User’s Manual 1
User’s Manual Trademarks Copyright © PLANET Technology Corp. 2018. Contents are subject to revision without prior notice. PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners.
User’s Manual TABLE OF CONTENTS 1. INTRODUCTION .................................................................................................................. 10 1.1 Packet Contents ......................................................................................................................................... 10 1.2 Product Description ................................................................................................................................... 11 1.
User’s Manual 4.2.2 IP Configuration ................................................................................................................................................... 54 4.2.3 IP Status .............................................................................................................................................................. 56 4.2.4 Users Configuration ........................................................................................................................
User’s Manual 4.4.4 SFP Module Information ...................................................................................................................................... 98 4.4.5 Port Mirror.......................................................................................................................................................... 101 4.5 Link Aggregation .....................................................................................................................................
User’s Manual 4.8.4 IGMP Snooping Configuration ........................................................................................................................... 166 4.8.5 IGMP Snooping VLAN Configuration ................................................................................................................. 168 4.8.6 IGMP Snooping Port Group Filtering ................................................................................................................. 170 4.8.
User’s Manual 4.10.4 ACL Ports Configuration .................................................................................................................................. 231 4.10.5 ACL Rate Limiter Configuration ....................................................................................................................... 233 4.11 Authentication ......................................................................................................................................... 234 4.11.
User’s Manual 4.14.6 Port Statistics................................................................................................................................................... 316 4.15 Network Diagnostics .............................................................................................................................. 319 4.15.1 Ping ...........................................................................................................................................................
User’s Manual 4.21.1 LCD Management ........................................................................................................................................... 371 4.22 ONVIF....................................................................................................................................................... 373 4.22.1 ONVIF Device Search .....................................................................................................................................
User’s Manual 1. INTRODUCTION The descriptions of PLANET L2+ Industrial Wall-mount Managed Switch series, such as WGS-5225-8P2S, WGS-5225-8P2SV, and WGS-5225-8T2SV are as follows: WGS-5225-8P2S WGS-5225-8P2SV WGS-5225-8T2SV Industrial L2+ 8-Port 10/100/1000T 802.3at PoE + 2-Port 100/1000X SFP Wall-mount Managed Switch Industrial L2+ 8-Port 10/100/1000T 802.
User’s Manual 1.2 Product Description Wall-mount PoE Managed Switch with Advanced L2+/L4 Switching and Security PLANET WGS-5225 Series is an Industrial Wall-mount Managed Switch with LCD Touch Screen featuring PoE or non-PoE models to improve the availability of industrial applications. It provides IPv6/IPv4 dual stack management and built-in L2+/L4 Gigabit switching engine along with eight 10/100/1000BASE-T ports and two additional 1000BASE-X SFP ports.
User’s Manual Intuitive LCD Control (WGS-5225-8P2SV/ WGS-5225-8T2SV) The WGS-5225 Series comes with an intuitive touch panel on its front panel that facilitates the Ethernet or PoE PD management that greatly promotes management efficiency in large-scale networks, such as enterprises, hotels, shopping malls, government buildings, and other public areas.
User’s Manual Convenient and Smart ONVIF Devices with Detection Feature (WGS-5225-8P2S/8P2SV only) PLANET has newly developed an awesome feature -- ONVIF Support -- which is specifically designed for co-operating with video IP surveillances. From the WGS-5225 Series’ GUI, you just need one click to search and show all of the ONVIF devices via network application. In addition, you can upload floor images to the switch and can remotely locate where the PDs are.
User’s Manual Scheduled Power Recycling (WGS-5225-8P2S/8P2SV only) The WGS-5225 Series allows each of the connected PoE IP cameras or PoE wireless access points to reboot at a specific time each week. Therefore, it will reduce the chance of IP camera or AP crash resulting from buffer overflow.
User’s Manual Innovative Wall-mount Installation The WGS-5225 Series is specially designed to be installed in a narrow environment, such as wall enclosure or electric weak box. The compact, flat and wall-mounted design fits easily in any space-limited location. It adopts the user-friendly “Front Access” design, making the installing, cable wiring, LED monitoring and maintenance of the WGS-5225 Series placed in an enclosure very convenient for technicians.
User’s Manual Robust Layer 2 Features The WGS-5225 Series can be programmed for advanced switch management functions such as dynamic port link aggregation, Q-in-Q VLAN, private VLAN, Rapid Spanning Tree Protocol, Layer 2 to Layer 4 QoS, bandwidth control and IGMP snooping. The WGS-5225 Series provides 802.1Q tagged VLAN, and the VLAN groups allowed will be maximally up to 255. Via aggregation of supporting ports, the WGS-5225 Series allows the operation of a high-speed trunk combining multiple ports.
User’s Manual Modbus TCP Provides Flexible Network Connectivity for Factory Automation With the supported Modbus TCP/IP protocol, the WGS-5225 Series can easily integrate with SCADA systems, HMI systems and other data acquisition systems in factory floors. It enables administrators to remotely monitor the industrial Ethernet switch’s operating information, port information and communication status, thus easily achieving enhanced monitoring and maintenance of the entire factory.
User’s Manual 1.3 How to Use This Manual This User’s Manual is structured as follows: Section 2, INSTALLATION The section explains the functions of the Wall-mount Managed Switch and how to physically install the Wall-mount Managed Switch. Section 3, SWITCH MANAGEMENT The section contains the information about the software function of the Wall-mount Managed Switch. Section 4, WEB CONFIGURATION The section explains how to manage the Wall-mount Managed Switch by Web interface.
User’s Manual 1.4 Product Features Physical Port (WGS-5225-8P2SV/WGS-5225-8P2S) 8 10/100/1000BASE-T Gigabit Ethernet RJ45 ports with IEEE 802.3at PoE+ Injector 2 100/1000BASE-X mini-GBIC/SFP slots for SFP type auto detection Physical Port (WGS-5225-8T2SV) 8 10/100/1000BASE-T Gigabit Ethernet RJ45 ports 2 100/1000BASE-X mini-GBIC/SFP slots for SFP type auto detection Power over Ethernet (WGS-5225-8P2SV/WGS-5225-8P2S) Complies with IEEE 802.
User’s Manual − MAC-based VLAN − Voice VLAN Supports Spanning Tree Protocol − IEEE 802.1D Spanning Tree Protocol (STP) − IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) − IEEE 802.1s Multiple Spanning Tree Protocol (MSTP), spanning tree by VLAN − BPDU Guard Supports Link Aggregation − 802.
User’s Manual Security IEEE 802.
User’s Manual 1.5 Product Specifications Product WGS-5225-8P2SV WGS-5225-8P2S WGS-5225-8T2SV Hardware Specifications Copper Ports 8 10/100/1000BASE-T RJ45 auto-MDI/MDI-X ports SFP/mini-GBIC Slots Compatible with 100BASE-FX SFP PoE Injector Port 2 1000BASE-SX/LX/BX SFP interfaces (Port-9 to Port-10) 8 ports with 802.3at/af PoE injector function with - Port-1 to Port-8 Switch Architecture Store-and-Forward Switch Fabric 20Gbps/non-blocking Throughput (packet per second) 14.
User’s Manual connection) connection) connection) Max. 251 watts/861.2BTU Max. 250.4 Max. 8.5 watts/29.1BTU (Full loading with PoE watts/859.1BTU (Full (Full loading with Ethernet) function) loading with PoE function) Power Over Ethernet PoE Standard IEEE 802.3at Power over Ethernet Plus/PSE - PoE Power Supply Type End-span - IEEE 802.3af Standard - - Per port 48V~51V DC (depending on the power PoE Power Output supply), max. 15.4 watts IEEE 802.
User’s Manual IGMP Snooping MLD Snooping Access Control List IGMP (v1/v2/v3) snooping, up to 255 multicast groups IGMP querier mode support MLD (v1/v2) snooping, up to 255 multicast groups MLD querier mode support IP-based ACL/MAC-based ACL Up to 256 entries Per port bandwidth control Bandwidth Control Ingress: 500Kb~1000Mbps Egress: 500Kb~1000Mbps RFC 1213 MIB-II IF-MIB RFC 1493 Bridge MIB RFC 1643 Ethernet MIB RFC 2863 Interface MIB RFC 2665 Ether-Like MIB SNMP MIBs RFC 2819 RMON MIB (Groups 1, 2, 3
User’s Manual IEEE 802.1ab LLDP IEEE 802.3af Power over Ethernet (WGS-5225-8P2S and WGS-5225-8P2SV) IEEE 802.3at Power over Ethernet Plus(WGS-5225-8P2S and WGS-5225-8P2SV) ITU-T G.
User’s Manual 2. INSTALLATION 2.1 Hardware Description The Wall-mount Managed Switch provides three different running speeds – 10Mbps, 100Mbps and 1000Mbps and automatically distinguishes the speed of incoming connection. This section describes the hardware features of Wall-mount Managed Switch. For easier management and control of the Wall-mount Managed Switch, familiarize yourself with its display indicators and ports. Front panel illustrations in this chapter display the unit LED indicators.
User’s Manual WGS-5225-8P2S Figure 2-1-2: Front Panel of WGS-5225-8P2S WGS-5225-8T2SV Figure 2-1-3: Front Panel of WGS-5225-8T2SV ■ 1 Gigabit TP interface 10/100/1000BASE-T Copper, RJ45 twisted-pair: Up to 100 meters.
User’s Manual ■ Reset button The bottom of the Wall-mount Managed Switch comes with a reset button designed for rebooting the Managed Switch without turning off and on the power. The following is the summary table of reset button functions: Reset Button Pressed and Released Function < 5 sec: System Reboot Reboot the Managed Switch. Reset the Managed Switch to Factory Default configuration.
User’s Manual 2.1. LED Indications WGS-5225-8P2S/WGS-5225-8P2SV System LED Color Function PWR Green Lights to indicate that the Switch has power. SYS Green Lights to indicate the system is working. Ring Green Lights to indicate that the ERPS Ring has been created successfully. R.O. Green Lights to indicate that Switch has enabled Ring Owner.
User’s Manual WGS-5225-8T2SV System LED Color Function PWR Green Lights to indicate that the Switch has power. SYS Green Lights to indicate the system is working. Ring Green Lights to indicate that the ERPS Ring has been created successfully. R.O. Green Lights to indicate that Switch has enabled Ring Owner. Per 10/100/1000BASE-T Port LED Color LNK/ACT Green Function Lights: To indicate the link through that port is successfully established at 10/100Mbps.
User’s Manual 2.1. Wiring Power Input The Wall-mount Managed Switch features a strong dual power input system (Terminal block and DC jack) incorporated into customer’s automation network to enhance system reliability and uptime.
User’s Manual Step 2: Tighten the wire-clamp screws for preventing the wires from loosening and plug them into the Wall-mount Managed switch 1. The wire gauge for the terminal block should be in the range of 12 ~ 24 AWG. 2. When performing any of the procedures like inserting the wires or tightening the wire-clamp screws, make sure the power is OFF to prevent from getting an electric shock. 2.
User’s Manual 2.2.2 Magnet Installation To install the Wall-mount Managed Switch on a magnetic surface, simply follow the following diagram: 2.2.3 DIN-rail Installation The DIN-rail kit is included in the package. When the wall-mount application for the Wall-mount Managed Switch needs to be replaced with DIN-rail application, please refer to the following figures to screw the DIN-rail on the Wall-mount Managed Switch.
User’s Manual Step 2: Lightly insert the button of DIN-rail into the track. Step 3: Check whether the DIN-rail is tightly on the track.
User’s Manual 2.2.4 Installing the SFP Transceiver The sections describe how to insert an SFP transceiver into an SFP slot. The SFP transceivers are hot-pluggable and hot-swappable. You can plug in and out the transceiver to/from any SFP port without having to power down the Managed Switch, as Figure 2-2-4 shows..
User’s Manual 2.2.5 Approved PLANET SFP/SFP+ Transceivers PLANET Managed Switch supports both single mode and multi-mode SFP transceivers. The following list of approved PLANET SFP transceivers is correct at the time of publication: Gigabit Ethernet Transceiver (1000BASE-X SFP) Model Speed (Mbps) Connector Interface Fiber Mode Distance Wavelength (nm) Operating Temp.
User’s Manual It is recommended to use PLANET SFP on the Wall-mount Managed Switch. If you insert an SFP transceiver that is not supported, the Wall-mount Managed Switch will not recognize it. 1. Before we connect the Wall-mount Managed Switch to the other network device, we have to make sure both sides of the SFP transceivers are with the same media type, for example, 1000BASE-SX to 1000BASE-SX, 1000BASE-LX to 1000BASE-LX. 2.
User’s Manual Figure 2-2-5: How to Pull Out the SFP Transceiver Never pull out the module without lifting up the lever of the module and turning it to a horizontal position. Directly pulling out the module could damage the module and the SFP module slot of the Wall-mount Managed Switch.
User’s Manual 3. SWITCH MANAGEMENT This chapter explains the methods that you can use to configure management access to the Wall-mount Managed Switch. It describes the types of management applications and the communication and management protocols that deliver data between your management device (workstation or personal computer) and the system. It also contains information about port connection options.
User’s Manual 3.2 Management Access Overview The Wall-mount Managed Switch gives you the flexibility to access and manage it using any or all of the following methods: Remote Telnet Interface Web browser Interface An external SNMP-based network management application The remote Telnet and Web browser interfaces are embedded in the Wall-mount Managed Switch software and are available for immediate use. Each of these management methods has their own advantages.
User’s Manual 3.3 Remote Telnet Management The Wall-mount Managed Switch also supports telnet for remote management. The switch asks for user name and password for remote login when using telnet; please use “admin” for both username and password. Default IP address: 192.168.0.100 Username: admin Password: admin Figure 3-3-1 Wall-mount Managed Switch Telnet Login Screen 3.
User’s Manual Figure 3-4-2: Web Main Screen of Wall-mount Managed Switch LCD Touch Screen The WGS-5225-8P2SV and WGS-5225-8T2SV have a 2.4-inch color LCD touch screen with management functions. Tap the LCD touch screen to wake the LCD touch screen.
User’s Manual The factory default LCD configurations are shown as follows. Default LCD: Enable Default Touch Screen: Enable Default Backlight Timeout: Enable Default Backlight Timeout Time: 300 Default Read Only Mode: Disable Default Screen: Main Menu Default Time Interval: 10 Default Color Scheme: Dark Default Pin Number: 1234 You can use the Web management interface and click LCD, and then in the LCD Management, change LCD configuration.
User’s Manual 3.5 SNMP-based Network Management You can use an external SNMP-based application to configure and manage the Wall-mount Managed Switch, such as SNMP Network Manager, HP Openview Network Node Management (NNM) or What’s Up Gold. This management method requires the SNMP agent on the Wall-mount Managed Switch and the SNMP Network Management Station to use the same community string. This management method, in fact, uses two community strings: the get community string and the set community string.
User’s Manual 3.6 PLANET Smart Discovery Utility To easily list the Wall-mount Managed Switch in your Ethernet environment, the Planet Smart Discovery Utility from user’s manual CD-ROM is an ideal solution. The following install instructions guide you to running the Planet Smart Discovery Utility. 1. Open the Planet Smart Discovery Utility in administrator PC. 2. Run this utility and the following screen appears.
User’s Manual 1. This utility shows all the necessary information from the devices, such as MAC Address, Device Name, firmware version and Device IP Subnet address. A new password, IP Subnet address and description can be assigned to the devices. 2. After setup is completed, press “Update Device”, “Update Multi” or “Update All” button to take affect. The meaning of the 3 buttons above are shown below: Update Device: use current setting on one single device.
User’s Manual 4. WEB CONFIGURATION This section introduces the configuration and functions of the Web-based management. About Web-based Management The Wall-mount Managed Switch offers management features that allow users to manage the Wall-mount Managed Switch from anywhere on the network through a standard browser such as Microsoft Internet Explorer. The Web-based Management supports Internet Explorer 7.0.
User’s Manual 1. Logging on to the Wall-mount Managed Switch Use Internet Explorer 7.0 or above Web browser. Enter the factory-default IP address to access the Web interface. The factory-default IP Address is as follows: http://192.168.0.100 2. When the following login screen appears, please enter the default username "admin" with password “admin” (or the username/password you have changed via console) to login the main screen of Wall-mount Managed Switch. The login screen in Figure 4-1-2 appears.
User’s Manual Now, you can use the Web management interface to continue the switch management or manage the Wall-mount Managed Switch by Web interface. The Switch Menu on the left of the web page lets you access all the commands and statistics the Wall-mount Managed Switch provides. 1. It is recommended to use Internet Explore 7.0 or above to access Wall-mount Managed Switch. 2. The changed IP address takes effect immediately after clicking on the Save button.
User’s Manual 4.1 Main Web Page The Wall-mount Managed Switch provides a Web-based browser interface for configuring and managing it. This interface allows you to access the Wall-mount Managed Switch using the Web browser of your choice. This chapter describes how to use the Wall-mount Managed Switch’s Web browser interface to configure and manage it.
