User's Manual WGD-800 8-Port 10/100Mbps Managed Ethernet Switch
Trademarks Copyright © PLANET Technology Corp. 2005. Contents subject to which revision without prior notice. PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners.
Table of Contents 1. INTRODUCTION................................................................................................................................. 6 1.1 PACKET CONTENTS ......................................................................................................................... 6 1.2 HOW TO USE THIS MANUAL ............................................................................................................. 6 1.3 PRODUCT FEATURE ............................................
.4.8 Load Default ........................................................................................................................30 4.4.9 Reboot .................................................................................................................................30 4.5 PORT MANAGEMENT ......................................................................................................................30 4.5.1 Port Configuration ...........................................................
6.2 100BASE-TX/10BASE-T PIN ASSIGNMENTS ................................................................................86 7. APPENDIX-B ....................................................................................................................................87 802.1Q VLAN MULTI-UNTAGGED VLAN SETTING SAMPLE 1 ....................................................
1. INTRODUCTION 1.1 Packet Contents Check the contents of your package for following parts: ▫ Ethernet Switch x1 ▫ CD-ROM user's manual x1 ▫ Quick installation guide x1 ▫ 19" rack mounting kit x1 ▫ Power cord x1 ▫ Rubber feet x 4 If any of these are missing or damaged, please contact your dealer immediately, if possible, retain the carton including the original packing material, and use them against to repack the product in case there is a need to return it to us for repair. 1.
▫ Console/Web/SNMP management ▫ Configuration backup and recovery ▫ Per port Ingress/Egress bandwidth restriction ▫ 802.1d Spanning tree, 802.1w Rapid Spanning Tree ▫ Configurable spanning tree aging time, STP port configuration ▫ 4 trunk groups, up to 4 ports per trunk ▫ Port-based/802.1Q VLAN with 4K VLAN ID ▫ MAC Binding/Filtering/Learning, configurable MAC Aging time ▫ 8 mappings ID to 4 priority queues, Support MAC/VLAN/802.
Management Interface Console/Web/Telnet/SNMP SNMP Version v1, v2c Support MIB Support SNMP MIBⅡ(RFC 1213), Bridge MIB (RFC 1493), RMON group 1,2,3,9 Enterprise private MIB Standard Compliance Network Standard IEEE802.3 10Base-T IEEE802.3u 100Base-TX IEEE802.3x Flow Control and Back pressure IEEE802.3ad Port trunk with LACP IEEE802.1d Spanning tree protocol IEEE802.1w Rapid Spanning Tree IEEE802.1p Class of service IEEE802.1Q VLAN Tagging IEEE802.
2. INSTALLATION This section describes the functionalities of the Switch's components and guides how to install it on the desktop or shelf. Basic knowledge of networking is assumed. Please read this chapter completely before continuing. 2.1 Product Description 2.1.1 Product Overview With 8-Port 10/100Mbps TP, the PLANET WSD-800 boasts a high performance switch architecture that is capable of providing non-blocking switch fabric and wire-speed throughput as high as 1.6Gbps.
2.1.4 Switch Rear Panel Figure 2-2 shows the rear panel of the switch Figure 2-2 WSD-800 rear panel. Power Notice: 1. The device is a power-required device, it means, it will not work till it is powered. If your networks should active all the time, please consider using UPS (Uninterrupted Power Supply) for your device. It will prevent you from network data loss or network downtime. 2.
When the switch receives power, the Power LED should remain solid Green. 2.2.2 Rack Mounting To install the switch in a 19-inch standard rack, please follows the instructions described below. Step1: Place the switch on a hard flat surface, with the front panel positioned towards the front side. Step2: Attach the rack-mount bracket to each side of the switch with supplied screws attached to the package. Figure 2-5 shows how to attach brackets to one side of the switch.
3. CONSOLE MANAGEMENT 3.1 Connecting to the Switch The console port is a female DB-9 connector that enables a connection to a PC or terminal for monitoring and configuring the Switch. Use the supplied RS-232 cable with a male DB-9 connector to connect a terminal or PC to the Console port. The Console configuration (out of band) allows you to set Switch for remote terminal as if the console terminal were directly connected to it. 3.
