Edimax Technology ES-5240G+ manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Edimax Technology ES-5240G+. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Edimax Technology ES-5240G+ ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Edimax Technology ES-5240G+ décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Edimax Technology ES-5240G+ devrait contenir:
- informations sur les caractéristiques techniques du dispositif Edimax Technology ES-5240G+
- nom du fabricant et année de fabrication Edimax Technology ES-5240G+
- instructions d'utilisation, de réglage et d’entretien de l'équipement Edimax Technology ES-5240G+
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Edimax Technology ES-5240G+ ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Edimax Technology ES-5240G+ et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Edimax Technology en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Edimax Technology ES-5240G+, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Edimax Technology ES-5240G+, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Edimax Technology ES-5240G+. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    ES-5240G+ 24-Port GbE W eb Smart Switch User's Manual V ersion 1.0 / June 2007[...]

  • Page 2

    ii COPYRIGHT Copyright© 2007 Edimax. All right s reserved. No pa rt of this publication may be reproduced, transmitted, transcribed, stored in a retri eval system, or translated into any language or computer language, in any form or by any m eans, electronic, mechani cal, magnetic, optical, chemical, manual or otherwise, without the prior written [...]

  • Page 3

    iii T able of Content s Caution ........................................................................................................................ .......... v Electronic Emi ssion Notices .................................................................................................. v 1. Introdu ction .....................................[...]

  • Page 4

    iv 4-3-5. IGMP S t at us .......................................................................................................... 90 4-3-6. Ping S tatus............................................................................................................ 9 2 4-4. Main tenance .................................................................[...]

  • Page 5

    v Caution Circuit devices are sensitive to static ele c tric ity , which can damage their deli c ate electronics. Dry weather conditions or walking across a car peted floor may cause you to acquire a st atic electrical charge. T o protect your device, always: • T ouch the metal chassis of your computer to ground the static electri cal charge befo[...]

  • Page 6

    [...]

  • Page 7

    1 1. Introduction 1-1. Overview of 24-Port GbE W eb Smart Sw itch 24-port Gigabit W eb Smart Switch is a standalo ne switch that meets IEEE 802.3/u/x/z standa rds. The switch is equ ipped with included 20 x 10/100/1000Mbps TP port and 4 x Gigabit TP/SFP Fiber auto-se nse port We b Smart management Ethernet Switch. The switch is designed to incorpor[...]

  • Page 8

    2 1-2. Checklist Before you start inst alling the switch, veri fy that the package contai ns the following:    24-Port GbE Web Smart Switch    SFP Modules (optional)    Mounting Accessory (for 19 " Rack Shelf)    CD-ROM with Us er's Manual    Power Adapter Please notify your sales represent ative i mmediately if any [...]

  • Page 9

    3 • Support s to send the trap event while monitored events happ ened • Support s default configuration which can be restored to overwrite the current configuration which is working on via W eb UI and Reset button of the switch • Support s hot swap plug/unplug SFP module s • Support s Quality of Service (QoS) for real time applications base[...]

  • Page 10

    4 1-4. V iew of 24-Port GbE Web Smart Switch 1-4-1. User Interfaces on the Front Panel (Button, LEDs and Plugs) There are 24 TP Gigabit Ethernet port s and 4 SFP fiber ports f or optional removable modules on the front p anel of the switch. LED display area. Locating on the left side o f the panel, Power LED, which i ndicates the power status a nd [...]

  • Page 11

    5 • LED Indicators LED Color Function System LED POWER Green Lit when +3.3V power is coming up 10/100/1000Ethernet TP Port 1 to 24 LED LINK/ACT Green Lit when connection with remote device is good Blinks when any traf fic is present 10/100/1000Mbp s Green/ Amber Lit Green when TP link on 1000Mbp s speed Lit Amber when TP link on 100Mbps speed Off[...]

  • Page 12

    6 1-5. V iew of the Optional Modules Port 21~24 on this switch support tw o types of medi a --- TP and SFP Fiber (LC, BiDi-SC…); this port support s 10/100/1000Mbps TP or 1000Mbps SFP Fiber with auto-detected function. 1000Mbp s SFP Fiber transceiver is used for high- speed connection ex pansion; nine optional SFP types provided for the switch ar[...]

  • Page 13

    7 2. Installation 2-1. St arting 24-Port GbE Web Smart Switch Up This section will give user s a quick st art for: - Hardware and Cable Inst allation - Management S tation Installation - Software booting and configuration 2-1-1. Hardware and Cable Install ation At the beginning, please do first: Æ Wea r a grounding device to avoid the dam age from[...]