User’s Manual Main Menu Using the onboard web agent, you can define system parameters, manage and control the Wall-mount Managed Switch, and all its ports, or monitor network conditions. Via the Web-Management, the administrator can set up the Wall-mount Managed Switch by selecting the functions those listed in the Main Function. The screen in Figure 4-1-5 appears.
User’s Manual 4.2 System Use the System menu items to display and configure basic administrative details of the Wall-mount Managed Switch. Under System the following topics are provided to configure and view the system information. ■ System Information The Managed Switch system information is provided here. ■ IP Configuration Configures the Managed Switch with IPv4/IPv6 interface and IP routes on this page. ■ IP Status This page displays the status of the IP protocol layer.
User’s Manual 4.2.1 System Information The System Info page provides information for the current device information. System Info page helps a switch administrator to identify the hardware MAC address, software version and system uptime. The screen in Figure 4-2-1 appears. Figure 4-2-1: System Information Page Screenshot The page includes the following fields: Object Description • Contact The system contact configured in Configuration | System | Information | System Contact.
User’s Manual 4.2.2 IP Configuration The IP Configuration includes the IP Configuration, IP Interface and IP Routes. The configured column is used to view or change the IP configuration. The maximum number of interfaces supported is 128 and the maximum number of routes is 32. The screen in Figure 4-2-2 appears. Figure 4-2-2: IP Configuration Page Screenshot The current column is used to show the active IP configuration.
User’s Manual Specify from which DHCP-enabled interface a provided DNS server should be preferred. DNS Proxy When DNS proxy is enabled, system will relay DNS requests to the currently configured DNS server, and reply as a DNS resolver to the client devices on the network. • IP Address Delete Select this option to delete an existing IP interface. VLAN The VLAN associated with the IP interface. Only ports in this VLAN will be able to access the IP interface.
User’s Manual : Click to undo any changes made locally and revert to previously saved values. 4.2.3 IP Status IP Status displays the status of the IP protocol layer. The status is defined by the IP interfaces, the IP routes and the neighbour cache (ARP cache) status. The screen in Figure 4-2-3 appears. Figure 4-2-3: IP Status Page Screenshot The Page includes the following fields: Object • IP Interfaces • IP Routes • Neighbor Cache Description Interface The name of the interface.
User’s Manual : Click to refresh the Page. 4.2.4 Users Configuration This Page provides an overview of the current users. Currently the only way to login as another user on the web server is to close and reopen the browser. After setup is completed, press “Apply” button to take effect. Please login web interface with new user name and password, the screen in Figure 4-2-4 appears.
User’s Manual Figure 4-2-5: Add / Edit User Configuration Page Screenshot The Page includes the following fields: Object Description • Username A string identifying the user name that this entry should belong to. The allowed string length is 1 to 31. The valid user name is a combination of letters, numbers and underscores. • Password The password of the user. The allowed string length is 1 to 31. • Password (again) Please enter the user’s new password here again to confirm.
User’s Manual Generally, the privilege level 15 can be used for an ad ministrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account. Once the new user is added, the new user entry is shown on the Users Configuration Page.
User’s Manual 4.2.5 Privilege Levels This Page provides an overview of the privilege levels. After setup is completed, please press “Apply” button to take effect. Please login web interface with new user name and password and the screen in Figure 4-2-7 appears. Figure 4-2-7: Privilege Levels Configuration Page Screenshot The Page includes the following fields: Object Description • Group Name The name identifying the privilege group.
User’s Manual more than one. The following description defines these privilege level groups in details: System: Contact, Name, Location, Timezone, Log. Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection and IP source guard. IP: Everything except 'ping'. Port: Everything except 'VeriPHY'. Diagnostics: 'ping' and 'VeriPHY'.
User’s Manual Figure 4-2-8: NTP Configuration Page Screenshot The Page includes the following fields: Object Description • Mode Indicates the NTP mode operation. Possible modes are: Enabled: Enable NTP mode operation. When enable NTP mode operation, the agent forward and to transfer NTP messages between the clients and the server when they are not on the same subnet domain. Disabled: Disable NTP mode operation. • Server # Provide the NTP IPv4 or IPv6 address of this switch.
User’s Manual Figure 4-2-9: Time Configuration Page Screenshot The Page includes the following fields: Object Description • Time Zone Lists various Time Zones worldwide. Select appropriate Time Zone from the drop-down menu and click Save to set. • Acronym User can set the acronym of the time zone. This is a User configurable acronym to identify the time zone.
User’s Manual • Month - Select the starting month. • Hours - Select the starting hour. • Minutes - Select the starting minute. • Week - Select the ending week number. • End Time Settings • Day - Select the ending day. • Month - Select the ending month. • Hours - Select the ending hour. • Minutes - Select the ending minute Enter the number of minutes to add during Daylight Saving Time. ( Range: 1 to • Offset Settings 1440 ) Buttons : Click to apply changes.
User’s Manual disabled. The TTL value is used by UPnP to send SSDP advertisement messages. • TTL Valid values are in the range of 1 to 255. • Advertising Duration The duration, carried in SSDP packets, is used to inform a control point or control points how often it or they should receive a SSDP advertisement message from this switch. If a control point does not receive any message within the duration, it will think that the switch no longer exists.
User’s Manual 4.2.9 DHCP Relay Configure DHCP Relay on this Page. DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain. The DHCP option 82 enables a DHCP relay agent to insert specific information into a DHCP request packets when forwarding client DHCP packets to a DHCP server and remove the specific information from a DHCP reply packets when forwarding server DHCP packets to a DHCP client.
User’s Manual they are not on the same subnet domain. Indicates the DHCP relay information mode option operation. Possible modes • Relay Information are: Mode Enabled: Enable DHCP relay information mode operation. When enabling DHCP relay information mode operation, the agent inserts specific information (option82) into a DHCP message when forwarding to DHCP server and removing it from a DHCP message when transferring to DHCP client. It only works under DHCP relay operation mode enabled.
User’s Manual The Page includes the following fields: Server Statistics Object Description • Transmit to Server The packets number that is relayed from client to server. • Transmit Error The packets number whose errors are sending to clients. • Receive from Server The packets number that is received from server. • Receive Missing Agent The packets number that is received without agent information options. Option • Receive Missing The packets number whose missing circuit ID is received.
User’s Manual 4.2.11 CPU Load This Page displays the CPU load, using an SVG graph. The load is measured as average over the last 100ms, 1sec and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. In order to display the SVG graph, your browser must support the SVG format. Consult the SVG Wiki for more information on browser support. Specifically, at the time of writing, Microsoft Internet Explorer will need to have a plugin installed to support SVG.
User’s Manual 4.2.12 System Log The Wall-mount Managed Switch system log information is provided here. The System Log screen in Figure 4-2-15 appears. Figure 4-2-15: System Log Page Screenshot The Page includes the following fields: Object Description • ID The ID (>= 1) of the system log entry. • Level The level of the system log entry. The following level types are supported: Info: Information level of the system log. Warning: Warning level of the system log.
User’s Manual : Updates the system log entries, ending at the last entry currently displayed. : Updates the system log entries, starting from the last entry currently displayed. : Updates the system log entries, ending at the last available entry ID. 4.2.13 Detailed Log The Wall-mount Managed Switch system detailed log information is provided here. The Detailed Log screen in Figure 4-2-16 appears.
User’s Manual 4.2.14 Remote Syslog Configure remote syslog on this Page. The Remote Syslog screen in Figure 4-2-17 appears. Figure 4-2-17: Remote Syslog Page Screenshot The Page includes the following fields: Object Description • Mode Indicates the server mode operation. When the mode operation is enabled, the syslog message will send out to syslog server.
User’s Manual 4.2.15 SMTP Configuration This Page facilitates an SMTP Configuration on the switch. The SMTP Configure screen in Figure 4-2-18 appears. Figure 4-2-18: SMTP Configuration Page Screenshot The Page includes the following fields: Object Description • SMTP Mode Controls whether SMTP is enabled on this switch. • SMTP Server Type the SMTP server name or the IP address of the SMTP server. • SMTP Port Set port number of SMTP service.
User’s Manual 4.2.16 Fault Alarm This Page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-20 appears. Figure 4-2-20: Fault Alarm Control Configuration Page Screenshot The Page includes the following fields: Object Description • Enable Controls whether Fault Alarm is enabled on this switch. • Record Controls whether Record is sending System log or SNMP Trap or both.
User’s Manual 4.2.17 Web Firmware Upgrade This Page facilitates an update of the firmware controlling the switch. The Web Firmware Upgrade screen in Figure 4-2-21 appears. Figure 4-2-21: Web Firmware Upgrade Page Screenshot To open Firmware Upgrade screen, perform the following: 1. Click System -> Web Firmware Upgrade. 2. The Firmware Upgrade screen is displayed as in Figure 4-2-22. 3. Click the “ 4. Select on the firmware then click “ 5.
User’s Manual 4.2.18 TFTP Firmware Upgrade The Firmware Upgrade Page provides the functions to allow a user to update the Wall-mount Managed Switch firmware from the TFTP server in the network. Before updating, make sure you have your TFTP server ready and the firmware image is on the TFTP server. The TFTP Firmware Upgrade screen in Figure 4-2-23 appears.
User’s Manual 4.2.19 Save Startup Config This function allows to save the current configuration, thereby ensuring that the current active configuration can be used at the next reboot screen in Figure 4-2-24 as shown below. After saving the configuration, the screen in Figure 4-2-25 appears. Figure 4-2-24: Configuration Save Page Screenshot Figure 4-2-25: Finish Saving Page Screenshot 4.2.20 Configuration Download The switch stores its configuration in a number of text files in CLI format.
User’s Manual 4.2.21 Configuration Upload Configuration Upload page allows the uploads of the running-config and startup-config on the switch. Please refer to Figure 4-2-27 shown below. Figure 4-2-27: Configuration Upload Page Screenshot If the destination is running-config, the file will be applied to the switch configuration. This can be done in two ways: • Replace mode: The current configuration is fully replaced with the configuration in the uploaded file.
User’s Manual It is possible to activate any of the configuration files present on the switch, except for running-config which represents the currently active configuration. Select the file to activate and click . This will initiate the process of completely replacing the existing configuration with that of the selected file. 4.2.23 Configuration Delete Configuration Delete page allows to delete the startup-config and default-config files which are stored in FLASH.
User’s Manual Figure 4-2-30: Software Image Selection Page Screenshot The Page includes the following fields: Object Description • Image The flash index name of the firmware image. The name of primary (preferred) image is image, the alternate image is named image.bk. • Version The version of the firmware image. • Date The date where the firmware was produced. Buttons : Click to use the alternate image. This button may be disabled depending on system state. 4.2.
User’s Manual Buttons : Click to reset the configuration to Factory Defaults. : Click to return to the Port State Page without resetting the configuration. To reset the Wall-mount Managed Switch to the Factory default setting, you can also press the hardware reset button at the front panel about 10 seconds. After the device be r ebooted. You can login the management WEB interface within the same subnet of 192.168.0.xx. 4.2.
User’s Manual 4.3 Simple Network Management Protocol 4.3.1 SNMP Overview The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
User’s Manual default communities are: 。 Write = private 。 Read = public Use the SNMP Menu to display or configure the Wall-mount Managed Switch's SNMP function. This section has the following items: System Configuration Configure SNMP on this Page. Trap Configuration Configure SNMP trap on this Page. System Information The system information is provided here. SNMPv3 Communities Configure SNMPv3 communities table on this Page.
User’s Manual SNMP v3: Set SNMP supported version 3. • Read Community Indicates the community read access string to permit access to SNMP agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. The field is applicable only when SNMP version is SNMPv1 or SNMPv2c. If SNMP version is SNMPv3, the community string will be associated with SNMPv3 communities table.
User’s Manual 4.3.3 SNMP Trap Configuration Configure SNMP trap on this Page. The SNMP Trap Configuration screen in Figure 4-3-2 appears. Figure 4-3-2: SNMP Trap Configuration Page Screenshot The Page includes the following fields: Object Description • Trap Config Indicates which trap Configuration's name for configuring. The allowed string length is 0 to 255, and the allowed content is ASCII characters from 33 to 126. • Trap Mode Indicates the SNMP trap mode operation.
User’s Manual SNMP v3: Set SNMP trap supported version 3. • Trap Community Indicates the community access string when send SNMP trap packet. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 33 to 126. • Trap Destination Indicates the SNMP trap destination address. Address • Trap Destination Port Indicates the SNMP trap destination port. SNMP Agent will send SNMP message via this port, the port range is 1~65535.
User’s Manual RMON: Enable/disable RMON trap. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.4 SNMP System Information The switch system information is provided here. The SNMP System Information screen in Figure 4-3-3 appears.
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.3.5 SNMPv3 Configuration 4.3.5.1 SNMPv3 Communities Configure SNMPv3 communities table on this Page. The entry index key is Community. The SNMPv3 Communities screen in Figure 4-3-4 appears. Figure 4-3-4: SNMPv3 Communities Configuration Page Screenshot The Page includes the following fields: Object Description • Delete Check to delete the entry.
User’s Manual 4.3.5.2 SNMPv3 Users Configure SNMPv3 users table on this Page. The entry index keys are Engine ID and User Name. The SNMPv3 Users screen in Figure 4-3-5 appears. Figure 4-3-5: SNMPv3 Users Configuration Page Screenshot The Page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Engine ID An octet string identifying the engine ID that this entry should belong to.
User’s Manual MD5: An optional flag to indicate that this user using MD5 authentication protocol. SHA: An optional flag to indicate that this user using SHA authentication protocol. The value of security level cannot be modified if entry already exist. That means must first ensure that the value is set correctly. A string identifying the authentication pass phrase. For MD5 authentication • Authentication protocol, the allowed string length is 8 to 32.
User’s Manual The Page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Security Model Indicates the security model that this entry should belong to. Possible security models are: v1: Reserved for SNMPv1. v2c: Reserved for SNMPv2c. usm: User-based Security Model (USM). A string identifying the security name that this entry should belong to.
User’s Manual A string identifying the view name that this entry should belong to. The allowed • View Name string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. Indicates the view type that this entry should belong to. Possible view type are: • View Type included: An optional flag to indicate that this view subtree should be included. excluded: An optional flag to indicate that this view subtree should be excluded.
User’s Manual The Page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Group Name A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the allowed content is the ASCII characters from 33 to 126. • Security Model Indicates the security model that this entry should belong to. Possible security models are: any: Accepted any security model (v1|v2c|usm).
User’s Manual 4.4 Port Management Use the Port Menu to display or configure the Wall-mount Managed Switch's ports. This section has the following items: Port Configuration Configures port connection settings Port Statistics Overview Lists Ethernet and RMON port statistics Port Statistics Detail Lists Ethernet and RMON port statistics SFP Module Information Display SFP information Port Mirror Sets the source and target ports for mirroring 4.4.
User’s Manual • Configured Link Speed Select any available link speed for the given switch port. Draw the menu bar to select the mode. • Flow Control Auto - Setup Auto negotiation for copper interface. 10Mbps HDX - Force sets 10Mbps/Half-Duplex mode. 10Mbps FDX - Force sets 10Mbps/Full-Duplex mode. 100Mbps HDX - Force sets 100Mbps/Half-Duplex mode. 100Mbps FDX - Force sets 100Mbps/Full-Duplex mode. 1Gbps FDX - Force sets 10000Mbps/Full-Duplex mode.
User’s Manual 4.4.2 Port Statistics Overview This Page provides an overview of general traffic statistics for all switch ports. The Port Statistics Overview screen in Figure 4-4-2 appears. Figure 4-4-2: Port Statistics Overview Page Screenshot The displayed counters are: Object Description • Port The logical port for the settings contained in the same row. • Packets The number of received and transmitted packets per port. • Bytes The number of received and transmitted bytes per port.
User’s Manual The Port Statistics Detail screen in Figure 4-4-3 appears. Figure 4-4-3: Detailed Port Statistics Port 1 Page Screenshot The Page includes the following fields: Receive Total and Transmit Total Object Description • Rx and Tx Packets The number of received and transmitted (good and bad) packets • Rx and Tx Octets The number of received and transmitted (good and bad) bytes, including FCS, but excluding framing bits.
User’s Manual Receive and Transmit Queue Counters The number of received and transmitted packets per input and output queue. Receive Error Counters Object Description • Rx Drops The number of frames dropped due to lack of receive buffers or egress congestion. • Rx CRC/Alignment The number of frames received with CRC or alignment errors. • Rx Undersize The number of short frames received with valid CRC. • Rx Oversize The number of long frames received with valid CRC.
User’s Manual Figure 4-4-4: SFP Module Information for Switch Page Screenshot The Page includes the following fields: Object Description • Type Display the type of current SFP module; the possible types are: 1000BASE-SX 1000BASE-LX 100BASE-FX Display the speed of current SFP module; the speed value or description is • Speed obtained from the SFP module. Different vendors SFP modules might show different speed information.
