GS-1224L User's Manual Release 1.01 © 2007, RubyTech Corporation. All rights reserved. All brand and product names are trademarks or registered trademarks of their respective companies.
The information in this document is subject to change without notice. Unless the explicit written permission of RubyTech Corporation, this document in whole or in part shall not be replicated or modified or amended or transmitted, in any from, or by any means manual, electric, electronic, electromagnetic, mechanical, optical or otherwise for any purpose.
DISCLAIMER. EXCEPT AS PROVIDED ABOVE, THE SOFTWARE IS PROVIDED “AS IS ” AND RUBYTECH AND ITS LICENSORS MAKE NO WARRANTIES, EXPRESS OR IMPLIED, WITH REPSECT TO THE SOFTWARE AND DOCUMENTAITON. RUBYTECH AND ITS LICENSORS DISCLAIM ALL OTHER WARRANTIES, INCLUSIVE OF WITHOUT LIMITATION, IMPLIED WARRANTIES OR MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
Table of Contents Caution ................................................................................................................................viii Electronic Emission Notices ................................................................................................viii 1. Introduction .......................................................................................................................2 1-1. Overview of 24-Port GbE Web Smart Switch ........................................
4-3-5. IGMP Status..........................................................................................................91 4-3-6. Ping Status............................................................................................................92 4-4. Maintenance.................................................................................................................94 4-4-1. Warm Restart........................................................................................................
Revision History Release Date Revision 1.00 1.
vii
Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: • Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device. • Pick up the device by holding it on the left and right edges only.
About this user’s manual In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the 24-Port GbE Web Smart Switch through the Ethernet ports step-by-step. Many explanation in detail of hardware and software functions are shown as well as the examples of the operation for webbased interface.
User Manual 1. Introduction 1-1. Overview of 24-Port GbE Web Smart Switch 24-port Gigabit Web Smart Switch is a standard switch that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch included 20-Port 10/100/1000Mbps TP and 4-Port Gigabit TP/SFP Fiber Web Smart management Ethernet Switch.
User Manual 1-2. Checklist Before you start installing the switch, verify that the package contains the following: ⎯ ⎯ ⎯ ⎯ ⎯ A 24-Port GbE Web Smart Switch Modules (optional) Mounting Accessory (for 19” Rack Shelf) This User's Manual in CD-ROM AC Power Cord Please notify your sales representative immediately if any of the aforementioned items is missing or damaged. 1-3.
User Manual • Supports 802.
User Manual 1-4. View of 24-Port GbE Web Smart Switch Fig. 1-1 Full View of 24-PORT GBE WEB SMART SWITCH 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet ports and 4 SFP fiber ports for optional removable modules on the front panel of the switch. LED display area, locating on the left side of the panel, contains a Power LED, which indicates the power status and 24 ports working status of the switch.
User Manual • LED Indicators LED POWER Color System LED Green Function Lit when +3.
User Manual 1-5. View of the Optional Modules In the switch, Port 21~24 includes two types of media --- TP and SFP Fiber (LC, BiDi-SC…); this port supports 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbps SFP Fiber transceiver is used for highspeed connection expansion; nine optional SFP types provided for the switch are listed below: ⎯ 1000Mbps LC, MM, SFP Fiber transceiver (SFP.0LC.202) ⎯ 1000Mbps LC, SM 10km, SFP Fiber transceiver (SFP.0LC.212.
User Manual 2. Installation 2-1. Starting 24-Port GbE Web Smart Switch Up This section will give users a quick start for: - Hardware and Cable Installation - Management Station Installation - Software booting and configuration 2-1-1.
User Manual • TP Port and Cable Installation ⇒ In the switch, TP port supports MDI/MDI-X auto-crossover, so both types of cable, straight-through (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed-over (Cable pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6, 1, 2) can be used. It means you do not have to tell from them, just plug it. ⇒ Use Cat.
User Manual 2-1-2-1. Cabling Requirements for TP Ports ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. 2-1-2-2. Cabling Requirements for 1000SX/LX SFP Module It is more complex and comprehensive contrast to TP cabling in the fiber media.