  • Page 14

    8 • TP Port an d Cable Inst allation ⇒ In the switch, TP port support s MDI/MDI-X auto-crossover , so both types of cable, straight-throu gh (Cable pin-out s for RJ -45 jack 1, 2, 3, 6 to 1, 2, 3, 6 in 10/100M TP; 1, 2, 3, 4, 5, 6, 7, 8 to 1, 2, 3, 4, 5, 6, 7, 8 in Gigabit TP) and crossed- over (Cab le pin-outs for RJ-45 jack 1, 2, 3, 6 to 3, 6[...]

  • Page 15

    9 2-1-2-1. Cabling Requirement s for TP Port s ⇒ For Fast Ethernet TP network connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. ⇒ Gigabit Ethernet TP netwo rk connection ⎯ The grade of the cable must be Cat. 5 or Cat. 5e with a maximum length of 100 meters. Cat. 5e is recommended. 2-1-2-2. Ca[...]

  • Page 16

    10 2-1-2-3. Switch Cascading in T opology • T akes the Delay T ime into Account Theoretically , the switch partitions the collision domain for each port in switch cascading that you may up-link the switches unlimitedly . In practice, the network extension (cascading levels & overall diam eter) must follow the constraint of the IEEE 802.3/802.[...]

  • Page 17

    11 Case1: All switch ports are in the same local area networ k. Every port can access each other (See Fig. 2-2). If the VLAN is enabled and configured, each node in the network that can communicate each other di rectly is bounded to the same VLAN area. The VLAN area is defined by which VL AN you are on. The switch support s both port-based VLAN and[...]

  • Page 18

    12 Case 2b: Port-based VLAN (See Fig.2-4). 1. VLAN1 members can not access VLAN2, VLAN3 and VLAN4 members. 2. VLAN2 members can not access VL AN1 and VLAN3 members, but they can access VLA N4 members. 3. VLAN3 members can not access VLAN1, VLAN2 and VLAN4. 4. VLAN4 members can not access VL AN1 and VLAN3 members, but they can access VLA N2 members.[...]

  • Page 19

    13 2-1-3. Configuring the Management Agent of 24-Port GbE Web Smart Switch Just like browsing on the Internet, this switch is de signed to allow users to access and manage it s functions through its web-based interface. Users can monitor the status of the switch, as well as to configure the switch through this web- based interface. Here we will gui[...]

  • Page 20

    14 2-1-3-1. Management through Ethern et Port There are two ways to configure and monitor the switch through its Ethe rnet port – using a web browser and an SNMP manager program. The later one is RubyVie w dependant which is not covered here. Using a web bro wser to access the switch’ s web-based management UI is highly user friendly so that we[...]

  • Page 21

    15 Fig. 2 -7 the Log in Screen for Web 2-1-4. IP Address Assignment For IP addre ss configuration, four p arameters are required. They are IP address, Subnet Mask, Default Gateway and DNS. IP addre ss: The IP addre ss of the network device in a network is used for internet working communication. The IP address is structured as shown in Fig. 2-8. It[...]

  • Page 22

    16 According to IPv4, the IP addre ssed are divided three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP addre ss/X, for example, 192.168.1.0/ 24. Each class ha s its address ra nge as described below . [...]

  • Page 23

    17 Class D and E: Class D is a cla ss with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RF C 1 1 12. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast. According to IANA (Internet Assigned Numbers Authority), there are three specific IP addre ss blocks reserved and to be use[...]

  • Page 24

    18 In this diagram, you can see the subnet mask with 2 5-bit long, 255.255.255.128, cont ains 126 members in the sub-netted network. Anothe r is that the length of network prefi x equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows t he result. Prefi[...]

  • Page 25

    19 For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network. Default gateway: When the destination of a routed packet not listed in the routing t able, all traffic will be put into a device with this designated I P addre ss, which is known [...]

  • Page 26

    20 2-2. T ypical Applications The 24-Port GbE W eb Smart Switch implement s 24 Gigabit Ethernet TP ports with au to MDIX and four slots for removable modules Comprehen sive fiber types of connection inclu ding LC and BiDi-LC SFP modules are supported. For more detailed specifications of the switch, please refer to Appendix A. The switch is suitable[...]