User’s Manual Check SFP Monitor Event Alert box; it will be in accordance with your warning temperature setting and allows users to record message out via SNMP Trap. Auto-refresh : Check this box to enable an automatic refresh of the Page at regular intervals. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. : Click to refresh the Page immediately.
User’s Manual 4.4.5 Port Mirror Configure port Mirroring on this Page. This function provides monitoring network traffic that forwards a copy of each incoming or outgoing packet from one port of a network Switch to another port where the packet can be studied. It enables the manager to keep close track of switch performance and alter it if necessary. • To debug network problems, selected traffic can be copied, or mirrored to a mirror port where a frame analyzer can be attached to analyze the frame flow.
User’s Manual Figure 4-4-6: Mirror Configuration Page Screenshot The Page includes the following fields: Object Description • Port to mirror on Frames from ports that have either source (rx) or destination (tx) mirroring enabled are mirrored to this port. Disabled disables mirroring. • Port The logical port for the settings contained in the same row. • Mode Select mirror mode. ■ Rx only: Frames received at this port are mirrored to the mirroring port. Frames transmitted are not mirrored.
User’s Manual 4.5 Link Aggregation Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Groups (LAGs). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.
User’s Manual The Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems that require high speed redundant links. Link aggregation lets you group up to eight consecutive ports into a single dedicated connection. This feature can expand bandwidth to a device on the network. LACP operation requires full-duplex mode, more detail information refer to the IEEE 802.3ad standard.
User’s Manual 4.5.1 Static Aggregation This Page is used to configure the Aggregation hash mode and the aggregation group. The aggregation hash mode settings are global, whereas the aggregation group relate to the currently selected stack unit, as reflected by the Page header. Hash Code Contributors The Static Aggeration screen in Figure 4-5-2 appears.
User’s Manual Figure 4-5-3: Aggregation Group Configuration Page Screenshot The Page includes the following fields: .Object Description • Group ID Indicates the group ID for the settings contained in the same row. Group ID "Normal" indicates there is no aggregation. Only one group ID is valid per port. • Port Members Each switch port is listed for each group ID. Select a radio button to include a port in an aggregation, or clear the radio button to remove the port from the aggregation.
User’s Manual Figure 4-5-4 : LACP Port Configuration Page Screenshot The Page includes the following fields: Object Description • Port The switch port number. • LACP Enabled Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are connected to the same partner. LACP can form max 12 LAGs per switch and 2G LAGs per stack. • Key The Key value incurred by the port, range 1-65535 .
User’s Manual means greater priority. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
User’s Manual 4.5.3 LACP System Status This Page provides a status overview for all LACP instances. The LACP Status Page displays the current LACP aggregation Groups and LACP Port status. The LACP System Status screen in Figure 4-5-5 appears. Figure 4-5-5: LACP System Status Page Screenshot The Page includes the following fields: Object Description • Aggr ID The Aggregation ID associated with this aggregation instance.
User’s Manual 4.5.4 LACP Port Status This Page provides a status overview for LACP status for all ports. The LACP Port Status screen in Figure 4-5-6 appears. Figure 4-5-6: LACP Status Page Screenshot The Page includes the following fields: Object Description • Port The switch port number. • LACP 'Yes' means that LACP is enabled and the port link is up. 'No' means that LACP is not enabled or that the port link is down.
User’s Manual 4.5.5 LACP Port Statistics This Page provides an overview for LACP statistics for all ports. The LACP Port Statistics screen in Figure 4-5-7 appears. Figure 4-5-7: LACP Statistics Page Screenshot The Page includes the following fields: Object Description • Port The switch port number. • LACP Received Shows how many LACP frames have been sent from each port. • LACP Transmitted Shows how many LACP frames have been received at each port.
User’s Manual 4.6 VLAN 4.6.1 VLAN Overview A Virtual Local Area Network (VLAN) is a network topology configured according to a logical scheme rather than the physical layout. VLAN can be used to combine any collection of LAN segments into an autonomous user group that appears as a single LAN. VLAN also logically segment the network into different broadcast domains so that packets are forwarded only between ports within the VLAN.
User’s Manual 4.6.2 IEEE 802.1Q VLAN In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This Wall-mount Managed Switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks. This also provides a more secure and cleaner network environment. An IEEE 802.
User’s Manual ■ 802.1Q VLAN Tags The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x8100 in the Ether Type field. When a packet's Ether Type field is equal to 0x8100, the packet carries the IEEE 802.1Q/802.1p tag.
User’s Manual Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLAN are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as VLAN are concerned. Tagged packets are forwarded according to the VID contained within the tag.
User’s Manual ■ Port Overlapping Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can connect them by enabled routing on this switch. ■ Untagged VLANs Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security.
User’s Manual ■ IEEE 802.1Q Tunneling (Q-in-Q) IEEE 802.1Q Tunneling (QinQ) is designed for service providers carrying traffic for multiple customers across their networks. QinQ tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.
User’s Manual Global VLAN Configuration The Global VLAN Configuration screen in Figure 4-6-1 appears. Figure 4-6-1 : Global VLAN Configuration Screenshot The Page includes the following fields: Object Description • Allowed Access This field shows the allowed Access VLANs, it only affects ports configured as VLANs Access ports. Ports in other modes are members of all VLANs specified in the Allowed VLANs field. By default, only VLAN 1 is enabled.
User’s Manual Port VLAN Configuration The VLAN Port Configuration screen in Figure 4-6-2 appears. Figure 4-6-2 : Port VLAN Configuration Screenshot The Page includes the following fields: Object Description • Port This is the logical port number for this row. • Mode Access Access ports are normally used to connect to end stations. Dynamic features like Voice VLAN may add the port to more VLANs behind the scenes.
User’s Manual VLAN do not get C-tagged on egress • Egress tagging can be changed to tag all frames, in which case only tagged frames are accepted on ingress Hybrid Hybrid ports resemble trunk ports in many ways, but adds additional port configuration features.
User’s Manual embedded in the tag. If a frame is untagged or priority tagged, the frame gets classified to the Port VLAN. If frames must be tagged on egress, they will be tagged with the custom S-tag. • Ingress Filtering Hybrid ports allow for changing ingress filtering. Access and Trunk ports always have ingress filtering enabled. ■ If ingress filtering is enabled (checkbox is checked), frames classified to a VLAN that the port is not a member of get discarded.
User’s Manual prevented from dynamically adding ports to VLANs. The trick is to mark such VLANs as forbidden on the port in question. The syntax is identical to the syntax used in the Enabled VLANs field. By default, the field is left blank, which means that the port may become a member of all possible VLANs. The port must be a member of the same VLAN as the Port VLAN ID. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.6.
User’s Manual - Admin : This is reffered as static. - NAS : NAS provides port-based authentication, which involves communications between a Supplicant, Authenticator, and an Authentication Server. - Voice VLAN : Voice VLAN is a VLAN configured specially for voice traffic typically originating from IP phones. - MVR : MVR is used to eliminate the need to duplicate multicast traffic for subscribers in each VLAN. Multicast traffic for all channels is sent only on a single (multicast) VLAN.
User’s Manual 4.6.5 VLAN Port Status This Page provides VLAN Port Staus. The VLAN Port Status screen in Figure 4-6-5 appears. Figure 4-6-5: VLAN Port Status for Static User Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Port Type Show the VLAN Awareness for the port. If VLAN awareness is enabled, the tag is removed from tagged frames received on the port.
User’s Manual Functional Conflicts between feature. Conflicts due to hardware limitation. Direct conflict between user modules. Buttons : Select VLAN Users from this drop down list. Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. 4.6.6 Private VLAN The Private VLAN membership configurations for the switch can be monitored and modified here. Private VLANs can be added or deleted here.
User’s Manual include a port in a Private VLAN, check the box. To remove or exclude the port from the Private VLAN, make sure the box is unchecked. By default, no ports are members, and all boxes are unchecked. • Adding a New Private Click “Add New Private VLAN” to add a new private VLAN ID. An empty row is added to the table, and the private VLAN can be configured as needed. The VLAN allowed range for a private VLAN ID is the same as the switch port number range.
User’s Manual 4.6.7 Port Isolation Overview When a VLAN is configured to be a private VLAN, communication between ports within that VLAN can be prevented. Two application examples are provided in this section: • Customers connected to an ISP can be members of the same VLAN, but they are not allowed to communicate with each other within that VLAN.
User’s Manual The configuration of promiscuous and isolated ports applies to all private VLANs. When traffic comes in on a promiscuous port in a private VLAN, the VLAN mask from the VLAN table is applied. When traffic comes in on an isolated port, the private VLAN mask is applied in addition to the VLAN mask from the VLAN table. This reduces the ports to which forwarding can be done to just the promiscuous ports within the private VLAN.
User’s Manual 4.6.8 VLAN setting example: Separate VLAN 802.1Q VLAN Trunk Port Isolate 4.6.8.1 Two Separate 802.1Q VLANs The diagram shows how the Wall-mount Managed Switch handle Tagged and Untagged traffic flow for two VLANs. VLAN Group 2 and VLAN Group 3 are separated VLAN. Each VLAN isolate network traffic so only members of the VLAN receive traffic from the same VLAN members.
User’s Manual 1. While [PC-1] transmit an untagged packet enters Port-1, the Wall-mount Managed Switch will tag it with a VLAN Tag=2. [PC-2] and [PC-3] will received the packet through Port-2 and Port-3. 2. [PC-4],[PC-5] and [PC-6] received no packet. 3. While the packet leaves Port-2, it will be stripped away it tag becoming an untagged packet. 4. While the packet leaves Port-3, it will keep as a tagged packet with VLAN Tag=2. Tagged packet entering VLAN 2 5.
User’s Manual Figure 4-6-10: Change Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 3. Enable VLAN Tag for specific ports Link Type: Port-3 (VLAN-2) and Port-6 (VLAN-3) Change Port 3 Mode as Trunk and select Egress Tagging as Tag All and Type 2 in the Allowed VLANs column. Change Port 6 Mode as Trunk and select Egress Tagging as Tag All and Type 3 in the Allowed VLANs column. The Per Port VLAN configuration in Figure 4-6-11 appears.
User’s Manual Figure 4-6-12: VLAN Trunking Diagram Setup steps 1. Add VLAN Group Add two VLANs – VLAN 2 and VLAN 3 For Type 1-3 in Allowed Access VLANs column, the 1-3 includes VLAN1 and 2 and 3. Figure 4-6-13: Add VLAN 2 and VLAN 3 2.
User’s Manual Figure 4-6-14: Changes Port VLAN of Port 1~3 to be VLAN2 and Port VLAN of Port 4~6 to be VLAN3 For the VLAN ports connecting to the hosts, please refer to 4.6.10.1. The following steps focus on the VLAN Trunk port configuration. 1. Specify Port-7 to be the 802.1Q VLAN Trunk port. 2. Assign Port-7 to both VLAN 2 and VLAN 3 on the VLAN Member configuration Page. 3. Define a VLAN 1 as a “Public Area” that overlaps both VLAN 2 and VLAN 3 members. 4.
User’s Manual 6. Repeat Steps 1 to 6 to set up the VLAN Trunk port at the partner switch. To add more VLANs to join the VLAN trunk, repeat Steps 1 to 3 to assign the Trunk port to the VLANs. 4.6.8.3 Port Isolate The diagram shows how the Wall-mount Managed Switch handles isolated and promiscuous ports, and the each PC is not able to access the isolated port of each other’s PCs. But they all need to access with the same server/AP/Printer.
User’s Manual 2. Assign VLAN Member : VLAN 1 : Port-5 and Port-6 VLAN 2 : Port-1, Port-2, Port-5 and Port-6 VLAN 3: Port-3~Port-6. The screen in Figure 4-6-18 appears. Figure 4-6-17: Private VLAN Port Setting 4.6.9 MAC-based VLAN The MAC-based VLAN enties can be configured here. This Page allows for adding and deleting MAC-based VLAN entries and assigning the entries to different ports. This Page shows only static entries. The MAC-based VLAN screen in Figure 4-6-18 appears.
User’s Manual will be deleted in the stack. • MAC Address Indicates the MAC address. • VLAN ID Indicates the VLAN ID. • Port Members A row of check boxes for each port is displayed for each MAC-based VLAN entry. To include a port in a MAC-based VLAN, check the box. To remove or exclude the port from the MAC-based VLAN, make sure the box is unchecked. By default, no ports are members, and all boxes are unchecked. • Adding a New MAC-based VLAN Click “Add New Entry” to add a new MAC-based VLAN entry.
User’s Manual 4.6.10 MAC-based VLAN Status This Page shows MAC-based VLAN entries configured by various MAC-based VLAN users. The MAC-based VLAN Status screen in Figure 4-6-19 appears. Figure 4-6-19: MAC-based VLAN Membership Configuration for User Static Page Screenshot The Page includes the following fields: Object Description • MAC Address Indicates the MAC address. • VLAN ID Indicates the VLAN ID. • Port Members Port members of the MAC-based VLAN entry.
User’s Manual The page includes the following fields: Object Description • Delete To delete a Protocol to Group Name map entry, check this box. The entry will be deleted on the switch during the next Save. Indicates the index of the entry. It is user configurable. It's value ranges from • VCE ID 0-256. If a VCE ID is 0, application will auto-generate the VCE ID for that entry. Deletion and lookup of IP subnet-based VLAN are based on VCE ID. • IP Address Indicates the IP address.
User’s Manual 4.6.12 Protocol-based VLAN This Page allows you to add new protocols to Group Name (unique for each Group) mapping entries as well as allow you to see and delete already mapped entries for the switch. The Protocol-based VLAN screen in Figure 4-6-21 appears. Figure 4-6-21: Protocol to Group Mapping Table Page Screenshot The Page includes the following fields: Object Description • Delete To delete a Protocol to Group Name map entry, check this box.
User’s Manual a. OUI: OUI (Organizationally Unique Identifier) is value in format of xx-xx-xx where each pair (xx) in string is a hexadecimal value ranges from 0x00-0xff. b. PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of SNAP; if the OUI is an OUI for a particular organization, the protocol ID is a value assigned by that organization to the protocol running on top of SNAP.
User’s Manual 4.6.13 Protocol-based VLAN Membership This Page allows you to map a already configured Group Name to a VLAN for the switch. The Group Name to VLAN Mapping Table screen in Figure 4-6-22 appears. Figure 4-6-22: Group Name to VLAN Mapping Table Page Screenshot The Page includes the following fields: Object Description • Delete To delete a Group Name to VLAN map entry, check this box.
User’s Manual 4.7 Spanning Tree Protocol 4.7.1 Theory The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
User’s Manual The path cost to the root from the transmitting port The port identifier of the transmitting port The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
User’s Manual From forwarding to disabled From disabled to blocking Figure 4-7-1: STP Port State Transitions You can modify each port state by using management software. When you enable STP, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
User’s Manual The following are the user-configurable STP parameters for the switch level: Parameter Description Default Value Bridge Identifier(Not user A combination of the User-set priority and 32768 + MAC configurable the switch’s MAC address.
User’s Manual User-Changeable STA Parameters The Switch’s factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows: Priority – A Priority for the switch can be set from 0 to 65535. 0 is equal to the highest Priority. Hello Time – The Hello Time can be from 1 to 10 seconds.
User’s Manual Figure 4-7-2: Before Applying the STA Rules In this example, only the default STP values are used.
User’s Manual The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 20,000) on switch A are connected to one (optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link (default port cost = 200,000).
User’s Manual The Page includes the following fields: Basic Settings Object Description • Protocol Version The STP protocol version setting. Valid values are: STP (IEEE 802.1D Spanning Tree Protocol) RSTP (IEEE 802.2w Rapid Spanning Tree Protocol) MSTP (IEEE 802.1s Multiple Spanning Tree Protocol) • Bridge Priority Controls the bridge priority. Lower numeric values have better priority.
User’s Manual Control whether a port in the error-disabled state automatically will be enabled • Port Error Recovery after a certain time. If recovery is not enabled, ports have to be disabled and re-enabled for normal STP operation. The condition is also cleared by a system reboot. The time that has to pass before a port in the error-disabled state can be • Port Error Recovery enabled. Valid values are between 30 and 86400 seconds (24 hours).
User’s Manual sum of the Port Path Costs on the least cost path to the Root Bridge. • Topology Flag The current state of the Topology Change Flag for this Bridge instance. • Topology Change Last The time since last Topology Change occurred. Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. 4.7.
User’s Manual The Page includes the following fields: Object Description • Port The switch port number of the logical STP port. • STP Enabled Controls whether RSTP is enabled on this switch port. • Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered.
User’s Manual Error Recovery setting as well. Controls whether the port connects to a point-to-point LAN rather than a shared • Point-to-point medium. This can be automatically determined, or forced either true or false. Transitions to the forwarding state is faster for point-to-point LANs than for shared media. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values.