“enable” for further configuration. The system needs password for further configuration. After the “enable” command, the system asks for password, please enter “admin” for the default password. As shows in the following screen: Console login screen 3.3 Console Management Entering a question mark "?" at the prompt displays the list of commands available for command mode.
3.4 Telnet login The switch also supports telnet for remote management. The switch asks for user name and password for remote login when using telnet, please use “admin” for username and “admin” for password. 3.5 Commands There are two levels for console commands. The first level provides commands to show system informations and current configurations. The second level (privileged mode) provides commands to set, clear and show the configuration. 3.5.
show port state Show port infomation show port storm-limit Show port storm limit mode and rate show qos map cos-queue-map Show qos map cos-queue-map show qos map dot1p-cos-map Show qos map cos-queue-map show qos map mac-cos-map Show qos map mac-cos-map show qos map port-cos-map Show each port's cos show qos map vlan-cos-map Show qos map vlan-cos-map show qos queue egress-policy Show qos queue egress-policy show radius Show radius information show security MAC-aging Show MAC aging time sh
clear mirror monitored-port ingress Clear ingress monitored port for mirror clear multicast router Clear router port clear port counters Clear port statistics counter clear port rate-shaping Clear rate-shaping of all ports clear port spantree portcost Restore spanning tree port cost to default value clear port spantree portpri Restore spanning tree port priority to default value clear port storm-limit Clear strom limit of all ports clear qos map cos-queue-map Reset cos-queue map to default c
copy config flash Copy system configuration parameters to flash 3.5.2.3 Disable command Disable command is to exit the privileged mode and back to the first level of command line interface. Command Description Disable Disable privileged mode 3.5.2.4 Reboot command Reboot command is to reboot the switch, please beware to check if the configuration is saved.. Command Description Reboot Reboot system 3.5.2.5 Set command Set command is to change the parameter of the switch functions.
set igmp-snooping group number Set number of goups that a port can join in set igmp-snooping group policy Set igmp-snooping group policy set igmp-snooping immediate-leave Disable & Enable igmp snooping immediate-leave set igmp-snooping policy deny Set igmp snooping policy deny set ip http server disable Disable http server set ip http server enable Enable http server set ip telnet server disable Disable telnet server set ip telnet server enable Enable telnet server set ipstack enable Set ip
set qos map cos-queue-map Set the queue number of each cos set qos map dot1p-cos-map Set the cos value of each dot1p priority set qos map mac-cos-map Set MAC based qos set qos map port-cos-map Set port's cos set qos map vlan-cos-map Set vlan based qos set qos queue egress-policy Set the egress policy set radius key Set share key for radius server set radius server Set radius server parameters set rstp force-version Set RSTP force version set security MAC-aging Set MAC aging time set secu
set snmp trap Set snmp trap receive host set spantree disable Disable spanning tree 3.5.2.6 Show command Show command is to display the current parameter of the switch functions. The follow table lists the show commands and the equivalent usages.
show security mac-learning Show port security status show security static-MAC Show static mac table information show snmp Show snmp information show snmp rmon Show snmp rmon state show spantree Show spanning tree information show syntax Show basic help infomation show system Show system information show trunk Show trunk information show version Get last software version show vlan Show vlan information show vlan type Show current vlan type
4. WEB-BASED MANAGEMENT This section introduces the configuration and functions of the Web-Based management. 4.1 About Web-based Management The switch offers management features that allow users to manage the switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-Based Management supports Internet Explorer 5.0. It is based on Java Applets with an aim to reduce network bandwidth consumption, enhance access speed and present an easy viewing screen.
WSD-800 Web Management Interface 4.4 System 4.4.1 IP Configuration The switch can be managed by the Web/Telnet/SNMP interfaces. Administrators can access the management interface via the IP address of the switch. The default IP address of the switch is 192.168.0.100. You can change the IP address to be in the same IP segment as your LAN network for convinence. To change the IP address, click on the System/IP Address menu button. The IP address configuration screen then shows in the main page on the web.