  • Page 27

    21 Fig. 2-12 Office Network Connection Fig. 2-1 1 Peer-to-peer N etwork Connection[...]

  • Page 28

    22 3. Basic Concept and Management In this chapter we are goin g to introduce you the basic concept s and features of Ethernet, and how to work with the managem ent feature s provided by this switch. 3-1. What’ s the Ethernet Ethernet originated and was implement ed at Xerox in Palo Alto, CA in 1973 and was successfully comm ercialized by Digi t [...]

  • Page 29

    23 The above diagram shows the Ethernet ar chitecture in OSI model. LLC sub- layer and MAC sub-layer will re spond to the Data Li nk layer , and the transceivers will respond to the Physical layer . Logical Link Control (LLC) Dat a link layer is composed of both the su b-layers of MAC and MAC-client. Here MAC client may be logical link control or b[...]

  • Page 30

    24 The table 3-1 is the format of LLC PDU. It comprises four fields, DSAP , SSAP , Contro l and Information. The DSAP address field i dentifies the one or more service access point s, in which the I/G bit indicates it is individual or gr oup address. If all bits of DSAP are 1s, it’s a global address. The SSAP address field identifies the sp ecifi[...]

  • Page 31

    25 3-2. Media Acces s Control (MAC) MAC Addressing Because LAN is co mposed of many nodes, for the data exchanged among these nodes, each nod e must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP [...]

  • Page 32

    26 Bit 47 bit 0 1st byte 2nd byte 3rd byte 4t h byte 5th byte 6th byte OUI code Serial number Table 3-3 Ethernet MAC address The first bit of the first byte in t he Destination address (DA) deter mines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1 ). So the 48-bit address space is div[...]

  • Page 33

    27 - Destination address (DA) — The DA field is used to identify which network device(s) should receive t he packet. It is a unique address. Please see the section of MAC addre ssing. - Source addresses (SA) — The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0. - Leng[...]

  • Page 34

    28 How does a MAC work? The MAC sub-layer has two primary jobs to do: 1. Receiving and transm itting data . When receiving data, it pars es frame to detect error; when transmi tting dat a, it performs frame assembly. 2. Performing Media access co ntrol. It prepares the initiation jobs for a frame transmission an d makes recovery from tran smission [...]

  • Page 35

    29 Ethernet MAC transmits frame s in half-duplex and full-du plex ways. In half- duplex operation mode, the MAC ca n either transmit or receive frame at a moment, but cannot do both jobs at the same time. As the transmission of a MAC frame with half-dupl ex operation exists only in the same collision domain. The carrie r signal needs to spend time [...]

  • Page 36

    30 Parameter value/LAN 10Base 100Base 1000Base Max. collision domain DTE to DTE 100 meters 100 meters for UTP 412 meters for fiber 100 meters for UTP 316 meters for fiber Max. collision domain with repeater 2500 meters 205 meters 200 meters Slot time 512 bit times 512 bit times 512 bit times Interframe Gap 9.6us 0.96us 0.096us AttemptLimit 16 16 16[...]

  • Page 37

    31 3-3. Flow Control Flow control is a mechanism to tell the source device stop sending frames for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sen ding a PAU SE frame from target device to source device. When the target is not busy and the PAUSE time is ex pired, it will send another [...]

  • Page 38

    32 Frame Reception In essence, the frame reception is t he same in both operations of half duplex and full duplex, except that full-duplex operat ion u ses two buffers to transmit and receive the frame independently. The receiv ing no de always “listens” if there is traffic running over the medium when it is not receiving a frame. When a frame [...]

  • Page 39

    33 What if a VLAN tagging is applied? VLAN tagging is a 4-byte long data im mediately following the MAC so urce address. When tagged VLAN is applied, t he Ethernet frame structure will have a little change shown as follows. Only two fields, VLAN ID and Tag c ontrol information are different in comparison with the basic Ethernet frame. The re st fie[...]

  • Page 40

    34 The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision. 3-4. How does a switch w ork? The switch is a layer 2 Ethernet Swit[...]

  • Page 41

    35 Extended Distance Limit ations: The diameter of a half-duplex LAN se gment is determined by its maximum propagation delay time. For example, in 10M LAN, the most distance of a LAN segment using cable i s 2500 meters an d 185 meters when using coaxial cable. The switch with it s per port per collision domain can extend the di stance li ke a bridg[...]

  • Page 42

    36 How does a switch operate? A Layer 2 switch uses some features of the Data Link layer in OSI model to forward the p acket to destination port(s ). Here we introduce some important features of a switch and how they work. MAC address t able When a pa cket is received on a port, th e switch fi rst checks if the pa cket is good or bad and extract s [...]