User’s Manual Gigabit Ethernet Trunk 50,000 Full Duplex 10,000 Trunk 5,000 Table 4-7-3: Default STP Path Costs 4.7.5 MSTI Priorities This Page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Priority screen in Figure 4-7-7 appears. Figure 4-7-7: MSTI Priority Page Screenshot The Page includes the following fields: Object Description • MSTI The bridge instance.
User’s Manual 4.7.6 MSTI Configuration This Page allows the user to inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well. The MSTI Configuration screen in Figure 4-7-8 appears. Figure 4-7-8: MSTI Configuration Page Screenshot The Page includes the following fields: Configuration Identification Object Description • Configuration Name The name identifiying the VLAN to MSTI mapping.
User’s Manual MSTI Mapping Object Description • MSTI The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped. The list of VLAN's mapped to the MSTI. The VLANs must be separated with • VLANs Mapped comma and/or space. A VLAN can only be mapped to one MSTI. A unused MSTI should just be left empty. (I.e. not having any VLANs mapped to it.
User’s Manual Figure 4-7-10 : MST1 MSTI Port Configuration Page Screenshot The Page includes the following fields: MSTx MSTI Port Configuration Object Description • Port The switch port number of the corresponding STP CIST (and MSTI) port. • Path Cost Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered.
User’s Manual 4.7.8 Port Status This Page displays the STP CIST port status for port physical ports in the currently selected switch. The STP Port Status screen in Figure 4-7-11 appears. Figure 4-7-11: STP Port Status Page Screenshot The Page includes the following fields: Object Description • Port The switch port number of the logical STP port. • CIST Role The current STP port role of the ICST port.
User’s Manual 4.7.9 Port Statistics This Page displays the STP port statistics counters for port physical ports in the currently selected switch. The STP Port Statistics screen in Figure 4-7-12 appears. Figure 4-7-12: STP Statistics Page Screenshot The Page includes the following fields: Object Description • Port The switch port number of the logical RSTP port. • MSTP The number of MSTP Configuration BPDU's received/transmitted on the port.
User’s Manual 4.8 Multicast 4.8.1 IGMP Snooping The Internet Group Management Protocol (IGMP) lets host and routers share information about multicast groups memberships. IGMP snooping is a switch feature that monitors the exchange of IGMP messages and copies them to the CPU for feature processing. The overall purpose of IGMP Snooping is to limit the forwarding of multicast frames to only ports that are a member of the multicast group.
User’s Manual Figure 4-8-2: Multicast Flooding Figure 4-8-3: IGMP Snooping Multicast Stream Control 161
User’s Manual IGMP Versions 1 and 2 Multicast groups allow members to join or leave at any time. IGMP provides the method for members and multicast routers to communicate when joining or leaving a multicast group. IGMP version 1 is defined in RFC 1112. It has a fixed packet size and no optional data.
User’s Manual The states a computer will go through to join or to leave a multicast group are shown below: Figure 4-8-4: IGMP State Transitions IGMP Querier – A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
User’s Manual 4.8.2 Profile Table This page provides IPMC Profile related configurations. The IPMC profile is used to deploy the access control on IP multicast streams. It is allowed to create a maximum of 64 Profiles with a maximum of 128 corresponding rules for each. The Profile Table screen in Figure 4-8-5 appears. Figure 4-8-5: IPMC Profile Configuration Page The Page includes the following fields: Object Description • Global Profile Mode Enable/Disable the Global IPMC Profile.
User’s Manual Buttons : Click to add new IPMC profile. Specify the name and configure the new entry. Click "Save”. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.3 Address Entry This page provides address range settings used in IPMC profile. The address entry is used to specify the address range that will be associated with IPMC Profile. It is allowed to create a maximum of 128 address entries in the system.
User’s Manual : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. : Refreshes the displayed table starting from the input fields. : Updates the table starting from the first entry in the IPMC Profile Address Configuration. : Updates the table, starting with the entry after the last entry currently displayed. 4.8.4 IGMP Snooping Configuration This Page provides IGMP Snooping related configuration.
User’s Manual • Snooping Enabled Enable the Global IGMP Snooping. • Unregistered IPMCv4 Enable unregistered IPMCv4 traffic flooding. Flooding Enabled The flooding control takes effect only when IGMP Snooping is enabled. When IGMP Snooping is disabled, unregistered IPMCv4 traffic flooding is always active in spite of this setting. • IGMP SSM Range SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for the groups in the address range.
User’s Manual 4.8.5 IGMP Snooping VLAN Configuration Each Page shows up to 99 entries from the VLAN table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the VLAN Table. The first displayed will be the one with the lowest VLAN ID found in the VLAN Table. The "VLAN" input fields allow the user to select the starting point in the VLAN Table.
User’s Manual Default compatibility value is IGMP-Auto. (PRI) Priority of Interface. It indicates the IGMP control frame priority level • PRI generated by the system. These values can be used to prioritize different classes of traffic. The allowed range is 0 (best effort) to 7 (highest), default interface priority value is 0 Robustness Variable. The Robustness Variable allows tuning for the expected • RV packet loss on a network. The allowed range is 1 to 255, default robustness variable value is 2.
User’s Manual : Click to undo any changes made locally and revert to previously saved values. 4.8.6 IGMP Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service based on a specific subscription plan.
User’s Manual The Page includes the following fields: Object Description • Port The logical port for the settings. • Filtering Profile Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.7 IGMP Snooping Status This Page provides IGMP Snooping status.
User’s Manual Figure 4-8-10: IGMP Snooping Status Page Screenshot The Page includes the following fields: Object Description • VLAN ID The VLAN ID of the entry. • Querier Version Working Querier Version currently. • Host Version Working Host Version currently. • Querier Status Show the Querier status is "ACTIVE" or "IDLE". • Querier Transmitted The number of Transmitted Querier. • Querier Received The number of Received Querier. • V1 Reports Received The number of Received V1 Reports.
User’s Manual • Router Port Display which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer 3 multicast device or IGMP querier. Static denotes the specific port is configured to be a router port. Dynamic denotes the specific port is learnt to be a router port. Both denote the specific port is configured or learnt to be a router port. • Port Switch port number. • Status Indicate whether specific port is a router port or not.
User’s Manual 4.8.8 IGMP Group Information Entries in the IGMP Group Table are shown on this Page. The IGMP Group Table is sorted first by VLAN ID, and then by group. Each Page shows up to 99 entries from the IGMP Group table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the IGMP Group Table.
User’s Manual 4.8.9 IGMPv3 Information Entries in the IGMP SSM Information Table are shown on this Page. The IGMP SSM Information Table is sorted first by VLAN ID, then by group, and then by Port No. Diffrent source addresses belong to the same group are treated as single entry. Each Page shows up to 99 entries from the IGMP SSM (Source Specific Multicast) Information table, default being 20, selected through the "entries per Page" input field.
User’s Manual 4.8.10 MLD Snooping Configuration This Page provides MLD Snooping related configuration. The MLD Snooping Configuration screen in Figure 4-8-13 appears. Figure 4-8-13: MLD Snooping Configuration Page Screenshot The Page includes the following fields: Object Description • Snooping Enabled Enable the Global MLD Snooping. • Unregistered IPMCv6 Enable unregistered IPMCv6 traffic flooding. Flooding enabled The flooding control takes effect only when MLD Snooping is enabled.
User’s Manual Enable MLD Proxy. This feature can be used to avoid forwarding unnecessary • Proxy Enable join and leave messages to the router side. Specify which ports act as router ports. A router port is a port on the Ethernet • Router Port switch that leads towards the Layer 3 multicast device or MLD querier. If an aggregation member port is selected as a router port, the whole aggregation will act as a router port. The allowed selection is Auto, Fix, Fone, default compatibility value is Auto.
User’s Manual • VLAN ID The VLAN ID of the entry. • MLD Snooping Enable Enable the per-VLAN MLD Snooping. Up to 32 VLANs can be selected for MLD Snooping. Enable to join MLD Querier election in the VLAN. Disable to act as a MLD • Querier Election Non-Querier. Compatibility is maintained by hosts and routers taking appropriate actions • Compatibility depending on the versions of MLD operating on hosts and routers within a network.
User’s Manual : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.12 MLD Snooping Port Group Filtering In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service based on a specific subscription plan.
User’s Manual Figure 4-8-15: MLD Snooping Port Group Filtering Configuration Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings. • Filtering Group Select the IPMC Profile as the filtering condition for the specific port. Summary about the designated profile will be shown by clicking the view button. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.8.
User’s Manual Figure 4-8-16: MLD Snooping Status Page Screenshot The Page includes the following fields: Object Description • VLAN ID The VLAN ID of the entry. • Querier Version Working Querier Version currently. • Host Version Working Host Version currently. • Querier Status Shows the Querier status is "ACTIVE" or "IDLE". "DISABLE" denotes the specific interface is administratively disabled. • Querier Transmitted The number of Transmitted Querier.
User’s Manual switch that leads towards the Layer 3 multicast device or MLD querier. Static denotes the specific port is configured to be a router port. Dynamic denotes the specific port is learnt to be a router port. Both denote the specific port is configured or learnt to be a router port. • Port Switch port number. • Status Indicates whether specific port is a router port or not. Buttons : Click to refresh the Page immediately. : Clears all Statistics counters.
User’s Manual 4.8.14 MLD Group Information Entries in the MLD Group Table are shown on this Page. The MLD Group Table is sorted first by VLAN ID, and then by group. Each Page shows up to 99 entries from the MLD Group table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the MLD Group Table.
User’s Manual 4.8.15 MLDv2 Information Entries in the MLD SFM Information Table are shown on this Page. The MLD SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
User’s Manual 4.8.16 MVR (Multicaset VLAN Registration) The MVR feature enables multicast traffic forwarding on the Multicast VLANs. ■ In a multicast television application, a PC or a network television or a set-top box can receive the multicast stream. ■ Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port.
User’s Manual Figure 4-8-19: MVR Configuration Page Screenshot The Page includes the following fields: Object Description • MVR Mode Enable/Disable the Global MVR. The Unregistered Flooding control depends on the current configuration in IGMP/MLD Snooping. It is suggested to enable Unregistered Flooding control when the MVR group table is full. • Delete Check to delete the entry. The designated entry will be deleted during the next save. • MVR VID Specify the Multicast VLAN ID.
User’s Manual management VLAN ports. • MVR Name MVR Name is an optional attribute to indicate the name of the specific MVR VLAN. Maximum length of the MVR VLAN Name string is 16. MVR VLAN Name can only contain alphabets or numbers. When the optional MVR VLAN name is given, it should contain at least one alphabet. MVR VLAN name can be edited for the existing MVR VLAN entries or it can be added to the new entries.
User’s Manual Caution: MVR source ports are not recommended to be overlapped with management VLAN ports. Select the port role by clicking the Role symbol to switch the setting. I indicates Inactive; S indicates Source; R indicates Receiver The default Role is Inactive. Enable the fast leave on the port. • Immediate Leave Buttons : Click to add new MVR VLAN. Specify the VID and configure the new entry.
User’s Manual • IGMPv2/MLDv1 Leaves The number of Received IGMPv2 Leaves and MLDv1 Dones, respectively. Received Buttons : Click to refresh the Page immediately. : Clears all Statistics counters. Auto-refresh : Automatic refresh occurs every 3 seconds. 4.8.18 MVR Groups Information Entries in the MVR Group Table are shown on this Page. The MVR Group Table is sorted first by VLAN ID, and then by group.
User’s Manual 4.8.19 MVR SFM Information Entries in the MVR SFM Information Table are shown on this Page. The MVR SFM (Source-Filtered Multicast) Information Table also contains the SSM (Source-Specific Multicast) information. This table is sorted first by VLAN ID, then by group, and then by Port. Different source addresses belong to the same group are treated as single entry.
User’s Manual 4.9 Quality of Service 4.9.1 Understanding QoS Quality of Service (QoS) is an advanced traffic prioritization feature that allows you to establish control over network traffic. QoS enables you to assign various grades of network service to different types of traffic, such as multi-media, video, protocol-specific, time critical, and file-backup traffic. QoS reduces bandwidth limitations, delay, loss, and jitter.
User’s Manual 4.9.2 Port Policing This Page allows you to configure the Policer settings for all switch ports. The Port Policing screen in Figure 4-9-1 appears. Figure 4-9-1: QoS Ingress Port Policers Page Screenshot The Page includes the following fields: Object Description • Port The port number for which the configuration below applies. • Enable Controls whether the policer is enabled on this switch port. • Rate Controls the rate for the policer.
User’s Manual 4.9.3 Port Classification This Page allows you to configure the basic QoS Ingress Classification settings for all switch ports. The Port Classification screen in Figure 4-9-2 appears. Figure 4-9-2 : QoS Ingress Port Classification Page Screenshot The Page includes the following fields: Object Description • Port The port number for which the configuration below applies. • CoS Controls the default class of service. All frames are classified to a CoS.
User’s Manual All means all ports will have one specific setting. • DPL Controls the default drop precedence level. All frames are classified to a drop precedence level. If the port is VLAN aware and the frame is tagged, then the frame is classified to a DPL that is equal to the DEI value in the tag. Otherwise the frame is classified to the default DPL. The classified DPL can be overruled by a QCL entry. All means all ports will have one specific setting. • PCP Controls the default PCP value.
User’s Manual 4.9.4 Port Scheduler This Page provides an overview of QoS Egress Port Schedulers for all switch ports. The Port Scheduler screen in Figure 4-9-3 appears. Figure 4-9-3: QoS Egress Port Schedule Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure the schedulers. For more detail, please refer to chapter 4.9.5.1.
User’s Manual 4.9.5 Port Shaping This Page provides an overview of QoS Egress Port Shapers for all switch ports. The Port Shapping screen in Figure 4-9-4 appears. Figure 4-9-4: QoS Egress Port Shapers Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure the shapers. For more detail, please refer to chapter 4.9.5.1.
User’s Manual 4.9.5.1 QoS Egress Port Schedule and Shapers The Port Scheduler and Shapers for a specific port are configured on this Page. The QoS Egress Port Schedule and Shaper screen in Figure 4-9-5 appears. Figure 4-9-5: QoS Egress Port Schedule and Shapers Page Screenshot The Page includes the following fields: Object Description • Schedule Mode Controls whether the scheduler mode is "Strict Priority" or "Weighted" on this switch port.
User’s Manual The default value is "kbps". • Queue Shaper Excess Controls whether the queue is allowed to use excess bandwidth. • Queue Scheduler Controls the weight for this queue. Weight This value is restricted to 1-100. This parameter is only shown if "Scheduler Mode" is set to "Weighted". The default value is "17". • Queue Scheduler Percent Shows the weight in percent for this queue. This parameter is only shown if "Scheduler Mode" is set to "Weighted".
User’s Manual 4.9.6 Port Tag Remarking This Page provides an overview of QoS Egress Port Tag Remarking for all switch ports. The Port Tag Remarking screen in Figure 4-9-6 appears. Figure 4-9-6: QoS Egress Port Tag Remarking Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. Click on the port number in order to configure tag remarking. For more detail, please refer to chapter 4.9.6.1.
User’s Manual 4.9.6.1 QoS Egress Port Tag Remarking The QoS Egress Port Tag Remarking for a specific port are configured on this Page. The QoS Egress Port Tag Remarking screen in Figure 4-9-7 appears. Figure 4-9-7: QoS Egress Port Tag Remarking Page Screenshot The Page includes the following fields: Object Description • Mode Controls the tag remarking mode for this port. • PCP/DEI Configuration • (QoS class, DP level) to (PCP, DEI) Mapping ■ Classified: Use classified PCP/DEI values.
User’s Manual 4.9.7 Port DSCP This Page allows you to configure the basic QoS Port DSCP Configuration settings for all switch ports. The Port DSCP screen in Figure 4-9-8 appears. Figure 4-9-8: QoS Port DSCP Configuration Page Screenshot The Page includes the following fields: Object Description • Port The Port coulmn shows the list of ports for which you can configure dscp ingress and egress settings.
User’s Manual Translate Classify • Translate To Enable the Ingress Translation click the checkbox. • Classify Classification for a port have 4 different values. Disable: No Ingress DSCP Classification. DSCP=0: Classify if incoming (or translated if enabled) DSCP is 0. Selected: Classify only selected DSCP for which classification is enabled as specified in DSCP Translation window for the specific DSCP. • Egress All: Classify all DSCP.
User’s Manual 4.9.8 DSCP-based QoS This Page allows you to configure the basic QoS DSCP-based QoS Ingress Classification settings for all switches. The DSCP-based QoS screen in Figure 4-9-9 appears. Figure 4-9-9: DSCP-based QoS Ingress Classification Page Screenshot The Page includes the following fields: Object Description • DSCP Maximum number of support ed DSCP values are 64. • Trust Controls whether a specific DSCP value is trusted.
User’s Manual 4.9.9 DSCP Translation This Page allows you to configure the basic QoS DSCP Translation settings for all switches. DSCP translation can be done in Ingress or Egress. The DSCP Translation screen in Figure 4-9-10 appears. Figure 4-9-10: DSCP Translation Page Screenshot The Page includes the following fields: Object Description • DSCP Maximum number of supported DSCP values are 64 and valid DSCP value ranges from 0 to 63.