1. The Switch’s factory-default IP address is 192.168.0.100 with Submask 255.255.255.0 and a default gateway of 192.168.0.254 2. The changed IP address take effect immediately after click on the OK button, you need to use the new IP address to access the Web interface. 3. The changed IP address remains the original after reboot the switch unless the configuration is saved. To save the changed IP address, please move to System/Saving Parameters menu. 4.4.2 SNMP 4.4.2.
to one of its communities. SNMP default communities are: 。 Write = private 。 Read = public 4.2.2.2 SNMP Configuration To configure SNMP management, click on System/SNMP menu button, and the web main page changes to the SNMP Management function, as shows in the following: The followings are the description of the sub-table. 1. SNMP Agent Status Configuration This block enables to turn on SNMP Agent. Enabled / Disabled: To turn on or turn off the SNMP function on the Switch. 2.
。 Contact: The contact person of the switch which would show in the SNMP software. Fill the fileds and click on the “OK” button to save. 3. Community Configuration Use this table to configure the SNMP community strings and define the policy of the relative string. The community string acts like a password to permit access to the agent on the Switch.
A trap manager is a management station (SNMP application) that receives traps (the system alerts generated by the switch). If no trap manager is defined, no traps are issued. Create a trap manager by entering the IP address of the station and a community string. 。 Enter Network management stations IP address: 192.168.0.53 (for example) 。 Trap Community: must be the same string as “Add community” Then click on “Add” button. The “Current Management Stations” field shows the trap list. 4.4.
4.4.4 CONSOLE This function shows the connection parameters for the Console Management Interface. Click on the System/CONSOLE menu button, and the following table shows in the main page of the web. 4.4.5 System Upgrade This function allows performing firmware update from the web interface. Click on the System/System Upgrade menu button, and the following table shows in the main page of the web.
CAUTION: Do not power off the switch until the update progress is complete. 4.4.6 Saving Parameters It takes effect immediately when you change the parameters of the management function when the switch is running. But the parameters would not be saved after reboot the swith. To keep the changed parameters, Click on the System/Saving Parameters menu button, and click on the “Save” button on the web main page as show in the following. 4.4.
4.4.8 Load Default This function is to reset the configuration of switch to the factory default. Click on the System/Load Default menu button, and the following table shows in the web main page. CAUTION: This operation will result in all the parameters losing. 4.4.9 Reboot This function is to reboot the system. 4.5 Port Management 4.5.1 Port Configuration This function is to configure and to view the configured port management status, port negotiation mode and the port flow control function.
4.5.2 Port Statistics The Port Statistics page provides a view of the current status of every port on the Switch. Pressing the “Reset” button will reset all port counters to zero. 4.5.3 Port Band Restrict The function provides the In-Band and Out-Band connection speed restriction on the ports. The Band of the connection speed rangs from 64Kbps to 80000Kbps. Ingress Port List/Egress Port List field can be filled in distinct number or a port range.
Due to the Chipset limition, set the band rate large then 500Kbps at In-Band Restrict field. NOTICE: If this value is less than 500Kbps and the packet will drop on that time. And please also be remined, enable flow control at specific port is required. 4.6 Redundancy 4.6.1 Spanning Tree 1. Spanning Tree Protocol The IEEE 802.1D Spanning Tree Protocol and IEEE 802.1W Rapid Spanning Tree Protocol allow for the blocking of links between switches that form loops within the network.