User Manual 2-1-2-3. Switch Cascading in Topology • Takes the Delay Time into Account Theoretically, the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly. In practice, the network extension (cascading levels & overall diameter) must follow the constraint of the IEEE 802.3/802.3u/802.3z and other 802.1 series protocol specifications, in which the limitations are the timing requirement from physical signals defined by 802.
User Manual Case1: All switch ports are in the same local area network. Every port can access each other (See Fig. 2-2). Fig. 2-2 No VLAN Configuration Diagram If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area. Here VLAN area is defined by what VLAN you are using. The switch supports both port-based VLAN and tag-based VLAN. They are different in practical deployment, especially in physical location.
User Manual Case 2b: Port-based VLAN (See Fig.2-4). Fig. 2-4 Port-based VLAN Diagram 1. VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members could not access VLAN1 and VLAN3 members, but they could access VLAN4 members. 3. VLAN3 members could not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members could not access VLAN1 and VLAN3 members, but they could access VLAN2 members. Case3a: The same VLAN members can be at different switches with the same VID (See Fig. 2-5). Fig.
User Manual 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch In the way of web, user is allowed to startup the switch management function. Users can use any one of them to monitor and configure the switch. You can touch them through the following procedures.
User Manual 2-1-3-1. Configuring Management Agent of 24-Port GbE Web Smart Switch through Ethernet Port There are two ways to configure and monitor the switch through the switch’s Ethernet port. They are Web browser and SNMP manager. The user interface for the last one is RubyView dependent and does not cover here. We just introduce the first type of management interface. Web-based UI for the switch is an interface in a highly friendly way. 24-PORT GBE WEB SMART SWITCH Default IP Setting: IP = 192.168.1.
User Manual Fig. 2-7 the Login Screen for Web 2-1-4. IP Address Assignment For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS. IP address: The address of the network device in the network is used for internetworking communication. Its address structure looks is shown in the Fig. 2-8. It is “classful” because it is split into predefined address classes or categories.
User Manual With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24. Each class has its address range described below. Class A: Address is less than 126.255.255.255. There are a total of 126 networks can be defined because the address 0.0.0.
User Manual Class D and E: Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network. We call it Private IP address and list below: Class A Class B Class C 10.0.0.0 --- 10.255.255.255 172.16.0.0 --- 172.
User Manual In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result. Prefix Length No. of IP matched No.
User Manual For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as default router. Basically, it is a routing policy.
User Manual 2-2. Typical Applications The 24-Port GbE Web Smart Switch implements 24 Gigabit Ethernet TP ports with auto MDIX and four slots for the removable module supporting comprehensive fiber types of connection, including LC and BiDi-LC SFP modules. For more details on the specification of the switch, please refer to Appendix A. ⎯ ⎯ ⎯ The switch is suitable for the following applications. Central Site/Remote site application is used in carrier or ISP (See Fig.
User Manual Fig. 2-11 Peer-to-peer Network Connection Fig.
User Manual 3. Basic Concept and Management This chapter will tell you the basic concept of features to manage this switch and how they work. 3-1. What’s the Ethernet Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980.
User Manual IEEE 802.2 LLC Data Link Layer IEEE802.3 CSMA/CD MAC IEEE 802.3 PLS CS Physical Layer MII ANSI X3T9.5 PMD IEEE 802.3 MAU Fiber Coaxial/STP/UTP This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model. In this section, we are mainly describing the MAC sub-layer.
User Manual Table 3-1 LLC Format The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address. The SSAP address field identifies the specific services indicated by C/R bit (command or response).
User Manual Fig. 3-2 SAP Format 3-2. Media Access Control (MAC) MAC Addressing Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer.
User Manual Bit 47 1st byte 2nd byte OUI code 3rd byte 4th byte 5th byte Serial number bit 0 6th byte Table 3-3 Ethernet MAC address The first bit of the first byte in the Destination address (DA) determines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1). So the 48-bit address space is divided into two portions, Unicast and Multicast. The second bit is for global-unique (0) or locally-unique address.
User Manual - Destination address (DA) — The DA field is used to identify which network device(s) should receive the packet. It is a unique address. Please see the section of MAC addressing. - Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0. - Length/Type — This field indicates either the number of the data bytes contained in the data field of the frame, or the Ethernet type of data.
