Manual
Table Of Contents
- 1. INTRODUTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main WEB PAGE
- 4.2 System
- 4.3 Simple Network Management Protocol
- 4.4 Port Management
- 4.5 Link Aggregation
- 4.6 VLAN
- 4.7 Rapid Spanning Tree Protocol
- 4.8 Quality of Service
- 4.9 Multicast
- 4.10 IEEE 802.1X Network Access Control
- 4.10.1 Understanding IEEE 802.1X Port-Based Authentication
- 4.10.2 802.1X System Configuration
- 4.10.3 802.1X and MAC-Based Authentication Port Configuration
- 4.10.4 802.1X Port Status
- 4.10.5 802.1X and MAC-Based Authentication Statistics
- 4.10.6 Windows Platform RADIUS Server Configuration
- 4.10.7 802.1X Client Configuration
- 4.11 Access Control Lists
- 4.12 Address Table
- 4.13 Port Security (To be Continued)
- 4.14 LLDP
- 4.15 Network Diagnastics
- 4.16 Stacking – SGSW-24040 / SGSW-24040R
- 4.17 Power over Ethernet (SGSW-24040P / SGSW-24040P4)
- 5. COMMAND LINE INTERFACE
- 6. Command Line Mode
- 6.1 System Command
- 6.2 Port Management Command
- 6.3 Link Aggregation Command
- 6.4 VLAN Configuration Command
- 6.5 Spanning Tree Protocol Command
- 6.6 Multicast Configuration Command
- 6.7 Quality of Service Command
- 6.8 802.1x Port Access Control Command
- 6.9 Access Control List Command
- 6.10 MAC Address Table Command
- 6.11 LLDP Command
- 6.12 Stack Management Command
- 6.13 Power over Ethernet Command
- 7. SWITCH OPERATION
- 8. POWER OVER ETHERNET OVERVIEW
- 9. TROUBLE SHOOTING
- APPENDEX A
- APPENDEX B : GLOSSARY

User’s Manual of WGSW-24040 Series
SGSW-24040/24240 Series
320
Optional TLVs.
A LLDP frame contains multiple TLVs
For some TLVs it is configurable if the switch shall include the TLV in the LLDP frame. These TLVs are known as
optional TLVs. If an optional TLVs is disabled the corresponding information is not included in the LLDP frame.
P
PING
ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to
generate a response from that computer. The other computer responds with an acknowledgment that it received the
packets. Ping was created to verify whether a specific computer on a network or the Internet exists and is connected.
ping uses Internet Control Message Protocol (ICMP) packets. The PING Request is the packet from the origin
computer, and the PING Reply is the packet response from the target.
Policer
A policer can limit the bandwidth of received frames. It is located in front of the ingress queue.
POP3
POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve email messages from
a mail server.
POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some
implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be
thought of as a "store-and-forward" service.
An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user with more capabilities for
retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file
server.
POP and IMAP deal with the receiving of e-mail and are not to be confused with the Simple Mail Transfer Protocol
(SMTP). You send e-mail with SMTP, and a mail handler receives it on your recipient's behalf. Then the mail is read
using POP or IMAP. IMAP4 and POP3 are the two most prevalent Internet standard protocols for e-mail retrieval.
Virtually all modern e-mail clients and servers support both.
Private VLAN
In a private VLAN, communication between ports in that private VLAN is not permitted. A VLAN can be configured as a
private VLAN.
Q