User Manual
Table Of Contents
- 1. INTRODUCTION
- 2. INSTALLATION
- 3. SWITCH MANAGEMENT
- 4. WEB CONFIGURATION
- 4.1 Main Web Page
- 4.2 System
- 4.2.1 Management
- 4.2.1.1 System Information
- 4.2.1.2 IP Configuration
- 4.2.1.3 IP Status
- 4.2.1.4 Users Configuration
- 4.2.1.5 Privilege Levels
- 4.2.1.6 NTP Configuration
- 4.2.1.6.1 System Time Correction Manually
- 4.2.1.7 Time Configuration
- 4.2.1.8 UPnP
- 4.2.1.9 DHCP Relay
- 4.2.1.10 DHCP Relay Statistics
- 4.2.1.11 CPU Load
- 4.2.1.12 System Log
- 4.2.1.13 Detailed Log
- 4.2.1.14 Remote Syslog
- 4.2.1.15 SMTP Configuration
- 4.2.1.16 Fault Alarm
- 4.2.2 Simple Network Management Protocol
- 4.2.3 RMON
- 4.2.4 DHCP server
- 4.2.5 Remote Management
- 4.2.6 LCD
- 4.2.1 Management
- 4.3 Switching
- 4.3.1 Port Management
- 4.3.2 Link Aggregation
- 4.3.3 VLAN
- 4.3.3.1 VLAN Overview
- 4.3.3.2 IEEE 802.1Q VLAN
- 4.3.3.3 VLAN Port Configuration
- 4.3.3.4 VLAN Membership Status
- 4.3.3.5 VLAN Port Status
- 4.3.3.6 Private VLAN
- 4.3.3.6 Port Isolation
- 4.3.3.7 VLAN setting example:
- 4.3.3.7.1 Two Separate 802.1Q VLANs
- 4.3.3.7.2 VLAN Trunking between two 802.1Q aware switches
- 4.3.3.7.3 Port Isolate
- 4.3.3.8 MAC-based VLAN
- 4.3.3.9 IP Subnet-based VLAN Membership Configuration
- 4.3.3.10 Protocol-based VLAN
- 4.3.3.11 Protocol-based VLAN Membership
- 4.3.4 Spanning Tree Protocol
- 4.3.5 Multicast
- 4.3.6 MLD Snooping
- 4.3.7 MVR (Multicast VLAN Registration)
- 4.3.8 LLDP
- 4.3.9 MAC Address Table
- 4.3.10 Loop Protection
- 4.3.11 UDLD
- 4.3.12 GVRP
- 4.3.13 PTP
- 4.3.14 Link OAM
- 4.4 Quality of Service
- 4.5 Security
- 4.6 Ring
- 4.7 Maintenance
- 4.8 Power over Ethernet
- 4.9 ONVIF
- 5. SWITCH OPERATION
- 6. TROUBLESHOOTING
- APPENDIX A: Networking Connection
- APPENDIX B : GLOSSARY
User’s Manual of WGS-5225-8UP2SV
17
Robust Layer 2 Features
The WGS-5225-8UP2SV can be programmed for advanced switch management functions such as dynamic port link
aggregation, Q-in-Q VLAN, private VLAN, Rapid Spanning Tree Protocol, Layer 2 to Layer 4 QoS, bandwidth control and IGMP
snooping. The WGS-5225-8UP2SV provides 802.1Q tagged VLAN, and the VLAN groups allowed will be maximally up to 2K.
Via aggregation of supporting ports, the WGS-5225-8UP2SV allows the operation of a high-speed trunk combining multiple
ports. It enables a maximum of up to 2 trunk groups with 2 ports per trunk group, and supports fail-over as well.
Network with Cybersecurity Helps Minimize Security Risks
The WGS-5225-8UP2SV comes with enhanced cybersecurity to fend off cyberthreats and cyberattacks. It supports SSHv2 and
TLSv1.2 protocols to provide strong protection against advanced threats. Served as a key point to transmit data to customer's
critical equipment in a business network, the cybersecurity feature of the WGS-5225-8UP2SV protects the switch management
and enhances the security of the mission-critical network without any extra deployment cost and effort.
Efficient Management
For efficient management, the WGS-5225-8UP2SV is equipped with Command line, Web and SNMP management interfaces.
With the built-in Web-based management interface, the WGS-5225-8UP2SV offers an easy-to-use,
platform-independent management and configuration facility.
For text-based management, it can be accessed via Telnet and SSHv2 protocol.
For standard-based monitor and management software, it offers SNMPv3 connection which encrypts the packet content
at each session for secure remote management.
Powerful Security from Layer 2 to Layer 4
The WGS-5225-8UP2SV offers comprehensive Layer 2 to Layer 4 Access Control List (ACL) for enforcing security to the
edge. It can be used to restrict network access by denying packets based on source and destination IP address, TCP/UDP ports
or defined typical network applications. Its protection mechanism also comprises 802.1X Port-based and MAC-based user and
device authentication. With the private VLAN function, communication between edge ports can be prevented to ensure user
privacy.
Advanced IP Network Protection
The WGS-5225-8UP2SV also provides DHCP Snooping, IP Source Guard and Dynamic ARP Inspection functions to
prevent IP snooping from attack and discard ARP packets with invalid MAC address. The network administrators can now
construct highly-secure corporate networks with considerably less time and effort than before.










