User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 Users Configuration
- 4.2.1.5 Privilege Levels
- 4.2.1.6 NTP Configuration
- 4.2.1.6.1 System Time Correction Manually
- 4.2.1.7 Time Configuration
- 4.2.1.8 UPnP
- 4.2.1.9 DHCP Relay
- 4.2.1.10 DHCP Relay Statistics
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.5 Remote Management
- 4.2.6 Power Management
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.3.1 VLAN Overview
- 4.3.3.2 IEEE 802.1Q VLAN
- 4.3.3.3 VLAN Port Configuration
- 4.3.3.4 VLAN Membership Status
- 4.3.3.5 VLAN Port Status
- 4.3.3.6 Private VLAN
- 4.3.3.7 Port Isolation
- 4.3.3.8 VLAN setting example:
- 4.3.3.8.1 Two Separate 802.1Q VLANs
- 4.3.3.8.2 VLAN Trunking between two 802.1Q aware switches
- 4.3.3.8.3 Port Isolate
- 4.3.3.9 MAC-based VLAN
- 4.3.3.10 IP Subnet-based VLAN Membership Configuration
- 4.3.3.11 Protocol-based VLAN
- 4.3.3.12 Protocol-based VLAN Membership
- 4.3.4 Spanning Tree Protocol
- 4.3.5 Multicast
- 4.3.6 MLD Snooping
- 4.3.7 MVR (Multicast VLAN Registration)
- 4.3.8 LLDP
- 4.3.9 MAC Address Table
- 4.3.10 Loop Protection
- 4.3.11 UDLD
- 4.3.12 GVRP
- 4.3.13 Link OAM
- 4.4 Quality of Service
- 4.5 Security
- 4.6 Power over Ethernet
- 4.7 Ring
- 4.8 ONVIF
- 4.8 Maintenance
- 4.9 Routing
- 4.9.1 IP Configuration
- 4.9.2 IP Status
- 4.9.3 Routing Information Base
- 4.9.4 OSPF
- 4.9.4.1 Global Configuration
- 4.9.4.2 Network Area
- 4.9.4.3 Passive Interface
- 4.9.4.4 Stub Area
- 4.9.4.5 Area Authentication
- 4.9.4.6 Area Range
- 4.9.4.7 Interface Configuration
- 4.9.4.8 Virtual Link
- 4.9.4.9 Global Status
- 4.9.4.10 Area Status
- 4.9.4.11 Neighbor Status
- 4.9.4.12 Interface Status
- 4.9.4.13 Configuration Example of OSPFv4
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of GS-6322 Managed Switch Series
83
SNMP v2c: Set SNMP trap supported version 2c.
SNMP v3: Set SNMP trap supported version 3.
• Trap Community
Indicates the community access string when send SNMP trap packet. The
allowed string length is 0 to 255, and the allowed content is the ASCII characters
from 33 to 126.
• Trap Destination
Address
Indicates the SNMP trap destination address. It allow a valid IP address in dotted
decimal notation ('x.y.z.w').
And it also allow a valid hostname. A valid hostname is a string drawn from the
alphabet (A-Za-z), digits (0-9), dot (.), dash (-). Spaces are not allowed, the first
character must be an alpha character, and the first and last characters must not
be a dot or a dash.
Indicates the SNMP trap destination IPv6 address. IPv6 address is in 128-bit
records represented as eight fields of up to four hexadecimal digits with a colon
separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::'
is a special syntax that can be used as a shorthand way of representing multiple
16-bit groups of contiguous zeros; but it can appear only once. It can also
represent a legally valid IPv4 address. For example, '::192.1.2.34'.
• Trap Destination Port
Indicates the SNMP trap destination port. SNMP Agent will send SNMP message
via this port, the port range is 1~65535.
• Trap Inform Mode
Indicates the SNMP trap inform mode operation. Possible modes are:
Enabled: Enable SNMP trap authentication failure.
Disabled: Disable SNMP trap authentication failure.
• Trap Inform Timeout
(seconds)
Indicates the SNMP trap inform timeout.
The allowed range is 0 to 2147.
• Trap Inform Retry
Times
Indicates the SNMP trap inform retry times.
The allowed range is 0 to 255.
• Trap Probe Security
Engine ID
Indicates the SNMPv3 trap probe security engine ID mode of operation. Possible
values are:
Enabled: Enable SNMP trap probe security engine ID mode of operation.
Disabled: Disable SNMP trap probe security engine ID mode of operation.
• Trap Security Engine
ID
Indicates the SNMP trap security engine ID. SNMPv3 sends traps and informs
using USM for authentication and privacy. A unique engine ID for these traps and
informs is needed. The string must contain an even number(in hexadecimal
format) with number of digits between 10 and 64, but all-zeros and all-'F's are not
allowed.
• Trap Security Name
Indicates the SNMP trap security name. SNMPv3 traps and informs using USM
for authentication and privacy. A unique security name is needed when traps and
informs are enabled.