。 Creates a single spanning tree from any combination of switching or bridging elements. 。 Creates multiple spanning trees – from any combination of ports contained within a single switch, in user specified groups. 。 Automatically reconfigures the spanning tree to compensate for the failure, addition, or removal of any element in the tree. 。 Reconfigures the spanning tree without operator intervention.
loops. Ports must wait for new network topology information to propagate throughout the network before starting to forward packets. They must also wait for the packet lifetime to expire for BPDU packets that were forwarded based on the old topology. The forward delay timer is used to allow the network topology to stabilize after a topology change. In addition, STP specifies a series of states a port must transition through to further ensure that a stable network topology is created after a topology change.
power up. If properly configured, each port stabilizes to the forwarding or blocking state. No packets (except BPDUs) are forwarded from, or received by, STP enabled ports until the forwarding state is enabled for that port. 2. STP Parameters STP Operation Levels The Switch allows for two levels of operation: the switch level and the port level. The switch level forms a spanning tree consisting of links between one or more switches.
Port Priority A relative priority for each 32768 port –lower numbers give a higher priority and a greater chance of a given port being elected as the root port Port Cost A value used by STP to evaluate paths – 19-100Mbps Fast Ethernet ports STP calculates path costs and selects the 4-1000Mbps Gigabit Ethernet ports path with the minimum cost as the active path Default Spanning-Tree Configuration Feature Default Value Enable state STP enabled for all ports Port priority 128 Port cost 19 Bridg
Max. Age _ 2 x (Hello Time + 1 second) Port Priority – A Port Priority can be from 0 to 255. The lower the number, the greater the probability the port will be chosen as the Root Port. Port Cost – A Port Cost can be set from 0 to 65535. The lower the number, the greater the probability the port will be chosen to forward packets. 3. Illustration of STP A simple illustration of three switches connected in a loop is depicted in Figure 5-7.
LAN 1 A Port 3 Root Bridge Port 1 Port 2 Designated Port Designated Port Root Port B Root Port C Port 1 Port 1 Designated Bridge Port 2 Blocked Port 3 LAN 2 Port 2 Port 3 LAN 3 After Applying the STA Rules The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C.
2. Bridge Information The informations of the STP Root show in the Bridge Information table. 3. STP Port Configuration On the STP port configuration, the settings are implemented on a. per user-defined Group of ports. The following fields can be set for STP port configuration: Edge Port: Defines if this port connected directly to a single workstation, or this port that is directly connected to a LAN segment where a loop cannot be created.
to connect to other bridges. Under RSTP, all ports operating in full-duplex mode are considered to be P2P ports, unless manually overridden through configuration. The link type attached to this port could be selected as following: 。 Auto - The switch automatically determines if the interface is attached to a point-to-point link or to shared media 。 True – A connection to exactly one other bridge. 。 False - A connection to two or more bridges.
It allows a maximum of four ports to be aggregated at the same time and up to 4 groups. If the group is defined as a LACP static link aggregationing group, then any extra ports selected are placed in a standby mode for redundancy if one of the other ports fails. If the group is defined as a local static link aggregationing group, then the number of ports must be the same as the group member ports. 4.7 Security 4.7.1 VLAN 4.7.1.1 Theory Understanding IEEE 802.
special consideration. The Switch allows you to further tailor how priority tagged data packets are handled on your network. Using queues to manage priority tagged data allows you to specify its relative priority to suit the needs of your network. There may be circumstances where it would be advantageous to group two or more differently tagged packets into the same queue. Generally, however, it is recommended that the highest priority queue, Queue 1, be reserved for data packets with a priority value of 7.
DEFAULT_ VLAN port member list. The DEFAULT_VLAN has a VID = 1. Port-based VLAN Port-based VLAN limit traffic that flows into and out of switch ports. Thus, all devices connected to a port are members of the VLAN(s) the port belongs to, whether there is a single computer directly connected to a switch, or an entire department. On port-based VLAN.NIC do not need to be able to identify 802.1Q tags in packet headers. NIC send and receive normal Ethernet packets.
priority are used by 802.1p. The VID is the VLAN identifier and is used by the 802.1Q standard. Because the VID is 12 bits long, 4094 unique VLAN can be identified. The tag is inserted into the packet header making the entire packet longer by 4 octets. All of the information originally contained in the packet is retained. 802.