  • Page 43

    37 Mac address aging There is a field in MAC address ta ble us ed to put the entry’s Age time which determines how long a MAC entry can reside in a switch. The age time is refreshed when a packet with that SA arrives. Usually , the age time is programmable. T ransmission schedule In most layer 2 switches, the QoS is supported. QoS in a switch mus[...]

  • Page 44

    38 3-5. V irtual LAN What is a VLAN? It is a subset of a LAN. Before we discuss VLAN, we must un derstand what LAN is. In general, a LAN is composed of different physical n etwork segment s bridged by switches or bridges which attach to end stations in the same broadca s t domain. The traf fic can reach any stati on on the same LAN. Beyond thi s do[...]

  • Page 45

    39 Now we apply VLAN technology to configure the system shown as the figure above. We ca n partition the users into the dif ferent logical networks which have their own broadcast domain. The traf fic will not disturb among these logical networks. The users 1x (x denotes a ~ d) are members of VLAN 1. Any traf fic within VLAN 1 does not flow to VLAN [...]

  • Page 46

    40 There are many types of VLAN appli ed. The most popular ones are port- based VLAN, tag-ba sed VLAN and protocol-based VLAN.  Port-based VLAN Some physical port s are configured as members of a VLAN. All stations attached on t hese ports can communica te with each other .  T ag-based VLAN It identifies the membership by VLAN ID, no matter w[...]

  • Page 47

    41 VLAN-tagged frame: An Ethernet frame, carrying VLAN tag field, contains VLAN identification without the value of 0 and 4095, and priority information. Priority-tagged frame: An Ethernet frame, carrying VLAN tag fiel d, contains VLAN identification with the value of 0 and priority information. Untagge d frame: An Ethernet frame carries no VLAN t [...]

  • Page 48

    42 Ingress Rule: Each packet received by a VLAN-aware bridge will be classified t o a VLAN. The classification rule is described as follows . 1. If the VID of the packet is null (VID=0 ) or this packe t is an untagged packet: a. If there are still some other ways(e. g. protocol, MAC addr ess, application, IP-subnet, etc.) to classify the incoming p[...]

  • Page 49

    43 How does a T agged VLAN work? If the ingress filtering is enabled and when a packet is receive d, the VLAN bridge will first check if the VID of the packet present s. 1). If the packet has a non-zero VID, t he VLAN bridge will apply this VID as the VLAN ID of the packet in the network. 2). For a packet with a null tag or no VLAN t ag, if the VLA[...]

  • Page 50

    44 3-6. Link Aggregation Basically , Link Aggregation is to aggregate the ban dwidth of more than one port to an assigned logical link. This hig hly increases total bandwid th to the targeted device. There is more than one Link Aggreg ation technology in many vendors’ switch products al ready , wh ich may cause the problem of interoperability . T[...]

  • Page 51

    45 T erminology Link Aggregation: It is a method to have multiple physical links with the same media and speed bundled to be a logical link forming a Link Aggregation Group wit h a group ID. With the viewpoint of MAC client, each Link Aggregation Group is an ind ependent link. There are three cases of link used in th e network, which are switch to [...]

  • Page 52

    46 4. Operation of Web-based Management This chapter instruct s you how to configure and manage the 24-Port GbE Web Smart Switch through its web user interface and how to access and manage 20 10/100/1000Mbp s TP Port and 4 Gigabit TP/SFP Fiber dua l media port. The switch provides 20 fixed Gigabit Ether net TP port s and four optional Gigabit dual [...]

  • Page 53

    47 Fig. 4-1 4-1. Web M anag ement Home Overview After you login, the switch sho ws you t he system stat us information as Fig. 4- 2. This is the default page and it displays you with the basic information of the system, including “Switch S tatus”, “TP Po rt S tatus”, “Fiber Port S tatus”, “Aggregation”, “VLAN”, “Mirro r”, ?[...]

  • Page 54

    48 • The Information of Page Layout ⎯ On the top, it shows the front panel of the swit ch. In the front panel, green LEDs on to show linked ports in function; for unlinked ports the LEDs will be OFF . For the optional modules, the slot will show only a cover plate if no module exist s. On the other hand, it will show a module if one pre sents. [...]

  • Page 55

    49 4-2. Configuration Fifteen functions, including System Co nfi guration, Ports Configuration, VLAN Mode Configuration, VLAN Group Configuratio n, Aggre gation , LACP , RST P , 802.1X, IGMP Snooping, Mirror , QoS, F ilter , Rate Limit, S torm Control and SNMP are contained in this function folder for system and n etwork management. Each of them wi[...]