User Manual How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transmitting data. When receiving data, it parses frame to detect error; when transmitting data, it performs frame assembly. 2. Performing Media access control. It prepares the initiation jobs for a frame transmission and makes recovery from transmission failure.
User Manual Ethernet MAC transmits frames in half-duplex and full-duplex ways. In halfduplex operation mode, the MAC can either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with the half-duplex operation exists only in the same collision domain, the carrier signal needs to spend time to travel to reach the targeted device.
User Manual Parameter value/LAN Max. collision domain DTE to DTE Max. collision domain with repeater Slot time Interframe Gap AttemptLimit BackoffLimit JamSize MaxFrameSize MinFrameSize BurstLimit 10Base 100 meters 100Base 1000Base 100 meters for UTP 100 meters for UTP 412 meters for fiber 316 meters for fiber 2500 meters 205 meters 200 meters 512 bit times 9.6us 16 10 32 bits 1518 64 Not applicable 512 bit times 0.96us 16 10 32 bits 1518 64 Not applicable 512 bit times 0.
User Manual 3-3. Flow Control Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device. When the target is not busy and the PAUSE time is expired, it will send another PAUSE frame with zero time-to-wait to source device. After the source device receives the PAUSE frame, it will again transmit frames immediately.
User Manual Frame Reception In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame.
User Manual What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data immediately following the MAC source address. When tagged VLAN is applied, the Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag control information are different in comparison with the basic Ethernet frame. The rest fields are the same.
User Manual The maximum length of the extension is equal to the quantity (slotTime minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision. 3-4. How does a switch work? The switch is a layer 2 Ethernet Switch equipped with 24 Fast Ethernet ports and 2 optional modules which support Gigabit Ethernet or 100M Ethernet.
User Manual Fig.3-5 Collision Domain Extended Distance Limitations: The diameter of a half-duplex LAN segment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using yellow cable is 2500 meters and 185 meters when using coaxial cable. The switch with its per port per collision domain can extend the distance like a bridge does.
User Manual Fig. 3-6 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the packet to the destination port(s). Here we introduce some important features of a switch and how they work.
User Manual Mac address aging There is a field in MAC address table used to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA. Usually, the age time is programmable. Transmission schedule In most layer 2 switches, the QoS is supported. QoS in a switch must associate a transmission schedule to transmit the packet. This function is much to do with the priority level a packet has.
User Manual 3-5. Virtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must understand what LAN is. In general, a LAN is composed of different physical network segments bridged by switches or bridges which attach to end stations in the same broadcast domain. The traffic can reach any station on the same LAN. Beyond this domain, the traffic cannot go without router’s help. This also implies that a LAN is limited.
User Manual Fig. 3-8 Now we apply VLAN technology to configure the system shown as the figure above. We can partition the users into the different logical networks which have their own broadcast domain. The traffic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traffic within VLAN 1 does not flow to VLAN 2 and others.
User Manual There are many types of VLAN applied. Most popular is port-based VLAN, tag-based VLAN and protocol-based VLAN. Port-based VLAN Some physical ports are configured as members of a VLAN. All stations attached on these ports can communicate with each other. Tag-based VLAN It identifies the membership by VLAN ID, no matter where the packet comes from. It is also referred to as 802.1Q VLAN.
User Manual VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification with the value of 0 and priority information. Untagged frame: An Ethernet frame carries no VLAN tag information. VLAN Identifier: Also referred to as VID. It is used to identify a member whether it belongs to the VLAN group with the VID.
User Manual Ingress Rule: Each packet received by a VLAN-aware bridge will be classified to a VLAN. The classification rule is described as follows. 1. If the VID of the packet is null VID (VID=0)or this packet is an untagged packet: a. If there are still some other ways(e.g. protocol, MAC address, application, IP-subnet, etc.
User Manual How does a Tagged VLAN work? If the ingress filtering is enabled and when a packet is received, VLAN bridge will first check if the VID of the packet presents. 1). If the packet has a non-zero VID, VLAN bridge will apply this VID as the VLAN ID of the packet in the network. 2). For a packet with null tag or no VLAN tag, if VLAN bridge provides rules to decide its VID, then apply this VID to the packet.