User’s Manual • Classify Click to enable Classification at Ingress side. • Egress There are the following configurable parameters for Egress side – Remap DP0 Controls the remapping for frames with DP level 0. Remap DP1 Controls the remapping for frames with DP level 1. Select the DSCP value from select menu to which you want to remap. DSCP • Remap DP0 value ranges form 0 to 63. Select the DSCP value from select menu to which you want to remap. DSCP • Remap DP1 value ranges form 0 to 63.
User’s Manual The Page includes the following fields: Object Description • QoS Class Available QoS Class value ranges from 0 to 7. QoS Class (0-7) can be mapped to followed parameters. • DPL Actual Drop Precedence Level. • DSCP Select DSCP value (0-63) from DSCP menu to map DSCP to corresponding QoS Class and DPL value Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.9.
User’s Manual ■ Unicast: Only Unicast MAC addresses are allowed. ■ Multicast: Only Multicast MAC addresses are allowed. ■ Broadcast: Only Broadcast MAC addresses are allowedd. The default value is 'Any'. • SMAC Displays the OUI field of Source MAC address, i.e. first three octet (byte) of MAC address. • Tag Type Indicates tag type. Possible values are: ■ Any: Match tagged and untagged frames. ■ Untagged: Match untagged frames. ■ Tagged: Match tagged frames.
User’s Manual 4.9.11.1 QoS Control Entry Configuration The QCE Configuration screen in Figure 4-9-13 appears. Figure 4-9-13: QCE Configuration Page Screenshot The Page includes the following fields: Object Description • Port Members Check the checkbox button in case you what to make any port member of the QCL entry.
User’s Manual 3. LLC 4. SNAP 5. IPv4 6. IPv6 Note: all frame types are explained below. • Any Allow all types of frames. • EtherType Ethernet Type Valid ethernet type can have value within 0x600-0xFFFF or 'Any' but excluding 0x800(IPv4) and 0x86DD(IPv6), default value is 'Any'.
User’s Manual value or 'Any'. DSCP values are in the range 0-63 including BE, CS1-CS7, EF or AF11-AF43 ■ Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP ■ Dport Destination TCP/UDP port:(0-65535) or 'Any', specific or port range applicable for IP protocol UDP/TCP • Action Parameters ■ Class QoS class: (0-7) or 'Default'. ■ DPL Valid Drop Precedence Level can be (0-3) or 'Default'.
User’s Manual The Page includes the following fields: Object Description • User Indicates the QCL user. • QCE# Indicates the index of QCE. • Port Indicates the list of ports configured with the QCE. • Frame Type Indicates the type of frame to look for incomming frames. Possible frame types are: ■ Any: The QCE will match all frame type. ■ Ethernet: Only Ethernet frames (with Ether Type 0x600-0xFFFF) are allowed. ■ LLC: Only (LLC) frames are allowed. ■ SNAP: Only (SNAP) frames are allowed.
User’s Manual 4.9.13 Storm Control Configuration Storm control for the switch is configured on this Page. There is a unicast storm rate control, multicast storm rate control, and a broadcast storm rate control. These only affect flooded frames, i.e. frames with a (VLAN ID, DMAC) pair not present on the MAC Address table. The configuration indicates the permitted packet rate for unicast, multicast or broadcast traffic across the switch. The Storm Control Configuration screen in Figure 4-9-15 appears.
User’s Manual 4.9.14 QoS Statistics This Page provides statistics for the different queues for all switch ports. The QoS Statistics screen in Figure 4-9-17 appears. Figure 4-9-16: Queuing Counters Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Q0 ~ Q7 There are 8 QoS queues per port. Q0 is the lowest priority queue. • Rx/Tx The number of received and transmitted packets per queue.
User’s Manual 4.9.15 Voice VLAN Configuration The Voice VLAN feature enables voice traffic forwarding on the Voice VLAN, then the switch can classify and schedule network traffic. It is recommended that there be two VLANs on a port - one for voice, one for data. Before connecting the IP device to the switch, the IP phone should configure the voice VLAN ID correctly. It should be configured through its own GUI. The Voice VLAN Configuration screen in Figure 4-9-18 appears.
User’s Manual The Page includes the following fields: Object Description • Mode Indicates the Voice VLAN mode operation. We must disable MSTP feature before we enable Voice VLAN. It can avoid the conflict of ingress filter. Possible modes are: • VLAN ID ■ Enabled: Enable Voice VLAN mode operation. ■ Disabled: Disable Voice VLAN mode operation. Indicates the Voice VLAN ID. It should be a unique VLAN ID in the system and cannot equal each port PVID.
User’s Manual 4.9.16 Voice VLAN OUI Table Configure VOICE VLAN OUI table on this Page. The maximum entry number is 16. Modifying the OUI table will restart auto detection of OUI process. The Voice VLAN OUI Table screen in Figure 4-9-18 appears. Figure 4-9-18: Voice VLAN OUI Table Page Screenshot The Page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save.
User’s Manual 4.10 Access Control List ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL. The privileges determine whether there are specific traffic object access rights.
User’s Manual frames. ■ ARP: The ACE will match ARP/RARP frames. ■ IPv4: The ACE will match all IPv4 frames. ■ IPv4/ICMP: The ACE will match IPv4 frames with ICMP protocol. ■ IPv4/UDP: The ACE will match IPv4 frames with UDP protocol. ■ IPv4/TCP: The ACE will match IPv4 frames with TCP protocol. ■ IPv4/Other: The ACE will match IPv4 frames, which are not ICMP/UDP/TCP. ■ IPv6: The ACE will match all IPv6 standard frames. Indicates the forwarding action of the ACE.
User’s Manual 4.10.2 Access Control List Configuration This Page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE that is defined. The maximum number of ACEs is 512 on each switch. Click on the lowest plus sign to add a new ACE to the list. The reserved ACEs used for internal protocol, cannot be edited or deleted, the order sequence cannot be changed and the priority is highest.
User’s Manual • Port Redirect Indicates the port redirect operation of the ACE. Frames matching the ACE are redirected to the port number. The allowed values are Disabled or a specific port number. When Disabled is displayed, the port redirect operation is disabled. Specify the mirror operation of this port. Frames matching the ACE are mirrored • Mirror to the destination mirror port. The allowed values are: Enabled: Frames received on the port are mirrored.
User’s Manual 4.10.3 ACE Configuration Configure an ACE (Access Control Entry) on this Page. An ACE consists of several parameters. These parameters vary according to the frame type that you select. First select the ingress port for the ACE, and then select the frame type. Different parameter options are displayed depending on the frame type selected. A frame that hits this ACE matches the configuration that is defined here. The ACE Configuration screen in Figure 4-10-3 appears.
User’s Manual ■ Any: Any frame can match this ACE. ■ Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE 802.3 describes the value of Length/Type Field specifications to be greater than or equal to 1536 decimal (equal to 0600 hexadecimal). ■ ARP: Only ARP frames can match this ACE. Notice the ARP frames won't match the ACE with ethernet type. ■ IPv4: Only IPv4 frames can match this ACE. Notice the IPv4 frames won't match the ACE with ethernet type.
User’s Manual MAC Parameters Object Description • SMAC Filter (Only displayed when the frame type is Ethernet Type or ARP.) Specify the source MAC filter for this ACE. ■ Any: No SMAC filter is specified. (SMAC filter status is "don't-care".) ■ Specific: If you want to filter a specific source MAC address with this ACE, choose this value. A field for entering an SMAC value appears. • SMAC Value When "Specific" is selected for the SMAC filter, you can enter a specific source MAC address.
User’s Manual • Tag Priority Specify the tag priority for this ACE. A frame that hits this ACE matches this tag priority. The allowed number range is 0 to 7. The value Any means that no tag priority is specified (tag priority is "don't-care".) ARP Parameters The ARP parameters can be configured when Frame Type "ARP" is selected. Object Description • ARP/RARP Specify the available ARP/RARP opcode (OP) flag for this ACE. • Request/Reply • Sender IP Filter ■ Any: No ARP/RARP OP flag is specified.
User’s Manual • ARP Sender MAC Match • RARP Target MAC Match • IP/Ethernet Length Specify whether frames can hit the action according to their sender hardware address field (SHA) settings. ■ 0: ARP frames where SHA is not equal to the SMAC address. ■ 1: ARP frames where SHA is equal to the SMAC address. ■ Any: Any value is allowed ("don't-care"). Specify whether frames can hit the action according to their target hardware address field (THA) settings.
User’s Manual defining UDP parameters will appear. These fields are explained later in this help file. ■ TCP: Select TCP to filter IPv4 TCP protocol frames. Extra fields for defining TCP parameters will appear. These fields are explained later in this help file. • IP Protocol Value When "Specific" is selected for the IP protocol value, you can enter a specific value. The allowed range is 0 to 255. A frame that hits this ACE matches this IP protocol value.
User’s Manual ■ Any: No destination IP filter is specified. (Destination IP filter is "don't-care".) ■ Host: Destination IP filter is set to Host. Specify the destination IP address in the DIP Address field that appears. ■ Network: Destination IP filter is set to Network. Specify the destination IP address and destination IP mask in the DIP Address and DIP Mask fields that appear.
User’s Manual usage of bitmask, if the binary bit value is "0", it means this bit is "don't-care". The real matched pattern is [sipv6_address & sipv6_bitmask] (last 32 bits). For example, if the SIPv6 address is 2001::3 and the SIPv6 bitmask is 0xFFFFFFFE(bit 0 is "don't-care" bit), then SIPv6 address 2001::2 and 2001::3 are applied to this rule. • Hop Limit Specify the hop limit settings for this ACE. ■ zero: IPv6 frames with a hop limit field greater than zero must not be able to match this entry.
User’s Manual ■ Any: No TCP/UDP source filter is specified (TCP/UDP source filter status is "don't-care"). ■ Specific: If you want to filter a specific TCP/UDP source filter with this ACE, you can enter a specific TCP/UDP source value. A field for entering a TCP/UDP source value appears. ■ Range: If you want to filter a specific TCP/UDP source range filter with this ACE, you can enter a specific TCP/UDP source range value. A field for entering a TCP/UDP source value appears. • TCP/UDP Source No.
User’s Manual • TCP RST Specify the TCP "Reset the connection" (RST) value for this ACE. ■ 0: TCP frames where the RST field is set must not be able to match this entry. • TCP PSH ■ 1: TCP frames where the RST field is set must be able to match this entry. ■ Any: Any value is allowed ("don't-care"). Specify the TCP "Push Function" (PSH) value for this ACE. ■ 0: TCP frames where the PSH field is set must not be able to match this entry.
User’s Manual 4.10.4 ACL Ports Configuration Configure the ACL parameters (ACE) of each switch port. These parameters will affect frames received on a port unless the frame matches a specific ACE. The ACL Ports Configuration screen in Figure 4-10-4 appears. Figure 4-10-4: ACL Ports Configuration Page Screenshot The Page includes the following fields: Object Description • Port The logical port for the settings contained in the same row. • Policy ID Select the policy to apply to this port.
User’s Manual • Mirror Specify the mirror operation of this port. The allowed values are: ■ Enabled: Frames received on the port are mirrored. ■ Disabled: Frames received on the port are not mirrored. The default value is "Disabled". • Logging Specify the logging operation of this port. The allowed values are: ■ Enabled: Frames received on the port are stored in the System Log. ■ Disabled: Frames received on the port are not logged. The default value is "Disabled".
User’s Manual 4.10.5 ACL Rate Limiter Configuration Configure the rate limiter for the ACL of the switch. The ACL Rate Limiter Configuration screen in Figure 4-10-5 appears. Figure 4-10-5: ACL Rate Limiter Configuration Page Screenshot The Page includes the following fields: Object Description • Rate Limiter ID The rate limiter ID for the settings contained in the same row. • Rate (pps) The allowed values are: 0-3276700 in pps or 0, 100, 200, 300, ..., 1000000 in kbps. • Unit Specify the rate unit.
User’s Manual 4.11 Authentication This section is to control the access of the Wall-mount Managed Switch, including the user access and management control. The Authentication section contains links to the following main topics: IEEE 802.1X Port-based Network Access Control MAC-based Authentication User Authentication Overview of 802.1X (Port-Based) Authentication In the 802.
User’s Manual software to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported. The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.
User’s Manual Figure 4-11-1 Client—the device (workstation) that requests access to the LAN and switch services and responds to requests from the switch. The workstation must be running 802.1X-compliant client software such as that offered in the Microsoft Windows XP operating system. (The client is the supplicant in the IEEE 802.1X specification.) Authentication server—performs the actual authentication of the client.
User’s Manual authentication server, the server's frame header is removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the client. Authentication Initiation and Message Exchange The switch or the client can initiate authentication. If you enable authentication on a port by using the dot1x port-control auto interface configuration command, the switch must initiate authentication when it determines that the port link state transitions from down to up.
User’s Manual Ports in Authorized and Unauthorized States The switch port state determines whether or not the client is granted access to the network. The port starts in the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X protocol packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all traffic for the client to flow normally. If a client that does not support 802.
User’s Manual The Page includes the following fields: Object Description • Client The management client for which the configuration below applies. • Authentication Method Authentication Method can be set to one of the following values: ■ None: authentication is disabled and login is not possible. ■ Local: use the local user database on the switch stack for authentication. ■ RADIUS: use a remote RADIUS server for authentication. ■ TACACS+: use a remote TACACS+ server for authentication.
User’s Manual Figure 4-11-4: Network Access Server Configuration Page Screenshot The Page includes the following fields: System Configuration Object Description • Mode Indicates if NAS is globally enabled or disabled on the switch. If globally disabled, all ports are allowed forwarding of frames. • Reauthentication Enabled If checked, successfully authenticated supplicants/clients are reauthenticated after the interval specified by the Reauthentication Period. Reauthentication for 802.
User’s Manual port. • Reauthentication Period Determines the period, in seconds, after which a connected client must be reauthenticated. This is only active if the Reauthentication Enabled checkbox is checked. Valid values are in the range 1 to 3600 seconds. • EAPOL Timeout Determines the time for retransmission of Request Identity EAPOL frames. Valid values are in the range 1 to 65535 seconds. This has no effect for MAC-based ports. • Aging Period This setting applies to the following modes, i.e.
User’s Manual The Hold Time can be set to a number between 10 and 1000000 seconds. • RADIUS-Assigned QoS Enabled RADIUS-assigned QoS provides a means to centrally control the traffic class to which traffic coming from a successfully authenticated supplicant is assigned on the switch. The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature.
User’s Manual Valid values are in the range [1; 255]. • Allow Guest VLAN if EAPOL Seen The switch remembers if an EAPOL frame has been received on the port for the life-time of the port. Once the switch considers whether to enter the Guest VLAN, it will first check if this option is enabled or disabled. If disabled (unchecked; default), the switch will only enter the Guest VLAN if an EAPOL frame has not been received on the port for the life-time of the port.
User’s Manual is very flexible, in that it allows for different authentication methods, like MD5-Challenge, PEAP, and TLS. The important thing is that the authenticator (the switch) doesn't need to know which authentication method the supplicant and the authentication server are using, or how many information exchange frames are needed for a particular method. The switch simply encapsulates the EAP part of the frame into the relevant type (EAPOL or RADIUS) and forwards it.
User’s Manual successfully authenticated. Multi 802.1X Multi 802.1X is - like Single 802.1X - not an IEEE standard, but a variant that features many of the same characteristics. In Multi 802.1X, one or more supplicants can get authenticated on the same port at the same time. Each supplicant is authenticated individually and secured in the MAC table using the Port Security module. In Multi 802.
User’s Manual several clients can be connected to the same port (e.g. through a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to authenticate. The advantage of MAC-based authentication over 802.1X-based authentication is that the clients don't need special supplicant software to authenticate.
User’s Manual arriving on the port will be classified and switched on the RADIUS-assigned VLAN ID. If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VLAN ID or it's invalid, or the supplicant is otherwise no longer present on the port, the port's VLAN ID is immediately reverted to the original VLAN ID (which may be changed by the administrator in the meanwhile without affecting the RADIUS-assigned). This option is only available for single-client modes, i.e.
User’s Manual Membership and VLAN Port" Pages. These Pages show which modules have (temporarily) overridden the current Port VLAN configuration. Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts transmitting EAPOL Request Identity frames. If the number of transmissions of such frames exceeds Max. Reauth. Count and no EAPOL frames have been received in the meanwhile, the switch considers entering the Guest VLAN.
User’s Manual ■ Reauthenticate: Schedules a reauthentication to whenever the quiet-period of the port runs out (EAPOL-based authentication). For MAC-based authentication, reauthentication will be attempted immediately. The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized. ■ Reinitialize: Forces a reinitialization of the clients on the port and thereby a reauthentication immediately.
