KTI Networks KS-2262 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung KTI Networks KS-2262 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von KTI Networks KS-2262, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung KTI Networks KS-2262 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung KTI Networks KS-2262. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung KTI Networks KS-2262 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts KTI Networks KS-2262
- Den Namen des Produzenten und das Produktionsjahr des Geräts KTI Networks KS-2262
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts KTI Networks KS-2262
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von KTI Networks KS-2262 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von KTI Networks KS-2262 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service KTI Networks finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von KTI Networks KS-2262 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts KTI Networks KS-2262, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von KTI Networks KS-2262 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    24 Fast Ethernet + 2 Gig ab it L2 Manage d Sw itch User's Manual KS-2262 Release 2.28[...]

  • Seite 2

    ii Electronic Emission Notices Federal Communica tions Commission (FCC) S tateme nt This equipment has been tested and f ound to comply with the limits for a c lass A com puting device pursuant to Subpart J of part 15 of FCC Rules, which are des igned to provide reasonable protec tion against such interf erence when operated in a comm ercial enviro[...]

  • Seite 3

    T able of Content s CAUTION ----------------------------------------------------------------------------------------------------------------------------- 4 ELECTRIC EMISSION NOTICES------------------------------------------------------------------------------------------------II 1. INTRODUCTION ------------------------------------------------------[...]

  • Seite 4

    2 3-15. SECUR I T Y ----------------------------------------------------------------------------------------------------------------- - 128 3-16. BA NDWIDTH MANAGEMENT --------------------------------------------------------------------------------------- 131 3-17. QOS(QUALITY OF SER VICE) CONFIGURA TION --------------------------------------------[...]

  • Seite 5

    3[...]

  • Seite 6

    4 Caution Circuit devices are sensitive to static electr icity , which can damage their delicate electronics . Dry weather conditions or walking ac ross a carpeted f loor may cause y ou to acquire a s t atic electric al charge. T o protect your device, alway s: • T ouch the m etal chassis of your com puter to ground the static electrical c harge [...]

  • Seite 7

    5 About this user ’ s m anual In this us er ’s m anual, it wi ll not o nl y tell you ho w t o install a nd c onn ec t your netwo rk system but configure and m onitor the 24 F AST ETHERNET + 2 GIGABIT L2 MANAGED S W ITCH through the bu ilt-in CLI and we b by RS-232 serial i nterface and Ether net ports step-by-st ep. Many exp lanations in detai [...]

  • Seite 8

    6 1. Introduction 1-1. Ov erview of 24 F A ST ETHERNET + 2 GIGA BIT L2 MA NAGED SWITCH 24 F AST ETHERNET + 2 GIGABIT L2 MANAGED SW ITCH, 24 Fast Eth ernet + 2 Gigabit L2 Managed Switch, im plemented 24 10/100Mbps TP + 2 Gigab it dual media por t s w ith T P/SFP , is a s t andard s witch that meets all IEEE 802.3/u/x/ z Gigabit, Fas t Ethernet a nd [...]

  • Seite 9

    7     Key Features in the Device QoS: Support Q uality of Ser vice by the I EEE 802.1P standard. T here are t wo priorit y que ue and pack et tr ansmission schedul e us ing W eighted R ound Robin (WRR) . User- defined weight cl assification of packet priorit y c an be based on either VLAN tag on packets or us er-defined port[...]

  • Seite 10

    8 1-2. Checklist Before you start installing the switch, verify that the package contains the f ollow ing:  24 F AST ET HERNET + 2 GIGABIT L2 MANAGED SW ITCH 24 Fas t Ethernet + 2 Gigabit L2 Managed Switch  Fiber Modules (optional)  Mounting Acces sory (for 19” Rack Shelf)  This Us er's Manual in CD-ROM  AC Power Cord  RS-2[...]

  • Seite 11

    9  Supports 802.1Q VLAN with 256 entries.  Supports user m anagement and lim its three users to login  Supports DHCP Broadcasting Suppression to avoid network suspended or crashed   Supports to send the trap event while m onitored events happened  Supports default conf iguration which can be restor ed to over write the[...]

  • Seite 12

    10 1-4. V iew of 24 F A ST ETHERNET + 2 GIGA BIT L2 MA NA GED SWITCH 1-4-1. User I nt erf aces on t he Front Panel (Button, LEDs and Pl ugs) There ar e 24 TP Fast Ethernet por ts and 2 slots for optional rem ovable m odules on the front pane l of the s witch. LED d isplay area, locating on the f ront panel, contains a CPURUN, Power LED and 26 ports[...]

  • Seite 13

    11        LED Indicators LED Color Function System LED CPURUN Green Lit when CPU is on and good POW ER Green Lit when AC power is on and good ACT Green Lit when LEDSET set on active m ode FDX Green Lit when LEDSET set on full- duplex mode SPD Green Lit when LEDSET set on speed m ode 10/100Mb ps Ethernet T P Port 1 to 24 LED [...]

  • Seite 14

    12 1-4-2. User I nt erf aces on t he Rear Panel One RS- 232 DB-9 inter face is offer ed for configur ation or managem ent. And there is one AC power input sock et for having the switch powered on or off . Fig. 1-3 Re ar V iew of 24 F AST ETHER NET + 2 GI GA BIT L2 MA NAG ED SW ITCH RS-232 DB-9 Connector A C Line 100-240V 50/60 Hz[...]

  • Seite 15

    13 1-5. View of the Optional Modules In the s w itch, Port 25, 26 includes t w o t y p es of media --- TP and SFP Fiber (LC, BiDi LC…); t his port supp ort s 10/100 /1000Mbps TP or 1000Mbps SFP Fiber with auto-detec ted functio n. 1000Mbps SFP Fiber tr ansceiver is used for hig h-speed connecti on expansion. Refer to “KS-2601 Mod el List” f i[...]

  • Seite 16

    14[...]

  • Seite 17

    15 2. Installation 2-1. S t arting 24 F AST ETHERNET + 2 GIGA BIT L2 MA NAGED SWITCH Up This section will give users a quic k start for : - Hardware and Cable Installation - Managem ent S tation Installation - Software booting and configur ation 2-1-1. Hardw are and Cable Installation At the beginning, please do firs t: ⇒ W ear a grounding device[...]

  • Seite 18

    16   TP Port and Cable Installation ⇒ In the switc h, TP port supports MDI/MDI-X auto-cross over , s o both types of cable, s traight-thro ugh (Cable pi n-outs for RJ-45 j ack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M T P; 1, 2, 3, 4, 5, 6, 7, 8 to 1 , 2, 3, 4, 5, 6, 7, 8 in Giga bit TP) and cross ed-over ( Cable pin-ou ts for RJ-45 j ack 1, 2[...]

  • Seite 19

    17 2-1-2. I nstalling Chassis t o a 19- Inch Wiring Closet Rail Caution: Allow a proper s pac ing and proper a ir ventilation for the cooling fa n at both sides of the chassis. ⇒ W ear a grounding device f or electrostatic disc harge. ⇒ Screw the m ounting accessory to the front side of the s w itch (See Fig. 2-2) . ⇒ Place the Chassis into t[...]

  • Seite 20

    18 2-1-3-1. Cablin g Requirements for TP Ports ⇒ F or Fast Ethernet TP network connec tion  The grade of the cable mus t be Cat. 5 or Cat. 5e wi th a m aximum length of 100 meter s. ⇒ G igabit Ethernet TP network connection  The grade of the cable mus t be Cat. 5 or Cat. 5e wi th a m aximum length of 100 meter s. Cat. 5e is recom mended. [...]

  • Seite 21

    19 2-1-3-3. Switch Cascading in T opology            T akes the Delay Time into Account Theor etically , the switc h partitions the collis ion dom ain for each p ort in s witch cascading that you m ay up-link the s witches unl imitedly . In pract ice, the net work extensio n (cascadin g levels & over all diam[...]

  • Seite 22

    20 Case1: All switch por t s are in the sam e local area network . Every por t can access each other (See Fig. 2-3) . If VLAN is e nabled and configur ed, eac h n ode i n the n et work that can c om m unicate each other direc tly is bounded in the same VLAN area. Here VL AN area is defined by what V LAN you ar e using. The switch supports bo th por[...]

  • Seite 23

    21 Case 2b: Port-bas ed VLAN (See Fig.2-5). 1. VLAN1 mem bers could not ac cess VLAN2, VLAN3 and VLAN4 m embers. 2. VLAN2 mem bers could not ac cess VLAN1 and VLAN3 m embers, but they could access V LAN4 members. 3. VLAN3 mem bers could not ac cess VLAN1, VLAN2 and VLAN4. 4. VLAN4 mem bers could not ac cess VLAN1 and VLAN3 m embers, but they could [...]

  • Seite 24

    22 2-1-4. Conf i guring the Management A gent of 24 F AST ETHERNET + 2 GIGA BIT L2 MA NA GED S WITC H We offer you three wa y s to s t artup the s witch managem ent function. T hey are RS- 232 cons ole, CLI, and Web. Us ers can us e any one of them to m onitor and configur e the switch. Y ou can touch them through the following procedures. Section [...]

  • Seite 25

    23 2-1-4-1. Configuring the Management A gent through the Serial RS-232 Port T o perf or m the c onfiguration thr ough RS-232 c onsole port, th e switch’s serial port must be directly con nected to a DCE device, for exa mple, a PC, through RS-2 32 cable wit h DB-9 connec tor . Next, run a term inal emulator with t he default sett ing of the switc[...]

  • Seite 26

    24        Set IP A ddress, Subnet Mask and Default Gatew ay IP A ddress Please r efer to F ig. 2-7 CLI Managem ent for details about fac tory setting. They are default se tting of IP addre ss. Y ou can f irst either co nfigure your PC IP address or change IP addres s of the switch, n ext to change the IP address of default g[...]

  • Seite 27

    25 2-1-4-2. Configur ing the Management A gent through the Ethernet Por t There ar e three ways to configure and m onitor the s w itch thr ough the s witch’ s Ethernet port. The y are CLI, W eb browser and SNMP manager . T he user interf ace for the las t one is NMS dependent and does not c over here. We j ust introduce the first two types of m a[...]

  • Seite 28

    26 Fig. 2-10 the Login Screen for W eb 2-1-5. IP A ddress A ssignment For IP address c onfiguration, th ere are three param eters needed to b e filled i n. They are IP address, Subnet Mask , Default Gateway and DNS. IP address: The addres s of the net work device i n the network is used for internetwork ing comm unication. Its addres s structure l [...]

  • Seite 29

    27 W i th the clas s addressing, it divides IP address into thr ee classes, clas s A, class B and class C. The res t of IP addresses are for m ulticast and broadcast. The bit length of the network pr efix is the sam e as that of the s ubnet mask and is denote d as IP address/X , for example, 192. 168.1.0/24. Eac h class has its addres s range descr[...]

  • Seite 30

    28 Class D and E: Class D is a c lass with fir st 4 MSB (Mos t significance bit) set to 1-1- 1-0 and is us ed for IP Multicast. Se e a lso RFC 1 1 12. Class E is a clas s with first 4 M SB se t to 1- 1-1- 1 and is used f or IP broadcas t. Accordin g to IANA ( Internet Ass igned Num bers Authorit y ), ther e are three s pecific IP address bl ocks re[...]

