-authentication of the supplicant. Default: 3600 EAP timeout (1-255 s): A timeout condition in the exchange between the authenticator and the supplicant. The valid range: 1 –255.
4-2-9 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP Snooping lets administrators configure a switch to constrain multicast traffic by listening to Internet Group Management Protocol (IGMP). After finishing the settings, please press button to start up the function. Parameter description: IGMP Enabled: Just tick the check box (;) to enable this function.
Fig.
4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is provided to monitor the traffic in the network. This switch supports one-port mirror multi-ports. For example, we assume that Port A and Port B are Source Ports, and Port C is Mirror Port respectively, thus, the traffic passing through Port A and Port B will be copied to Port C for monitor purpose. Parameter description: Source Port: Set up the port for being monitored.
4-2-11. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make precedence of 8 priorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Fig. 4-21 QoS Configuration Function name: QoS Configuration Function description: While setting QoS function, please select QoS Mode in drop-down menu at first. Then you can use 802.1p Priority and DSCP Priority functions.
to Queue low, Priority 3 is mapping to Queue normal, Priority 4 is mapping to Queue medium, Priority 5 is mapping to Queue medium, Priority 6 is mapping to Queue high, and Priority 0 is mapping to Queue high. Fig. 4-22 802.1p Setting Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS).
Fig.
4-2-12 Filter Function name: Filter Configuration Function description: This function lets administrators easily set management source IP addresses to the ports on the switch. Press button to make change take effect. Parameter description: Source IP Filter: Mode: There are three types of mode in this drop-down menu. Default is disabled. Disabled: Allow all IP network addresses to login to this switch and manage it.
DHCP Server Allowed: Just tick the check box (;) under the port x to allow the DHCP Server on this port and valid port is Port 1~16. Default: enable Fig.
4-2-13 Rate Limit Function name: Ingress and Egress Bandwidth Setting Function description: Ingress and Egress Bandwidth Setting function are used to set up the limit of Ingress or Egress bandwidth for each port. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field. Pause frames are also generated if flow control is enabled.
4-2-14 Storm Control Function name: Storm Control Function description: Storm Control is used to block unnecessary multicast and broadcast frames that reduce switch’s performance. When the function is enabled and Storm Control rate settings are detected as exceeded, the unnecessary frames would be dropped. Fig.4-26 Storm Control Configuration Parameter description: ICMP Rate: To enable the ICMP Storm capability. User can use drop-down menu to select number of frames. Default is No Limit.
To enable the Multicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Flooded unicast Rate: To enable the Flooded unicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. NOTE: After completing the function’s setting, press button to have this function taken effect.
4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
Default SNMP function: Disable Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig.
4-3. Monitoring There are six functions contained in the monitoring function. Monitoring Statistics Overview Detailed Statistics LACP Status RSTP Status IGMP Status Ping 4-3-1. Statistics Overview The function of Statistics Overview collects any information and provides the counting summary about the traffic of the port, no matter the packet is good or bad. In the Fig. 4-25, the window can show all ports’ counter information at the same time.
Tx Errors: Number of bad packets transmitted. Rx Errors: Number of bad packets received. Fig. 4-28 Statistics Overview for all ports 4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. In the Fig. 4-26, the window can show all counter information each port at one time. Parameter description: Rx Packets: The counting number of the packet received. RX Octets: Total received bytes.
Show the counting number of the received broadcast with multicast packet. Rx Error Packets: Show the counting number of the received error packets. Tx Packets: The counting number of the packet transmitted. TX Octets: Total transmitted bytes. Tx High Priority Packets: Number of Tx packets classified as high priority. Tx Low Priority Packets: Number of Tx packets classified as low priority. Tx Broadcast: Show the counting number of the transmitted broadcast packet.
Number of 65 ~ 126-byte frames in good and bad packets transmitted. Tx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and bad packets transmitted. Tx 256-511 Bytes: Number of 256 ~ 511-byte frames in good and bad packets transmitted. Tx 512-1023 Bytes: Number of 512 ~ 1023-byte frames in good and bad packets transmitted. Tx 1024-Bytes: Number of 1024-max_length-byte frames in good and bad packets transmitted. Rx CRC/Alignment: Number of Alignment errors and CRC error packets received.