User Manual 3-6. Link Aggregation Basically, Link Aggregation is to aggregate the bandwidth of more than one port to an assigned logical link. This highly increases total bandwidth to the targeted device. There is more than one Link Aggregation technology in many vendors’ switch products already, which may cause the problem of interoperability. This is the reason why now we have 802.3ad Link Aggregation Control Protocol (LACP). Why 802.3ad (LACP)? Network is varying.
User Manual Terminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group with a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an independent link. There are three cases of link used in the network, which are switch to switch, switch to station and station to station. Here station may be a host or a router.
User Manual 4. Operation of Web-based Management This chapter instructs you how to configure and manage the 24-Port GbE Web Smart Switch through the web user interface it supports, to access and manage 20 10/100/1000Mbps TP Port and 4 Gigabit TP/SFP Fiber dual media port. The switch provides 20 fixed Gigabit Ethernet TP ports and four optional Gigabit dual media ports supporting either fiber or TP media.
User Manual Fig. 4-1 4-1. Web Management Home Overview After you login, the switch shows you the system status information as Fig. 4-2. This page is default and tells you the basic information of the system, including “Switch Status”, “TP Port Status”, “Fiber Port Status”, “Aggregation”, “VLAN”, “Mirror”, “SNMP”, and “Maximum Packet Length”. With this information, you will know the software version used, MAC address, how many ports good and so on. This is helpful while malfunctioning.
User Manual • The Information of Page Layout ⎯ On the top side, it shows the front panel of the switch. In the front panel, the linked ports will display green; as to the ports, which are link off, they will be dark. For the optional modules, the slot will show only a cover plate if no module exists and will show a module if a module is present. The image of module depends on the one you inserted. The same, if disconnected, the port will show just dark, if linked, green.
User Manual 4-2. Configuration Fifteen functions, including System Configuration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuration, Aggregation, LACP, RSTP, 802.1X, IGMP Snooping, Mirror, QoS, Filter, Rate Limit, Storm Control and SNMP are contained in this function folder for system and network management. Each of them will be described in detail orderly in the following sections.
User Manual 4-2-1. System Configuration System configuration is one of the most important configurations in the switch. Without the proper setting, network manager will not be able to manage or view the device. The switch supports manual IP address setting. Fig. 4-3 Function name: System Configuration Function description: Show system description, firmware version, hardware version, MAC address, serial number, active IP address, active subnet mask, active gateway, DHCP server and Lease time left.
User Manual The serial number is assigned by the manufacturer. Active IP Address: Show the active IP address of this switch. Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Server: Show the IP address of the DHCP server. Default: 0.0.0.0 Lease Time Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 characters are allowed in this parameter.
User Manual 32 bits Network ID Host ID Network ID Host ID Subnet number Subnet mask is used to set the subnet mask value, which should be the same value as that of the other devices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual. Default: 255.255.255.0 Fallback Gateway: Set an IP address for a gateway to handle those packets that do not meet the routing rules predefined in the device.
User Manual 4-2-2. Ports Configuration Function name: Ports Configuration Function description: Ports Configuration is applied to change the setting of each port. In this configuration function, you can set/reset the following parameters, Mode and Flow Control. All of them are described in detail below. Parameter description: Enable Jumbo Frames: This function support jumbo frames of up to 9600 bytes, Just tick the check box ( ) to enable it. Default: disable Link: Show link status of this port.
User Manual Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration The switch supports Port-based VLAN and Tag-based VLAN (802.1q). Support 24 active VLANs and VLAN ID 1~4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improving security and increasing performance but greatly reducing VLAN management.
User Manual support up to maximal 24 port-based VLAN groups. Tag-based: Tag-based VLAN identifies its member by VID. This is quite different from port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to determine if it can be forwarded. The switch supports supplement of 802.1q. For more details, please see the section VLAN in Chapter 3. Each tag-based VLAN you built up must be assigned VLAN name and VLAN ID.