  • Seite 31

    29 In this di agram, you ca n see the sub net mask w ith 25- bit long, 25 5.255.255.128, contains 1 26 mem bers in the sub- netted networ k. Another is that th e length of network prefix equals the num ber of the bit with 1s in th at subnet m ask. W i th this, you can e asily count the number of IP addresses matched. T he following ta ble shows the[...]

  • Seite 32

    30 For diff erent network appl ications, the s ubnet mask may look lik e 255.255.255.2 40. This means it is a sm all network ac commodating a maxim u m of 15 nodes in t he network. Default gateway : For the route d pack et, if the destinatio n is not i n the ro u ting tabl e, all the tr aff ic is put into the d evice with t he designated IP address[...]

  • Seite 33

    31 2-2. T y pical Applicat ions The 24 F AST ETHERNET + 2 G IGABIT L2 MANAGED SW ITCH implem ents 24 Fast Eth ernet TP ports with auto MDIX an d 2 Gigabit dual m edia ports with SFP for rem ovable module sup ported com prehensive fib er types of connection, inc luding LC, BiDi LC f or SFP . For m ore details on the s pecificati on of the switc h, p[...]

  • Seite 34

    32 Fig. 2-15 Office N etwork Connection Fig. 2-14 Peer-to-peer Network C onnection[...]

  • Seite 35

    33 3. Operation of Web-based Management This chapter instruc t s you how to conf igure and m anage the 2 4 F AST ETHERNET + 2 GIGABIT L2 MANAGED SW ITCH through the web user i nterface it sup ports, to acces s and manage t he 24 10/1 00Mbps T P + 2 G igabit dual m edia ports with TP/SFP Fiber m anagement Eth ernet switc h. W ith this facilit y , yo[...]

  • Seite 36

    34 In the switc h, it supports a s i m ple user managem ent function al lowing only one adminis trator to conf igure the system at the sam e time. If there are t wo or mor e users usin g adm inistrator ’s identit y , the switc h wil l allo w the onl y one who logins fi rs t to configur e the system . The rest of users, even with administr ator ?[...]

  • Seite 37

    35 3-1. Web Management Home Ov erview After you log in, the s witch shows you the s ystem inf orm ation as Fig. 3-2. T his page is defau lt a nd t ells you the basic i nf orm ation of the s y stem , including “Mo del Name” , “System Description ”, “Loc a tion”, “Contact”, “Devi ce Nam e”, “Sy stem Up T ime”, “Current T ime[...]

  • Seite 38

    36 Fig. 3-3 port detail information In Fig. 3-3, it s ho ws th e bas ic inform ation of the clic k ed port. W ith this, you’ll se e th e inform ation about the por t status, traffic s t atus and ba ndwidth rating for egress and ingress r espectively .  On th e left- top corne r , t her e is a pu ll-d own l ist f or Aut o Logou t. For the sak e[...]

  • Seite 39

    37 Port DHCP Boot VLAN Syste m SNMP IGMP Snoopin g MAC T able GVRP Roo t STP Tru n k 802.1x Alar m Configur atio n Securit y Bandw idth QoS Diagno stics TFTP Se rv e r Log Firm w are Upgrade Reboo t Logo u t[...]

  • Seite 40

    38 3-1-1. System Information Function name: Sy stem Inform ation Function desc ription: Show the basic system inf ormation. Parameter desc ription: Model name: The m odel name of this device. Sy stem description: As it is, this tells what this device is. Her e, it is “24 Fast Ethernet + 2 Gigabit L2 Managed Switch”. Location: Basically , it is [...]

  • Seite 41

    39 Host IP address: The IP address of the switch. Host MAC address : It is the Ethernet MAC addres s of the managem ent agent in this switch. Device Port: Show all ty pes and num bers of the port in the switch. RAM size: The s i ze of the DRAM in this switch. Flash size: The s i ze of the flash m emor y in this switch.[...]

  • Seite 42

    40 3-1-2. I P Configuration IP configurat ion is one of the most i mpor t ant config urations in the switch. W ithout the proper s etting, net work m anager will not be a ble to m anage or view t he device. The s w itch s upports both m anual IP address setting and automatic IP ad dress setting via DHCP server . When IP address is changed, y ou m u[...]

  • Seite 43

    41 IP address: Users c an configure the IP settin gs and fill in ne w valu es if users set the DHCP function “Disable”. Then, c lick <A pply> button to update. W hen DHCP is disabled, Default: 192.168.1.1 If DHCP is enabled, this f ield is filled by DHCP server and will not allow user m anually set it any more. Subnet mas k: Subnet mask i[...]

  • Seite 44

    42 DNS: It is Dom ain Name Server used to s erve the translation b etween IP address and nam e address. The s w itch s upports DNS c lient functi on to re-route the mnem onic name address to D NS server to get its associate d IP add ress for ac cessing Internet. Us er can spec if y a DNS IP addres s for the s witch. W ith this , the switch can tran[...]

  • Seite 45

    43 3-1-3. Time Configuration The s w itch pr ovides m anual and autom atic ways to set the system ti m e via NTP . Manual set ting is sim ple and you jus t input “Y e ar”, “Month” , “Day”, “Hour” , “Minute” and “Seco nd” within the vali d value range indic ated in each item . If you inp ut an invalid value, for ex ample, 61 [...]

  • Seite 46

    44 NTP: NTP is Net w ork T im e Protocol and is used to s y nc the network time based Gree nwich Mean Time (GMT ). If use the NTP mode and s elect a built-in NT P time server or manuall y specif y an user -defined NT P server as well as Time Zone, th e switch will s ync the tim e in a short after pressing <Ap ply > button. Though it synchr on[...]

  • Seite 47

    45 Day Light Saving End: This is used to set when to stop perfor ming the daylight saving time. Mth: Range is 1 ~ 12. Default: 1 Day : Range is 1 ~ 31. Default: 1 Hour: Range is 0 ~ 23. Default: 0 Fig. 3-5[...]

  • Seite 48

    46 3-1-4. Account Conf iguration In this f unction, on ly administr ator can crea te, modify or delete t he usernam e and password. Administrator can m odify other gu est identit ies’ password without confirm ing the password but it is necessar y to modif y the adm inistrator-equ ivalent identit y . Guest-e quivalent i dentity can m odify his pas[...]

  • Seite 49

    47 3-1-5. Management Securi ty Through t he managem ent securit y configurat ion, the m anager can do the st rict setup to control the s w itch and lim it the user to acces s this switch. The f ollow ing rules are of fered for the manager to m anage the switch: Rule 1) : When no list exists, then it will accept all connections. Accept -------------[...]

  • Seite 50

    48 Function name: Management Sec urity Conf iguration Function desc ription: The s w itch off ers Managem ent Security Conf iguration f unction. W ith this function, t he manager ca n easily contr ol the m ode that the user c onnects to the switc h. According to the mode, user s can be clas sified into two t ypes: Thos e w ho are a ble to connect t[...]

  • Seite 51

    49 IP Range: The s witch supports tw o kinds of options for managed valid IP Rang e, including “ Any” and “C ustom” . Default is “An y ”. In c ase that ”Custom ” had been ch osen, you can assign eff ective IP range. The valid range is 0.0.0.0~255.255.255.255. Incom ing Port: The s w itch supp orts two kinds of options for m anaged v[...]

  • Seite 52

    50 3-1-6. Virtual St ack Function name: Virtual Stack Function desc ription: Virtual S tack Management( VSM) is the group m anagem ent func tion. Through the proper configuration of this func tion, switches in the same LAN will be grouped a utomaticall y . And am ong these sw itch, one switc h will be a m aster ma chine, and the others in this grou[...]

  • Seite 53

    51 Fig. 3-8 Parameter desc ription: S tate: It is used f or the activation or de-activation of VSM. Default is Enable. Role: The role that the switc h would like to play in virt ual stack. T wo types of roles, including m aster and slave are off ered for option. Def ault is Master . Group ID: It is the gr oup ident ifier (GID) which s igns f or VSM[...]

  • Seite 54

    52 3-2. Port Configuration Four func tions , inc luding Port S tatus, Port Conf igur ation, S im ple Counter and Detai l Counter ar e contained in this function folder for port monitor and managem ent. Each of them will be described in detail order ly in the f ollow ing sections . 3-2-1.Port St atus The f unction Port S tatus gathers the inform ati[...]

  • Seite 55

    53 Function name: Port S tatus Function Desc ription: Report the latest upda ted status of all port s in this s w itc h. W hen any one of the ports in the switch chan ges its param eter displa y e d in the page, it will be automatic ally r efreshed the port cur rent status about every 5 seconds. Paramete r Description : Port No: Displa y the p ort [...]

  • Seite 56

    54 S peed / Duplex : Displa y the spe ed a nd d uplex of all port. T here are thr ee speeds 10M bps, 100Mbps and 1000Mbps suppor ted for TP m edia, and the du plex supporte d is half du plex and full duplex. If th e media is 1Gbps fiber , it is 1000Mbps s upported onl y . The s t atus of speed/dup lex mode is determ ined by 1) the ne gotiation of b[...]

  • Seite 57

    55 Fig. 3-10 Parameter desc ription of Port 25 and Port 26: Connector T y pe: Display the connector ty pe, for ins t ance, UT P , SC, ST , LC and so on. Fiber T y pe: Display the fiber mode, f or instance, Multi-Mode, Single-Mode. Tx Central Wavelength: Display the fiber optical transm itting central wavelength, for instance, 850nm , 1310nm, 1550nm[...]

  • Seite 58

    56 V endor SN (Serial Num ber): Show the serial number assigned by the manuf acturer . Date Code: Show the date this module was m ade. T em perature: Show the current tem perature of m odule. Vcc: Show the working DC voltage of m odule. Mon1(Bias) m A: Show the Bias current of module. Mon2(TX PW R): Show the transm it pow er of m odule. Mon3(RX PW [...]

  • Seite 59

    57 3-2-2. Port Conf i gurat i on Port Conf igurat ion is appl ied to cha nge t he sett ing of each port. I n this conf igurat ion function, you can set/res et the follo w ing func tions. All of them are desc ribed in detail below . Fig. 3-1 1 Function name: Port Configur ation Function desc ription: It is used to set e ac h por t’s oper at io n m[...]

  • Seite 60

    58 S peed/Duplex: Set the s peed a nd dup lex of the p ort. In speed, 10/10 0Mbps bau d rat e is availab le for Fast Eth ernet, G igabit m odule in port 2 5, 26. If the media is 1Gbps fiber , it is alwa y s 1000 Mbp s a nd the duplex is full only . If the media is TP , the S peed/Duplex is com prised of the combination of speed mode, 10/100 /1000Mb[...]

  • Seite 61

    59 3-2-3. Port Descri ption Port Desc ription is a pplied to c hange the setting of each por t. In this confi guration function, you can g ive a nam e to each por t. All of them are des cribed in detail below . Fig. 3-12 Function name: Port D escripti on Function desc ription: It is used to set each por t’s descriptio n. This hum an readable desc[...]

