IGS-6325-Series User Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 Users Configuration
- 4.2.1.5 Privilege Levels
- 4.2.1.6 NTP Configuration
- 4.2.1.6.1 System Time Correction Manually
- 4.2.1.7 Time Configuration
- 4.2.1.8 UPnP
- 4.2.1.9 DHCP Relay
- 4.2.1.10 DHCP Relay Statistics
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.1.16 Fault Alarm
- 4.2.1.17 Digital Input/Output
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.5 Industrial Protocol
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.3.1 VLAN Overview
- 4.3.3.2 IEEE 802.1Q VLAN
- 4.3.3.3 VLAN Port Configuration
- 4.3.3.4 VLAN Membership Status
- 4.3.3.5 VLAN Port Status
- 4.3.3.6 Private VLAN
- 4.3.3.7 Port Isolation
- 4.3.3.8 VLAN setting example:
- 4.3.3.8.1 Two Separate 802.1Q VLANs
- 4.3.3.8.2 VLAN Trunking between two 802.1Q aware switches
- 4.3.3.8.3 Port Isolate
- 4.3.3.9 MAC-based VLAN
- 4.3.3.10 IP Subnet-based VLAN Membership Configuration
- 4.3.3.11 Protocol-based VLAN
- 4.3.3.12 Protocol-based VLAN Membership
- 4.3.4 Spanning Tree Protocol
- 4.3.5 Multicast
- 4.3.6 MLD Snooping
- 4.3.7 MVR (Multicast VLAN Registration)
- 4.3.8 LLDP
- 4.3.9 MAC Address Table
- 4.3.10 Loop Protection
- 4.3.11 UDLD
- 4.3.12 GVRP
- 4.3.13 PTP
- 4.3.14 Link OAM
- 4.4 Quality of Service
- 4.5 Security
- 4.6 Ring
- 4.7 Maintenance
- 4.8 Power over Ethernet
- 4.9 ONVIF
- 4.10 Routing
- 4.10.1 IP Configuration
- 4.10.2 IP Status
- 4.10.3 Routing Information Base
- 4.10.4 OSPF
- 4.10.4.1 Global Configuration
- 4.10.4.2 Network Area
- 4.10.4.3 Passive Interface
- 4.10.4.4 Stub Area
- 4.10.4.5 Area Authentication
- 4.10.4.6 Area Range
- 4.10.4.7 Interface Configuration
- 4.10.4.8 Virtual Link
- 4.10.4.9 Global Status
- 4.10.4.10 Area Status
- 4.10.4.11 Neighbor Status
- 4.10.4.12 Interface Status
- 4.10.4.13 Configuration Example of OSPFv4
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of IGS-6325 series
169
■ If ingress filtering is enabled (checkbox is checked), frames classified to a
VLAN that the port is not a member of get discarded.
■ If ingress filtering is disabled, frames classified to a VLAN that the port is
not a member of are accepted and forwarded to the switch engine.
However, the port will never transmit frames classified to VLANs that it is not a
member of.
• Ingress Acceptance
Hybrid ports allow for changing the type of frames that are accepted on ingress.
■ Tagged and Untagged
Both tagged and untagged frames are accepted.
■ Tagged Only
Only tagged frames are accepted on ingress. Untagged frames are
discarded.
■ Untagged Only
Only untagged frames are accepted on ingress. Tagged frames are
discarded.
Egress Tagging This option is only available for ports in Hybrid mode. Ports in Trunk and Hybrid
mode may control the tagging of frames on egress.
■ Untag Port VLAN
Frames classified to the Port VLAN are transmitted untagged. Other
frames are transmitted with the relevant tag.
■ Tag All
All frames, whether classified to the Port VLAN or not, are transmitted
with a tag.
■ Untag All
All frames, whether classified to the Port VLAN or not, are transmitted
without a tag.
• Allowed VLANs
Ports in Trunk and Hybrid mode may control which VLANs they are allowed to
become members of. The field's syntax is identical to the syntax used in the
Enabled VLANs field.
By default, a Trunk or Hybrid port will become member of all VLANs, and is
therefore set to 1-4095. The field may be left empty, which means that the port
will not become member of any VLANs.
• Forbidden VLANs
A port may be configured to never be member of one or more VLANs. This is
particularly useful when dynamic VLAN protocols like MVRP and GVRP must be
prevented from dynamically adding ports to VLANs. The trick is to mark such
VLANs as forbidden on the port in question. The syntax is identical to the syntax
used in the Enabled VLANs field.
By default, the field is left blank, which means that the port may become a
member of all possible VLANs.