User Manual Fig. 4-6 Metro mode 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the existed information of VLAN Groups List and maintains them, i.e. modify and delete one of them. User also can add a new VLAN group by inputting a new VLAN name and VLAN ID. If you are in port-based VLAN, it will just show the ID、Member of the existed port-based VLAN group. If you are in tag-based VLAN, it will show the ID、 VID、Member of the existed tag-based VLAN group.
User Manual Add Group: Create a new port-based VLAN or tag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the check box ( ) beside the ID, then press the button to delete the group.
User Manual Fig.
User Manual 4-2-5. Aggregation The Aggregation (Port Trunking) Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means you can apply your current Ethernet equipments to build the bandwidth aggregation.
User Manual 4-2-6. LACP The switch supports the link aggregation IEEE802.3ad standard. This standard describes the Link Aggregate Control Protocol (LACP), which is a protocol that dynamically creates and manages trunk groups. When you enable LACP link aggregation on a port, the port can automatically negotiate with the ports at the remote end of a link to establish trunk groups.
User Manual 4-2-7. RSTP RSTP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a switch to interact with other RSTP – compliant switches in your network to ensure that only one path exists between any two stations on the network. The switch allows you to create multiple STP configurations and assign ports to a specific tree.
User Manual Function name: RSTP Port Configuration Function description: Enable or disable RSTP protocol on the port which being selected and set path cost. Parameter description: Protocol Enabled: Just tick the check box ( ) beside the port x to enable RSTP protocol, then press the button to apply. Edge: Just tick the check box ( ) beside the port x to enable edge function. Path Cost: Path cost is the cost of transmitting a frame on to a LAN through that port.
User Manual 4-2-8. 802.1X 802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.
User Manual replies if the request is granted or denied. While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator exchanges the message to authentication server using EAP encapsulation.
User Manual The Fig. 4-15 shows the procedure of 802.1x authentication. There are steps for the login based on 802.1x port access control management. The protocol used in the right side is EAPOL and the left side is EAP. 1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage. 2. Initiating a session. Either authenticator or supplicant can initiate the message exchange.
User Manual to access the network. 10. When the supplicant issue an EAP-Logoff message to Authentication server, the port you are using is set to be unauthorized. Fig. 4-15 The 802.1X “Enabled” is the type of authentication supported in the switch. In this mode, for the devices connected to this port, once a supplicant is authorized, the devices connected to this port can access the network resource through this port. 802.
User Manual Function name: 802.1X Configuration Function description: This function is used to configure the global parameters for RADIUS authentication in 802.1x port security application.Parameter description: Mode: Enable or disable 802.1X function. RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to communicate with RADIUS server for the authentication service. The valid value ranges 1-65535. Default port number is 1812.
User Manual Re-authenticate All: Re-authenticate for all ports in at once. Force Reinitialize: Force the subscriber has to reinitialize connected to the port. Force Reinitialize All: Force Reinitialize for all ports in at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration Statistics: Choose the port which you want to show of 802.1X statistics, the screen include Authenticator counters, backend Authenticator counters, dot1x MIB counters and Other statistics.
User Manual Fig. 4-17 802.1X Statistics Function name: 802.1x Parameters Function description: In here, user can enable or disable Reauthentication function and specify how often a client has to re-enter his or her username and password to stay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authentication will take place in this port.
User Manual 4-2-9 IGMP Snooping Function name: IGMP Snooping Configuration Function description: IGMP snooping enable group multicast traffic to be only forwarded to ports that are members of that group; thus allowing you to significantly reduce multicast traffic passing through the switch. All the functions should press button to start up after you tick the check box. Parameter description: IGMP Enabled: Just tick the check box ( ) to enable this function.
User Manual 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the traffic of the network, this switch support one port mirror multi ports. For example, we assume that Port A and Port B are Source Ports and Port C is Mirror Port respectively, thus, the traffic passed by Port A and Port B will be copied to Port C for monitoring. Parameter description: Source Port: Set up the port for being monitored.
User Manual 4-2-11. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make precedence of 8 priorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Fig.
User Manual Function name: QoS Configuration Function description: When you want to use QoS function, please select QoS Mode by use dropdown menu in advance. Then you can use 802.1p Priority and DSCP Priority functions to take effect. In this function, you can disable QoS Mode and choose any of Priority Control and enable it, such as 802.1p, DSCP. The switch only support Strict Priority, and high priority queue is always passed first.