Tag-aware switches must keep a table to relate PVID within the switch to VID on the network. The switch will compare the VID of a packet to be transmitted to the VID of the port that is to transmit the packet. If the two VID are different the switch will drop the packet. Because of the existence of the PVID for untagged packets and the VID for tagged packets, tag-aware and tag-unaware network devices can coexist on the same network.
3. The Port-base VLAN Confirutation table then pops up, enter the VLAN group ID, VLAN name and select the member ports for the VLAN. 4. Click the “OK” button to add the VLAN. 5. Select the ports in the Port List field and click on the Add button to add the member ports to the VLAN. The selected VLAN member then shows in the VLAN Member field. 6. Click on the “Close” button and back to the Port-based VLAN main page. The “Show VLAN Member” button is to list the valid VLANs.
802.1Q VLAN Configuration There are up to 256 configurable VLAN groups. By default when 802.1Q is enabled, all ports on the switch belong to default VLAN (VID 1). The default VLAN cannot be deleted. Understand nomenclature of the Switch Tagging and Untagging Every port on an 802.1Q compliant switch can be configured as tagging or untagging. 。 Tagging: Ports with tagging enabled will put the VID number, priority and other VLAN information into the header of all packets that flow into those ports.
。 Port Mode Access VLAN Membership Frame Leave Untagged Belongs to a single untagged VLAN ( Tag=PVID be removed) Untagged Allowed to belongs to multiple untagged Always Untag VLANs at the same time (Tag=PVID be removed) Tagged Allowed to belongs to multiple Tagged Trunk VLANs at the same time (Tag=PVID or Original VID be remained) Port VID (PVID) Set the port VLAN ID that will be assigned to untagged traffic on a given port.
3. Choose the Link Type in the drop drop down menu: Access , Always Untag or Trunk. Note that if the Access type is chosen, it will strip the 802.1Q tag from all packets that out of this port. On the other hand, if the Trunk type is chosen, it will put the VID number, priority and other VLAN information into the header of all packets that out of this port. And if the Always Untag type is chosen, it will strip the 802.1Q tag from all packets that out of the port.
5.3 Select on the VLAN chich you want to tag with in the VLAN Table field and click on the “Add” button to add. This will add the VLAN in to the VLAN with The Trunk Port field. 5.4 Click on the “close” button to close the VLAN port configuration table of port #2, and back to the 802.1Q main page. 5.5 Click on the “Show VLAN Members” button to show the VLAN members. 5.6 As shows in the following screen: 4.7.2 MAC Address Bind This function is based upon for the switch security.
from the network, and then reconnected at some time later. If the Network station is connected with one port want to control the switch, the station’s MAC Address must be the same as one MAC Address To bind the MAC Address, click on the Security/MAC Address Binding menu button, the main web page then shows the MAC Address Bind function table. 1. Fill the MAC Address field with MAC address in the format “xx-xx-xx-xx-xx-xx “ and choose the port to bind the MAC Address in the Port field. 2.
Current Filtering MAC Table. 4.7.4 MAC Address Learning The switch is able to disable MAC Address learning function on ports. 1. Fill the Port List field in the MAC Address Learning table and select Enable/Disable in the MAC Address Learning field. 2. Click on the “OK” button to save.
4.7.5 MAC Address Aging Time The Aging Time affects the learning process of the Switch. Dynamic forwarding table entries, which are made up of the source and destination MAC addresses and their associated port numbers, are deleted from the table if they are not accessed within the aging time. The aging time can be from 30 to 1,000,000 seconds with a default value of 300 seconds. A very long aging time can result in dynamic forwarding table entries that are out-of-date or no longer exist.
4.7.6 802.1X Port-Based Network Access Control 4.7.6.1 Theory Understanding IEEE 802.1X Port-Based Authentication The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client connected to a switch port before making available any services offered by the switch or the LAN. Until the client is authenticated, 802.
Authentication server—performs the actual authentication of the client. The authentication server z validates the identity of the client and notifies the switch whether or not the client is authorized to access the LAN and switch services. Because the switch acts as the proxy, the authentication service is transparent to the client.
dropped. If the client does not receive an EAP-request/identity frame after three attempts to start authentication, the client transmits frames as if the port is in the authorized state. A port in the authorized state effectively means that the client has been successfully authenticated. When the client supplies its identity, the switch begins its role as the intermediary, passing EAP frames between the client and the authentication server until authentication succeeds or fails.
If a client that does not support 802.1X is connected to an unauthorized 802.1X port, the switch requests the client's identity. In this situation, the client does not respond to the request, the port remains in the unauthorized state, and the client is not granted access to the network. In contrast, when an 802.1X-enabled client connects to a port that is not running the 802.1X protocol, the client initiates the authentication process by sending the EAPOL-start frame.
4.7.6.2 802.1X Configuration This switch has two 802.1X Mode: Radius Server & Local Authenticate, choose one you need ● Local Authenticate — In this situation, do not need Radius server in the network, all authentication completed by 802.1x Switch,the normal topologies as below 1. Enter“802.1X Port Status Configuration", there are 3“Authenticate authorization” states 。 Auto: enables 802.
EAPOL frames to be sent and received through the port. It’s a default status 。 Force authorized: disables 802.1X authentication and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1X-based authentication of the client. This is the default setting. 。 Force unauthorized: causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
● Radius Server — In this situation, need a Radius server in the network, the normal topologies as below 1. Select the “Radius Server” mode. 2.
• RADIUS Server IP The IP address of the RADIUS server being added. Address • Authentication Port(1-65535) • Account Port(1-65535) The UDP port used by this server. The valid range is 0 - 65535. The default UDP Port No. is 1812 The UDP port used by accounting server. The valid range is 0 65535. The default UDP Port No. is 1813 • Share Key Indicates if the shared secret for this server has been configured. 3. Setup the RADIUS server and assign the client IP address to the Web-Smart switch.
4. Configure ports attribute of 802.1X, the same as “802.1X Port Status Configuration”. NOTE: Set the Ports Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is a uplink port that is connected to another switch. Or once the 802.1X stat to work, the switch might not be able to access the RADIUS server. 5. Create user data.
to be created on the Radius Server PC.
6. The last, run your 802.1X Client 4.7.6.3 802.1X Client Configuration Windows XP is originally 802.1X support. As to other operating systems (windows 98SE, ME, 2000), an 802.1X client utility is needed. The following procedures show how to configure 802.1X Authentication in Windows XP. Please note that if you want to change the 802.1x authentication type of a wireless client, i.e.
4. Select “Authentication” tab. 5. Select “Enable network access control using IEEE 802.1X” to enable 802.1x authentication. 6. Select “MD-5 Challenge” from the drop-down list box for EAP type. 7. Click “OK”. 8. When wireless client has associated with WGSW-2840/5240, a user authentication notice appears in system tray. Click on the notice to continue.
9. Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process.
4.8 QoS 4.8.1 Understand QOS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic. QoS reduces bandwidth limitations, delay, loss, and jitter.
1. Define a service level to determine the priority that will be applied to traffic. 2. Apply a classifier to determine how the incoming traffic will be classified and thus treated by the Switch. 3. Create a QoS profile which associates a service level and a classifier. 4. Apply a QoS profile to a port(s). 4.8.2 QOS Configuration QoS settings allow customization of packet priority in order to facilitate delivery of data traffic that might be affected by latency problems. The IEEE 802.
2. VLAN-COS Mapping QoS settings allow customization of VLAN ID to Traffic classifiers 1. Fill the VID (1-2094) field in the VLAN-CoS Mapping Table. 2. Fill the mapping number in the CoS (0-7) field. 3. Click on the “OK” button to save. 4. To remove the VLAN-CoS mapping item, simply click on the “Delete” button in the Show VLAN-CoS Mapping table.
3. 802.1p-CoS Mapping QoS settings allow customization of packet priority in order to facilitate delivery of data traffic that might be affected by latency problems. The IEEE 802.1p Priority specification uses 8 priority levels to classify data packets. In 802.1p compliant devices, a tag inserted into the packet header is used to identify the priority level of data packets. 1. Fill the 802.1p Priority (0-7) field in the 802.1p-priority-CoS Mapping Configuration Table. 2.
4. Port-COS Mapping QoS settings allow customization of VLAN ID to Traffic classifiers 1. Fill the Port List (e.g. 1-3,7) field in the port-based QoS Configuration Table. 2. Fill the mapping number in the CoS (0-7) field. 3. Click on the “OK” button to save. 5. COS-Queue Mapping 1. Fill the CoS (0-7) field in the CoS-Queue Mapping Configuration Table. 2. Fill the mapping number in the Queue (0-3) field. 3. Click on the “OK” button to save.
6. Queue Management There are two rules for the Priority Queue: Weighted Round Robin (WRR) and Always Hight. To configure Queue Rule, select the Queue Policy drop down menu in the Queue Rule Configuration table. And Click on the “OK” button to save. If the WRR was chosen as the Queue Policy, the page would show in the main page.
4.9 Multicast 4.9.1 IGMP Snooping Theory Computers and network devices that want to receive multicast transmissions need to inform nearby routers that they will become members of a multicast group. The Internet Group Management Protocol (IGMP) is used to communicate this information. IGMP is also used to periodically check the multicast group for members that are no longer active. In the case where there is more than one multicast router on a sub network, one router is elected as the ‘queried’.
A host sends an IGMP “report” to join a group A host will never send a report when it wants to leave a group (for version 1). A host will send a “leave” report when it wants to leave a group (for version 2). Multicast routers send IGMP queries (to the all-hosts group address: 224.0.0.1) periodically to see whether any group members exist on their sub networks. If there is no response from a particular group, the router assumes that there are no group members on the network.
4.9.2 Static Routing Port This function is to configure ports to be the member of IGMP Groups in VLANs. To do this, fill the Port List field and the VID field for the static routing and click on the “Add” button to save. 4.10 Port Analysis 4.10.1 Port Analysis This function shows the statistical information of each port, it helps to diagnose the network malfunction. The following example shows the statistic table of port #6.
4.10.2 Port Mirror Port Mirroring is a method of monitoring network traffic that forwards a copy of each incoming and/or outgoing packet from one port of a network switch to another port where the packet can be studied. It enables the manager to keep close track of switch performance and alter it if necessary. Configuring the port mirroring by assigning a source port from which to copy all packets and a sniffer port where those packets will be sent.
4.11 Storm Control This function is to control the Braodcast Storm, Multicast Storm and Flooded Storm packet on each port. To configure the Storm Control, click on the Storm Control menu button. The web main page then shows the Strom Restricting function table. 1. Fill the Port List field in the Broadcast Storm Restricting table, select the type in the Restricting Type drop down menu and enter the packet size in the Flow field. 2. Click on the “OK” button to save. 3.
4.12 IP Stacking 4.12.1 About IP Stacking IP Stacking function enables you to use a single IP address and standard network cabling to manage a group of up to 8 PLANET WSW-2401A/WGSW-2840/5240 switches in the same IP subnet (broadcast domain). Once one switch had been operated as the Master of a stack, additional switches can join the IP stack by manual methods to setting with the same group name.
• Master – The IP Stacking Management status is enabled and the current switch is a Master switch at this IP Stack Group. • Client.- The IP Stacking Management status is enabled and the current switch is a Client switch at this IP Stack Group. Manamement status: This filed is to Enable or Disable the IP Stack function. Management mode: Identify the management mode of the current switch. There’re two possible selections: • Master – The switch plays as a Master of the IP Stack Group.
2. Then assign a role to the WGSW-2840 as Master in Management mode field, the following screen appears. 3. Enter a string in the “IP Stacking Group” field; the default string of the WGSW-2840/5240 is “planet_switch”. This string must be the same with the Client switches that to be assigned to the same IP Stack group. 4. Modify the “System priority” and “Stack name” if necessary. At this sample we change the Stack name of the Master to “Switch-1” 5. Click “OK” if the configuration is down.