  • Seite 62

    60 3-2-5. Si mpl e Count er The func tion of Sim ple Counter co llects any infor mation and provides the counting about the traffic of the port, no matter the pack et is good or bad. In the Fig. 3-13 , the window can s how all ports’ counter inf ormation at the sa me time. Eac h data fie ld h as 2 0- dig it long . If the countin g i s over f lo w[...]

  • Seite 63

    61 Rx Pack et: The c ounting number of the pack et received. Tx Collision: Num ber of collisions tr ansmitting fr ames exper ienced. Rx Error Packet: Number of bad packets received.[...]

  • Seite 64

    62 3-2-4. Detail Counter The f unction of Detail Cou nter collects a ny inform ation and pro v ides the countin g about the traffic of the port, no matter the pack et is good or bad. In the Fi g. 3-14, the wind ow can show only one port c ounter inform ation at the s ame time. T o see another port’ s c ounter , y ou have t o pull do w n the lis t[...]

  • Seite 65

    63 Show the counting number of the received unicast p ack et. Rx Broadcas t Packets: Show the counting number of the received broadcas t p ack et. Rx Multicas t Packets: Show the counting number of the received m ulticast packet. Rx Pause Pack ets: Show the counting number of the received pause packet. Tx Collisions: Num ber of collisions tr ansmit[...]

  • Seite 66

    64 Tx Packets: The counting num ber of the pack et transmitted. TX Octets: T otal transm itted by tes . Tx Unicast Packets: Show the counting number of the transm itted unicast packet. Tx Broadcast Pack et s: Show the counting number of the transm itted broadcast packet. Tx Multicast Packets: Show the counting number of the transm itted multicast p[...]

  • Seite 67

    65 3-3. SNMP Configuration Any Net work Managem ent S y s tem (N MS) running th e Simple Network Managem ent Protoco l ( S NMP) can manag e the Ma naged devic es equipped with SNMP agent, pr ovided th at the Managem ent Inform ation Base (MI B ) is i nstalled correc tly on the managed devices. T he SNMP is a p rotocol that is used to gover n the tr[...]

  • Seite 68

    66 Default SNMP function: Enable Default com munity name f or GET : public Default com munity name f or SET : private Default com munity name f or T r ap: public Default Set f unction: Enable Default trap hos t IP address: 0.0.0.0 Default port num ber: 162 Trap: In the s witch, th ere are 6 tr ap hosts s upported. Each of them has its own comm unit[...]

  • Seite 69

    67 3-4. Loop Detection Looping will alway s occur when the switches are connec ted as a cy cle and a switch transm its the p ack et s that will go back to the transmitted s w itch. Loop Detection will prevent the looping fr om happening. Moreover , it c ould remove the looping phenomenon per port. In general, y ou can unplug the cable connec tion t[...]

  • Seite 70

    68 looping detection. After enabling looping ac tion, y ou should dec ide which port you w ould like to open loop detec tion capability . For example, you open the loop detection of por t 1 as enable state. W hen the looping situation happens f rom port 1, Loop Detection will lock the port1’s ability . And then y ou will see that the “Current S[...]

  • Seite 71

    69 3-5. DHCP Boot The DHCP Boot func tion is used to spre ad the request broadc ast p ack et into a bigger t ime fram e to prevent the traffic conges tion due to br oadcast pack ets from man y ne twork devices whic h ma y se ek its NMS, boot server , DHCP server a nd man y conn ections predefin ed when the whole b uilding or block lose the power an[...]

  • Seite 72

    70 3-6. IGMP Snooping The f unction, IGMP Snooping, is us ed to establis h the multicas t groups to forward the multic ast packet to the m e m ber ports, and, in nature, avoi ds wasting the bandwidth while IP multic ast pack ets are running o ver the network . This is because a switch that d oes not support IGMP or IGMP Snoop ing can not tell th e [...]

  • Seite 73

    71 Parameter desc ription: IGMP snooping m ode selection: The s w itch supports thr ee kinds of IGMP Snooping s tatus, including “Passive” , “Active” and “Disable” . Disable: Set “Disable” m ode to disable IGMP Snooping function. Default: Disable Active: In Acti ve mode, IG MP sno oping switch will per iodically iss ue the Member sh[...]

  • Seite 74

    72 Function name: Allowed Group Function desc ription: The Allo wed Group functi on allows the IGMP S nooping to set up the I P mu lticast table bas ed on u ser’s specif ic condit ions. IG MP report pac kets that meet the item s you set up will be joined or form ed the multicas t group. Fig. 3-19 Parameter desc ription: IP Range: The s w itch s u[...]

  • Seite 75

    73 Add: A new e ntry of allowed group configurati on can be c reated after th e parameter s as mentioned above had be en setup and then press <A dd> button. Edit: The ex isted entry also can be m odified after press ing <Edit> button. Delete: Remove the ex isted entry of allowed group conf iguration from the allowed group.[...]

  • Seite 76

    74 3-7. VLA N The s witch supports T ag- based VLAN (802.1q) an d Port-base d VLAN . It s upp orts 256 acti ve VLANs and VL AN ID 1~4094. VLAN c onfiguration is used to partition your LAN into sm all ones as your demand. Pro perl y configuri ng it, you can gain not only im proving sec urity and increasing performanc e but greatl y reduc ing VLAN ma[...]

  • Seite 77

    75 Sy m metric Vlan: This is an Ingress Rul e (Rule 1, The Ingress F iltering Rule 1 is “f orward only pack et s with VID matchin g this port’s conf igured VID”.). For exam ple, if port 1 r eceiv es a tagge d pack et with VI D=100 ( VLA N nam e=VLAN 100), and if S y mm etric-Vlan f unction is enabled, th e switch wil l check if port 1 is a m [...]

  • Seite 78

    76 Fig. 3-20[...]

  • Seite 79

    77 3-7-2. T ag- based G roup Function name: Tag-bas ed Group Configuration Function desc ription: It shows the inf ormation o f existed T ag-based VL AN Groups. Y ou can a lso easil y create, edit an d delete a T ag-based VLA N group b y pressing <A dd> , <Edit > a nd <Delete> f unction bu ttons. User can add a new VL AN group b y[...]

  • Seite 80

    78 Add Group: Input th e VLAN nam e, VID an d then cho ose the m ember by tick ing the check box beside the port No. to create a ne w T ag- based VLAN. As to the param eter of Untag, it s tands for an egr es s r u le of t he por t. If you tic k the check box beside the port No., packets with t his VID outgoi ng from this port w ill be untagg ed. Fi[...]

  • Seite 81

    79 3-7-3. PVI D Function name: PVID Function desc ription: In PVID Setti ng, user can inp ut VID number to eac h port. The range of VID number is from 1 to 4094. User also c an choose i ngress f iltering rule (Rule 2) to each port. The I ngress Filter ing Rule 2 is “drop untagged fr ame”. W hile Rule 2 is enabled, the port will discar d all Unt[...]

  • Seite 82

    80 It bases on 8 02.1 p Q oS an d affec ts untagged pack ets. W hen the pack ets enter the s w itch, it w ould get the priority preced ence according to your Default Prior i t y settin g and m ap to 802.1p prior ity set ti ng in Q oS function. For exam ple, while you s et Default Prior ity of port 2 with 2 a nd transm it untagged pack et s to port [...]

  • Seite 83

    81 3-7-4. Port - based G r oup Function name: Port-based G roup Configuration Function desc ription: It shows t he inform ation of the ex isted Port-bas ed VLAN G roups. Y ou c an easil y create, ed it and delete a P ort-based VL AN group by press ing <A dd> , <Edit > a nd <Delete> f unction bu ttons. User can add a new VL AN grou[...]

  • Seite 84

    82 Add Group: Create a ne w Port- based VLAN. In put the VLAN na me and choose the mem ber by tick ing the check box beside the port N o., then, pres s the <A pply> button to have the setting taken effec t. Fig. 3-25 Delete Group: Just pre ss the <Delete> button to remove the selec ted group entry from the Port-based gr oup t able. Edit[...]

  • Seite 85

    83 3-7-5. M anagement VLAN Function name: Management VLAN Function Desc ription: Parameter desc ription: S tate: It works w hen the tag-based m ode is chosen. W hen this f unction is enabled, only the tagged packets with this VID can m anage the switch. VID: V alid r ange 1~4094.[...]

  • Seite 86

    84 3-8. MA C T able MAC Tab le Configurati on gathers m any functions, i ncluding MAC Table Inf ormation, MAC T able Mainten ance, Stat ic and M AC Alias, which cann ot be categ orized to som e function type. They are descr ibed below . Function name: MAC T able Inf ormation Function Desc ription: Display the static or dy namic learning MAC entry a[...]

  • Seite 87

    85 Port: The port that ex ists in the searched MAC Entry . VID: VLAN Group that MAC Entry exists. S tate: Display the method that this MAC Entry is built. It may show “Dynamic MAC” or “S tatic MAC”. Fig. 3-26[...]

  • Seite 88

    86 Function Name: MAC T able Maintenanc e Function Desc ription: This function c an allow the user to set up the proc essing mec hanism of MAC T able. An idle MAC ad dress ex ceeding MAC Address Age-out Time will be rem oved from the MAC T able. T he range of Age-out Time is 10- 1000000 seconds , and the setup of this time will h ave no effect on s[...]

  • Seite 89

    87 Function Name: S tatic Setting Function Desc ription: The f unction of Stat ic is us ed to configur e MAC’s r eal manners inside of t he switch. T hree kinds of m a nners inc luding static , static with d estination dro p and static with sourc e drop are contained in this func tion . As “static ” is chosen, assign a MAC address to a specif[...]

  • Seite 90

    88 Queue (Priority): Set up the priority ( 0~3) for the MAC. Forwarding Rule (Dr op Policy ): St a t i c : A MAC address is assigned to a specif ic port, all of the switch’s traff ics sent to this MAC addres s will be forwarded to this port. Static with Destination Drop: W hile the DA of the inc oming pack ets meets the value you set up, these pa[...]

  • Seite 91

    89 Function name: MAC Alias Function desc ription: MAC Alias function is used to let you assign M AC address a pl ain English name. T his will hel p you tell which MAC address belo ngs to whic h user in t he illegal ac cess report. At the initi al time, it shows a ll pairs of the ex isted alias name and MAC addr ess. There ar e three MAC ali as fun[...]

  • Seite 92

    90 Parameter desc ription: MAC Address: It is a six- byte long Eth erne t hardware a ddress and us ually ex press ed b y hex and separated by hy phens . For example, 00 – 40 - C7 - D6 – 00 - 02 Alias: MAC alias nam e y ou as sign. Note: If there are too m any MAC addresses learned in the table, w e recom mend y ou inputting the MAC address and [...]

  • Seite 93

    91 3-9. GVRP Configuration GVRP is an applic ation based on Gener ic Attribute R egistration Pr otocol (GARP) , ma inly used to autom atically an d dynam ically mai nt ain t he group m embership inform ation of the VLANs. T he GVRP offers the func tion provid ing the VL AN registrat ion serv ice throug h a G ARP applic ation. It m akes use of GARP [...]

  • Seite 94

    92 Function name: GVRP Config Function desc ription: In the functio n of GVRP Config, it is us ed to configure each p ort’s GVRP operatio n mode, in which th ere are se ven parameter s needed to be conf igured described below . Parameter desc ription: GVRP S tate Setting: This function is sim ply to let y ou en able or disab le GVRP function. Y o[...]