User Manual Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SERVICE TYPE field to accommodate a set of differentiated services (DS). Under the differentiated services interpretation, the first six bits comprise a codepoint, which is sometimes abbreviated DSCP, and the last two bits are left unused. DSCP can form total 64 (0~63) kinds of Traffic Class based on the arrangement of 6-bit field in DSCP of the IP packet.
User Manual 4-2-12 Filter Function name: Filter Configuration Function description: This function can set management’s source IP Address to each port, simple and raise safety. After completing the function’s setting, press button to have this function taken effect. Parameter description: Source IP Filter: Mode: There are three types of mode in this drop-down menu. Default is disabled. Disabled: Allow all IP Address login to this switch and manage it.
User Manual Fig.
User Manual 4-2-13 Rate Limit Function name: Ingress and Egress Bandwidth Setting Function description: Ingress and Egress Bandwidth Setting function are used to set up the limit of Ingress or Egress bandwidth for each port. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded if the rate exceeds the value you set up in Data Rate field. Pause frames are also generated if flow control is enabled.
User Manual 4-2-14 Storm Control Function name: Storm Control Function description: Storm Control is used to block unnecessary frames of the multicast and broadcast reducing the switch’s performance. When the frames of the multicast or broadcast are over the rate and Strom Control enables, they could be determined to drop the frames of exceeded rate. Fig.4-26 Storm Control Configuration Parameter description: ICMP Rate: To enable the ICMP Storm capability.
User Manual Multicast Rate: To enable the Multicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Flooded unicast Rate: To enable the Flooded unicast Storm capability. User can use drop-down menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. NOTE: After completing the function’s setting, press button to have this function taken effect.
User Manual 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed devices equipped with SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax.
User Manual Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig.
User Manual 4-3. Monitoring There are six functions contained in the monitoring function. Monitoring Statistics Overview Detailed Statistics LACP Status RSTP Status IGMP Status Ping 4-3-1. Statistics Overview The function of Statistics Overview collects any information and provides the counting summary about the traffic of the port, no matter the packet is good or bad. In the Fig. 4-25, the window can show all ports’ counter information at the same time.
User Manual The counting number of the packet received. Tx Errors: Number of bad packets transmitted. Rx Errors: Number of bad packets received. Fig.
User Manual 4-3-2. Detailed Statistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’s traffic. In the Fig. 4-26, the window can show all counter information each port at one time. Parameter description: Rx Packets: The counting number of the packet received. RX Octets: Total received bytes. Rx High Priority Packets: Number of Rx packets classified as high priority. Rx Low Priority Packets: Number of Rx packets classified as low priority.
User Manual Tx Multicast: Show the counting number of the transmitted multicast packet. Tx Broad- and Multicast: Show the counting number of the transmitted broadcast with multicast packet. Tx Error Packets: Show the counting number of the received error packets. Rx 64 Bytes: Number of 64-byte frames in good and bad packets received. Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and bad packets received.
User Manual Number of short frames (<64 Bytes) with valid CRC. Rx Oversize: Number of long frames(according to max_length register) with valid CRC. Rx Fragments: Number of short frames (< 64 bytes) with invalid CRC. Rx Jabber: Number of long frames(according tomax_length register) with invalid CRC. Rx Drops: Frames dropped due to the lack of receiving buffer. Tx Collisions: Number of collisions transmitting frames experienced.
User Manual 4-3-3. LACP Status Function name: LACP Status Function description: Display the LACP status. In the Fig. 4-30, the window can show LACP information and status each port at one time. Parameter description: LACP Aggregation Overview: Show the group/port status. Default will set to red sign for port link down, user can check legend table below for all reference. LACP Port Status: Group/Port: Show the port number. Normal : as Legend. Fig.
User Manual 4-3-4. RSTP Status Function name: RSTP Status Function description: Display the RSTP status. In the Fig. 4-28, the window can show the VLAN bridge information and status of 1~24 ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id. Bridge Id: Show this switch’s current bridge priority setting and bridge ID which stands for the MAC address of this switch. Hello Time: Show the current hello time of the root bridge.