  • Page 56

    50 4-2-1. System Configuration System configuration is one of the mo st import ant configurations in the switch. Without proper setti ngs, network administrator w ill not be able to manage or view the status of this device.The switch sup ports manual IP addre ss setting . Fig. 4-3 Function name: System Configuration Function description: Show syste[...]

  • Page 57

    51 Active Subnet Mask: Show the active subnet mask of this switch. Active Gateway: Show the active gateway of this switch. DHCP Serv er: Show the IP address of the DHCP server . Default: 0.0.0.0 Lease T i me Left: Show the lease time left of DHCP client. Device Name: Set a special name for this switch. Up to 16 charact ers are allowed in this param[...]

  • Page 58

    52 Subnet mask is used to set the subnet mask value, which should be the same value as that of the other dev ices resided in the same network it attaches. For more information, please also see the Section 2-1-4 “IP Address Assignment” in this manual. Default: 255.255.255.0 Fallback Gateway: Set an IP address for a g ateway to handle those packe[...]

  • Page 59

    53 4-2-2. Port Configuration Function name: Ports Configu r ation Function description: Ports Configuration is ap plied to ch ange the settings of each port. In this configuration function, you can set/reset the following parameters, Mode and Flow Control. All of them are described in details below . Parameter description: Enable Jumbo Frames: This[...]

  • Page 60

    54 Fig. 4-4 Port Configuration 4-2-3. VLAN Mode Configuration The switch support s Port-based VLAN and T ag-based VLAN (802.1q) . Support 24 active VLANs and VLAN ID 1~ 4094. VLAN configuration is used to partition your LAN into small ones as your demand. Properly configuring it, you can gain not only improved security and increas ed performance bu[...]

  • Page 61

    55 T ag-based: T ag-based VLAN identifies it s member by VID. This is quite different fro m port-based VLAN. If there are any more rules in ingress filtering list or egress filtering list, the packet will be screened with more filtering criteria to dete rmine if it can be forwarded. The switch su pports suppl ement of 802.1q. For more details, plea[...]

  • Page 62

    56 4-2-4. VLAN Group Configuration Function name: VLAN Group Configuration Function description: It shows the existing information of VL AN Group s List and the maintenance that can be done to them, i.e. modify and delete. User also can add a new VLAN group by inputting a new VLAN name and VLA N ID. If you are in port-based VLAN, it will just show [...]

  • Page 63

    57 Add Group: Create a new port-based VLAN or t ag-based VLAN, which depends on the VLAN mode you choose in VLAN mode function. Fig. 4-8 Add or Remove VLAN Member Delete Group: Just tick the c heck box ( ; ) beside the ID, then press the <Delete> button to delete the group. Fig. 4-9 Port-Based VLAN Configuration[...]

  • Page 64

    58 4-2-5. Aggregation The Aggregation (Port T runking) Confi guration is used to configure the settings of Link Aggregation. Y ou can bundle more than one port with the same speed, full duplex and the same MA C to be one single logical port, thus the lo gical port aggregates the b andwidth of these bundled port s This means you can apply your curre[...]

  • Page 65

    59 4-2-6. LACP The switch support s the link aggr egation IEEE802.3ad sta ndard. This standard describ es the Link Aggregate Contro l Protocol (LACP), which i s a protocol that dynamically creates and manages trunk group s. When you enable LACP link aggregation on a port, the port can automatically negotiate with port s at the remote end of a link [...]

  • Page 66

    60 4-2-7. RSTP RSTP detect s and breaks network loop s and provides backup links betwe en switches, bridge s or routers. It allows a switch to interact with other RS TP – compliant switches in your netwo rk to ensure that only one path exists between any two stations o n the network. The switch allows you to create multip le STP configurations an[...]

  • Page 67

    61 RSTP Port Configuration Function description: Enable or disable RSTP proto c ol on t he port which being sele cted and set path cost. Parameter description: Protocol Enabled: Just tick t he check box ( ; ) beside the port x to enable RSTP protocol, then press the <Apply > b utton to apply . Edge: Just tick the c heck box ( ; ) beside the p[...]

  • Page 68

    62 4-2-8. 802.1X 802.1x port-based network access co ntrol provides a method to restrict users to access network resour ces via authenticat ing user ’s information. This re stricts users from gaining access to the network resource s through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a po rt under 8[...]