  • Seite 95

    93 Normal: It is Norm al Registration. The Registr ar responds norm ally to incom ing GARP m essages. The default s etting is Normal. Fixed: It is Registration F ixed. The Registrar ignores all GARP mes sages, and all mem bers rem ain in the registered ( IN) state. Forbidden: It is Registra tion Forbidden. The Registrar ignor es all GARP mes sages,[...]

  • Seite 96

    94 Function name: GVRP Counter Function desc ription: All GVRP count ers are main ly divided in to Received and Transm itted two categories to let you m onitor the GVRP actions . Actually , the y are G ARP pa ckets. Fig. 3-31 Parameter desc ription: Received: T o tal GV RP Pac kets : T otal GVRP BPDU is received by the GVRP application. Invalid GVR[...]

  • Seite 97

    95 LeaveEmpty Message Pac ket s: Number of GARP BPDU wi th Leave Em pty m essage is rec eived by the GARP application. Empty Message Pack et s: Number of GARP BPDU wi th Em pty m essage is rec eived by the GARP application. Transmitted: T o tal GV RP Pac kets : T otal GARP BPDU is transm itted by the G V RP application. Invalid GVRP Packets: Number[...]

  • Seite 98

    96 Function name: GVRP Group Inform ation Function desc ription: T o show the dynamic group m ember and their inform ation. Parameter desc ription: Current Dynamic Gr oup Number: The num ber of GVRP group that are cr eated currently . VID: VLAN identifier . W hen GVRP group creates, each dynamic VLAN group owns its VID. V alid r ange is 1 ~ 4094. M[...]

  • Seite 99

    97 3-10. STP Configuration The S panning Tree Prot ocol (ST P) is a standard ized m ethod (IEEE 80 2.1D) f or avoiding loops in switched networks . W hen ST P is enabled, ensure that onl y one path is active between an y two nodes on th e network at a t ime. User c an enable S panning Tree Prot ocol on switc h’ s web m anagement and th en set up [...]

  • Seite 100

    98 All bri dges in t he LAN will r e-learn an d de ter m ine which the root br id ge is . Maxim u m Age time is as signed b y Root Br idge in unit of sec onds. Default is 20 s econds. Current Forward Delay: Show th e current root br idge forwar d delay tim e. The value of Forward Delay tim e is set by root. The F orward Dela y time is defined as th[...]

  • Seite 101

    99 3-10-2. STP Configuration The ST P , S panning T ree Protocol, actually includes RST P . In the S panning Tree Configura tion, there are six p aram eters open for t he user to c onfigure as user ’s idea. Each param eter description is lis ted below . Function name: STP Configuration Function desc ription: User can s et the followin g S panning[...]

  • Seite 102

    100 Forward Delay: Y ou can s et the root bridge f orward dela y tim e. This figur e is set b y Root Bridge o nly . T he forward delay time is defined as t he time spent f rom Listenin g state moved to Learning state and a lso from Learning state moved to Forwardin g state of a port in br idge. T he forward del ay time contains two states, List eni[...]

  • Seite 103

    101 3-10-3. STP Port Configuration Function name: STP Port Setting Function desc ription: In the ST P Port Sett ing, one it em selection a nd five parameters s ettings are offered for user ’ s setup. User can d isable and e nable each p ort by selec ting each Port S tatus item . User also can s et “P ath C ost” and “Prior it y ” of eac h [...]

  • Seite 104

    102 802.1w RSTP recom mended value: (V alid range: 1 – 200,000,000) 10 Mbps : 2,000,000 100 Mbps : 200,000 1 Gbps : 20,000 Default: 0 Priority : Priorit y her e means Por t Priori ty . P ort Priorit y and Port Number ar e mix ed to form the Port ID. Port IDs are often compared in order to determ ine whic h port of a b r idge wou ld becom e the Ro[...]

  • Seite 105

    103 M Check : Migratio n Check . It forces the port s ending out a n RST P BPDU instea d of a leg acy STP BPDU at the next tr ansmiss i on. T he only benefit of this operatio n is to m a ke the p ort quick ly get bac k to act as an R STP port. Click <M Check > button to sen d a RSTP BPDU f rom the por t you specif ied. Fig. 3-35[...]

  • Seite 106

    104 3-1 1. T runking Configuration The Port T runking Co nfiguration is used to con figure the s ettings of Li nk Aggregat ion. Y ou c an bundle more than o ne port w ith the same s peed, full du plex and the sam e MAC to be a single log ical port, thus the log i cal port aggreg ates the bandwidth of these ports. T his means you c an apply your c u[...]

  • Seite 107

    105 Per Trunking Gr oup supports a m aximum o f 4 read y member -ports. Please not e that som e decisio ns will autom atically b e made by t he system while y ou ar e configur ing y our tr unking ports. T runk Setting Rules are listed below: Rule1: Maxim um 3 groups are allowed Rule 2: The m embers of each group cannot exceed m ore than 4 ports Rul[...]

  • Seite 108

    106 Function name: Port Setting/S tatus Function desc ription: Port setting/s t atus is used to configure th e trunk proper ty of eac h and every port i n th e swi tch sy stem. Parameter desc ription: Method: This deter mines the m ethod a port uses to aggregate with other ports. None: A port does not want to aggregate with any other port should ch[...]

  • Seite 109

    107 Aggtr: Aggtr is an abbrev iation of “ aggregator”. Every port is also a n aggregator , and its own aggre gator ID is the s am e as its own Port No. W e can regar d an aggregat or as a representativ e of a trunking gr oup. Ports with sam e Group ID a nd using sam e trunking m ethod will have the opportuni ty to aggregate to a particular aggr[...]

  • Seite 110

    108 Function name: Aggregator View Function desc ription: T o displa y the current p ort trunk ing inform ation from the aggregator point of view . Parameter desc ription: Aggregator: It shows th e aggre gat or ID ( f rom 1 to 26) of e ver y p ort. In fact, e ver y port is also an aggregator , and its own aggregat or ID is th e same as its o w n Po[...]

  • Seite 111

    109 Function name: LACP Detail (LACP Aggregator Detailed Infor mation) Function desc ription: Show the detailed information of the LACP trunk ing group. Parameter desc ription: Actor: The s w itch you are watching on. Partner: The peer s y s tem from this aggregator ’s view . Sy stem Priority : Show the Sy stem Priority part of a system ID. MAC A[...]

  • Seite 112

    11 0 Function name: LACP Sy s tem Configur ation Function desc ription: It is us ed to set the priority part of the LACP s y stem ID. LACP will onl y aggregate together the ports whose p eer link p artners are all on a single system . Each system supports LACP will be assigned a gl obally unique System Identifier f or this p urpose. A s ystem ID is[...]

  • Seite 113

    111 3-12. 802.1x Configuration 802.1x por t-based network access contr ol provides a method to r estrict user s to acces s network r esources via a uthenticatin g user ’s inform ation. T his restricts user s from gaining acces s to the networ k resourc es through a 80 2.1x-enabled port without auth entication. If a user wishes t o touch the netwo[...]

  • Seite 114

    11 2 The overv iew of operat ion flow is qu ite simple. W hen Supplican t P A E issues a r equest to Auth enticator P AE, Aut henticator and Supplican t exchanges authenticat ion m essage. Then, Aut henticator p asses th e request to RADIUS ser ver to verif y . Final ly , R ADIUS server r eplies if the request is gr anted or denied. W hile in the a[...]

  • Seite 115

    11 3 The Figur e shows the procedur e of 802.1x auth entication. There are steps f or th e login bas ed on 802. 1x port ac cess control m anagement. T he protocol used in the right side is EAPO L and the left side is EAP . 1. At the init ial stage, the s upplicant A is unau thenticated a nd a port on switch ac t ing as an a uthenticator is in un au[...]

  • Seite 116

    11 4 8. If user ID and pas sword is correct, the aut hentication s erver will send a R adius-Acces s-Accept t o the authe nticator . If not corr ect, the authentication server w ill send a Radius-Ac cess-Rejec t. 9. W h en the authent icator P AE receiv es a Radius-Acc ess-Accept, it will send a n EAP-Succes s to the supp licant. At t his time, the[...]

  • Seite 117

    11 5 Only Mu ltiHost 802.1X is the type of authenticatio n supported in th e switch. In t his mode, f or the devices connected to t his port, onc e a supplicant is author ized, the devices connec ted to this port can acces s the network resourc e through this port. 802.1x P ort-based Network Acces s Control functi on support ed b y the s witch is l[...]

  • Seite 118

    11 6 Fig. 3-43 Function name: 802.1x S tate Setting Function desc ription: This function is used to conf igure the global parameters for RADIUS authentication in 802.1x port s ecurity application. Parameter desc ription: Radius Server: RADIUS server IP address f or authentication. Default: 192.168.1.1 Port Num ber: The port num ber to com municate [...]

  • Seite 119

    11 7 The port num ber to com municate with Acc ounting server for the accounting s ervice. The valid value ranges 1-65535. Default port num ber is 1813.[...]

  • Seite 120

    11 8 Function name: 802.1x Mode Setting Function desc ription: Set the operation m ode of 802.1X for eac h port. In this device, it supports only Multi-host operation m ode. Parameter desc ription: Port Num ber: Indicate which port is s elected to configure the 802.1x operation mode. 802.1x Mode: 802.1x operation m ode. There are two options, inclu[...]

  • Seite 121

    11 9 Function name: Port Security Management Function desc ription: Shows eac h port status. In Multihost m ode, it shows t he port num ber and its status, authorized or unauthorized. Parameter desc ription: Disable Mode: W h en selecti ng Disable mode for a port in t he function 802.1X Port M ode Configura tion, the port is in the uncontrolle d po[...]

  • Seite 122

    120 Function name: Param . Setting Function desc ription: This function is used to conf igure the parameter s for each port in 802.1x port security application. Refer to the f ollowing parameters des cription for details. Parameter desc ription: Port: It is the port num ber to be selected f or configuring its ass ociated 802.1x parameter s which ar[...]

  • Seite 123

    121 reAuthEnabled: Choose whether regular authentic ation w ill take place in this port. Default: ON reAuthPeriod(1-65535 s ): A non-zero number seconds between the periodic re-authentic ation of the supplicant. Default: 3600 max . Request(1-10): The m aximum of num ber times that the authenticator will retransm i t an EAP Request to the supplicant[...]

  • Seite 124

    122 3-13. A larm Configuration Function name: Events Configuration Function desc ription: The Trap Events Conf iguratio n function is used to e nable the sw itch to send out the trap information while pre-def ined trap events occurred. The s w itch offers 21 different tr ap events to users for switch m anagement. The tr ap inform ation can be s ent[...]

  • Seite 125

    123 Fig. 3-47 Function name: Em ail/SMS Configuration Function desc ription: Alarm configuration is use d to configure the pers ons who shou ld receive the alarm m essage via either email or S MS, or both. It depends on y our s ettings. An email addr ess or a m obile phone num ber has to be set in the web page of alarm c onf igur atio n. T hen, us [...]