User’s Manual 4.11.4 Network Access Overview This Page provides an overview of the current NAS port states for the selected switch. The Network Access Overview screen in Figure 4-11-5 appears. Figure 4-11-5: Network Access Server Switch Status Page Screenshot The Page includes the following fields: Object Description • Port The switch port number. Click to navigate to detailed NAS statistics for this port. • Admin State The port's current administrative state.
User’s Manual • QoS Class QoS Class assigned to the port by the RADIUS server if enabled. • Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID. Read more about RADIUS-assigned VLANs here. If the port is moved to the Guest VLAN, "(Guest)" is appended to the VLAN ID. Read more about Guest VLANs here.
User’s Manual is assigned. • Port VLAN ID The VLAN ID that NAS has put the port in. The field is blank, if the Port VLAN ID is not overridden by NAS. If the VLAN ID is assigned by the RADIUS server, "(RADIUS-assigned)" is appended to the VLAN ID. Read more about RADIUS-assigned VLANs here. If the port is moved to the Guest VLAN, "(Guest)" is appended to the VLAN ID. Read more about Guest VLANs here.
User’s Manual Rx Invalid Type amesRx been received by the switch. dot1xAuthInvalidEapolF The number of EAPOL ramesRx frames that have been received by the switch in which the frame type is not recognized. Rx Invalid Length dot1xAuthEapLengthErr The number of EAPOL orFramesRx frames that have been received by the switch in which the Packet Body Length field is invalid. Tx Total dot1xAuthEapolFrames The number of EAPOL Tx frames of any type that have been transmitted by the switch.
User’s Manual server following the first response from the supplicant. Indicates that the backend server has communication with the switch. MAC-based: Counts all Access Challenges received from the backend server for this port (left-most table) or client (right-most table). Rx Other dot1xAuthBackendOther 802.1X-based: Requests RequestsToSupplicant Counts the number of times that the switch sends an EAP Request packet following the first to the supplicant.
User’s Manual response packet to the backend server. Indicates the switch attempted communication with the backend server. Possible retransmissions are not counted. MAC-based: Counts all the backend server packets sent from the switch towards the backend server for a given port (left-most table) or client (right-most table). Possible retransmissions are not counted. • Last Supplicant/Client Info Information about the last supplicant/client that attempted to authenticate.
User’s Manual Selected Counters Object Description • Selected Counters The Selected Counters table is visible when the port is one of the following administrative states: ■ Multi 802.1X ■ MAC-based Auth. The table is identical to and is placed next to the Port Counters table, and will be empty if no MAC address is currently selected. To populate the table, select one of the attached MAC Addresses from the table below.
User’s Manual : This button is available in the following modes: • Force Authorized • Force Unauthorized • Port-based 802.1X • Single 802.1X Click to clear the counters for the selected port. : This button is available in the following modes: • Multi 802.1X • MAC-based Auth.X Click to clear both the port counters and all of the attached client's counters. The "Last Client" will not be cleared, however. : This button is available in the following modes: • Multi 802.1X • MAC-based Auth.
User’s Manual 4.11.6 RADIUS This Page allows you to configure the RADIUS Servers. The RADIUS Configuration screen in Figure 4-11-7 appears. Figure 4-11-7: RADIUS Server Configuration Page Screenshot The Page includes the following fields: Global Configuration These setting are common for all of the RADIUS Servers. Object Description • Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a RADIUS server before retransmitting the request.
User’s Manual The secret key - up to 63 characters long - shared between the RADIUS server • Key and the switch. The IPv4 address to be used as attribute 4 in RADIUS Access-Request packets. • NAS-IP-Address If this field is left blank, the IP address of the outgoing interface is used. • NAS-IPv6-Address The IPv6 address to be used as attribute 95 in RADIUS Access-Request packets. If this field is left blank, the IP address of the outgoing interface is used.
User’s Manual 4.11.7 TACACS+ This Page allows you to configure the TACACS+ Servers. The TACACS+ Configuration screen in Figure 4-11-8 appears. Figure 4-11-8: TACACS+ Server Configuration Page Screenshot The Page includes the following fields: Global Configuration These setting are common for all of the TACACS+ Servers. Object Description • Timeout Timeout is the number of seconds, in the range 1 to 1000, to wait for a reply from a TACACS+ server before it is considered to be dead.
User’s Manual Object Description • Delete To delete a TACACS+ server entry, check this box. The entry will be deleted during the next Save. • Hostname The IP address or hostname of the TACACS+ server. • Port The TCP port to use on the TACACS+ server for authentication. • Timeout This optional setting overrides the global timeout value. Leaving it blank will use the global timeout value. This optional setting overrides the global key. Leaving it blank will use the global key.
User’s Manual The Page includes the following fields: RADIUS Authentication Server Status Overview Object Description • # The RADIUS server number. Click to navigate to detailed statistics for this server. • IP Address The IP address and UDP port number (in : notation) of this server. • Status The current state of the server. This field takes one of the following values: Disabled: The server is disabled.
User’s Manual 4.11.9 RADIUS Details This Page provides detailed statistics for a particular RADIUS server. The RADIUS Authentication/Accounting for Server Overview screen in Figure 4-11-10 appears. Figure 4-11-10: RADIUS Authentication/Accounting for Server Overview Page Screenshot The Page includes the following fields: RADIUS Authentication Statistics The statistics map closely to those specified in RFC4668 - RADIUS Authentication Client MIB.
User’s Manual Rx Access radiusAuthClientExtA The number of RADIUS Accepts ccessAccepts Access-Accept packets (valid or invalid) received from the server. Rx Access Rejects radiusAuthClientExtA The number of RADIUS ccessRejects Access-Reject packets (valid or invalid) received from the server. Rx Access radiusAuthClientExtA The number of RADIUS Challenges ccessChallenges Access-Challenge packets (valid or invalid) received from the server.
User’s Manual authentication port and dropped for some other reason. Tx Access radiusAuthClientExtA The number of RADIUS Requests ccessRequests Access-Request packets sent to the server. This does not include retransmissions. Tx Access radiusAuthClientExtA The number of RADIUS Retransmissio ccessRetransmission Access-Request packets ns s retransmitted to the RADIUS authentication server.
User’s Manual in question. State - Shows the state of the server. It takes one of the following values: Disabled: The selected server is disabled. Not Ready: The server is enabled, but IP communication is not yet up and running. Ready: The server is enabled, IP communication is up and running, and the RADIUS module is ready to accept access attempts. Dead (X seconds left): Access attempts were made to this server, but it did not reply within the configured timeout.
User’s Manual Rx Malformed radiusAccClientExt The number of malformed Responses MalformedRespons RADIUS packets received es from the server. Malformed packets include packets with an invalid length. Bad authenticators or or unknown types are not included as malformed access responses. Rx Bad radiusAcctClientExt The number of RADIUS Authenticators BadAuthenticators packets containing invalid authenticators received from the server.
User’s Manual retransmission. Tx Timeouts radiusAccClientExt The number of accounting Timeouts timeouts to the server. After a timeout, the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout. • Other Info This section contains information about the state of the server and the latest round-trip time.
User’s Manual The granularity of this measurement is 100 ms. A value of 0 ms indicates that there hasn't been round-trip communication with the server yet. Buttons Auto-refresh : Check this box to refresh the Page automatically. Automatic refresh occurs every 3 seconds. : Click to refresh the Page immediately. : Clears the counters for the selected server. The "Pending Requests" counter will not be cleared by this operation. 4.11.
User’s Manual 2. Add New RADIUS Client on the Windows 2003 server Figure 4-11-12: Windows Server – Add New RADIUS Client Setting 3.
User’s Manual 4. The shared secret key should be the same as the key configured on the Wall-mount Managed Switch. Figure 4-11-14: Windows Server RADIUS Server Setting 5. Configure ports attribute of 802.1X the same as “802.1X Port Configuration”. Figure 4-11-15: 802.1x Port Configuration 6. Create user data. The establishment of the user data needs to be created on the Radius Server PC.
User’s Manual Figure 4-11-16: Windows 2003 AD Server Setting Path 7.
User’s Manual Figure 4-11-17: Add User Properties Screen Figure 4-11-18: Add User Properties Screen Set the Port Authenticate Status to “Force Authorized” if the port is connected to the RADIUS server or the port is an uplink port that is connected to another switch. Or once the 802.1X starts to work, the switch might not be able to access the RADIUS server.
User’s Manual 4.11.11 802.1X Client Configuration Windows XP is originally 802.1X support. As to other operating systems (windows 98SE, ME, 2000), an 802.1X client utility is needed. The following procedures show how to configure 802.1X Authentication in Windows XP. Please note that if you want to change the 802.1x authentication type of a wireless client, i.e. switch to EAP-TLS from EAP-MD5, you must remove the current existing wireless network from your preferred connection first, and add it in again.
User’s Manual Figure 4-11-20 7. Click “OK”. 8. When client has associated with the Wall-mount Managed Switch, a user authentication notice appears in system tray. Click on the notice to continue.
User’s Manual 9. Enter the user name, password and the logon domain that your account belongs. 10. Click “OK” to complete the validation process.
User’s Manual 4.12 Security This section is to control the access of the Wall-mount Managed Switch, includes the user access and management control. The Security Page contains links to the following main topics: Port Limit Control Access Management HTTPs / SSH DHCP Snooping IP Source Guard ARP Inspection 4.12.1 Port Limit Control This Page allows you to configure the Port Security Limit Control system and port settings.
User’s Manual Figure 4-12-1: Port Limit Control Configuration Overview Page Screenshot The Page includes the following fields: System Configuration Object Description • Mode Indicates if Limit Control is globally enabled or disabled on the switchstack. If globally disabled, other modules may still use the underlying functionality, but limit checks and corresponding actions are disabled. • Aging Enabled If checked, secured MAC addresses are subject to aging as discussed under Aging Period.
User’s Manual underlying port security will use the shorter requested aging period of all modules that use the functionality. The Aging Period can be set to a number between 10 and 10,000,000 seconds. To understand why aging may be desired, consider the following scenario: Suppose an end-host is connected to a 3rd party switch or hub, which in turn is connected to a port on this switch on which Limit Control is enabled. The end-host will be allowed to forward if the limit is not exceeded.
User’s Manual Trap: If Limit + 1 MAC addresses is seen on the port, send an SNMP trap. If Aging is disabled, only one SNMP trap will be sent, but with Aging enabled, new SNMP traps will be sent everytime the limit gets exceeded. Shutdown: If Limit + 1 MAC addresses is seen on the port, shut down the port. This implies that all secured MAC addresses will be removed from the port, and no new will be learned.
User’s Manual 4.12.2 Access Management Configure access management table on this Page. The maximum entry number is 16. If the application's type matches any one of the access management entries, it will allow access to the switch. The Access Management Configuration screen in Figure 4-12-2 appears. Figure 4-12-2: Access Management Configuration Overview Page Screenshot The Page includes the following fields: Object Description • Mode Indicates the access management mode operation.
User’s Manual 4.12.3 Access Management Statistics This Page provides statistics for access management. The Access Management Statistics screen in Figure 4-12-3 appears. Figure 4-12-3: Access Management Statistics Overview Page Screenshot The Page includes the following fields: Object Description • Interface The interface that allowed remote host can access the switch. • Receive Packets The received packets number from the interface under access management mode is enabled.
User’s Manual 4.12.4 HTTPs Configure HTTPS on this Page. The HTTPS Configuration screen in Figure 4-12-4 appears. Figure 4-12-4: HTTPS Configuration Screen Page Screenshot The Page includes the following fields: Object Description • Mode Indicates the HTTPS mode operation. When the current connection is HTTPS, to apply HTTPS disabled mode operation will automatically redirect web browser to an HTTP connection. Possible modes are: • Automatic Redirect Enabled: Enable HTTPS mode operation.
User’s Manual 4.12.5 SSH Configure SSH on this Page. This Page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
User’s Manual 4.12.6 Port Security Status This Page shows the Port Security status. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning. In this mode, frames from unknown MAC addresses are passed on to the port security module, which in turn asks all user modules whether to allow this new MAC address to forward or block it.
User’s Manual • User Module Name The full name of a module that may request Port Security services. • Abbr A one-letter abbreviation of the user module. This is used in the Users column in the port status table. Port Status The table has one row for each port on the selected switch in the switch and a number of columns, which are: Object Description • Port The port number for which the status applies. Click the port number to see the status for this particular port.
User’s Manual 4.12.7 Port Security Detail This Page shows the MAC addresses secured by the Port Security module. Port Security is a module with no direct configuration. Configuration comes indirectly from other modules - the user modules. When a user module has enabled port security on a port, the port is set-up for software-based learning.
User’s Manual 4.12.8 DHCP Snooping DHCP Snooping is used to block intruder on the untrusted ports of DUT when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. Configure DHCP Snooping on this Page. The DHCP Snooping Configuration screen in Figure 4-12-8 appears.
User’s Manual Figure 4-12-8: DHCP Snooping Configuration Screen Page Screenshot The Page includes the following fields: Object Description • Snooping Mode Indicates the DHCP snooping mode operation. Possible modes are: Enabled: Enable DHCP snooping mode operation. When enable DHCP snooping mode operation, the request DHCP messages will be forwarded to trusted ports and only allowed reply packets from trusted ports. Disabled: Disable DHCP snooping mode operation.
User’s Manual 4.12.9 Snooping Table This page display the dynamic IP assigned information after DHCP Snooping mode is disabled. All DHCP clients obtained the dynamic IP address from the DHCP server will be listed in this table except for local VLAN interface IP addresses. Entries in the Dynamic DHCP snooping Table are shown on this page. The Dynamic DHCP Snooping Table screen in Figure 4-12-9 appears.
User’s Manual Figure 4-12-10: IP Source Guard Configuration Screen Page Screenshot The Page includes the following fields: Object Description • Mode of IP Source Enable the Global IP Source Guard or disable the Global IP Source Guard. All Guard Configuration • Port Mode Configuration configured ACEs will be lost when the mode is enabled. Specify IP Source Guard is enabled on which ports.
User’s Manual Buttons : Click to translate all dynamic entries to static entries. : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.12.11 IP Source Guard Static Table This Page provides Static IP Source Guard Table. The Static IP Source Guard Table screen in Figure 4-12-11 appears. Figure 4-12-11: Static IP Source Guard Table Screen Page Screenshot The Page includes the following fields: Object Description • Delete Check to delete the entry.
User’s Manual 4.12.12 Dynamic IP Source Guard Table Entries in the Dynamic IP Source Guard Table are shown on this Page. The Dynamic IP Source Guard Table is sorted first by port, then by VLAN ID, then by IP address, and then by IP mask. The Dynamic IP Source Guard Table screen in Figure 4-12-12 appears.
User’s Manual 4.12.13 ARP Inspection ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by "poisoning" the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through DUT. This Page provides ARP Inspection related configuration. The ARP Inspection Configuration screen in Figure 4-12-13 appears.
User’s Manual Enabled: Enable ARP Inspection operation. Disabled: Disable ARP Inspection operation. If you want to inspect the VLAN configuration, you have to enable the setting of "Check VLAN". The default setting of "Check VLAN" is disabled. When the setting of "Check VLAN" is disabled, the log type of ARP Inspection will refer to the port setting. And the setting of "Check VLAN" is enabled, the log type of ARP Inspection will refer to the VLAN setting.
User’s Manual 4.12.14 ARP Inspection Static Table This Page provides Static ARP Inspection Table. The Static ARP Inspection Table screen in Figure 4-12-14 appears. Figure 4-12-14: Static ARP Inspection Table Screen Page Screenshot The Page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • Port The logical port for the settings. • VLAN ID The VLAN ID for the settings.
User’s Manual Figure 4-12-15: Dynamic ARP Inspection Table Screenshot Navigating the ARP Inspection Table Each Page shows up to 99 entries from the Dynamic ARP Inspection table, default being 20, selected through the "entries per Page" input field. When first visited, the web Page will show the first 20 entries from the beginning of the Dynamic ARP Inspection Table.
User’s Manual 4.13 MAC Address Table Switching of frames is based upon the DMAC address contained in the frame. The Wall-mount Managed Switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame ). This table contains both static and dynamic entries. The static entries are configured by the network administrator if the administrator wants to do a fixed mapping between the DMAC address and switch ports.
User’s Manual By default, dynamic entries are removed from the MAC table after 300 seconds. This removal is also called aging. Object Description • Disable Automatic Enables/disables the the automatic aging of dynamic entries Aging • Aging Time The time after which a learned entry is discarded. By default, dynamic entries are removed from the MAC after 300 seconds. This removal is also called aging.
User’s Manual 4.13.2 MAC Address Table Status Dynamic MAC Table Entries in the MAC Table are shown on this Page. The MAC Table contains up to 8192 entries, and is sorted first by VLAN ID, then by MAC address. The MAC Address Table screen in Figure 4-13-2 appears. Figure 4-13-2: MAC Address Table Status Page Screenshot Navigating the MAC Table Each Page shows up to 999 entries from the MAC table, default being 20, selected through the "entries per Page" input field.
