User's Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web page
- 4.2 System
- 4.2.1 System Information
- 4.2.2 IP Configuration
- 4.2.3 IP Status
- 4.2.4 Users Configuration
- 4.2.5 Privilege Levels
- 4.2.6 NTP Configuration
- 4.2.7 Time Configuration
- 4.2.8 UPnP
- 4.2.9 DHCP Relay
- 4.2.10 DHCP Relay Statistics
- 4.2.11 CPU Load
- 4.2.12 System Log
- 4.2.13 Detailed Log
- 4.2.14 Remote Syslog
- 4.2.15 SMTP Configuration
- 4.2.16 Fault Alarm
- 4.2.17 Web Firmware Upgrade
- 4.2.18 TFTP Firmware Upgrade
- 4.2.19 Save Startup Config
- 4.2.20 Configuration Download
- 4.2.21 Configuration Upload
- 4.2.22 Configuration Activate
- 4.2.23 Configuration Delete
- 4.2.24 Image Select
- 4.2.25 Factory Default
- 4.2.26 System Reboot
- 4.3 Simple Network Management Protocol
- 4.4 Port Management
- 4.5 Link Aggregation
- 4.6 VLAN
- 4.7 Spanning Tree Protocol
- 4.8 Multicast
- 4.8.1 IGMP Snooping
- 4.8.2 Profile Table
- 4.8.3 Address Entry
- 4.8.4 IGMP Snooping Configuration
- 4.8.5 IGMP Snooping VLAN Configuration
- 4.8.6 IGMP Snooping Port Group Filtering
- 4.8.7 IGMP Snooping Status
- 4.8.8 IGMP Group Information
- 4.8.9 IGMPv3 Information
- 4.8.10 MLD Snooping Configuration
- 4.8.11 MLD Snooping VLAN Configuration
- 4.8.12 MLD Snooping Port Group Filtering
- 4.8.13 MLD Snooping Status
- 4.8.14 MLD Group Information
- 4.8.15 MLDv2 Information
- 4.8.16 MVR (Multicast VLAN Registration)
- 4.8.17 MVR Status
- 4.8.18 MVR Groups Information
- 4.8.19 MVR SFM Information
- 4.9 Quality of Service
- 4.9.1 Understanding QoS
- 4.9.2 Port Policing
- 4.9.3 Port Classification
- 4.9.4 Port Scheduler
- 4.9.5 Port Shaping
- 4.9.6 Port Tag Remarking
- 4.9.7 Port DSCP
- 4.9.8 DSCP-based QoS
- 4.9.9 DSCP Translation
- 4.9.10 DSCP Classification
- 4.9.11 QoS Control List
- 4.9.12 QCL Status
- 4.9.13 Storm Control Configuration
- 4.9.14 QoS Statistics
- 4.9.15 Voice VLAN Configuration
- 4.9.16 Voice VLAN OUI Table
- 4.10 Access Control List
- 4.11 Authentication
- 4.11.1 Understanding IEEE 802.1X Port-based Authentication
- 4.11.2 Authentication Configuration
- 4.11.3 Network Access Server Configuration
- 4.11.4 Network Access Overview
- 4.11.5 Network Access Statistics
- 4.11.6 RADIUS
- 4.11.7 TACACS+
- 4.11.8 RADIUS Overview
- 4.11.9 RADIUS Details
- 4.11.10 Windows Platform RADIUS Server Configuration
- 4.11.11 802.1X Client Configuration
- 4.12 Security
- 4.12.1 Port Limit Control
- 4.12.2 Access Management
- 4.12.3 Access Management Statistics
- 4.12.4 HTTPs
- 4.12.5 SSH
- 4.12.6 Port Security Status
- 4.12.7 Port Security Detail
- 4.12.8 DHCP Snooping
- 4.12.9 Snooping Table
- 4.12.10 IP Source Guard Configuration
- 4.12.11 IP Source Guard Static Table
- 4.12.12 Dynamic IP Source Guard Table
- 4.12.13 ARP Inspection
- 4.12.14 ARP Inspection Static Table
- 4.12.15 Dynamic ARP Inspection Table
- 4.13 MAC Address Table
- 4.14 LLDP
- 4.15 Network Diagnostics
- 4.16 Loop Protection
- 4.17 RMON
- 4.18 PTP
- 4.19 Ring
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B: GLOSSARY
User’s Manual of IGS-5227-Series
128
The scenario is described as follows:
Untagged packet entering VLAN 2
1. While [PC-1] transmit an untagged packet enters Port-1, the Industrial Managed Switch will tag it with a VLAN
Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3.
2. [PC-4],[PC-5] and [PC-6] received no packet.
3. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet.
4. While the packet leaves Port-3, it will keep as a tagged packet with VLAN Tag=2.
Tagged packet entering VLAN 2
5. While [PC-3] transmit a tagged packet with VLAN Tag=2 enters Port-3, [PC-1] and [PC-2] will received the packet
through Port-1 and Port-2.
6. While the packet leaves Port-1 and Port-2, it will be stripped away it tag becoming an untagged packet.
Untagged packet entering VLAN 3
1. While [PC-4] transmit an untagged packet enters Port-4, the switch will tag it with a VLAN Tag=3. [PC-5] and
[PC-6] will received the packet through Port-5 and Port-6.
2. While the packet leaves Port-5, it will be stripped away it tag becoming an untagged packet.
3. While the packet leaves Port-6, it will keep as a tagged packet with VLAN Tag=3.
For this example, just set
VLAN Group 1 as default VLAN, but only focus on VLAN 2 and VLAN 3
traffic flows.
Setup steps
1. Add VLAN Group
Add two VLANs – VLAN 2 and VLAN 3
For Type 1-3 in Allowed Access VLANs column, the 1-3 includes VLAN1 and 2 and 3.
Figure 4-6-9: Add VLAN 2 and VLAN 3