  • Seite 126

    124 Parameter desc ription: Em ail: Mail Server: the IP address of the server transf erring y our email. Usernam e: y our usernam e on the mail ser v er . Password: your password on the mail s erver . Email Address 1 – 6: em ail address that would lik e to receive the alarm message. SMS: SMS Server: the IP address of the server transferr ing y ou[...]

  • Seite 127

    125 3-14. Configuration The s w itch s upports three c opies of c onfiguration, including th e default c onfiguration, work ing configuration a nd user conf iguration for y our conf iguration m anagement. All of them are listed and descr ibed below respec tively .  Default Configuration: This is factor y setting and cannot be altered. In Web UI,[...]

  • Seite 128

    126 3-14-1. Save/Restore Function name: Save As S tart Configuration Function desc ription: Save the current c onfiguration as a start conf iguration file in flash m emor y . Function name: Save As User Configuration Function desc ription: Save the current c onfiguration as a user c onfiguration file in f lash mem ory . Function name: Restore Def a[...]

  • Seite 129

    127 3-14-2. Conf i g File Function name: Config File Function desc ription: W ith this f unction, user can back up or reload the config f iles of Save As S tart or Save As Us er via TF TP . T o notice that after im port config f ile, the original IP related setting won’t be changed by config file. T his feature is des igned for preventing rem ote[...]

  • Seite 130

    128 3-15. Security Function name: Mirror Conf iguration Function desc ription: Mirror C onfiguratio n is to monitor the tr affic of the n etwork. F or example, we assum e that Port A and Por t B are Mon itoring Port and M onitored P ort respectiv ely, thus, the traffic rec eived b y Port B will be c opied to Port A for monitor ing. Parameter desc r[...]

  • Seite 131

    129 Function name: Isolated Group Function desc ription: Isolated G roup function ca n let the port be ind ependent of other por ts in the Isolated gr oup, and the co mmunication is also forbidd en between these p orts. But, the ports of the Is olated gr oup ar e still ab le to co mm unicate with the port s of the non-Iso lated group. W ith this de[...]

  • Seite 132

    130 Function name: Restricted G roup Function desc ription: The f unction of the Restricted G roup can decide th e direction of tr ansmitting pack ets for the specific port. T he packets rec eived by the port with th e “Ingress ” mode of Res tricted Group will be se nt to the ports with the “ Egress” mode of Restricted Group. Parameter desc[...]

  • Seite 133

    131 3-16. Bandw idth Management Function name: Ingress Bandwidth Setting Function desc ription: Ingress Bandwidth Setting function is used to set up the limit of Ingress bandwidth for each port. Fig. 3-54 Parameter desc ription: Port No.: Choose the p ort that you woul d like this f unction to w ork on it. V alid range of the por t is 1~26. Rate: S[...]

  • Seite 134

    132 Function name: Egress Bandwidth Setting Function desc ription: Egress Bandwidth Setting func tion is used to set up the lim it of Egress bandwidth for each port. Parameter desc ription: Port No.: Choose the p ort that you woul d like this f unction to w ork on it. V alid range of the por t is 1~26. Rate: Set up the limit of Egr ess band w idth [...]

  • Seite 135

    133 Function name: S torm Setting Function desc ription: Bandwidth Management function is used to set up the limit of Ingress and Egress bandwidth for eac h port. Fig. 3-55 Parameter desc ription: S torm T ype: Disable: Disable the func tion of the bandwidth storm c ontrol. Broadcast Stor m Control: Enable the function of bandwidth storm c ontrol f[...]

  • Seite 136

    134 S torm Rate: Set up t he limit of bandwidth for s torm t y p e you choos e. V al id value of the storm rate ranges f rom 1-10 0 with the m inimum unit of 1. And onl y integer is acc ept able. Default is 100.[...]

  • Seite 137

    135 3-17. QoS(Quality of Service) Configurat ion The s witch suppor ts 5 kind s of QoS, are as follo ws, M AC Pr iorit y , 8 02.1p Pr iorit y , IP TOS Priorit y , and Diff Serv DSCP Priorit y . Port Base d Priorit y has a spec ial nam e called VIP Port in the s witch. Any packets enter VIP Port will have hig hest transm itting priorit y . M AC Prio[...]

  • Seite 138

    136 The Q oS functions as we m entioned above are able t o enable at the same tim e. But, the following precedence will decide whether thes e functions work or not. 1. enable both VIP and TOS Choose priorities of VIP and TOS. 2. enable both VIP and DSCP Choose priorities of VIP and DSCP . 3. enable both TOS and DSCP Choose "DSCP". 4. enab[...]

  • Seite 139

    137 Function name: QoS Global Setting Function desc ription: W h en you want to use Qo S functio n, please enable QoS Mode in advance. Then you can use MAC Prior ity , 802 .1p Priority , IP TOS Priority , DiffServ DSCP Priorit y , or V IP Port functions and take eff ect. In this func tion, you ca n Enable Q oS Mode. Cho ose any of Pr iority Contro [...]

  • Seite 140

    138 Function name: VIP Port Setting Function desc ription: W h en the port is s et as VIP Port, the p ackets enter this port and will hav e highest tr ansmitting priority. For example, as you cho ose port 2 is VIP Port, sim ultaneously transm it packets from port 2 a nd port 3 t o port 1 at s peed of 100MB and let congest ion happen. T he pack ets [...]

  • Seite 141

    139 Function name: 802.1p Setting Function desc ription: This func tion will af f ect the priorit y of VL AN ta g. Bas ed on prior it y of VLAN t ag , it can ar range 0~8 priorities, pr iorities can map to 4 queues of th e switch (queue 0~ 3) and possess different band width distrib ution according to your weight setting. Parameter desc ription: 80[...]

  • Seite 142

    140 Function name: D-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throug[...]

  • Seite 143

    141 Function name: T- Typ e T O S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throu[...]

  • Seite 144

    142 Function name: R-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throug[...]

  • Seite 145

    143 Function name: M-T y pe TO S Function desc ription: IP TOS Priorit y affec t TOS fields of IP header , you can find it has 8-bit SERVICE T YPE f ield that s pecif ies h ow the datagram shoul d be handl ed. T he field co uld be divide d into s ix subfields as follows, P RECEDENCE ( 3 bits), D- T y pe ( Delay Priori ty , 1 bit), T - T ype (Throug[...]

  • Seite 146

    144 Function name: DSCP Setting Function desc ription: In the late 1990s , the IET F redefine d the m eaning of the 8-bit S ERVICE T YPE field to ac comm odate a set of d i fferentiat ed services ( DS). Under the differentiated services interpretation, the first six bits com prise a codepo int, which is som etimes abbr eviated DSCP , and the last t[...]

  • Seite 147

    145 3-18. Diagnostics Three f unctions, includi ng Diagnostics , Loopback T est and P i ng T est are contain ed in this f unction folder for device s elf-diagnost ics. Eac h of them will b e described in detail orderly in the following sections. Function name: Diagnostics Function desc ription: Diagnostic s function pr ovides a s et of basic s y st[...]

  • Seite 148

    146 Function name: Loopback T es t Function desc ription: In the Loopbac k T est func t ion, there are two different loo pback tests. O ne is Internal L oopback T est and the other is Exter nal Loopback T es t. The form e r test func tion will not send the test s ignal outside t he switch b ox. The test signal only wr ap s around in the s witch box[...]

  • Seite 149

    147 Function name: Ping T est Function desc ription: Ping T es t func tion is a tool for detec ting if the target de vice is alive or not through I CMP protocol which aboun ds with report mess ages. The switch provides P ing T est function to let you know th at if the target d evic e is ava ilabl e or not. Y o u can sim pl y fill in a known IP addr[...]

  • Seite 150

    148 3-19. TFTP Serv er Function name: TFTP Ser ve r Function desc ription: Set up IP address of TF TP server . Parameter desc ription: S pecif y the IP address w here the TF TP server locates. Fill in the IP address of y our TFT P server , then press <A pply> button to have the setting t aken eff ect. Fig. 3-67[...]

  • Seite 151

    149 3-20. Log This function s hows the log data. T he switch provide s system log data f or users. There ar e 16 private trap logs , 5 public trap logs . The switch suppor t s total 120 log entries. F or more detai ls on log i tems, pleas e refer to the section of Trap/Alarm Configuration and SNMP Configuration. Function name: Log Data Function des[...]

  • Seite 152

    150 Upload Log: Upload log data through tftp. Clear Log: Clear log data.[...]

  • Seite 153

    151 3-21. Firmware Upgrade Software upgra de tool is used to h elp upgrade t he software functi on in order t o fix or impr ove the function . The switch pro vides a TFT P client for software upgrade. T his can be done through Ethernet. Function name: Firm w are Upgrade Function desc ription: The s w itch sup ports TFT P upgrade too l for upgrad in[...]

  • Seite 154

    152 3-22. Reboot W e offer y ou m any ways to reboot the s witch, includi ng power up, hardware r eset and softwar e reset. You can pr ess the RESET button in the fr ont panel to reset t he switch. After upgrad ing software, changing IP configurat ion or chan ging VLA N mode c onfiguration, then you m ust reboot to have the ne w configura tion take[...]

  • Seite 155

    153 3-23. Logout You can manuall y log out by perf orming Lo gout funct i on. I n the switc h, it prov ides another way to logout. You can configure it to logout autom atically. Function name: Logout Function desc ription: The s w itch a llows you t o logout the s ystem to pre vent other users from the system without the permission. If you do not l[...]

  • Seite 156

    154 4. Operation of CLI Management 4-1. CLI Management Refer to Chapter 2 for basic installation. The f ollowi ng descr iption is the brief of the network connec tion. -- Locate the c orrect DB-9 null m odem cable with fem ale DB-9 connector . Null modem cable com es with the managem ent switch. Refer to the Appendix B f or null modem cable conf ig[...]

  • Seite 157

    155 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262# ------------------------------- Fig. 4-1 ------------------------------- Managed Switch – 2262 FE Switch Login: admin Password: 2262$ ------------------------------- Fig. 4-2[...]

  • Seite 158

    156 4-2. Commands of CLI T o see the commands of the mode, p lease input “ ? ” after the prompt, the n all comm ands will be listed in th e screen. All comm ands can be d ivided int o two categories , including g lobal com mands and loca l comm ands. Global comm ands can be used wherever th e mode yo u are. T hey are “exit”, “end”, “h[...]

  • Seite 159

    157 4-2-1. Glo bal Comma nds of CLI --------------------------- end Syntax: end Description: Back to the top mode. W h en you enter this com mand, your current pos ition woul d move to the top m ode. If y ou use this c omm and in the top mode, you are still in the position of the top m ode. A rgument: None. Possible valu e: None. Example: FE2262 # [...]

  • Seite 160

    158 --------------------------- help Syntax: help Description: T o show available com mands . Some c om m ands are th e c om bination of m ore than t wo words. W hen you enter t his comm and, the CLI would sho w the com plete commands. Bes ides, the comm and would hel p you clas sif y the c omm ands between t he lo cal c omm ands and th e glob al o[...]

  • Seite 161

    159 --------------------------- history Syntax: history [#] Description: T o show a list of previous com mands that you had ever run. W h en you ent er this com mand, the CLI wou l d sh ow a list of commands whic h you had t y ped bef ore. The CLI supports up to 25 6 records. If no argum ent is typed, the CLI would list total recor ds up to 256 . I[...]