User’s Manual The Page includes the following fields: Object Description • Type Indicates whether the entry is a static or dynamic entry. • VLAN The VLAN ID of the entry. • MAC Address The MAC address of the entry. • Port Members The ports that are members of the entry. Buttons Auto-refresh : Automatic refresh occurs every 3 seconds. : Refreshes the displayed table starting from the "Start from MAC address" and "VLAN" input fields. : Flushes all dynamic entries.
User’s Manual 4.14 LLDP 4.14.1 Link Layer Discovery Protocol Link Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broadcast domain. LLDP is a Layer 2 protocol that uses periodic broadcasts to advertise information about the sending device. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings.
User’s Manual The Page includes the following fields: LLDP Parameters Object Description • Tx Interval The switch is periodically transmitting LLDP frames to its neighbors for having the network discovery information up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5 32768 seconds.
User’s Manual Tx only The switch will drop LLDP information received from neighbors, but will send out LLDP information. Disabled The switch will not send out LLDP information, and will drop LLDP information received from neighbors. Enabled The switch will send out LLDP information, and will analyze LLDP information received from neighbors. • CDP Aware Select CDP awareness. The CDP operation is restricted to decoding incoming CDP frames (The switch doesn't transmit CDP frames).
User’s Manual Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. 4.14.3 LLDP MED Configuration This Page allows you to configure the LLDP-MED. The LLDPMED Configuration screen in Figure 4-14-2 appears.
User’s Manual limited LLDPU space and to reduce security and system integrity issues that can come with inappropriate knowledge of the network policy. With this in mind LLDP-MED defines an LLDP-MED Fast Start interaction between the protocol and the application layers on top of the protocol, in order to achieve these related properties. Initially, a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU.
User’s Manual Meters: Representing meters of Altitude defined by the vertical datum specified. Floors: Representing altitude in a form more relevant in buildings which have different floor-to-floor dimensions. An altitude = 0.0 is meaningful even outside a building, and represents ground level at the given latitude and longitude. Inside a building, 0.0 represents the floor level associated with ground level at the main entrance.
User’s Manual • House no. suffix House number suffix - Example: A, 1/2 • Landmark Landmark or vanity address - Example: Columbia University • Additional location Additional location info - Example: South Wing info • Name Name (residence and office occupant) - Example: Flemming Jahn • Zip code Postal/zip code - Example: 2791 • Building Building (structure) - Example: Low Library • Apartment Unit (Apartment, suite) - Example: Apt 42 • Floor Floor - Example: 4 • Room no.
User’s Manual 1. Layer 2 VLAN ID (IEEE 802.1Q-2003) 2. Layer 2 priority value (IEEE 802.1D-2004) 3. Layer 3 Diffserv code point (DSCP) value (IETF RFC 2474) This network policy is potentially advertised and associated with multiple sets of application types supported on a given port. The application types specifically addressed are: 1. Voice 2. Guest Voice 3. Softphone Voice 4. Video Conferencing 5. Streaming Video 6.
User’s Manual that require a different policy for the guest voice signaling than for the guest voice media. This application type should not be advertised if all the same network policies apply as those advertised in the Guest Voice application policy. Softphone Voice - for use by softphone applications on typical data centric devices, such as PCs or laptops.
User’s Manual 802.1D-2004. A value of 0 represents use of the default priority as defined in IEEE 802.1D-2004. • DSCP DSCP value to be used to provide Diffserv node behavior for the specified application type as defined in IETF RFC 2474. DSCP may contain one of 64 code point values (0 through 63). A value of 0 represents use of the default DSCP value as defined in RFC 2475. • Adding a new policy Click to add a new policy.
User’s Manual Figure 4-14-3: LLDP-MED Neighbor Information Page Screenshot The Page includes the following fields: Fast start repeat count Object Description • Port The port on which the LLDP frame was received. • Device Type LLDP-MED Devices are comprised of two primary Device Types: Network Connectivity Devices and Endpoint Devices.
User’s Manual The LLDP-MED Generic Endpoint (Class I) definition is applicable to all endpoint products that require the base LLDP discovery services defined in TIA-1057, however do not support IP media or act as an end-user communication appliance. Such devices may include (but are not limited to) IP Communication Controllers, other communication related servers, or any device requiring basic services as defined in TIA-1057.
User’s Manual • Application Type Application Type indicating the primary function of the application(s) defined for this network policy, advertised by an Endpoint or Network Connectivity Device. The poosible application types are shown below. Voice - for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services. These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications.
User’s Manual is significant and the default PVID of the ingress port is used instead. Priority is the Layer 2 priority to be used for the specified application type.One of • Priority eight priority levels (0 through 7) DSCP is the DSCP value to be used to provide Diffserv node behavior for the • DSCP specified application type as defined in IETF RFC 2474. Contain one of 64 code point values (0 through 63).
User’s Manual • Port ID The Port ID is the identification of the neighbor port. • Port Description Port Description is the port description advertised by the neighbor unit. • System Name System Name is the name advertised by the neighbor unit. • System Capabilities System Capabilities describes the neighbor unit's capabilities. The possible capabilities are: 1. Other 2. Repeater 3. Bridge 4. WLAN Access Point 5. Router 6. Telephone 7. DOCSIS cable device 8. Station only 9.
User’s Manual Figure 4-14-5: LLDP Statistics Page Screenshot The Page includes the following fields: Global Counters Object Description • Neighbor entries were It also shows the time when the last entry was last deleted or added. It also last changed shows the time elapsed since the last change was detected. • Total Neighbors Shows the number of new entries added since switch reboot. Entries Added • Total Neighbors Shows the number of new entries deleted since switch reboot.
User’s Manual LLDP Statistics Local Counters The displayed table contains a row for each port. The columns hold the following information: Object Description • Local Port The port on which LLDP frames are received or transmitted. • Tx Frames The number of LLDP frames transmitted on the port. • Rx Frames The number of LLDP frames received on the port. • Rx Errors The number of received LLDP frames containing some kind of error.
User’s Manual 4.15 Network Diagnostics This section provide the Physical layer and IP layer network diagnostics tools for troubleshoot. The diagnostic tools are designed for network manager to help them quickly diagnose problems between point to point and better service customers. Use the Diagnastics menu items to display and configure basic administrative details of the Wall-mount Managed Switch.
User’s Manual 4.15.1 Ping This Page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you press “Start”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-1 appears.
User’s Manual 4.15.2 IPv6 Ping This Page allows you to issue ICMPv6 ping packets to troubleshoot IPv6 connectivity issues. After you press “Start”, 5 ICMPv6 packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMPv6 Ping screen in Figure 4-15-2 appears.
User’s Manual 4.15.3 Remote IP Ping Test This Page allows you to issue ICMP ping packets to troubleshoot IP connectivity issues on special port. After you press “Test”, 5 ICMP packets are transmitted, and the sequence number and roundtrip time are displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are received, or until a timeout occurs. The ICMP Ping screen in Figure 4-15-3 appears.
User’s Manual • Remote IP Address The destination IP Address. • Ping Size The payload size of the ICMP packet. Values range from 8 bytes to 1400 bytes. • Result Display the ping result. Buttons : Click to apply changes : Click to undo any changes made locally and revert to previously saved values. : Clears the IP Address and the result of ping value. 4.15.4 Cable Diagnostics This Page is used for running the Cable Diagnostics. Press to run the diagnostics. This will take approximately 5 seconds.
User’s Manual The Page includes the following fields: Object Description • Port The port where you are requesting Cable Diagnostics. • Description Display per port description. • Cable Status Port: Port number. Pair: The status of the cable pair.
User’s Manual 4.16 Power over Ethernet Providing up to 8 PoE, in-line power interfaces, the WGS-5225-8P2S and WGS-5225-8P2SV PoE Switches can easily build a power central-controlled IP phone system, IP Camera system, AP group for the enterprise. For instance, 8 camera / AP can be easily installed around the corner in the company for surveillance demands or build a wireless roaming environment in the office.
User’s Manual IP Surveillance Enterprise, Museum, Campus, Hospital, Bank, can install IP Camera 10~12 Watts without limits of install location – no need electrician to install AC sockets. PoE Splitter PoE Splitter split the PoE 52V DC over the Ethernet cable into 5/12V DC power output. It frees the device deployment from restrictions due to power 3~12 Watts outlet locations, which eliminate the costs for additional AC wiring and reduces the installation time.
User’s Manual 4.16.2 System Configuration In a power over Ethernet system, operating power is applied from a power source (PSU-power supply unit) over the LAN infrastructure to powered devices (PDs), which are connected to ports. Under some conditions, the total output power required by PDs can exceed the maximum available power provided by the PSU. The system may a prior be planed with a PSU capable of supplying less power than the total potential power consumption of all the PoE ports in the system.
User’s Manual Allocation mode In this mode the user allocates the amount of power that each port may reserve. The allocated/reserved power for each port/PD is specified in the Maximum Power fields. The ports are shut down when total reserved powered exceeds the amount of power that the power supply can deliver. In this mode the port power is not turned on if the PD requests more available power. LLDP mode In this mode the ports of PoE power is managed and determined by LLDP Media protocol. 4.16.
User’s Manual Allocation-Consumption mode: System offers PoE power according to PD real power consumption. Allocation-Reserved-Power mode: Users allow to assign how much PoE power for per port and system will reserves PoE power to PD. LLDP-Consumption mode: System offers PoE power according to PD real power consumption. LLDP-Reserved-Power mode: System reserves PoE power to PD according to LLDP configuration. Set limit value of the total PoE port provided power to the PDs.
User’s Manual 4.16.4 Port Sequential This page allows the user to configure the PoE Ports started up interval time. The PoE Port will start up one by one as Figure 4-16-3 shows. Figure 4-16-3: PoE Port Sequential Power Up Interval Configuration Screenshot The PoE port will start up after the whole system program has finished running. The page includes the following fields: Object Description • Sequential Power up Allows user to enable or disable Sequential Power up function.
User’s Manual 4.16.5 Port Configuration This section allows the user to inspect and configure the current PoE port settings as Figure 4-16-4 shows. Figure 4-16-4: Power over Ethernet Configuration Screenshot The page includes the following fields: Object Description • PoE Mode There are three modes for PoE mode. Enable: enable PoE function.. Disable: disable PoE function. Schedule: enable PoE function in schedule mode. • Schedule Indicates the schedule profile mode.
User’s Manual named Low, High and Critical. The priority is used in the case when total power consumption has been over total power budget. In this case the port with the lowest priority will be turn off, and offer power for the port of higher priority. • Power Allocation It can limit the port PoE supply watts. Per port maximum value must less than 30.8W watts, total ports values must less than the Power Reservation value.
User’s Manual 4.16.6 PoE Status This page allows the user to inspect the total power consumption, total power reserved and current status for all PoE ports. The screen in Figure 4-16-5 appears. Figure 4-16-5:PoE Status Screenshot The page includes the following fields: Object Description • Current Power Shows the total watts usage of Managed PoE Switch. Consumption • Total Power Reserved Shows how much the total power be reserved for all PDs.
User’s Manual • Port Status The Port Status shows the port's status. • AF / AT Mode Displays per PoE port operate at 802.3af or 802.3at mode. • Total Shows the total power and current usage of all PDs. Buttons Auto-refresh : Check this box to enable an automatic refresh of the page at regular intervals. : Click to refresh the page immediately. 4.16.7 PoE Schedule This page allows the user to define PoE schedule and schedule power recycle.
User’s Manual The screen in Figure 4-16-6 appears. Figure 4-16-6: PoE Schedule Screenshot Please press Add New Rule button to start set PoE Schedule function. You have to set PoE schedule to profile then go back to PoE Port Configuration, and select “Schedule” mode from per port “PoE Mode” option then you can indicate which schedule profile could be apply to the PoE port.
User’s Manual Object Description • Profile Set the schedule profile mode. Possible profiles are: Profile1 Profile2 Profile3 Profile4 • Week Day Allows user to set week day for defining PoE function should be enabled on the day. • Start Hour Allows user to set what hour does PoE function enables. • Start Min Allows user to set what minute does PoE function enables. • End Hour Allows user to set what hour does PoE function disables.
User’s Manual 4.16.8 LLDP PoE Neighbours This page provides a status overview for all LLDP PoE neighbors. The displayed table contains a row for each port on which an LLDP PoE neighbor is detected. The columns hold the following information: The screen in Figure 4-16-7 appears. Figure 4-16-7: LLDP PoE Neighbour Screenshot Please be noticed that administrator has to enable LLDP port from LLDP configuration, please refer to following example (The screen in Figure 4-16-8 appears.
User’s Manual 4.16.10 PoE Alive Check Configuration The WGS-5225 PoE Switch can be configured to monitor connected PD’s status in real-time via ping action. Once the PD stops working and without response, the WGS-5225 PoE Switch is going to restart PoE port port power, and bring the PD back to work. It will greatly enhance the reliability and reduces administrator management burden. This page provides you with how to configure PD Alive Check.The screen in Figure 4-16-10 appears.
User’s Manual network segment with WGS-5225 PoE Switch. • Interval Time (10~300s) This column allows user to set how long system should issue a ping request to PD for detecting whether PD is alive or dead. Interval time range is from 10 seconds to 300 seconds. • Retry Count (1~5) This column allows user to set how many times system should issue ping to PD.
User’s Manual 4.17 Loop Protection This chapter describes when loop protection function is enabled, you can prevent broadcast loops in Wall-mount Managed Switch. 4.17.1 Configuration This page allows the user to inspect the current Loop Protection configurations, and possibly change them as well; screen in Figure 4-17-1 appears.
User’s Manual • Transmission Time The interval between each loop protection PDU sent on each port. Valid values are 1 to 10 seconds. • Shutdown Time The period (in seconds) for which a port will be kept disabled in the event of a loop is detected (and the port action shuts down the port). Valid values are 0 to 604800 seconds (7 days). A value of zero will keep a port disabled (until next device restart). Port Configuration Object Description • Port The switch port number of the port.
User’s Manual 4.17.2 Loop Protection Status This page displays the loop protection port status of the switch; screen in Figure 4-17-2 appears. Figure 4-16-2: Loop Protection Status Screenshot The page includes the following fields: Object Description • Port The Wall-mount Managed Switch port number of the logical port. • Action The currently configured port action. • Transmit The currently configured port transmit mode. • Loops The number of loops detected on this port.
User’s Manual 4.18 RMON RMON is the most important expansion of the standard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups.
User’s Manual InNUcastPkts: The number of broadcast and multi-cast packets delivered to a higher-layer protocol. InDiscards: The number of inbound packets that are discarded even the packets are normal. InErrors: The number of inbound packets that contain errors preventing them from being delivered to a higher-layer protocol. InUnknownProtos: the number of the inbound packets that are discarded because of the unknown or un-support protocol.
User’s Manual 4.18.2 RMON Alarm Status This page provides an overview of RMON Alarm entries. Each page shows up to 99 entries from the Alarm table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Alarm table. The first displayed one will be the one with the lowest ID found in the Alarm table; screen in Figure 4-18-2 appears.
User’s Manual 4.18.3 RMON Event Configuration Configure RMON Event table on this page. The entry index key is ID; screen in Figure 4-18-3 appears. Figure 4-18-3: RMON Event Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • ID Indicates the index of the entry. The range is from 1 to 65535. • Desc Indicates this event, the string length is from 0 to 127, default is a null string.
User’s Manual 4.18.4 RMON Event Status This page provides an overview of RMON Event table entries.Each page shows up to 99 entries from the Event table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Event table. The first displayed one will be the one with the lowest Event Index and Log Index found in the Event table table; screen in Figure 4-18-4 appears.
User’s Manual 4.18.5 RMON History Configuration Configure RMON History table on this page. The entry index key is ID; screen in Figure 4-18-5 appears. Figure 4-18-5: RMON History Configuration Page Screenshot The page includes the following fields: Object Description • Delete Check to delete the entry. It will be deleted during the next save. • ID Indicates the index of the entry. The range is from 1 to 65535. • Data Source Indicates the port ID which wants to be monitored.
User’s Manual 4.18.6 RMON History Status This page provides a detail of RMON history entries; screen in Figure 4-18-6 appears. Figure 4-18-6: RMON History Overview Page Screenshot The page includes the following fields: Object Description • History Index Indicates the index of History control entry. • Sample Index Indicates the index of the data entry associated with the control entry. • Sample Start The value of sysUpTime at the start of the interval over which this sample was measured.
User’s Manual The best estimate of the mean physical layer network utilization on this interface • Utilization during this sampling interval is in the hundredths of a percent. Buttons : Click to refresh the page immediately. Auto-refresh : Check this box to refresh the page automatically. Automatic refresh occurs every 3 seconds. : Updates the table, starting from the first entry in the History table, i.e.
User’s Manual 4.18.8 RMON Statistics Status This page provides an overview of RMON Statistics entries. Each page shows up to 99 entries from the Statistics table, default being 20, selected through the "entries per page" input field. When first visited, the web page will show the first 20 entries from the beginning of the Statistics table. The first displayed one will be the one with the lowest ID found in the Statistics table; screen in Figure 4-18-8 appears.