  • Page 69

    63 While in the authentication process, th e message packet s encapsulated by Extensible Authentic ation Protocol over LA N (EAPOL), are exchanged between an authenticator P AE and a supplicant P AE. The Authenticato r exchanges the messag e to authentication server using EAP encapsulatio n. Before successfully authenticating, the supplicant can on[...]

  • Page 70

    64 1. On the initial stage, the su pp licant A is unauthenticated and a port on switch acting as an authenticato r is in unauthorized st ate. So the access is blocked in this st age. 2. Initiating a session. Eithe r authenticator or sup plicant can initiate the message exchange. If supplicant initiates the proce ss, it sends EAPOL-start packet to t[...]

  • Page 71

    65 10. When the supplicant issue an EAP-Logof f message to Authentication server , the port you are using is set to be unauthorized.. The 802.1X “Enabled” is the type of aut hentication supported in the switch. In this mode, for the devices connected to th is port, once a sup plicant is authorized, the devices connected to this port can ac cess[...]

  • Page 72

    66 Mode: Enable or disable 802.1X function. RADIUS IP: RADIUS server IP address for authentication. Default: 0.0.0.0 RADIUS UDP Port: The port number to be used comm unicate with RADIUS se rver for the authentication service. The valid value ranges 1-65535. Default port number is 1812. RADIUS Secret: The secret key between authentication server an [...]

  • Page 73

    67 Force Reinitialize: Force the subscriber to reinitialize connection to the port. Force Reinitialize All: Force Reinitialize for all port s at once. ---------------- continue ----------------- Fig. 4-16 802.1X Configuration S tatistics: Choose the port which you want to sh ow of 802.1X statistics, the screen include Authenticator counters, ba cke[...]

  • Page 74

    68 Fig. 4-17 802.1X S tatistics Function name: 802.1x Parameters Function description: In here, user can enable or disabl e Re authentication function and specify how often a clien t has to re-enter his or her u sername and password to st ay connected to the port. Parameter description: Reauthentication Enabled: Choose whether regular authenticatio[...]

  • Page 75

    69 4-2-9 IGMP Snooping Function name: IGMP Snooping Config uration Function description: IGMP snoopi ng enable group multicast traffic to only be forwarded to port s that are members of that grou p; thus allowing you to significa ntly reduce multicast traffic p assing through the switch. All the functions should press <Apply> button to st art[...]

  • Page 76

    70 4-2-10. Mirror Configuration Function name: Mirror Configuration Function description: Mirror Configuration is to monitor the tra ffic of the network, this switch supports one port mirror multi ports. For example, we assume that Port A and Port B are Source Ports and Po rt C is Mirror Port respective ly. The traffic passed by Port A and Port B w[...]

  • Page 77

    71 4-2-1 1. QoS(Quality of Service) Configuration The switch offers powerful QoS function. This function supports VLAN-tagged priority that can make preced ence of 8 pr iorities, and DSCP(Differentiated Services Code Point) on Layer 3 of network framework. Fig. 4-21 QoS Configuration[...]

  • Page 78

    72 Function name: QoS Configuration Function description: When you want to use QoS functio n, please select QoS Mode through th e drop-down menu in advance you can choose from 802.1p Priorit y or DSCP Priority to take effect. In this function, you can disabl e QoS Mode and choose any other Priority Control and enable i t, such as 802.1p and DSCP . [...]

  • Page 79

    73 Function name: DSCP Setting Function description: In the late 1990s, the IETF redefined the meaning of the 8-bit SER VICE TYPE field to accommodate a set of diff erentiated services (DS). Under the differentiated services interpretation, the first six bi ts comprise a codepoi nt, which is sometimes abbre viated DSCP , and the last two bits are l[...]

  • Page 80

    74 4-2-12 Filter Function name: Filter Configuration Function description: This function can set manageme nt’s source IP Address to each port, simple and raise safety . After completing the function’s setting, press <Apply> button to have this fu nction in effect. Parameter description: Source IP Filter: Mode: There are three types of mod[...]

  • Page 81

    75 Fig. 4-24 Filter Configuration[...]

  • Page 82

    76 4-2-13 Rate Limit Function name: Ingress and Egress Ban dwidth Setting Function description: Ingress and Egress Ban dwidth Setting function is used to set up the limit of Ingress or Egress band width for each po rt. Parameter description: Ingress: Set up the limit of Ingress bandwidth for the port you choose. Incoming traffic will be discarded i[...]

  • Page 83

    77 4-2-14 Storm Control Function name: S torm Control Function description: S torm Control is used to block unnece ssary frames of the multicast and broadcast that would have reduce d the switch’ s performance. When the frames of multicast or broadcast are ov er the rate and S trom Control is enabled, the frames that exceed t he determined rate c[...]

  • Page 84

    78 Parameter description: ICMP Rate: T o enable the ICMP S torm cap ability . The user can use drop-do wn menu to select number of frames. Default is No Limit. The setting range is 1k~1024k per second. Learn Frames Rate: T o enable the Learn Frames S torm capability . The user can use drop- down menu to select number of fram es. Default is No Limit[...]

  • Page 85

    79 4-2-15 SNMP Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can m anage the Managed devices equipped with SNMP agent, provided that the Management In formation Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between S NMP[...]

  • Page 86

    80 Default SNMP function: Disable Default community name for Get: public Default community name for Set: private Default community name for Trap: public Fig. 4-27 SNMP Configuration[...]

  • Page 87

    81 4-3. Monitoring There are six functions under in the moni toring function. S tatistics Overview Detailed S tatistics Monitorin g LACP S tatus RSTP S tatus IGMP S tatus Pin g[...]

  • Page 88

    82 4-3-1. St atistics Overview The function of Statistics Overview coll ects any information and p r ovides the counting summary about the traf fic of the port, no matter the packet is good or bad. In the Fig. 4-25, the window can show all ports’ counter information at the same time. If the counting overflows, t he counter will be reset the count[...]

  • Page 89

    83 4-3-2. Det ailed St atistics Function name: Detailed Statistics Function description: Display the detailed counting number of each port’ s traffic. In the Fig. 4-26, the window can show all cou nter information each port at one time. Parameter description: Rx Packets: The counting number of the p acket received. RX Octets: T otal received byte[...]

  • Page 90

    84 Tx Broad- and Multicast: Show the counting number of the t r ansmitted broadcast with multicast packet. Tx Error Packet s: Show the counting number of the received error p ackets. Rx 64 Bytes: Number of 64-byte frames in good a nd bad packets received.[...]

  • Page 91

    85 Rx 65-127 Bytes: Number of 65 ~ 126-byte frames in good and bad packets received. Rx 128-255 Bytes: Number of 127 ~ 255-byte frames in good and ba d packets received. Rx 256-51 1 Bytes: Number of 256 ~ 511-byte frames in good and ba d packets received. Rx 512-1023 Bytes: Number of 512 ~ 1023-byt e frames in good and bad packet s received. Rx 102[...]

  • Page 92

    86 Tx Collisions: Number of collisions transm itting frames experienced. Tx Drops: Number of frames dropped due to excessive collision, late collision, or frame aging. Tx Overflow: Number of frames dropped due to the lack of transmitting buffer. Fig. 4-29 Detailed S tatistics for each port[...]

  • Page 93

    87 4-3-3. LACP S tatus Function name: LACP S tatus Function description: Display the LACP status. In the Fig. 4-30, the window can show LACP information and statu s for each port at one time. Parameter description: LACP Aggreg ation Overview: Show the group/port st atus. Red signs are set by default for link down ports; user ar e recommended to ref[...]

  • Page 94

    88 4-3-4. RSTP S tatus Function name: RSTP S tatus Function description: Display the RSTP st atus. In the Fig. 4-28, the window can show the VLAN bridge information and st atuses of 1~24 ports. Parameter description: RSTP VLAN Bridge Overview: VLAN Id: Show the VLAN Id. Bridge Id: Show this switch’ s current bridge priority setting and bridge ID [...]

  • Page 95

    89 Fig. 4-31 RSTP S tatus[...]

  • Page 96

    90 4-3-5. IGMP S tatus Function name: IGMP S tatus Function description: Display the IGMP status. In the Fig. 4-29, the window can show VLAN ID for each multicast group. Parameter description: VLAN Id: Show VLAN Id for each multicast group. Querier: Show the group membership queri es status. Queries transmitted: T o count the group membership queri[...]

  • Page 97

    91 Fig. 4-32 IGMP S tatus[...]

  • Page 98

    92 4-3-6. Ping St atus Function name: Ping S tatus Function description: T o setting up the target IP address for ping function of ICMP protocol and display the pinging st atus. In the Fig. 4-30, the window can show t he pinging information. Parameter description: Ping Parameters: T arget IP address: Set up a T arget IP address to ping. Count: Use [...]

  • Page 99

    93 Fig. 4-33 Ping[...]

  • Page 100

    94 4-4. Maintenance There are five functions under the maintenan ce section. Wa r m R e s t a r t Factor y Default Maintenance Software Up g rade Confi g uration File Transfer Lo g out[...]

  • Page 101

    95 4-4-1. W arm Restart We offer you many ways to reboot the switch, toggle the power, hardware reset and software reset. Y ou can press the RESET butt on in the front panel to reset the switch to its default setting. Afte r upgrading software, you must reb oot to have the new configuration ta ken effect. Here we will be discussing the software res[...]

  • Page 102

    96 4-4-2. Factory Default Function name: Factory Default Function description: Factory Default provides the function to retrieve default settings and repl ace current configuration. Except the IP address setting, all settings will be restored to the factory default values when “Factory Default” function is performed. If you want to restore all [...]

  • Page 103

    97 4-4-3. Sof tware Upgrad e Function name: Software Upg r ade Function description: Browse through your PC for a newer ve rsion of software pre-saved on your PC and upgrade the switch. Fig. 4-36 Software Up grade[...]

  • Page 104

    98 4-4-4. Configuration File T ransfer Function name: Configuration File Transfe r Function description: Backup the switch’s config uration file on to your computer to prevent acci dental data lost. If a device configuration crash occurs, or to configure a new switch, this pre-saved configuratio n backup file can be used to quickly restore the sw[...]

  • Page 105

    99 4-4-5. Logout Besides the auto logout function as we mentioned in the system configuration section, the swit ch also allows the user to logout manually by performing Logout function. Function name: Logout Function description: The switch allows you to logout the sy stem to preve nt unwanted accesses by other users without permi ssion. If you do [...]

  • Page 106

    100 5. Maintenance 5-1. Resolving No Link Condition The possible cause s for a no link LED st atus are as follows: z The attached device is not powered on z The cable may not be the correct type or is faulty z The installed building p remise cable is faulty z The port may be faulty 5-2. Q&A 1. Computer A can connect to Computer B, but cannot co[...]

  • Page 107

    101 Appendix A Technical Specifications Features • 20 (10/100/1000Mbp s) Gigabit Ethernet (TP) switching port s are compliant with IEEE802.3, 802.3u, 802.3z and 802.3ab. • 4 Gigabit TP/SFP fiber are dual media ports with auto detected function. • Non-blocking store-and-forward sh ared-memory Web-Smart switched. • Supports auto-ne gotiation [...]

  • Page 108

    102 Hardware Specifications  St andard Compliance: IEEE802.3/802.3ab / 802.3z / 802.3u / 802.3x  Network Interface: Configuration Mode Connector Port 10/100/1000Mbp s Gigabit TP NW ay TP (RJ-45) 1 - 24 1000Base-SX Gigabit Fiber 1000 FDX *SFP 21,22,23,24 (Option) 1000Base-LX Gigabit Fiber 1000 FDX *SFP 21,22,23,24 (Option) 1000Base-LX Single F[...]

  • Page 109

    103  Diagnostic LED: System LED : Power Per Port LED: 10/100/1000M TP Port 1 to 24 : LINK/ACT , 1 0/100/1000Mbp s 1000M SFP Fiber Port 21,22,23,24 : SFP(LINK/ACT)  Power Requirement : AC Line V oltage : 100 ∼ 240 V Frequency : 50 ∼ 60 Hz Consumption : 30W  Ambient T emperature : 0 ° to 50 ° C  Humidity : 5% to 90%  Dimensions :[...]

  • Page 110

    104 Management Software Specifications System Configuration Auto-negotiation support on 10/100Base-T X ports, Web brow s er can set transmission speed (10/100Mbps) and operat ion mode (Full/Half duplex) on each port, ena ble/disable any por t, set VLAN group, set T runk Connection. VLAN Function Port-Base / 802.1Q-T agged, allowed up to 24 active V[...]

  • Page 111

    105 Appendix B MIB Specifications MIB II Enterprise MIB brief description is listed as below . PRIV A TE-ES-5240G+-MIB DEFINITIONS ::= BEGIN IMPORTS mib-2, DisplayS tring,ifIndex FROM RF C1213-MIB enterprises,Counter , T imeTicks , Gauge,IpAddress FROM RFC1 155-SMI OBJECT -TYPE FROM RFC-1212 TRAP-TYPE FROM RFC-1215; privatetech OB JECT IDENTIFIER :[...]