8. Enter a string in the “IP Stacking Group” field; the default string of the WGSW-2840/5240 is “planet_switch”. This string must be the same with the Master switch that to be assigned to the same IP Stack group. 9. Modify the “System priority” and “Stack name” if necessary. At this sample we change the Stack name of the Client to “Switch-2” 10. Click “OK” if the configuration is down. 11. Please use a UTP cable to uplink together through its Ethernet interface 12.
13. After setup complete, please go to system and choose “Saving parameters” to save current configuration. The following screen appears. NOTE: Please do not assign role for whole stack member Switch as client, it cannot detect the Master device with minimum MAC address.
5. TROUBLE SHOOTING This section is intended to help you solve the most common problems on the WSD-800 Managed Ethernet Switch 5.1 Incorrect connections The switch port can auto detect straight or crossover cable when you link switch with other Ethernet device. For the RJ-45 connector should use correct UTP or STP cable, 10/100Mbps port use 2 pairs twisted cable. If the RJ-45 connector is not correct pin on right position then the link will fail.
Category 3, 4 or 5 cable for 10Mbps connections or 100Ω Category 5 cable for 100Mbps connections. Also be sure that the length of any twisted-pair connection does not exceed 100 meters (328 feet).
6. APPENDIX 6.1 Console Port Pin Assignments The DB-9 serial port on the front panel is used to connect to the switch for out-of-band console configuration. The console menu-driven configuration program can be accessed from a terminal or a PC running a terminal emulation program. The pin assignments used to connect to the serial port are provided in the following tables.
10BASE-T Cat. 3, 4, 5100-ohm UTP 100 m (328 ft) RJ-45 100BASE-TX Cat. 5 100-ohm UTP 100 m (328 ft) RJ-45 100BASE-FX 50/125 or 62.5/125 micron core multimode fiber (MMF) 2 km (1.24 miles) SC or ST 6.2 100BASE-TX/10BASE-T Pin Assignments With 100BASE-TX/10BASE-T cable, pins 1 and 2 are used for transmitting data, and pins 3 and 6 for receiving data.
7. APPENDIX-B 802.1Q VLAN Multi-Untagged VLAN setting sample 1 The version V.1.4.27 of WGSW-2840 had added the multiple untagged VLAN function on a port. The function could be applied at if the members of two or more different VLAN groups all have to access the same server/AP/Printer. But the two VLAN groups are separated and can’t access to each other. The graphic in Figure 7-1 appears. Figure 7-1 Overlap VLAN graphic The next will be a configure sample- how to setup the WGSW-2840 802.
Figure 7-2 802.1Q VLAN page screen 3. Move the mouse course to the port, which had be assigned to be connect to the server/AP/printer, then click on the port. For this case, we set the Port-1 to be the multiple untagged port. The screen in Figure 7-3 appears. 4. At the Link Type, select “Always Untag” at the draw bar. Click “OK” to apply. Figure 7-3 802.1Q VLAN Port Configuration – Port1 screen 5. Click the “Add/Modify” button to create new VLAN groups with VID=2 and VID=3.
6. At the Port 1-VLAN Port configuration page, select VLAN 2 and VLAN 3 to add to the Port 1. The right information window at this table shows the status. The screen in Figure 7-4 appears. Figure 7-4 Assign Port-1 to be VLAN 2 and VLAN 3 member. 7. After the down the Port 1 VLAN configuration, press “close” to back to the 802.1Q VLAN main screen. And check if the setting be applied to Port 1 at the “Egress Policy” column. The screen in Figure 7-5 appears. Figure 7-5 Port 1 VLA N status 8.
• And both Port 2 and Port 3 are VLAN 1 members. 10. After properly configure the 802.1Q VLAN per port setting, it should be as the screen in Figure 7-6 appears. Figure 7-6 Port 1, Port 2 and Port 3 VLAN configuration Although Port 2 and Port 3 are VLAN 1 members, with different PVID setting, the two ports are not able to access each other. But they all can access with the server/AP/Printer which connect to the Port 1 now. Part No.