  • Seite 162

    160 --------------------------- logout Syntax: logout Description: W h en you enter t his comm and via T elnet con nection, you wou ld logout the s y st em and disc onnect. If y ou connect the system throug h direct s erial port with RS-232 cable, you would l ogo ut t he s y stem and be bac k to the initi al l ogi n prom pt when you run this com ma[...]

  • Seite 163

    161 --------------------------- restore us er Syntax: restore us er Description: T o restor e the s tartup conf igur ati on as us er def in ed c o nf igurati on. If r es toring d ef ault succes sfully , t he CLI would prom pt if reboot im mediatel y or not. If y ou press Y or y , the system would reboot im mediately; others would back to the CLI sy[...]

  • Seite 164

    162 --------------------------- save use r Syntax: save user Description: T o save the c urrent conf ig uration as the us er-d efined c onf iguratio n. W hen you enter this com mand, the CLI would sav e your curre nt configurati on into the non-volat ile FLASH as user -defined configur ation. A rgument: None. Possible valu e: None. Example: FE2262 [...]

  • Seite 165

    163 4-2-2. Local Commands of CLI     802.1x --------------------------- set max-r equest Syntax : set m ax-request <port- range> <times> Description : The m aximum num ber o f tim es that the state machin e will retrans mit an EAP Request packet to the Supplic ant before it tim es out the authentication session. A rgument : [...]

  • Seite 166

    164 --------------------------- set port-c ontrol Syntax : set port-c ontrol <port-range> <authorized> Description : T o set up 802.1X s t atus of eac h port. A rgument : <port range> : syntax 1,5-7, available from 1 to 26 <authorized> : set up the status of each por t 0:ForceUnauthor iz ed 1:ForceAuthor iz ed 2:Auto Possibl[...]

  • Seite 167

    165 --------------------------- set reAuthMax Syntax : set reAuthMax <port-range> <max > Description : The num ber of reauthentic ation attempts that are perm itted before the port becom es Unauthorized. A rgument : <port range> : syntax 1,5-7, available from 1 to 26 <max > : max. value , r ange 1-10 Possible valu e: <por[...]

  • Seite 168

    166 set st ate Syntax : set state <ip> <port-num ber> <secr et-key> <Accounting Service> <Acc ounting Server> <Acc ounting Port> Description : T o conf igure the settings related with 802.1X Radius Server and Accounting ser v ice. A rgument : ip: xxx.xxx.xxx.xxx port-num ber:1~65535 secret- key : The length of s [...]

  • Seite 169

    167 FE2262 (802.1x)# s et txPeriod 2 30 --------------------------- show mode Syntax : show mode Description : T o display the mode of eac h port. A rgument : None. Possible valu e: None. Example: FE2262(802.1x)# show mode Port Mode ====== ============ 1 Disable 2 Multi-host 3 Disable 4 Disable 5 Disable 6 Disable : : : --------------------------- [...]

  • Seite 170

    168 --------------------------- show se curity Syntax : show securit y Description : T o display the authentication status of each port. A rgument : None. Possible valu e: None. Example: FE2262 (802.1x)# s how security Port Mode Status ====== ============ ============== 1 Disable 2 Multi-host Unauthorized 3 Disable 4 Disable 5 Disable 6 Disable : :[...]

  • Seite 171

    169     account --------------------------- add Syntax: add <name> Description: T o create a new guest us er . W hen y ou create a new guest user , you must type in password and confir m password. A rgument: <name> : new acc ount name Possible valu e: <name> : A string m ust be at least 5 character . Example: FEL2SW-26[...]

  • Seite 172

    170 --------------------------- modify Syntax: m odify <name> Description: T o change the user name and password of an ex isting account. A rgument: <name> : ex isting user account Possible valu e: None. Example: FEL2SW-26(account)# modify aaaaa username/password: the length is from 5 to 15. Current username (aaaaa):bbbbb New password: [...]

  • Seite 173

    171     alarm <<email>> --------------------------- del mail-address Syntax : del m ail-address <#> Description : T o rem ove the e-ma il address. A rgument : <#>: email addr ess number , range: 1 to 6 Possible valu e: <#>: 1 to 6 Example: FEL2SW-26(alarm-email)# del mail-address 2 -------------------------[...]

  • Seite 174

    172 --------------------------- set serve r Syntax : set serv er <i p> Description : T o set up the IP address of the email server . A rgument : <ip>:ema il server ip address or domain nam e Possible valu e: None. Example: FEL2SW-26(alarm-email)# set server 192.168.1.6 --------------------------- set user Syntax : set user <us ername[...]

  • Seite 175

    173 <<even t s>> --------------------------- del all Syntax : del all <range> Description : T o disable em ail, sm s and trap of events. A rgument : <range>:del the range of email, sm s and trap of events, syntax 1,5-7 Possible valu e: <range>: 1~21 Example: FEL2SW-26(alarm-events)# del all 1-3 ------------------------[...]

  • Seite 176

    174 --------------------------- del trap Syntax : del trap <range> Description : T o disable the trap of the events. A rgument : <range>:del the range of trap, sy ntax 1,5-7 Possible valu e: <range>: 1~21 Example: FEL2SW-26(alarm-events)# del trap 1-3 --------------------------- set all Syntax : set all <range> Description :[...]

  • Seite 177

    175 --------------------------- set sms Syntax : set sm s <range> Description : T o enable the sm s of the events. A rgument : <range>:set the range of sms, sy ntax 1,5-7 Possible valu e: <range>: 1~21 Example: FEL2SW-26(alarm-events)# set sms 1-3 --------------------------- set trap Syntax : set trap <range> Description : T[...]

  • Seite 178

    176 --------------------------- show Syntax : show Description : The Show here is us ed to display the configuration of alarm event. A rgument : None. Possible valu e: None. Example: FEL2SW-26(alarm-events)# show Events Email SMS Trap ----------------------------------------- 1 Cold Start v 2 Warm Start v 3 Link Down v 4 Link Up v 5 Authentication [...]

  • Seite 179

    177 --------------------------- show (al arm) Syntax : show Description : The Sho w fo r al ar m here is used to disp lay the conf igu r ation of Trap, SMS or E- m ail . A rgument : None. Possible valu e: None. Example: FEL2SW-26 (alarm)# show email FEL2SW-26 (alarm)# show events FEL2SW-26 (alarm)# show sms --------------------------- <<sms&g[...]

  • Seite 180

    178 --------------------------- set phone-number Syntax : set phone-num ber <#> <phone-num ber> Description : T o add sm s phone number . A rgument : <#>: mobile phone num ber , range: 1 to 6 <phone-num ber>: phone number Possible valu e: <#>: 1 to 6 Example: FEL2SW-26(alarm-sms)# set phone-number 1 0968777777 --------[...]

  • Seite 181

    179 --------------------------- show Syntax : show Description : T o display the configuration of SMS trap event. A rgument : None. Possible valu e: None. Example: FEL2SW-26(alarm-sms)# show SMS Server : 192.168.1.7 Username : ABC Password : **************** Mobile Phone 1: 0968777777 Mobile Phone 2: Mobile Phone 3: Mobile Phone 4: Mobile Phone 5: [...]

  • Seite 182

    180     autologout --------------------------- autologout Syntax : autologout <time> Description : T o set up the tim er of autologout. A rgument : <time>: r ange 1 to 3600 seconds, 0 for autologout off, current setting is 180 seconds. Possible valu e: < time >: 0,1-3600 Example: FEL2SW -26 # autologout 3600 Set autolo[...]

  • Seite 183

    181 --------------------------- set sto rm-rate Syntax : set stor m-rate <range> <data_rate> Description : T o set up the stor m-rate of the port s. A rgument : <range>:syntax: 1,3-5, available from 1 to 5 1: Disable 2: Broadcas t S torm Control 3: Multicast S torm Control 4: Unknown Unicas t S torm Contr ol 5: Broadcast, Multic a[...]

  • Seite 184

    182     config -file --------------------------- export start Syntax : export start Description : T o run the expor t st art function. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (conf ig-file)# expor t start Expo rt successful . --------------------------- export user-c onf Syntax : export user -conf Description : T o [...]

  • Seite 185

    183 --------------------------- import user-conf Syntax : impor t user-conf Description : T o run the im port user-conf function. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (conf ig-file)# im port user-c onf Import succe ssful. --------------------------- set export-path Syntax : set export-path <filepath> Description : T o [...]

  • Seite 186

    184 --------------------------- show Syntax : show Description : T o display the inform ation of the config f ile. A rgument : None. Possible valu e: None. Example: FEL2SW-26(config-file)# show TFTP Server IP Address: 192.168.3.111 Export Path and Filename: log/21511.txt Import Path and Filename: log/21511.txt     dhcp-boot ------------[...]

  • Seite 187

    185     diag --------------------------- diag Syntax: diag Description: Diag is used to test whether EEPRO M, UAR T , DRAM and Flash is normal or not. A rgument: None. Possible valu e: None. Example: FEL2SW-26 (diag)# diag EEPROM Test : OK UART Test : OK DRAM Test : OK Flash Test : OK --------------------------- Loopback Syntax: loopbac[...]

  • Seite 188

    186 192.168.1.115 is alive.[...]

  • Seite 189

    187     firmw are --------------------------- set upgrade-path Syntax : set upgrade-path <f ilep ath> Description : T o set up the im age file that will be upgraded. A rgument : <filepath>: upgrade file path and nam e Possible valu e: <filepath>: upgrade file path and nam e Example: FEL2SW-26 (firmware)# set upgrade-pa[...]

  • Seite 190

    188     gvrp --------------------------- disable Syntax : disable Description : T o disable the gvrp f unction A rgument : None. Possible valu e: None. Example: FEL2SW -26 (gvrp) # disable --------------------------- enable Syntax : enable Description : T o enable the gvrp f unction. A rgument : None. Possible valu e: None. Example: FEL[...]

  • Seite 191

    189 FEL2SW-26 (gvrp)# group 2 FEL2SW -26 (gvrp- group-2)# set applicant 1- 6 non-p articipant FEL2SW-26 (gvrp-group-2)# show GVRP group VID: 2 Port Applicant Registrar ---- --------------- --------- 1 Non-Participant Normal 2 Non-Participant Normal 3 Non-Participant Normal 4 Non-Participant Normal 5 Non-Participant Normal 6 Non-Participant Normal 7[...]

  • Seite 192

    190 --------------------------- set applicant Syntax : set applicant <r ange> <normal|non-participant> Description : T o set def ault applicant mode f or each port. A rgument : <range>: port range, s y ntax 1,5-7, available f rom 1 to 26 <norm al>: set applicant as norm al mode <non-participant>: set applicant as non-p[...]

  • Seite 193

    191 Example: FEL2SW-26 (gvrp)# set restricted 1-10 enable FEL2SW-26 (gvrp)# show config GVRP state: Enable Port Join Time Leave Time LeaveAll Time Applicant Registrar Restricted ---- --------- ---------- ------------- --------------- --------- ---------- 1 20 60 1000 Normal Normal Enable 2 20 60 1000 Normal Normal Enable 3 20 60 1000 Normal Normal [...]

  • Seite 194

    192 --------------------------- set timer Syntax : set tim er <range> <join> <leave> <leaveall> Description : T o set gvrp j oin time, leave tim e, and leaveall time f or each port. A rgument : <range> : port range, s y ntax 1,5-7, available f rom 1 to 26 <join>: join tim er , available fr om 20 to 100 <leave&[...]

  • Seite 195

    193 --------------------------- show counter Syntax : show counter <port> Description : T o show counter of the port. A rgument : <port>: port num ber , available from 1 to 26 Possible valu e: <port>: 1 to 26 Example: FEL2SW -26(gvrp) # show counter 2 GVRP Counter port: 2 Counter Name Received Transmitted -------------------- ----[...]

  • Seite 196

    194     hostname --------------------------- hostname Syntax : hostnam e <name> Description : T o set up the hostnam e of the switch. A rgument : <name>: hos tname, m ax. 40 characters . Possible valu e: <name>: hos tname, m ax. 40 characters . Example: FEL2SW -26 # hostnam e Company Company#     igmp-snoop[...]

  • Seite 197

    195 --------------------------- set mode Syntax : set m ode <status> Description : T o set up the m ode of IGMP Snooping. A rgument : <status>: 0:disable, 1:active, 2:passive Possible valu e: <status>: 0,1or 2 Example: FEL2SW -26(igm p-snooping)# set m ode 2 --------------------------- show igmp-snooping Syntax : show igmp- snoopi[...]

  • Seite 198

    196     IP --------------------------- disable dhcp Syntax : disable dhcp Description : T o disable the DHCP function of the s y stem . A rgument : None. Possible valu e: None. Example: FEL2SW -26(ip)# dis able dhcp DHCP is already stopped. --------------------------- enable dhcp Syntax : enable dhcp <m anual| auto> Description : [...]

  • Seite 199

    197 --------------------------- set i p Syntax : set ip <ip> <m ask> <gateway> Description : T o set the system IP address , subnet mask and gateway . A rgument : <ip> : ip address <mas k> : subnet m ask <gateway > : default gateway Possible valu e: <ip> : 192.168.1.1 or others <mas k> : 255.255.255.0[...]

  • Seite 200

    198     log --------------------------- clear Syntax: clear Description: T o clear the log data. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (log)# clear --------------------------- disable auto-upload Syntax: disable auto-upload Description: T o disable the auto-upload f unction. A rgument: None. Possible valu e: None. [...]

  • Seite 201

    199     loop-detect i on (LD) --------------------------- disable action Syntax : disable action Description : Disable LD and corr esponding action. Disable the lock ed-port action when loop occurs. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (loop-detection)# dis able action --------------------------- disable port Synt[...]

  • Seite 202

    200 --------------------------- enable port Syntax : enable port <port range> Description : Enable LD and corres ponding action. Enable LD per port. A rgument : <port range>: The range of y our setting enabled loop detection with ports. Possible valu e: <port range>: syntax: 1,5-7, available from 1 to 26 Example: FEL2SW-26 (loop-d[...]

  • Seite 203

    201 --------------------------- show Syntax: show Description: T o show a l ist of trap log events. When an y of log events happens , it will be recorded a nd using show c ommand in log f unction to quer y . Up to 120 log records are supported. A rgument: None. Possible valu e: None. Example: FEL2SW-26 (log)# show Tftp Server : 0.0.0.0 Auto Upload [...]

  • Seite 204

    202     mac-table <<alias>> --------------------------- del Syntax : del <m ac> Description : T o delete the m ac alias entry . A rgument : <mac > : mac addres s, form at: 00-02-03-04-05-06 Possible valu e: <m ac> : mac addr ess Example: FEL2SW -26 (m ac-table-alias)# del 00-44- 33-44-55-44 ----------------[...]

  • Seite 205

    203 <<infor mation>> --------------------------- search Syntax : searc h <port> <mac> <vid> Description : T o look for the relative m ac inform ation in mac t able. A rgument : <port> : set up the range of the ports to search for , synt ax 1,5-7, available f rom 1 to 26 <mac > : mac addres s, form at: 01-02[...]

  • Seite 206

    204 <<maintain>> --------------------------- set aging Syntax : set aging <tim e> Description : T o set up the age out tim e of dynamic learning m ac. A rgument : <time> : Mac t able age out tim e betw een 10 and 1000000 seconds . The value “0” means to disable age out time Possible valu e: <time> : 10- 1000000 sec[...]

  • Seite 207

    205 Example: FEL2SW-26(mac-table-maintain)# show Mac table age out time: 300 seconds Port Dynamically learn limit ------ ------------------------- 1 8191 2 8191 3 8191 4 8191 5 8191 : : : 21 8191 22 8191 23 8191 24 8191 25 8192 26 8192 <<static-mac>> --------------------------- add Syntax : add <m ac> <vid> <queue> <[...]

  • Seite 208

    206 --------------------------- del Syntax : del <m ac> Description : T o rem ove the static mac entry . A rgument : <mac > : mac addres s, form at: 00-02-03-04-05-06 Possible valu e: <m ac> : mac addr ess Example: FEL2SW -26(m ac-table-static-m ac)# del 00-02-03-04- 05-06 --------------------------- show Syntax : show Description[...]

  • Seite 209

    207     management --------------------------- add Syntax: Usage: set [<nam e> <value>] [<vid> <value>] [<ip> <value>] [<port> <value>] [<ty pe> <value>] <action> <value> Sy nopsis: set nam e Mary vid 20 ip 192.168.1.1-192.168.1.90 port 2-5,8 ty pe h,s action a Sy n[...]

  • Seite 210

    208 --------------------------- delete Syntax: delete # Description: T o delete a spec ific record or range. A rgument: [#]: a specif ic or range managem ent security entry (s) Possible valu e: None. Example: FEL2SW-26 (management)# show #: 1 Name : Tom VlanID : 2 IP : 192.168.1.30-192.168.1.80 Type : SNMP Action : Deny Port : 1,2 FEL2SW-26 (manage[...]

  • Seite 211

    209 Example: FEL2SW-26 (management)# edit 1 FEL2SW-26 (management-edit-1)# set name Tom vid 2 ip 192.168.1.30- 192.168.1.80 port 1-2 type s action d FEL2SW-26 (management-edit-1)# show #: 1 Name : Tom VlanID : 2 IP : 192.168.1.30-192.168.1.80 Type : SNMP Action : Deny Port : 1,2 --------------------------- show Syntax: show Description: T o show th[...]

  • Seite 212

    210     port --------------------------- clear counter Syntax : clear counter Description : T o clear all por t s’ counter (inc lude simple and detail port counter) information. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (port)# c lear counter --------------------------- disable state Syntax : disable state <range[...]

  • Seite 213

    21 1 set de scripti on Syntax : set desc ription <range> <description> Description : T o set up the hum an readable description of all ports. A rgument : range syntax: 1,5-7, available from 1 to 26 description: s et it s port des cription, max 47 c haracters Possible valu e: <range>: 1 to 26 Example: FEL2SW -26(port)# s et descrip[...]

  • Seite 214

    212 --------------------------- show conf Syntax : show conf Description : T o display the each port’s configuration about s t ate, speed-duplex and flow control. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (port)# s how conf --------------------------- show descr iption Syntax : show description Description : T o display the eac[...]

  • Seite 215

    213 Port 25 Fiber Media Information --------------------------------------------------------------------- Connector Type : SFP - LC Fiber Type : Multi-mode (MM) Tx Central Wavelength : 850 Baud Rate : 1G Vendor OUI : 00:40:c7 Vendor Name : APAC Opto Vendor PN : KM28-C3S-TC-N Vendor Rev : 0000 Vendor SN : 5425011140 Date Code : 050530 Temperature : [...]

  • Seite 216

    214 5 TP Up Enable Enable 100M/Full ON ON 6 TP Down Enable Enable ----/---- ---- ---- 7 TP Down Enable Enable ----/---- ---- ---- : : : 24 TP Down Enable Enable ----/---- ---- ---- 25 TP Down Enable Enable ----/---- ---- ---- 26 TP Down Enable Enable ----/---- ---- ----     qos --------------------------- disable 1p Syntax : disable 1p [...]

  • Seite 217

    215 --------------------------- disable tos Syntax : disable tos Description : T o disable IP TOS qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # disable tos --------------------------- enable 1p Syntax : enable 1p Description : T o enable 802.1p qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # ena[...]

  • Seite 218

    216 --------------------------- enable qos Syntax : enable qos Description : T o enable qos f unction. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # enable qos --------------------------- enable tos Syntax : enable tos Description : T o enable IP TOS qos. A rgument : None. Possible valu e: None. Example: FEL2SW -26 (qos) # en[...]

  • Seite 219

    217 --------------------------- set pri-tag Syntax : set pri-tag [<q0><priority>] [<q1><priority> ] [<q2><priority>] [<q3><priority >] Description : T o set 802.1p qos weighting f or 4 queues. A rgument : <q>: queue level, q0: queue 0; q1: queue 1; q2: queue 2; q3: queue 3. <priority>: pri[...]

  • Seite 220

    218 Possible valu e: <ty pe_value>: 0~3 <priority >: 0 to 7. Example: FEL2SW -26 (qos) # set tos 0 q0 1 q1 2 q2 4 q3 6 --------------------------- set vi p Syntax : set vip <port_range> <m ode> Description : T o set vip port for strict priority . A rgument : <port_range>: syntax 1,5-7, available from 1 to 26 <mode&g[...]

  • Seite 221

    219 DiffServ Queue DiffServ Queue DiffServ Queue DiffServ Queue --------- ------- ---------- ------- ---------- ------- ---------- ------- 0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 0 10 0 11 0 12 0 13 0 14 0 15 0 16 1 17 1 18 1 19 1 20 1 21 1 22 1 23 1 24 1 25 1 26 1 27 1 28 1 29 1 30 1 31 1 32 2 33 2 34 2 35 2 36 2 37 2 38 2 39 2 40 2 41 2 42 2 43 2 4[...]

  • Seite 222

    220 --------------------------- show priority- t ag Syntax : show priority-t ag Description : T o show 802.1p Qos c onfiguration. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (qos)# show priority-tag 802.1p priority ==================== Global QoS mode: Enable QoS Enable 802.1p Priority Disable ip tos classification Disable ip diffse[...]

  • Seite 223

    221 --------------------------- show tos Syntax : show tos Description : T o show IP tos Qos conf iguration. A rgument : none Possible valu e: none Example: FEL2SW-26 (qos)# show tos ip tos classification ==================== Global QoS mode: Enable QoS Disable 802.1p Priority Enable ip tos classification Disable ip diffserv classification Scheduli[...]

  • Seite 224

    222 --------------------------- reboot Syntax: reboot Description: T o reboot the system. A rgument: None. Possible valu e: None. Example: FEL2SW -26 # reboot     security <<isolat ed-group>> --------------------------- set Syntax : set <port> Description : T o set up the f unction of the isolated group. A rgument : &l[...]

  • Seite 225

    223 <<mirror>> --------------------------- disable Syntax : disable Description : T o disable the f unction of m i rror . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (sec urity -m i rror )# disable --------------------------- enable Syntax : enable Description : T o enable the func tion of mirr or . A rgument : None. Po[...]

  • Seite 226

    224 --------------------------- show Syntax : show Description : T o display the current setting status of mirror . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (sec urity - mirror) # show Mirror: Monitoring Port :1 Monitored Ingress :4 Monitored Egress :2 3 <<restricted-group>> --------------------------- set Syntax : s[...]

  • Seite 227

    225     snmp --------------------------- disable Syntax : disable set-c omm unity disable snm p Description : The Dis able here is used for the de- activation of snm p or set-com munity . A rgument : None. Possible valu e: None. Example: FEL2SW-26(snmp)# disable set-community FEL2SW-26(snmp)# disable snmp --------------------------- ena[...]

  • Seite 228

    226 --------------------------- set Syntax : set get-com m unity <com munity> set set-c omm unity <com munity> set trap <#> <ip> [port] [com munity] Description : The Set here is used for the setup of get-comm unity , set-com munity , trap hos t ip, host port and trap- c omm unity . A rgument : <#>: trap num ber , rang[...]

  • Seite 229

    227     stp --------------------------- MCh eck Syntax : MCheck <range> Description : T o force the port to trans mit RST BPDUs. A rgument : <range>: syntax 1,5-7, available from 1 to 26 Possible valu e: <range>: 1 to 26 Example: FEL2SW -26 (stp) # Mcheck 1-8 --------------------------- disable Syntax : disable Descrip[...]

  • Seite 230

    228 --------------------------- set con fig Syntax : set conf ig <Bridge Priority > <Hello Ti m e> <Max. Age> <Forward Delay> Description : T o set up the param eters of ST P . A rgument : <Bridge Priority>: priority m ust be a multiple of 4096,available from 0 to 61440. <Hello T ime >: available from 1 to 10. &l[...]

  • Seite 231

    229 FEL2SW -26 (stp) # set version rstp --------------------------- show config Syntax : show config Description : T o display the STP configuration data. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (stp)# show config STP State Configuration : Spanning Tree Protocol : Enabled Bridge Priority (0-61440) : 61440 Hello Time (1-10 sec) :[...]

  • Seite 232

    230 --------------------------- show status Syntax : show status Description : T o display of the status of ST P . A rgument : None. Possible valu e: None. Example: FEL2SW-26 (stp)# show status STP Status : STP State : Enabled Bridge ID : 00:40:C7:D8:09:1D Bridge Priority : 61440 Designated Root : 00:40:C7:D8:09:1D Designated Priority : 61440 Root [...]

  • Seite 233

    231     system --------------------------- set contact Syntax : set contact <contact> Description : T o set the contact des cription of the switch. A rgument : <contact>:string length up to 40 c haracters. Possible valu e: <contact>: A, b, c, d, ... ,z and 1, 2, 3, …. etc. Example: FEL2SW -26 (system )# set contact T[...]

  • Seite 234

    232 --------------------------- show Syntax : show Description : T o display the basic infor mation of the switch. A rgument : None. Possible valu e: None. Example: FEL2SW-26(system)# show Model Name : FEL2SW-26 System Description : 24 Fast Ethernet + 2 Gigabit L2 Managed Switch Location : Contact : Device Name : FEL2SW-26 System Up Time : 0 Days 2[...]

  • Seite 235

    233     tft p --------------------------- set serve r Syntax : set serv er <i p> Description : T o set up the IP address of t ftp server . A rgument : <ip>: the IP address of tftp server Possible valu e: <ip>: tftp server IP Example: FEL2SW -26 (tftp)# set ser v er 192.168.3.1 1 1 --------------------------- show Synta[...]

  • Seite 236

    234     time --------------------------- set daylightsaving Syntax: set daylight saving <hr> <MM/DD/HH> <m m/dd/hh> Description: T o set up the daylight saving. A rgument: <hr> : daylight saving hour, range: -5 to +5 <MM> : daylight saving start Month (01-12) <DD> : daylight saving start Day (01-31) &[...]

  • Seite 237

    235 --------------------------- set ntp Syntax: set ntp <ip> <tim ez one> Description: T o set up the cur rent time via NT P server . A rgument: <ip>: ntp server ip addres s or domain nam e <timezone>: tim e z one (GMT ), range: -12 to +13 Possible valu e: <timezone>: -12,-1 1…,0,1…,13 Example: FEML2-SW 26E( time)#[...]

  • Seite 238

    236     trunk --------------------------- del trunk Syntax : del trunk <port-range> Description : T o rem ove the trunk port. A rgument : <port-range> : s y ntax 1,5-7, available f rom 1 to 26 Possible valu e: <port-range> : 1 to 26 Example: FEL2SW -26 (trunk )# del trunk 1 --------------------------- set hash Syntax :[...]

  • Seite 239

    237 --------------------------- set trunk Syntax : set trunk <port-range> <m ethod> <group> <active LACP> Description : T o set up the status of trunk, including the group num ber and mode of the trunk as well as LACP mode. A rgument : <port-range> : s y ntax 1,5-7, available f rom 1 to 26 <m ethod>: <static| [...]

  • Seite 240

    238 --------------------------- show lacp-c onfig Syntax : show lacp-c onfig Description : T o display the value of LACP Priority . A rgument : None. Possible valu e: None. Example: FEL2SW -26 (trunk )# show lacp-conf ig LACP Sy s tem Priority : 33333 Hash Method : DA --------------------------- show lacp- det ail Syntax : show lacp-detail <aggt[...]

  • Seite 241

    239 --------------------------- show status Syntax : show status Description : T o display the aggregator status and the settings of each port. A rgument : None. Possible valu e: None. Example: FEL2SW-26 (trunk)# show status Trunk Port Setting Trunk Port Status ------------------------------------- ---------------------- port Method Group Active LA[...]

  • Seite 242

    240     vla n --------------------------- del port-group Syntax: del port-group <nam e> Description: T o delete the port-bas ed vlan group. A rgument: <name>: por t-vlan name Possible valu e: <name>: por t-vlan name Example: FEL2SW -26 (vlan)# del port- group vlan-2 --------------------------- del tag-group Syntax: del[...]

  • Seite 243

    241 --------------------------- disable drop-untag Syntax: disable drop-untag <port_range> Description: T o disable drop- unt ag. A rgument: <port_range>: which port(s ) y ou want not to drop untagged frames . Sy ntax: 1,5-7, available from 1 to 26 Possible valu e: <port_range>: 1 to 26 Example: FEL2SW -26 (vlan)# disable dr op-un[...]

  • Seite 244

    242 --------------------------- enable double-tag Syntax: enable double-tag Description: T o enable double-tag. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# enable double-tag --------------------------- enable drop-untag Syntax: enable drop-untag <port_range> Description: T o enable drop-untag. A rgument: <port_range[...]

  • Seite 245

    243 --------------------------- enable symmetric Syntax: enable symm etric Description: T o drop f rames f rom the non-m ember port. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# enable s y m metric --------------------------- set mgt-vlan Syntax: set m gt-vlan <st ate> [vid] Description: T o assign a m anagement vlan to[...]

  • Seite 246

    244 <name>: por t-vlan name <range>: vlan group m embers , sy ntax: 1,5-7, available from 1 to 26 Possible valu e: <range>: 1 to 26 Example: FEL2SW -26 (vlan)# set por t-group vlan-1 2-5,6-10 --------------------------- set pvi d Syntax: set pvid <port_range> <pvid> <def ault_priority > Description: T o set vlan [...]

  • Seite 247

    245 --------------------------- show config Syntax: show config Description: T o display the current vlan m ode, Sy m me tric vlan, SVL and Double tag states. A rgument: None. Possible valu e: None. Example: FEL2SW -26 (vlan)# s how config Current vlan mode:Tag-based vlan Global setting: Symmetric vlan : Disable (Asymmetric) SVL : Disable (IVL) Dou[...]

  • Seite 248

    246 Description: T o display managem ent setting. A rgument: None Possible valu e: None Example: FEL2SW-26(vlan)# show mgt-vlan Management Vlan: State : Disable VID : 1 --------------------------- show pvid Syntax: show pvid Description: T o display pvid, priority and drop untag result. A rgument: None Possible valu e: None Example: FEL2SW-26 (vlan[...]

  • Seite 249

    247     vs --------------------------- disable Syntax: disable Description: T o disable the virt ual stack. A rgument: None. Possible valu e: None. Example: FEL2SW-26(vs)# disable --------------------------- enable Syntax: enable Description: T o enable the virtual s t ack . A rgument: None. Possible valu e: None. Example: FEL2SW-26 (vs[...]

  • Seite 250

    248 --------------------------- set role Syntax: set role <m aster|slave> Description: T o set role. A rgument: <m aster|slave>: master : act as mas ter , s lave : act as slave Possible valu e: <m aster|slave>: master or slave Example: FEL2SW -26 (vs)# s et role master --------------------------- show Syntax: show Description: T o[...]

  • Seite 251

    249 5. Maintenance 5-1. Resolving No Link Condition The pos sible causes for a no link LED status are as f ollow s:  T he attached device is not powered on  T he cable may not be the correct ty pe or is faulty  T he installed building premis e cable is faulty  T he port may be faulty 5-2. Q&A 1. Computer A c an connect to Computer B[...]

  • Seite 252

    250 Appendix A Technical Specifications Features • The switch inc luded 24-Port 10/100Mbps TP and 2-Port Gigabit Dual Media TP/SFP . • Supports 24-port 10/100M TP ports with Nway and auto MDIX function . • Supports on-line plug/unplug SFP transce iver modules. • Non-block ing, store-and-for w ard and shared- memor y L2 m anaged switch. • [...]

  • Seite 253

    251 Hardware Specifi cat i ons     St andard Compliance: IEEE802.3ab / 802.3z / 802.3u / 802.3x 802.3z and 802.3ab compliant Gigabit Ethernet ports     T ransmissio n Mode: 10/100Mbps s upport full or half duplex 1000Mbp s suppor t full duplex only     T ransmissio n S peed: 10/100/1000Mbps f or TP 1000Mbps f or [...]

  • Seite 254

    252     Diagnostic LED: Sy stem LED : Power CPURUN ACT (LEDSET ) FDX (LEDSET ) SPD (LEDSET) Per Port LED: 10/100M TP Port 1 to 24 : LINK/ACT , FDX, SPD 1000M Fiber/TP Port 25,26 : LINK/ACT , FDX, SPD     Power Requirement : AC Line V oltage : 100 ∼ 240 V Frequency : 50 ∼ 60 Hz Consum ption : 15W     A mbient [...]

  • Seite 255

    253 Management Soft w are Speci f ications Sys tem Configuration Auto-negotiation support on 10/100Base-TX ports, W eb browser or console interface can set transmission speed (10/100Mbp s) and operation mode (Full/Half duplex ) on each port, enable/disable any port, set VLAN group, set T runk Connection. Management A gent SNMP support; M IB II, Bri[...]

  • Seite 256

    254 Appendix B Null Modem Cable Specifications The DB-9 c able is used for c onnecting a terminal or ter minal em ulator to the Managed Switch’s RS-232 port to acces s the comm and-line interfac e. The table below shows the pin assignm ents for the DB-9 c able. Function Mnemonic Pin Carrier CD 1 Receive Data RXD 2 T ransm it Dat a TX D 3 Data T e[...]