User Manual Fig.
User Manual 4-3-5. IGMP Status Function name: IGMP Status Function description: Display the IGMP status. In the Fig. 4-29, the window can show VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queries status. Queries transmitted: To count the group membership queries transmitted. Queries received: To count the group membership queries received.
User Manual Fig. 4-32 IGMP Status 4-3-6. Ping Status Function name: Ping Status Function description: To setting up the target IP address for ping function of ICMP protocol and display the pinging status. In the Fig. 4-30, the window can show the pinging information. Parameter description: Ping Parameters: Target IP address: Set up a Target IP address to ping. Count: Use drop-down menu to set number of echo requests to send. Four type of number can choose, there are 1, 5, 10 and 20.
User Manual Ping Results: Target IP address: Show the active target IP address. Status: Show the result of the ping status. Received replies: Show the received replies number of times. Request timeouts: Show the timeout of request. Average Response times (In ms): Show the average response time in milliseconds. Fig.
User Manual 4-4. Maintenance There are five functions contained in the maintenance function.
User Manual 4-4-1. Warm Restart We offer you many ways to reboot the switch, including power up, hardware reset and software reset. You can press the RESET button in the front panel to reset the switch and to retrieve default setting. After upgrading software, then you must reboot to have the new configuration taken effect. Here we are discussing is software reset for the “reboot” in the main menu. Function name: Warm Restart Function description: Reboot the switch.
User Manual 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default Configuration function can retrieve default setting to replace the working configuration. Fig.
User Manual 4-4-3. Software Upgrade Function name: Software Upgrade Function description: You can use the browser button to select the newer version file in your system to update your device. Fig.
User Manual 4-4-4. Configuration File Transfer Function name: Configuration File Transfer Function description: You can backup the switch configuration file into your computer folder in accident. On the other hand, upload the backup configuration file into the crash or new switch can save much time and avoid mistakes to happen. Fig.
User Manual 4-4-5. Logout Besides the auto logout function as we mentioned above in the section of system configuration, the switch also allows the user to logout manually by performing the Logout function. Function name: Logout Function description: The switch allows you to logout the system to prevent other users from the system without the permission. If you do not logout and exit the browser, the switch will automatically have you logout.
User Manual 5. Maintenace 5-1. Resolving No Link Condition The possible causes for a no link LED status are as follows: The attached device is not powered on The cable may not be the correct type or is faulty The installed building premise cable is faulty The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot connect to Computer C through the 24-Port GbE Web Smart Switch. The network device of Computer C may fail to work.
User Manual Appendix A Technical Specifications Features • • • • • • • • • • • • • • • • • • 20 (10/100/1000Mbps) Gigabit Ethernet (TP) switching ports are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. Non-blocking store-and-forward shared-memory Web-Smart switched. Supports auto-negotiation for configuring speed, duplex mode. Supports 802.3x flow control for full-duplex ports.
User Manual Hardware Specifications Standard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.
User Manual Diagnostic LED: System LED : Per Port LED: 10/100/1000M TP Port 1 to 24 1000M SFP Fiber Port 21,22,23,24 Power Requirement : Power : LINK/ACT, 10/100/1000Mbps : SFP(LINK/ACT) AC Line Voltage : 100∼240 V Frequency : 50∼60 Hz Consumption : 30W Ambient Temperature : 0° to 50°C : 5% to 90% Humidity Dimensions : 44(H) × 442(W) × 209(D) mm Comply with FCC Part 15 Class A & CE Mark Approval Publication date: March, 2007 Revision A1 103
User Manual Management Software Specifications System Configuration VLAN Function Trunk Function Bandwidth Control Quality of Service (QoS) Network Management Auto-negotiation support on 10/100Base-TX ports, Web browser can set transmission speed (10/100Mbps) and operation mode (Full/Half duplex) on each port, enable/disable any port, set VLAN group, set Trunk Connection. Port-Base / 802.1Q-Tagged, allowed up to 24 active VLANs in one switch.
User Manual Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below. A MIB file in a readable electronic media (floppy disk or CD-ROM) is packed with the product box. For technical support or the latest version of MIB download, please visit our web site http://www.rubytech.com.tw.