Fig.
4-3-3. LACP Status Function name: LACP Status Function description: Display LACP status. Fig. 4-30 illustrates that LACP Status window can show LACP information and status for all ports in the same time. Parameter description: LACP Aggregation Overview: Show the group/port status. Default will set to red sign for port link down, user can check legend table below for all reference. LACP Port Status: Group/Port: Show the port number. Normal : as Legend. Fig.
4-3-4. RSTP Status Function name: RSTP Status Function description: Display RSTP status. Fig. 4-28 shows you that RSTP window can present VLAN bridge information and the status of all ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id. Bridge Id: Show this switch’s current bridge priority setting and bridge ID which stands for the MAC address of this switch. Hello Time: Show the current hello time of the root bridge.
4-3-5. IGMP Status Function name: IGMP Status Function description: Display IGMP status. In Fig. 4-29, the window shows VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted. Queries received: To count the group membership queries received.
Fig. 4-32 IGMP Status 4-3-6. Ping Status Function name: Ping Status Function description: To set up target IP address for ping function and display ping status. In Fig. 430, the window shows the ping information. Parameter description: Ping Parameters: Target IP address: Set up a Target IP address to ping. Count: Use drop-down menu to set number of echo requests to send. Four type of number can choose, there are 1, 5, 10 and 20.
Received replies: Show the received replies number of times. Request timeouts: Show the timeout of request. Average Response times (In ms): Show the average response time in milliseconds. Fig.
4-4. Maintenance There are five functions contained in the maintenance function.
4-4-1. Warm Restart Web Smart Switch offers many approaches to reboot your switch, such as: power up, hardware reset and software reset. You can press RESET button in the front panel of your switch to reset the device and to retrieve default settings. After upgrading software, you have to reboot the device to have new configuration take effect. The function being discussed here is software reset. Function name: Warm Restart Function description: Reboot the switch.
4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and replace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed. If you want to restore all configurations including the IP address setting to the factory default, please press the “RESET” button on the front panel.
4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can just click Browse button to retrieve the file you want in your system to upgrade your switch. Fig.
4-4-4. Configuration File Transfer Function name: Configuration File Transfer Function description: You can backup your switch’s configuration file into your computer folder in case accident happens. In addition, uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes. Fig.
4-4-5. Logout In addition to auto logout function we just mentioned in system configuration section, the switch also allows administrators to logout manually by Logout function. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout.
5. Maintenance 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: z The attached device is not powered on z The cable may not be the correct type or is faulty z The installed building premise cable is faulty z The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot connect to Computer C through the 16-Port GbE Web Smart Switch. 9 The network device of Computer C may fail to work.
Appendix A Technical Specifications Features • • • • • • • • • • • • • • • • • • 12 (10/100/1000Mbps) Gigabit Ethernet (TP) switching ports are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. Non-blocking store-and-forward shared-memory Web-Smart switched. Supports auto-negotiation for configuring speed, duplex mode. Supports 802.3x flow control for full-duplex ports.
Hardware Specifications Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.
Diagnostic LED: System LED : Per Port LED: 10/100/1000M TP Port 1 to 16 1000M SFP Fiber Port 13~16 Power Requirement : Power : LINK/ACT, 10/100/1000Mbps : SFP(LINK/ACT) AC Line Voltage : 100∼240 V Frequency : 50∼60 Hz Consumption : 30W Ambient Temperature : 0° to 50°C : 5% to 90% Humidity Dimensions : 44(H) × 442(W) × 209(D) mm Comply with FCC Part 15 Class A & CE Mark Approval 2 103
Management Software Specifications System Configuration VLAN Function Trunk Function Bandwidth Control Quality of Service (QoS) Network Management Auto-negotiation support on 10/100Base-TX ports, Web browser can set transmission speed (10/100Mbps) and operation mode (Full/Half duplex) on each port, enable/disable any port, set VLAN group, set Trunk Connection. Port-Base / 802.1Q-Tagged, allowed up to 24 active VLANs in one switch.
Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below.