User’s Manual • Coll. The best estimate of the total number of collisions on this Ethernet segment. • 64 Bytes The total number of packets (including bad packets) received that were 64 octets in length. The total number of packets (including bad packets) received that were between • 65~127 65 to 127 octets in length. The total number of packets (including bad packets) received that were between • 128~255 128 to 255 octets in length.
User’s Manual 4.19 PTP The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP was originally defined in the IEEE 1588-2002 standard, officially entitled "Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems" and published in 2002.
User’s Manual Slave Only - clock's Device Type is Slave Only Static member: defined by the system, true if two-step Sync events and • 2 Step Flag Pdelay_Resp events are used. • Clock Identity It shows unique clock identifier. • One Way If true, one-way measurements are used. This parameter applies only to a slave. In one-way mode no delay measurements are performed, i.e. this is applicable only if frequency synchronization is needed. The master always responds to delay requests.
User’s Manual • Synchronize to System Activate this button to synchronize the System Clock to PTP Time. Clock • Ports Configuration Click to edit the port data set for the ports assigned to this clock instance. Clock Default Data Set Object Description • Clock ID An internal instance id (0..3) • Device Type Indicates the Type of the Clock Instance. There are five Device Types. Ord-Bound - clock's Device Type is Ordinary-Boundary Clock.
User’s Manual • PCP Priority Code Point value used for PTP frames. Clock Current Data Set Object Description • stpRm Steps Removed: It is the number of PTP clocks traversed from the grandmaster to the local slave clock. • Offset from master Time difference between the master clock and the local slave clock, measured in ns.
User’s Manual ‘P’ constant [1..1000] see above • ‘I’ constant [1..1000] see above ‘D’ constant [1..1000] see above Unicast Slave Configuration Object Description • Duration The number of seconds a master is requested to send Announce/Sync messages. The request is repeated from the slave each Duration/4 seconds.
User’s Manual 4.20 Ring ITU-T G.8032 Ethernet Ring protection switching (ERPS) is a link layer protocol applied on Ethernet loop protection to provide sub-50ms protection and recovery switching for Ethernet traffic in a ring topology. ERPS provides a faster redundant recovery than Spanning Tree topology. The action is similar to STP or RSTP, but the algorithms between them are not the same.
User’s Manual 4.20.1 MEP Configuration The Maintenance Entity Point instances are configured here; screen in Figure 4-20-1 appears. Figure 4-20-1: MEP configuration page screenshot The page includes the following fields: Object Description • Delete This box is used to mark a MEP for deletion in next Save operation. • Instance The ID of the MEP. Click on the ID of a MEP to enter the configuration page. • Domain Port: This is a MEP in the Port Domain. 'Flow Instance' is a Port.
User’s Manual Buttons : Click to add a new MEP entry : Click to refresh the page immediately. : Click to save changes. : Click to undo any changes made locally and revert to previously saved values. 4.20.2 Detailed MEP Configuration This page allows the user to inspect and configure the current MEP Instance.; screen in Figure 4-20-2 appears. Figure 4-20-2: Detail MEP configuration page screenshot The page includes the following fields: Instance Data: Object Description • Instance The ID of the MEP.
User’s Manual • Tagged VID See help on MEP create WEB. • This MAC See help on MEP create WEB. Instance Configuration: Object Description • Level See help on MEP create WEB. • Format This is the configuration of the two possible Maintenance Association Identifier formats. ITU ICC: This is defined by ITU. 'ICC' can be max. 6 char. 'MEG id' can be max. 7 char. IEEE String: This is defined by IEEE. 'Domain Name' can be max. 8 char. 'MEG id' can be max. 8 char.
User’s Manual peer MEP. Fault Cause indicating that a CCM is received with Remote Defect Indication - • cRDI from this peer MEP. Fault Cause indicating that a CCM is received with a period different what is • cPeriod configured for this MEP - from this peer MEP. Fault Cause indicating that a CCM is received with a priority different what is • cPriority configured for this MEP - from this peer MEP. Buttons : Click to add a new peer MEP.
User’s Manual transmitting/receiving R-APS/L-APS PDU can be enabled/disabled. Must be enabled to support ERPS/ELPS implementing APS. This is only valid with one Peer MEP configured. • Priority The priority to be inserted as PCP bits in TAG (if any). • Cast Selection of APS PDU transmitted unicast or multi-cast. The unicast MAC will be taken from the 'Unicast Peer MAC' configuration. Unicast is only valid for L-APS see 'Type'. The R-APS PDU is always transmitted with multi-cast MAC described in G.8032.
User’s Manual The page includes the following fields: Object Description • Delete This box is used to mark an ERPS for deletion in next Save operation. • Port 0 This will create a Port 0 of the switch in the ring. • Port 1 This will create "Port 1" of the switch in the Ring. As interconnected sub-ring will have only one ring port, "Port 1" is configured as "0" for interconnected sub-ring.
User’s Manual 4.20.4 Ethernet Ring Protocol Switch Configuration This page allows the user to inspect and configure the current ERPS Instance; screen in Figure 4-20-4 appears. Figure 4-20-4: Ethernet Ring Protocol Switch Configuration page screenshot The page includes the following fields: Instance Data: Object Description • ERPS ID The ID of the Protection group. • Port 0 See help on ERPS create WEB. • Port 1 See help on ERPS create WEB. • Port 0 SF MEP See help on ERPS create WEB.
User’s Manual • Guard Time Guard timeout value to be used to prevent ring nodes from receiving outdated R-APS messages. The period of the guard timer can be configured in 10 ms steps between 10 ms and 2 seconds, with a default value of 500 ms • WTR Time The Wait To Restore timing value to be used in revertive switching. The period of the WTR time can be configured by the operator in 1 minute steps between 5 and 12 minutes with a default value of 5 minutes.
User’s Manual Instance State: Object Description • Protection State ERPS state according to State Transition Tables in G.8032. • Port 0 OK: State of East port is ok SF: State of East port is Signal Fail OK: State of West port is ok • Port 1 SF: State of West port is Signal Fail • Transmit APS The transmitted APS according to State Transition Tables in G.8032. • Port 0 Receive APS The received APS on Port 0 according to State Transition Tables in G.8032.
User’s Manual 4.20.5 Ring Wizard This page allows the user to configure the ERPS by wizard; screen in Figure 4-20-4 appears. Figure 4-20-5: Ring Wizard page screenshot The page includes the following fields: Object Description • All Switch Numbers Set all the switch numbers for the ring group. The default number is 3 and maximum number is 30. • Number ID The switch where you are requesting ERPS. • Port Configures the port number for the MEP. • VLAN Set the ERPS VLAN.
User’s Manual 4.20.6 Ring Wizard Example: Figure 4-20-6: Ring Example Diagram The above topology often occurs on using ERPS protocol. The multi switch constitutes a single ERPS ring; all of the switches only are configured as an ERPS in VLAN 3001, thereby constituting a single MRPP ring.
User’s Manual Setup steps Set ERPS Configuration on Switch 1 Connect PC to switch 1 directly; don’t connect to port 1 & 2 Logging on to the Switch 1 and click “Ring > Ring Wizard” Set “All Switch Number” = 3 and “Number ID” = 1; click “Next” button to set the ERPS configuration for Switch 1. Set “MEP1” = Port1, “MEP2” = Port2 and VLAN ID = 3001; click “Set” button to save the ERPS configuration for Switch 1.
User’s Manual To avoid loop, please don’t connect Switches 1, 2 and 3 together in the ring topology before configuring the end of ERPS . Follow the configuration or ERPS wizard to connect Switches 1, 2 and 3 together to establish ERPS application: MEP2 ←→ MEP3 = Switch1 / Port2 ←→ Switch2 / Port2 MEP4 ←→ MEP5 = Switch2 / Port1 ←→ Switch3 / Port2 MEP1 ←→ MEP6 = Switch1 / Port1 ←→ Switch3 / Port1 4.21 LCD 4.21.1 LCD Management This page offers many options for you to manage LCD control panel.
User’s Manual The page includes the following fields: Object Description • LCD Enable: allows user to enable LCD panel. Disable: allows user to disable LCD panel. • Touch Screen Enable: allows user to enable touch screen feature. Disable: allows user to disable touch screen feature. • Backlight Timeout Enable: allows user to enable panel backlight timeout time feature. Disable: allows user to disable panel backlight timeout time feature.
User’s Manual 4.22 ONVIF ONVIF (Open Network Video Interface Forum) is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products – or, in other words, to create a standard for how IP products within video surveillance and other physical security areas can communicate with each other.
User’s Manual • Manufacturer The ONVIF Device’s Manufacturer of the entry. • Model The ONVIF Device’s Model Name of the entry. • IP Address The ONVIF Device’s IP Address of the entry. • MAC Address The ONVIF Device’s MAC address of the entry. • VLAN The ONVIF Device’s VLAN ID of the entry. • Select Device Allows to tick for selecting ONVIF Devices for adding to ONVIF List Table. Buttons : Click to search the connecting ONVIF devices.
User’s Manual The page includes the following fields: Object Description • Login(Optional) Allows for filling one set of User name and Password. • Port This is the logical port number for this row. • Status Red: The ONVIF device is not active. Green: The ONVIF device is active.The ONVIF Device’s Type of the entry. • Device Type The ONVIF Device’s Type of the entry. • Device Name The ONVIF Device’s Name of the entry. • Manufacturer The ONVIF Device’s Manufacturer of the entry.
User’s Manual 4.22.3 Map Upload / Edit This page allows the clients for uploading e-MAP; the file size cannot be over 151k; screen in Figure 4-22-3 appears. Figure 4-22-3: Map Upload / Edit Page Screenshot The page includes the following fields: Object Description • MAP Select Allows to select Map1/2/3 for uploading Map. • Description Indicates the map’s description. • File size Shows Map’s size. • File Allows to choose and browse specific map file from laptop device.
User’s Manual 4.22.4 Floor Map This page allows the clients for planning the ONVIF devices with the uploaded e-Map. It can select the ONVIF devices from Device List and it also can modify the e-Map’s Zoom and Scale; screen in Figure 4-22-4 appears. Figure 4-22-4: Floor Map Page Screenshot The page includes the following fields: Object Description • Summary Information Shows the number of Online and Offline ONVIF cameras. • Map Control Allows to choose Location of Map1/2/3 and zoom in/out of Map.
User’s Manual 5. SWITCH OPERATION 5.1 Address Table The Wall-mount Managed Switch is implemented with an address table. This address table is composed of many entries. Each entry is used to store the address information of some nodes in network, including MAC address, port no., etc. This information comes from the learning process of Wall-mount Managed Switch. 5.2 Learning When one packet comes in from any port, the Wall-mount Managed Switch will record the source address, port no.
User’s Manual 5.5 Auto-Negotiation The STP ports on the Switch have built-in "Auto-negotiation". This technology automatically sets the best possible bandwidth when a connection is established with another network device (usually at Power On or Reset). This is done by detecting the modes and speeds at the second of both devices that are connected and capable of. Both 10BASE-T and 100BASE-TX devices can connect with the port in either Half- or Full-Duplex mode.
User’s Manual of WGS-5225 Series 6. TROUBLESHOOTING This chapter contains information to help you solve issues. If the Wall-mount Managed Switch is not functioning properly, make sure the Wall-mount Managed Switch was set up according to instructions in this manual.
User’s Manual of WGS-5225 Series APPENDIX A: Networking Connection A.1 Switch's Data RJ45 Pin Assignments - 1000Mbps, 1000BASE-T PIN NO MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_DB+ BI_DA+ 4 BI_DC+ BI_DD+ 5 BI_DC- BI_DD- 6 BI_DB- BI_DA- 7 BI_DD+ BI_DC+ 8 BI_DD- BI_DC- Implicit implementation of the crossover function within a twisted-pair cable, or at a wiring panel, while not expressly forbidden, is beyond the scope of this standard. A.
User’s Manual of WGS-5225 Series The standard cable, RJ45 pin assignment 6 32 1 6 321 6 3 21 The standard RJ45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded.
User’s Manual APPENDIX B : GLOSSARY A ACE ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application. ACL ACL is an acronym for Access Control List.
User’s Manual ranging from 1-1024K packets per seconds. Under "Ports" and "Access Control List" web-Pages you can assign a Rate Limiter ID to the ACE(s) or ingress port(s). AES AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits.
User’s Manual C CC CC is an acronym for Continuity Check. It is a MEP functionality that is able to detect loss of continuity in a network by transmitting CCM frames to a peer MEP. CCM CCM is an acronym for Continuity Check Message. It is a OAM frame transmitted from a MEP to it's peer MEP and used to implement CC functionality. CDP CDP is an acronym for Cisco Discovery Protocol. D DEI DEI is an acronym for Drop Eligible Indicator. It is a 1-bit field in the VLAN tag.
User’s Manual Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. DHCP Relay DHCP Relay is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain.
User’s Manual DSCP DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet classification purposes. E EEE EEE is an abbreviation for Energy Efficient Ethernet defined in IEEE 802.3az. EPS EPS is an abbreviation for Ethernet Protection Switching defined in ITU/T G.8031. Ethernet Type Ethernet Type, or EtherType, is a field in the Ethernet MAC header, defined by the Ethernet networking standard.
User’s Manual connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message. HTTPS HTTPS is an acronym for Hypertext Transfer Protocol over Secure Socket Layer. It is used to indicate a secure HTTP connection. HTTPS provide authentication and encrypted communication and is widely used on the World Wide Web for security-sensitive communication such as payment transactions and corporate logons.
User’s Manual from a mail server. IMAP is the protocol that IMAP clients use to communicate with the servers, and SMTP is the protocol used to transport mail to an IMAP server. The current version of the Internet Message Access Protocol is IMAP4. It is similar to Post Office Protocol version 3 (POP3), but offers additional and more complex features. For example, the IMAP4 protocol leaves your email messages on the server rather than downloading them to your computer.
User’s Manual LLDP is an IEEE 802.1ab standard protocol.
User’s Manual For debugging network problems or monitoring network traffic, the switch system can be configured to mirror frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.) Both incoming (source) and outgoing (destination) frames can be mirrored to the mirror port. MLD MLD is an acronym for Multicast Listener Discovery for IPv6.
User’s Manual NTP NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (datagrams) as transport layer. O OAM OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier ethernet functionality. MEP functionality like CC and RDI is based on this. Optional TLVs.
User’s Manual PING ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to generate a response from that computer. The other computer responds with an acknowledgment that it received the packets. Ping was created to verify whether a specific computer on a network or the Internet exists and is connected. ping uses Internet Control Message Protocol (ICMP) packets.
User’s Manual Q QCE QCE is an acronym for QoS Control Entry. It describes QoS class associated with a particular QCE ID. There are six QCE frame types: Ethernet Type, VLAN, UDP/TCP Port, DSCP, TOS, and Tag Priority. Frames can be classified by one of 4 different QoS classes: "Low", "Normal", "Medium", and "High" for individual application. QCL QCL is an acronym for QoS Control List.
User’s Manual given hardware address, such as an Ethernet address. RARP is the complement of ARP. RADIUS RADIUS is an acronym for Remote Authentication Dial In User Service. It is a networking protocol that provides centralized access, authorization and accounting management for people or computers to connect and use a network service. RDI RDI is an acronym for Remote Defect Indication.
User’s Manual Protocol (TCP) and provides a mail service modeled on the FTP file transfer service. SMTP transfers mail messages between systems and notifications regarding incoming mail. SNAP The SubNetwork Access Protocol (SNAP) is a mechanism for multiplexing, on networks using IEEE 802.2 LLC, more protocols than can be distinguished by the 8-bit 802.2 Service Access Point (SAP) fields. SNAP supports identifying protocols by Ethernet type field values; it also supports vendor-private protocol identifier.
User’s Manual SyncE Is an abbreviation for Synchronous Ethernet. This functionality is used to make a network 'clock frequency' synchronized. Not to be confused with real time clock synchronized (IEEE 1588). T TACACS+ TACACS+ is an acronym for Terminal Acess Controller Access Control System Plus. It is a networking protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers.
User’s Manual ToS is an acronym for Type of Service. It is implemented as the IPv4 ToS priority control. It is fully decoded to determine the priority from the 6-bit ToS field in the IP header. The most significant 6 bits of the ToS field are fully decoded into 64 possibilities, and the singular code that results is compared against the corresponding bit in the IPv4 ToS priority control bit (0~63). TLV TLV is an acronym for Type Length Value. A LLDP frame can contain multiple pieces of information.
User’s Manual V VLAN Virtual LAN. A method to restrict communication between switch ports. VLANs can be used for the following applications: VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not remove or insert VLAN tags. VLAN aware switching: This is based on the IEEE 802.1Q standard. All ports are VLAN aware.
User’s Manual WPA is an acronym for Wi-Fi Protected Access. It was created in response to several serious weaknesses researchers had found in the previous system , Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared.